- AR1
- -MT023
Revenge - AR1
Contributor: The ITM Team @ - Section MT023
- AR1
- -MT024
Recognition - AR1
Contributor: The ITM Team @ - Section MT024
- AR3
- -PR028
On-Screen Data Collection - AR3
Contributor: The ITM Team @ - Section PR028
- AR4
- -IF024
Exfiltration via Screen Sharing - AR4
Contributor: The ITM Team @ - Section IF024
- AR2
- -ME027
Unmanaged Credential Storage - AR2
Contributor: The ITM Team @ - Section ME027
- AR2
- -ME028
Delegated Access via Managed Service Providers - AR2
Contributor: The ITM Team @ - Section ME028
- AR4
- -IF026
Denial of Service - AR4
Contributor: The ITM Team @ - Section IF026
- AR5
- -AF026
Log Modification - AR5
Contributor: The ITM Team @ - Section AF026
- AR5
- -AF027
Clear Email Artifacts - AR5
Contributor: The ITM Team @ - Section AF027
- AR2
- -ME003
- -ME003.001
Virtual Machines - AR2
Contributor: The ITM Team @ - Subsection ME003.001