Hello!
To answer your question we first need to understand what a Cyber Kill Chain is. A kill chain is defined as a type of structured attack. It follows the pathway of: 
PRE-ATTACK
- Target Idenification : Research on Targets/Harvesting of Emails 
 -  Weaponization : Exploit w/ Backdoor 
 - Delivery : Payload delivered to a target destination (email, usb, etc.)
 
ATTACK
- Explotation : Finds vunerable code
 - Installation : Installation of a remote agent to backdoor through the target
 
POST ATTACK
- Command/Control : Staging of systems/Network
 - Actions : Encryptation/Extraction of Data from the Victim
 
If you follow this process, you can see that the answer is best defined as a planned process of cyberattack !
Hope this helps answer your question.