STIX

 view release on metacpan or  search on metacpan

t/examples-bundle.json  view on Meta::CPAN

        "home_dir": "/home/jdoe",
        "shell": "/bin/bash"
      }
    }
  },
  {
    "type": "windows-registry-key",
    "spec_version": "2.1",
    "id": "windows-registry-key--9d60798d-4e3e-5fe4-af8a-0e4986f0f90b",
    "key": "HKEY_LOCAL_MACHINE\\System\\Foo\\Bar"
  },
  {
    "type": "windows-registry-key",
    "spec_version": "2.1",
    "id": "windows-registry-key--2ba37ae7-2745-5082-9dfd-9486dad41016",
    "key": "hkey_local_machine\\system\\bar\\foo",
    "values": [
      {
        "name": "Foo",
        "data": "qwerty",
        "data_type": "REG_SZ"
      },
      {
        "name": "Bar",
        "data": "42",
        "data_type": "REG_DWORD"
      }
    ]
  },
  {
    "type": "x509-certificate",
    "spec_version": "2.1",
    "id": "x509-certificate--463d7b2a-8516-5a50-a3d7-6f801465d5de",
    "issuer": "C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Server CA/emailAddress=server-certs@thawte.com",
    "validity_not_before": "2016-03-12T12:00:00Z",
    "validity_not_after": "2016-08-21T12:00:00Z",
    "subject": "C=US, ST=Maryland, L=Pasadena, O=Brent Baccala, OU=FreeSoft, CN=www.freesoft.org/emailAddress=baccala@freesoft.org",
    "serial_number": "36:f7:d4:32:f4:ab:70:ea:d3:ce:98:6e:ea:99:93:49:32:0a:b7:06"
  },
  {
    "type": "x509-certificate",
    "spec_version": "2.1",
    "id": "x509-certificate--b595eaf0-0b28-5dad-9e8e-0fab9c1facc9",
    "issuer": "C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Server CA/emailAddress=server-certs@thawte.com",
    "validity_not_before": "2016-03-12T12:00:00Z",
    "validity_not_after": "2016-08-21T12:00:00Z",
    "subject": "C=US, ST=Maryland, L=Pasadena, O=Brent Baccala, OU=FreeSoft, CN=www.freesoft.org/emailAddress=baccala@freesoft.org",
    "serial_number": "02:08:87:83:f2:13:58:1f:79:52:1e:66:90:0a:02:24:c9:6b:c7:dc",
    "x509_v3_extensions": {
      "basic_constraints": "critical,CA:TRUE, pathlen:0",
      "name_constraints": "permitted;IP:192.168.0.0/255.255.0.0",
      "policy_constraints": "requireExplicitPolicy:3",
      "key_usage": "critical, keyCertSign",
      "extended_key_usage": "critical,codeSigning,1.2.3.4",
      "subject_key_identifier": "hash",
      "authority_key_identifier": "keyid,issuer",
      "subject_alternative_name": "email:my@other.address,RID:1.2.3.4",
      "issuer_alternative_name": "issuer:copy",
      "crl_distribution_points": "URI:http://myhost.com/myca.crl",
      "inhibit_any_policy": "2",
      "private_key_usage_period_not_before": "2016-03-12T12:00:00Z",
      "private_key_usage_period_not_after": "2018-03-12T12:00:00Z",
      "certificate_policies": "1.2.4.5, 1.1.3.4"
    }
  },

  {
    "type": "attack-pattern",
    "spec_version": "2.1",
    "id": "attack-pattern--0c7b5b88-8ff7-4a4d-aa9d-feb398cd0061",
    "created": "2016-05-12T08:17:27.000Z",
    "modified": "2016-05-12T08:17:27.000Z",
    "name": "Spear Phishing",
    "description": "...",
    "external_references": [
      {
        "source_name": "capec",
        "external_id": "CAPEC-163"
      }
    ]
  },
  {
    "type": "attack-pattern",
    "spec_version": "2.1",
    "id": "attack-pattern--7e33a43e-e34b-40ec-89da-36c9bb2cacd5",
    "created": "2016-05-12T08:17:27.000Z",
    "modified": "2016-05-12T08:17:27.000Z",
    "name": "Spear Phishing as Practiced by Adversary X",
    "description": "A particular form of spear phishing where the attacker claims that the target had won a contest, including personal details, to get them to click on a link.",
    "external_references": [
      {
        "source_name": "capec",
        "external_id": "CAPEC-163"
      }
    ]
  },
  {
    "type": "course-of-action",
    "spec_version": "2.1",
    "id": "course-of-action--8e2e2d2b-17d4-4cbf-938f-98ee46b3cd3f",
    "created_by_ref": "identity--f431f809-377b-45e0-aa1c-6a4751cae5ff",
    "created": "2016-04-06T20:03:48.000Z",
    "modified": "2016-04-06T20:03:48.000Z",
    "name": "Add TCP port 80 Filter Rule to the existing Block UDP 1434 Filter",
    "description": "This is how to add a filter rule to block inbound access to TCP port 80 to the existing UDP 1434 filter ..."
  },
  {
    "type": "grouping",
    "spec_version": "2.1",
    "id": "grouping--84e4d88f-44ea-4bcd-bbf3-b2c1c320bcb3",
    "created_by_ref": "identity--a463ffb3-1bd9-4d94-b02d-74e4f1658283",
    "created": "2015-12-21T19:59:11.000Z",
    "modified": "2015-12-21T19:59:11.000Z",
    "name": "The Black Vine Cyberespionage Group",
    "description": "A simple collection of Black Vine Cyberespionage Group attributed intel",
    "context": "suspicious-activity",
    "object_refs": [
      "indicator--26ffb872-1dd9-446e-b6f5-d58527e5b5d2",
      "campaign--83422c77-904c-4dc1-aff5-5c38f3a2c55c",
      "relationship--f82356ae-fe6c-437c-9c24-6b64314ae68a",
      "file--0203b5c8-f8b6-4ddb-9ad0-527d727f968b"
    ]



( run in 0.847 second using v1.01-cache-2.11-cpan-39bf76dae61 )