Hello!
To answer your question we first need to understand what a Cyber Kill Chain is. A kill chain is defined as a type of structured attack. It follows the pathway of:
PRE-ATTACK
- Target Idenification : Research on Targets/Harvesting of Emails
- Weaponization : Exploit w/ Backdoor
- Delivery : Payload delivered to a target destination (email, usb, etc.)
ATTACK
- Explotation : Finds vunerable code
- Installation : Installation of a remote agent to backdoor through the target
POST ATTACK
- Command/Control : Staging of systems/Network
- Actions : Encryptation/Extraction of Data from the Victim
If you follow this process, you can see that the answer is best defined as a planned process of cyberattack !
Hope this helps answer your question.