Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1623 | Command and Scripting Interpreter | ||
Mobile | T1639 | Exfiltration Over Alternative Protocol |
TianySpy can exfiltrate collected user data, including credentials and authorized cookies, via email.[1] |
|
Mobile | T1417 | .002 | Input Capture: GUI Input Capture |
TianySpy can utilize WebViews to display fake authentication pages that capture user credentials.[1] |
Mobile | T1406 | Obfuscated Files or Information |
TianySpy has encrypted C2 details, email addresses, and passwords.[1] |
|
Mobile | T1632 | .001 | Subvert Trust Controls: Code Signing Policy Modification |
TianySpy can install malicious configurations on iPhones to allow malware to be installed via Ad Hoc distribution.[1] |
Mobile | T1426 | System Information Discovery | ||
Mobile | T1422 | System Network Configuration Discovery | ||
.001 | Internet Connection Discovery | |||
.002 | Wi-Fi Discovery |