T1608 - Stage Capabilities

Adversaries may upload, install, or otherwise set up capabilities that can be used during targeting. To support their operations, an adversary may need to take capabilities they developed (Develop Capabilitiesarrow-up-right) or obtained (Obtain Capabilitiesarrow-up-right) and stage them on infrastructure under their control. These capabilities may be staged on infrastructure that was previously purchased/rented by the adversary (Acquire Infrastructurearrow-up-right) or was otherwise compromised by them (Compromise Infrastructurearrow-up-right). Capabilities may also be staged on web services, such as GitHub or Pastebin, or on Platform-as-a-Service (PaaS) offerings that enable users to easily provision applications.

Staging of capabilities can aid the adversary in a number of initial access and post-compromise behaviors, including (but not limited to):

Sub-techniques

ID
Name
Procedure

T1608.001

Staging Malware and Tools on Kali Linux

T1608.002

Staging Malware and Tools on Kali Linux

Last updated