| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1119 | Automated Collection | PACEMAKER can enter a loop to read | |
| Enterprise | T1059 | .004 | Command and Scripting Interpreter:Unix Shell | |
| Enterprise | T1074 | .001 | Data Staged:Local Data Staging | PACEMAKER has written extracted data to |
| Enterprise | T1083 | File and Directory Discovery | PACEMAKER can parse | |
| Enterprise | T1003 | .007 | OS Credential Dumping:Proc Filesystem | PACEMAKER has the ability to extract credentials from OS memory.[1] |
| Enterprise | T1055 | .008 | Process Injection:Ptrace System Calls | PACEMAKER can use PTRACE to attach to a targeted process to read process memory.[1] |