mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-30 02:37:17 +00:00
Merge pull request #749 from Mathieu4141/threat-actors/fix-naikon-cluster
[threat actors] Fix threat actors related to Lotus Panda
This commit is contained in:
commit
6b137ea12c
4 changed files with 80 additions and 180 deletions
|
@ -1215,13 +1215,6 @@
|
||||||
],
|
],
|
||||||
"type": "similar"
|
"type": "similar"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"dest-uuid": "f26144c5-8593-4e78-831a-11f6452d809b",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"dest-uuid": "f047ee18-7985-4946-8bfb-4ed754d3a0dd",
|
"dest-uuid": "f047ee18-7985-4946-8bfb-4ed754d3a0dd",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
@ -1414,13 +1407,6 @@
|
||||||
],
|
],
|
||||||
"type": "similar"
|
"type": "similar"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"dest-uuid": "f26144c5-8593-4e78-831a-11f6452d809b",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"dest-uuid": "fb261c56-b80e-43a9-8351-c84081e7213d",
|
"dest-uuid": "fb261c56-b80e-43a9-8351-c84081e7213d",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
|
|
@ -9232,13 +9232,6 @@
|
||||||
],
|
],
|
||||||
"type": "uses"
|
"type": "uses"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"dest-uuid": "f26144c5-8593-4e78-831a-11f6452d809b",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"dest-uuid": "fb261c56-b80e-43a9-8351-c84081e7213d",
|
"dest-uuid": "fb261c56-b80e-43a9-8351-c84081e7213d",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
@ -18420,13 +18413,6 @@
|
||||||
],
|
],
|
||||||
"type": "uses"
|
"type": "uses"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"dest-uuid": "f26144c5-8593-4e78-831a-11f6452d809b",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"dest-uuid": "ff6caf67-ea1f-4895-b80e-4bb0fc31c6db",
|
"dest-uuid": "ff6caf67-ea1f-4895-b80e-4bb0fc31c6db",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
|
|
@ -805,23 +805,27 @@
|
||||||
"https://www.fireeye.com/blog/threat-research/2014/03/spear-phishing-the-news-cycle-apt-actors-leverage-interest-in-the-disappearance-of-malaysian-flight-mh-370.html",
|
"https://www.fireeye.com/blog/threat-research/2014/03/spear-phishing-the-news-cycle-apt-actors-leverage-interest-in-the-disappearance-of-malaysian-flight-mh-370.html",
|
||||||
"https://www.cfr.org/interactive/cyber-operations/apt-30",
|
"https://www.cfr.org/interactive/cyber-operations/apt-30",
|
||||||
"https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07205555/TheNaikonAPT-MsnMM1.pdf",
|
"https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07205555/TheNaikonAPT-MsnMM1.pdf",
|
||||||
|
"https://usa.kaspersky.com/resource-center/threats/naikon-targeted-attacks",
|
||||||
"https://blog.trendmicro.com/trendlabs-security-intelligence/bkdr_rarstone-new-rat-to-watch-out-for/",
|
"https://blog.trendmicro.com/trendlabs-security-intelligence/bkdr_rarstone-new-rat-to-watch-out-for/",
|
||||||
"https://securelist.com/the-chronicles-of-the-hellsing-apt-the-empire-strikes-back/69567/",
|
|
||||||
"https://threatconnect.com/blog/tag/naikon/",
|
"https://threatconnect.com/blog/tag/naikon/",
|
||||||
"https://attack.mitre.org/groups/G0019/",
|
"https://attack.mitre.org/groups/G0019/",
|
||||||
"https://www.secureworks.com/research/threat-profiles/bronze-geneva"
|
"https://www.secureworks.com/research/threat-profiles/bronze-geneva",
|
||||||
|
"https://cyware.com/news/chinese-naikon-group-back-with-new-espionage-attack-66a8413d",
|
||||||
|
"https://cluster25.io/2022/04/29/lotus-panda-awake-last-strike/",
|
||||||
|
"https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/eagle-eye-is-back-apt30/",
|
||||||
|
"https://www2.fireeye.com/rs/fireye/images/rpt-apt30.pdf",
|
||||||
|
"https://attack.mitre.org/wiki/Group/G0013",
|
||||||
|
"https://www.mandiant.com/sites/default/files/2021-09/rpt-apt30.pdf"
|
||||||
],
|
],
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
"PLA Unit 78020",
|
"PLA Unit 78020",
|
||||||
"APT 30",
|
"OVERRIDE PANDA",
|
||||||
"APT30",
|
|
||||||
"Override Panda",
|
|
||||||
"Camerashy",
|
"Camerashy",
|
||||||
"APT.Naikon",
|
|
||||||
"Lotus Panda",
|
|
||||||
"Hellsing",
|
|
||||||
"BRONZE GENEVA",
|
"BRONZE GENEVA",
|
||||||
"G0019"
|
"G0019",
|
||||||
|
"APT30",
|
||||||
|
"BRONZE STERLING",
|
||||||
|
"G0013"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"related": [
|
"related": [
|
||||||
|
@ -839,13 +843,6 @@
|
||||||
],
|
],
|
||||||
"type": "similar"
|
"type": "similar"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"dest-uuid": "f26144c5-8593-4e78-831a-11f6452d809b",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"dest-uuid": "f047ee18-7985-4946-8bfb-4ed754d3a0dd",
|
"dest-uuid": "f047ee18-7985-4946-8bfb-4ed754d3a0dd",
|
||||||
"tags": [
|
"tags": [
|
||||||
|
@ -891,12 +888,12 @@
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
"Spring Dragon",
|
"Spring Dragon",
|
||||||
"ST Group",
|
"ST Group",
|
||||||
"Esile",
|
|
||||||
"DRAGONFISH",
|
"DRAGONFISH",
|
||||||
"BRONZE ELGIN",
|
"BRONZE ELGIN",
|
||||||
"ATK1",
|
"ATK1",
|
||||||
"G0030",
|
"G0030",
|
||||||
"Red Salamander"
|
"Red Salamander",
|
||||||
|
"LOTUS PANDA"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"related": [
|
"related": [
|
||||||
|
@ -911,50 +908,6 @@
|
||||||
"uuid": "32fafa69-fe3c-49db-afd4-aac2664bcf0d",
|
"uuid": "32fafa69-fe3c-49db-afd4-aac2664bcf0d",
|
||||||
"value": "Lotus Blossom"
|
"value": "Lotus Blossom"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"meta": {
|
|
||||||
"attribution-confidence": "50",
|
|
||||||
"country": "CN",
|
|
||||||
"refs": [
|
|
||||||
"http://www.crowdstrike.com/blog/rhetoric-foreshadows-cyber-activity-in-the-south-china-sea/"
|
|
||||||
],
|
|
||||||
"synonyms": [
|
|
||||||
"Elise"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"related": [
|
|
||||||
{
|
|
||||||
"dest-uuid": "2a158b0a-7ef8-43cb-9985-bf34d1e12050",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"dest-uuid": "2f1fd017-9df6-4759-91fb-e7039609b5ff",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"dest-uuid": "f26144c5-8593-4e78-831a-11f6452d809b",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"dest-uuid": "f047ee18-7985-4946-8bfb-4ed754d3a0dd",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"uuid": "5e0a7cf2-6107-4d5f-9dd0-9df38b1fcba8",
|
|
||||||
"value": "Lotus Panda"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"description": "We have investigated their intrusions since 2013 and have been battling them nonstop over the last year at several large telecommunications and technology companies. The determination of this China-based adversary is truly impressive: they are like a dog with a bone.\nHURRICANE PANDA's preferred initial vector of compromise and persistence is a China Chopper webshell – a tiny and easily obfuscated 70 byte text file that consists of an ‘eval()’ command, which is then used to provide full command execution and file upload/download capabilities to the attackers. This script is typically uploaded to a web server via a SQL injection or WebDAV vulnerability, which is often trivial to uncover in a company with a large external web presence.\nOnce inside, the adversary immediately moves on to execution of a credential theft tool such as Mimikatz (repacked to avoid AV detection). If they are lucky to have caught an administrator who might be logged into that web server at the time, they will have gained domain administrator credentials and can now roam your network at will via ‘net use’ and ‘wmic’ commands executed through the webshell terminal.",
|
"description": "We have investigated their intrusions since 2013 and have been battling them nonstop over the last year at several large telecommunications and technology companies. The determination of this China-based adversary is truly impressive: they are like a dog with a bone.\nHURRICANE PANDA's preferred initial vector of compromise and persistence is a China Chopper webshell – a tiny and easily obfuscated 70 byte text file that consists of an ‘eval()’ command, which is then used to provide full command execution and file upload/download capabilities to the attackers. This script is typically uploaded to a web server via a SQL injection or WebDAV vulnerability, which is often trivial to uncover in a company with a large external web presence.\nOnce inside, the adversary immediately moves on to execution of a credential theft tool such as Mimikatz (repacked to avoid AV detection). If they are lucky to have caught an administrator who might be logged into that web server at the time, they will have gained domain administrator credentials and can now roam your network at will via ‘net use’ and ‘wmic’ commands executed through the webshell terminal.",
|
||||||
"meta": {
|
"meta": {
|
||||||
|
@ -1184,16 +1137,8 @@
|
||||||
"cfr-type-of-incident": "Espionage",
|
"cfr-type-of-incident": "Espionage",
|
||||||
"country": "CN",
|
"country": "CN",
|
||||||
"refs": [
|
"refs": [
|
||||||
"https://securelist.com/analysis/publications/69567/the-chronicles-of-the-hellsing-apt-the-empire-strikes-back/",
|
|
||||||
"https://www.cfr.org/interactive/cyber-operations/hellsing",
|
"https://www.cfr.org/interactive/cyber-operations/hellsing",
|
||||||
"https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-august-goblin-panda/",
|
"https://securelist.com/the-chronicles-of-the-hellsing-apt-the-empire-strikes-back/69567/"
|
||||||
"https://securelist.com/cycldek-bridging-the-air-gap/97157/",
|
|
||||||
"https://www.fortinet.com/blog/threat-research/cta-security-playbook--goblin-panda.html"
|
|
||||||
],
|
|
||||||
"synonyms": [
|
|
||||||
"Goblin Panda",
|
|
||||||
"Conimes",
|
|
||||||
"Cycldek"
|
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "af482dde-9e47-48d5-9cb2-cf8f6d6303d3",
|
"uuid": "af482dde-9e47-48d5-9cb2-cf8f6d6303d3",
|
||||||
|
@ -3540,77 +3485,6 @@
|
||||||
"uuid": "f3179cfb-9c86-4980-bd6b-e4fa74adaaa7",
|
"uuid": "f3179cfb-9c86-4980-bd6b-e4fa74adaaa7",
|
||||||
"value": "ProjectSauron"
|
"value": "ProjectSauron"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"description": "APT 30 is a threat group suspected to be associated with the Chinese government. While Naikon shares some characteristics with APT30, the two groups do not appear to be exact matches.",
|
|
||||||
"meta": {
|
|
||||||
"attribution-confidence": "50",
|
|
||||||
"cfr-suspected-state-sponsor": "China",
|
|
||||||
"cfr-suspected-victims": [
|
|
||||||
"India",
|
|
||||||
"Saudi Arabia",
|
|
||||||
"Vietnam",
|
|
||||||
"Myanmar",
|
|
||||||
"Singapore",
|
|
||||||
"Thailand",
|
|
||||||
"Malaysia",
|
|
||||||
"Cambodia",
|
|
||||||
"China",
|
|
||||||
"Phillipines",
|
|
||||||
"South Korea",
|
|
||||||
"United States",
|
|
||||||
"Indonesia",
|
|
||||||
"Laos"
|
|
||||||
],
|
|
||||||
"cfr-target-category": [
|
|
||||||
"Government",
|
|
||||||
"Private sector"
|
|
||||||
],
|
|
||||||
"cfr-type-of-incident": "Espionage",
|
|
||||||
"country": "CN",
|
|
||||||
"refs": [
|
|
||||||
"https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/eagle-eye-is-back-apt30/",
|
|
||||||
"https://www2.fireeye.com/rs/fireye/images/rpt-apt30.pdf",
|
|
||||||
"https://attack.mitre.org/wiki/Group/G0013",
|
|
||||||
"https://www.cfr.org/interactive/cyber-operations/apt-30"
|
|
||||||
],
|
|
||||||
"synonyms": [
|
|
||||||
"APT30",
|
|
||||||
"G0013"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"related": [
|
|
||||||
{
|
|
||||||
"dest-uuid": "2a158b0a-7ef8-43cb-9985-bf34d1e12050",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"dest-uuid": "2f1fd017-9df6-4759-91fb-e7039609b5ff",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"dest-uuid": "5e0a7cf2-6107-4d5f-9dd0-9df38b1fcba8",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"dest-uuid": "f047ee18-7985-4946-8bfb-4ed754d3a0dd",
|
|
||||||
"tags": [
|
|
||||||
"estimative-language:likelihood-probability=\"likely\""
|
|
||||||
],
|
|
||||||
"type": "similar"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"uuid": "f26144c5-8593-4e78-831a-11f6452d809b",
|
|
||||||
"value": "APT 30"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"description": "TA530, who we previously examined in relation to large-scale personalized phishing campaigns",
|
"description": "TA530, who we previously examined in relation to large-scale personalized phishing campaigns",
|
||||||
"meta": {
|
"meta": {
|
||||||
|
@ -6378,11 +6252,12 @@
|
||||||
"https://www.cfr.org/interactive/cyber-operations/thrip",
|
"https://www.cfr.org/interactive/cyber-operations/thrip",
|
||||||
"https://www.symantec.com/blogs/threat-intelligence/thrip-hits-satellite-telecoms-defense-targets",
|
"https://www.symantec.com/blogs/threat-intelligence/thrip-hits-satellite-telecoms-defense-targets",
|
||||||
"https://attack.mitre.org/groups/G0076/",
|
"https://attack.mitre.org/groups/G0076/",
|
||||||
"https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf"
|
"https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf",
|
||||||
|
"https://cyberthreat.thalesgroup.com/sites/default/files/2022-05/THALES%20THREAT%20HANDBOOK%202022%20Light%20Version_1.pdf"
|
||||||
],
|
],
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
"LOTUS PANDA",
|
"G0076",
|
||||||
"G0076"
|
"ATK78"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "98be4300-a9ef-11e8-9a95-bb9221083cfc",
|
"uuid": "98be4300-a9ef-11e8-9a95-bb9221083cfc",
|
||||||
|
@ -6411,11 +6286,7 @@
|
||||||
"country": "PK",
|
"country": "PK",
|
||||||
"refs": [
|
"refs": [
|
||||||
"https://www.cfr.org/interactive/cyber-operations/stealth-mango-and-tangelo",
|
"https://www.cfr.org/interactive/cyber-operations/stealth-mango-and-tangelo",
|
||||||
"https://attack.mitre.org/groups/G0076"
|
"https://www.lookout.com/blog/stealth-mango"
|
||||||
],
|
|
||||||
"synonyms": [
|
|
||||||
"ATK78",
|
|
||||||
"G0076"
|
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"uuid": "f82b352e-a9f8-11e8-8be8-fbcf6eddd58c",
|
"uuid": "f82b352e-a9f8-11e8-8be8-fbcf6eddd58c",
|
||||||
|
@ -9859,6 +9730,40 @@
|
||||||
"uuid": "d58030e2-5673-4836-9aff-ab6d55da0bc0",
|
"uuid": "d58030e2-5673-4836-9aff-ab6d55da0bc0",
|
||||||
"value": "SLIME29"
|
"value": "SLIME29"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"description": "Goblin Panda is one of a handful of elite Chinese advanced persistent threat (APT) groups. Most Chinese APTs target the United States and NATO, but Goblin Panda focuses primarily on Southeast Asia.",
|
||||||
|
"meta": {
|
||||||
|
"attribution-confidence": "75",
|
||||||
|
"cfr-suspected-state-sponsor": "China",
|
||||||
|
"cfr-suspected-victims": [
|
||||||
|
"Malaysia",
|
||||||
|
"India",
|
||||||
|
"Indonesia",
|
||||||
|
"Japan",
|
||||||
|
"Philippines",
|
||||||
|
"Southeast Asia",
|
||||||
|
"South Korea",
|
||||||
|
"Vietnam"
|
||||||
|
],
|
||||||
|
"cfr-target-category": [
|
||||||
|
"Private Sector"
|
||||||
|
],
|
||||||
|
"country": "CN",
|
||||||
|
"refs": [
|
||||||
|
"https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-august-goblin-panda/",
|
||||||
|
"https://securelist.com/cycldek-bridging-the-air-gap/97157/",
|
||||||
|
"https://www.fortinet.com/blog/threat-research/cta-security-playbook--goblin-panda.html",
|
||||||
|
"https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf",
|
||||||
|
"https://cyberthreat.thalesgroup.com/sites/default/files/2022-05/THALES%20THREAT%20HANDBOOK%202022%20Light%20Version_1.pdf"
|
||||||
|
],
|
||||||
|
"synonyms": [
|
||||||
|
"Conimes",
|
||||||
|
"Cycldek"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "8d73715a-8bbd-4eaa-ae24-2f1b1c84cf21",
|
||||||
|
"value": "Goblin Panda"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"description": "Since 2018, security researchers tracked a financially-motivated cybercrime actor, TA558, targeting hospitality, travel, and related industries located in Latin America and sometimes North America, and western Europe. The actor sends malicious emails written in Portuguese, Spanish, and sometimes English. The emails use reservation-themed lures with business-relevant themes such as hotel room bookings. The emails may contain malicious attachments or URLs aiming to distribute one of at least 15 different malware payloads.",
|
"description": "Since 2018, security researchers tracked a financially-motivated cybercrime actor, TA558, targeting hospitality, travel, and related industries located in Latin America and sometimes North America, and western Europe. The actor sends malicious emails written in Portuguese, Spanish, and sometimes English. The emails use reservation-themed lures with business-relevant themes such as hotel room bookings. The emails may contain malicious attachments or URLs aiming to distribute one of at least 15 different malware payloads.",
|
||||||
"meta": {
|
"meta": {
|
||||||
|
@ -9870,5 +9775,5 @@
|
||||||
"value": "TA558"
|
"value": "TA558"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 241
|
"version": 242
|
||||||
}
|
}
|
||||||
|
|
|
@ -8526,7 +8526,30 @@
|
||||||
],
|
],
|
||||||
"uuid": "7d17dabf-a68e-4eda-a18f-26868ced8e73",
|
"uuid": "7d17dabf-a68e-4eda-a18f-26868ced8e73",
|
||||||
"value": "Microcin"
|
"value": "Microcin"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "The Esile campaign was named after certain strings found in the unpacked malware file that it sends out. All of the malware related to this campaign are detected as BKDR_ESILE variants.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.trendmicro.com/vinfo/de/security/news/cyber-attacks/esile-targeted-attack-campaign-hits-apac-governments",
|
||||||
|
"https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/esile"
|
||||||
|
],
|
||||||
|
"synonyms": [
|
||||||
|
"BKDR_ESILE"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"related": [
|
||||||
|
{
|
||||||
|
"dest-uuid": "32fafa69-fe3c-49db-afd4-aac2664bcf0d",
|
||||||
|
"tags": [
|
||||||
|
"estimative-language:likelihood-probability=\"likely\""
|
||||||
|
],
|
||||||
|
"type": "used-by"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 151
|
"uuid": "7d34ca56-ce69-465f-b8c8-ffd02c4b619d",
|
||||||
|
"value": "Esile"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"version": 152
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue