This whitepaper examines APT threats actors and software relevant to OT attacks to understand tactics and techniques to attack the OT environment. Later, the paper also identifies security measures in which grid operators can focus their efforts to protect against the more common techniques. This work can be used to create exercises for training and awareness activities, finetune attack paths in risk assessments, and select effective monitoring use cases.