Source: Feedly Blog
Author: Ondra Rojčík
URL: https://feedly.com/ti-essentials/posts/a-guide-to-threat-actor-profiling-a-deliverable-first-approach
ONE SENTENCE SUMMARY:
Deliverable-first threat actor profiling uses 5W1H, the Diamond Model, graded sources, and audience tailoring to produce actionable intelligence.
MAIN POINTS:
- Threat actor profiles unify IOCs, TTPs, motives, and trends into one analytical entity.
- Clarifying “tracking” versus “incident-driven” intent determines scope, depth, and usefulness.
- Internal tracking prioritizes structured telemetry over narrative implications and recommendations.
- Incident-driven profiles emphasize timelines, extortion behavior, stakeholder updates, and decisions support.
- 5W1H frames core questions, ensuring complete narrative coverage of adversary activity.
- Diamond Model maps Adversary, Infrastructure, Capability, and Victim to explain operations.
- Collection should combine internal telemetry with external intelligence for context and linkage.
- Admiralty Code improves transparency by scoring source reliability and information credibility.
- Profiling should include identity, victimology, capability, modus operandi, and activity timeline.
- Tailored deliverables add forecast, implications, recommendations, references, executive BLUF, and cut-off date.
TAKEAWAYS:
- Starting with the intended deliverable prevents building an unused library of disconnected data.
- Mixing 5W1H with the Diamond Model converts observations into an evolving operational picture.
- Traceable sourcing and explicit confidence scoring make assessments defensible to stakeholders.
- Separating technical evidence from narrative analysis helps SOC/IR act without losing context.
- Audience-specific outputs and a clear cut-off date keep intelligence consumable and time-relevant.