- AR1
 - -MT012
 - -MT012.002
 
Extortion - AR1
Contributor: The ITM Team @  - Subsection MT012.002
- AR4
 - -IF002
 - -IF002.007
 
Exfiltration via Target Disk Mode - AR4
Contributor: The ITM Team @  - Subsection IF002.007
- AR4
 - -IF002
 - -IF002.008
 
Exfiltration via USB to Mobile Device - AR4
Contributor: The ITM Team @  - Subsection IF002.008
- AR4
 - -IF014
 - -IF014.006
 
Deletion of Other IT Resources - AR4
Contributor: The ITM Team @  - Subsection IF014.006
- AR4
 - -IF002
 - -IF002.009
 
Exfiltration via Disk Media - AR4
Contributor: The ITM Team @  - Subsection IF002.009
- AR4
 - -IF018
 - -IF018.001
 
Exfiltration via AI Chatbot Platform History - AR4
Contributor: The ITM Team @  - Subsection IF018.001
- AR3
 - -PR006
 - -PR006.004
 
Security Enumeration via Network Activity - AR3
Contributor: The ITM Team @  - Subsection PR006.004
- AR5
 - -AF018
 - -AF018.001
 
Endpoint Tripwires - AR5
Contributor: The ITM Team @  - Subsection AF018.001
- AR5
 - -AF018
 - -AF018.003
 
Canary Tokens - AR5
Contributor: The ITM Team @  - Subsection AF018.003
- AR1
 - -MT012
 - -MT012.007
 
Sexual Extortion - AR1
Contributor: The ITM Team @  - Subsection MT012.007