450 lines
182 KiB
JSON
450 lines
182 KiB
JSON
|
{
|
||
|
"type": "bundle",
|
||
|
"id": "bundle--5a329d19-03e0-4eaa-8b4d-4310950d210f",
|
||
|
"objects": [
|
||
|
{
|
||
|
"type": "identity",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-01-13T03:00:52.000Z",
|
||
|
"modified": "2018-01-13T03:00:52.000Z",
|
||
|
"name": "CIRCL",
|
||
|
"identity_class": "organization"
|
||
|
},
|
||
|
{
|
||
|
"type": "report",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "report--5a329d19-03e0-4eaa-8b4d-4310950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-01-13T03:00:52.000Z",
|
||
|
"modified": "2018-01-13T03:00:52.000Z",
|
||
|
"name": "OSINT - Attackers Deploy New ICS Attack Framework \u00e2\u20ac\u0153TRITON\u00e2\u20ac\u009d and Cause Operational Disruption to Critical Infrastructure",
|
||
|
"published": "2018-02-16T08:45:42Z",
|
||
|
"object_refs": [
|
||
|
"x-misp-attribute--5a329d36-5584-4ad4-9110-9267950d210f",
|
||
|
"observed-data--5a329d83-6bcc-4736-b576-2965950d210f",
|
||
|
"url--5a329d83-6bcc-4736-b576-2965950d210f",
|
||
|
"indicator--5a329e18-c1bc-42ab-a0ce-4ec9950d210f",
|
||
|
"observed-data--5a32a070-b0a4-474f-9bfc-ff9b950d210f",
|
||
|
"file--5a32a070-b0a4-474f-9bfc-ff9b950d210f",
|
||
|
"artifact--5a32a070-b0a4-474f-9bfc-ff9b950d210f",
|
||
|
"indicator--5a329e5c-3c30-4479-8f9f-2a67950d210f",
|
||
|
"indicator--5a329e91-1290-4a62-b508-4925950d210f",
|
||
|
"indicator--5a329eba-7948-4b75-91de-2b04950d210f",
|
||
|
"indicator--5a329eeb-e7ac-4084-9454-4bec950d210f",
|
||
|
"indicator--5a329f19-9c64-4780-b20c-9267950d210f",
|
||
|
"indicator--5a329f4f-cdac-4595-a728-2b04950d210f",
|
||
|
"indicator--5a329f96-7da4-43bc-9c4d-2b05950d210f",
|
||
|
"indicator--5a32a014-88ac-4798-8647-2b04950d210f",
|
||
|
"indicator--5a32a032-9bc0-4803-8608-2d89950d210f",
|
||
|
"indicator--5ecdb8e9-1d4c-4890-91cf-4afba4c0dfc5",
|
||
|
"x-misp-object--d48d9e02-0841-488c-bdb3-76402d3e6543",
|
||
|
"relationship--74f5bd64-cade-4b87-9ad3-1b6d3f28fef2",
|
||
|
"relationship--605f0a41-cbfe-4565-a155-f80aed792600"
|
||
|
],
|
||
|
"labels": [
|
||
|
"Threat-Report",
|
||
|
"misp:tool=\"MISP-STIX-Converter\"",
|
||
|
"circl:topic=\"industry\"",
|
||
|
"veris:asset:variety=\"S - SCADA\""
|
||
|
],
|
||
|
"object_marking_refs": [
|
||
|
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "x-misp-attribute",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "x-misp-attribute--5a329d36-5584-4ad4-9110-9267950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-12-14T16:10:04.000Z",
|
||
|
"modified": "2017-12-14T16:10:04.000Z",
|
||
|
"labels": [
|
||
|
"misp:type=\"text\"",
|
||
|
"misp:category=\"External analysis\"",
|
||
|
"osint:source-type=\"blog-post\"",
|
||
|
"osint:certainty=\"93\""
|
||
|
],
|
||
|
"x_misp_category": "External analysis",
|
||
|
"x_misp_type": "text",
|
||
|
"x_misp_value": "Mandiant recently responded to an incident at a critical infrastructure organization where an attacker deployed malware designed to manipulate industrial safety systems. The targeted systems provided emergency shutdown capability for industrial processes. We assess with moderate confidence that the attacker was developing the capability to cause physical damage and inadvertently shutdown operations. This malware, which we call TRITON, is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers. We have not attributed the incident to a threat actor, though we believe the activity is consistent with a nation state preparing for an attack.\r\n\r\nTRITON is one of a limited number of publicly identified malicious software families targeted at industrial control systems (ICS). It follows Stuxnet which was used against Iran in 2010 and Industroyer which we believe was deployed by Sandworm Team against Ukraine in 2016. TRITON is consistent with these attacks, in that it could prevent safety mechanisms from executing their intended function, resulting in a physical consequence."
|
||
|
},
|
||
|
{
|
||
|
"type": "observed-data",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "observed-data--5a329d83-6bcc-4736-b576-2965950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-12-14T16:10:04.000Z",
|
||
|
"modified": "2017-12-14T16:10:04.000Z",
|
||
|
"first_observed": "2017-12-14T16:10:04Z",
|
||
|
"last_observed": "2017-12-14T16:10:04Z",
|
||
|
"number_observed": 1,
|
||
|
"object_refs": [
|
||
|
"url--5a329d83-6bcc-4736-b576-2965950d210f"
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"link\"",
|
||
|
"misp:category=\"External analysis\"",
|
||
|
"osint:source-type=\"blog-post\"",
|
||
|
"osint:certainty=\"93\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "url",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "url--5a329d83-6bcc-4736-b576-2965950d210f",
|
||
|
"value": "https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html"
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5a329e18-c1bc-42ab-a0ce-4ec9950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-12-14T16:10:04.000Z",
|
||
|
"modified": "2017-12-14T16:10:04.000Z",
|
||
|
"pattern": "[rule TRITON_ICS_FRAMEWORK\r\n{\r\n meta:\r\n author = \"nicholas.carr @itsreallynick\"\r\n md5 = \"0face841f7b2953e7c29c064d6886523\"\r\n description = \"TRITON framework recovered during Mandiant ICS incident response\"\r\n strings:\r\n $python_compiled = \".pyc\" nocase ascii wide\r\n $python_module_01 = \"__module__\" nocase ascii wide\r\n $python_module_02 = \"<module>\" nocase ascii wide\r\n $python_script_01 = \"import Ts\" nocase ascii wide\r\n $python_script_02 = \"def ts_\" nocase ascii wide \r\n\r\n $py_cnames_01 = \"TS_cnames.py\" nocase ascii wide\r\n $py_cnames_02 = \"TRICON\" nocase ascii wide\r\n $py_cnames_03 = \"TriStation \" nocase ascii wide\r\n $py_cnames_04 = \" chassis \" nocase ascii wide \r\n\r\n $py_tslibs_01 = \"GetCpStatus\" nocase ascii wide\r\n $py_tslibs_02 = \"ts_\" ascii wide\r\n $py_tslibs_03 = \" sequence\" nocase ascii wide\r\n $py_tslibs_04 = /import Ts(Hi|Low|Base)[^:alpha:]/ nocase ascii wide\r\n $py_tslibs_05 = /module\\s?version/ nocase ascii wide\r\n $py_tslibs_06 = \"bad \" nocase ascii wide\r\n $py_tslibs_07 = \"prog_cnt\" nocase ascii wide \r\n\r\n $py_tsbase_01 = \"TsBase.py\" nocase ascii wide\r\n $py_tsbase_02 = \".TsBase(\" nocase ascii wide \r\n \r\n $py_tshi_01 = \"TsHi.py\" nocase ascii wide\r\n $py_tshi_02 = \"keystate\" nocase ascii wide\r\n $py_tshi_03 = \"GetProjectInfo\" nocase ascii wide\r\n $py_tshi_04 = \"GetProgramTable\" nocase ascii wide\r\n $py_tshi_05 = \"SafeAppendProgramMod\" nocase ascii wide\r\n $py_tshi_06 = \".TsHi(\" ascii nocase wide \r\n\r\n $py_tslow_01 = \"TsLow.py\" nocase ascii wide\r\n $py_tslow_02 = \"print_last_error\" ascii nocase wide\r\n $py_tslow_03 = \".TsLow(\" ascii nocase wide\r\n $py_tslow_04 = \"tcm_\" ascii wide\r\n $py_tslow_05 = \" TCM found\" nocase ascii wide \r\n\r\n $py_crc_01 = \"crc.pyc\" nocase ascii wide\r\n $py_crc_02 = \"CRC16_MODBUS\" ascii wide\r\n $py_crc_03 = \"Kotov Alaxander\" nocase ascii wide\r\n $py_crc_04 = \"CRC_CCITT_XMODEM\" ascii wide\r\n $py_crc_05 = \"crc16ret\" ascii wide\r\n $py_crc_06 = \"CRC16_CCITT_x1D0F\" ascii wide\r\n $py_crc_07 = /CRC16_CCITT[^_]/ ascii wide \r\n\r\n $py_sh_01 = \"sh.pyc\" nocase ascii wide \r\n\r\n $py_keyword_01 = \" FAILURE\" ascii wide\r\n $py_keyword_02 = \"symbol table\" nocase ascii wide \r\n\r\n $py_TRIDENT_01 = \"inject.bin\" ascii nocase wide\r\n $py_TRIDENT_02 = \"imain.bin\" ascii nocase wide \r\n\r\n condition:\r\n 2 of ($python_*) and 7 of ($py_*) and filesize < 3MB\r\n}]",
|
||
|
"pattern_type": "yara",
|
||
|
"valid_from": "2017-12-14T16:10:04Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Artifacts dropped"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"yara\"",
|
||
|
"misp:category=\"Artifacts dropped\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "observed-data",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "observed-data--5a32a070-b0a4-474f-9bfc-ff9b950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-12-14T16:10:04.000Z",
|
||
|
"modified": "2017-12-14T16:10:04.000Z",
|
||
|
"first_observed": "2017-12-14T16:10:04Z",
|
||
|
"last_observed": "2017-12-14T16:10:04Z",
|
||
|
"number_observed": 1,
|
||
|
"object_refs": [
|
||
|
"file--5a32a070-b0a4-474f-9bfc-ff9b950d210f",
|
||
|
"artifact--5a32a070-b0a4-474f-9bfc-ff9b950d210f"
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"attachment\"",
|
||
|
"misp:category=\"External analysis\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "file",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "file--5a32a070-b0a4-474f-9bfc-ff9b950d210f",
|
||
|
"name": "Fig4.png",
|
||
|
"content_ref": "artifact--5a32a070-b0a4-474f-9bfc-ff9b950d210f"
|
||
|
},
|
||
|
{
|
||
|
"type": "artifact",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "artifact--5a32a070-b0a4-474f-9bfc-ff9b950d210f",
|
||
|
"payload_bin": "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
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5a329e5c-3c30-4479-8f9f-2a67950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-12-19T09:03:23.000Z",
|
||
|
"modified": "2017-12-19T09:03:23.000Z",
|
||
|
"pattern": "[file:hashes.MD5 = '6c39c3f4a08d3d78f2eb973a94bd7718' AND file:hashes.SHA256 = 'e8542c07b2af63ee7e72ce5d97d91036c5da56e2b091aa2afe737b224305d230' AND file:name = 'trilog.exe' AND file:x_misp_state = 'Malicious']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-12-19T09:03:23Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "file"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:name=\"file\"",
|
||
|
"misp:meta-category=\"file\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5a329e91-1290-4a62-b508-4925950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-12-19T09:03:45.000Z",
|
||
|
"modified": "2017-12-19T09:03:45.000Z",
|
||
|
"pattern": "[file:hashes.MD5 = '437f135ba179959a580412e564d3107f' AND file:hashes.SHA256 = '08c34c6ac9186b61d9f29a77ef5e618067e0bc9fe85cab1ad25dc6049c376949' AND file:name = 'imain.bin' AND file:x_misp_state = 'Malicious']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-12-19T09:03:45Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "file"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:name=\"file\"",
|
||
|
"misp:meta-category=\"file\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5a329eba-7948-4b75-91de-2b04950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-12-19T09:05:58.000Z",
|
||
|
"modified": "2017-12-19T09:05:58.000Z",
|
||
|
"pattern": "[file:hashes.MD5 = '0544d425c7555dc4e9d76b571f31f500' AND file:hashes.SHA256 = '5fc4b0076eac7aa7815302b0c3158076e3569086c4c6aa2f71cd258238440d14' AND file:name = 'inject.bin' AND file:x_misp_state = 'Malicious']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-12-19T09:05:58Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "file"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:name=\"file\"",
|
||
|
"misp:meta-category=\"file\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5a329eeb-e7ac-4084-9454-4bec950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-12-19T09:06:36.000Z",
|
||
|
"modified": "2017-12-19T09:06:36.000Z",
|
||
|
"pattern": "[file:hashes.MD5 = '0face841f7b2953e7c29c064d6886523' AND file:hashes.SHA256 = 'bef59b9a3e00a14956e0cd4a1f3e7524448cbe5d3cc1295d95a15b83a3579c59' AND file:name = 'library.zip' AND file:x_misp_state = 'Malicious']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-12-19T09:06:36Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "file"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:name=\"file\"",
|
||
|
"misp:meta-category=\"file\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5a329f19-9c64-4780-b20c-9267950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-12-19T09:07:03.000Z",
|
||
|
"modified": "2017-12-19T09:07:03.000Z",
|
||
|
"pattern": "[file:hashes.MD5 = 'e98f4f3505f05bf90e17554fbc97bba9' AND file:hashes.SHA256 = '2c1d3d0a9c6f76726994b88589219cb8d9c39dd9924bc8d2d02bf41d955fe326' AND file:name = 'TS_cnames.pyc' AND file:x_misp_state = 'Malicious']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-12-19T09:07:03Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "file"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:name=\"file\"",
|
||
|
"misp:meta-category=\"file\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5a329f4f-cdac-4595-a728-2b04950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-12-19T09:07:32.000Z",
|
||
|
"modified": "2017-12-19T09:07:32.000Z",
|
||
|
"pattern": "[file:hashes.MD5 = '288166952f934146be172f6353e9a1f5' AND file:hashes.SHA256 = '1a2ab4df156ccd685f795baee7df49f8e701f271d3e5676b507112e30ce03c42' AND file:name = 'TsBase.pyc' AND file:x_misp_state = 'Malicious']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-12-19T09:07:32Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "file"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:name=\"file\"",
|
||
|
"misp:meta-category=\"file\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5a329f96-7da4-43bc-9c4d-2b05950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-12-19T09:07:51.000Z",
|
||
|
"modified": "2017-12-19T09:07:51.000Z",
|
||
|
"pattern": "[file:hashes.MD5 = '27c69aa39024d21ea109cc9c9d944a04' AND file:hashes.SHA256 = '758598370c3b84c6fbb452e3d7119f700f970ed566171e879d3cb41102154272' AND file:name = 'TsHi.pyc' AND file:x_misp_state = 'Malicious']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-12-19T09:07:51Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "file"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:name=\"file\"",
|
||
|
"misp:meta-category=\"file\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5a32a014-88ac-4798-8647-2b04950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-12-19T09:08:10.000Z",
|
||
|
"modified": "2017-12-19T09:08:10.000Z",
|
||
|
"pattern": "[file:hashes.MD5 = 'f6b3a73c8c87506acda430671360ce15' AND file:hashes.SHA256 = '5c776a33568f4c16fee7140c249c0d2b1e0798a96c7a01bfd2d5684e58c9bb32' AND file:name = 'TsLow.pyc' AND file:x_misp_state = 'Malicious']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-12-19T09:08:10Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "file"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:name=\"file\"",
|
||
|
"misp:meta-category=\"file\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5a32a032-9bc0-4803-8608-2d89950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-12-19T09:08:29.000Z",
|
||
|
"modified": "2017-12-19T09:08:29.000Z",
|
||
|
"pattern": "[file:hashes.MD5 = '8b675db417cc8b23f4c43f3de5c83438' AND file:hashes.SHA256 = 'c96ed56bf7ee85a4398cc43a98b4db86d3da311c619f17c8540ae424ca6546e1' AND file:name = 'sh.pyc' AND file:x_misp_state = 'Malicious']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-12-19T09:08:29Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "file"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:name=\"file\"",
|
||
|
"misp:meta-category=\"file\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5ecdb8e9-1d4c-4890-91cf-4afba4c0dfc5",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-12-14T16:10:07.000Z",
|
||
|
"modified": "2017-12-14T16:10:07.000Z",
|
||
|
"pattern": "[file:hashes.MD5 = '6c39c3f4a08d3d78f2eb973a94bd7718' AND file:hashes.SHA1 = 'dc81f383624955e0c0441734f9f1dabfe03f373c' AND file:hashes.SHA256 = 'e8542c07b2af63ee7e72ce5d97d91036c5da56e2b091aa2afe737b224305d230']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-12-14T16:10:07Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "file"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:name=\"file\"",
|
||
|
"misp:meta-category=\"file\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "x-misp-object",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "x-misp-object--d48d9e02-0841-488c-bdb3-76402d3e6543",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-12-14T16:10:04.000Z",
|
||
|
"modified": "2017-12-14T16:10:04.000Z",
|
||
|
"labels": [
|
||
|
"misp:name=\"virustotal-report\"",
|
||
|
"misp:meta-category=\"misc\""
|
||
|
],
|
||
|
"x_misp_attributes": [
|
||
|
{
|
||
|
"type": "link",
|
||
|
"object_relation": "permalink",
|
||
|
"value": "https://www.virustotal.com/file/e8542c07b2af63ee7e72ce5d97d91036c5da56e2b091aa2afe737b224305d230/analysis/1513264635/",
|
||
|
"category": "External analysis",
|
||
|
"uuid": "5a32a25c-3990-410f-b677-46fc02de0b81"
|
||
|
},
|
||
|
{
|
||
|
"type": "text",
|
||
|
"object_relation": "detection-ratio",
|
||
|
"value": "1/66",
|
||
|
"category": "Other",
|
||
|
"uuid": "5a32a25d-0afc-4393-8b3e-477a02de0b81"
|
||
|
},
|
||
|
{
|
||
|
"type": "datetime",
|
||
|
"object_relation": "last-submission",
|
||
|
"value": "2017-12-14T15:17:15",
|
||
|
"category": "Other",
|
||
|
"uuid": "5a32a25d-eb14-43a2-a1a5-48b002de0b81"
|
||
|
}
|
||
|
],
|
||
|
"x_misp_meta_category": "misc",
|
||
|
"x_misp_name": "virustotal-report"
|
||
|
},
|
||
|
{
|
||
|
"type": "relationship",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "relationship--74f5bd64-cade-4b87-9ad3-1b6d3f28fef2",
|
||
|
"created": "2018-02-16T08:45:41.000Z",
|
||
|
"modified": "2018-02-16T08:45:41.000Z",
|
||
|
"relationship_type": "uses",
|
||
|
"source_ref": "indicator--5a329e5c-3c30-4479-8f9f-2a67950d210f",
|
||
|
"target_ref": "indicator--5a329eeb-e7ac-4084-9454-4bec950d210f"
|
||
|
},
|
||
|
{
|
||
|
"type": "relationship",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "relationship--605f0a41-cbfe-4565-a155-f80aed792600",
|
||
|
"created": "2018-02-16T08:45:42.000Z",
|
||
|
"modified": "2018-02-16T08:45:42.000Z",
|
||
|
"relationship_type": "analysed-with",
|
||
|
"source_ref": "indicator--5ecdb8e9-1d4c-4890-91cf-4afba4c0dfc5",
|
||
|
"target_ref": "x-misp-object--d48d9e02-0841-488c-bdb3-76402d3e6543"
|
||
|
},
|
||
|
{
|
||
|
"type": "marking-definition",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
|
||
|
"created": "2017-01-20T00:00:00.000Z",
|
||
|
"definition_type": "tlp",
|
||
|
"name": "TLP:WHITE",
|
||
|
"definition": {
|
||
|
"tlp": "white"
|
||
|
}
|
||
|
}
|
||
|
]
|
||
|
}
|