Skip to main content

How to Create a Threat Model for an Adversary Simulation


Objectiveโ€‹

Define a realistic and relevant threat model to guide a Red Team operation. A strong threat model ensures the engagement simulates credible adversaries, aligns with the client's industry risks, and validates their real-world security posture.


Prerequisitesโ€‹

  • Scoping and pre-engagement activities completed
  • Access to stakeholder input on business risk, industry, and past incidents
  • Familiarity with the MITRE ATT&CK framework and known APT profiles

Step-by-Step Instructionsโ€‹


๐Ÿง  1. Understand the Clientโ€™s Business and Risk Profileโ€‹

Start by identifying:

  • Industry vertical (e.g., healthcare, finance, manufacturing)
  • Threat exposure (e.g., ransomware, IP theft, insider risk)
  • Critical business functions (e.g., payment processing, ERP, customer portals)

๐Ÿ“Œ Ask: What kind of attacker keeps your CISO up at night?


๐Ÿ” 2. Select an Adversary Type to Emulateโ€‹

Choose a threat actor class that matches the clientโ€™s environment:

Adversary TypeDescription
Nation-state/APTLong-dwell, stealthy, highly capable (e.g., APT29, APT41)
CybercriminalRansomware, initial access brokers (e.g., FIN7, Conti)
Insider ThreatDisgruntled employees, contractors, third-party abuse
HacktivistPolitical or ideological actors, often target public-facing systems

Optionally choose a named threat group from MITRE or CTI feeds to build realism.


๐Ÿงฐ 3. Build a TTP Matrix Based on MITRE ATT&CKโ€‹

Use https://attack.mitre.org or Threat Intelligence reports to gather:

  • Initial Access: T1566.001 โ€“ Spearphishing Attachment
  • Execution: T1059 โ€“ Command and Scripting Interpreter
  • Credential Access: T1003 โ€“ OS Credential Dumping
  • Lateral Movement: T1021 โ€“ Remote Services
  • Exfiltration: T1041 โ€“ Exfil over C2 Channel

๐Ÿ“„ Deliverable: A table or matrix of selected techniques by phase.


๐Ÿง— 4. Align Objectives to the Threat Modelโ€‹

Translate the model into measurable goals:

  • โ€œCan we simulate data exfiltration from a dev share using stealthy C2?โ€
  • โ€œCan an attacker escalate from user-level access to domain admin?โ€
  • โ€œCan the Blue Team detect lateral movement from a compromised endpoint?โ€

Each tactic should tie back to:

  • A known adversary capability
  • A defensive detection/response control
  • A mission-critical business risk

๐Ÿ›ก๏ธ 5. Validate with Stakeholdersโ€‹

Walk through the threat model with:

  • Security leadership (to confirm realism)
  • Legal/compliance (to vet method legality)
  • IT and IR (optional for purple teaming or assumed breach setups)

๐Ÿ“Œ Tip: Ask for feedback on relevance, not technicality.


Example Template (Simplified)โ€‹

PhaseTacticTechnique IDTool/MethodJustification
Initial AccessPhishingT1566.002Macro-armed XLSXMatches APT29 behavior in industry X
ExecutionPowerShellT1059.001Obfuscated one-linerBypasses AppLocker and EDR
Priv EscToken ImpersonationT1134.001RubeusCommon in post-ex scenarios
Lateral MovementSMB Admin SharesT1021.002PsExecValid technique for domain move
ExfiltrationEncrypted Web TrafficT1041HTTPS C2 beaconMatches Conti RaaS TTPs

Summaryโ€‹

A good threat model is more than a checklist โ€” itโ€™s a tactical playbook backed by intelligence. It ensures Red Team operations are grounded in realism, relevance, and risk.

Use the model to guide tooling, shape payloads, and define victory โ€” not just emulate attackers, but out-think them.