| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1025 | 从可移动介质获取数据 |
TajMahal has the ability to steal written CD images and files of interest from previously connected removable drives when they become available again.[1] |
|
| Enterprise | T1005 | 从本地系统获取数据 |
TajMahal has the ability to steal documents from the local system including the print spooler queue.[1] |
|
| Enterprise | T1112 | 修改注册表 |
TajMahal can set the |
|
| Enterprise | T1129 | 共享模块 |
TajMahal has the ability to inject the |
|
| Enterprise | T1115 | 剪贴板数据 |
TajMahal has the ability to steal data from the clipboard of an infected host.[1] |
|
| Enterprise | T1120 | 外围设备发现 |
TajMahal has the ability to identify connected Apple devices.[1] |
|
| Enterprise | T1113 | 屏幕捕获 |
TajMahal has the ability to take screenshots on an infected host including capturing content from windows of instant messaging applications.[1] |
|
| Enterprise | T1560 | .002 | 归档收集数据: Archive via Library |
TajMahal has the ability to use the open source libraries XZip/Xunzip and zlib to compress files.[1] |
| Enterprise | T1083 | 文件和目录发现 |
TajMahal has the ability to index files from drives, user profiles, and removable drives.[1] |
|
| Enterprise | T1027 | 混淆文件或信息 |
TajMahal has used an encrypted Virtual File System to store plugins.[1] |
|
| Enterprise | T1539 | 窃取Web会话Cookie |
TajMahal has the ability to steal web session cookies from Internet Explorer, Netscape Navigator, FireFox and RealNetworks applications.[1] |
|
| Enterprise | T1082 | 系统信息发现 |
TajMahal has the ability to identify hardware information, the computer name, and OS information on an infected host.[1] |
|
| Enterprise | T1124 | 系统时间发现 |
TajMahal has the ability to determine local time on a compromised host.[1] |
|
| Enterprise | T1016 | 系统网络配置发现 |
TajMahal has the ability to identify the MAC address on an infected host.[1] |
|
| Enterprise | T1119 | 自动化收集 |
TajMahal has the ability to index and compress files into a send queue for exfiltration.[1] |
|
| Enterprise | T1020 | 自动化渗出 |
TajMahal has the ability to manage an automated queue of egress files and commands sent to its C2.[1] |
|
| Enterprise | T1125 | 视频捕获 | ||
| Enterprise | T1518 | 软件发现 |
TajMahal has the ability to identify the Internet Explorer (IE) version on an infected host.[1] |
|
| .001 | Security Software Discovery |
TajMahal has the ability to identify which anti-virus products, firewalls, and anti-spyware products are in use.[1] |
||
| Enterprise | T1056 | .001 | 输入捕获: Keylogging |
TajMahal has the ability to capture keystrokes on an infected host.[1] |
| Enterprise | T1057 | 进程发现 |
TajMahal has the ability to identify running processes and associated plugins on an infected host.[1] |
|
| Enterprise | T1055 | .001 | 进程注入: Dynamic-link Library Injection |
TajMahal has the ability to inject DLLs for malicious plugins into running processes.[1] |
| Enterprise | T1041 | 通过C2信道渗出 |
TajMahal has the ability to send collected files over its C2.[1] |
|
| Enterprise | T1123 | 音频捕获 |
TajMahal has the ability to capture VoiceIP application audio on an infected host.[1] |
|