Research visibility gap of security vendors
If an adversary can identify which security tools a victim is using they may be able to identify ways around those tools. 
Tactic: Technical Weakness Identification
DetectionDetectable by Common Defenses (Yes/No/Partial): No
Explanation: Public source external to the defender's organization.
Difficulty for the AdversaryEasy for the Adversary (Yes/No): No
Explanation: Requires in-depth research and potentially other intrusions, requires unbounded amount of work to possibly find a return on investment