{ "type": "bundle", "id": "bundle--552e7e46-62f4-4908-9fd6-488f950d210b", "objects": [ { "type": "identity", "spec_version": "2.1", "id": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2017-11-20T15:03:55.000Z", "modified": "2017-11-20T15:03:55.000Z", "name": "CthulhuSPRL.be", "identity_class": "organization" }, { "type": "report", "spec_version": "2.1", "id": "report--552e7e46-62f4-4908-9fd6-488f950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2017-11-20T15:03:55.000Z", "modified": "2017-11-20T15:03:55.000Z", "name": "OSINT The Path to Mass-Producing Cyber Attacks by FireEye", "published": "2017-11-20T15:03:59Z", "object_refs": [ "observed-data--552e7e5e-aafc-4c3b-b173-288a950d210b", "url--552e7e5e-aafc-4c3b-b173-288a950d210b", "observed-data--552e7e5e-8170-46e5-bb7d-288a950d210b", "url--552e7e5e-8170-46e5-bb7d-288a950d210b", "x-misp-attribute--552e7e86-05bc-4290-9f28-2d4e950d210b", "x-misp-attribute--552e7e86-69b4-4a18-9db2-2d4e950d210b", "x-misp-attribute--552e7ebb-9c0c-4983-8f4d-2d4c950d210b", "x-misp-attribute--552e7eeb-8194-435b-b481-2d36950d210b", "x-misp-attribute--552e7eec-cba8-45cd-9ed0-2d36950d210b", "indicator--552e7f24-3428-49f0-b6e4-288a950d210b", "indicator--552e7f56-6734-44dc-a033-2d3e950d210b", "indicator--552e7f86-3b1c-4fd2-b362-2d37950d210b", "indicator--552e7fd3-eba4-4e04-9b2a-26d8950d210b", "indicator--552e8018-b0e8-4ce7-8f1a-288a950d210b", "indicator--552e8046-cdc8-45fd-b5a9-2d36950d210b", "indicator--552e805c-ed10-4f3c-a946-2d37950d210b", "indicator--552e80bc-eebc-499b-948e-26d8950d210b", "indicator--552e80ce-b5e8-4111-980b-2d3d950d210b", "indicator--552e80ce-4138-488c-88f1-2d3d950d210b", "indicator--552e80ce-bb60-4310-b099-2d3d950d210b", "indicator--552e80f0-afb8-41a9-ad0d-288a950d210b", "indicator--552e8110-174c-4014-a7ac-2d36950d210b", "indicator--552e8131-c888-48d3-8280-2d37950d210b", "indicator--552e814e-4b10-4271-bd80-26d8950d210b", "indicator--552e8183-7244-4e45-989d-2d3d950d210b", "indicator--552e8183-affc-4449-9b84-2d3d950d210b", "indicator--552e81b7-bacc-4b17-a67c-288a950d210b", "indicator--552e8244-b3dc-49e3-bcfc-2d36950d210b", "indicator--552e8244-20e4-40d3-95ff-2d36950d210b", "indicator--552e8244-e150-41a4-9d09-2d36950d210b", "indicator--552e8244-87c8-404e-9fb8-2d36950d210b", "indicator--552e8244-77f4-4e25-8c3c-2d36950d210b", "indicator--552e8244-ce08-4176-826d-2d36950d210b", "indicator--552e8244-063c-465d-bf3e-2d36950d210b", "indicator--552e8244-cd38-4e11-91fc-2d36950d210b", "indicator--552e8245-d288-4cab-8f4e-2d36950d210b", "indicator--552e8245-fb5c-4894-acbc-2d36950d210b", "indicator--552e8245-4598-409f-8170-2d36950d210b", "indicator--552e8245-7c08-4e42-9079-2d36950d210b", "indicator--552e8245-7f9c-4a95-9705-2d36950d210b", "indicator--552e8245-9ae4-44fd-b87b-2d36950d210b", "indicator--552e8245-18b4-4a5c-9550-2d36950d210b", "x-misp-attribute--552e8263-d674-438e-bd0e-2d36950d210b", "indicator--552e8283-3244-45ca-a9f8-2d3e950d210b", "indicator--552e82c4-b61c-45ab-82d5-2d37950d210b", "indicator--552e82e2-7440-4b6a-9d0b-2d36950d210b", "indicator--552e834d-9ea0-446b-a5f5-2d3d950d210b", "indicator--552e834d-c320-45d8-87d6-2d3d950d210b", "indicator--552e834d-2bdc-4136-8e3f-2d3d950d210b", "indicator--552e834d-3090-4042-805a-2d3d950d210b", "indicator--552e834d-66ec-4424-8974-2d3d950d210b", "indicator--552e834d-a664-437f-9ad5-2d3d950d210b", "indicator--552e834e-5e14-4338-9113-2d3d950d210b", "indicator--552e834e-368c-4916-bb39-2d3d950d210b", "indicator--552e834e-96a4-45ef-8863-2d3d950d210b", "observed-data--552e834e-e264-4582-ac4d-2d3d950d210b", "network-traffic--552e834e-e264-4582-ac4d-2d3d950d210b", "ipv4-addr--552e834e-e264-4582-ac4d-2d3d950d210b", "observed-data--552e834e-df34-48b6-af5b-2d3d950d210b", "network-traffic--552e834e-df34-48b6-af5b-2d3d950d210b", "ipv4-addr--552e834e-df34-48b6-af5b-2d3d950d210b", "observed-data--552e834e-1c58-488e-a8fb-2d3d950d210b", "network-traffic--552e834e-1c58-488e-a8fb-2d3d950d210b", "ipv4-addr--552e834e-1c58-488e-a8fb-2d3d950d210b", "indicator--552e8365-4648-49a8-9526-2d3e950d210b", "indicator--552e838d-0d54-480e-8b42-288a950d210b", "indicator--552e838d-1274-4bfe-9281-288a950d210b", "indicator--552e838d-bf58-435e-87de-288a950d210b", "indicator--552e83de-c6fc-42b9-a7a1-2d4e950d210b", "indicator--552e83de-7568-4858-a111-2d4e950d210b", "indicator--552e83de-55f0-4c10-80c7-2d4e950d210b", "indicator--552e83de-c538-42e1-800a-2d4e950d210b", "indicator--552e83de-2b18-42a6-9c57-2d4e950d210b", "indicator--552e83df-9638-4ad8-8ff9-2d4e950d210b", "indicator--552e83df-0304-4ce7-a6b0-2d4e950d210b", "indicator--552e83df-0104-4db0-abec-2d4e950d210b", "indicator--552e83df-314c-497f-b308-2d4e950d210b", "indicator--552e8403-9fa4-47b3-8523-4268950d210b", "observed-data--59b63c0f-2264-46b4-a74c-1450950d210f", "url--59b63c0f-2264-46b4-a74c-1450950d210f" ], "labels": [ "Threat-Report", "misp:tool=\"MISP-STIX-Converter\"", "type:OSINT", "APT" ], "object_marking_refs": [ "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--552e7e5e-aafc-4c3b-b173-288a950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:06:06.000Z", "modified": "2015-04-15T15:06:06.000Z", "first_observed": "2015-04-15T15:06:06Z", "last_observed": "2015-04-15T15:06:06Z", "number_observed": 1, "object_refs": [ "url--552e7e5e-aafc-4c3b-b173-288a950d210b" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--552e7e5e-aafc-4c3b-b173-288a950d210b", "value": "https://www.fireeye.com/blog/threat-research/2014/09/the-path-to-mass-producing-cyber-attacks.html" }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--552e7e5e-8170-46e5-bb7d-288a950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:06:06.000Z", "modified": "2015-04-15T15:06:06.000Z", "first_observed": "2015-04-15T15:06:06Z", "last_observed": "2015-04-15T15:06:06Z", "number_observed": 1, "object_refs": [ "url--552e7e5e-8170-46e5-bb7d-288a950d210b" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--552e7e5e-8170-46e5-bb7d-288a950d210b", "value": "https://www.fireeye.com/resources/pdfs/white-papers/fireeye-operation-quantum-entanglement.pdf" }, { "type": "x-misp-attribute", "spec_version": "2.1", "id": "x-misp-attribute--552e7e86-05bc-4290-9f28-2d4e950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:06:46.000Z", "modified": "2015-04-15T15:06:46.000Z", "labels": [ "misp:type=\"text\"", "misp:category=\"External analysis\"" ], "x_misp_category": "External analysis", "x_misp_type": "text", "x_misp_value": "Moafee" }, { "type": "x-misp-attribute", "spec_version": "2.1", "id": "x-misp-attribute--552e7e86-69b4-4a18-9db2-2d4e950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:06:46.000Z", "modified": "2015-04-15T15:06:46.000Z", "labels": [ "misp:type=\"text\"", "misp:category=\"External analysis\"" ], "x_misp_category": "External analysis", "x_misp_type": "text", "x_misp_value": "DragonOK" }, { "type": "x-misp-attribute", "spec_version": "2.1", "id": "x-misp-attribute--552e7ebb-9c0c-4983-8f4d-2d4c950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:07:39.000Z", "modified": "2015-04-15T15:07:39.000Z", "labels": [ "misp:type=\"comment\"", "misp:category=\"Payload delivery\"" ], "x_misp_category": "Payload delivery", "x_misp_type": "comment", "x_misp_value": "The \u00e2\u20ac\u0153DragonOK\u00e2\u20ac\u009d group in particular is known\r\nto use password-protected documents\r\ndelivered as attachments in emails, with the\r\npassword listed in the contents of the email.\r\nThis method probably is used to evade\r\ndetection by AV software, gateway firewalls\r\nand malware sandboxes. One such example\r\nusing the password \u00e2\u20ac\u0153888888\u00e2\u20ac\u009d is shown in\r\nFigure 2 and Figure 6, and has been observed\r\nby FireEye7 before. Another similar sample\r\nwas referenced by the \u00e2\u20ac\u0153contagio\u00e2\u20ac\u009d blog8 and\r\nused the password \u00e2\u20ac\u01538861\u00e2\u20ac\u009d." }, { "type": "x-misp-attribute", "spec_version": "2.1", "id": "x-misp-attribute--552e7eeb-8194-435b-b481-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:08:27.000Z", "modified": "2015-04-15T15:08:27.000Z", "labels": [ "misp:type=\"text\"", "misp:category=\"Attribution\"" ], "x_misp_category": "Attribution", "x_misp_comment": "Password for password-protected documents sent as emails", "x_misp_type": "text", "x_misp_value": "8861" }, { "type": "x-misp-attribute", "spec_version": "2.1", "id": "x-misp-attribute--552e7eec-cba8-45cd-9ed0-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:08:28.000Z", "modified": "2015-04-15T15:08:28.000Z", "labels": [ "misp:type=\"text\"", "misp:category=\"Attribution\"" ], "x_misp_category": "Attribution", "x_misp_comment": "Password for password-protected documents sent as emails", "x_misp_type": "text", "x_misp_value": "888888" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e7f24-3428-49f0-b6e4-288a950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:09:24.000Z", "modified": "2015-04-15T15:09:24.000Z", "description": "NewCT 1st stage", "pattern": "[file:hashes.MD5 = '46e55cdf507ef10b11d74dad6af8b94e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:09:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e7f56-6734-44dc-a033-2d3e950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:10:14.000Z", "modified": "2015-04-15T15:10:14.000Z", "description": "NewCT", "pattern": "[file:hashes.MD5 = 'ccff6e0a6f5e7715bdaf62adf0cbed4f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:10:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e7f86-3b1c-4fd2-b362-2d37950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:11:02.000Z", "modified": "2015-04-15T15:11:02.000Z", "description": "NewCT", "pattern": "[domain-name:value = 'http.jpaols.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:11:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e7fd3-eba4-4e04-9b2a-26d8950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:12:19.000Z", "modified": "2015-04-15T15:12:19.000Z", "pattern": "[domain-name:value = 'jpaols.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:12:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8018-b0e8-4ce7-8f1a-288a950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:13:28.000Z", "modified": "2015-04-15T15:13:28.000Z", "description": "CTRat DLL", "pattern": "[file:hashes.MD5 = 'ebd1f5e471774bb283de44e121efa3e5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:13:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8046-cdc8-45fd-b5a9-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:14:14.000Z", "modified": "2015-04-15T15:14:14.000Z", "description": "Password-protected document delivering NewCT", "pattern": "[file:hashes.MD5 = '46ac122183c32858581e95ef40bd31b3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:14:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e805c-ed10-4f3c-a946-2d37950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:14:36.000Z", "modified": "2015-04-15T15:14:36.000Z", "pattern": "[domain-name:value = 'ct.datangcun.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:14:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e80bc-eebc-499b-948e-26d8950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:16:12.000Z", "modified": "2015-04-15T15:16:12.000Z", "description": "Sysget/HelloBridge", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '122.10.62.137']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:16:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e80ce-b5e8-4111-980b-2d3d950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:16:30.000Z", "modified": "2015-04-15T15:16:30.000Z", "pattern": "[url:value = '/el/slogin.php?uid=']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:16:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"url\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e80ce-4138-488c-88f1-2d3d950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:16:30.000Z", "modified": "2015-04-15T15:16:30.000Z", "pattern": "[url:value = '/el/suploadfile.php?item=']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:16:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"url\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e80ce-bb60-4310-b099-2d3d950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:16:30.000Z", "modified": "2015-04-15T15:16:30.000Z", "pattern": "[url:value = '/el/suploadfile.php']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:16:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"url\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e80f0-afb8-41a9-ad0d-288a950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:17:04.000Z", "modified": "2015-04-15T15:17:04.000Z", "description": "Mongall", "pattern": "[domain-name:value = 'mail.jpaols.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:17:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8110-174c-4014-a7ac-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:17:36.000Z", "modified": "2015-04-15T15:17:36.000Z", "description": "Poison Ivy", "pattern": "[file:hashes.MD5 = '65fcc9b9ff608801edc697552438cfee']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:17:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8131-c888-48d3-8280-2d37950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:18:09.000Z", "modified": "2015-04-15T15:18:09.000Z", "description": "Poison Ivy", "pattern": "[domain-name:value = 'ftp.skydnastwm.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:18:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e814e-4b10-4271-bd80-26d8950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:18:38.000Z", "modified": "2015-04-15T15:18:38.000Z", "description": "Poison Ivy", "pattern": "[domain-name:value = 'afp.mozjlla.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:18:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8183-7244-4e45-989d-2d3d950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:19:31.000Z", "modified": "2015-04-15T15:19:31.000Z", "description": "Poison Ivy", "pattern": "[mutex:name = 'fftp']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:19:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"mutex\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8183-affc-4449-9b84-2d3d950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:19:31.000Z", "modified": "2015-04-15T15:19:31.000Z", "description": "Poison Ivy", "pattern": "[mutex:name = ')!afpA.I4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:19:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"mutex\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e81b7-bacc-4b17-a67c-288a950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:20:23.000Z", "modified": "2015-04-15T15:20:23.000Z", "description": "C&C server for Moafee group", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '58.64.201.229']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:20:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8244-b3dc-49e3-bcfc-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:22:44.000Z", "modified": "2015-04-15T15:22:44.000Z", "description": "Linked to Moafee group and resolved to 58.64.201.229", "pattern": "[domain-name:value = 'ph.moafee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:22:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8244-20e4-40d3-95ff-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:22:44.000Z", "modified": "2015-04-15T15:22:44.000Z", "description": "Linked to Moafee group and resolved to 58.64.201.229", "pattern": "[domain-name:value = 'mofa.mozjlla.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:22:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8244-e150-41a4-9d09-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:22:44.000Z", "modified": "2015-04-15T15:22:44.000Z", "description": "Linked to Moafee group and resolved to 58.64.201.229", "pattern": "[domain-name:value = 'acer.moafee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:22:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8244-87c8-404e-9fb8-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:22:44.000Z", "modified": "2015-04-15T15:22:44.000Z", "description": "Linked to Moafee group and resolved to 58.64.201.229", "pattern": "[domain-name:value = 'del.moafee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:22:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8244-77f4-4e25-8c3c-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:22:44.000Z", "modified": "2015-04-15T15:22:44.000Z", "description": "Linked to Moafee group and resolved to 58.64.201.229", "pattern": "[domain-name:value = 'jnt.moafee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:22:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8244-ce08-4176-826d-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:22:44.000Z", "modified": "2015-04-15T15:22:44.000Z", "description": "Linked to Moafee group and resolved to 58.64.201.229", "pattern": "[domain-name:value = 'pcg.moafee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:22:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8244-063c-465d-bf3e-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:22:44.000Z", "modified": "2015-04-15T15:22:44.000Z", "description": "Linked to Moafee group and resolved to 58.64.201.229", "pattern": "[domain-name:value = 'sslc.moafee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:22:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8244-cd38-4e11-91fc-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:22:44.000Z", "modified": "2015-04-15T15:22:44.000Z", "description": "Linked to Moafee group and resolved to 58.64.201.229", "pattern": "[domain-name:value = 'at.moafee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:22:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8245-d288-4cab-8f4e-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:22:45.000Z", "modified": "2015-04-15T15:22:45.000Z", "description": "Linked to Moafee group and resolved to 58.64.201.229", "pattern": "[domain-name:value = 'lw.moafee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:22:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8245-fb5c-4894-acbc-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:22:45.000Z", "modified": "2015-04-15T15:22:45.000Z", "description": "Linked to Moafee group and resolved to 58.64.201.229", "pattern": "[domain-name:value = 'ks.moafee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:22:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8245-4598-409f-8170-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:22:45.000Z", "modified": "2015-04-15T15:22:45.000Z", "description": "Linked to Moafee group and resolved to 58.64.201.229", "pattern": "[domain-name:value = 'oa.moafee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:22:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8245-7c08-4e42-9079-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:22:45.000Z", "modified": "2015-04-15T15:22:45.000Z", "description": "Linked to Moafee group and resolved to 58.64.201.229", "pattern": "[domain-name:value = 'xxpp.moafee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:22:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8245-7f9c-4a95-9705-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:22:45.000Z", "modified": "2015-04-15T15:22:45.000Z", "description": "Linked to Moafee group and resolved to 58.64.201.229", "pattern": "[domain-name:value = 'hp.moafee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:22:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8245-9ae4-44fd-b87b-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:22:45.000Z", "modified": "2015-04-15T15:22:45.000Z", "description": "Linked to Moafee group and resolved to 58.64.201.229", "pattern": "[domain-name:value = 'gumm.mozjlla.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:22:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8245-18b4-4a5c-9550-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:22:45.000Z", "modified": "2015-04-15T15:22:45.000Z", "description": "Linked to Moafee group and resolved to 58.64.201.229", "pattern": "[domain-name:value = 'msn.moafee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:22:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-attribute", "spec_version": "2.1", "id": "x-misp-attribute--552e8263-d674-438e-bd0e-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:23:15.000Z", "modified": "2015-04-15T15:23:15.000Z", "labels": [ "misp:type=\"comment\"", "misp:category=\"Attribution\"" ], "x_misp_category": "Attribution", "x_misp_type": "comment", "x_misp_value": "During this same time frame, the HTRAN client\r\nat 58.64.201.229 was observed\r\nattempting to connect to a number of different\r\nbackend HTRAN servers. All of these HTRAN\r\nservers were located in the Guangdong\r\nProvince and operated by CHINANET." }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8283-3244-45ca-a9f8-2d3e950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:23:47.000Z", "modified": "2015-04-15T15:23:47.000Z", "pattern": "[domain-name:value = 'phi.crabdance.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:23:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e82c4-b61c-45ab-82d5-2d37950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:24:52.000Z", "modified": "2015-04-15T15:24:52.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '98.126.91.66']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:24:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e82e2-7440-4b6a-9d0b-2d36950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:25:22.000Z", "modified": "2015-04-15T15:25:22.000Z", "description": "Destination of connections from HTRAN proxy running on 98.126.91.66", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '113.66.248.60']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:25:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e834d-9ea0-446b-a5f5-2d3d950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:27:09.000Z", "modified": "2015-04-15T15:27:09.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '113.65.22.148']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:27:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e834d-c320-45d8-87d6-2d3d950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:27:09.000Z", "modified": "2015-04-15T15:27:09.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '113.65.41.28']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:27:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e834d-2bdc-4136-8e3f-2d3d950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:27:09.000Z", "modified": "2015-04-15T15:27:09.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '113.65.43.42']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:27:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e834d-3090-4042-805a-2d3d950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:27:09.000Z", "modified": "2015-04-15T15:27:09.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '113.66.12.112']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:27:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e834d-66ec-4424-8974-2d3d950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:27:09.000Z", "modified": "2015-04-15T15:27:09.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '113.68.108.62']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:27:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e834d-a664-437f-9ad5-2d3d950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:27:09.000Z", "modified": "2015-04-15T15:27:09.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '113.68.110.239']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:27:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e834e-5e14-4338-9113-2d3d950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:27:10.000Z", "modified": "2015-04-15T15:27:10.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '113.68.111.111']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:27:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e834e-368c-4916-bb39-2d3d950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:27:10.000Z", "modified": "2015-04-15T15:27:10.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '113.68.168.73']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:27:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e834e-96a4-45ef-8863-2d3d950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:27:10.000Z", "modified": "2015-04-15T15:27:10.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '113.68.171.67']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:27:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--552e834e-e264-4582-ac4d-2d3d950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2017-11-20T15:03:55.000Z", "modified": "2017-11-20T15:03:55.000Z", "first_observed": "2017-11-20T15:03:55Z", "last_observed": "2017-11-20T15:03:55Z", "number_observed": 1, "object_refs": [ "network-traffic--552e834e-e264-4582-ac4d-2d3d950d210b", "ipv4-addr--552e834e-e264-4582-ac4d-2d3d950d210b" ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"" ] }, { "type": "network-traffic", "spec_version": "2.1", "id": "network-traffic--552e834e-e264-4582-ac4d-2d3d950d210b", "dst_ref": "ipv4-addr--552e834e-e264-4582-ac4d-2d3d950d210b", "protocols": [ "tcp" ] }, { "type": "ipv4-addr", "spec_version": "2.1", "id": "ipv4-addr--552e834e-e264-4582-ac4d-2d3d950d210b", "value": "169.254.163.19" }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--552e834e-df34-48b6-af5b-2d3d950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2017-11-20T15:03:52.000Z", "modified": "2017-11-20T15:03:52.000Z", "first_observed": "2017-11-20T15:03:52Z", "last_observed": "2017-11-20T15:03:52Z", "number_observed": 1, "object_refs": [ "network-traffic--552e834e-df34-48b6-af5b-2d3d950d210b", "ipv4-addr--552e834e-df34-48b6-af5b-2d3d950d210b" ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"" ] }, { "type": "network-traffic", "spec_version": "2.1", "id": "network-traffic--552e834e-df34-48b6-af5b-2d3d950d210b", "dst_ref": "ipv4-addr--552e834e-df34-48b6-af5b-2d3d950d210b", "protocols": [ "tcp" ] }, { "type": "ipv4-addr", "spec_version": "2.1", "id": "ipv4-addr--552e834e-df34-48b6-af5b-2d3d950d210b", "value": "169.254.61.191" }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--552e834e-1c58-488e-a8fb-2d3d950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2017-11-20T15:03:49.000Z", "modified": "2017-11-20T15:03:49.000Z", "first_observed": "2017-11-20T15:03:49Z", "last_observed": "2017-11-20T15:03:49Z", "number_observed": 1, "object_refs": [ "network-traffic--552e834e-1c58-488e-a8fb-2d3d950d210b", "ipv4-addr--552e834e-1c58-488e-a8fb-2d3d950d210b" ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"" ] }, { "type": "network-traffic", "spec_version": "2.1", "id": "network-traffic--552e834e-1c58-488e-a8fb-2d3d950d210b", "dst_ref": "ipv4-addr--552e834e-1c58-488e-a8fb-2d3d950d210b", "protocols": [ "tcp" ] }, { "type": "ipv4-addr", "spec_version": "2.1", "id": "ipv4-addr--552e834e-1c58-488e-a8fb-2d3d950d210b", "value": "169.254.92.25" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8365-4648-49a8-9526-2d3e950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:27:33.000Z", "modified": "2015-04-15T15:27:33.000Z", "pattern": "[domain-name:value = 'ndbssh.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:27:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e838d-0d54-480e-8b42-288a950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:28:13.000Z", "modified": "2015-04-15T15:28:13.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '58.217.168.205']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:28:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e838d-1274-4bfe-9281-288a950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:28:13.000Z", "modified": "2015-04-15T15:28:13.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '222.95.171.178']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:28:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e838d-bf58-435e-87de-288a950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:28:13.000Z", "modified": "2015-04-15T15:28:13.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '58.217.169.95']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:28:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e83de-c6fc-42b9-a7a1-2d4e950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:29:34.000Z", "modified": "2015-04-15T15:29:34.000Z", "pattern": "[domain-name:value = 'www.ghostale.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:29:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e83de-7568-4858-a111-2d4e950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:29:34.000Z", "modified": "2015-04-15T15:29:34.000Z", "pattern": "[domain-name:value = 'www.ycbackap.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:29:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e83de-55f0-4c10-80c7-2d4e950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:29:34.000Z", "modified": "2015-04-15T15:29:34.000Z", "pattern": "[domain-name:value = 'asp.skyppee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:29:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e83de-c538-42e1-800a-2d4e950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:29:34.000Z", "modified": "2015-04-15T15:29:34.000Z", "pattern": "[domain-name:value = 'facebook.skyppee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:29:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e83de-2b18-42a6-9c57-2d4e950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:29:34.000Z", "modified": "2015-04-15T15:29:34.000Z", "pattern": "[domain-name:value = 'pop.skyppee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:29:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e83df-9638-4ad8-8ff9-2d4e950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:29:35.000Z", "modified": "2015-04-15T15:29:35.000Z", "pattern": "[domain-name:value = 'mail.skyppee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:29:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e83df-0304-4ce7-a6b0-2d4e950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:29:35.000Z", "modified": "2015-04-15T15:29:35.000Z", "pattern": "[domain-name:value = 'mil.skyppee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:29:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e83df-0104-4db0-abec-2d4e950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:29:35.000Z", "modified": "2015-04-15T15:29:35.000Z", "pattern": "[domain-name:value = 'web.pktmedia.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:29:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e83df-314c-497f-b308-2d4e950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:29:35.000Z", "modified": "2015-04-15T15:29:35.000Z", "pattern": "[domain-name:value = 'bbs.pktmedia.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:29:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--552e8403-9fa4-47b3-8523-4268950d210b", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2015-04-15T15:30:11.000Z", "modified": "2015-04-15T15:30:11.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '206.161.216.219']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2015-04-15T15:30:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--59b63c0f-2264-46b4-a74c-1450950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2017-09-11T07:32:31.000Z", "modified": "2017-09-11T07:32:31.000Z", "first_observed": "2017-09-11T07:32:31Z", "last_observed": "2017-09-11T07:32:31Z", "number_observed": 1, "object_refs": [ "url--59b63c0f-2264-46b4-a74c-1450950d210f" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--59b63c0f-2264-46b4-a74c-1450950d210f", "value": "https://www.fireeye.com/blog/threat-research/2013/02/hackers-targeting-taiwanese-technology-firm.html" }, { "type": "marking-definition", "spec_version": "2.1", "id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9", "created": "2017-01-20T00:00:00.000Z", "definition_type": "tlp", "name": "TLP:WHITE", "definition": { "tlp": "white" } } ] }