| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1560 | .002 | Archive Collected Data: Archive via Library | 
                                         TajMahal has the ability to use the open source libraries XZip/Xunzip and zlib to compress files.[1]  | 
                        
| Enterprise | T1123 | Audio Capture | 
                                 TajMahal has the ability to capture VoiceIP application audio on an infected host.[1]  | 
                |
| Enterprise | T1119 | Automated Collection | 
                                 TajMahal has the ability to index and compress files into a send queue for exfiltration.[1]  | 
                |
| Enterprise | T1020 | Automated Exfiltration | 
                                 TajMahal has the ability to manage an automated queue of egress files and commands sent to its C2.[1]  | 
                |
| Enterprise | T1115 | Clipboard Data | 
                                 TajMahal has the ability to steal data from the clipboard of an infected host.[1]  | 
                |
| Enterprise | T1005 | Data from Local System | 
                                 TajMahal has the ability to steal documents from the local system including the print spooler queue.[1]  | 
                |
| Enterprise | T1025 | Data from Removable Media | 
                                 TajMahal has the ability to steal written CD images and files of interest from previously connected removable drives when they become available again.[1]  | 
                |
| Enterprise | T1041 | Exfiltration Over C2 Channel | 
                                 TajMahal has the ability to send collected files over its C2.[1]  | 
                |
| Enterprise | T1083 | File and Directory Discovery | 
                                 TajMahal has the ability to index files from drives, user profiles, and removable drives.[1]  | 
                |
| Enterprise | T1056 | .001 | Input Capture: Keylogging | 
                                         TajMahal has the ability to capture keystrokes on an infected host.[1]  | 
                        
| Enterprise | T1112 | Modify Registry | 
                                 TajMahal can set the   | 
                |
| Enterprise | T1027 | Obfuscated Files or Information | 
                                 TajMahal has used an encrypted Virtual File System to store plugins.[1]  | 
                |
| Enterprise | T1120 | Peripheral Device Discovery | 
                                 TajMahal has the ability to identify connected Apple devices.[1]  | 
                |
| Enterprise | T1057 | Process Discovery | 
                                 TajMahal has the ability to identify running processes and associated plugins on an infected host.[1]  | 
                |
| Enterprise | T1055 | .001 | Process Injection: Dynamic-link Library Injection | 
                                         TajMahal has the ability to inject DLLs for malicious plugins into running processes.[1]  | 
                        
| Enterprise | T1113 | Screen Capture | 
                                 TajMahal has the ability to take screenshots on an infected host including capturing content from windows of instant messaging applications.[1]  | 
                |
| Enterprise | T1129 | Shared Modules | 
                                 TajMahal has the ability to inject the   | 
                |
| Enterprise | T1518 | Software Discovery | 
                                 TajMahal has the ability to identify the Internet Explorer (IE) version on an infected host.[1]  | 
                |
| .001 | Security Software Discovery | 
                                     TajMahal has the ability to identify which anti-virus products, firewalls, and anti-spyware products are in use.[1]  | 
                    ||
| Enterprise | T1539 | Steal Web Session Cookie | 
                                 TajMahal has the ability to steal web session cookies from Internet Explorer, Netscape Navigator, FireFox and RealNetworks applications.[1]  | 
                |
| Enterprise | T1082 | System Information Discovery | 
                                 TajMahal has the ability to identify hardware information, the computer name, and OS information on an infected host.[1]  | 
                |
| Enterprise | T1016 | System Network Configuration Discovery | 
                                 TajMahal has the ability to identify the MAC address on an infected host.[1]  | 
                |
| Enterprise | T1124 | System Time Discovery | 
                                 TajMahal has the ability to determine local time on a compromised host.[1]  | 
                |
| Enterprise | T1125 | Video Capture | ||