Adversaries may establish persistence and/or elevate privileges using system mechanisms that trigger execution based on specific events.
Sub-techniques
T1546.001 T1546.002 T1546.003 T1546.004 T1546.005 T1546.006 T1546.007 T1546.008 T1546.009 T1546.010 T1546.011 T1546.012 T1546.013 T1546.014 T1546.015 T1546.016
See: MITRE ATT&CK
