Our knowledge on the implants (software in the MITRE ATT&CK language) derives from an extensive reverse-engineering activity on sample spotted on the wild. We reproduce with high fidelity all the different phases of the attack chain against each step of the kill-chain: Loading, Injection, Communication protocols, Obfuscation steps.