Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1437 | .001 | Application Layer Protocol: Web Protocols | |
Mobile | T1646 | Exfiltration Over C2 Channel |
FlyTrap can use HTTP to exfiltrate data to the C2 server.[2] |
|
Mobile | T1417 | .002 | Input Capture: GUI Input Capture |
FlyTrap has used infected applications with Facebook login prompts to steal credentials.[1] |
Mobile | T1430 | Location Tracking | ||
Mobile | T1409 | Stored Application Data |
FlyTrap can collect Facebook account information, such as Facebook ID, email address, cookies, and login tokens.[1][2] |
|
Mobile | T1422 | System Network Configuration Discovery |
FlyTrap can collect IP address and network configuration information.[1] |
|
.001 | Internet Connection Discovery |
FlyTrap can collect IP address and network configuration information.[1] |