{ "type": "bundle", "id": "bundle--5797c2d2-5784-4ab9-b5c7-4e98950d210f", "objects": [ { "type": "identity", "spec_version": "2.1", "id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-07-26T20:21:44.000Z", "modified": "2016-07-26T20:21:44.000Z", "name": "CIRCL", "identity_class": "organization" }, { "type": "report", "spec_version": "2.1", "id": "report--5797c2d2-5784-4ab9-b5c7-4e98950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-07-26T20:21:44.000Z", "modified": "2016-07-26T20:21:44.000Z", "name": "Guccifer 2.0: All Roads Lead to Russia - Threatconnect report", "published": "2016-07-27T11:53:30Z", "object_refs": [ "indicator--5797c609-ce54-498d-b812-482a950d210f", "indicator--5797c609-38c4-42cc-94e9-46bc950d210f", "indicator--5797c609-9d8c-4f53-9dea-41e1950d210f", "indicator--5797c609-9e94-4f82-a33a-4f78950d210f", "indicator--5797c60a-20f0-416e-978b-4190950d210f", "indicator--5797c60a-8a30-4d87-89f0-4c08950d210f", "indicator--5797c60a-e308-4841-bf3b-4d6e950d210f", "indicator--5797c60a-e86c-4fd5-a8b6-4bd1950d210f", "indicator--5797c60a-b844-4816-9d4c-4cd1950d210f", "indicator--5797c60b-ed90-4e9f-83f5-4712950d210f", "observed-data--5797c658-7874-48de-8994-4b6d950d210f", "url--5797c658-7874-48de-8994-4b6d950d210f" ], "labels": [ "Threat-Report", "misp:tool=\"MISP-STIX-Converter\"", "type:OSINT" ], "object_marking_refs": [ "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5797c609-ce54-498d-b812-482a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-07-26T20:20:25.000Z", "modified": "2016-07-26T20:20:25.000Z", "description": "Original IP of the email", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.130.15.34']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-07-26T20:20:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5797c609-38c4-42cc-94e9-46bc950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-07-26T20:20:25.000Z", "modified": "2016-07-26T20:20:25.000Z", "description": "Same SSH fingerprint as 95.130.15.34", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.130.9.198']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-07-26T20:20:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5797c609-9d8c-4f53-9dea-41e1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-07-26T20:20:25.000Z", "modified": "2016-07-26T20:20:25.000Z", "description": "Same SSH fingerprint as 95.130.15.34", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.130.15.36']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-07-26T20:20:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5797c609-9e94-4f82-a33a-4f78950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-07-26T20:20:25.000Z", "modified": "2016-07-26T20:20:25.000Z", "description": "Same SSH fingerprint as 95.130.15.34", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.130.15.37']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-07-26T20:20:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5797c60a-20f0-416e-978b-4190950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-07-26T20:20:26.000Z", "modified": "2016-07-26T20:20:26.000Z", "description": "Same SSH fingerprint as 95.130.15.34", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.130.15.38']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-07-26T20:20:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5797c60a-8a30-4d87-89f0-4c08950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-07-26T20:20:26.000Z", "modified": "2016-07-26T20:20:26.000Z", "description": "Same SSH fingerprint as 95.130.15.34", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.130.15.40']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-07-26T20:20:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5797c60a-e308-4841-bf3b-4d6e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-07-26T20:20:26.000Z", "modified": "2016-07-26T20:20:26.000Z", "description": "Same SSH fingerprint as 95.130.15.34", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.130.15.41']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-07-26T20:20:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5797c60a-e86c-4fd5-a8b6-4bd1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-07-26T20:20:26.000Z", "modified": "2016-07-26T20:20:26.000Z", "description": "Imported via the Freetext Import Tool", "pattern": "[domain-name:value = 'fr1.vpn-service.us']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-07-26T20:20:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5797c60a-b844-4816-9d4c-4cd1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-07-26T20:20:26.000Z", "modified": "2016-07-26T20:20:26.000Z", "description": "Imported via the Freetext Import Tool", "pattern": "[email-message:from_ref.value = 'sec.service@mail.ru']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-07-26T20:20:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"email-src\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5797c60b-ed90-4e9f-83f5-4712950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-07-26T20:20:27.000Z", "modified": "2016-07-26T20:20:27.000Z", "description": "Imported via the Freetext Import Tool", "pattern": "[domain-name:value = 'xocma.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-07-26T20:20:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--5797c658-7874-48de-8994-4b6d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-07-26T20:21:44.000Z", "modified": "2016-07-26T20:21:44.000Z", "first_observed": "2016-07-26T20:21:44Z", "last_observed": "2016-07-26T20:21:44Z", "number_observed": 1, "object_refs": [ "url--5797c658-7874-48de-8994-4b6d950d210f" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--5797c658-7874-48de-8994-4b6d950d210f", "value": "https://www.threatconnect.com/guccifer-2-all-roads-lead-russia/" }, { "type": "marking-definition", "spec_version": "2.1", "id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9", "created": "2017-01-20T00:00:00.000Z", "definition_type": "tlp", "name": "TLP:WHITE", "definition": { "tlp": "white" } } ] }