Disclaimer: These examples are illustrative and not intended for production use.
Copyright is reserved by the respective owners.
STIX is able to encode threat intelligence related to APT1 (.zip) for the rich set of Threat Actors, TTPs and Indicators listed in the original report.
Note that the conversion is not exhaustive. Technical indicators listed in the original appendices were generated using the Python scripting interface.
Another utility was used to convert the resulting XML files to HTML.
A STIX version of intelligence related to use of Poison Ivy (.zip) was created based on the original report.
This conversion process was similar to the APT1 example.
The following rules were used to convert the report:
TTP
Variant
to the relevant Threat Actor
TTP
TTP
Course of Action
Campaign
and Threat Actor