diff --git a/North Korea/APT/Lazarus/23-10-19/analysis.md b/North Korea/APT/Lazarus/23-10-19/analysis.md
index 2e496a4..6fe9b03 100644
--- a/North Korea/APT/Lazarus/23-10-19/analysis.md
+++ b/North Korea/APT/Lazarus/23-10-19/analysis.md
@@ -901,6 +901,7 @@ function PulsetoC2($rid)
References MITRE ATT&CK Matrix
List of all the references with MITRE ATT&CK Matrix
CES 2020
+
|Enterprise tactics|Technics used|Ref URL|
| :---------------: |:-------------| :------------- |
|Persistence|T1179 - Hooking|https://attack.mitre.org/wiki/Technique/T1179|
@@ -909,14 +910,18 @@ function PulsetoC2($rid)
|Credential Access|T1179 - Hooking|https://attack.mitre.org/wiki/Technique/T1179|
|Discovery|T1010 - Application Window Discovery
T1082 - System Information Discovery
T1124 - System Time Discovery|https://attack.mitre.org/wiki/Technique/T1010
https://attack.mitre.org/wiki/Technique/T1082
https://attack.mitre.org/wiki/Technique/T1124|
|Collection|T1115 - Clipboard Data|https://attack.mitre.org/wiki/Technique/T1115|
+
HAL
+
|Enterprise tactics|Technics used|Ref URL|
| :---------------: |:-------------| :------------- |
-|Execution|Rundll32|https://attack.mitre.org/techniques/T1085/|
-|Persistence|Registry Run Keys / Startup Folder|https://attack.mitre.org/techniques/T1060/|
-|Defense Evasion|Rundll32|https://attack.mitre.org/techniques/T1085/|
-|Discovery|Query Registry|https://attack.mitre.org/techniques/T1012/|
+|Execution|Rundll32|https://attack.mitre.org/techniques/T1085|
+|Persistence|Registry Run Keys / Startup Folder|https://attack.mitre.org/techniques/T1060|
+|Defense Evasion|Rundll32|https://attack.mitre.org/techniques/T1085|
+|Discovery|Query Registry|https://attack.mitre.org/techniques/T1012|
+
Powershell backdoor
+
|Enterprise tactics|Technics used|Ref URL|
| :---------------: |:-------------| :------------- |
|Execution|Scripting
PowerShell|https://attack.mitre.org/techniques/T1064/
https://attack.mitre.org/techniques/T1086/|
@@ -927,6 +932,7 @@ function PulsetoC2($rid)
|Exfiltration|Data Encrypted|https://attack.mitre.org/techniques/T1022/|
MacOS backdoor
+
|Enterprise tactics|Technics used|Ref URL|
| :---------------: |:-------------| :------------- |
|Execution|Scripting|https://attack.mitre.org/techniques/T1064/|
@@ -937,6 +943,7 @@ function PulsetoC2($rid)
|Exfiltration|Data Encrypted|https://attack.mitre.org/techniques/T1022/|
DTrack
+
|Enterprise tactics|Technics used|Ref URL|
| :---------------: |:-------------| :------------- |
|Execution|Command-Line Interface|https://attack.mitre.org/techniques/T1059/|