test_scratch / cti-ATT-CK-v13.1 /enterprise-attack /x-mitre-tactic /x-mitre-tactic--5bc1d813-693e-4823-9961-abf9af4b0e92.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
1.64 kB
{
"type": "bundle",
"id": "bundle--028714d1-6071-455a-9b4b-2df53d132651",
"spec_version": "2.0",
"objects": [
{
"x_mitre_domains": [
"enterprise-attack"
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"id": "x-mitre-tactic--5bc1d813-693e-4823-9961-abf9af4b0e92",
"type": "x-mitre-tactic",
"created": "2018-10-17T00:14:20.652Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"external_references": [
{
"external_id": "TA0003",
"url": "https://attack.mitre.org/tactics/TA0003",
"source_name": "mitre-attack"
}
],
"modified": "2019-07-19T17:42:33.899Z",
"name": "Persistence",
"description": "The adversary is trying to maintain their foothold.\n\nPersistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code. ",
"x_mitre_version": "1.0",
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_shortname": "persistence"
}
]
}