During a post-breach analysis, an analyst identifies that the adversary used a PowerShell script to establish a reverse shell, allowing them to remotely access and control the compromised system. Which phase of the MITRE ATT&CK framework is the identified action MOST closely associated with?
Command and Control
|Incident Response and Management
|Reporting and Communication