{ "type": "bundle", "id": "bundle--574c3d9c-41dc-4af6-b99d-1d31950d210f", "objects": [ { "type": "identity", "spec_version": "2.1", "id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:39:17.000Z", "modified": "2016-05-30T13:39:17.000Z", "name": "CIRCL", "identity_class": "organization" }, { "type": "report", "spec_version": "2.1", "id": "report--574c3d9c-41dc-4af6-b99d-1d31950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:39:17.000Z", "modified": "2016-05-30T13:39:17.000Z", "name": "OSINT - Keep Calm and (Don\u00e2\u20ac\u2122t) Enable Macros: A New Threat Actor Targets UAE Dissidents", "published": "2016-05-30T13:40:31Z", "object_refs": [ "observed-data--574c3dbe-22c0-4dcc-bf7e-0fa0950d210f", "url--574c3dbe-22c0-4dcc-bf7e-0fa0950d210f", "x-misp-attribute--574c3ddc-75ec-410f-9c9e-4095950d210f", "indicator--574c3ee9-93c4-4421-abcb-493f950d210f", "indicator--574c3f0f-cc04-46b5-8476-0fa1950d210f", "indicator--574c3f25-2208-4d70-b8cf-4d45950d210f", "indicator--574c3f3c-f278-4953-8396-0fa3950d210f", "indicator--574c3f5a-4858-462c-b673-49ef950d210f", "indicator--574c3f87-b588-4337-8861-40e4950d210f", "indicator--574c3fa3-2348-4fb2-98b4-0a02950d210f", "indicator--574c3fdc-ad80-4719-a9db-445b950d210f", "indicator--574c3fe9-40b8-41a9-921a-3a1f950d210f", "indicator--574c3ff9-dce4-4849-bda6-0f9f950d210f", "indicator--574c4029-e4e8-45fb-ae19-4d05950d210f", "indicator--574c4039-a800-46e0-8611-46ba950d210f", "indicator--574c4066-ec94-4eb7-9734-45b7950d210f", "indicator--574c4127-637c-4e46-b71d-4ad9950d210f", "indicator--574c4128-e0ec-4ef7-a25b-4c7c950d210f", "observed-data--574c4147-b758-4998-a9be-4a18950d210f", "email-message--574c4147-b758-4998-a9be-4a18950d210f", "email-addr--574c4147-b758-4998-a9be-4a18950d210f", "indicator--574c418b-6b6c-4a85-a5c4-42e2950d210f", "indicator--574c418b-96d4-4b20-afd6-40c1950d210f", "indicator--574c418c-37b0-4a7d-a9aa-4630950d210f", "indicator--574c41f0-49a8-4170-a515-0fa3950d210f", "indicator--574c41f0-833c-4fe2-8e1e-0fa3950d210f", "indicator--574c420d-ead4-43ed-9cb9-4253950d210f", "indicator--574c422c-ece4-4e1a-9b0f-3a1f950d210f", "indicator--574c422c-f08c-44b3-bf88-3a1f950d210f", "observed-data--574c4265-cc78-4799-b446-0fa402de0b81", "url--574c4265-cc78-4799-b446-0fa402de0b81", "observed-data--574c4284-e35c-4201-88a7-0fa3950d210f", "network-traffic--574c4284-e35c-4201-88a7-0fa3950d210f", "ipv4-addr--574c4284-e35c-4201-88a7-0fa3950d210f" ], "labels": [ "Threat-Report", "misp:tool=\"MISP-STIX-Converter\"", "type:OSINT" ], "object_marking_refs": [ "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--574c3dbe-22c0-4dcc-bf7e-0fa0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:18:54.000Z", "modified": "2016-05-30T13:18:54.000Z", "first_observed": "2016-05-30T13:18:54Z", "last_observed": "2016-05-30T13:18:54Z", "number_observed": 1, "object_refs": [ "url--574c3dbe-22c0-4dcc-bf7e-0fa0950d210f" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--574c3dbe-22c0-4dcc-bf7e-0fa0950d210f", "value": "https://citizenlab.org/2016/05/stealth-falcon/" }, { "type": "x-misp-attribute", "spec_version": "2.1", "id": "x-misp-attribute--574c3ddc-75ec-410f-9c9e-4095950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:19:24.000Z", "modified": "2016-05-30T13:19:24.000Z", "labels": [ "misp:type=\"comment\"", "misp:category=\"External analysis\"" ], "x_misp_category": "External analysis", "x_misp_type": "comment", "x_misp_value": "This report describes a campaign of targeted spyware attacks carried out by a sophisticated operator, which we call Stealth Falcon. The attacks have been conducted from 2012 until the present, against Emirati journalists, activists, and dissidents. We discovered this campaign when an individual purporting to be from an apparently fictitious organization called \u00e2\u20ac\u0153The Right to Fight\u00e2\u20ac\u009d contacted Rori Donaghy. Donaghy, a UK-based journalist and founder of the Emirates Center for Human Rights, received a spyware-laden email in November 2015, purporting to offer him a position on a human rights panel. Donaghy has written critically of the United Arab Emirates (UAE) government in the past,1 and had recently published a series of articles based on leaked emails involving members of the UAE government.2\r\n\r\nCircumstantial evidence suggests a link between Stealth Falcon and the UAE government. We traced digital artifacts used in this campaign to links sent from an activist\u00e2\u20ac\u2122s Twitter account in December 2012, a period when it appears to have been under government control. We also identified other bait content employed by this threat actor. We found 31 public tweets sent by Stealth Falcon, 30 of which were directly targeted at one of 27 victims. Of the 27 targets, 24 were obviously linked to the UAE, based on their profile information (e.g., photos, \u00e2\u20ac\u0153UAE\u00e2\u20ac\u009d in account name, location), and at least six targets appeared to be operated by people who were arrested, sought for arrest, or convicted in absentia by the UAE government, in relation to their Twitter activity.\r\n\r\nThe attack on Donaghy \u00e2\u20ac\u201d and the Twitter attacks \u00e2\u20ac\u201d involved a malicious URL shortening site. When a user clicks on a URL shortened by Stealth Falcon operators, the site profiles the software on a user\u00e2\u20ac\u2122s computer, perhaps for future exploitation, before redirecting the user to a benign website containing bait content. We queried the URL shortener with every possible short URL, and identified 402 instances of bait content which we believe were sent by Stealth Falcon, 73% of which obviously referenced UAE issues. Of these URLs, only the one sent to Donaghy definitively contained spyware. However, we were able to trace the spyware Donaghy received to a network of 67 active command and control (C2) servers, suggesting broader use of the spyware, perhaps by the same or other operators." }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c3ee9-93c4-4421-abcb-493f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:23:53.000Z", "modified": "2016-05-30T13:23:53.000Z", "description": "Fake invitation", "pattern": "[email-message:from_ref.value = 'the_right_to_fight@openmailbox.org']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:23:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"email-src\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c3f0f-cc04-46b5-8476-0fa1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:24:31.000Z", "modified": "2016-05-30T13:24:31.000Z", "description": "loaded a page containing a redirect to the website of Al Jazeera. Before completing the redirect, it invoked JavaScript to profile the target\u00e2\u20ac\u2122s computer.", "pattern": "[url:value = 'http://aax.me/d0dde']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:24:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"url\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c3f25-2208-4d70-b8cf-4d45950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:24:53.000Z", "modified": "2016-05-30T13:24:53.000Z", "pattern": "[url:value = 'http://aax.me/a6faa']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:24:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"url\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c3f3c-f278-4953-8396-0fa3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:25:16.000Z", "modified": "2016-05-30T13:25:16.000Z", "description": "This is a password-protected link to a file shared on an ownCloud15 instance. We obtained this file, and found it to be a Microsoft Word document.", "pattern": "[url:value = 'https://cloud.openmailbox.org/index.php/s/ujDNWMmg8pdG3AL/authenticate']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:25:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"url\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c3f5a-4858-462c-b673-49ef950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:25:46.000Z", "modified": "2016-05-30T13:25:46.000Z", "description": "right2fight.docm (malicious document)", "pattern": "[file:hashes.SHA256 = '5a372b45285fe6f3df3ba277ee2de55d4a30fc8ef05de729cf464103632db40f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:25:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c3f87-b588-4337-8861-40e4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:26:31.000Z", "modified": "2016-05-30T13:26:31.000Z", "description": "right2fight.docm (malicious document)", "pattern": "[file:hashes.SHA1 = 'f25466e4820404c817eaf75818b7177891735886']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:26:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c3fa3-2348-4fb2-98b4-0a02950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:26:59.000Z", "modified": "2016-05-30T13:26:59.000Z", "description": "right2fight.docm (malicious document)", "pattern": "[file:hashes.MD5 = '80e8ef78b9e28015cde4205aaa65da97']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:26:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c3fdc-ad80-4719-a9db-445b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:27:56.000Z", "modified": "2016-05-30T13:27:56.000Z", "description": "Gathered information is returned to and the server\u00e2\u20ac\u2122s response is executed as a PowerShell command.", "pattern": "[url:value = 'http://adhostingcache.com/ehhe/eh4g4/adcache.txt']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:27:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"url\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c3fe9-40b8-41a9-921a-3a1f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:28:09.000Z", "modified": "2016-05-30T13:28:09.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.215.44.37']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:28:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c3ff9-dce4-4849-bda6-0f9f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:28:25.000Z", "modified": "2016-05-30T13:28:25.000Z", "pattern": "[domain-name:value = 'adhostingcache.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:28:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c4029-e4e8-45fb-ae19-4d05950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:29:13.000Z", "modified": "2016-05-30T13:29:13.000Z", "description": "registered on December 3rd,", "pattern": "[domain-name:value = 'adhostingcaches.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:29:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c4039-a800-46e0-8611-46ba950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:29:29.000Z", "modified": "2016-05-30T13:29:29.000Z", "pattern": "[url:value = 'https://incapsulawebcache.com/cache/cache.nfo']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:29:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"url\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c4066-ec94-4eb7-9734-45b7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:30:21.000Z", "modified": "2016-05-30T13:30:21.000Z", "description": "to profile a user\u00e2\u20ac\u2122s system, perhaps to gather intelligence about potentially exploitable vulnerabilities.", "pattern": "[url:value = 'http://aax.me/redirect.js']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:30:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"url\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c4127-637c-4e46-b71d-4ad9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:33:27.000Z", "modified": "2016-05-30T13:33:27.000Z", "description": "Imported via the Freetext Import Tool", "pattern": "[url:value = 'http://goo.gl/60HAqJ']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:33:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"url\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c4128-e0ec-4ef7-a25b-4c7c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:33:28.000Z", "modified": "2016-05-30T13:33:28.000Z", "description": "Imported via the Freetext Import Tool", "pattern": "[url:value = 'http://aax.me/0b152']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:33:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"url\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--574c4147-b758-4998-a9be-4a18950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:33:59.000Z", "modified": "2016-05-30T13:33:59.000Z", "first_observed": "2016-05-30T13:33:59Z", "last_observed": "2016-05-30T13:33:59Z", "number_observed": 1, "object_refs": [ "email-message--574c4147-b758-4998-a9be-4a18950d210f", "email-addr--574c4147-b758-4998-a9be-4a18950d210f" ], "labels": [ "misp:type=\"email-src\"", "misp:category=\"Payload delivery\"" ] }, { "type": "email-message", "spec_version": "2.1", "id": "email-message--574c4147-b758-4998-a9be-4a18950d210f", "is_multipart": false, "from_ref": "email-addr--574c4147-b758-4998-a9be-4a18950d210f" }, { "type": "email-addr", "spec_version": "2.1", "id": "email-addr--574c4147-b758-4998-a9be-4a18950d210f", "value": "andrew.dwight389@outlook.com" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c418b-6b6c-4a85-a5c4-42e2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:35:07.000Z", "modified": "2016-05-30T13:35:07.000Z", "description": "message_032456944343.docm", "pattern": "[file:hashes.MD5 = '87e1df6f36b96b56186444e37e2a1ef5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:35:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c418b-96d4-4b20-afd6-40c1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:35:07.000Z", "modified": "2016-05-30T13:35:07.000Z", "description": "message_032456944343.docm", "pattern": "[file:hashes.SHA1 = '1c3757006f972ca957d925accf8bbb3023550d1b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:35:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c418c-37b0-4a7d-a9aa-4630950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:35:08.000Z", "modified": "2016-05-30T13:35:08.000Z", "description": "message_032456944343.docm", "pattern": "[file:hashes.SHA256 = '4320204d577ef8b939115d16110e97ff04cb4f7d1e77ba5ce011d43f74abc7be']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:35:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c41f0-49a8-4170-a515-0fa3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:36:48.000Z", "modified": "2016-05-30T13:36:48.000Z", "description": "The document\u00e2\u20ac\u2122s macro was identical to the one sent to Donaghy, except it reported back to, and downloaded Stage Two from a different URL", "pattern": "[url:value = 'http://optimizedimghosting.com/wddf/hrrw/ggrr.txt']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:36:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"url\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c41f0-833c-4fe2-8e1e-0fa3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:36:48.000Z", "modified": "2016-05-30T13:36:48.000Z", "description": "The document\u00e2\u20ac\u2122s macro was identical to the one sent to Donaghy, except it reported back to, and downloaded Stage Two from a different URL", "pattern": "[domain-name:value = 'optimizedimghosting.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:36:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c420d-ead4-43ed-9cb9-4253950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:37:17.000Z", "modified": "2016-05-30T13:37:17.000Z", "description": "The Stage Two in this case reported back to", "pattern": "[url:value = 'https://edgecacheimagehosting.com/images/image.nfo']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:37:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"url\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c422c-ece4-4e1a-9b0f-3a1f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:37:48.000Z", "modified": "2016-05-30T13:37:48.000Z", "description": "stage two server", "pattern": "[domain-name:value = 'edgecacheimagehosting.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:37:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--574c422c-f08c-44b3-bf88-3a1f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:37:48.000Z", "modified": "2016-05-30T13:37:48.000Z", "description": "stage two server", "pattern": "[domain-name:value = 'incapsulawebcache.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-05-30T13:37:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--574c4265-cc78-4799-b446-0fa402de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:38:45.000Z", "modified": "2016-05-30T13:38:45.000Z", "first_observed": "2016-05-30T13:38:45Z", "last_observed": "2016-05-30T13:38:45Z", "number_observed": 1, "object_refs": [ "url--574c4265-cc78-4799-b446-0fa402de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--574c4265-cc78-4799-b446-0fa402de0b81", "value": "https://www.virustotal.com/file/4320204d577ef8b939115d16110e97ff04cb4f7d1e77ba5ce011d43f74abc7be/analysis/1464593985/" }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--574c4284-e35c-4201-88a7-0fa3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-05-30T13:39:16.000Z", "modified": "2016-05-30T13:39:16.000Z", "first_observed": "2016-05-30T13:39:16Z", "last_observed": "2016-05-30T13:39:16Z", "number_observed": 1, "object_refs": [ "network-traffic--574c4284-e35c-4201-88a7-0fa3950d210f", "ipv4-addr--574c4284-e35c-4201-88a7-0fa3950d210f" ], "labels": [ "misp:type=\"ip-src\"", "misp:category=\"Network activity\"" ] }, { "type": "network-traffic", "spec_version": "2.1", "id": "network-traffic--574c4284-e35c-4201-88a7-0fa3950d210f", "src_ref": "ipv4-addr--574c4284-e35c-4201-88a7-0fa3950d210f", "protocols": [ "tcp" ] }, { "type": "ipv4-addr", "spec_version": "2.1", "id": "ipv4-addr--574c4284-e35c-4201-88a7-0fa3950d210f", "value": "87.120.37.83" }, { "type": "marking-definition", "spec_version": "2.1", "id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9", "created": "2017-01-20T00:00:00.000Z", "definition_type": "tlp", "name": "TLP:WHITE", "definition": { "tlp": "white" } } ] }