IR 380: STIX Threat Intelligence (35 pts extra)

What You Need for This Project


To examine the STIX format and use an online visualizer to explore open-source threat intelligence.

Introducing STIX

In a Web browser, go to

Read the description of STIX, as shown below.

Structure of a STIX File

In a Web browser, go to

There are three objects, with types of indicator, malware, relationship, outlined in green in the image below.

The indicator has a pattern that can be used to detect this event, a URL in this case.

The malware has a malware_types property indicating its action, and a kill_chain_phase property indicating when an attacker uses it.

The relationship connects the indicator to the malware.

Using the Visualizer

In a Web browser, go to

In the second field, paste in this URL, as shown below:

Click the Fetch button.

The STIX information appears in an interactive manner that is easier to read, as shown below.

IR 380.1: Threat Actor Type (10 pts)

Examine this STIX file in the visualizer.
The flag is covered by a green rectangle in the image below.

IR 380.1: APT1 (10 pts)

Examine this STIX file in the visualizer.
This is a big chart from the original APT1, the 2010 report from Mandiant that shocked the world and launched the modern field of Incident Response.

Find these flags. Each flag is worth 5 pts.

  • IR 380.2 Examine the attack-pattern "Initial Compromise" and find APT1’s most commonly used technique.
  • IR 380.3 Examine the tool "gsecdump". What is its Tool Types value?
  • IR 380.4 Examine the identity "JackWang". What is his email address?
  • IR 380.5 Examine the FQDN indicators. Which one ends in .net? The flag is that FQDN.

Posted 10-7-21
JSON URL fixed 11-1-21