Microsoft’s interpretation of the attack lifecycle with time estimates. See diagram below: