- AR5
 - -AF008
 - -AF008.001
 
Image Steganography - AR5
Contributor: The ITM Team @  - Subsection AF008.001
- AR4
 - -IF022
 - -IF022.004
 
Payment Card Data Leakage - AR4
Contributor: The ITM Team @  - Subsection IF022.004
- AR3
 - -PR024
 - -PR024.001
 
Privilege Escalation through Kerberoasting - AR3
Contributor: The ITM Team @  - Subsection PR024.001
- AR1
 - -MT015
 - -MT015.001
 
Opportunism - AR1
Contributor: The ITM Team @  - Subsection MT015.001
- AR4
 - -IF009
 - -IF009.005
 
Anti-Sleep Software - AR4
Contributor: The ITM Team @  - Subsection IF009.005
- AR4
 - -IF001
 - -IF001.006
 
Exfiltration via Generative AI Platform - AR4
Contributor: The ITM Team @  - Subsection IF001.006
- AR4
 - -IF009
 - -IF009.006
 
Installing Crypto Mining Software - AR4
Contributor: The ITM Team @  - Subsection IF009.006
- AR4
 - -IF014
 - -IF014.007
 
Creation of Cloud Resources - AR4
Contributor: The ITM Team @  - Subsection IF014.007
- AR3
 - -PR026
 - -PR026.001
 
Remote Desktop (RDP) Access on Windows Systems - AR3
Contributor: The ITM Team @  - Subsection PR026.001
- AR3
 - -PR027
 - -PR027.002
 
Impersonation via Collaboration and Communication Tools - AR3
Contributor: The ITM Team @  - Subsection PR027.002