TA0042 Resource Development

The adversary is trying to establish resources they can use to support operations. Resource Development consists of techniques that involve adversaries creating, purchasing, or compromising/stealing resources that can be used to support targeting. Such resources include infrastructure, accounts, or capabilities. These resources can be leveraged by the adversary to aid in other phases of the adversary lifecycle, such as using purchased domains to support Command and Control, email accounts for phishing as a part of Initial Access, or stealing code signing certificates to help with Defense Evasion.

View in MITRE ATT&CK®

ATT&CK Techniques

Technique ID Technique Name Number of Mappings Number of Subtechniques
T1583 Acquire Infrastructure 2 7
T1584 Compromise Infrastructure 4 8
T1586 Compromise Accounts 1 3
T1608 Stage Capabilities 1 5
T1585 Establish Accounts 2 3
T1588 Obtain Capabilities 8 7
T1587 Develop Capabilities 5 4