{ "type": "bundle", "id": "bundle--04f13b2b-02b6-43da-a87e-346ee1d89873", "spec_version": "2.0", "objects": [ { "type": "attack-pattern", "id": "attack-pattern--94f042ae-3033-4a8d-9ec3-26396533a541", "created": "2020-05-21T17:43:26.506Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "external_references": [ { "source_name": "mitre-ics-attack", "url": "https://attack.mitre.org/techniques/T0870", "external_id": "T0870" } ], "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "modified": "2025-10-24T17:49:07.297Z", "name": "Detect Program State", "description": "Adversaries may seek to gather information about the current state of a program on a PLC. State information reveals information about the program, including whether it's running, halted, stopped, or has generated an exception. This information may be leveraged as a verification of malicious program execution or to determine if a PLC is ready to download a new program.", "kill_chain_phases": [ { "kill_chain_name": "mitre-ics-attack", "phase_name": "collection" } ], "x_mitre_attack_spec_version": "3.2.0", "x_mitre_deprecated": true, "x_mitre_domains": [ "ics-attack" ], "x_mitre_is_subtechnique": false, "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "x_mitre_platforms": [ "Windows", "Field Controller/RTU/PLC/IED" ], "x_mitre_version": "1.0" } ] }