Blog / Implementation Guide

Cobalt Strike Capabilities Mapped to TLCTC Framework

Comprehensive Implementation Guide — TLCTC v2.0 Aligned. Updated December 2025 (Revised with R-CRED and R-EXEC corrections).

BK
Bernhard Kreinz
Loading read time...
Abstract

This document maps Cobalt Strike features and techniques to the primary TLCTC cluster representing the generic vulnerability exploited at the initiation of that specific action. Classification follows TLCTC v2.0 normative rules (R-ROLE, R-CRED, R-EXEC, R-ABUSE). This update corrects credential dumping classifications per R-CRED (acquisition ≠ application) and adds explicit #7 recording per R-EXEC for LOLBAS-style execution patterns.

Introduction & Methodology

Cobalt Strike is heavily reliant on sequences. Many actions require prerequisites (e.g., credentials from #4, existing access via #7) and enable subsequent actions.

  • R-CRED Application: Credential acquisition maps to the enabling cluster; credential application (use/presentation) maps to #4. Dumping credentials is acquisition via #7 (FEC execution); using them is #4.
  • R-EXEC Application: Whenever FEC executes, #7 must be recorded. LOLBAS invocation (#1) followed by attacker command execution = #1 → #7.
  • Data Risk Events: The Data Risk Event column indicates potential direct consequences (LoC = Loss of Confidentiality, LoI = Loss of Integrity, LoA = Loss of Availability) resulting from the action, distinct from the threat cluster itself.
V2.0 Revision Note

This update corrects credential dumping classifications per R-CRED (acquisition ≠ application) and adds explicit #7 recording per R-EXEC for LOLBAS-style execution patterns.

Reconnaissance & Staging

Capability Cluster Generic Vulnerability Context/Sequence Data Risk
System Profiler (Pre-Compromise) N/A Reconnaissance tool Gathers client info to inform attacks. Not a threat itself, enables #3/#9. N/A
System Profiler (Post-Compromise) #1 Legitimate system/browser APIs for information query Initiated via Beacon (#7), uses legitimate APIs (#1) to gather system details. LoC
Clone a Site N/A Support tool for #9 Creates replica sites for Social Engineering. Can host exploits (#3) or keyloggers (#7 via #1). (LoC)
Host File N/A Support tool Hosts files for delivery via other clusters. N/A

Initial Access & Delivery

Capability Cluster Generic Vulnerability Context/Sequence Data Risk
Spear Phishing Tool #9 Human psychological factors Crafts/sends emails to manipulate users. Leads to #3, #4, #7. N/A
HTML Application / MS Office Macro #7 Environment's designed capability to execute scripts/macros Generates HTA/Macro (#7 artifact). Delivery usually via #9. User interaction enables execution. → #7
Payload Generator N/A Tool feature Creates malware (#7) or exploit code (#2/#3) artifacts for delivery. N/A
Client-Side Exploits #3 Exploitable flaws in client-side software source code Delivers/triggers exploits targeting client software. Usually requires #9 lure. Successful exploit leads to #7. → #7

Beacon C2 & Core Operations

Capability Cluster Generic Vulnerability Context/Sequence Data Risk
Beacon Payload Execution #7 Environment's designed capability to execute foreign code/binaries The running Beacon agent. Its presence signifies successful exploitation of #7 vulnerability. Enables C2
Beacon C2 Communication #7 Malware requiring C2 communication The inherent command/control function of running malware (#7). Uses various protocols. N/A
Inline Execute (BOF) #7 Environment's designed capability to execute code within a process Executes compiled C code (BOF) within the running Beacon (#7) process. Enables actions
Internal Commands (sleep, checkin, mode) #7 Malware requiring C2 commands Commands controlling state/behavior of the running malware agent (#7). N/A

Credential Access & Theft

CORRECTED per R-CRED: Credential acquisition (dumping, capture) maps to the enabling cluster. Credential application (use, presentation) maps to #4. This section distinguishes acquisition vs. application.

Capability Cluster Generic Vulnerability Context/Sequence Data Risk
Hashdump / LogonPasswords #7 FEC execution to extract OS-stored credentials (acquisition) Beacon runs FEC to dump credentials. Requires privileges. Acquisition, not application. LoC
Mimikatz (Credential Dumping) #7 FEC execution via Mimikatz to dump credentials from memory (acquisition) Runs Mimikatz code (FEC) to dump credentials from memory or abuse auth features. Acquisition step. LoC
DCSync (via Mimikatz) #1 Legitimate domain replication protocol abuse (acquisition) Abuses domain replication privileges via legitimate protocol. No FEC required for the replication itself. LoC
Token Manipulation (steal_token, make_token, rev2self, getsystem) #4 Weak Identity Management / Access Tokens (application) Stealing, creating, using, or reverting access tokens to impersonate or elevate. This IS credential application. Enables Impersonation
Kerberos Ticket Use/Purge #4 Weak Identity Management / Kerberos Tickets (application) Manipulating/using Kerberos tickets affects authentication state. Ticket USE is application. Enables Impersonation
Keystroke Logging #1 Legitimate OS input monitoring APIs Injects code (via #1 or #7) that abuses legitimate OS APIs (#1) to capture keystrokes. Credential acquisition. LoC
Screenshotting #1 Legitimate OS display capture APIs Injects code (via #1 or #7) that abuses legitimate OS APIs (#1) to capture screen content. LoC

Execution & Injection

CORRECTED per R-EXEC: LOLBAS-style execution must record #7 when attacker-controlled commands execute. Invocation of legitimate binary is #1; execution of attacker content is #7. Sequence: #1 → #7.

Capability Cluster Generic Vulnerability Context/Sequence Data Risk
shell / run / execute #1 → #7 Legitimate OS command execution → FEC execution Uses cmd.exe or CreateProcess (#1) to run attacker commands (#7). Both must be recorded. Enables actions
powershell / powerpick #1 → #7 Legitimate PowerShell engine → FEC execution Leverages PowerShell engine (#1) to execute attacker scripts/commands (#7). Enables actions
psinject #1 → #7 Legitimate OS process APIs + PowerShell → FEC Injects into process (#1) then uses PowerShell to execute attacker content (#7). Enables actions
execute-assembly #7 Environment's designed capability to execute foreign code (.NET) Leverages .NET runtime (#7) to load and run assemblies. Direct FEC execution. Enables actions
dllinject / shinject / shspawn #1 → #7 Legitimate OS process APIs → shellcode/DLL execution Uses OS APIs (#1) to inject shellcode/DLL (#7) into remote/new process. → #7
dllload #1 → #7 Legitimate OS DLL loading APIs → foreign DLL execution Uses OS APIs (#1) to force loading of attacker DLL (#7) from disk. Enables actions

Defense Evasion

Capability Cluster Generic Vulnerability Context/Sequence Data Risk
Malleable C2 / Artifact Kit / Resource Kit / Sleep Mask N/A Configuration/Tool Feature Modifies appearance or artifacts of other clusters (#7, #1, #3) to evade detection. Not primary threats. N/A
Alternate Parent Processes (ppid, runu) #1 Legitimate OS process creation/relationship APIs Manipulates process parentage using OS APIs (#1) for evasion. N/A
Process Argument Spoofing (argue) #1 Legitimate OS process memory manipulation APIs Modifies arguments in memory using OS APIs (#1) for evasion. N/A
Block DLLs (blockdlls) #1 Legitimate process security features (Mitigation Policies) Configures process mitigation policies using OS APIs (#1) for evasion/disruption. N/A
timestomp #1 Legitimate file system metadata APIs Modifies file timestamps using OS APIs (#1) for evasion. N/A

Discovery

Capability Cluster Generic Vulnerability Context/Sequence Data Risk
Port Scanning (portscan) #1 Legitimate network socket APIs Uses standard socket functions (#1) for unauthorized scanning. N/A
Network/Host/Domain Enumeration #1 Legitimate system/network query APIs & commands Uses built-in tools and APIs (#1) for reconnaissance. (LoC)
File System Ops (ls, cd, pwd, drives, etc.) #1 Legitimate file system access APIs Uses standard file system APIs (#1) for interaction. Unauthorized access/modification is abuse. LoC/LoI/LoA
Registry Query (reg query) #1 Legitimate registry access APIs Uses standard registry APIs (#1) for discovery. (LoC)

Lateral Movement

Capability Cluster Generic Vulnerability Context/Sequence Data Risk
jump / remote-exec (psexec, winrm, wmi) #1 Legitimate administrative protocols/services (SMB, WinRM, WMI) Uses legitimate remote admin protocols (#1). Requires credentials/tokens (prior #4). Often delivers #7. → compromise
Pass-the-Hash / Pass-the-Ticket #4 Weak Identity Management / Credential Protection (application) Uses stolen hashes/tickets (#4) to authenticate for lateral movement. This is credential APPLICATION. → compromise
SMB/TCP Beacon Peer-to-Peer (link, unlink) #7 Malware requiring C2 communication Establishes internal C2 channels for Beacon (#7) using legitimate protocols. N/A (Internal C2)

Collection & Exfiltration

Capability Cluster Generic Vulnerability Context/Sequence Data Risk
File Download (download) #1 Legitimate file system access APIs & network protocols Reads files via OS APIs (#1), transfers over C2 (#7). LoC

Pivoting

Capability Cluster Generic Vulnerability Context/Sequence Data Risk
SOCKS Proxy / Reverse Port Forward #1 Legitimate networking capabilities (sockets, port binding) Uses Beacon (#7) to manipulate host's networking stack via OS APIs (#1) to relay traffic. Enables access
Browser Pivoting #1 Legitimate browser process APIs & IPC Injects code (via #1 or #7) which abuses browser IPC/APIs (#1) to leverage existing web sessions. LoC, LoI
Covert VPN #1 Legitimate network interface/tunneling APIs Uses Beacon (#7) to interact with OS networking APIs (#1) to create tunnel interface. Enables access

Conclusion

This detailed mapping reinforces that Cobalt Strike's power comes from its ability to seamlessly combine techniques across multiple TLCTC clusters, executing complex attack sequences.

Typical Attack Sequence Pattern
#9 or #3 → #7 (foothold) → #4 (credential use) → #1 (lateral movement/actions)

Understanding these sequences and the generic vulnerabilities exploited at each step is essential for effective defense. Control strategies should address the full attack path, not just individual techniques.

Key V2.0 Corrections Applied

  • Credential Dumping (R-CRED): Hashdump, LogonPasswords, Mimikatz credential dumping reclassified from #4 to #7 — these are credential acquisition via FEC execution, not credential application.
  • DCSync (R-CRED): Reclassified from #4 to #1 — DCSync abuses legitimate domain replication protocol without requiring FEC for the replication itself.
  • LOLBAS Execution (R-EXEC): shell/run/execute, powershell/powerpick, psinject changed from #1 to #1 → #7 — legitimate binary invocation plus FEC execution must both be recorded.
  • Token/Ticket USE (R-CRED): Correctly remains #4 — steal_token, make_token, Kerberos ticket use are credential APPLICATION (presenting identity artifacts).
  • Keystroke Logging: Correctly #1 — abuses legitimate OS APIs; captured credentials would be used in a subsequent #4 step.

Framework Reference: TLCTC v2.0 White Paper — tlctc.net
Classification Rules Applied: R-ROLE, R-CRED, R-EXEC, R-ABUSE, R-FLOOD, R-MITM, R-SUPPLY

References

  1. Cobalt Strike Manual (Help Systems)
  2. Kreinz, B. Top Level Cyber Threat Clusters (TLCTC), White Paper V2.0
  3. TLCTC Implementation Guide — Cobalt Strike Mapping v2.0