| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell | CARROTBAT has the ability to execute command line arguments on a compromised host.[2] | 
| Enterprise | T1070 | .004 | Indicator Removal: File Deletion | CARROTBAT has the ability to delete downloaded files from a compromised host.[1] | 
| Enterprise | T1105 | Ingress Tool Transfer | CARROTBAT has the ability to download and execute a remote file via certutil.[1] | |
| Enterprise | T1027 | .010 | Obfuscated Files or Information: Command Obfuscation | CARROTBAT has the ability to execute obfuscated commands on the infected host.[1] | 
| .013 | Obfuscated Files or Information: Encrypted/Encoded File | CARROTBAT has the ability to download a base64 encoded payload.[1] | ||
| Enterprise | T1082 | System Information Discovery | CARROTBAT has the ability to determine the operating system of the compromised host and whether Windows is being run with x86 or x64 architecture.[1][2] | |