Home  >  Methodology  >  Round 1  >  Operational Flow

Round 1 Operational Flow


The Operational Flow separated technique execution into sequences we referred to as “Steps”. Organizing our execution into Steps ensured that the detection displayed was correctly associated with the technique that was being tested. Each Step corresponded to an adversary’s intended goal during an operation. We performed 20 Steps in total across two scenarios: 10 Steps corresponded to our first scenario (which used Cobalt Strike), and 10 Steps corresponded to our second scenario (which used Empire). We further divided each Step into Sub-Steps that are denoted by letters (e.g. 1A, 1B, etc.). Those Steps, Sub-Steps, and the corresponding techniques are outlined below.


First Scenario

We used Cobalt Strike, a commercially available red team tool, to execute our emulation for the first scenario.

Step 1 - Initial Compromise

Step 2 - Initial Discovery

Step 3 - Privilege Escalation

Step 4 - Discovery for Lateral Movement

Step 5 - Credential Access

Step 6 - Lateral Movement

Step 7 - Persistence

Step 8 - Collection

Step 9 - Exfiltration

Step 10 - Execution of Persistence


Second Scenario

We used Empire, an open-source red team tool, to execute our emulation for the second scenario.

Step 11 - Initial Compromise

Step 12 - Initial Discovery

Step 13 - Discovery for Lateral Movement

Step 14 - Privilege Escalation

Step 15 - Credential Access

Step 16 - Lateral Movement

Step 17 - Persistence

Step 18 - Collection

Step 19 - Exfiltration

Step 20 - Execution of Persistence