| System Information Discovery - T1082 (354a7f88-63fb-41b5-a801-ce3b377b36f1) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | Data from Cloud Storage - T1530 (3298ce88-1628-43b1-87d9-0b5336b193d7) | Attack Pattern | 1 | 
| APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | Asymmetric Cryptography - T1573.002 (bf176076-b789-408e-8cba-7275e81c0ada) | Attack Pattern | 1 | 
| Domains - T1583.001 (40f5caa0-4cb7-4117-89fc-d421bb493df3) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | Boot or Logon Autostart Execution - T1547 (1ecb2399-e8ba-4f6b-8ba7-5c27d49405cf) | Attack Pattern | 1 | 
| Windows Management Instrumentation - T1047 (01a5a209-b94c-450b-b7f9-946497d91055) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Security Software Discovery - T1518.001 (cba37adb-d6fb-4610-b069-dd04c0643384) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Virtual Private Server - T1583.003 (79da0971-3147-4af6-a4f5-e8cd447cd795) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Indicator Removal - T1070 (799ace7f-e227-4411-baa0-8868704f2a69) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Scheduled Task - T1053.005 (005a06c6-14bf-4118-afa0-ebcd8aebb0c9) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Credentials from Web Browsers - T1555.003 (58a3e6aa-4453-4cc8-a51f-4befe80b31a8) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Keylogging - T1056.001 (09a60ea3-a8d1-4ae5-976e-5783248b72a4) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Input Capture - T1056 (bb5a00de-e086-4859-a231-fa793f6797e2) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Email Accounts - T1585.002 (65013dd2-bc61-43e3-afb5-a14c4fa7437a) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Web Service - T1102 (830c9528-df21-472c-8c14-a036bf17d665) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Tool - T1588.002 (a2fdce72-04b2-409a-ac10-cc1695f4fce0) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Multi-Factor Authentication Interception - T1111 (dd43c543-bb85-4a6f-aa6e-160d90d06a49) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| NICECURL - S1192 (0659f55c-3b68-4e5d-8071-12ded6684731) | Malware | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Spearphishing Link - T1566.002 (2b742742-28c3-4e1b-bab7-8350d6300fa7) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Web Protocols - T1071.001 (df8b2a25-8bdf-4856-953c-a04372b1c161) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Modify Registry - T1112 (57340c81-c025-4189-8fa0-fc7ede51bae4) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Visual Basic - T1059.005 (dfd7cc1d-e1d8-4394-a198-97c4cab8aa67) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | Screen Capture - T1113 (0259baeb-9f63-4c69-bf10-eb038c390688) | Attack Pattern | 1 | 
| Steal Web Session Cookie - T1539 (10ffac09-e42d-4f56-ab20-db94c67d76ff) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | TAMECAT - S1193 (12fdf05a-4bd1-4f45-9cde-d3af35f82db1) | Malware | 1 | 
| Impersonation - T1656 (c9e0c59e-162e-40a4-b8b1-78fab4329ada) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Match Legitimate Resource Name or Location - T1036.005 (1c4e5d32-1fe9-4116-9d9d-59e3925bd6a2) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Standard Encoding - T1132.001 (04fd5427-79c7-44ea-ae13-11b24778ff1c) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| System Network Configuration Discovery - T1016 (707399d6-ab3e-4963-9315-d9d3818cd6a0) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Clear Mailbox Data - T1070.008 (438c967d-3996-4870-bfc2-3954752a1927) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Upload Malware - T1608.001 (3ee16395-03f0-4690-a32e-69ce9ada0f9e) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Local Account - T1087.001 (25659dd6-ea12-45c4-97e6-381e3e4b593e) | Attack Pattern | APT42 - G1044 (c0291346-defe-48d7-9542-9e074ba1bdfb) | Intrusion Set | 1 | 
| Encrypted Channel - T1573 (b8902400-e6c5-4ba2-95aa-2d35b442b118) | Attack Pattern | Asymmetric Cryptography - T1573.002 (bf176076-b789-408e-8cba-7275e81c0ada) | Attack Pattern | 2 | 
| Domains - T1583.001 (40f5caa0-4cb7-4117-89fc-d421bb493df3) | Attack Pattern | Acquire Infrastructure - T1583 (0458aab9-ad42-4eac-9e22-706a95bafee2) | Attack Pattern | 2 | 
| Software Discovery - T1518 (e3b6daca-e963-4a69-aee6-ed4fd653ad58) | Attack Pattern | Security Software Discovery - T1518.001 (cba37adb-d6fb-4610-b069-dd04c0643384) | Attack Pattern | 2 | 
| Virtual Private Server - T1583.003 (79da0971-3147-4af6-a4f5-e8cd447cd795) | Attack Pattern | Acquire Infrastructure - T1583 (0458aab9-ad42-4eac-9e22-706a95bafee2) | Attack Pattern | 2 | 
| Scheduled Task - T1053.005 (005a06c6-14bf-4118-afa0-ebcd8aebb0c9) | Attack Pattern | Scheduled Task/Job - T1053 (35dd844a-b219-4e2b-a6bb-efa9a75995a9) | Attack Pattern | 2 | 
| Credentials from Password Stores - T1555 (3fc9b85a-2862-4363-a64d-d692e3ffbee0) | Attack Pattern | Credentials from Web Browsers - T1555.003 (58a3e6aa-4453-4cc8-a51f-4befe80b31a8) | Attack Pattern | 2 | 
| Keylogging - T1056.001 (09a60ea3-a8d1-4ae5-976e-5783248b72a4) | Attack Pattern | Input Capture - T1056 (bb5a00de-e086-4859-a231-fa793f6797e2) | Attack Pattern | 2 | 
| Establish Accounts - T1585 (cdfc5f0a-9bb9-4352-b896-553cfa2d8fd8) | Attack Pattern | Email Accounts - T1585.002 (65013dd2-bc61-43e3-afb5-a14c4fa7437a) | Attack Pattern | 2 | 
| Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) | Attack Pattern | PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) | Attack Pattern | 2 | 
| Obtain Capabilities - T1588 (ce0687a0-e692-4b77-964a-0784a8e54ff1) | Attack Pattern | Tool - T1588.002 (a2fdce72-04b2-409a-ac10-cc1695f4fce0) | Attack Pattern | 2 | 
| Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) | Attack Pattern | NICECURL - S1192 (0659f55c-3b68-4e5d-8071-12ded6684731) | Malware | 2 | 
| Web Protocols - T1071.001 (df8b2a25-8bdf-4856-953c-a04372b1c161) | Attack Pattern | NICECURL - S1192 (0659f55c-3b68-4e5d-8071-12ded6684731) | Malware | 2 | 
| Ingress Tool Transfer - T1105 (e6919abc-99f9-4c6c-95a5-14761e7b2add) | Attack Pattern | NICECURL - S1192 (0659f55c-3b68-4e5d-8071-12ded6684731) | Malware | 2 | 
| NICECURL - S1192 (0659f55c-3b68-4e5d-8071-12ded6684731) | Malware | Asymmetric Cryptography - T1573.002 (bf176076-b789-408e-8cba-7275e81c0ada) | Attack Pattern | 2 | 
| NICECURL - S1192 (0659f55c-3b68-4e5d-8071-12ded6684731) | Malware | File Deletion - T1070.004 (d63a3fb8-9452-4e9d-a60a-54be68d5998c) | Attack Pattern | 2 | 
| Spearphishing Link - T1566.002 (2b742742-28c3-4e1b-bab7-8350d6300fa7) | Attack Pattern | Phishing - T1566 (a62a8db3-f23a-4d8f-afd6-9dbc77e7813b) | Attack Pattern | 2 | 
| Web Protocols - T1071.001 (df8b2a25-8bdf-4856-953c-a04372b1c161) | Attack Pattern | Application Layer Protocol - T1071 (355be19c-ffc9-46d5-8d50-d6a036c675b6) | Attack Pattern | 2 | 
| Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) | Attack Pattern | Visual Basic - T1059.005 (dfd7cc1d-e1d8-4394-a198-97c4cab8aa67) | Attack Pattern | 2 | 
| Windows Management Instrumentation - T1047 (01a5a209-b94c-450b-b7f9-946497d91055) | Attack Pattern | TAMECAT - S1193 (12fdf05a-4bd1-4f45-9cde-d3af35f82db1) | Malware | 2 | 
| PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) | Attack Pattern | TAMECAT - S1193 (12fdf05a-4bd1-4f45-9cde-d3af35f82db1) | Malware | 2 | 
| Security Software Discovery - T1518.001 (cba37adb-d6fb-4610-b069-dd04c0643384) | Attack Pattern | TAMECAT - S1193 (12fdf05a-4bd1-4f45-9cde-d3af35f82db1) | Malware | 2 | 
| Standard Encoding - T1132.001 (04fd5427-79c7-44ea-ae13-11b24778ff1c) | Attack Pattern | TAMECAT - S1193 (12fdf05a-4bd1-4f45-9cde-d3af35f82db1) | Malware | 2 | 
| Windows Command Shell - T1059.003 (d1fcf083-a721-4223-aedf-bf8960798d62) | Attack Pattern | TAMECAT - S1193 (12fdf05a-4bd1-4f45-9cde-d3af35f82db1) | Malware | 2 | 
| Web Protocols - T1071.001 (df8b2a25-8bdf-4856-953c-a04372b1c161) | Attack Pattern | TAMECAT - S1193 (12fdf05a-4bd1-4f45-9cde-d3af35f82db1) | Malware | 2 | 
| Ingress Tool Transfer - T1105 (e6919abc-99f9-4c6c-95a5-14761e7b2add) | Attack Pattern | TAMECAT - S1193 (12fdf05a-4bd1-4f45-9cde-d3af35f82db1) | Malware | 2 | 
| Symmetric Cryptography - T1573.001 (24bfaeba-cb0d-4525-b3dc-507c77ecec41) | Attack Pattern | TAMECAT - S1193 (12fdf05a-4bd1-4f45-9cde-d3af35f82db1) | Malware | 2 | 
| Visual Basic - T1059.005 (dfd7cc1d-e1d8-4394-a198-97c4cab8aa67) | Attack Pattern | TAMECAT - S1193 (12fdf05a-4bd1-4f45-9cde-d3af35f82db1) | Malware | 2 | 
| Masquerading - T1036 (42e8de7b-37b2-4258-905a-6897815e58e0) | Attack Pattern | Match Legitimate Resource Name or Location - T1036.005 (1c4e5d32-1fe9-4116-9d9d-59e3925bd6a2) | Attack Pattern | 2 | 
| Data Encoding - T1132 (cc7b8c4e-9be0-47ca-b0bb-83915ec3ee2f) | Attack Pattern | Standard Encoding - T1132.001 (04fd5427-79c7-44ea-ae13-11b24778ff1c) | Attack Pattern | 2 | 
| Indicator Removal - T1070 (799ace7f-e227-4411-baa0-8868704f2a69) | Attack Pattern | Clear Mailbox Data - T1070.008 (438c967d-3996-4870-bfc2-3954752a1927) | Attack Pattern | 2 | 
| Stage Capabilities - T1608 (84771bc3-f6a0-403e-b144-01af70e5fda0) | Attack Pattern | Upload Malware - T1608.001 (3ee16395-03f0-4690-a32e-69ce9ada0f9e) | Attack Pattern | 2 | 
| Local Account - T1087.001 (25659dd6-ea12-45c4-97e6-381e3e4b593e) | Attack Pattern | Account Discovery - T1087 (72b74d71-8169-42aa-92e0-e7b04b9f5a08) | Attack Pattern | 2 | 
| Indicator Removal - T1070 (799ace7f-e227-4411-baa0-8868704f2a69) | Attack Pattern | File Deletion - T1070.004 (d63a3fb8-9452-4e9d-a60a-54be68d5998c) | Attack Pattern | 3 | 
| Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) | Attack Pattern | Windows Command Shell - T1059.003 (d1fcf083-a721-4223-aedf-bf8960798d62) | Attack Pattern | 3 | 
| Encrypted Channel - T1573 (b8902400-e6c5-4ba2-95aa-2d35b442b118) | Attack Pattern | Symmetric Cryptography - T1573.001 (24bfaeba-cb0d-4525-b3dc-507c77ecec41) | Attack Pattern | 3 |