A plugin supplying Caldera with TTPs from the Center for Threat Informed Defense (CTID) Adversary Emulation Plans.
Using the Emu plugin with Caldera will enable users to access the adversary profiles contained in the CTID Adversary Emulation Library.
To run Caldera along with the Emu plugin:
- emu
to the list of enabled plugins in conf/local.yml
or conf/default.yml
(if running Caldera in insecure mode)data
folder of the Emu plugin. download_payloads.sh
script to download these binaries to the payloads
directory.Each emulation plan will have an adversary and a set of facts. Please ensure to select the related facts to the adversary when starting an operation.
Because some payloads within the Adversary Emulation Library are encrypted, a Python script is used to automate
the decryption which requires installation of some dependencies. Depending on the host OS, pyminizip
can be installed using the following:
apt-get install zlib1g
brew install zlib
pip3 install -r requirements.txt
See URL for more information regarding pyminizip
: https://github.com/smihica/pyminizip