Threat Actor Profile
High APT
Description

Ferocious Kitten is a threat group that has primarily targeted Persian-speaking individuals in Iran since at least 2015.(Citation: Kaspersky Ferocious Kitten Jun 2021)

Confidence Score
90%
Known Aliases
Ferocious Kitten
Tags
mitre-attack stix-2.1 intrusion-set
First Seen

Unknown

Last Updated

Unknown

Active Status
Active
Created

April 29, 2026

MITRE ATT&CK Techniques (6)
T1036.002 - Right-to-Left Override
Defense Evasion
T1036.005 - Match Legitimate Resource Name or Locat…
Defense Evasion
T1204.002 - Malicious File
Execution
T1566.001 - Spearphishing Attachment
Initial Access
T1583.001 - Domains
Resource Development
T1588.002 - Tool
Resource Development
Indicators of Compromise

Loading IOCs…

IOC KQL for Sentinel
STIX Data
{'aliases': ['Ferocious Kitten'],
 'created': '2021-09-28T17:41:12.950Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': '[Ferocious Kitten](https://attack.mitre.org/groups/G0137) is '
                'a threat group that has primarily targeted Persian-speaking '
                'individuals in Iran since at least 2015.(Citation: Kaspersky '
                'Ferocious Kitten Jun 2021)',
 'external_references': [{'external_id': 'G0137',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/groups/G0137'},
                         {'description': 'GReAT. (2021, June 16). Ferocious '
                                         'Kitten: 6 Years of Covert '
                                         'Surveillance in Iran. Retrieved '
                                         'September 22, 2021.',
                          'source_name': 'Kaspersky Ferocious Kitten Jun 2021',
                          'url': 'https://securelist.com/ferocious-kitten-6-years-of-covert-surveillance-in-iran/102806/'}],
 'id': 'intrusion-set--6566aac9-dad8-4332-ae73-20c23bad7f02',
 'modified': '2025-04-25T14:49:38.455Z',
 'name': 'Ferocious Kitten',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'spec_version': '2.1',
 'type': 'intrusion-set',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_contributors': ['Pooja Natarajan, NEC Corporation India',
                          'Manikantan Srinivasan, NEC Corporation India',
                          'Hiroki Nagahama, NEC Corporation'],
 'x_mitre_deprecated': False,
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_version': '1.0'}
Quick Actions
Related TTPs (6)
Right-to-Left Override
Defense Evasion

Match Legitimate Resource Nam…
Defense Evasion

Malicious File
Execution

Spearphishing Attachment
Initial Access

Domains
Resource Development