Android/Chuli.A is Android malware that was delivered to activist groups via a spearphishing email with an attachment. [1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Mobile | T1437 | .001 | Application Layer Protocol: Web Protocols | Android/Chuli.A used HTTP uploads to a URL as a command and control mechanism.[1] | 
| Mobile | T1430 | Location Tracking | Android/Chuli.A stole geo-location data.[1] | |
| Mobile | T1644 | Out of Band Data | Android/Chuli.A used SMS to receive command and control messages.[1] | |
| Mobile | T1636 | .002 | Protected User Data: Call Log | Android/Chuli.A stole call logs.[1] | 
| .003 | Protected User Data: Contact List | Android/Chuli.A stole contact list data stored both on the the phone and the SIM card.[1] | ||
| .004 | Protected User Data: SMS Messages | Android/Chuli.A stole SMS message content.[1] | ||
| Mobile | T1426 | System Information Discovery | Android/Chuli.A gathered system information including phone number, OS version, phone model, and SDK version.[1] | |