misp-circl-feed/feeds/circl/stix-2.1/a097dd7c-8e29-40eb-a70d-1fb0b5cca689.json

167 lines
No EOL
6.5 KiB
JSON

{
"type": "bundle",
"id": "bundle--a097dd7c-8e29-40eb-a70d-1fb0b5cca689",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--5a313608-0410-4941-aaeb-8607950d210f",
"created": "2022-02-25T17:23:53.000Z",
"modified": "2022-02-25T17:23:53.000Z",
"name": "SCTIF",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--a097dd7c-8e29-40eb-a70d-1fb0b5cca689",
"created_by_ref": "identity--5a313608-0410-4941-aaeb-8607950d210f",
"created": "2022-02-25T17:23:53.000Z",
"modified": "2022-02-25T17:23:53.000Z",
"name": "HermeticWiper",
"published": "2022-02-25T17:24:03Z",
"object_refs": [
"indicator--90aef5c5-492d-4c84-adf8-60ff214a17c3",
"indicator--4cab8881-9318-4c40-a420-c4dd2bfbddf9",
"indicator--215a5737-73a1-41e3-a4b8-c122377ad081",
"indicator--a78adcbb-87ac-4942-8fa3-e5b85bac51e0",
"observed-data--260ee63c-ea28-4ba1-97bf-258b432fb758",
"url--260ee63c-ea28-4ba1-97bf-258b432fb758"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--90aef5c5-492d-4c84-adf8-60ff214a17c3",
"created_by_ref": "identity--5a313608-0410-4941-aaeb-8607950d210f",
"created": "2022-02-25T17:19:17.000Z",
"modified": "2022-02-25T17:19:17.000Z",
"pattern": "[file:hashes.SHA256 = '1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-02-25T17:19:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4cab8881-9318-4c40-a420-c4dd2bfbddf9",
"created_by_ref": "identity--5a313608-0410-4941-aaeb-8607950d210f",
"created": "2022-02-25T17:23:00.000Z",
"modified": "2022-02-25T17:23:00.000Z",
"pattern": "[url:value = 'https://twitter.com/Sebdraven/status/1496796936698884097?']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-02-25T17:23:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "External analysis"
}
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--215a5737-73a1-41e3-a4b8-c122377ad081",
"created_by_ref": "identity--5a313608-0410-4941-aaeb-8607950d210f",
"created": "2022-02-25T17:23:08.000Z",
"modified": "2022-02-25T17:23:08.000Z",
"pattern": "[url:value = 'https://twitter.com/0xthreatintel/status/1497192937406754818?t=GYbB_9wJzaZXcTLcXTbgww&s=19']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-02-25T17:23:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "External analysis"
}
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a78adcbb-87ac-4942-8fa3-e5b85bac51e0",
"created_by_ref": "identity--5a313608-0410-4941-aaeb-8607950d210f",
"created": "2022-02-25T17:23:21.000Z",
"modified": "2022-02-25T17:23:21.000Z",
"pattern": "[url:value = 'https://analyze.intezer.com/analyses/fc5894d6-bbf0-419d-b670-0de2ac345fc5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-02-25T17:23:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "External analysis"
}
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--260ee63c-ea28-4ba1-97bf-258b432fb758",
"created_by_ref": "identity--5a313608-0410-4941-aaeb-8607950d210f",
"created": "2022-02-25T17:22:28.000Z",
"modified": "2022-02-25T17:22:28.000Z",
"first_observed": "2022-02-25T17:22:28Z",
"last_observed": "2022-02-25T17:22:28Z",
"number_observed": 1,
"object_refs": [
"url--260ee63c-ea28-4ba1-97bf-258b432fb758"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--260ee63c-ea28-4ba1-97bf-258b432fb758",
"value": "https://www.virustotal.com/gui/file/1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}