T1059 - Command and Scripting Interpreter
Tactics:
Execution
Execution
Platforms:
ESXi IaaS Identity Provider Linux +4
ESXi IaaS Identity Provider Linux +4
Detection:
Not specified
Not specified
Description:
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and languages provide ways of interacting with computer systems and are a common feature across many different platforms. Most systems come with some built-in command-line interface and scripting capabilities, for example, macOS and Linux distributions include some flavor of [Unix Shell](https://attack.mitre.org/techniques/T1059/004) while Windows installations include the [Windows Command Shell](https://attack.mitre.org/techniques/T1059/003) and [PowerShell](https://attack.mitre.org/techniques/T1059/001).
There are also cross-platform interpreters such as [Python](https://attack.mitre.org/techniques/T1059/006), as well as those commonly associated with client applications such as [JavaScript](https://attack.mitre.org/techniques/T1059/007) and [Visual Basic](https://attack.mitre.org/techniques/T1059/005).
Adversaries may abuse these technologies in various ways as a means of executing arbitrary commands. Commands and scripts can be embedded in [Initial Access](https://attack.mitre.org/tactics/TA0001) payloads delivered to victims as lure documents or as secondary payloads downloaded from an existing C2. Adversaries may also execute commands through interactive terminals/shells, as well as utilize various [Remote Services](https://attack.mitre.org/techniques/T1021) in order to achieve remote Execution.(Citation: Powershell Remote Commands)(Citation: Cisco IOS Software Integrity Assurance - Command History)(Citation: Remote Shell Execution in Python)
There are also cross-platform interpreters such as [Python](https://attack.mitre.org/techniques/T1059/006), as well as those commonly associated with client applications such as [JavaScript](https://attack.mitre.org/techniques/T1059/007) and [Visual Basic](https://attack.mitre.org/techniques/T1059/005).
Adversaries may abuse these technologies in various ways as a means of executing arbitrary commands. Commands and scripts can be embedded in [Initial Access](https://attack.mitre.org/tactics/TA0001) payloads delivered to victims as lure documents or as secondary payloads downloaded from an existing C2. Adversaries may also execute commands through interactive terminals/shells, as well as utilize various [Remote Services](https://attack.mitre.org/techniques/T1021) in order to achieve remote Execution.(Citation: Powershell Remote Commands)(Citation: Cisco IOS Software Integrity Assurance - Command History)(Citation: Remote Shell Execution in Python)
Sub-techniques (13)
Used by Actors (17)
APT19
Nation-state
Nation-state
FIN7
Criminal
Criminal
Stealth Falcon
Nation-state
Nation-state
FIN6
Unknown
Unknown
OilRig
Nation-state
Nation-state
APT32
Nation-state
Nation-state
APT37
Nation-state
Nation-state
MUSTANG PANDA
Nation-state
Nation-state
APT39
Unknown
Unknown
Whitefly
Unknown
Unknown
FIN5
Unknown
Unknown
Fox Kitten
Unknown
Unknown
Winter Vivern
Unknown
Unknown
Dragonfly
Unknown
Unknown
Ke3chang
Unknown
Unknown
Saint Bear
Unknown
Unknown
Windigo
Unknown
Unknown
Malware (20)
NICECURL other
Get2 other
VersaMem other
Zeus Panda other
Matryoshka other
P.A.S. Webshell other
WINERACK other
Bonadan other
Raspberry Robin other
DarkComet other
Bandook other
gh0st RAT other
ZeroCleare other
SpeakUp other
Kessel other
CHOPSTICK other
SLIGHTPULSE other
StarProxy other
FIVEHANDS other
Empire tool
Metadata
| MITRE ID: | T1059 |
| STIX ID: | attack-pattern--7385dfaf-6886-... |
| Platforms: | ESXi, IaaS, Identity Provider, Linux, macOS, Network Devices, Office Suite, Windows |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |