- AR4
- -IF022
- -IF022.004
Payment Card Data Leakage - AR4
Contributor: The ITM Team @ - Subsection IF022.004
- AR3
- -PR024
- -PR024.001
Privilege Escalation through Kerberoasting - AR3
Contributor: The ITM Team @ - Subsection PR024.001
- AR1
- -MT015
- -MT015.001
Opportunism - AR1
Contributor: The ITM Team @ - Subsection MT015.001
- AR4
- -IF009
- -IF009.005
Anti-Sleep Software - AR4
Contributor: The ITM Team @ - Subsection IF009.005
- AR4
- -IF001
- -IF001.006
Exfiltration via Generative AI Platform - AR4
Contributor: The ITM Team @ - Subsection IF001.006
- AR4
- -IF009
- -IF009.006
Installing Crypto Mining Software - AR4
Contributor: The ITM Team @ - Subsection IF009.006
- AR4
- -IF014
- -IF014.007
Creation of Cloud Resources - AR4
Contributor: The ITM Team @ - Subsection IF014.007
- AR3
- -PR026
- -PR026.001
Remote Desktop (RDP) Access on Windows Systems - AR3
Contributor: The ITM Team @ - Subsection PR026.001
- AR3
- -PR027
- -PR027.002
Impersonation via Collaboration and Communication Tools - AR3
Contributor: The ITM Team @ - Subsection PR027.002
- AR3
- -PR027
- -PR027.003
Physical Impersonation Through Dress, Uniforms, or Appearance - AR3
Contributor: The ITM Team @ - Subsection PR027.003