Skip to content

0xSV1/DEATHCON-25-OPTE

Repository files navigation

DEATHCON-25-OPTE

Repository for the DEATHCon 2025 Workshop "Operationzaling Purple Teaming in the Enterprise".

DEATHCon 2025 — Operationzaling Purple Teaming in the Enterprise Workshop Exercises

Exercise goal: Turn TI into a threat emulation plan for a Purple Team Campaign, create and run test cases that you log in VECTR, using your own lab or the provided PurpleCloud fork.


0) Read me first!

  • Don’t run in production. Use a lab tenant/range/local VMs only.
  • Make sure to take and keep notes as you are research threat actors and creating the campaign plan.
  • Clean up cloud resources (terraform destroy, stratus cleanup --all) when you are done to avoid surprise costs.

1) Lab setup (pick one)


2) Pick a relevant threat actor


3) Collect threat intelligience (TI)

  • Find public reports/blogs on the actor/campaigns/tools.
  • Save links + key excerpts (remember to focus on behaviors, not just IOCs).
  • Note: What got them caught? What recurs? What’s hard for them to change?

4) Extract behaviors & map to ATT&CK, Insider Threat Matrix and/or SaaS Attack Matrix

  • Convert your notes into TTPs (technique + sub-technique). Call out any unmapped behaviors too.
  • Optional: build a small Navigator layer that you can add to your plan.
  • Identify threat actor technique dependencies for a realistic chain.

5) Threat Emulation Plan (template)

Create a basic threat emulation using this or your own template.

Preferably you should use whatever documentation platform/Wiki/note taking app you use in your day to day operations. Include screenshots, links and tables where you find it relevant in each section. This adds a lot to your plans, and will make them look a lot better.

# Threat Emulation Plan — <Actor>

## Why now
- Relevance to org / peers
- Hypothesis to prove

## Scope & assets
- Tenant/segments, datasets, endpoints/AVDs
- Users/identities (test users vs realistic Workday -> Entra ID accounts)

## People & approvals
- Lead, Operator(s)
- Stakeholders (SOC, platform owners, TI, SecOps mgmt)
- Change ticket ID(s), window(s), guardrails

## Schedule
- Plan window, execution window, tuning window

## TTPs to emulate
- ATT&CK and Insider Threat Matrix IDs + brief description of each
- Tooling: Atomic/Stratus/Manual/Mythic/Sliver (and why)

## Telemetry targets
- Data components & log sources (host/cloud/identity/email/network)

## Success criteria
- What counts as **alerted** / **prevented**
- Evidence to capture (IDs, artifacts, screenshots, ATTiRe formatted logs)

This is just a (very) basic template to show how you can start documenting campaigns and threat emulation plans. Start out basic and expand and iterate if neccessarry, as you do more purple team assessments.

6) Atomic Red Team

  • Install Invoke-Atomic and the atomics folder (see the official repo).
  • Basic CSV execution logging:
Invoke-AtomicTest T1016 -ExecutionLogPath 'C:\Temp\T1016.csv'
  • ATTiRe JSON execution logs for importing into VECTR:
Invoke-AtomicTest T1053.005 -LoggingModule "Attire-ExecutionLogger" -ExecutionLogPath ".\T1053.005.json"
  • Cleanup (when supported):
Invoke-AtomicTest <TechniqueID> -Cleanup

7) Run your selected emulations

  • Execute your selected TTPs, atomics and/or Stratus techniques (and optional C2).
  • Save artifacts, SIEM/EDR alert IDs, incident IDs and execution logs (CSV/ATTiRe JSON).
  • Keep a short operator log with timestamps for each step.

Preferably document directly in VECTR as you run each test case/emulation.

8) VECTR

See the official documentation at https://docs.vectr.io/user/important-concepts/. These docs covers important VECTR concepts, terminology and the data structure. Docs: https://docs.vectr.io/, Data Import: https://docs.vectr.io/user/data-import/, including ATTiRE.

  • Configure your Environment.
  • Create a new Assessment.
  • Create a new Campaign.
  • Add or create new test cases for your chosen TPPs/atomics.
  • When you have populated VECTR with completed test cases, added blue team observations and proof, play around with the reporting and tracking.

Make sure to add your defense tools, sources, offensive tools and targets to your Environment. Keep in mind that these are specific to each Environment.

About

Repository for the DEATHCon 2025 Workshop "Operationzaling Purple Teaming in the Enterprise".

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published