| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | GRIFFON has used a persistence module that stores the implant inside the Registry, which executes at logon.[1] | 
| Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell | GRIFFON has used PowerShell to execute the Meterpreter downloader TinyMet.[1] | 
| .007 | Command and Scripting Interpreter: JavaScript | GRIFFON is written in and executed as JavaScript.[1] | ||
| Enterprise | T1069 | .002 | Permission Groups Discovery: Domain Groups | GRIFFON has used a reconnaissance module that can be used to retrieve Windows domain membership information.[1] | 
| Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task | |
| Enterprise | T1113 | Screen Capture | GRIFFON has used a screenshot module that can be used to take a screenshot of the remote system.[1] | |
| Enterprise | T1082 | System Information Discovery | GRIFFON has used a reconnaissance module that can be used to retrieve information about a victim's computer, including the resolution of the workstation .[1] | |
| Enterprise | T1124 | System Time Discovery | GRIFFON has used a reconnaissance module that can be used to retrieve the date and time of the system.[1] | |