CG
SkillsProfiling Threat Actor Groups
Start Free
Back to Skills Library
Threat Intelligence๐ŸŸก Intermediate

Profiling Threat Actor Groups

Develops comprehensive threat actor profiles for APT groups, criminal organizations, and hacktivist collectives by aggregating TTP documentation, historical campaign data, tooling fingerprints, and attribution indicators from multiple intelligence sources.

4 min read1 code examples

Prerequisites

  • Access to MITRE ATT&CK Groups database (https://attack.mitre.org/groups/)
  • Commercial threat intelligence subscription (Mandiant Advantage, CrowdStrike Falcon Intelligence, or Recorded Future)
  • Sector-specific ISAC membership for targeted intelligence (FS-ISAC, H-ISAC, E-ISAC)
  • Structured profile template (see workflow below)

Profiling Threat Actor Groups

When to Use

Use this skill when:

  • Updating the organization's threat model with profiles of adversary groups recently observed targeting your sector
  • Preparing an executive briefing on APT groups that align with geopolitical events affecting your business
  • Enabling SOC analysts to understand attacker objectives and TTPs to improve detection tuning

Do not use this skill for real-time incident attribution โ€” attribution during active incidents should be deprioritized in favor of containment. Profile refinement occurs post-incident.

Prerequisites

  • Access to MITRE ATT&CK Groups database (https://attack.mitre.org/groups/)
  • Commercial threat intelligence subscription (Mandiant Advantage, CrowdStrike Falcon Intelligence, or Recorded Future)
  • Sector-specific ISAC membership for targeted intelligence (FS-ISAC, H-ISAC, E-ISAC)
  • Structured profile template (see workflow below)

Workflow

Step 1: Identify Relevant Threat Actors

Cross-reference your organization's sector, geography, and technology stack against known adversary targeting patterns. Sources:

  • MITRE ATT&CK Groups: 130+ documented nation-state and criminal groups with TTP mappings
  • CrowdStrike Annual Threat Report: adversary naming by nation-state (BEAR=Russia, PANDA=China, KITTEN=Iran, CHOLLIMA=North Korea)
  • Mandiant M-Trends: annual report with sector-specific targeting statistics
  • CISA Known Exploited Vulnerabilities (KEV) catalog: identifies vulnerabilities actively exploited by specific threat actors

Shortlist 5โ€“10 groups most likely to target your organization based on sector alignment and recent activity.

Step 2: Collect Profile Data

For each adversary, document across standard dimensions:

Identity: ATT&CK Group ID (e.g., G0016 for APT29), aliases (Cozy Bear, The Dukes, Midnight Blizzard), suspected nation-state sponsor

Motivations: Espionage, financial gain, disruption, intellectual property theft

Targeting: Sectors, geographies, organization sizes, technology targets (OT/IT, cloud, supply chain)

Capabilities: Custom malware (e.g., APT29's SUNBURST, MiniDuke), exploitation of 0-days vs. known CVEs, supply chain attack capability

Campaign History: Notable operations with dates (SolarWinds 2020, Exchange Server 2021, etc.)

TTPs by ATT&CK Phase: Document top 5 techniques per tactic phase

Step 3: Map TTPs to ATT&CK

Using mitreattack-python:

from mitreattack.stix20 import MitreAttackData

mitre = MitreAttackData("enterprise-attack.json")
apt29 = mitre.get_object_by_attack_id("G0016", "groups")
techniques = mitre.get_techniques_used_by_group(apt29)

profile = {}
for item in techniques:
    tech = item["object"]
    tid = tech["external_references"][0]["external_id"]
    tactic = [p["phase_name"] for p in tech.get("kill_chain_phases", [])]
    profile[tid] = {"name": tech["name"], "tactics": tactic}

Step 4: Assess Detection Coverage Against Profile

Compare the adversary's technique list against your detection coverage matrix (from ATT&CK Navigator layer). Identify:

  • Techniques used by this group where you have no detection (critical gaps)
  • Techniques where you have partial coverage (logging but no alerting)
  • Compensating controls where detection is not feasible (network segmentation as mitigation for lateral movement)

Step 5: Package Profile for Distribution

Structure the final profile for different audiences:

  • Executive summary (1 page): Who, motivation, recent campaigns, top risk to our organization, recommended priority actions
  • SOC analyst brief (3โ€“5 pages): Full TTP list with detection status, IOC list, hunt hypotheses
  • Technical appendix: YARA rules, Sigma detections, STIX JSON object for TIP import

Classify TLP:AMBER for internal distribution; seek ISAC approval before external sharing.

Key Concepts

TermDefinition
APTAdvanced Persistent Threat โ€” well-resourced, sophisticated adversary (typically nation-state or sophisticated criminal) conducting long-term targeted operations
TTPsTactics, Techniques, Procedures โ€” behavioral fingerprint of an adversary group, more durable than IOCs which change frequently
AliasesThreat actors receive different names from different vendors (APT29 = Cozy Bear = The Dukes = Midnight Blizzard = YTTRIUM)
AttributionProcess of associating an attack with a specific threat actor; requires multiple independent corroborating data points and carries inherent uncertainty
ClusterA group of related intrusion activity that may or may not be attributable to a single actor; used when attribution is uncertain
Intrusion SetSTIX SDO type representing a grouped set of adversarial behaviors with common objectives, even if actor identity is unknown

Tools & Systems

  • MITRE ATT&CK Groups: Free, community-maintained database of 130+ documented adversary groups with referenced campaign reports
  • Mandiant Advantage Threat Intelligence: Commercial platform with detailed APT profiles, malware families, and campaign analysis
  • CrowdStrike Falcon Intelligence: Commercial feed with adversary-centric profiles and real-time attribution updates
  • Recorded Future Threat Intelligence: Combines OSINT, dark web, and technical intelligence for adversary profiling
  • OpenCTI: Graph-based visualization of threat actor relationships, tooling, and campaign linkages

Common Pitfalls

  • IOC-centric profiles: Building profiles around IP addresses and domains rather than TTPs means the profile becomes stale within weeks as infrastructure rotates.
  • Vendor alias confusion: Conflating two different threat actor groups due to shared malware or infrastructure leads to incorrect threat model assumptions.
  • Binary attribution: Treating attribution as certain when it is probabilistic. Always qualify attribution confidence level (Low/Medium/High).
  • Neglecting insider and criminal groups: Overemphasis on nation-state APTs while ignoring ransomware groups (Cl0p, LockBit, ALPHV) which represent higher probability threats for most organizations.
  • Profile staleness: Adversary TTPs evolve. Profiles not updated quarterly may miss technique changes, new malware, or targeting shifts.

Verification Criteria

Confirm successful execution by validating:

  • [ ] All prerequisite tools and access requirements are satisfied
  • [ ] Each workflow step completed without errors
  • [ ] Output matches expected format and contains expected data
  • [ ] No security warnings or misconfigurations detected
  • [ ] Results are documented and evidence is preserved for audit

Compliance Framework Mapping

This skill supports compliance evidence collection across multiple frameworks:

  • SOC 2: CC7.1 (Monitoring), CC7.2 (Anomaly Detection)
  • ISO 27001: A.6.1 (Threat Intelligence), A.16.1 (Security Incident Management)
  • NIST 800-53: PM-16 (Threat Awareness), RA-3 (Risk Assessment), SI-5 (Security Alerts)
  • NIST CSF: ID.RA (Risk Assessment), DE.AE (Anomalies & Events)

Claw GRC Tip: When this skill is executed by a registered agent, compliance evidence is automatically captured and mapped to the relevant controls in your active frameworks.

Deploying This Skill with Claw GRC

Agent Execution

Register this skill with your Claw GRC agent for automated execution:

# Install via CLI
npx claw-grc skills add profiling-threat-actor-groups

# Or load dynamically via MCP
grc.load_skill("profiling-threat-actor-groups")

Audit Trail Integration

When executed through Claw GRC, every step of this skill generates tamper-evident audit records:

  • SHA-256 chain hashing ensures no step can be modified after execution
  • Evidence artifacts (configs, scan results, logs) are automatically attached to relevant controls
  • Trust score impact โ€” successful execution increases your agent's trust score

Continuous Compliance

Schedule this skill for recurring execution to maintain continuous compliance posture. Claw GRC monitors for drift and alerts when re-execution is needed.

Use with Claw GRC Agents

This skill is fully compatible with Claw GRC's autonomous agent system. Deploy it to any registered agent via MCP, and every execution will be logged in the tamper-evident audit trail.

// Load this skill in your agent
npx claw-grc skills add profiling-threat-actor-groups
// Or via MCP
grc.load_skill("profiling-threat-actor-groups")

Tags

MITRE-ATT&CKthreat-actorAPTCrowdStrikeMandiantattributionkill-chainNIST-CSF

Related Skills

Threat Intelligence

Analyzing Cyber Kill Chain

4mยทintermediate
Threat Intelligence

Hunting Advanced Persistent Threats

4mยทadvanced
Threat Intelligence

Building Threat Actor Profile from OSINT

6mยทintermediate
Threat Intelligence

Executing Diamond Model Analysis

4mยทintermediate
Threat Intelligence

Mapping MITRE ATT&CK Techniques

3mยทintermediate
Threat Intelligence

Analyzing Campaign Attribution Evidence

3mยทintermediate

Skill Details

Domain
Threat Intelligence
Difficulty
intermediate
Read Time
4 min
Code Examples
1

On This Page

When to UsePrerequisitesWorkflowKey ConceptsTools & SystemsCommon PitfallsVerification CriteriaCompliance Framework MappingDeploying This Skill with Claw GRC

Deploy This Skill

Add this skill to your Claw GRC agent and start automating.

Get Started Free โ†’