Explore OpenCTI or OpenAEV platform with 30 days Free Trial!
XTM Hub by FiligranSign In

DORA TLPT β€” ICT Risk Validation for Financial Services

Incident Response & Ticketing
Detection & Response Enablement

Overview

Full-chain DORA TLPT scenario: 7 assume-breach stages mapped to DORA Art. 5-44. Validates detection, response & resilience across any SOC stack. Built for service providers running compliance tests across banking & insurance clients.

πŸ›οΈ DORA TLPT β€” ICT Risk Validation for Financial Services

Category: Attack Scenario | Severity: πŸ”΄ Critical | Focus: Incident Response


πŸ“‹ Executive Summary

This scenario simulates a full-chain Threat-Led Penetration Test (TLPT) as mandated by the Digital Operational Resilience Act (DORA) β€” Regulation (EU) 2022/2554 β€” targeting financial sector entities (banks, insurers, fintechs) and their critical ICT service providers.

DORA entered into force on January 17, 2025 and requires financial entities to demonstrate operational resilience against advanced cyber threats. Article 26 specifically mandates TLPT exercises at least every 3 years for significant financial entities. This scenario reproduces a realistic assume-breach attack chain β€” from initial reconnaissance to data exfiltration β€” designed to validate detection, response and resilience capabilities across any SOC stack. Each inject maps directly to a specific DORA article, producing a compliance coverage matrix that demonstrates to regulators which ICT controls are effective, partial, or absent.

Built for multi-national service providers (consulting firms, MSSPs) running the same scenario across multiple banking and insurance clients with different security stacks β€” the results provide an objective, comparable maturity assessment per client.


🧠 Regulatory Framework Profile

AttributeDetails
RegulationDORA β€” Regulation (EU) 2022/2554
Effective DateJanuary 17, 2025
ScopeBanks, insurers, investment firms, crypto-asset providers, critical ICT third-party providers
TLPT RequirementArticle 26 β€” At least every 3 years for significant entities
Testing StandardTIBER-EU framework (Threat Intelligence-Based Ethical Red Teaming)
OversightESAs (EBA, EIOPA, ESMA) + national competent authorities
PenaltiesAdministrative fines + remediation orders from competent authorities

DORA Chapters Covered

ChapterArticlesFocusValidated by
II β€” ICT Risk ManagementArt. 5-16Protection, detection, prevention controlsStages 2, 4, 6
III β€” ICT Incident ManagementArt. 17-23Incident detection, classification, notificationStages 3, 7
IV β€” Resilience TestingArt. 26-27TLPT execution and reportingAll stages
V β€” Third-Party ICT RiskArt. 28-44Supply chain and lateral movement riskStage 5

πŸ”— Kill Chain β€” 7 Injects

Stage 1 β€” Discovery: System Information Reconnaissance

ATT&CKT1082 β€” System Information Discovery
DelayT+0s (scenario start)
DORA MappingArt. 26 β€” TLPT initial reconnaissance phase
DescriptionThe first phase of any TLPT exercise: profiling the target environment. DORA Art. 26 requires testing to follow the TIBER-EU methodology, which begins with threat intelligence-driven reconnaissance. This stage collects OS version, domain membership, network configuration, running processes, and installed services β€” mirroring what an advanced persistent threat would gather after initial access.
What it doesExecutes native Windows commands (systeminfo, ipconfig /all, Get-Process, Get-Service, whoami /all) to build a comprehensive system profile. Results are written to C:\ProgramData\OpenAEV\artifacts\.
Detection opportunitiesSysmon Event ID 1 (process creation for systeminfo, ipconfig, whoami), Windows Event ID 4688 (process creation with command-line logging), EDR alerts for rapid succession of discovery commands (>3 enumeration commands in <60 seconds from a single endpoint), SIEM correlation rules for reconnaissance patterns.

Stage 2 β€” Defense Evasion: Defender Tampering

ATT&CKT1562 β€” Impair Defenses
DelayT+2min
DORA MappingArt. 5-16 β€” ICT Risk Management Framework (control resilience)
DescriptionDORA Art. 9 requires financial entities to implement ICT protection and prevention measures that are resistant to tampering. This stage validates that security controls cannot be trivially disabled by an attacker with local access. If Tamper Protection is properly configured, this inject should fail β€” which is the desired outcome. A successful disable indicates a critical gap in the ICT risk management framework.
What it doesAttempts to disable Windows Defender Real-Time Protection, Behavior Monitoring, and IOAV Protection via Set-MpPreference. All original settings are backed up and restored during cleanup.
Detection opportunitiesWindows Event ID 5001 (Real-time protection disabled), Tamper Protection alerts (if enabled β€” the inject is blocked and an alert is generated), EDR alerts for Set-MpPreference modification attempts, GPO/Intune compliance drift detection, Microsoft Defender for Endpoint tamper attempt events.

Stage 3 β€” Credential Access: LSASS Memory Dump via Comsvcs.dll

ATT&CKT1003.001 β€” OS Credential Dumping: LSASS Memory
DelayT+4min
DORA MappingArt. 17-23 β€” ICT Incident Management (major incident trigger)
DescriptionCredential theft is one of the most critical events in the DORA incident classification framework. Art. 18 defines criteria for major ICT-related incidents β€” compromise of authentication credentials affecting critical systems qualifies automatically. This stage tests whether the SOC detects the dump, classifies it correctly as a major incident, and triggers the Art. 19 notification process (initial notification to competent authority within 4 hours). Uses comsvcs.dll MiniDump β€” a Mimikatz-free technique that leverages a legitimate Windows DLL.
What it doesDumps the LSASS process memory via rundll32.exe comsvcs.dll, MiniDump to C:\ProgramData\OpenAEV\artifacts\lsass_dump.dmp. Full cleanup removes the dump file.
Detection opportunitiesSysmon Event ID 10 (ProcessAccess on lsass.exe with GrantedAccess: 0x1FFFFF), Sysmon Event ID 1 (rundll32.exe with comsvcs.dll, MiniDump arguments), Windows Event ID 4656 (handle requested on LSASS), Credential Guard alerts (if enabled β€” dump is empty/unusable), ASR Rules "Block credential stealing from LSASS" (Defender β€” blocks the action), EDR credential dumping detection (high-confidence on all major EDR platforms).

Stage 4 β€” Persistence: Scheduled Task Creation

ATT&CKT1053.005 β€” Scheduled Task/Job: Scheduled Task
DelayT+6min
DORA MappingArt. 5-16 β€” ICT Risk Management (anomaly detection)
DescriptionDORA Art. 10 requires financial entities to detect "anomalous activities" including unauthorized changes to ICT systems. Persistence mechanisms β€” scheduled tasks, services, run keys β€” represent unauthorized system modifications that must be identified and investigated. This stage validates that the SOC detects new persistence artifacts and correlates them with the broader attack chain. An attacker maintaining persistent access to a financial institution's ICT systems represents an ongoing risk to operational resilience.
What it doesCreates a scheduled task (OpenAEV-DORA-Persistence) configured to execute an encoded PowerShell command every 15 minutes. The task is fully removed during cleanup β€” no durable attacker capability is left behind.
Detection opportunitiesWindows Event ID 4698 (Scheduled task created), Sysmon Event ID 1 (schtasks.exe /create with encoded command arguments), Windows Event ID 4702 (task updated), EDR persistence alerts (scheduled task with encoded command = high-confidence malicious), SIEM rules for new scheduled tasks created outside change management windows, task entries in C:\Windows\System32\Tasks\.

Stage 5 β€” Lateral Movement: WMI Remote Execution

ATT&CKT1047 β€” Windows Management Instrumentation
DelayT+8min
DORA MappingArt. 28-44 β€” Third-Party ICT Risk Management
DescriptionCritical for the service provider use case. DORA Chapter V (Art. 28-44) addresses risks from ICT third-party service providers. A compromised service provider endpoint pivoting into a client's network is the nightmare scenario regulators are most concerned about. This stage simulates lateral movement via WMI β€” a native Windows protocol that is difficult to block entirely β€” to validate that cross-boundary movement is detected. For a multi-national service provider running this across different banking clients, this stage answers: "If our environment is compromised, would the client's SOC see us moving into their network?"
What it doesExecutes Invoke-WmiMethod to simulate process creation on remote machines. Generates WMI connection artifacts, RPC/DCOM network traffic, and remote logon events consistent with real lateral movement.
Detection opportunitiesSysmon Event ID 1 (wmiprvse.exe spawning child processes), Windows Event ID 4648 (logon with explicit credentials), Windows Event ID 4624 Type 3 (network logon on target), Sysmon Event ID 3 (network connection to port 135 β€” RPC/WMI), EDR lateral movement alerts, NDR/network monitoring for unusual RPC/DCOM traffic between workstations, Microsoft Defender for Identity lateral movement path detection.

Stage 6 β€” Discovery: Domain Trust & Privileged Account Enumeration

ATT&CKT1482 β€” Domain Trust Discovery / T1087 β€” Account Discovery
DelayT+10min
DORA MappingArt. 5-16 β€” ICT Risk Management (access control validation)
DescriptionBefore targeting high-value assets, advanced threat actors map the Active Directory environment to identify trust relationships, privileged accounts, and security policy weaknesses. DORA Art. 9 requires robust access control and authentication mechanisms β€” this stage validates that enumeration attempts against the identity infrastructure are detected. If an attacker can silently map all Domain Admins, trust relationships, and password policies, the access control framework has a visibility gap.
What it doesExecutes AD reconnaissance commands (nltest /domain_trusts, net group "Domain Admins" /domain, Get-ADDefaultDomainPasswordPolicy, Get-ADUser filtering for privileged accounts). Results are written to a controlled artifact directory.
Detection opportunitiesSysmon Event ID 1 (nltest.exe /domain_trusts, net.exe group), Windows Event ID 4661/4662 (handle requested / operation performed on AD objects), LDAP monitoring (bulk LDAP queries from a non-DC endpoint), Microsoft Defender for Identity alerts ("Reconnaissance via LDAP", "Account Enumeration"), honeypot/decoy account triggers (if canary accounts appear in results β†’ immediate high-fidelity alert), SIEM rules for AD enumeration patterns.

🎯 Stage 7 β€” Exfiltration: Data Staging & Simulated Upload

ATT&CKT1567 β€” Exfiltration Over Web Service
DelayT+12min
DORA MappingArt. 17-23 β€” ICT Incident Management (major incident β€” data breach)
DescriptionThe culmination of the attack chain. Data exfiltration from a financial institution is automatically classified as a major ICT-related incident under Art. 18 β€” triggering mandatory notification to the competent authority (Art. 19), communication to affected clients (Art. 20), and post-incident review (Art. 23). This stage validates the entire incident response pipeline: detection of staging activity, alerting on exfiltration attempt, SOC triage and classification, and initiation of the regulatory notification process. The exfiltration targets localhost only (127.0.0.1) β€” safe-by-design, no data leaves the network.
What it doesCreates simulated sensitive files (marked "SIMULATED β€” DORA TLPT"), compresses them into a .zip archive, and executes an HTTP POST to http://127.0.0.1:9999 (non-existent endpoint). Generates all the artifacts a real exfiltration would produce: file access, compression, network connection attempt. Full cleanup removes all staged data, archives, and artifacts.
Detection opportunitiesSysmon Event ID 1 (Compress-Archive PowerShell execution), Sysmon Event ID 3 (outbound network connection), DLP alerts (compressed archive containing sensitive file patterns), proxy/CASB alerts (HTTP POST of archive file to non-whitelisted destination), EDR "Data Staging" or "Exfiltration" alerts (compression + network activity correlation), network monitoring for unusual outbound data volume from endpoint, Windows Event ID 4688 (process creation with staging directory paths).

πŸ”’ Security Checklist

CriterionStatus
No C2 / reverse shell / beaconβœ… All traffic stays local (127.0.0.1) or uses native Windows protocols
No real malware / ransomware binariesβœ… Only native Windows tools and PowerShell commands
No actual data exfiltrationβœ… HTTP POST targets localhost:9999 (non-existent endpoint)
Cleanup removes all artifactsβœ… Dumps, archives, staged files, reconnaissance output all cleaned
Cleanup removes persistenceβœ… Scheduled task fully deleted
Cleanup restores security settingsβœ… Defender preferences restored to original state
ATT&CK mapping on every injectβœ… 8 techniques mapped across 7 tactics
DORA article mapping on every injectβœ… Art. 5-16, 17-23, 26-27, 28-44 covered
Safe for production-like environmentsβœ… No destructive actions, complete rollback

πŸ“Š DORA Compliance Coverage Matrix

DORA RequirementArticlesWhat the Scenario ValidatesPass Criteria
ICT protection controls resist tamperingArt. 9Stage 2 β€” Defender tampering is blockedTamper Protection prevents disable + alert generated
Anomalous activities are detectedArt. 10Stages 1, 4, 6 β€” Discovery & persistence detectedSOC alerts on reconnaissance and unauthorized system changes
Credential protection mechanisms workArt. 9Stage 3 β€” LSASS dump is prevented or detectedCredential Guard / ASR blocks dump OR EDR alerts within <5min
Major incidents are classified correctlyArt. 18Stages 3, 7 β€” Credential theft & exfiltration flagged as majorSOC classifies as major incident per Art. 18 criteria
Notification process is triggeredArt. 19Stage 7 β€” Exfiltration triggers notification workflowInitial notification to authority within 4 hours
Third-party lateral movement is visibleArt. 28-44Stage 5 β€” WMI movement detected across boundariesNetwork logon + WMI activity generates alert
TLPT is executed per TIBER-EUArt. 26-27Full scenario β€” 7 stages, complete kill chainScenario executed, results documented, gaps identified

🏦 Multi-Client Deployment (Service Provider Model)

Designed for multi-national service providers running DORA TLPT across diverse client portfolios:

Client ProfileTypical SOC StackKey Validation Points
Tier 1 BankCrowdStrike + Splunk + Palo AltoFull kill chain detection + cross-stage correlation
Insurance GroupMicrosoft Defender + Sentinel + IntuneTamper Protection + Credential Guard + ASR rules
Regional BankSentinelOne + QRadar + FortinetWMI lateral movement detection + exfiltration alerting
Fintech / NeobankCortex XDR + XSOAR + CloudflareAutomated response validation + time-to-contain
Payment ProcessorCarbon Black + ArcSight + ZscalerPersistence detection + data staging visibility

Each inject produces stack-agnostic artifacts (Windows Event IDs, Sysmon events, process creation logs, network activity) β€” detectable regardless of the EDR/SIEM combination deployed.


πŸ”„ Continuous Compliance vs. One-Shot Pentest

Traditional PentestOpenAEV DORA TLPT Scenario
FrequencyOnce every 3 years (Art. 26 minimum)Continuous β€” replayable on demand
ReproducibilityDepends on the pentester100% reproducible, identical scenario every run
Multi-clientTested on 1 environment per engagementSame scenario across N clients with N different SOC stacks
MeasurabilityStatic PDF reportReal-time metrics: MTTD per stage, detection rate, ATT&CK coverage
Regulatory evidencePoint-in-time reportContinuous test history + results = proof of ongoing diligence
Cost per run€€€ per engagementScenario reusable, marginal cost per execution β‰ˆ 0
ComparabilityNo standardized baselineSame scenario = objective cross-client benchmarking

πŸ“ˆ Value Proposition

  1. Regulation-mapped realism β€” Every stage maps directly to specific DORA articles (Art. 5-16, 17-23, 26-27, 28-44), producing a compliance coverage matrix ready for regulatory review
  2. Detection + Response validation β€” Goes beyond "detected yes/no" to measure MTTD (Mean Time to Detect), MTTR (Mean Time to Respond), and incident classification accuracy
  3. Multi-stack portability β€” Stack-agnostic artifacts ensure consistent validation across CrowdStrike, Defender, SentinelOne, Cortex XDR, or any other EDR/SIEM combination
  4. Service provider scale β€” One scenario, N clients β€” enables objective cross-client maturity benchmarking for consulting firms and MSSPs
  5. Safe-by-design β€” Full execution on production-like environments without risk: no C2, no real exfiltration, complete cleanup and rollback
  6. Continuous compliance β€” Transforms a 3-year regulatory obligation into an operational advantage: ongoing validation that improves security posture between audits
  7. Audit-ready output β€” Results directly feed DORA Art. 27 reporting requirements (TLPT results, identified gaps, remediation plans)

Total execution time: ~12 minutes | 7 injects | 8 ATT&CK techniques | 7 tactics covered | 4 DORA chapters validated

Basic information

Filigran
SΓ©bastien Miguel
March 05, 2026
2.2.1
10+
4
    DORA TLPT β€” ICT Risk Validation for Financial Services | OpenAEV Scenarios Library | XTM Hub by Filigran