TA0002 Execution

The adversary is trying to run malicious code. Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.

View in MITRE ATT&CK®

ATT&CK Techniques

Technique ID Technique Name Number of Mappings Number of Subtechniques
T1047 Windows Management Instrumentation 29 0
T1129 Shared Modules 8 0
T1053 Scheduled Task/Job 30 5
T1106 Native API 10 0
T1610 Deploy Container 26 0
T1059 Command and Scripting Interpreter 53 11
T1609 Container Administration Command 28 0
T1204 User Execution 44 3
T1072 Software Deployment Tools 52 0
T1559 Inter-Process Communication 30 3
T1203 Exploitation for Client Execution 41 0
T1569 System Services 24 2
T1651 Cloud Administration Command 23 0
T1648 Serverless Execution 16 0