2023-04-21 14:44:17 +00:00
{
"type" : "bundle" ,
"id" : "bundle--5a54778c-3dac-4d36-b7c3-4d6e02de0b81" ,
"objects" : [
{
"type" : "identity" ,
"spec_version" : "2.1" ,
"id" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-01-10T03:00:26.000Z" ,
"modified" : "2018-01-10T03:00:26.000Z" ,
"name" : "CIRCL" ,
"identity_class" : "organization"
} ,
{
"type" : "report" ,
"spec_version" : "2.1" ,
"id" : "report--5a54778c-3dac-4d36-b7c3-4d6e02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-01-10T03:00:26.000Z" ,
"modified" : "2018-01-10T03:00:26.000Z" ,
"name" : "OSINT - A North Korean Monero Cryptocurrency Miner" ,
"published" : "2018-01-11T18:49:08Z" ,
"object_refs" : [
"observed-data--5a54779b-451c-4777-a15d-573002de0b81" ,
"url--5a54779b-451c-4777-a15d-573002de0b81" ,
"x-misp-attribute--5a5477ad-63d4-443a-a0d0-b52402de0b81" ,
"indicator--5a5477c8-1d28-4171-9740-bc9302de0b81" ,
"indicator--5a5477c8-8188-4ad5-bfbb-bc9302de0b81" ,
"observed-data--5a5477f2-0068-4ce8-9be5-566802de0b81" ,
"network-traffic--5a5477f2-0068-4ce8-9be5-566802de0b81" ,
"ipv4-addr--5a5477f2-0068-4ce8-9be5-566802de0b81" ,
"indicator--5a54780c-77cc-42c1-9633-bab602de0b81" ,
"indicator--5a547824-c8c8-45b3-b19b-b73502de0b81" ,
"indicator--5a547852-0478-476e-9703-4d6e02de0b81" ,
"indicator--5a5478ba-6920-40a3-bedc-57fd02de0b81" ,
"indicator--ecdcbae1-a690-4f9c-9ce7-b505f1c1a634" ,
"x-misp-object--0b6118b9-a775-47cf-8f97-de518c5ffd7a" ,
"indicator--62422a69-b558-4bbc-9e01-ff1038764faf" ,
"x-misp-object--36e2da81-042e-4880-9f27-76ebec952ba0" ,
"indicator--8a8becfb-f8ce-440a-9ffa-81a43239f4e2" ,
"x-misp-object--fe330733-f2f4-490d-a9b8-c0f0da7353fe" ,
2023-05-19 09:05:37 +00:00
"relationship--b40c5f7d-1a6f-4902-9803-f0fb5ebbe478" ,
"relationship--c0574779-4991-413a-8649-9f71b85ca311" ,
"relationship--9a68cec8-a3cb-4366-97c3-5b73a4cc11e1"
2023-04-21 14:44:17 +00:00
] ,
"labels" : [
"Threat-Report" ,
"misp:tool=\"MISP-STIX-Converter\"" ,
"admiralty-scale:information-credibility=\"2\"" ,
"osint:source-type=\"blog-post\""
] ,
"object_marking_refs" : [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5a54779b-451c-4777-a15d-573002de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-01-09T08:12:04.000Z" ,
"modified" : "2018-01-09T08:12:04.000Z" ,
"first_observed" : "2018-01-09T08:12:04Z" ,
"last_observed" : "2018-01-09T08:12:04Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--5a54779b-451c-4777-a15d-573002de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\"" ,
"osint:source-type=\"blog-post\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--5a54779b-451c-4777-a15d-573002de0b81" ,
"value" : "https://www.alienvault.com/blogs/labs-research/a-north-korean-monero-cryptocurrency-miner"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5a5477ad-63d4-443a-a0d0-b52402de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-01-09T08:12:04.000Z" ,
"modified" : "2018-01-09T08:12:04.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"External analysis\"" ,
"osint:source-type=\"blog-post\""
] ,
"x_misp_category" : "External analysis" ,
"x_misp_type" : "text" ,
"x_misp_value" : "AlienVault labs recently analysed an application compiled on Christmas Eve 2017. It is an Installer for software to mine the Monero crypto-currency. Any mined currency is sent to Kim Il Sung University in Pyongyang, North Korea.\r\n\r\nThe Installer copies a file named intelservice.exe to the system. The filename intelservice.exe is often associated with crypto-currency mining malware. Based on the arguments it\u00e2\u20ac\u2122s executed with, it\u00e2\u20ac\u2122s likely a piece of software called xmrig. \r\n\r\nIt\u00e2\u20ac\u2122s not unusual to see xmrig in malware campaigns. It was recently used in some wide campaigns exploiting unpatched IIS servers to mine Monero."
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5a5477c8-1d28-4171-9740-bc9302de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-01-09T08:05:28.000Z" ,
"modified" : "2018-01-09T08:05:28.000Z" ,
"description" : "We identified two other pieces of software which share some code:" ,
"pattern" : "[file:hashes.MD5 = '762c3249904a8bf76802effb54426655']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-01-09T08:05:28Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5a5477c8-8188-4ad5-bfbb-bc9302de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-01-09T08:05:28.000Z" ,
"modified" : "2018-01-09T08:05:28.000Z" ,
"description" : "We identified two other pieces of software which share some code:" ,
"pattern" : "[file:hashes.MD5 = '42344bb45f351757e8638656e12a0135']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-01-09T08:05:28Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5a5477f2-0068-4ce8-9be5-566802de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-01-09T08:10:10.000Z" ,
"modified" : "2018-01-09T08:10:10.000Z" ,
"first_observed" : "2018-01-09T08:10:10Z" ,
"last_observed" : "2018-01-09T08:10:10Z" ,
"number_observed" : 1 ,
"object_refs" : [
"network-traffic--5a5477f2-0068-4ce8-9be5-566802de0b81" ,
"ipv4-addr--5a5477f2-0068-4ce8-9be5-566802de0b81"
] ,
"labels" : [
"misp:type=\"ip-src\"" ,
"misp:category=\"Network activity\""
]
} ,
{
"type" : "network-traffic" ,
"spec_version" : "2.1" ,
"id" : "network-traffic--5a5477f2-0068-4ce8-9be5-566802de0b81" ,
"src_ref" : "ipv4-addr--5a5477f2-0068-4ce8-9be5-566802de0b81" ,
"protocols" : [
"tcp"
]
} ,
{
"type" : "ipv4-addr" ,
"spec_version" : "2.1" ,
"id" : "ipv4-addr--5a5477f2-0068-4ce8-9be5-566802de0b81" ,
"value" : "175.45.178.19"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5a54780c-77cc-42c1-9633-bab602de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-01-09T08:07:15.000Z" ,
"modified" : "2018-01-09T08:07:15.000Z" ,
"description" : "Decompiled Code" ,
"pattern" : "[file:hashes.MD5 = '6a261443299788af1467142d5f538b2c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-01-09T08:07:15Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5a547824-c8c8-45b3-b19b-b73502de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-01-09T08:10:10.000Z" ,
"modified" : "2018-01-09T08:10:10.000Z" ,
"pattern" : "[rule nkminer_monero {\r\n\r\n meta:\r\n\r\n description = \"Detects installer of Monero miner that points to a NK domain\"\r\n\r\n author = \"cdoman@alienvault.com\"\r\n\r\n tlp = \"white\"\r\n\r\n license = \"MIT License\"\r\n\r\n strings:\r\n\r\n $a = \"82e999fb-a6e0-4094-aa1f-1a306069d1a5\" nocase wide ascii\r\n\r\n $b = \"4JUdGzvrMFDWrUUwY3toJATSeNwjn54LkCnKBPRzDuhzi5vSepHfUckJNxRL2gjkNrSqtCoRUrEDAgRwsQvVCjZbRy5YeFCqgoUMnzumvS\" nocase wide ascii\r\n\r\n $c = \"barjuok.ryongnamsan.edu.kp\" nocase wide ascii\r\n\r\n $d = \"C:\\\\SoftwaresInstall\\\\soft\" nocase wide ascii\r\n\r\n $e = \"C:\\\\Windows\\\\Sys64\\\\intelservice.exe\" nocase wide ascii\r\n\r\n $f = \"C:\\\\Windows\\\\Sys64\\\\updater.exe\" nocase wide ascii\r\n\r\n $g = \"C:\\\\Users\\\\Jawhar\\\\documents\\\\\" nocase wide ascii\r\n\r\n condition:\r\n\r\n any of them\r\n\r\n}]" ,
"pattern_type" : "yara" ,
"valid_from" : "2018-01-09T08:10:10Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Artifacts dropped"
}
] ,
"labels" : [
"misp:type=\"yara\"" ,
"misp:category=\"Artifacts dropped\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5a547852-0478-476e-9703-4d6e02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-01-09T08:10:10.000Z" ,
"modified" : "2018-01-09T08:10:10.000Z" ,
"description" : "On port 5615" ,
"pattern" : "[domain-name:value = 'barjuok.ryongnamsan.edu.kp']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-01-09T08:10:10Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5a5478ba-6920-40a3-bedc-57fd02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-01-09T08:09:30.000Z" ,
"modified" : "2018-01-09T08:09:30.000Z" ,
"pattern" : "[(network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '175.45.178.19') AND network-traffic:dst_port = '5615' AND network-traffic:x_misp_text = 'Arguments = ((\\\\\"-o barjuok.ryongnamsan.edu.kp:5615 -u 4JUdGzvrMFDWrUUwY3toJATSeNwjn54LkCnKBPRzDuhzi5vSepHfUckJNxRL2gjkNrSqtCoRUrEDAgRwsQvVCjZbRy5YeFCqgoUMnzumvS -p \\\\\" + str + \\\\\" -k -t \\\\\" + Conversions.ToString(value)) ?? \\\\\"\\\\\")']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-01-09T08:09:30Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "network"
}
] ,
"labels" : [
"misp:name=\"ip-port\"" ,
"misp:meta-category=\"network\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--ecdcbae1-a690-4f9c-9ce7-b505f1c1a634" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-01-09T08:10:13.000Z" ,
"modified" : "2018-01-09T08:10:13.000Z" ,
"pattern" : "[file:hashes.MD5 = '762c3249904a8bf76802effb54426655' AND file:hashes.SHA1 = '0def199dbdb8dccf380511f67138088148ea83a3' AND file:hashes.SHA256 = '42300b6a09f183ae167d7a11d9c6df21d022a5f02df346350d3d875d557d3b76']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-01-09T08:10:13Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--0b6118b9-a775-47cf-8f97-de518c5ffd7a" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-01-09T08:10:10.000Z" ,
"modified" : "2018-01-09T08:10:10.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/42300b6a09f183ae167d7a11d9c6df21d022a5f02df346350d3d875d557d3b76/analysis/1515484535/" ,
"category" : "External analysis" ,
"comment" : "We identified two other pieces of software which share some code:" ,
"uuid" : "5a5478e3-2394-4d96-a621-b75d02de0b81"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "3/67" ,
"category" : "Other" ,
"comment" : "We identified two other pieces of software which share some code:" ,
"uuid" : "5a5478e3-ef44-4be0-99af-b75d02de0b81"
} ,
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-01-09T07:55:35" ,
"category" : "Other" ,
"comment" : "We identified two other pieces of software which share some code:" ,
"uuid" : "5a5478e3-d6f0-430c-b82c-b75d02de0b81"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--62422a69-b558-4bbc-9e01-ff1038764faf" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-01-09T08:10:14.000Z" ,
"modified" : "2018-01-09T08:10:14.000Z" ,
"pattern" : "[file:hashes.MD5 = '6a261443299788af1467142d5f538b2c' AND file:hashes.SHA1 = '8965381377a884aa68eeb451b3e62175968b0b04' AND file:hashes.SHA256 = 'c599f3ca3417169e4a620b8231f8a97ccc63e291b9e09c888e6807dd90f1f17c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-01-09T08:10:14Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--36e2da81-042e-4880-9f27-76ebec952ba0" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-01-09T08:10:11.000Z" ,
"modified" : "2018-01-09T08:10:11.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/c599f3ca3417169e4a620b8231f8a97ccc63e291b9e09c888e6807dd90f1f17c/analysis/1515484533/" ,
"category" : "External analysis" ,
"comment" : "Decompiled Code" ,
"uuid" : "5a5478e3-1108-4a5e-93b1-b75d02de0b81"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "6/68" ,
"category" : "Other" ,
"comment" : "Decompiled Code" ,
"uuid" : "5a5478e3-04d8-4a5a-ae0b-b75d02de0b81"
} ,
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-01-09T07:55:33" ,
"category" : "Other" ,
"comment" : "Decompiled Code" ,
"uuid" : "5a5478e3-0fa0-4ec3-b082-b75d02de0b81"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--8a8becfb-f8ce-440a-9ffa-81a43239f4e2" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-01-09T08:10:14.000Z" ,
"modified" : "2018-01-09T08:10:14.000Z" ,
"pattern" : "[file:hashes.MD5 = '42344bb45f351757e8638656e12a0135' AND file:hashes.SHA1 = '7cab4853c370a2dd299a5ab3ebeccfe17455cb43' AND file:hashes.SHA256 = '0024e32c0199ded445c0b968601f21cc92fc0c534d2642f2dd64c1c978ff01f3']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-01-09T08:10:14Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--fe330733-f2f4-490d-a9b8-c0f0da7353fe" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-01-09T08:10:11.000Z" ,
"modified" : "2018-01-09T08:10:11.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/0024e32c0199ded445c0b968601f21cc92fc0c534d2642f2dd64c1c978ff01f3/analysis/1515484532/" ,
"category" : "External analysis" ,
"comment" : "We identified two other pieces of software which share some code:" ,
"uuid" : "5a5478e3-fa78-43c9-90a9-b75d02de0b81"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "6/67" ,
"category" : "Other" ,
"comment" : "We identified two other pieces of software which share some code:" ,
"uuid" : "5a5478e3-e430-4494-8cd8-b75d02de0b81"
} ,
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-01-09T07:55:32" ,
"category" : "Other" ,
"comment" : "We identified two other pieces of software which share some code:" ,
"uuid" : "5a5478e3-546c-4052-abd1-b75d02de0b81"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2023-05-19 09:05:37 +00:00
"id" : "relationship--b40c5f7d-1a6f-4902-9803-f0fb5ebbe478" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-01-11T18:49:07.000Z" ,
"modified" : "2018-01-11T18:49:07.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--ecdcbae1-a690-4f9c-9ce7-b505f1c1a634" ,
"target_ref" : "x-misp-object--0b6118b9-a775-47cf-8f97-de518c5ffd7a"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2023-05-19 09:05:37 +00:00
"id" : "relationship--c0574779-4991-413a-8649-9f71b85ca311" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-01-11T18:49:07.000Z" ,
"modified" : "2018-01-11T18:49:07.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--62422a69-b558-4bbc-9e01-ff1038764faf" ,
"target_ref" : "x-misp-object--36e2da81-042e-4880-9f27-76ebec952ba0"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2023-05-19 09:05:37 +00:00
"id" : "relationship--9a68cec8-a3cb-4366-97c3-5b73a4cc11e1" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-01-11T18:49:08.000Z" ,
"modified" : "2018-01-11T18:49:08.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--8a8becfb-f8ce-440a-9ffa-81a43239f4e2" ,
"target_ref" : "x-misp-object--fe330733-f2f4-490d-a9b8-c0f0da7353fe"
} ,
{
"type" : "marking-definition" ,
"spec_version" : "2.1" ,
"id" : "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ,
"created" : "2017-01-20T00:00:00.000Z" ,
"definition_type" : "tlp" ,
"name" : "TLP:WHITE" ,
"definition" : {
"tlp" : "white"
}
}
]
}