Summary
In this chapter, you learned about the different categories of threat actors and the importance of knowing your adversaries and their capacities to have a better level of contextual understanding when responding to an incident.
You learned how to analyze threat profiles from different sources and the basic concepts of the STIX and TAXII standards.
You also learned how to start documenting a threat actor's profile report using VS Code, the Markup language, and the VSCode ATT&CK extension.
In the next chapter, you will learn about the different stages of an attack using the Cyber Kill Chain model, how to identify attacker TTPs using the MITRE ATT&CK framework, and how to create threat intelligence documentation for incident response.