- AR3
 - -PR002
 - -PR002.005
 
Floppy Disk Mounting - AR3
Contributor: The ITM Team @  - Subsection PR002.005
- AR3
 - -PR004
 - -PR004.001
 
Network File Exploration - AR3
Contributor: The ITM Team @  - Subsection PR004.001
- AR3
 - -PR004
 - -PR004.002
 
Collaboration Platform Exploration - AR3
Contributor: The ITM Team @  - Subsection PR004.002
- AR3
 - -PR006
 - -PR006.001
 
Security Enumeration via Windows Registry - AR3
Contributor: The ITM Team @  - Subsection PR006.001
- AR3
 - -PR006
 - -PR006.002
 
Security Enumeration via Running Processes - AR3
Contributor: The ITM Team @  - Subsection PR006.002
- AR3
 - -PR006
 - -PR006.003
 
Security Enumeration via File System - AR3
Contributor: The ITM Team @  - Subsection PR006.003
- AR4
 - -IF001
 - -IF001.001
 
Exfiltration via Cloud Storage - AR4
Contributor: The ITM Team @  - Subsection IF001.001
- AR4
 - -IF001
 - -IF001.002
 
Exfiltration via Code Repository - AR4
Contributor: The ITM Team @  - Subsection IF001.002
- AR4
 - -IF001
 - -IF001.003
 
Exfiltration via Text Storage Sites - AR4
Contributor: The ITM Team @  - Subsection IF001.003
- AR4
 - -IF001
 - -IF001.004
 
Exfiltration via Webhook - AR4
Contributor: The ITM Team @  - Subsection IF001.004