2018-12-06 21:18:25 +01:00
{
"id" : "bundle--611947ce-ae3b-4fdb-b297-aed8eab22e4f" ,
"objects" : [
{
2019-01-23 19:42:25 +01:00
"created" : "2017-05-31T21:32:15.263Z" ,
2018-12-06 21:18:25 +01:00
"created_by_ref" : "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" ,
"description" : "PoisonIvy is a popular remote access tool (RAT) that has been used by many groups.[[Citation: FireEye Poison Ivy]]\n\nAliases: PoisonIvy, Poison Ivy" ,
"external_references" : [
{
"external_id" : "S0012" ,
"source_name" : "mitre-attack" ,
"url" : "https://attack.mitre.org/wiki/Software/S0012"
} ,
{
"description" : "FireEye. (2014). POISON IVY: Assessing Damage and Extracting Intelligence. Retrieved November 12, 2014." ,
"source_name" : "FireEye Poison Ivy" ,
"url" : "https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-poison-ivy.pdf"
}
] ,
"id" : "malware--b42378e0-f147-496f-992a-26a49705395b" ,
"labels" : [
"malware"
] ,
2019-01-23 19:42:25 +01:00
"modified" : "2017-05-31T21:32:15.263Z" ,
2018-12-06 21:18:25 +01:00
"name" : "PoisonIvy" ,
"object_marking_refs" : [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
] ,
"type" : "malware"
}
] ,
"spec_version" : "2.0" ,
"type" : "bundle"
}