| enterprise | T1110 | Brute Force | - | 
| enterprise | T1110.003 | Password Spraying | Leafminer used a tool called Total SMB BruteForcer to perform internal password spraying. | 
| enterprise | T1059 | Command and Scripting Interpreter | - | 
| enterprise | T1059.007 | JavaScript | Leafminer infected victims using JavaScript code. | 
| enterprise | T1136 | Create Account | - | 
| enterprise | T1136.001 | Local Account | Leafminer used a tool called Imecab to set up a persistent remote access account on the victim machine. | 
| enterprise | T1555 | Credentials from Password Stores | Leafminer used several tools for retrieving login and password information, including LaZagne. | 
| enterprise | T1555.003 | Credentials from Web Browsers | Leafminer used several tools for retrieving login and password information, including LaZagne. | 
| enterprise | T1189 | Drive-by Compromise | Leafminer has infected victims using watering holes. | 
| enterprise | T1114 | Email Collection | - | 
| enterprise | T1114.002 | Remote Email Collection | Leafminer used a tool called MailSniper to search through the Exchange server mailboxes for keywords. | 
| enterprise | T1083 | File and Directory Discovery | Leafminer used a tool called MailSniper to search for files on the desktop and another utility called Sobolsoft to extract attachments from EML files. | 
| enterprise | T1046 | Network Service Discovery | Leafminer scanned network services to search for vulnerabilities in the victim system. | 
| enterprise | T1027 | Obfuscated Files or Information | - | 
| enterprise | T1027.010 | Command Obfuscation | Leafminer obfuscated scripts that were used on victim machines. | 
| enterprise | T1588 | Obtain Capabilities | - | 
| enterprise | T1588.002 | Tool | Leafminer has obtained and used tools such as LaZagne, Mimikatz, PsExec, and MailSniper. | 
| enterprise | T1003 | OS Credential Dumping | - | 
| enterprise | T1003.001 | LSASS Memory | Leafminer used several tools for retrieving login and password information, including LaZagne and Mimikatz. | 
| enterprise | T1003.004 | LSA Secrets | Leafminer used several tools for retrieving login and password information, including LaZagne. | 
| enterprise | T1003.005 | Cached Domain Credentials | Leafminer used several tools for retrieving login and password information, including LaZagne. | 
| enterprise | T1055 | Process Injection | - | 
| enterprise | T1055.013 | Process Doppelgänging | Leafminer has used Process Doppelgänging to evade security software while deploying tools on compromised systems. | 
| enterprise | T1018 | Remote System Discovery | Leafminer used Microsoft’s Sysinternals tools to gather detailed information about remote systems. | 
| enterprise | T1552 | Unsecured Credentials | - | 
| enterprise | T1552.001 | Credentials In Files | Leafminer used several tools for retrieving login and password information, including LaZagne. |