| ID | Name |
|---|---|
| T1636.001 | Calendar Entries |
| T1636.002 | Call Log |
| T1636.003 | Contact List |
| T1636.004 | SMS Messages |
| T1636.005 | Accounts |
Adversaries may utilize standard operating system APIs to gather calendar entry data. On Android, this can be accomplished using the Calendar Content Provider. On iOS, this can be accomplished using the EventKit framework.
If the device has been jailbroken or rooted, an adversary may be able to access Calendar Entries without the user’s knowledge or approval.
| ID | Name | Description |
|---|---|---|
| S0405 | Exodus | |
| S0408 | FlexiSpy | |
| S0407 | Monokle |
Monokle can retrieve calendar event information including the event name, when and where it is taking place, and the description.[3] |
| S0316 | Pegasus for Android |
Pegasus for Android accesses calendar entries.[4] |
| S0328 | Stealth Mango |
Stealth Mango uploads calendar events and reminders.[5] |
| S1082 | Sunbird |
| ID | Mitigation | Description |
|---|---|---|
| M1011 | User Guidance |
Calendar access is an uncommonly needed permission, so users should be instructed to use extra scrutiny when granting access to their device calendar. |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0674 | Detection of Calendar Entries | AN1774 |
Application vetting services could look for |
| AN1775 |
Application vetting services could look for |