test_scratch / cti-ATT-CK-v13.1 /ics-attack /x-mitre-tactic /x-mitre-tactic--78f1d2ae-a579-44c4-8fc5-3e1775c73fac.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
1.8 kB
{
"type": "bundle",
"id": "bundle--263ad2ee-d011-486d-b84a-e02c2c6b8eb5",
"spec_version": "2.0",
"objects": [
{
"modified": "2023-03-09T18:38:51.471Z",
"name": "Persistence",
"description": "The adversary is trying to maintain their foothold in your ICS environment.\n\nPersistence consists of techniques that adversaries use to maintain access to ICS systems and devices across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that allow them to secure their ongoing activity and keep their foothold on systems. This may include replacing or hijacking legitimate code, firmware, and other project files, or adding startup code and downloading programs onto devices.",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_domains": [
"ics-attack"
],
"x_mitre_version": "1.0",
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_shortname": "persistence",
"type": "x-mitre-tactic",
"id": "x-mitre-tactic--78f1d2ae-a579-44c4-8fc5-3e1775c73fac",
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/tactics/TA0110",
"external_id": "TA0110"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
]
}
]
}