misp-circl-feed/feeds/circl/misp/58007f1d-7a4c-4887-ba33-c28b950d210f.json

270 lines
No EOL
11 KiB
JSON

{
"type": "bundle",
"id": "bundle--58007f1d-7a4c-4887-ba33-c28b950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-10-14T14:18:19.000Z",
"modified": "2016-10-14T14:18:19.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--58007f1d-7a4c-4887-ba33-c28b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-10-14T14:18:19.000Z",
"modified": "2016-10-14T14:18:19.000Z",
"name": "Spam 2016-10-14 (mule acquisition) - probably related to Locky resources",
"published": "2016-10-14T14:18:44Z",
"object_refs": [
"indicator--58007f33-de40-49cd-a322-c2bb950d210f",
"indicator--58007f33-a01c-49e0-a0e0-c2bb950d210f",
"indicator--58007f33-2a28-42e6-a98b-c2bb950d210f",
"indicator--58007f33-71b0-468a-b508-c2bb950d210f",
"indicator--58007f34-a9c0-456f-b601-c2bb950d210f",
"indicator--58007f34-a094-48f0-8efa-c2bb950d210f",
"indicator--5800e929-a584-4e13-82a2-c28f950d210f",
"indicator--5800e92a-7800-4e2b-abf1-c28f950d210f",
"indicator--5800e92a-8870-4509-b8a6-c28f950d210f"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58007f33-de40-49cd-a322-c2bb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-10-14T06:46:11.000Z",
"modified": "2016-10-14T06:46:11.000Z",
"description": "compromised resource",
"pattern": "[url:value = 'http://benavent.cat/accionsenegal/wp-content/uploads/2016/09/']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-10-14T06:46:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58007f33-a01c-49e0-a0e0-c2bb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-10-14T06:46:11.000Z",
"modified": "2016-10-14T06:46:11.000Z",
"description": "compromised resource",
"pattern": "[domain-name:value = 'benavent.cat']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-10-14T06:46:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58007f33-2a28-42e6-a98b-c2bb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-10-14T06:46:11.000Z",
"modified": "2016-10-14T06:46:11.000Z",
"description": "compromised resource",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '160.153.73.137']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-10-14T06:46:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58007f33-71b0-468a-b508-c2bb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-10-14T06:46:11.000Z",
"modified": "2016-10-14T06:46:11.000Z",
"description": "compromised resource",
"pattern": "[url:value = 'http://bevoguenow.com/bvadmin/tinymce/jscripts/tiny_mce/langs/']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-10-14T06:46:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58007f34-a9c0-456f-b601-c2bb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-10-14T06:46:12.000Z",
"modified": "2016-10-14T06:46:12.000Z",
"description": "compromised resource",
"pattern": "[domain-name:value = 'bevoguenow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-10-14T06:46:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58007f34-a094-48f0-8efa-c2bb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-10-14T06:46:12.000Z",
"modified": "2016-10-14T06:46:12.000Z",
"description": "compromised resource",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '98.129.229.148']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-10-14T06:46:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5800e929-a584-4e13-82a2-c28f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-10-14T14:18:17.000Z",
"modified": "2016-10-14T14:18:17.000Z",
"description": "compromised resource",
"pattern": "[url:value = 'http://belevtsev.net/media/plugin_googlemap3/site/moodalbox/img/']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-10-14T14:18:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5800e92a-7800-4e2b-abf1-c28f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-10-14T14:18:18.000Z",
"modified": "2016-10-14T14:18:18.000Z",
"description": "compromised resource",
"pattern": "[domain-name:value = 'belevtsev.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-10-14T14:18:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5800e92a-8870-4509-b8a6-c28f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-10-14T14:18:18.000Z",
"modified": "2016-10-14T14:18:18.000Z",
"description": "compromised resource",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '195.208.1.164']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-10-14T14:18:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}