The Targeted Attack Lifecycle is Mandiant’s interpretation of the attack lifecycle, which summarizes the stages of a red team engagement that offer insights of defensible areas to blue teamers. The stages of a targeted attack lifecycle are as follows:

  1. Initial reconnaissance: Investigate the target and develop method of intrusion.
  2. Initial compromise: Exploit target(s).
  3. Establish foothold: Maintain control access to exploited system through persistent backdoors.
  4. Escalate privileges: Obtain higher privileges by exploiting vulnerabilities and misconfigurations.
  5. Internal reconnaissance: Investigate target’s internal systems.
  6. Move laterally: Compromise additional systems with the high-privilege account obtained earlier.
  7. Maintain presence: Maintain high-privilege access to domains and systems.
  8. Complete mission: Complete mission objective.