value_chain.development.variety.Bot |
A small program that can be distributed, installed, and controlled en mass. |
related-to |
T1583.005 |
Acquire Infrastructure: Botnet |
value_chain.development.variety.Website |
Development of any full website controlled by the attacker |
related-to |
T1583.006 |
Acquire Infrastructure: Web Services |
value_chain.development.variety.Unknown |
Nothing is known about the need for or type of development investment other than it was present. |
related-to |
T1587 |
Develop Capabilities |
value_chain.development.variety.Bot |
A small program that can be distributed, installed, and controlled en mass. |
related-to |
T1587.001 |
Develop Capabilities: Malware |
value_chain.development.variety.Payload |
The portion a program that causes a negative effect. |
related-to |
T1587.001 |
Develop Capabilities: Malware |
value_chain.development.variety.Ransomware |
Ransomware (encrypt or seize stored data) |
related-to |
T1587.001 |
Develop Capabilities: Malware |
value_chain.development.variety.Trojan |
A program which masquerades as another program to get a target to execute malicious content |
related-to |
T1587.001 |
Develop Capabilities: Malware |
value_chain.development.variety.Other |
The variety of development required is known, but is not listed. |
related-to |
T1587.002 |
Develop Capabilities: Code Signing Certificates |
value_chain.development.variety.Other |
The variety of development required is known, but is not listed. |
related-to |
T1587.003 |
Develop Capabilities: Digital Certificates |
value_chain.development.variety.Exploit |
Code to exploit a vulnerability, including web injects. |
related-to |
T1587.004 |
Develop Capabilities: Exploits |
value_chain.development.variety.Exploit Kits |
Code sets capable of selecting and trying multiple exploits against a target. |
related-to |
T1587.004 |
Develop Capabilities: Exploits |
value_chain.development.variety.Unknown |
Nothing is known about the need for or type of development investment other than it was present. |
related-to |
T1588 |
Obtain Capabilities |
value_chain.development.variety.Bot |
A small program that can be distributed, installed, and controlled en mass. |
related-to |
T1588.001 |
Obtain Capabilities: Malware |
value_chain.development.variety.Payload |
The portion a program that causes a negative effect. |
related-to |
T1588.001 |
Obtain Capabilities: Malware |
value_chain.development.variety.Ransomware |
Ransomware (encrypt or seize stored data) |
related-to |
T1588.001 |
Obtain Capabilities: Malware |
value_chain.development.variety.Trojan |
A program which masquerades as another program to get a target to execute malicious content |
related-to |
T1588.001 |
Obtain Capabilities: Malware |
value_chain.development.variety.Other |
The variety of development required is known, but is not listed. |
related-to |
T1588.003 |
Obtain Capabilities: Code Signing Certificates |
value_chain.development.variety.Other |
The variety of development required is known, but is not listed. |
related-to |
T1588.004 |
Obtain Capabilities: Digital Certificates |
value_chain.development.variety.Exploit |
Code to exploit a vulnerability, including web injects. |
related-to |
T1588.005 |
Obtain Capabilities: Exploits |
value_chain.development.variety.Exploit Kits |
Code sets capable of selecting and trying multiple exploits against a target. |
related-to |
T1588.005 |
Obtain Capabilities: Exploits |
value_chain.development.variety.Persona |
A fake representation of a person, such as fake social media profiles |
related-to |
T1585 |
Establish Accounts |
value_chain.development.variety.Persona |
A fake representation of a person, such as fake social media profiles |
related-to |
T1585.001 |
Establish Accounts: Social Media Accounts |
value_chain.development.variety.Persona |
A fake representation of a person, such as fake social media profiles |
related-to |
T1585.002 |
Establish Accounts: Email Account |