return while those with shots to the nose, engine, and mid-body were catastrophically damaged and unable to return.
Consider how this scenario translates to Red Teaming or security in general. Also consider what is known (and unknown) given information
from threat intelligence, current events, and indicators.
Appendix C Decomposing a Threat ExerciseDescriptionThis exercise walks through the process of decomposing a threat and threat scenario to build a threat profile. You will examine the Energetic Bear threat actor to develop a threat profile that can be used during a Red Team engagement.
Objectives1. Review the Energetic Bear threat actor’s TTPs.
2. Use the information to create a threat that is similar and can be used to support future
Red Team engagements. Complete
a threat profile template Exercise ScenarioA client has asked your Red Team to emulate a specific threat.
Specifically, they are interested in the attacks by Energetic Bear.
GoalThe goal of this exercise is to create a threat profile document using Energetic Bear for inspiration.
As a professional Red Team, you understand that emulating a specific threat
actor is not easy or feasible, and focusing on threat TTPs is more relevant. You will use research on Energetic Bear's
TTPs to build a custom threat profile that is technically feasible and can be used to engage the client with a realistic threat.