Template created as part of Ondra Rojcik’s TI Essentials article: “A guide to Threat Actor Profiling: A deliverable-first approach” | April 9, 2026 | feedly.com/ti-essentials/
(Markdown version below)
Document Cut-off Date: [YYYY-MM-DD]
[High-level overview of the findings and most critical risk posed by this actor]
Group name and aliases: [Primary names (e.g., APT29) and associated sub-groups or rebrands] Internal Tracking ID: [Single primary identifier used to normalize disparate vendor names] Actor Type: [e.g. cybercrime, state-sponsored espionage, hacktivist, ransomware affiliate]
Motive: [Financial gain, political/ideological, or thrill-seeking] Objective: [Specific goal that a threat actor aims to achieve through an attack: steal sensitive data, disrupt a network or service, gain unauthorized access to a system etc.]
Sector: [Economic sectors targeted, e.g., NACE/NAICS codes] Geography: [Specific regions or nations targeted] Tech Stack: [Targeted software, e.g., unpatched VPNs or SCADA controllers] Intent/Proximity: [Proximity of TA’s targeting to your organisation: direct, competitors, industry, opportunistic]
Classification and Description: [High, Moderate, or Low capability; general description of the capability and resources] Technical Skills: [Description of skill level and resource availability] Tooling Maturity: [Proprietary zero-days vs. commodity/public tools]
Known Campaigns & Operations [High-level description of the modus operandi of the most relevant campaigns and operations.] **Intrusion Kill Chain Sequence:
Prediction (What’s Next?): [Assessment of the actor's likely next actions] Implications (So What?): [Business and operational impact analysis] Recommendations (Now What?): [Guidance required to mitigate the threat]