misp-circl-feed/feeds/circl/misp/5d264c1b-a568-457e-82a3-be7a02de0b81.json

1 line
3.2 KiB
JSON
Raw Permalink Normal View History

2023-12-14 14:30:15 +00:00
{"Event": {"info": "OSINT - Sea Turtle keeps on swimming, finds new victims, DNS hijacking techniques", "Tag": [{"colour": "#0088cc", "exportable": true, "name": "misp-galaxy:threat-actor=\"Sea Turtle\""}, {"colour": "#004646", "exportable": true, "name": "type:OSINT"}, {"colour": "#0071c3", "exportable": true, "name": "osint:lifetime=\"perpetual\""}, {"colour": "#0087e8", "exportable": true, "name": "osint:certainty=\"50\""}, {"colour": "#ffffff", "exportable": true, "name": "tlp:white"}], "publish_timestamp": "0", "timestamp": "1562791111", "analysis": "0", "Attribute": [{"comment": "", "category": "External analysis", "uuid": "5d264c2e-5254-415f-83bc-c64f02de0b81", "timestamp": "1562790958", "to_ids": false, "value": "https://blog.talosintelligence.com/2019/07/sea-turtle-keeps-on-swimming.html#more", "disable_correlation": false, "object_relation": null, "type": "link"}, {"comment": "", "category": "Network activity", "uuid": "5d264c71-67d8-468b-b4fb-498202de0b81", "timestamp": "1562791025", "to_ids": true, "value": "95.179.131.225", "disable_correlation": false, "object_relation": null, "type": "ip-dst"}, {"comment": "", "category": "Network activity", "uuid": "5d264c71-15f4-479f-b9e9-498202de0b81", "timestamp": "1562791025", "to_ids": true, "value": "140.82.58.253", "disable_correlation": false, "object_relation": null, "type": "ip-dst"}, {"comment": "", "category": "Network activity", "uuid": "5d264c71-7638-43a8-816f-498202de0b81", "timestamp": "1562791025", "to_ids": true, "value": "95.179.156.61", "disable_correlation": false, "object_relation": null, "type": "ip-dst"}, {"comment": "", "category": "Network activity", "uuid": "5d264c93-6474-48b0-9d95-831902de0b81", "timestamp": "1562791059", "to_ids": true, "value": "185.64.105.100", "disable_correlation": false, "object_relation": null, "type": "ip-dst"}, {"comment": "", "category": "Network activity", "uuid": "5d264c93-2b40-48d8-95ad-831902de0b81", "timestamp": "1562791059", "to_ids": true, "value": "178.17.167.51", "disable_correlation": false, "object_relation": null, "type": "ip-dst"}, {"comment": "", "category": "Network activity", "uuid": "5d264c93-626c-4b2f-bf91-831902de0b81", "timestamp": "1562791059", "to_ids": true, "value": "196.29.187.100", "disable_correlation": false, "object_relation": null, "type": "ip-dst"}, {"comment": "", "category": "Network activity", "uuid": "5d264c93-9784-46d5-a187-831902de0b81", "timestamp": "1562791059", "to_ids": true, "value": "188.226.192.35", "disable_correlation": false, "object_relation": null, "type": "ip-dst"}, {"comment": "", "category": "Network activity", "uuid": "5d264ca1-5254-4780-ada2-447d02de0b81", "timestamp": "1562791073", "to_ids": true, "value": "45.32.100.62", "disable_correlation": false, "object_relation": null, "type": "ip-dst"}, {"comment": "", "category": "Network activity", "uuid": "5d264cb4-34f4-4cbc-9910-47be02de0b81", "timestamp": "1562791092", "to_ids": true, "value": "95.179.150.101", "disable_correlation": false, "object_relation": null, "type": "ip-dst"}], "extends_uuid": "", "published": false, "date": "2019-07-10", "Orgc": {"uuid": "55f6ea5e-2c60-40e5-964f-47a8950d210f", "name": "CIRCL"}, "threat_level_id": "3", "uuid": "5d264c1b-a568-457e-82a3-be7a02de0b81"}}