T1587 - Develop Capabilities

Tattiche:
Resource Development
Piattaforme:
PRE
Rilevamento:
Not specified
Description:
Adversaries may build capabilities that can be used during targeting. Rather than purchasing, freely downloading, or stealing capabilities, adversaries may develop their own capabilities in-house. This is the process of identifying development requirements and building solutions such as malware, exploits, and self-signed certificates. Adversaries may develop capabilities to support their operations throughout numerous phases of the adversary lifecycle.(Citation: Mandiant APT1)(Citation: Kaspersky Sofacy)(Citation: Bitdefender StrongPity June 2020)(Citation: Talos Promethium June 2020)

As with legitimate development efforts, different skill sets may be required for developing capabilities. The skills needed may be located in-house, or may need to be contracted out. Use of a contractor may be considered an extension of that adversary's development capabilities, provided the adversary plays a role in shaping requirements and maintains a degree of exclusivity to the capability.
Sub-tecniche (4)
ID ATT&CK Azioni
T1587.001 Malware
T1587.002 Code Signing Certificates
T1587.003 Digital Certificates
T1587.004 Exploits
Metadata
MITRE ID: T1587
STIX ID: attack-pattern--edadea33-549c-...
Piattaforme: PRE
Created: 13/01/2026 17:48
Updated: 14/03/2026 16:00