Trusted Design

TA0042 - Resource Development

戦術「Resource Development」に関連する攻撃手法(Technique)の一覧です。

Technique ID Name Description
T1583 Acquire Infrastructure Adversaries may buy, lease, rent, or obtain infrastructure that can be used during targeting. A wide variety of infrastr…
T1583.001 Domains Adversaries may acquire domains that can be used during targeting. Domain names are the human readable names used to rep…
T1583.002 DNS Server Adversaries may set up their own Domain Name System (DNS) servers that can be used during targeting. During post-comprom…
T1583.003 Virtual Private Server Adversaries may rent Virtual Private Servers (VPSs) that can be used during targeting. There exist a variety of cloud se…
T1583.004 Server Adversaries may buy, lease, rent, or obtain physical servers that can be used during targeting. Use of servers allows an…
T1583.005 Botnet Adversaries may buy, lease, or rent a network of compromised systems that can be used during targeting. A botnet is a ne…
T1583.006 Web Services Adversaries may register for web services that can be used during targeting. A variety of popular websites exist for adv…
T1583.007 Serverless Adversaries may purchase and configure serverless cloud infrastructure, such as Cloudflare Workers, AWS Lambda functions…
T1583.008 Malvertising Adversaries may purchase online advertisements that can be abused to distribute malware to victims. Ads can be purchased…
T1584 Compromise Infrastructure Adversaries may compromise third-party infrastructure that can be used during targeting. Infrastructure solutions includ…
T1584.001 Domains Adversaries may hijack domains and/or subdomains that can be used during targeting. Domain registration hijacking is the…
T1584.002 DNS Server Adversaries may compromise third-party DNS servers that can be used during targeting. During post-compromise activity, a…
T1584.003 Virtual Private Server Adversaries may compromise third-party Virtual Private Servers (VPSs) that can be used during targeting. There exist a v…
T1584.004 Server Adversaries may compromise third-party servers that can be used during targeting. Use of servers allows an adversary to …
T1584.005 Botnet Adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting. A botnet is …
T1584.006 Web Services Adversaries may compromise access to third-party web services that can be used during targeting. A variety of popular we…
T1584.007 Serverless Adversaries may compromise serverless cloud infrastructure, such as Cloudflare Workers, AWS Lambda functions, or Google …
T1584.008 Network Devices Adversaries may compromise third-party network devices that can be used during targeting. Network devices, such as small…
T1585 Establish Accounts Adversaries may create and cultivate accounts with services that can be used during targeting. Adversaries can create ac…
T1585.001 Social Media Accounts Adversaries may create and cultivate social media accounts that can be used during targeting. Adversaries can create soc…
T1585.002 Email Accounts Adversaries may create email accounts that can be used during targeting. Adversaries can use accounts created with email…
T1585.003 Cloud Accounts Adversaries may create accounts with cloud providers that can be used during targeting. Adversaries can use cloud accoun…
T1586 Compromise Accounts Adversaries may compromise accounts with services that can be used during targeting. For operations incorporating social…
T1586.001 Social Media Accounts Adversaries may compromise social media accounts that can be used during targeting. For operations incorporating social …
T1586.002 Email Accounts Adversaries may compromise email accounts that can be used during targeting. Adversaries can use compromised email accou…
T1586.003 Cloud Accounts Adversaries may compromise cloud accounts that can be used during targeting. Adversaries can use compromised cloud accou…
T1587 Develop Capabilities Adversaries may build capabilities that can be used during targeting. Rather than purchasing, freely downloading, or ste…
T1587.001 Malware Adversaries may develop malware and malware components that can be used during targeting. Building malicious software ca…
T1587.002 Code Signing Certificates Adversaries may create self-signed code signing certificates that can be used during targeting. Code signing is the proc…
T1587.003 Digital Certificates Adversaries may create self-signed SSL/TLS certificates that can be used during targeting. SSL/TLS certificates are desi…
T1587.004 Exploits Adversaries may develop exploits that can be used during targeting. An exploit takes advantage of a bug or vulnerability…
T1588 Obtain Capabilities Adversaries may buy and/or steal capabilities that can be used during targeting. Rather than developing their own capabi…
T1588.001 Malware Adversaries may buy, steal, or download malware that can be used during targeting. Malicious software can include payloa…
T1588.002 Tool Adversaries may buy, steal, or download software tools that can be used during targeting. Tools can be open or closed so…
T1588.003 Code Signing Certificates Adversaries may buy and/or steal code signing certificates that can be used during targeting. Code signing is the proces…
T1588.004 Digital Certificates Adversaries may buy and/or steal SSL/TLS certificates that can be used during targeting. SSL/TLS certificates are design…
T1588.005 Exploits Adversaries may buy, steal, or download exploits that can be used during targeting. An exploit takes advantage of a bug …
T1588.006 Vulnerabilities Adversaries may acquire information about vulnerabilities that can be used during targeting. A vulnerability is a weakne…
T1588.007 Artificial Intelligence Adversaries may obtain access to generative artificial intelligence tools, such as large language models (LLMs), to aid …
T1608 Stage Capabilities Adversaries may upload, install, or otherwise set up capabilities that can be used during targeting. To support their op…
T1608.001 Upload Malware Adversaries may upload malware to third-party or adversary controlled infrastructure to make it accessible during target…
T1608.002 Upload Tool Adversaries may upload tools to third-party or adversary controlled infrastructure to make it accessible during targetin…
T1608.003 Install Digital Certificate Adversaries may install SSL/TLS certificates that can be used during targeting. SSL/TLS certificates are files that can …
T1608.004 Drive-by Target Adversaries may prepare an operational environment to infect systems that visit a website over the normal course of brow…
T1608.005 Link Target Adversaries may put in place resources that are referenced by a link that can be used during targeting. An adversary may…
T1608.006 SEO Poisoning Adversaries may poison mechanisms that influence search engine optimization (SEO) to further lure staged capabilities to…
T1650 Acquire Access Adversaries may purchase or otherwise acquire an existing access to a target system or network. A variety of online serv…
T1683 Generate Content Adversaries may create or generate content to support targeting and operations. This content may be used to establish pe…
T1683.001 Written Content Adversaries may create or tailor written materials to support targeting and malicious operations. Content may include ph…
T1683.002 Audio-Visual Content Adversaries may create or manipulate audio, image, and video content to support targeting and malicious operations. Adve…