| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1554 | Compromise Host Software Binary | SLOWPULSE is applied in compromised environments through modifications to legitimate Pulse Secure files.[2] | |
| Enterprise | T1074 | .001 | Data Staged: Local Data Staging | SLOWPULSE can write logged ACE credentials to  | 
| Enterprise | T1556 | .004 | Modify Authentication Process: Network Device Authentication | SLOWPULSE can modify LDAP and two factor authentication flows by inspecting login credentials and forcing successful authentication if the provided password matches a chosen backdoor password.[1] | 
| .006 | Modify Authentication Process: Multi-Factor Authentication | SLOWPULSE can insert malicious logic to bypass RADIUS and ACE two factor authentication (2FA) flows if a designated attacker-supplied password is provided.[1] | ||
| Enterprise | T1111 | Multi-Factor Authentication Interception | SLOWPULSE can log credentials on compromised Pulse Secure VPNs during the  | |
| Enterprise | T1027 | Obfuscated Files or Information | SLOWPULSE can hide malicious code in the padding regions between legitimate functions in the Pulse Secure  | |