This is a military-inspired term to describe the steps of a malware attack.