Adversary Playbooks are an attempt to capture the complete collection of tools, techniques, and procedures that adversaries use to achieve their goals, arrayed in a logical sequence using the Lockheed Martin Cyber Kill Chain. If the cybersecurity community and network defenders have access to these playbooks, they can make their defensive actions more effective and impose increased costs on our adversaries. The Cyber Threat Alliance is committed to sharing actionable intelligence that can be used to create Adversary Playbooks. Since our cyber adversaries adapt very rapidly, CTA also automates the sharing and updating of this intelligence.
This page serves as a resource for the cybersecurity community with useful tools for creating Adversary Playbooks and links to the Playbooks created by our members. If you have any questions or feedback, please contact us at email@example.com.
Enter the name of an Adversary Group or Threat Actor. CTA members with an Adversary Playbook associated with that Actor or Group will be highlighted on the right. Hover over the member’s name to find links to Adversary Playbooks and to blog posts (when available) describing the activity.
Search and Filter
Palo Alto Networks