62 - Cyber Kill Chain - Post Exploitation - Actions on Objectives
The attacker establishes persistent presence on the system, most often installing a backdoor.