Youssef Moukadem

Cybersecurity Enthusiast | Computer Science Graduate | Cloud Enthusiast | Lifelong Learner

View on GitHub

đź§© Diamond Model of Intrusion Analysis

Overview

In this case study, I explored the Diamond Model of Intrusion Analysis, a framework that provides a structured way to understand and communicate about cyber intrusions. Developed by Sergio Caltagirone, Andrew Pendergast, and Christopher Betz (2013), the Diamond Model connects key components of an intrusion event to help analysts visualize the relationships between threat actors, their tools, and their victims.


đź§  What I Did

I began by studying the core structure of the Diamond Model, which is built around four fundamental features:

These four nodes form the “diamond,” with relationships represented by the edges. The framework helps visualize how the attacker interacts with their tools and targets, and how those relationships evolve during an intrusion.

I explored how the model introduces two axes for context:


đź§© Breaking Down the Components

Adversary

I learned that an adversary is not always a single hacker but can represent multiple roles:

Understanding this distinction helps analysts assess intent, persistence, and adaptability.
Through exercises, I identified these roles in simulated attacks and learned how intelligence analysts can use collected indicators to link campaigns back to specific threat actors.


Victim

Next, I studied how the model classifies victims into:

I saw how this framework helps analysts trace the adversary’s intent — whether they aim to steal data, disrupt operations, or infiltrate a specific sector.


Capability

In this part, I analyzed capability, which covers the adversary’s tools, malware, and techniques.

I learned two key subcomponents:

By reviewing case data, I recognized how mapping out an adversary’s arsenal (like malware families or exploit kits) can show how their sophistication evolves over time.


Infrastructure

Here, I explored the systems used to launch or manage attacks.
The model distinguishes between:

Through examples like malicious domains, C2 servers, and compromised email accounts, I learned how these infrastructure layers support the attack lifecycle and how analysts use DNS or IP analysis to uncover them.


⚙️ Meta Features

The Diamond Model also includes six meta-features that add analytical depth:

I learned how these features allow analysts to document intrusions systematically, making them easier to share and compare across incidents.


🕵️‍♂️ Practice Analysis

Finally, I completed the interactive diamond analysis exercise.
Using the provided case study, I analyzed a simulated intrusion involving a ransomware attack:

After filling in all sections, the flag displayed was:


🎯 What I Learned

This exercise gave me a stronger understanding of structured intrusion analysis.
I learned how to:

In summary, I discovered how the Diamond Model acts as a bridge between raw incident data and actionable intelligence, making it a valuable framework for any security analyst or threat hunter.