Skip to content

DET0607 Detection of Unix Shell

Item Value
ID DET0607
Version 1.0
Created 21 October 2025
Last Modified 21 October 2025

Technique Detected: T1623.001 (Unix Shell)

Analytics

Android

AN1657

Command-line activities can potentially be detected through Mobile Threat Defense (MTD) integrations with lower-level OS APIs. This could grant the MTD agents access to running processes and their parameters, potentially detecting unwanted or malicious shells. Mobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to newly created processes and their parameters, potentially detecting unwanted or malicious shells. Application vetting services could detect the invocations of methods that could be used to execute shell commands.(Citation: Samsung Knox Mobile Threat Defense) Mobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to running processes and their parameters, potentially detecting unwanted or malicious shells.

Log Sources
Data Component Name Channel
Command Execution (DC0064) Command None
Process Creation (DC0032) Process None
API Calls (DC0112) Application Vetting None
Process Metadata (DC0034) Process None
Mutable Elements
Field Description

iOS

AN1658

Command-line activities can potentially be detected through Mobile Threat Defense (MTD) integrations with lower-level OS APIs. This could grant the MTD agents access to running processes and their parameters, potentially detecting unwanted or malicious shells. Mobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to newly created processes and their parameters, potentially detecting unwanted or malicious shells. Application vetting services could detect the invocations of methods that could be used to execute shell commands.(Citation: Samsung Knox Mobile Threat Defense) Mobile Threat Defense (MTD) with lower-level OS APIs integrations may have access to running processes and their parameters, potentially detecting unwanted or malicious shells.

Log Sources
Data Component Name Channel
Command Execution (DC0064) Command None
Process Creation (DC0032) Process None
API Calls (DC0112) Application Vetting None
Process Metadata (DC0034) Process None
Mutable Elements
Field Description