- AR4
 - -IF027
 - -IF027.001
 
Infostealer Deployment - AR4
Contributor: The ITM Team @  - Subsection IF027.001
- AR4
 - -IF027
 - -IF027.002
 
Ransomware Deployment - AR4
Contributor: The ITM Team @  - Subsection IF027.002
- AR4
 - -IF027
 - -IF027.003
 
Keylogger Deployment - AR4
Contributor: The ITM Team @  - Subsection IF027.003
- AR4
 - -IF027
 - -IF027.004
 
Remote Access Tool (RAT) Deployment - AR4
Contributor: The ITM Team @  - Subsection IF027.004
- AR4
 - -IF027
 - -IF027.005
 
Destructive Malware Deployment - AR4
Contributor: The ITM Team @  - Subsection IF027.005
- AR5
 - -AF028
 - -AF028.001
 
Authorized Leave - AR5
Contributor: The ITM Team @  - Subsection AF028.001
- AR5
 - -AF028
 - -AF028.002
 
Unauthorized Leave - AR5
Contributor: The ITM Team @  - Subsection AF028.002
- AR5
 - -AF028
 - -AF028.003
 
Lack of Communication - AR5
Contributor: The ITM Team @  - Subsection AF028.003
- AR5
 - -AF028
 - -AF028.004
 
Powering Off Devices - AR5
Contributor: The ITM Team @  - Subsection AF028.004
- AR5
 - -AF028
 - -AF028.005
 
Connectivity Obstruction - AR5
Contributor: The ITM Team @  - Subsection AF028.005