Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1435 | Access Calendar Entries | ||
Mobile | T1432 | Access Contact List | ||
Mobile | T1409 | Access Stored Application Data |
FlexiSpy uses a |
|
Mobile | T1418 | Application Discovery | ||
Mobile | T1402 | Broadcast Receivers |
FlexiSpy uses root access to establish reboot hooks to re-install the application from |
|
Mobile | T1429 | Capture Audio |
FlexiSpy can record both incoming and outgoing phone calls, as well as microphone audio.[2] |
|
Mobile | T1512 | Capture Camera | ||
Mobile | T1412 | Capture SMS Messages |
FlexiSpy can intercept SMS and MMS messages as well as monitor messages for keywords.[2][4] |
|
Mobile | T1533 | Data from Local System |
FlexiSpy can monitor device photos and can also access browser history and bookmarks.[4] |
|
Mobile | T1447 | Delete Device Data | ||
Mobile | T1417 | Input Capture |
FlexiSpy can record keystrokes and analyze them for keywords.[4] |
|
Mobile | T1430 | Location Tracking | ||
Mobile | T1400 | Modify System Partition | ||
Mobile | T1507 | Network Information Discovery |
FlexiSpy can collect a list of known Wi-Fi access points.[4] |
|
Mobile | T1406 | Obfuscated Files or Information | ||
Mobile | T1513 | Screen Capture | ||
Mobile | T1508 | Suppress Application Icon |
FlexiSpy is capable of hiding SuperSU's icon if it is installed and visible.[1] FlexiSpy can also hide its own icon to make detection and the uninstallation process more difficult.[4] |
|
Mobile | T1509 | Uncommonly Used Port |
FlexiSpy can communicate with the command and control server over ports 12512 and 12514.[1] |