138 lines
No EOL
5.9 KiB
JSON
138 lines
No EOL
5.9 KiB
JSON
{
|
|
"type": "bundle",
|
|
"id": "bundle--5e55be1a-3a30-48ae-9934-4199950d210f",
|
|
"objects": [
|
|
{
|
|
"type": "identity",
|
|
"spec_version": "2.1",
|
|
"id": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
|
|
"created": "2020-02-28T17:47:18.000Z",
|
|
"modified": "2020-02-28T17:47:18.000Z",
|
|
"name": "wilbursecurity.com",
|
|
"identity_class": "organization"
|
|
},
|
|
{
|
|
"type": "report",
|
|
"spec_version": "2.1",
|
|
"id": "report--5e55be1a-3a30-48ae-9934-4199950d210f",
|
|
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
|
|
"created": "2020-02-28T17:47:18.000Z",
|
|
"modified": "2020-02-28T17:47:18.000Z",
|
|
"name": "Interesting Recon Script",
|
|
"published": "2020-02-28T17:47:25Z",
|
|
"object_refs": [
|
|
"observed-data--5e587ba2-f51c-4069-9303-b66e950d210f",
|
|
"url--5e587ba2-f51c-4069-9303-b66e950d210f",
|
|
"observed-data--5e587bd2-af38-44b4-83ed-b0a0950d210f",
|
|
"url--5e587bd2-af38-44b4-83ed-b0a0950d210f",
|
|
"observed-data--5e587d45-2be4-4c22-b28c-6a86950d210f",
|
|
"url--5e587d45-2be4-4c22-b28c-6a86950d210f"
|
|
],
|
|
"labels": [
|
|
"Threat-Report",
|
|
"misp:tool=\"MISP-STIX-Converter\"",
|
|
"kill-chain:Reconnaissance",
|
|
"misp-galaxy:mitre-attack-pattern=\"Scripting - T1064\"",
|
|
"misp-galaxy:mitre-attack-pattern=\"User Execution - T1204\"",
|
|
"misp-galaxy:mitre-attack-pattern=\"Command-Line Interface - T1059\"",
|
|
"misp-galaxy:mitre-attack-pattern=\"Account Discovery - T1087\"",
|
|
"misp-galaxy:mitre-attack-pattern=\"Domain Trust Discovery - T1482\"",
|
|
"misp-galaxy:mitre-attack-pattern=\"File and Directory Discovery - T1083\"",
|
|
"misp-galaxy:mitre-attack-pattern=\"Network Share Discovery - T1135\"",
|
|
"misp-galaxy:mitre-attack-pattern=\"Permission Groups Discovery - T1069\"",
|
|
"misp-galaxy:mitre-attack-pattern=\"Process Discovery - T1057\"",
|
|
"misp-galaxy:mitre-attack-pattern=\"Query Registry - T1012\"",
|
|
"misp-galaxy:mitre-attack-pattern=\"Remote System Discovery - T1018\"",
|
|
"misp-galaxy:mitre-attack-pattern=\"Software Discovery - T1518\"",
|
|
"misp-galaxy:mitre-attack-pattern=\"System Information Discovery - T1082\"",
|
|
"misp-galaxy:mitre-attack-pattern=\"System Network Connections Discovery - T1049\""
|
|
],
|
|
"object_marking_refs": [
|
|
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
|
|
]
|
|
},
|
|
{
|
|
"type": "observed-data",
|
|
"spec_version": "2.1",
|
|
"id": "observed-data--5e587ba2-f51c-4069-9303-b66e950d210f",
|
|
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
|
|
"created": "2020-02-28T02:32:02.000Z",
|
|
"modified": "2020-02-28T02:32:02.000Z",
|
|
"first_observed": "2020-02-28T02:32:02Z",
|
|
"last_observed": "2020-02-28T02:32:02Z",
|
|
"number_observed": 1,
|
|
"object_refs": [
|
|
"url--5e587ba2-f51c-4069-9303-b66e950d210f"
|
|
],
|
|
"labels": [
|
|
"misp:type=\"link\"",
|
|
"misp:category=\"External analysis\""
|
|
]
|
|
},
|
|
{
|
|
"type": "url",
|
|
"spec_version": "2.1",
|
|
"id": "url--5e587ba2-f51c-4069-9303-b66e950d210f",
|
|
"value": "https://pastebin.com/8QmnA7eE"
|
|
},
|
|
{
|
|
"type": "observed-data",
|
|
"spec_version": "2.1",
|
|
"id": "observed-data--5e587bd2-af38-44b4-83ed-b0a0950d210f",
|
|
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
|
|
"created": "2020-02-28T17:47:18.000Z",
|
|
"modified": "2020-02-28T17:47:18.000Z",
|
|
"first_observed": "2020-02-28T17:47:18Z",
|
|
"last_observed": "2020-02-28T17:47:18Z",
|
|
"number_observed": 1,
|
|
"object_refs": [
|
|
"url--5e587bd2-af38-44b4-83ed-b0a0950d210f"
|
|
],
|
|
"labels": [
|
|
"misp:type=\"link\"",
|
|
"misp:category=\"External analysis\""
|
|
]
|
|
},
|
|
{
|
|
"type": "url",
|
|
"spec_version": "2.1",
|
|
"id": "url--5e587bd2-af38-44b4-83ed-b0a0950d210f",
|
|
"value": "https://pastebin.com/TixDfqZK"
|
|
},
|
|
{
|
|
"type": "observed-data",
|
|
"spec_version": "2.1",
|
|
"id": "observed-data--5e587d45-2be4-4c22-b28c-6a86950d210f",
|
|
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
|
|
"created": "2020-02-28T02:39:01.000Z",
|
|
"modified": "2020-02-28T02:39:01.000Z",
|
|
"first_observed": "2020-02-28T02:39:01Z",
|
|
"last_observed": "2020-02-28T02:39:01Z",
|
|
"number_observed": 1,
|
|
"object_refs": [
|
|
"url--5e587d45-2be4-4c22-b28c-6a86950d210f"
|
|
],
|
|
"labels": [
|
|
"misp:type=\"link\"",
|
|
"misp:category=\"External analysis\""
|
|
]
|
|
},
|
|
{
|
|
"type": "url",
|
|
"spec_version": "2.1",
|
|
"id": "url--5e587d45-2be4-4c22-b28c-6a86950d210f",
|
|
"value": "https://www.wilbursecurity.com/2020/02/interesting-recon-script/"
|
|
},
|
|
{
|
|
"type": "marking-definition",
|
|
"spec_version": "2.1",
|
|
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
|
|
"created": "2017-01-20T00:00:00.000Z",
|
|
"definition_type": "tlp",
|
|
"name": "TLP:WHITE",
|
|
"definition": {
|
|
"tlp": "white"
|
|
}
|
|
}
|
|
]
|
|
} |