Looks like no one added any tags here yet for you.
First
Reconnaissance - Gather intel
second
Weaponization - build a deliverable payload that includes an exploit and backdoor
Third
Delivery - send the weapon
Fourth
Exploitation - execute the code
Fifth
Installation - malware is installed
sixth
Command and control - a c2 channel is created for remote access
seventh
Actions on objectives - attacker can remotely carry out objectives