| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Mobile | T1626 | .001 | Abuse Elevation Control Mechanism: Device Administrator Permissions | |
| Mobile | T1532 | Archive Collected Data | ||
| Mobile | T1429 | Audio Capture | ||
| Mobile | T1623 | .001 | Command and Scripting Interpreter: Unix Shell | |
| Mobile | T1533 | Data from Local System | ||
| Mobile | T1646 | Exfiltration Over C2 Channel |
Sunbird can exfiltrate compressed ZIP files containing gathered info to C2 infrastructure.[1] |
|
| Mobile | T1544 | Ingress Tool Transfer |
Sunbird can download adversary specified content from FTP shares.[1] |
|
| Mobile | T1430 | Location Tracking | ||
| Mobile | T1636 | .001 | Protected User Data: Calendar Entries | |
| .002 | Protected User Data: Call Log | |||
| .003 | Protected User Data: Contact List | |||
| Mobile | T1513 | Screen Capture |
Sunbird can take screenshots and abuse accessibility services to scrape BlackBerry Messenger and WhatsApp messages, contacts, and notifications[1] |
|
| Mobile | T1418 | Software Discovery | ||
| Mobile | T1409 | Stored Application Data |
Sunbird can exfiltrate browser history, BlackBerry Messenger files, IMO instant messaging content, and WhatsApp voice notes.[1] |
|
| Mobile | T1426 | System Information Discovery |
Sunbird can exfiltrate the victim device ID, model, manufacturer, and Android version.[1] |
|
| Mobile | T1422 | System Network Configuration Discovery | ||
| Mobile | T1512 | Video Capture | ||