Adversaries may match or approximate the name or location of legitimate files or resources when naming/placing them.

Tactics
TA0005

Sub-technique of
T1036


See: MITRE ATT&CK