About This Deck
What This Is
Threat Intelligence Tarot is an educational tool for information security practitioners. Each card in the deck represents a real threat actor group, drawn from MITRE ATT&CK and documented threat intelligence reports.
The tarot format is deliberate. Real threat intelligence is dense and technical: easy to ignore, hard to internalize. Packaging it as a card game makes it memorable, shareable, and impossible to scroll past. The mystical framing is aesthetics. The threat data is real.
The Deck
The full 78-card deck maps directly to tarot structure:
How to Use It
- ◆Draw a Card: random adversary from the full deck. Flip to reveal their TTPs, targets, and defenses.
- ◆Three-Card Spread: draw Past, Present, and Future threat actors. Get a reading of your threat landscape with shared TTPs and priority defenses across all three.
- ◆Card of the Day: seed-based daily adversary. Same card for everyone on a given day, refreshes at midnight.
- ◆Gallery: browse all 78 cards. Filter by threat category, suit, or origin country. Search by group name, alias, technique ID, or targeted sector.
- ◆Technique Explorer: view all MITRE ATT&CK techniques across the full deck, grouped by tactic, ranked by prevalence, with a kill-chain distribution chart.
- ◆Defense Index: discover which security controls defend against the most adversaries. Ranked by cross-deck coverage to help prioritize controls with the broadest impact.
- ◆ATT&CK Navigator Export: from any card or daily page, download a Navigator v5 layer file pre-loaded with that adversary's techniques. Import directly into ATT&CK Navigator for deeper analysis.
- ◆Threat Brief: copy a clean markdown adversary profile to your clipboard. Paste into reports, Confluence, or security awareness materials.
Reading a Card
Each card shows the group's tarot identity, real group name and aliases, active years, origin, and risk level. Below that: the sectors they target, their MITRE ATT&CK techniques with a kill-chain coverage heatmap (click any technique ID to open the full MITRE reference), notable operations, and specific defensive recommendations.
The Reversed Meaning section (borrowed from tarot tradition) documents the group's known failures, operational security mistakes, and the circumstances that led to their exposure or disruption.
Data Sources
Threat actor data is drawn from MITRE ATT&CK, public government advisories (CISA, NSA, FBI, NCSC), and documented security research from Mandiant, CrowdStrike, Kaspersky, Citizen Lab, and others. All information is publicly available. Flavor text and reversed meanings are creative interpretations; threat data is factual.