misp-circl-feed/feeds/circl/misp/56e7fbe0-55e4-4d2d-ac65-4b19950d210f.json

221 lines
9 KiB
JSON
Raw Normal View History

2023-04-21 13:25:09 +00:00
{
2023-06-14 17:31:25 +00:00
"type": "bundle",
"id": "bundle--56e7fbe0-55e4-4d2d-ac65-4b19950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-15T12:25:36.000Z",
"modified": "2016-03-15T12:25:36.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--56e7fbe0-55e4-4d2d-ac65-4b19950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-15T12:25:36.000Z",
"modified": "2016-03-15T12:25:36.000Z",
"name": "Potential SpamBots (2016-03-15)",
"published": "2016-03-15T12:57:13Z",
"object_refs": [
"indicator--56e7fc04-3aa0-4a38-b125-4cfc950d210f",
"indicator--56e7fc05-9144-4f36-a92d-4719950d210f",
"indicator--56e7fc05-aab4-4fe8-ab4e-4487950d210f",
"indicator--56e7fc05-1304-45ff-bc11-47a2950d210f",
"indicator--56e7fc06-ae90-4e8e-9383-4a66950d210f",
"indicator--56e7fc06-41fc-4faa-9a05-4709950d210f",
"indicator--56e7ff3f-585c-4de4-863c-4072950d210f"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"circl:incident-classification=\"system-compromise\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56e7fc04-3aa0-4a38-b125-4cfc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-15T12:11:48.000Z",
"modified": "2016-03-15T12:11:48.000Z",
"description": "Imported via the freetext import.",
"pattern": "[network-traffic:src_ref.type = 'ipv4-addr' AND network-traffic:src_ref.value = '182.65.96.201']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-15T12:11:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-src\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56e7fc05-9144-4f36-a92d-4719950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-15T12:11:49.000Z",
"modified": "2016-03-15T12:11:49.000Z",
"description": "Imported via the freetext import.",
"pattern": "[network-traffic:src_ref.type = 'ipv4-addr' AND network-traffic:src_ref.value = '115.250.105.20']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-15T12:11:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-src\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56e7fc05-aab4-4fe8-ab4e-4487950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-15T12:11:49.000Z",
"modified": "2016-03-15T12:11:49.000Z",
"description": "Imported via the freetext import.",
"pattern": "[network-traffic:src_ref.type = 'ipv4-addr' AND network-traffic:src_ref.value = '5.101.140.71']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-15T12:11:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-src\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56e7fc05-1304-45ff-bc11-47a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-15T12:11:49.000Z",
"modified": "2016-03-15T12:11:49.000Z",
"description": "Imported via the freetext import.",
"pattern": "[network-traffic:src_ref.type = 'ipv4-addr' AND network-traffic:src_ref.value = '180.215.249.37']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-15T12:11:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-src\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56e7fc06-ae90-4e8e-9383-4a66950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-15T12:11:50.000Z",
"modified": "2016-03-15T12:11:50.000Z",
"description": "Imported via the freetext import.",
"pattern": "[network-traffic:src_ref.type = 'ipv4-addr' AND network-traffic:src_ref.value = '182.58.172.236']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-15T12:11:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-src\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56e7fc06-41fc-4faa-9a05-4709950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-15T12:11:50.000Z",
"modified": "2016-03-15T12:11:50.000Z",
"description": "Imported via the freetext import.",
"pattern": "[network-traffic:src_ref.type = 'ipv4-addr' AND network-traffic:src_ref.value = '201.137.2.95']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-15T12:11:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-src\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56e7ff3f-585c-4de4-863c-4072950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-15T12:25:35.000Z",
"modified": "2016-03-15T12:25:35.000Z",
"description": "Imported via the freetext import.",
"pattern": "[network-traffic:src_ref.type = 'ipv4-addr' AND network-traffic:src_ref.value = '196.182.29.34']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-15T12:25:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-src\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
2023-04-21 13:25:09 +00:00
]
}