783 lines
No EOL
34 KiB
JSON
783 lines
No EOL
34 KiB
JSON
{
|
|
"type": "bundle",
|
|
"id": "bundle--59120865-27e0-4e6d-9b74-4a9f950d210f",
|
|
"objects": [
|
|
{
|
|
"type": "identity",
|
|
"spec_version": "2.1",
|
|
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"name": "CIRCL",
|
|
"identity_class": "organization"
|
|
},
|
|
{
|
|
"type": "report",
|
|
"spec_version": "2.1",
|
|
"id": "report--59120865-27e0-4e6d-9b74-4a9f950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"name": "OSINT - EPS Processing Zero-Days Exploited by Multiple Threat Actors",
|
|
"published": "2017-05-09T18:27:29Z",
|
|
"object_refs": [
|
|
"observed-data--59120872-11dc-4982-8a6c-4c95950d210f",
|
|
"url--59120872-11dc-4982-8a6c-4c95950d210f",
|
|
"x-misp-attribute--59120885-4620-48a4-a028-4080950d210f",
|
|
"indicator--5912092f-9670-4c21-a7cc-4a72950d210f",
|
|
"indicator--5912092f-0350-4ec0-8889-4981950d210f",
|
|
"indicator--59120930-cf28-472d-87ce-4e33950d210f",
|
|
"indicator--59120931-b868-4c65-a6c4-46f6950d210f",
|
|
"indicator--59120932-07d8-4a85-bb43-4a1e950d210f",
|
|
"indicator--59120933-240c-4b71-a453-4b08950d210f",
|
|
"indicator--59120934-89c8-4690-891f-4c10950d210f",
|
|
"indicator--59120934-d538-482c-b474-419c950d210f",
|
|
"indicator--59120935-0118-43c3-ba70-4d42950d210f",
|
|
"indicator--59120936-b704-4115-b3e5-4ab1950d210f",
|
|
"indicator--59120936-92fc-46d2-9c9c-4e97950d210f",
|
|
"indicator--59120936-9164-47fd-96c3-4280950d210f",
|
|
"indicator--59120937-db24-41aa-be2c-48aa950d210f",
|
|
"indicator--59120937-b208-448d-bc97-450e950d210f",
|
|
"indicator--59120938-2cbc-4597-adaf-4f96950d210f",
|
|
"vulnerability--5912097c-fc58-4e8e-bb3d-41d3950d210f",
|
|
"vulnerability--5912097c-f01c-4ed1-a5d2-4ab0950d210f",
|
|
"vulnerability--5912097c-b424-49ac-a062-4926950d210f",
|
|
"vulnerability--5912097c-a1f8-45be-921c-465c950d210f",
|
|
"vulnerability--5912097c-7794-40c9-8c31-42a0950d210f",
|
|
"indicator--591209d3-4180-4edf-8d5d-4f2902de0b81",
|
|
"indicator--591209d4-70f8-4afa-9a5f-4b9502de0b81",
|
|
"observed-data--591209d5-2d24-404e-8039-423502de0b81",
|
|
"url--591209d5-2d24-404e-8039-423502de0b81",
|
|
"indicator--591209d6-a5f4-4877-b157-418b02de0b81",
|
|
"indicator--591209d7-08a0-488a-877c-435d02de0b81",
|
|
"observed-data--591209d7-f754-48df-ba71-401f02de0b81",
|
|
"url--591209d7-f754-48df-ba71-401f02de0b81",
|
|
"indicator--591209d8-1834-4dbc-87ce-418002de0b81",
|
|
"indicator--591209d9-d360-453b-b6a7-4fcc02de0b81",
|
|
"observed-data--591209da-a29c-46c2-aeac-421e02de0b81",
|
|
"url--591209da-a29c-46c2-aeac-421e02de0b81"
|
|
],
|
|
"labels": [
|
|
"Threat-Report",
|
|
"misp:tool=\"MISP-STIX-Converter\"",
|
|
"misp-galaxy:tool=\"GAMEFISH\""
|
|
],
|
|
"object_marking_refs": [
|
|
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
|
|
]
|
|
},
|
|
{
|
|
"type": "observed-data",
|
|
"spec_version": "2.1",
|
|
"id": "observed-data--59120872-11dc-4982-8a6c-4c95950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"first_observed": "2017-05-09T18:26:18Z",
|
|
"last_observed": "2017-05-09T18:26:18Z",
|
|
"number_observed": 1,
|
|
"object_refs": [
|
|
"url--59120872-11dc-4982-8a6c-4c95950d210f"
|
|
],
|
|
"labels": [
|
|
"misp:type=\"link\"",
|
|
"misp:category=\"External analysis\"",
|
|
"osint:source-type=\"blog-post\""
|
|
]
|
|
},
|
|
{
|
|
"type": "url",
|
|
"spec_version": "2.1",
|
|
"id": "url--59120872-11dc-4982-8a6c-4c95950d210f",
|
|
"value": "https://www.fireeye.com/blog/threat-research/2017/05/eps-processing-zero-days.html"
|
|
},
|
|
{
|
|
"type": "x-misp-attribute",
|
|
"spec_version": "2.1",
|
|
"id": "x-misp-attribute--59120885-4620-48a4-a028-4080950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"labels": [
|
|
"misp:type=\"text\"",
|
|
"misp:category=\"External analysis\"",
|
|
"osint:source-type=\"blog-post\""
|
|
],
|
|
"x_misp_category": "External analysis",
|
|
"x_misp_type": "text",
|
|
"x_misp_value": "In 2015, FireEye published details about two attacks exploiting vulnerabilities in Encapsulated PostScript (EPS) of Microsoft Office. One was a zero-day and one was patched weeks before the attack launched.\r\n\r\nRecently, FireEye identified three new zero-day vulnerabilities in Microsoft Office products that are being exploited in the wild.\r\n\r\nAt the end of March 2017, we detected another malicious document leveraging an unknown vulnerability in EPS and a recently patched vulnerability in Windows Graphics Device Interface (GDI) to drop malware. Following the April 2017 Patch Tuesday, in which Microsoft disabled EPS, FireEye detected a second unknown vulnerability in EPS.\r\n\r\nFireEye believes that two actors \u00e2\u20ac\u201c Turla and an unknown financially motivated actor \u00e2\u20ac\u201c were using the first EPS zero-day (CVE-2017-0261), and APT28 was using the second EPS zero-day (CVE-2017-0262) along with a new Escalation of Privilege (EOP) zero-day (CVE-2017-0263). Turla and APT28 are Russian cyber espionage groups that have used these zero-days against European diplomatic and military entities. The unidentified financial group targeted regional and global banks with offices in the Middle East. The following is a description of the EPS zero-days, associated malware, and the new EOP zero-day. Each EPS zero-day is accompanied by an EOP exploit, with the EOP being required to escape the sandbox that executes the FLTLDR.EXE instance used for EPS processing.\r\n\r\nThe malicious documents have been used to deliver three different payloads. CVE-2017-0261 was used to deliver SHIRIME (Turla) and NETWIRE (unknown financially motivated actor), and CVE-2017-0262 was used to deliver GAMEFISH (APT28). CVE-2017-0263 is used to escalate privileges during the delivery of the GAMEFISH payload.\r\n\r\nFireEye email and network products detected the malicious documents.\r\n\r\nFireEye has been coordinating with the Microsoft Security Response Center (MSRC) for the responsible disclosure of this information. Microsoft advises all customers to follow the guidance in security advisory ADV170005 as a defense-in-depth measure against EPS filter vulnerabilities."
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--5912092f-9670-4c21-a7cc-4a72950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"description": "Confirmation_letter.docx.bin (NETWIRE) \t 84.200.2.12",
|
|
"pattern": "[file:hashes.MD5 = '2abe3cc4bff46455a945d56c27e9fb45']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:18Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"md5\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--5912092f-0350-4ec0-8889-4981950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"pattern": "[file:name = 'Confirmation_letter.docx.bin']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:18Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"filename\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--59120930-cf28-472d-87ce-4e33950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.200.2.12']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:18Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Network activity"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"ip-dst\"",
|
|
"misp:category=\"Network activity\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--59120931-b868-4c65-a6c4-46f6950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"description": "Confirmation_letter.docx (NETWIRE) \t 138.201.44.30",
|
|
"pattern": "[file:hashes.MD5 = 'e091425d23b8db6082b40d25e938f871']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:18Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"md5\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--59120932-07d8-4a85-bb43-4a1e950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"pattern": "[file:name = 'Confirmation_letter.docx']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:18Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"filename\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--59120933-240c-4b71-a453-4b08950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '138.201.44.30']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:18Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Network activity"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"ip-dst\"",
|
|
"misp:category=\"Network activity\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--59120934-89c8-4690-891f-4c10950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"description": "Confirmation_letter_ACM.docx (NETWIRE) \t 185.106.122.113",
|
|
"pattern": "[file:hashes.MD5 = '006bdb19b6936329bffd4054e270dc6a']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:18Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"md5\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--59120934-d538-482c-b474-419c950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"pattern": "[file:name = 'Confirmation_letter_ACM.docx']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:18Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"filename\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--59120935-0118-43c3-ba70-4d42950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.106.122.113']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:18Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Network activity"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"ip-dst\"",
|
|
"misp:category=\"Network activity\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--59120936-b704-4115-b3e5-4ab1950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"description": "st07383.en17.docx (SHIRIME) \t tnsc.webredirect.org",
|
|
"pattern": "[file:hashes.MD5 = '15660631e31c1172ba5a299a90938c02']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:18Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"md5\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--59120936-92fc-46d2-9c9c-4e97950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"pattern": "[file:name = 'st07383.en17.docx']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:18Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"filename\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--59120936-9164-47fd-96c3-4280950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"pattern": "[domain-name:value = 'tnsc.webredirect.org']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:18Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Network activity"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"hostname\"",
|
|
"misp:category=\"Network activity\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--59120937-db24-41aa-be2c-48aa950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"description": "Trump's_Attack_on_Syria_English.docx (GAMEFISH) \t wmdmediacodecs.com",
|
|
"pattern": "[file:hashes.MD5 = 'f8e92d8b5488ea76c40601c8f1a08790']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:18Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"md5\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--59120937-b208-448d-bc97-450e950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"pattern": "[file:name = 'Trump\\'s_Attack_on_Syria_English.docx']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:18Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"filename\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--59120938-2cbc-4597-adaf-4f96950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"pattern": "[domain-name:value = 'wmdmediacodecs.com']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:18Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Network activity"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"domain\"",
|
|
"misp:category=\"Network activity\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "vulnerability",
|
|
"spec_version": "2.1",
|
|
"id": "vulnerability--5912097c-fc58-4e8e-bb3d-41d3950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"name": "CVE-2017-0261",
|
|
"labels": [
|
|
"misp:type=\"vulnerability\"",
|
|
"misp:category=\"Payload delivery\""
|
|
],
|
|
"external_references": [
|
|
{
|
|
"source_name": "cve",
|
|
"external_id": "CVE-2017-0261"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"type": "vulnerability",
|
|
"spec_version": "2.1",
|
|
"id": "vulnerability--5912097c-f01c-4ed1-a5d2-4ab0950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"name": "CVE-2017-0262",
|
|
"labels": [
|
|
"misp:type=\"vulnerability\"",
|
|
"misp:category=\"Payload delivery\""
|
|
],
|
|
"external_references": [
|
|
{
|
|
"source_name": "cve",
|
|
"external_id": "CVE-2017-0262"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"type": "vulnerability",
|
|
"spec_version": "2.1",
|
|
"id": "vulnerability--5912097c-b424-49ac-a062-4926950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"name": "CVE-2017-0263",
|
|
"labels": [
|
|
"misp:type=\"vulnerability\"",
|
|
"misp:category=\"Payload delivery\""
|
|
],
|
|
"external_references": [
|
|
{
|
|
"source_name": "cve",
|
|
"external_id": "CVE-2017-0263"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"type": "vulnerability",
|
|
"spec_version": "2.1",
|
|
"id": "vulnerability--5912097c-a1f8-45be-921c-465c950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"name": "CVE-2017-0001",
|
|
"labels": [
|
|
"misp:type=\"vulnerability\"",
|
|
"misp:category=\"Payload delivery\""
|
|
],
|
|
"external_references": [
|
|
{
|
|
"source_name": "cve",
|
|
"external_id": "CVE-2017-0001"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"type": "vulnerability",
|
|
"spec_version": "2.1",
|
|
"id": "vulnerability--5912097c-7794-40c9-8c31-42a0950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:18.000Z",
|
|
"modified": "2017-05-09T18:26:18.000Z",
|
|
"name": "CVE-2016-7255",
|
|
"labels": [
|
|
"misp:type=\"vulnerability\"",
|
|
"misp:category=\"Payload delivery\""
|
|
],
|
|
"external_references": [
|
|
{
|
|
"source_name": "cve",
|
|
"external_id": "CVE-2016-7255"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--591209d3-4180-4edf-8d5d-4f2902de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:27.000Z",
|
|
"modified": "2017-05-09T18:26:27.000Z",
|
|
"description": "Trump's_Attack_on_Syria_English.docx (GAMEFISH) \t wmdmediacodecs.com - Xchecked via VT: f8e92d8b5488ea76c40601c8f1a08790",
|
|
"pattern": "[file:hashes.SHA256 = '91acb0d56771af0196e34ac95194b3d0bf3200bc5f6208caf3a91286958876f9']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:27Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"sha256\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--591209d4-70f8-4afa-9a5f-4b9502de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:28.000Z",
|
|
"modified": "2017-05-09T18:26:28.000Z",
|
|
"description": "Trump's_Attack_on_Syria_English.docx (GAMEFISH) \t wmdmediacodecs.com - Xchecked via VT: f8e92d8b5488ea76c40601c8f1a08790",
|
|
"pattern": "[file:hashes.SHA1 = 'd5235d136cfcadbef431eea7253d80bde414db9d']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:28Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"sha1\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "observed-data",
|
|
"spec_version": "2.1",
|
|
"id": "observed-data--591209d5-2d24-404e-8039-423502de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:29.000Z",
|
|
"modified": "2017-05-09T18:26:29.000Z",
|
|
"first_observed": "2017-05-09T18:26:29Z",
|
|
"last_observed": "2017-05-09T18:26:29Z",
|
|
"number_observed": 1,
|
|
"object_refs": [
|
|
"url--591209d5-2d24-404e-8039-423502de0b81"
|
|
],
|
|
"labels": [
|
|
"misp:type=\"link\"",
|
|
"misp:category=\"External analysis\""
|
|
]
|
|
},
|
|
{
|
|
"type": "url",
|
|
"spec_version": "2.1",
|
|
"id": "url--591209d5-2d24-404e-8039-423502de0b81",
|
|
"value": "https://www.virustotal.com/file/91acb0d56771af0196e34ac95194b3d0bf3200bc5f6208caf3a91286958876f9/analysis/1494351849/"
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--591209d6-a5f4-4877-b157-418b02de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:30.000Z",
|
|
"modified": "2017-05-09T18:26:30.000Z",
|
|
"description": "Confirmation_letter_ACM.docx (NETWIRE) \t 185.106.122.113 - Xchecked via VT: 006bdb19b6936329bffd4054e270dc6a",
|
|
"pattern": "[file:hashes.SHA256 = 'ef783cc3c4e1e0649b4629f3396cff4c0e0e0e67c07cacb8a9ae7c0cfa16bf0c']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:30Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"sha256\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--591209d7-08a0-488a-877c-435d02de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:31.000Z",
|
|
"modified": "2017-05-09T18:26:31.000Z",
|
|
"description": "Confirmation_letter_ACM.docx (NETWIRE) \t 185.106.122.113 - Xchecked via VT: 006bdb19b6936329bffd4054e270dc6a",
|
|
"pattern": "[file:hashes.SHA1 = 'b266bee50d80269f6e70f2cace7c38f393da9513']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:31Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"sha1\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "observed-data",
|
|
"spec_version": "2.1",
|
|
"id": "observed-data--591209d7-f754-48df-ba71-401f02de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:31.000Z",
|
|
"modified": "2017-05-09T18:26:31.000Z",
|
|
"first_observed": "2017-05-09T18:26:31Z",
|
|
"last_observed": "2017-05-09T18:26:31Z",
|
|
"number_observed": 1,
|
|
"object_refs": [
|
|
"url--591209d7-f754-48df-ba71-401f02de0b81"
|
|
],
|
|
"labels": [
|
|
"misp:type=\"link\"",
|
|
"misp:category=\"External analysis\""
|
|
]
|
|
},
|
|
{
|
|
"type": "url",
|
|
"spec_version": "2.1",
|
|
"id": "url--591209d7-f754-48df-ba71-401f02de0b81",
|
|
"value": "https://www.virustotal.com/file/ef783cc3c4e1e0649b4629f3396cff4c0e0e0e67c07cacb8a9ae7c0cfa16bf0c/analysis/1494352684/"
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--591209d8-1834-4dbc-87ce-418002de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:32.000Z",
|
|
"modified": "2017-05-09T18:26:32.000Z",
|
|
"description": "Confirmation_letter.docx.bin (NETWIRE) \t 84.200.2.12 - Xchecked via VT: 2abe3cc4bff46455a945d56c27e9fb45",
|
|
"pattern": "[file:hashes.SHA256 = '6785e29698444243677300db6a0c519909ae9e620d575e76d9be4862b33ed490']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:32Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"sha256\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--591209d9-d360-453b-b6a7-4fcc02de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:33.000Z",
|
|
"modified": "2017-05-09T18:26:33.000Z",
|
|
"description": "Confirmation_letter.docx.bin (NETWIRE) \t 84.200.2.12 - Xchecked via VT: 2abe3cc4bff46455a945d56c27e9fb45",
|
|
"pattern": "[file:hashes.SHA1 = '0bd354d1eea9e4864f4c17e6c22bfdb81d88ddee']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-05-09T18:26:33Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"sha1\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "observed-data",
|
|
"spec_version": "2.1",
|
|
"id": "observed-data--591209da-a29c-46c2-aeac-421e02de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-05-09T18:26:34.000Z",
|
|
"modified": "2017-05-09T18:26:34.000Z",
|
|
"first_observed": "2017-05-09T18:26:34Z",
|
|
"last_observed": "2017-05-09T18:26:34Z",
|
|
"number_observed": 1,
|
|
"object_refs": [
|
|
"url--591209da-a29c-46c2-aeac-421e02de0b81"
|
|
],
|
|
"labels": [
|
|
"misp:type=\"link\"",
|
|
"misp:category=\"External analysis\""
|
|
]
|
|
},
|
|
{
|
|
"type": "url",
|
|
"spec_version": "2.1",
|
|
"id": "url--591209da-a29c-46c2-aeac-421e02de0b81",
|
|
"value": "https://www.virustotal.com/file/6785e29698444243677300db6a0c519909ae9e620d575e76d9be4862b33ed490/analysis/1494351848/"
|
|
},
|
|
{
|
|
"type": "marking-definition",
|
|
"spec_version": "2.1",
|
|
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
|
|
"created": "2017-01-20T00:00:00.000Z",
|
|
"definition_type": "tlp",
|
|
"name": "TLP:WHITE",
|
|
"definition": {
|
|
"tlp": "white"
|
|
}
|
|
}
|
|
]
|
|
} |