value_chain.development.variety.Bot
|
A small program that can be distributed, installed, and controlled en mass.
| related-to |
T1583.005
|
Acquire Infrastructure: Botnet
|
value_chain.development.variety.Website
|
Development of any full website controlled by the attacker
| related-to |
T1583.006
|
Acquire Infrastructure: Web Services
|
value_chain.development.variety.Persona
|
A fake representation of a person, such as fake social media profiles
| related-to |
T1585
|
Establish Accounts
|
value_chain.development.variety.Persona
|
A fake representation of a person, such as fake social media profiles
| related-to |
T1585.001
|
Establish Accounts: Social Media Accounts
|
value_chain.development.variety.Persona
|
A fake representation of a person, such as fake social media profiles
| related-to |
T1585.002
|
Establish Accounts: Email Account
|
value_chain.development.variety.Unknown
|
Nothing is known about the need for or type of development investment other than it was present.
| related-to |
T1587
|
Develop Capabilities
|
value_chain.development.variety.Bot
|
A small program that can be distributed, installed, and controlled en mass.
| related-to |
T1587.001
|
Develop Capabilities: Malware
|
value_chain.development.variety.Payload
|
The portion a program that causes a negative effect.
| related-to |
T1587.001
|
Develop Capabilities: Malware
|
value_chain.development.variety.Ransomware
|
Ransomware (encrypt or seize stored data)
| related-to |
T1587.001
|
Develop Capabilities: Malware
|
value_chain.development.variety.Trojan
|
A program which masquerades as another program to get a target to execute malicious content
| related-to |
T1587.001
|
Develop Capabilities: Malware
|
value_chain.development.variety.Other
|
The variety of development required is known, but is not listed.
| related-to |
T1587.002
|
Develop Capabilities: Code Signing Certificates
|
value_chain.development.variety.Other
|
The variety of development required is known, but is not listed.
| related-to |
T1587.003
|
Develop Capabilities: Digital Certificates
|
value_chain.development.variety.Exploit
|
Code to exploit a vulnerability, including web injects.
| related-to |
T1587.004
|
Develop Capabilities: Exploits
|
value_chain.development.variety.Exploit Kits
|
Code sets capable of selecting and trying multiple exploits against a target.
| related-to |
T1587.004
|
Develop Capabilities: Exploits
|
value_chain.development.variety.Unknown
|
Nothing is known about the need for or type of development investment other than it was present.
| related-to |
T1588
|
Obtain Capabilities
|
value_chain.development.variety.Bot
|
A small program that can be distributed, installed, and controlled en mass.
| related-to |
T1588.001
|
Obtain Capabilities: Malware
|
value_chain.development.variety.Payload
|
The portion a program that causes a negative effect.
| related-to |
T1588.001
|
Obtain Capabilities: Malware
|
value_chain.development.variety.Ransomware
|
Ransomware (encrypt or seize stored data)
| related-to |
T1588.001
|
Obtain Capabilities: Malware
|
value_chain.development.variety.Trojan
|
A program which masquerades as another program to get a target to execute malicious content
| related-to |
T1588.001
|
Obtain Capabilities: Malware
|
value_chain.development.variety.Other
|
The variety of development required is known, but is not listed.
| related-to |
T1588.003
|
Obtain Capabilities: Code Signing Certificates
|
value_chain.development.variety.Other
|
The variety of development required is known, but is not listed.
| related-to |
T1588.004
|
Obtain Capabilities: Digital Certificates
|
value_chain.development.variety.Exploit
|
Code to exploit a vulnerability, including web injects.
| related-to |
T1588.005
|
Obtain Capabilities: Exploits
|
value_chain.development.variety.Exploit Kits
|
Code sets capable of selecting and trying multiple exploits against a target.
| related-to |
T1588.005
|
Obtain Capabilities: Exploits
|