Documentation and evidence collection

Red team operations require meticulous documentation. Blue team needs complete visibility into what happened to build better defences.

What to document

Every action: Commands executed, tools used, files created or modified, network connections made, credentials obtained, systems accessed.

Timestamps: Precise timing helps blue team correlate with their logs and alerts. “13:42:15 GMT: Executed Mimikatz on WORKSTATION-042”

Success and failure: What worked, what was detected, what was blocked. Failures reveal effective controls. Successes reveal gaps.

Artefacts created: Payloads, scripts, modified files, registry keys, scheduled tasks. Blue team needs these for detection engineering.

Screenshots and videos: Visual evidence helps during debriefs. Show exactly what red team saw and did.

Documentation formats

Real-time logging: Maintain operational notes during engagement. Use structured formats (JSON, CSV) for later analysis.

Attack timeline: Chronological sequence of events from initial access through objectives achieved.

TTP mapping: Match activities to MITRE ATT&CK framework for standardised reporting.

Evidence package: Collect all artefacts, logs, screenshots, and malware samples used during exercise.

Executive summary: High-level findings for leadership. Focus on business impact and risk, not technical minutiae.

Technical report: Detailed walkthrough for blue team and security practitioners. Include detection opportunities, defensive gaps, remediation recommendations.