| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Mobile | T1623 | Command and Scripting Interpreter | ||
| Mobile | T1639 | Exfiltration Over Alternative Protocol | TianySpy can exfiltrate collected user data, including credentials and authorized cookies, via email.[1] | |
| Mobile | T1417 | .002 | Input Capture: GUI Input Capture | TianySpy can utilize WebViews to display fake authentication pages that capture user credentials.[1] | 
| Mobile | T1406 | Obfuscated Files or Information | TianySpy has encrypted C2 details, email addresses, and passwords.[1] | |
| Mobile | T1632 | .001 | Subvert Trust Controls: Code Signing Policy Modification | TianySpy can install malicious configurations on iPhones to allow malware to be installed via Ad Hoc distribution.[1] | 
| Mobile | T1426 | System Information Discovery | ||
| Mobile | T1422 | System Network Configuration Discovery | ||
| .001 | Internet Connection Discovery | |||
| .002 | Wi-Fi Discovery | |||