Your organization just spent six figures on security tools. Firewalls, EDR, SIEM — the works. But when a real attacker sends a spearphishing email with a malicious macro, does your SOC actually detect it? If you can’t answer that question with data, your security program has a blind spot. Purple teaming fills that gap — and you don’t need a single paid license to get started.
TL;DR
- Purple teaming combines red team attacks with blue team detection — testing what you actually catch
- Five free tools cover the entire workflow: Atomic Red Team (attacks), Caldera (automation), Wazuh (detection), Sigma (rules), VECTR (tracking)
- MITRE ATT&CK is the common language that ties everything together
- You can run your first purple team exercise in a single afternoon with a laptop and VirtualBox
- Start small: pick 5 ATT&CK techniques relevant to your threat model and test those first
Why This Matters for You
Most security teams operate in silos. The red team finds vulnerabilities and writes reports. The blue team monitors alerts and responds to incidents. They rarely sit in the same room, looking at the same screen, asking the same question: “Did we catch that?”
Purple teaming breaks that wall. It’s not a separate team — it’s a methodology where offense and defense work together in real time. The red side executes a technique, the blue side checks if their tools detected it, and together they fix the gaps.
The best part? The entire toolchain is free and open source.
The Purple Team Toolchain — Overview
Here’s what you need and what each tool does:
| Tool | Role | Cost | What It Does |
|---|---|---|---|
| MITRE ATT&CK | Framework | Free | Common language for attack techniques |
| Atomic Red Team | Attack execution | Free | Pre-built test scripts for ATT&CK techniques |
| MITRE Caldera | Automated emulation | Free | Runs attack chains automatically via C2 |
| Wazuh | SIEM / Detection | Free | Collects logs, triggers alerts, maps to ATT&CK |
| Sigma | Detection rules | Free | Vendor-neutral detection rules that convert to any SIEM |
| VECTR | Tracking & metrics | Free | Records test results and measures detection coverage |
Think of it like a production line: ATT&CK tells you what to test, Atomic Red Team and Caldera run the tests, Wazuh and Sigma detect them, and VECTR tracks whether you passed or failed.
MITRE ATT&CK: The Common Language
Before running any tests, you need a shared vocabulary. MITRE ATT&CK provides exactly that — a knowledge base of adversary tactics, techniques, and procedures (TTPs) observed in real-world attacks.
ATT&CK organizes attacks into 14 tactics (the “why” — like Initial Access, Persistence, Lateral Movement) and hundreds of techniques (the “how” — like T1566 Phishing, T1053 Scheduled Task).
ATT&CK Navigator — Your Visual Map
The ATT&CK Navigator is a free web tool that lets you create heatmaps of your coverage. Color-code techniques by:
- Red: tested, not detected (gap)
- Green: tested, detected (covered)
- Yellow: partially detected
- Gray: not yet tested
This single visualization becomes the centerpiece of every purple team exercise. It shows your CISO exactly where the gaps are — no PowerPoint needed.
Picking Your First Techniques
Don’t try to test all 200+ techniques at once. Start with the most common ones seen in your threat landscape:
# High-priority techniques for most organizationsT1566.001 - Phishing: Spearphishing AttachmentT1059.001 - Command and Scripting: PowerShellT1053.005 - Scheduled Task/Job: Scheduled TaskT1003.001 - OS Credential Dumping: LSASS MemoryT1021.001 - Remote Services: Remote Desktop ProtocolThese five techniques appear in nearly every major breach report. If you can detect these, you’re ahead of most organizations.
Atomic Red Team: Your Attack Library
Atomic Red Team is a library of small, focused test scripts mapped directly to ATT&CK techniques. Each “atomic test” simulates one specific adversary behavior — no complex infrastructure required.
Why Atomic Red Team Works
Traditional red team engagements take weeks and cost thousands. Atomic tests take seconds and cost nothing. Each test is:
- Self-contained — runs with a single command
- Reversible — includes cleanup steps
- Documented — explains what it does and what to look for
- Cross-platform — supports Windows, macOS, Linux, and cloud
Getting Started
# Install the Invoke-AtomicRedTeam module v2.0.4 (PowerShell)Install-Module -Name invoke-atomicredteam,powershell-yaml -Scope CurrentUserInstall-AtomicRedTeam -getAtomics
# List available tests for a techniqueInvoke-AtomicTest T1059.001 -ShowDetailsBrief
# Run a specific test (e.g., PowerShell download cradle)Invoke-AtomicTest T1059.001 -TestNumbers 1
# Clean up after the testInvoke-AtomicTest T1059.001 -TestNumbers 1 -CleanupThe Purple Team Workflow
Here’s how you use Atomic Red Team in a purple exercise:
- Red side announces: “Running T1003.001 — LSASS credential dump”
- Red side executes:
Invoke-AtomicTest T1003.001 -TestNumbers 1 - Blue side checks Wazuh/SIEM: “Did we get an alert?”
- Together they document the result in VECTR
- If no detection: write a Sigma rule, deploy it, re-test
Each cycle takes 10-15 minutes. In a full day, you can test 20-30 techniques.
MITRE Caldera: Automated Adversary Emulation
While Atomic Red Team runs individual techniques, MITRE Caldera chains them together into realistic attack scenarios. It’s a full adversary emulation platform with a web UI and a C2 (Command and Control) server.
What Makes Caldera Different
Caldera doesn’t just run scripts — it makes decisions. You define an adversary profile (a set of ATT&CK techniques), deploy an agent on a target machine, and Caldera autonomously executes the attack chain. It adapts based on what it discovers, just like a real attacker.
Key Features
- Adversary profiles — pre-built attack playbooks mapped to real threat groups (APT3, APT29, etc.)
- Autonomous execution — the agent decides which technique to run next based on the environment
- Plugin ecosystem — extends functionality (Stockpile for techniques, Compass for ATT&CK visualization)
- Blue team mode — Response plugin lets you define and test automated defensive actions
- Caldera for OT — new plugins for industrial control systems (Modbus, BACnet, DNP3)
Quick Setup (v5.1.0+)
# Clone and start Caldera (requires Python 3.8+)git clone https://github.com/mitre/caldera.git --recursivecd calderapython3 -m venv venv && source venv/bin/activatepip install -r requirements.txtpython3 server.py --insecure --build
# Access the web UI# Default: http://localhost:8888# Credentials defined in conf/local.ymlWhen to Use Caldera vs. Atomic Red Team
| Scenario | Use Atomic Red Team | Use Caldera |
|---|---|---|
| Testing one specific detection rule | Yes | Overkill |
| Simulating a full attack chain | Too manual | Yes |
| Quick validation during incident response | Yes | Too slow to set up |
| Automated weekly regression testing | Possible but manual | Built for this |
| Testing lateral movement scenarios | Limited | Excellent |
In practice, most purple teams use both. Atomic for quick spot-checks, Caldera for full adversary simulations.
Wazuh: Your Free SIEM
You can’t detect attacks without a detection platform. Wazuh is a free, open-source SIEM (Security Information and Event Management) that integrates directly with MITRE ATT&CK.
Why Wazuh for Purple Teaming
Wazuh isn’t just a log collector — it has built-in ATT&CK mapping. When an alert fires, Wazuh shows you which tactic and technique triggered it. This makes it trivial to compare your test results against your detection coverage.
Key Purple Team Features
- ATT&CK dashboard — visual matrix showing which techniques generate alerts
- Sysmon integration — deep Windows event logging (process creation, network connections, registry changes)
- File integrity monitoring — detects unauthorized file changes
- Active response — can automatically block attacks (for testing defensive automation)
- Custom rules — easy to add new detection logic in XML format
Mapping an Atomic Test to a Wazuh Alert
When you run Invoke-AtomicTest T1003.001 (LSASS dump), Wazuh should generate an alert like:
Rule: 92000 - Sysmon - Possible credential dumpingMITRE ATT&CK: T1003.001 - OS Credential Dumping: LSASS MemoryLevel: 14 (High)Agent: WIN-TARGETIf you don’t see this alert, your detection has a gap. Time to write a Sigma rule.
Sigma Rules: Vendor-Neutral Detection
Sigma is the “YARA for logs” — a generic signature format for SIEM systems. Write a detection rule once in Sigma’s YAML format, then convert it to any SIEM query language (Wazuh, Splunk, Elastic, Sentinel, etc.).
Why Sigma Matters
The Sigma repository on GitHub contains over 15,000 community-contributed rules covering a huge range of ATT&CK techniques. Instead of writing detection rules from scratch, you can:
- Find a Sigma rule for the technique you’re testing
- Convert it to your SIEM’s format
- Deploy and validate
Anatomy of a Sigma Rule
title: LSASS Memory Access via Procdumpid: 5afee48e-67dd-4e03-a783-f74259dcf998status: stabledescription: Detects procdump accessing LSASS memoryreferences: - https://attack.mitre.org/techniques/T1003/001/author: Florian Rothdate: 2024/01/15tags: - attack.credential_access - attack.t1003.001logsource: category: process_creation product: windowsdetection: selection: CommandLine|contains|all: - 'procdump' - 'lsass' condition: selectionlevel: criticalThis rule triggers whenever a process is created with a command line containing both “procdump” and “lsass”. Simple, readable, and platform-independent.
Converting Sigma to Your SIEM
# Install sigma-cli and backends (use a virtualenv to avoid system package conflicts)python3 -m venv sigma-env && source sigma-env/bin/activatepip install sigma-cli pySigma-backend-splunk pySigma-pipeline-sysmon
# Convert to Splunk SPLsigma convert -t splunk -p sysmon rules/windows/process_creation/proc_creation_win_procdump_lsass.yml
# Convert to Elasticsearch (Lucene)pip install pySigma-backend-elasticsearch pySigma-pipeline-ecs-windowssigma convert -t lucene -p ecs_windows rules/windows/process_creation/proc_creation_win_procdump_lsass.ymlSupported backends include Splunk, Elasticsearch, Microsoft Sentinel (KQL), QRadar, CrowdStrike LogScale, and more. You can also convert rules one at a time using sigconvert.io.
For Wazuh specifically, you’ll translate the Sigma detection logic into Wazuh XML rules manually or via community-maintained converters, then drop them into /var/ossec/etc/rules/local_rules.xml:
<!-- Example: Wazuh rule for LSASS access via Procdump --><rule id="100002" level="14"> <if_sid>61603</if_sid> <field name="win.eventdata.commandLine" type="pcre2">procdump.*lsass</field> <description>Procdump accessing LSASS memory - credential dumping</description> <mitre> <id>T1003.001</id> </mitre></rule>The Detection Engineering Loop
This is where purple teaming becomes detection engineering:
- Test a technique with Atomic Red Team
- Check if Wazuh catches it
- If not: find a Sigma rule or write one
- Convert the Sigma rule to Wazuh format
- Deploy and re-test
- Document in VECTR
Each iteration makes your detection coverage stronger. Over weeks and months, you build a comprehensive defense validated by actual testing.
VECTR: Tracking and Measuring Results
Running tests is useless if you don’t track the results. VECTR by Security Risk Advisors is a free platform that records every purple team test and measures your detection coverage over time.
What VECTR Tracks
- Test cases — individual ATT&CK techniques tested
- Detection status — detected, partially detected, not detected, or blocked
- Tools involved — which SIEM rule, EDR alert, or other tool caught it
- Campaigns — group tests into logical exercises (e.g., “APT29 simulation Q1 2026”)
- Trends — coverage improvement over time
Why Metrics Matter
“We did a purple team exercise” means nothing to a CISO. “We tested 47 ATT&CK techniques across 5 tactics. Our detection rate improved from 34% to 71% over 3 months” — that’s a story that gets budget approved.
Quick Setup
# VECTR runs as Docker containersgit clone https://github.com/SecurityRiskAdvisors/VECTR.gitcd VECTR# Follow the install guide for Docker Compose setupdocker compose up -d
# Access at https://localhost:8081Putting It All Together: Your First Exercise
Here’s a step-by-step plan for your first purple team exercise using only free tools:
Prerequisites (1-2 hours)
- Target VM — Windows 10/11 with Sysmon installed and Wazuh agent reporting to your Wazuh server
- Attack VM — Kali or any Linux with PowerShell Core and Invoke-AtomicRedTeam
- Wazuh server — Docker or dedicated VM (4GB RAM minimum)
- VECTR — Docker on any machine
The Exercise (4-6 hours)
Phase 1: Scope (30 min)
- Pick 5 ATT&CK techniques based on your threat model
- Create a campaign in VECTR
- Open ATT&CK Navigator and create a blank layer
Phase 2: Baseline (1 hour)
- Run each Atomic test without any custom detection rules
- Record what Wazuh catches out of the box
- Mark results in VECTR: green (detected), red (missed)
Phase 3: Fix Gaps (2-3 hours)
- For each missed technique, search the Sigma repository
- Convert matching Sigma rules to Wazuh format
- Deploy the new rules and restart Wazuh
- Re-run the Atomic tests
Phase 4: Document (30 min)
- Update VECTR with final results
- Update ATT&CK Navigator heatmap
- Screenshot the before/after coverage comparison
Phase 5: Report (30 min)
- Export VECTR metrics
- Note which techniques are still undetected and why
- Plan next exercise focusing on remaining gaps
Expected Results
A typical first exercise with 5 techniques:
- Before: 1-2 detected out of the box (20-40%)
- After: 4-5 detected with Sigma rules (80-100%)
- Time invested: One afternoon
- Cost: $0
Advanced Tips
Automate with Caldera
Once you’re comfortable with manual testing, set up Caldera to run adversary profiles on a schedule. Deploy agents on test VMs and let Caldera execute weekly simulations. Compare Wazuh alerts against Caldera’s operation log to find new gaps.
Build a Detection Rule Library
Every Sigma rule you write or customize becomes part of your organization’s detection library. Store them in a Git repository with CI/CD that automatically deploys to Wazuh when you merge a pull request.
Map to Real Threat Intelligence
Use threat intelligence reports to identify which APT groups target your industry. Load their ATT&CK techniques into Navigator and prioritize testing those specific techniques.
Integrate with Your EDR Solution
Purple teaming isn’t limited to SIEM. Run the same Atomic tests and check if your EDR catches them independently. This reveals overlaps and gaps between your security layers.
What You Can Do Today
- Install Invoke-AtomicRedTeam on a test machine and run your first test — it takes 5 minutes
- Deploy Wazuh with Docker if you don’t have a SIEM — the quick start guide gets you running in 30 minutes
- Browse the Sigma repository on GitHub — find 3 rules relevant to your environment and convert them
- Create an ATT&CK Navigator layer for your organization — even an empty one gives you a starting point
- Schedule a 4-hour block with your red and blue team members for your first exercise
Purple teaming doesn’t require expensive tools or dedicated teams. It requires a mindset: test what you think you detect, fix what you don’t, and measure the improvement. Every tool in this guide is free. The only investment is your time — and it’s the highest-ROI security activity you can do.
Related Posts
- Antivirus vs EDR vs XDR — What’s the real difference in 2026? — Understanding the detection layers purple teaming validates
- What It Really Takes to Become a True SOC Professional — The skills that make purple team exercises effective
- The Digital Parasite: How Attacker Tradecraft Evolved in 2026 — Real-world TTPs you should test against
- C2 Without Owning C2: When Attackers Use Your Trusted Services — A technique category worth including in your purple team scope
- 218 Million Reasons to Worry: What Honeypot Data Reveals — Threat data that informs which techniques to prioritize