Skip to main content
DFIRLab
Research
Intel BriefingsThreat Actors
File AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab
Privacy Policy/RSS Feed/Sitemap

Security research, threat intelligence, and detection engineering.

© 2026 DFIR Lab. All rights reserved.

Wiki/Threat Intelligence

Threat Actor Profiling

The process of identifying, attributing, and documenting the tactics, techniques, infrastructure, and motivations of specific threat groups.

Definition

Threat actor profiling is the structured analysis and documentation of adversaries — nation-state groups, criminal organizations, hacktivist collectives, or individual attackers — based on observed campaigns, malware, infrastructure, and behavioral patterns. A profile aggregates known aliases and tracking names across intelligence vendors, attributed campaigns and incidents, targeted sectors and geographies, preferred initial access vectors and persistence mechanisms, malware families and tooling, command-and-control infrastructure patterns, and MITRE ATT&CK technique mappings. Profiling enables analysts to move from indicator-level analysis to adversary-level understanding.

Why It Matters

Understanding who is attacking — not just what indicators were observed — fundamentally changes how an organization responds and prepares. Knowing that a specific threat actor targets healthcare organizations using spear-phishing with macro-enabled documents allows defenders to harden the specific attack path before an incident occurs. During incident response, TTP-based actor matching can rapidly narrow attribution hypotheses, inform containment decisions, and predict likely lateral movement paths based on documented actor behavior. Shared threat actor intelligence also reduces duplicated analytical effort across the security community.

How It Works

Profiling begins with clustering — grouping malware samples, infrastructure, and TTPs that share unique characteristics (compile-time metadata, custom C2 protocols, infrastructure registration patterns) into a candidate actor. Analysts then correlate the cluster against existing public and private intelligence, vendor reports, and government advisories. MITRE ATT&CK provides a standardized taxonomy for documenting techniques, enabling cross-vendor comparison. Profiles are inherently probabilistic — attribution confidence varies based on available evidence and can be revised as new data emerges. Formal frameworks such as Diamond Model and Kill Chain complement ATT&CK by structuring adversary analysis across adversary, capability, infrastructure, and victim dimensions.

DFIR Platform

AI Triage

DFIR Lab publishes threat actor profiles at dfir-lab.ch/actors with daily AI-refreshed intelligence. Each profile includes aliases, targeted sectors, TTPs, malware families, IOCs, and MITRE ATT&CK mappings. Users can request new profiles via a public submission form. The AI Triage feature also performs TTP-based threat actor matching against observed indicators

View Documentation

Related Concepts

MITRE ATT&CK FrameworkThreat IntelligenceIndicators of Compromise

Try these concepts in practice

Free tier with 100 credits/month. No credit card needed.

Start Free