The Darwinistic nature of the cyber threat landscape ensures advancements in defender capabilities will be reciprocated by the refinement of threat actor tools and tactics, techniques and procedures (TTPs). The manifestation of these advancements in the underground allows us to monitor and analyze emerging threats early in their