mitre-attack / attack-stix-data

STIX data representing MITRE ATT&CK
https://attack.mitre.org/
Other
324 stars 82 forks source link

v13.1 having Duplicated G0097 and S0302 spanning both [enterprise-attack and mobile-attack] Stix JSON files #43

Open DrSnowbird opened 11 months ago

DrSnowbird commented 11 months ago

1.) In Release v13.1 : "external_id": "G0097" -- appearing in both "x_mitre_domains": "mobile-attack" and "enerprise-attack"

mobile-attack-13.1.json 17685: "external_id": "G0097", 17687: "url": "https://attack.mitre.org/groups/G0097" 17697: "description": "Bouncing Golf is a cyberespionage campaign targeting Middle Eastern countries.(Citation: Trend Micro Bouncing Golf 2019)", 21073: "description": "GolfSpy is Android spyware deployed by the group Bouncing Golf.(Citation: Trend Micro Bouncing Golf 2019)", 59771: "description": "Bouncing Golf delivered GolfSpy via a hosted application binary advertised on social media.(Citation: Trend Micro Bouncing Golf 2019) ", 63828: "description": "Bouncing Golf distributed malware as repackaged legitimate applications, with the malicious code in the com.golf package.(Citation: Trend Micro Bouncing Golf 2019)"

enterprise-attack-13.1.json 692360: "external_id": "G0097", 692362: "url": "https://attack.mitre.org/groups/G0097" 692372: "description": "Bouncing Golf is a cyberespionage campaign targeting Middle Eastern countries.(Citation: Trend Micro Bouncing Golf 2019)",

2.) In Release v13.1 : "external_id": "S0302" -- appearing in both "x_mitre_domains": "mobile-attack" and "enerprise-attack"

mobile-attack-13.1.json 19550: "description": "Twitoor is a dropper application capable of receiving commands from social media.(Citation: ESET-Twitoor)", 19570: "url": "https://attack.mitre.org/software/S0302", 19571: "external_id": "S0302" 38696: "description": "Twitoor can hide its presence on the system.(Citation: ESET-Twitoor)", 50166: "description": "Twitoor encrypts its C2 communication.(Citation: ESET-Twitoor)", 54579: "description": "Twitoor can be controlled via Twitter.(Citation: ESET-Twitoor)", 61597: "description": "Twitoor can install attacker-specified applications.(Citation: ESET-Twitoor)", 66798: "description": "Twitoor uses Twitter for command and control.(Citation: ESET-Twitoor)",

enterprise-attack-13.1.json 691943: "description": "Twitoor is a dropper application capable of receiving commands from social media.(Citation: ESET-Twitoor)", 691963: "url": "https://attack.mitre.org/software/S0302", 691964: "external_id": "S0302" 692181: "description": "Twitoor uses Twitter for command and control.(Citation: ESET-Twitoor)",

ElJocko commented 10 months ago

These objects (G0097 and S0302) are both mobile objects and should only appear in the Mobile collection bundle. They are included in the Enterprise collection bundle because:

We'll review the bundle generation script and make a change so that these objects are not included in the Enterprise v15.0 collection bundle.