| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Mobile | T1623 | Command and Scripting Interpreter | ||
| Mobile | T1639 | Exfiltration Over Alternative Protocol |
TianySpy can exfiltrate collected user data, including credentials and authorized cookies, via email.[1] |
|
| Mobile | T1417 | .002 | Input Capture: GUI Input Capture |
TianySpy can utilize WebViews to display fake authentication pages that capture user credentials.[1] |
| Mobile | T1406 | Obfuscated Files or Information |
TianySpy has encrypted C2 details, email addresses, and passwords.[1] |
|
| Mobile | T1632 | .001 | Subvert Trust Controls: Code Signing Policy Modification |
TianySpy can install malicious configurations on iPhones to allow malware to be installed via Ad Hoc distribution.[1] |
| Mobile | T1426 | System Information Discovery | ||
| Mobile | T1422 | System Network Configuration Discovery | ||
| .001 | Internet Connection Discovery | |||
| .002 | Wi-Fi Discovery | |||