- AR4
- -IF027
- -IF027.001
Infostealer Deployment - AR4
Contributor: The ITM Team @ - Subsection IF027.001
- AR4
- -IF027
- -IF027.002
Ransomware Deployment - AR4
Contributor: The ITM Team @ - Subsection IF027.002
- AR4
- -IF027
- -IF027.003
Keylogger Deployment - AR4
Contributor: The ITM Team @ - Subsection IF027.003
- AR4
- -IF027
- -IF027.004
Remote Access Tool (RAT) Deployment - AR4
Contributor: The ITM Team @ - Subsection IF027.004
- AR4
- -IF027
- -IF027.005
Destructive Malware Deployment - AR4
Contributor: The ITM Team @ - Subsection IF027.005
- AR5
- -AF028
- -AF028.001
Authorized Leave - AR5
Contributor: The ITM Team @ - Subsection AF028.001
- AR5
- -AF028
- -AF028.002
Unauthorized Leave - AR5
Contributor: The ITM Team @ - Subsection AF028.002
- AR5
- -AF028
- -AF028.003
Lack of Communication - AR5
Contributor: The ITM Team @ - Subsection AF028.003
- AR5
- -AF028
- -AF028.004
Powering Off Devices - AR5
Contributor: The ITM Team @ - Subsection AF028.004
- AR5
- -AF028
- -AF028.005
Connectivity Obstruction - AR5
Contributor: The ITM Team @ - Subsection AF028.005