A cyber threat intelligence analysis model that defines relationship pairs among four core components, visualized in the shape of a diamond, of adversary playbook activity across the intrusion kill chain: (1) adversary, (2) adversary’s capability, (3) infrastructure used (or attacked), and (4) victim.