test_scratch / cti-ATT-CK-v13.1 /enterprise-attack /x-mitre-tactic /x-mitre-tactic--d679bca2-e57d-4935-8650-8031c87a4400.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
1.83 kB
{
"type": "bundle",
"id": "bundle--c1efb457-1bd5-4c78-87e8-774218d8c3ca",
"spec_version": "2.0",
"objects": [
{
"x_mitre_domains": [
"enterprise-attack"
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"id": "x-mitre-tactic--d679bca2-e57d-4935-8650-8031c87a4400",
"type": "x-mitre-tactic",
"created": "2020-09-30T16:11:59.650Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"external_references": [
{
"external_id": "TA0042",
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/tactics/TA0042"
}
],
"modified": "2020-09-30T16:31:36.322Z",
"name": "Resource Development",
"description": "The adversary is trying to establish resources they can use to support operations.\n\nResource Development consists of techniques that involve adversaries creating, purchasing, or compromising/stealing resources that can be used to support targeting. Such resources include infrastructure, accounts, or capabilities. These resources can be leveraged by the adversary to aid in other phases of the adversary lifecycle, such as using purchased domains to support Command and Control, email accounts for phishing as a part of Initial Access, or stealing code signing certificates to help with Defense Evasion.",
"x_mitre_version": "1.0",
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_shortname": "resource-development"
}
]
}