The Diamond Model of intrusion analysis: a practitioner's guide to structured threat intelligence

Información clave

  • The Diamond Model maps every intrusion as four interconnected features — adversary, capability, infrastructure, and victim — enabling relationship-driven analysis that linear frameworks miss.
  • Seven formal axioms and extended meta-features give the model theoretical depth, but most guides skip them entirely, leaving practitioners with an incomplete understanding.
  • Combining the Diamond Model with the cyber kill chain and MITRE ATT&CK provides relational, temporal, and behavioral analysis in a single workflow.
  • The 2025 Cisco Talos extended Diamond Model adds a fifth Relationship Layer for multi-actor campaigns like ransomware-as-a-service handoffs.
  • A six-step pivot-and-populate workflow transforms a single indicator of compromise into a comprehensive threat picture.

Every intrusion tells a story — one with characters, tools, staging grounds, and targets. The challenge for security teams is reading that story quickly enough to act on it. The Diamond Model of intrusion analysis gives analysts a structured vocabulary for doing exactly that. First published as a research paper through the Defense Technical Information Center in 2013, the framework has become a cornerstone of cybersecurity frameworks education and a staple of certifications including CompTIA Security+ (SY0-701), CySA+ (CS0-003), and EC-Council CEH. This guide walks through the model's four core components, its deeper theoretical foundations, and how practitioners apply it to real incidents — including extensions no competitor covers.

What is the Diamond Model of intrusion analysis?

The Diamond Model of intrusion analysis is a formal framework that describes every cyber intrusion event as four interconnected features — adversary, capability, infrastructure, and victim — arranged in a diamond shape to enable structured, relationship-driven threat intelligence analysis. It was introduced by Sergio Caltagirone, Andrew Pendergast, and Christopher Betz in their original 2013 research paper (PDF).

The core premise is straightforward. Rather than treating intrusions as isolated alerts, the Diamond Model forces analysts to ask four questions about every event. Who is the adversary? What capabilities did they use? What infrastructure supported the operation? And who or what was the victim? The relationships between these four features — not just the features themselves — are where the analytical power lives.

This relational approach sets the Diamond Model apart from sequential frameworks like the cyber kill chain. Where the kill chain describes attack phases in order, the Diamond Model captures the web of connections within each phase. Both perspectives matter, which is why most mature security teams use them together.

The Diamond Model appears in CompTIA CySA+ certification prep and Security+ curricula, making it essential knowledge for analysts at every career stage.

The four core components of the Diamond Model

Every Diamond Model event revolves around four features, each occupying a vertex of the diamond.

  • Adversary. The threat actor or group responsible for the intrusion. This can range from a named APT group to an unknown actor identified only by behavioral patterns. In many cases, the adversary vertex starts empty and gets populated through analysis.
  • Capability. The tools, techniques, and malware the adversary uses. This includes exploit code, custom backdoors, living-off-the-land binaries, and social engineering tactics. Capabilities map directly to MITRE ATT&CK techniques.
  • Infrastructure. The physical or logical resources that deliver capabilities or maintain command and control. This encompasses C2 servers, domain names, email addresses, compromised websites, and cloud services. Infrastructure is often the most observable feature and the best starting point for pivoting.
  • Victim. The target of the intrusion — whether an organization, a specific system, a person, or a dataset. Victim profiling helps analysts understand targeting patterns and predict future attacks.

Understanding feature relationships and edges

The four features connect through six edges, and these relationships are what make the Diamond Model analytically powerful. The adversary-infrastructure edge reveals which resources an actor controls. The capability-victim edge shows how specific tools affect specific targets. The infrastructure-victim edge exposes delivery mechanisms.

Each edge is bidirectional, enabling analysts to pivot from any known feature to discover unknowns. If you know the infrastructure (a C2 domain), you can traverse the infrastructure-adversary edge to identify who operates it, or the infrastructure-capability edge to find what tools communicate with it. This pivoting technique transforms isolated indicators of compromise into connected intelligence.

Figure: The Diamond Model's four features (adversary, capability, infrastructure, victim) connected by six bidirectional edges form the basis of structured intrusion analysis.

Advanced concepts: axioms, meta-features, and activity threading

Most introductory guides stop at the four features. The Diamond Model's deeper theoretical foundations — axioms, meta-features, and activity threading — are what make it a rigorous analytical framework rather than a simple diagram.

The seven axioms of the Diamond Model

The original paper establishes seven formal axioms that govern how the model works.

  1. Axiom 1 (Event axiom). For every intrusion event, an adversary takes a step toward an intended goal by using a capability over infrastructure against a victim to produce a result.
  2. Axiom 2 (Ordering). Every intrusion event exists within an ordered sequence, and the adversary must perform earlier steps before later ones.
  3. Axiom 3 (Directionality). Every capability and infrastructure element has a direction, either toward the victim (offense) or from the adversary (enabling).
  4. Axiom 4 (Completeness). A fully described intrusion event populates all four features, though analysts may only know a subset at any given time.
  5. Axiom 5 (Adversary group). An adversary is a set of adversary personas, each possibly operating under different identities.
  6. Axiom 6 (Capability completeness). Every adversary has a finite set of capabilities, each requiring specific infrastructure.
  7. Axiom 7 (Infrastructure reuse). Infrastructure is shared, reused, or repurposed across intrusions, creating opportunities for correlation.

Axiom 7 is especially important for practitioners. Infrastructure reuse is one of the most reliable ways to link seemingly unrelated events to the same adversary or campaign.

Meta-features: the socio-political and technology axes

Beyond the four core features, the Diamond Model defines meta-features that add contextual depth.

The socio-political axis captures the relationship between adversary and victim, describing motivations such as nation-state espionage, financially motivated crime, or hacktivism. This axis helps analysts understand why an advanced persistent threat targets specific organizations.

The technology axis connects capability and infrastructure, describing how technical tools interact with supporting resources — protocol types, encryption methods, and communication channels.

Additional meta-features include timestamp, phase (mapping to kill chain stages), result (success or failure), direction, methodology, and resources. Together, these turn each diamond event into a rich analytical record.

Table: Diamond Model meta-features extend core analysis with contextual dimensions.

Meta-feature Definición Ejemplo Analytical value
Timestamp When the event occurred 2026-01-15T03:42:00Z Establishes temporal patterns and operational tempo
Fase Kill chain stage of the event Movimiento lateral Connects Diamond Model to sequential analysis
Resultado Outcome of the event Credentials harvested Tracks adversary progress toward objectives
Direction Adversary-to-victim or victim-to-adversary Inbound C2 beacon Clarifies communication flow for detection
Metodología Category of activity phishing Groups events by tradecraft for clustering
Recursos Assets required to execute Zero-day exploit, VPN access Assesses adversary investment and sophistication

Activity threading and activity groups

Individual diamond events rarely occur in isolation. Activity threading connects related events chronologically, using kill chain phases to order them into a coherent narrative. A single thread might trace initial access through lateral movement to data exfiltration — each step represented as its own diamond event, linked by shared features.

Activity groups take this further by clustering multiple activity threads that share adversary, capability, or infrastructure features. When several threads point to the same C2 infrastructure or use the same custom backdoor, analysts can group them into a campaign attributed to a single adversary. This scales the Diamond Model from single-event analysis to campaign-level intelligence.

Framework comparison: Diamond Model vs cyber kill chain vs MITRE ATT&CK

The Diamond Model does not replace other frameworks. It complements them. Understanding where each framework excels helps analysts choose the right lens for the problem at hand.

Table: Comparing the three major threat intelligence frameworks.

Marco Enfoque Strength Ideal para
Modelo Diamante Relational (who, what, where, against whom) Connecting features and pivoting between unknowns Attribution, campaign mapping, threat actor profiling
Cyber kill chain Temporal (sequential phases) Identifying attack progression and defensive gaps Incident timeline reconstruction, defensive gap analysis
MITRE ATT&CK Behavioral (specific TTPs) Granular technique cataloging with detection guidance Detection engineering, threat-informed defense, red teaming

MITRE ATT&CK v18 now includes 216 techniques, 475 sub-techniques, and 172 tracked groups, making it the most granular framework. But granularity alone does not reveal relationships. The Diamond Model's adversary feature maps to ATT&CK groups, and its capability feature maps to ATT&CK techniques — creating a natural integration point.

Using all three frameworks together

Consider a spear-phishing campaign targeting a financial institution. The kill chain sequences the phases: reconocimiento, weaponization, delivery, exploitation, installation, command and control, actions on objectives. The Modelo Diamante maps the relational structure within each phase: the adversary (nation-state group), capability (custom loader), infrastructure (compromised WordPress sites), and victim (bank's treasury department). ATT&CK provides the granular technique IDs - T1566.001 for spear-phishing attachment, T1059.001 for PowerShell execution, T1071.001 for web-protocol C2.

Together, the three frameworks give analysts a complete picture: what happened (ATT&CK), in what order (kill chain), and who was connected to what (Diamond Model).

Applying the Diamond Model to an incident

The Diamond Model's real value emerges in structured incident analysis. Here is a six-step workflow that turns a single indicator into a comprehensive threat picture.

  1. Identify the intrusion event. Start with a confirmed alert — a suspicious domain, a malware hash, or an anomalous login. This is your seed indicator.
  2. Populate known features. Place what you know into the diamond. A malware hash populates the capability vertex. A C2 domain populates infrastructure. Assign the victim based on the affected system.
  3. Pivot through edges. Use known features to discover unknowns. Query threat intelligence platforms for other domains hosted on the same IP (infrastructure-to-infrastructure). Search for other samples that contact the same C2 (capability-to-infrastructure). This is where the Diamond Model earns its value.
  4. Add meta-features. Record the timestamp, determine the kill chain phase, note the result (success or failure), and assess the socio-political motivation if known.
  5. Thread related events. Connect this diamond event to previous and subsequent events involving shared features. Build the chronological narrative.
  6. Group activity threads. When multiple threads share adversary signatures, infrastructure, or unique capabilities, group them into an activity group — your emerging campaign attribution.

Table: Step-by-step Diamond Model analysis workflow.

Pivoting techniques for feature discovery

Pivoting is the analytical engine of the Diamond Model. Start with your strongest indicator and traverse edges systematically. If you have a domain (infrastructure), check passive DNS for IP history, then check those IPs for other domains. Cross-reference domains against threat hunting feeds. Each pivot populates new features and often reveals additional events for threading.

The key discipline is documentation. Every pivot should be recorded so the analysis is reproducible and can be shared with other analysts during incident response.

The Diamond Model in practice

Case study: ToyMaker and Cactus ransomware (2025)

The Cisco Talos ToyMaker initial access broker analysis demonstrates both the basic Diamond Model and its extended Relationship Layer.

  • Adversary: ToyMaker (initial access broker, financially motivated) and Cactus (ransomware operator)
  • Capability: LAGTOY backdoor, credential harvesting tools, double-extortion ransomware
  • Infrastructure: Compromised internet-facing systems, dedicated C2 infrastructure
  • Victim: Organizations with vulnerable public-facing applications
  • Relationship Layer: "Handover from" ToyMaker to Cactus approximately one month after initial access

This case exemplifies why the traditional four-feature model needed extension. ToyMaker and Cactus are distinct adversaries with separate capabilities, but the handoff between them — the relationship — is what makes the campaign dangerous. The Cisco Talos extended Diamond Model methodology adds this fifth Relationship Layer to capture ransomware as a service dynamics.

Case study: SolarWinds supply chain attack

The SolarWinds breach remains one of the most cited Diamond Model case studies, analyzed in a peer-reviewed paper on ResearchGate.

  • Adversary: Russian SVR (APT29/Cozy Bear)
  • Capability: SUNBURST backdoor embedded in SolarWinds Orion updates
  • Infrastructure: Compromised software supply chain distribution, dedicated C2 domains
  • Victim: 200+ organizations including U.S. government agencies

The Diamond Model's relational approach proved more suitable than the linear kill chain for this case, where multiple victim categories and a complex supply chain required mapping connections rather than sequences.

Table: Diamond Model applied to real-world intrusions.

Case Adversary Capacidad Infrastructure Victim
ToyMaker/Cactus (2025) ToyMaker IAB + Cactus RaaS LAGTOY backdoor, double extortion Compromised public-facing apps, C2 servers Orgs with vulnerable internet-facing systems
SolarWinds (2020) APT29 (Russian SVR) SUNBURST backdoor Compromised Orion update supply chain 200+ orgs including U.S. government

According to the IBM X-Force 2026 Threat Intelligence Index, active ransomware groups surged 49% in 2025 (109 distinct groups, up from 73 in 2024), with 54–58 groups active per month in early 2026. This ecosystem fragmentation makes the Diamond Model's activity threading essential for distinguishing and tracking proliferating groups.

Tools and software for Diamond Model implementation

Several platforms support Diamond Model workflows. ThreatConnect — co-founded by Diamond Model co-author Andy Pendergast — natively incorporates the framework. MISP and OpenCTI provide open-source alternatives with entity relationship modeling. Custom spreadsheet and diagramming templates remain common in smaller teams. Integration with STIX/TAXII standards enables automated threat intelligence sharing using Diamond Model structures.

Advantages and limitations of the Diamond Model

Table: Diamond Model strengths and limitations for threat intelligence teams.

Advantages Limitaciones
Structured relational analysis enables systematic pivoting Four-feature simplification may miss nuance in complex intrusions
Vendor-neutral and complementary to other frameworks Attribution challenges persist, especially with false flag operations
Activity threading scales from events to campaigns Requires mature data collection and analysis capabilities
Supports partial analysis (incomplete diamonds still valuable) Static per-event snapshot without threading extension
Common vocabulary improves team communication Resource-intensive for smaller teams without automation

Sources disagree on whether the Diamond Model's simplicity is a strength or limitation. ThreatConnect views it as enabling rapid analysis. Others argue it oversimplifies intrusions. The practitioner consensus resolves this by combining the Diamond Model with MITRE ATT&CK for TTP depth — preserving relational clarity while adding granular behavioral detail. This combined approach strengthens threat detection workflows across the SOC.

Tendencias futuras y consideraciones emergentes

The Diamond Model is not static. Several developments over the next 12–24 months will shape how organizations apply it.

The most significant evolution is the Cisco Talos Relationship Layer, published in May 2025. By adding relationship types like "purchased from," "handover from," and "leaked from," this extension addresses the growing complexity of ransomware as a service ecosystems where multiple adversaries collaborate across a single campaign. Expect additional threat intelligence vendors to adopt similar extensions as multi-actor operations become the norm.

AI-augmented threat intelligence is accelerating Diamond Model workflows. Automated entity correlation, pivoting, and activity threading across large datasets reduce the manual burden on analysts. According to the CyberProof 2026 Global Threat Intelligence Report, AI is now integrated into 80% of ransomware campaigns — meaning defenders need AI-assisted analysis tools to keep pace.

The "silent residency" trend identified in the Picus Red Report 2026 — a 38% drop in ransomware encryption paired with an 80% surge in evasion techniques — increases the importance of relational pivoting. When adversaries optimize for long-term stealth rather than immediate disruption, the Diamond Model's capability-infrastructure correlations become essential for detection.

Platform consolidation is also driving adoption. According to Recorded Future, 81% of security professionals plan to consolidate threat intelligence vendors in 2026. Structured frameworks like the Diamond Model provide a common analytical vocabulary across unified platforms, making consolidation more effective.

Organizations should prioritize investing in Diamond Model training alongside MITRE ATT&CK, adopting platforms that support relational threat analysis, and building activity threading into their standard SOC operations playbooks.

Modern approaches to threat intelligence analysis

Threat intelligence has evolved far beyond static IOC feeds. Today's practitioners combine structured frameworks with behavioral analytics, AI-driven detection, and automated correlation to keep pace with adversaries who share infrastructure and collaborate across organizational boundaries.

The Diamond Model remains foundational because its relational approach mirrors how modern attacks actually work — through connections between actors, tools, infrastructure, and targets. As network detection and response platforms observe attacker behaviors across hybrid environments, the same relational principles the Diamond Model codifies are what separate real threats from noise.

How Vectra AI thinks about structured threat analysis

Vectra AI's Attack Signal Intelligence approach aligns with the Diamond Model's philosophy of relational, behavior-driven analysis. By correlating attacker behaviors across the modern network — spanning cloud, identity, SaaS, and on-premises environments — Vectra AI operationalizes the same relational principles the Diamond Model codifies. Connecting adversary actions, capabilities, and infrastructure delivers signal, not noise, to the analysts who need it most.

Conclusión

The Diamond Model of intrusion analysis provides a structured, relationship-driven approach to understanding cyber intrusions that complements sequential and behavioral frameworks. Its four core features, seven axioms, and activity threading capabilities give analysts at every level — from certification candidates to senior threat intelligence practitioners — a rigorous methodology for turning isolated indicators into connected intelligence.

As threat landscapes grow more complex, with ransomware ecosystems fragmenting into dozens of collaborating groups and adversaries prioritizing stealth over disruption, the Diamond Model's relational analysis becomes more valuable, not less. The 2025 Cisco Talos Relationship Layer extension proves the framework continues to evolve with the threat landscape.

Start by applying the six-step workflow to your next incident. Populate what you know, pivot through the edges, and let the relationships guide you to what you do not yet know. For organizations looking to operationalize these principles at scale, explore how Vectra AI's platform delivers the same relational, behavior-driven analysis through Attack Signal Intelligence.

Fundamentos relacionados con la ciberseguridad

Preguntas frecuentes

What is the Diamond Model of intrusion analysis?

What are the four components of the Diamond Model?

How does the Diamond Model differ from the cyber kill chain?

What is the Diamond Model vs MITRE ATT&CK?

What are the seven axioms of the Diamond Model?

What certifications cover the Diamond Model?

What tools support Diamond Model analysis?