Record summary
A quick snapshot of what this page covers.
ATT&CK object
The broader cybersecurity technique connected to these AI records.
The adversary is trying to run malicious code.
Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.
- ATT&CK ID
- TA0002
- STIX ID
- x-mitre-tactic--4ca45d45-df4d-4613-8980-bac22d278fa5
- Name
- Execution
- Connected AI records
- 1
Connected AI records
AI security records connected to this cybersecurity technique.
AML.TA0005 - Execution
Source
Where this page information comes from.
Original source
Original source links
Open the public records and source datasets used for this page.