diff --git a/clusters/ammunitions.json b/clusters/ammunitions.json index ded25e31..0d48e2db 100644 --- a/clusters/ammunitions.json +++ b/clusters/ammunitions.json @@ -3569,16 +3569,6 @@ "uuid": "9aa0a1b7-c9ff-422c-9ef1-431459e1e1b9", "value": "PMC Bronze 44 Magnum Ammo - 500 Rounds of 180 Grain JHP Ammunition" }, - { - "meta": { - "caliber": "X", - "description": "Tac 7.62x51mm Ammo", - "manufacturer": "PMC", - "name": "PMC X" - }, - "uuid": "0dd1db3c-8d5d-4296-b780-ae5ac7a92fed", - "value": "PMC X - Tac 7.62x51mm Ammo" - }, { "meta": { "caliber": "Bronze 308 Win Ammo", @@ -4110,5 +4100,5 @@ "value": "NobelSport High Brass Field 12 Gauge Ammo - 250 Rounds of 1" } ], - "version": 1 + "version": 2 } diff --git a/clusters/malpedia.json b/clusters/malpedia.json index e43fde4e..ac30689a 100644 --- a/clusters/malpedia.json +++ b/clusters/malpedia.json @@ -3660,25 +3660,6 @@ "uuid": "6cb47609-b03e-43d9-a4c7-8342f1011f3b", "value": "ANGRYREBEL" }, - { - "description": "", - "meta": { - "refs": [ - "https://malpedia.caad.fkie.fraunhofer.de/details/elf.avoslocker", - "https://blogs.blackberry.com/en/2022/04/threat-thursday-avoslocker-prompts-advisory-from-fbi-and-fincen", - "https://blog.qualys.com/vulnerabilities-threat-research/2022/03/06/avoslocker-ransomware-behavior-examined-on-windows-linux", - "https://blog.cyble.com/2022/01/17/avoslocker-ransomware-linux-version-targets-vmware-esxi-servers/", - "https://blog.lexfo.fr/Avoslocker.html", - "https://www.ic3.gov/Media/News/2022/220318.pdf", - "https://blogs.vmware.com/security/2022/09/esxi-targeting-ransomware-the-threats-that-are-after-your-virtual-machines-part-1.html", - "https://blogs.vmware.com/security/2022/02/avoslocker-modern-linux-ransomware-threats.html" - ], - "synonyms": [], - "type": [] - }, - "uuid": "465b6a74-87ca-4459-b4be-3f8b272f4485", - "value": "Avoslocker" - }, { "description": "AVrecon is a Linux-based Remote Access Trojan (RAT) targeting small-office/home-office (SOHO) routers and other ARM-embedded devices. The malware is distributed via exploitation of unpatched vulnerabilities or common misconfiguration of the targeted devices. Once deployed, AVreckon will collect some information about the infected device, open a session to pre-configured C&C server, and spawn a remote shell for command execution. It might also download additional arbitrary files and run them. The malware has recently been used in campaigns aimed at ad-fraud activities, password spraying and data exfiltration.", "meta": { @@ -15170,7 +15151,10 @@ "https://news.sophos.com/en-us/2021/12/22/avos-locker-remotely-accesses-boxes-even-running-in-safe-mode/", "https://news.sophos.com/en-us/2022/03/17/the-ransomware-threat-intelligence-center/", "https://unit42.paloaltonetworks.com/emerging-ransomware-groups/", - "https://blog.qualys.com/vulnerabilities-threat-research/2022/03/06/avoslocker-ransomware-behavior-examined-on-windows-linux" + "https://blog.qualys.com/vulnerabilities-threat-research/2022/03/06/avoslocker-ransomware-behavior-examined-on-windows-linux", + "https://blog.lexfo.fr/Avoslocker.html", + "https://blogs.vmware.com/security/2022/09/esxi-targeting-ransomware-the-threats-that-are-after-your-virtual-machines-part-1.html", + "https://blogs.vmware.com/security/2022/02/avoslocker-modern-linux-ransomware-threats.html" ], "synonyms": [], "type": [] @@ -56457,5 +56441,5 @@ "value": "Zyklon" } ], - "version": 19803 + "version": 19804 } diff --git a/clusters/ransomware.json b/clusters/ransomware.json index 6a1d339a..c9ced366 100644 --- a/clusters/ransomware.json +++ b/clusters/ransomware.json @@ -24250,11 +24250,6 @@ "uuid": "90c6daf8-8212-4ea8-9b59-af49b290b3b9", "value": "TurkStatik" }, - { - "description": "ransomware", - "uuid": "93277946-177a-4f92-833d-30db9d432656", - "value": "Tyrant" - }, { "description": "ransomware", "uuid": "0407e98d-cd3e-42e1-8daf-3c51d2e4906a", @@ -29200,5 +29195,5 @@ "value": "apos" } ], - "version": 122 + "version": 123 } diff --git a/clusters/rat.json b/clusters/rat.json index 6dbcf8dc..e8d21ab5 100644 --- a/clusters/rat.json +++ b/clusters/rat.json @@ -1770,7 +1770,7 @@ "date": "1998" }, "uuid": "2a47361d-584b-493f-80a4-37c74c30cf1b", - "value": "Vortex" + "value": "VorteX" }, { "meta": { @@ -2140,13 +2140,6 @@ "uuid": "c42394f8-5f35-4797-9393-8289ab8ad3ad", "value": "SharpEye" }, - { - "meta": { - "date": "2010" - }, - "uuid": "58e2e2ee-5c25-4a13-abfc-2a6c85d978fa", - "value": "VorteX" - }, { "meta": { "date": "2010", @@ -3648,5 +3641,5 @@ "value": "COATHANGER" } ], - "version": 45 + "version": 46 } diff --git a/clusters/tidal-references.json b/clusters/tidal-references.json index bf5c663b..be4099ac 100644 --- a/clusters/tidal-references.json +++ b/clusters/tidal-references.json @@ -502,6 +502,38 @@ "uuid": "fc1396d2-1ffd-4fd9-ba60-3f6e0a9dfffb", "value": "7zip Homepage" }, + { + "description": "Deborah Snyder, Fae Carlisle, Dana Behling, Bria Beathley. (2023, June 28). 8Base Ransomware: A Heavy Hitting Player. Retrieved August 4, 2023.", + "meta": { + "date_accessed": "2023-08-04T00:00:00Z", + "date_published": "2023-06-28T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://blogs.vmware.com/security/2023/06/8base-ransomware-a-heavy-hitting-player.html" + ], + "source": "Tidal Cyber", + "title": "8Base Ransomware: A Heavy Hitting Player" + }, + "related": [], + "uuid": "573e9520-6181-4535-9ed3-2338688a8e9f", + "value": "VMWare 8Base June 28 2023" + }, + { + "description": "Acronis Security Team. (2023, July 17). 8Base ransomware stays unseen for a year. Retrieved August 4, 2023.", + "meta": { + "date_accessed": "2023-08-04T00:00:00Z", + "date_published": "2023-07-17T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.acronis.com/en-sg/cyber-protection-center/posts/8base-ransomware-stays-unseen-for-a-year/" + ], + "source": "Tidal Cyber", + "title": "8Base ransomware stays unseen for a year" + }, + "related": [], + "uuid": "c9822477-1578-4068-9882-41e4d6eaee3f", + "value": "Acronis 8Base July 17 2023" + }, { "description": "Petrovsky, O. (2016, August 30). “9002 RAT” -- a second building on the left. Retrieved February 20, 2018.", "meta": { @@ -2049,6 +2081,38 @@ "uuid": "c37f00dc-ee53-4be1-9046-0a28bdc5649a", "value": "Mac Backdoors are back" }, + { + "description": "SentinelOne. (2023, January 30). Agenda (Qilin). Retrieved June 7, 2024.", + "meta": { + "date_accessed": "2024-06-07T00:00:00Z", + "date_published": "2023-01-30T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.sentinelone.com/anthology/agenda-qilin/" + ], + "source": "Tidal Cyber", + "title": "Agenda (Qilin)" + }, + "related": [], + "uuid": "290e84bc-7dae-46ec-81de-78c94b98e45b", + "value": "SentinelOne January 30 2023" + }, + { + "description": "Arianne Dela Cruz; Raymart Yambot; Raighen Sanchez; Darrel Tristan Virtusio Read time. (2024, March 26). Agenda Ransomware Propagates to vCenters and ESXi via Custom PowerShell Script. Retrieved April 5, 2024.", + "meta": { + "date_accessed": "2024-04-05T00:00:00Z", + "date_published": "2024-03-26T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.trendmicro.com/en_us/research/24/c/agenda-ransomware-propagates-to-vcenters-and-esxi-via-custom-pow.html" + ], + "source": "Tidal Cyber", + "title": "Agenda Ransomware Propagates to vCenters and ESXi via Custom PowerShell Script" + }, + "related": [], + "uuid": "d5634b8e-420a-4721-a3d2-19d9f36697f4", + "value": "Trend Micro March 26 2024" + }, { "description": "Plakhov, A., Sitchikhin, D. (2019, August 22). Agent 1433: remote attack on Microsoft SQL Server. Retrieved September 4, 2019.", "meta": { @@ -2125,6 +2189,22 @@ "uuid": "5f712e3f-5a9d-4af3-b846-a61dc1d59b3a", "value": "SentinelLabs Agent Tesla Aug 2020" }, + { + "description": "Anish Bogati. (2023, March 23). AgentTesla's Capabilities: A Review and Detection Strategies. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2023-03-23T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.logpoint.com/wp-content/uploads/2023/03/et-agenttesla.pdf" + ], + "source": "Tidal Cyber", + "title": "AgentTesla's Capabilities: A Review and Detection Strategies" + }, + "related": [], + "uuid": "28bfb97b-4b58-408a-bef9-9081f6ddedb8", + "value": "LogPoint Agent Tesla March 23 2023" + }, { "description": "Hegel, T. (2021, January 13). A Global Perspective of the SideWinder APT. Retrieved January 27, 2021.", "meta": { @@ -2654,6 +2734,22 @@ "uuid": "19026f4c-ad65-435e-8c0e-a8ccc9895348", "value": "Microsoft AlwaysInstallElevated 2018" }, + { + "description": "Sanseo. (2022, July 21). Amadey Bot Being Distributed Through SmokeLoader - ASEC BLOG. Retrieved May 15, 2023.", + "meta": { + "date_accessed": "2023-05-15T00:00:00Z", + "date_published": "2022-07-21T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://asec.ahnlab.com/en/36634/" + ], + "source": "Tidal Cyber", + "title": "Amadey Bot Being Distributed Through SmokeLoader - ASEC BLOG" + }, + "related": [], + "uuid": "e320cc74-005a-46db-8a04-6ec487df327f", + "value": "ASEC BLOG July 21 2022" + }, { "description": "Amazon. (n.d.). Amazon EBS snapshots. Retrieved October 13, 2021.", "meta": { @@ -3055,6 +3151,38 @@ "uuid": "f2cb06bc-66d5-4c60-a2a4-74e5a0c23bee", "value": "Analyzing CS Dec 2020" }, + { + "description": "Objective_See. (2024, January 4). Analyzing DPRK's SpectralBlur. Retrieved March 8, 2024.", + "meta": { + "date_accessed": "2024-03-08T00:00:00Z", + "date_published": "2024-01-04T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://objective-see.org/blog/blog_0x78.html" + ], + "source": "Tidal Cyber", + "title": "Analyzing DPRK's SpectralBlur" + }, + "related": [], + "uuid": "c96535be-4859-4ae3-9ba0-d482f1195863", + "value": "Objective_See 1 4 2024" + }, + { + "description": "Microsoft Threat Intelligence. (2024, April 22). Analyzing Forest Blizzard's custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials . Retrieved April 22, 2024.", + "meta": { + "date_accessed": "2024-04-22T00:00:00Z", + "date_published": "2024-04-22T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.microsoft.com/en-us/security/blog/2024/04/22/analyzing-forest-blizzards-custom-post-compromise-tool-for-exploiting-cve-2022-38028-to-obtain-credentials/" + ], + "source": "Tidal Cyber", + "title": "Analyzing Forest Blizzard's custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials" + }, + "related": [], + "uuid": "050ff793-d81d-499f-a136-905e76bce321", + "value": "Microsoft Security Blog 4 22 2024" + }, { "description": "Felix. (2016, September). Analyzing Malicious Office Documents. Retrieved April 11, 2018.", "meta": { @@ -3325,21 +3453,6 @@ "uuid": "03eb080d-0b83-5cbb-9317-c50b35996c9b", "value": "SecureList Fileless" }, - { - "description": "M.Léveillé, M. (2014, February 21). An In-depth Analysis of Linux/Ebury. Retrieved January 8, 2018.", - "meta": { - "date_accessed": "2018-01-08T00:00:00Z", - "date_published": "2014-02-21T00:00:00Z", - "refs": [ - "https://www.welivesecurity.com/2014/02/21/an-in-depth-analysis-of-linuxebury/" - ], - "source": "MITRE", - "title": "An In-depth Analysis of Linux/Ebury" - }, - "related": [], - "uuid": "39384c7a-3032-4b45-a5eb-8ebe7de22aa2", - "value": "Welivesecurity Ebury SSH" - }, { "description": "M.Léveillé, M.. (2014, February 21). An In-depth Analysis of Linux/Ebury. Retrieved April 19, 2019.", "meta": { @@ -3355,6 +3468,21 @@ "uuid": "eb6d4f77-ac63-4cb8-8487-20f9e709334b", "value": "ESET Ebury Feb 2014" }, + { + "description": "M.Léveillé, M. (2014, February 21). An In-depth Analysis of Linux/Ebury. Retrieved January 8, 2018.", + "meta": { + "date_accessed": "2018-01-08T00:00:00Z", + "date_published": "2014-02-21T00:00:00Z", + "refs": [ + "https://www.welivesecurity.com/2014/02/21/an-in-depth-analysis-of-linuxebury/" + ], + "source": "MITRE", + "title": "An In-depth Analysis of Linux/Ebury" + }, + "related": [], + "uuid": "39384c7a-3032-4b45-a5eb-8ebe7de22aa2", + "value": "Welivesecurity Ebury SSH" + }, { "description": "Avertium. (2022, June 1). AN IN-DEPTH LOOK AT BLACK BASTA RANSOMWARE. Retrieved March 7, 2023.", "meta": { @@ -3536,6 +3664,22 @@ "uuid": "c1aef861-9e31-42e6-a2eb-5151b056762b", "value": "iDefense Rootkit Overview" }, + { + "description": "Trend Micro Research. (2023, August 9). An Overview of the New Rhysida Ransomware Targeting the Healthcare Sector. Retrieved August 11, 2023.", + "meta": { + "date_accessed": "2023-08-11T00:00:00Z", + "date_published": "2023-08-09T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.trendmicro.com/en_us/research/23/h/an-overview-of-the-new-rhysida-ransomware.html" + ], + "source": "Tidal Cyber", + "title": "An Overview of the New Rhysida Ransomware Targeting the Healthcare Sector" + }, + "related": [], + "uuid": "71704a3a-cf48-4764-af4e-8d2096bf5012", + "value": "Trend Micro Rhysida August 09 2023" + }, { "description": "Hultquist, J. (2022, January 20). Anticipating Cyber Threats as the Ukraine Crisis Escalates. Retrieved January 24, 2022.", "meta": { @@ -5045,6 +5189,37 @@ "uuid": "37f1ef6c-fc0e-4e47-85ab-20d53caba77e", "value": "Microsoft APC" }, + { + "description": "Hack sydney. (2023, February 8). AsyncRAT: Analysing the Three Stages of Execution. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2023-02-08T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://medium.com/@hcksyd/asyncrat-analysing-the-three-stages-of-execution-378b343216bf" + ], + "source": "Tidal Cyber", + "title": "AsyncRAT: Analysing the Three Stages of Execution" + }, + "related": [], + "uuid": "86a69887-8d23-460f-9a51-96a10bfb3c29", + "value": "Medium February 08 2023" + }, + { + "description": "Splunk-Blogs. (n.d.). AsyncRAT Crusade: Detections and Defense. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.splunk.com/en_us/blog/security/asyncrat-crusade-detections-and-defense.html" + ], + "source": "Tidal Cyber", + "title": "AsyncRAT Crusade: Detections and Defense" + }, + "related": [], + "uuid": "2869d93c-d3fe-475e-adc9-ab6eb7e26c0f", + "value": "AsyncRAT Crusade: Detections and Defense | Splunk" + }, { "description": "Microsoft. (n.d.). At. Retrieved April 28, 2016.", "meta": { @@ -5195,6 +5370,38 @@ "uuid": "9282dbab-391c-4ffd-ada9-1687413b686b", "value": "ENSIL AtomBombing Oct 2016" }, + { + "description": "Phil Stokes. (2023, May 3). Atomic Stealer . Retrieved January 1, 2024.", + "meta": { + "date_accessed": "2024-01-01T00:00:00Z", + "date_published": "2023-05-03T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.sentinelone.com/blog/atomic-stealer-threat-actor-spawns-second-variant-of-macos-malware-sold-on-telegram/" + ], + "source": "Tidal Cyber", + "title": "Atomic Stealer" + }, + "related": [], + "uuid": "c4721cab-2895-48ed-bfde-748aa3c80209", + "value": "SentinelOne 5 3 2023" + }, + { + "description": "Jerome Segura. (2024, January 10). Atomic Stealer rings in the new year with updated version . Retrieved January 11, 2024.", + "meta": { + "date_accessed": "2024-01-11T00:00:00Z", + "date_published": "2024-01-10T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.malwarebytes.com/blog/threat-intelligence/2024/01/atomic-stealer-rings-in-the-new-year-with-updated-version" + ], + "source": "Tidal Cyber", + "title": "Atomic Stealer rings in the new year with updated version" + }, + "related": [], + "uuid": "660de1b0-574d-48df-865a-257b8ed4b928", + "value": "Malwarebytes 1 10 2024" + }, { "description": "Miller, S. Reese, E. (2018, June 7). A Totally Tubular Treatise on TRITON and TriStation. Retrieved January 6, 2021.", "meta": { @@ -5241,6 +5448,22 @@ "uuid": "52212570-b1a6-4249-99d4-3bcf66c27140", "value": "att_def_ps_logging" }, + { + "description": "Elastic Blog. (2023, April 7). Attack chain leads to XWORM and AGENTTESLA. Retrieved May 10, 2023.", + "meta": { + "date_accessed": "2023-05-10T00:00:00Z", + "date_published": "2023-04-07T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla" + ], + "source": "Tidal Cyber", + "title": "Attack chain leads to XWORM and AGENTTESLA" + }, + "related": [], + "uuid": "9b32397b-58be-4275-a701-fe0351ff2982", + "value": "Attack chain leads to XWORM and AGENTTESLA | Elastic" + }, { "description": "Fishbein, N. (2020, September 8). Attackers Abusing Legitimate Cloud Monitoring Tools to Conduct Cyber Attacks. Retrieved September 22, 2021.", "meta": { @@ -5316,21 +5539,6 @@ "uuid": "d4ca3351-eeb8-5342-8c85-806614e22c48", "value": "FireEye TRITON Dec 2017" }, - { - "description": "Runa A. Sandvik. (2014, January 14). Attackers Scrape GitHub For Cloud Service Credentials, Hijack Account To Mine Virtual Currency. Retrieved August 9, 2022.", - "meta": { - "date_accessed": "2022-08-09T00:00:00Z", - "date_published": "2014-01-14T00:00:00Z", - "refs": [ - "https://www.forbes.com/sites/runasandvik/2014/01/14/attackers-scrape-github-for-cloud-service-credentials-hijack-account-to-mine-virtual-currency/" - ], - "source": "MITRE", - "title": "Attackers Scrape GitHub For Cloud Service Credentials, Hijack Account To Mine Virtual Currency" - }, - "related": [], - "uuid": "d2186b8c-10c9-493b-8e25-7d69fce006e4", - "value": "GitHub Cloud Service Credentials" - }, { "description": "Sandvik, R. (2014, January 14). Attackers Scrape GitHub For Cloud Service Credentials, Hijack Account To Mine Virtual Currency. Retrieved October 19, 2020.", "meta": { @@ -5346,6 +5554,21 @@ "uuid": "303f8801-bdd6-4a0c-a90a-37867898c99c", "value": "Forbes GitHub Creds" }, + { + "description": "Runa A. Sandvik. (2014, January 14). Attackers Scrape GitHub For Cloud Service Credentials, Hijack Account To Mine Virtual Currency. Retrieved August 9, 2022.", + "meta": { + "date_accessed": "2022-08-09T00:00:00Z", + "date_published": "2014-01-14T00:00:00Z", + "refs": [ + "https://www.forbes.com/sites/runasandvik/2014/01/14/attackers-scrape-github-for-cloud-service-credentials-hijack-account-to-mine-virtual-currency/" + ], + "source": "MITRE", + "title": "Attackers Scrape GitHub For Cloud Service Credentials, Hijack Account To Mine Virtual Currency" + }, + "related": [], + "uuid": "d2186b8c-10c9-493b-8e25-7d69fce006e4", + "value": "GitHub Cloud Service Credentials" + }, { "description": "Chen, J.. (2020, January 29). Attacker's Tactics and Techniques in Unsecured Docker Daemons Revealed. Retrieved March 31, 2021.", "meta": { @@ -6183,6 +6406,22 @@ "uuid": "9ba87a5d-a140-4959-9905-c4a80e684d56", "value": "AWS Lambda Redirector" }, + { + "description": "Alessandro Brucato. (2023, September 18). AWS’s Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation. Retrieved April 11, 2024.", + "meta": { + "date_accessed": "2024-04-11T00:00:00Z", + "date_published": "2023-09-18T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://sysdig.com/blog/ambersquid/" + ], + "source": "Tidal Cyber", + "title": "AWS’s Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation" + }, + "related": [], + "uuid": "7ffa880f-5854-4b8a-83f5-da42c1c39345", + "value": "Sysdig AMBERSQUID September 18 2023" + }, { "description": "Spencer Gietzen. (n.d.). AWS Simple Storage Service S3 Ransomware Part 2: Prevention and Defense. Retrieved March 21, 2023.", "meta": { @@ -7001,6 +7240,22 @@ "uuid": "f578de81-ea6b-49d0-9a0a-111e07249cd8", "value": "BaltimoreSun RobbinHood May 2019" }, + { + "description": "Fernando Tavella, Matías Porolli. (2021, July 7). Bandidos at large: A spying campaign in Latin America. Retrieved October 25, 2023.", + "meta": { + "date_accessed": "2023-10-25T00:00:00Z", + "date_published": "2021-07-07T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.welivesecurity.com/2021/07/07/bandidos-at-large-spying-campaign-latin-america/" + ], + "source": "Tidal Cyber", + "title": "Bandidos at large: A spying campaign in Latin America" + }, + "related": [], + "uuid": "da6cac04-a318-4972-bd78-8272116b4ad7", + "value": "ESET Research Bandook July 7 2021" + }, { "description": "Check Point. (2020, November 26). Bandook: Signed & Delivered. Retrieved May 31, 2021.", "meta": { @@ -7118,6 +7373,22 @@ "uuid": "72798536-a7e3-43e2-84e3-b5b8b54f0bca", "value": "Microsoft Basic TxF Concepts" }, + { + "description": "eSentire. (2023, March 9). BatLoader Continues to Abuse Google Search Ads to Deliver Vidar Stealer and Ursnif. Retrieved May 10, 2023.", + "meta": { + "date_accessed": "2023-05-10T00:00:00Z", + "date_published": "2023-03-09T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.esentire.com/blog/batloader-continues-to-abuse-google-search-ads-to-deliver-vidar-stealer-and-ursnif" + ], + "source": "Tidal Cyber", + "title": "BatLoader Continues to Abuse Google Search Ads to Deliver Vidar Stealer and Ursnif" + }, + "related": [], + "uuid": "1bf10604-708f-4c4f-abe5-816768873496", + "value": "eSentire | BatLoader Continues to Abuse Google Search Ads to Deliver Vidar Stealer and Ursnif" + }, { "description": "Bethany Hardin, Lavine Oluoch, Tatiana Vollbrecht. (2022, November 14). BATLOADER: The Evasive Downloader Malware. Retrieved June 5, 2023.", "meta": { @@ -7448,6 +7719,22 @@ "uuid": "ca1eaac2-7449-4a76-bec2-9dc5971fd808", "value": "Bginfo.exe - LOLBAS Project" }, + { + "description": "Cybleinc. (2022, August 18). BianLian: New Ransomware variant on the rise. Retrieved May 18, 2023.", + "meta": { + "date_accessed": "2023-05-18T00:00:00Z", + "date_published": "2022-08-18T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://blog.cyble.com/2022/08/18/bianlian-new-ransomware-variant-on-the-rise/" + ], + "source": "Tidal Cyber", + "title": "BianLian: New Ransomware variant on the rise" + }, + "related": [], + "uuid": "2de00d16-9b9e-4e03-925f-4fcdae4d6e1a", + "value": "Cyble August 18 2022" + }, { "description": "Ben Armstrong, Lauren Pearce, Brad Pittack, Danny Quist. (2022, September 1). BianLian Ransomware Gang Gives It a Go!. Retrieved May 18, 2023.", "meta": { @@ -7933,21 +8220,6 @@ "uuid": "481a0106-d5b6-532c-8f5b-6c0c477185f4", "value": "Sophos BlackCat Jul 2022" }, - { - "description": "Cherepanov, A.. (2016, January 3). BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry . Retrieved June 10, 2020.", - "meta": { - "date_accessed": "2020-06-10T00:00:00Z", - "date_published": "2016-01-03T00:00:00Z", - "refs": [ - "https://www.welivesecurity.com/2016/01/03/blackenergy-sshbeardoor-details-2015-attacks-ukrainian-news-media-electric-industry/" - ], - "source": "MITRE", - "title": "BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry" - }, - "related": [], - "uuid": "a0103079-c966-46b6-8871-c01f7f0eea4c", - "value": "ESET BlackEnergy Jan 2016" - }, { "description": "Cherepanov, A.. (2016, January 3). BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry. Retrieved May 18, 2016.", "meta": { @@ -7963,6 +8235,21 @@ "uuid": "4d626eb9-3722-4aa4-b95e-1650cc2865c2", "value": "ESEST Black Energy Jan 2016" }, + { + "description": "Cherepanov, A.. (2016, January 3). BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry . Retrieved June 10, 2020.", + "meta": { + "date_accessed": "2020-06-10T00:00:00Z", + "date_published": "2016-01-03T00:00:00Z", + "refs": [ + "https://www.welivesecurity.com/2016/01/03/blackenergy-sshbeardoor-details-2015-attacks-ukrainian-news-media-electric-industry/" + ], + "source": "MITRE", + "title": "BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry" + }, + "related": [], + "uuid": "a0103079-c966-46b6-8871-c01f7f0eea4c", + "value": "ESET BlackEnergy Jan 2016" + }, { "description": "F-Secure Labs. (2014). BlackEnergy & Quedagh: The convergence of crimeware and APT attacks. Retrieved March 24, 2016.", "meta": { @@ -7978,6 +8265,22 @@ "uuid": "5f228fb5-d959-4c4a-bb8c-f9dc01d5af07", "value": "F-Secure BlackEnergy 2014" }, + { + "description": "Martin Smolár. (2023, March 1). BlackLotus UEFI bootkit: Myth confirmed. Retrieved September 29, 2023.", + "meta": { + "date_accessed": "2023-09-29T00:00:00Z", + "date_published": "2023-03-01T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.welivesecurity.com/2023/03/01/blacklotus-uefi-bootkit-myth-confirmed/" + ], + "source": "Tidal Cyber", + "title": "BlackLotus UEFI bootkit: Myth confirmed" + }, + "related": [], + "uuid": "1a4c134b-c701-400f-beee-e6b3cc835042", + "value": "ESET BlackLotus March 01 2023" + }, { "description": "Kaspersky Lab's Global Research & Analysis Team. (2017, October 16). BlackOasis APT and new targeted attacks leveraging zero-day exploit. Retrieved February 15, 2018.", "meta": { @@ -7993,6 +8296,54 @@ "uuid": "66121c37-6b66-4ab2-9f63-1adb80dcec62", "value": "Securelist BlackOasis Oct 2017" }, + { + "description": "ReliaQuest Threat Research Team. (2024, May 28). BlackSuit Attack Analysis - ReliaQuest. Retrieved June 5, 2024.", + "meta": { + "date_accessed": "2024-06-05T00:00:00Z", + "date_published": "2024-05-28T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.reliaquest.com/blog/blacksuit-attack-analysis/" + ], + "source": "Tidal Cyber", + "title": "BlackSuit Attack Analysis - ReliaQuest" + }, + "related": [], + "uuid": "2a67b1df-9a15-487e-a777-8a3fe46b0179", + "value": "ReliaQuest May 28 2024" + }, + { + "description": "Health Sector Cybersecurity Coordination Center (HC3). (2023, November 6). BlackSuit Ransomware. Retrieved June 7, 2024.", + "meta": { + "date_accessed": "2024-06-07T00:00:00Z", + "date_published": "2023-11-06T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.hhs.gov/sites/default/files/blacksuit-ransomware-analyst-note-tlpclear.pdf" + ], + "source": "Tidal Cyber", + "title": "BlackSuit Ransomware" + }, + "related": [], + "uuid": "d956f0c6-d90e-49e8-a64c-a46bfc177cc6", + "value": "HC3 Analyst Note BlackSuit Ransomware November 2023" + }, + { + "description": "Cybleinc. (2023, May 12). BlackSuit Ransomware Strikes Windows and Linux Users. Retrieved January 1, 2024.", + "meta": { + "date_accessed": "2024-01-01T00:00:00Z", + "date_published": "2023-05-12T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://cyble.com/blog/blacksuit-ransomware-strikes-windows-and-linux-users/" + ], + "source": "Tidal Cyber", + "title": "BlackSuit Ransomware Strikes Windows and Linux Users" + }, + "related": [], + "uuid": "7e335494-86a7-49cd-a9f3-783d73c36d9d", + "value": "Cyble May 12 2023" + }, { "description": "Quist, N. (2020, October 5). Black-T: New Cryptojacking Variant from TeamTNT. Retrieved September 22, 2021.", "meta": { @@ -8767,6 +9118,70 @@ "uuid": "b06b72ba-dbd6-4190-941a-0cdd3d659ab6", "value": "CTD PPID Spoofing Macro Mar 2019" }, + { + "description": "Trend Micro. (2022, September 2). BumbleBee a New Modular Backdoor Evolved From BookWorm. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2022-09-02T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.trendmicro.com/en_us/research/22/i/buzzing-in-the-background-bumblebee-a-new-modular-backdoor-evolv.html" + ], + "source": "Tidal Cyber", + "title": "BumbleBee a New Modular Backdoor Evolved From BookWorm" + }, + "related": [], + "uuid": "acb25abb-23c7-4b5d-849b-346388dde15c", + "value": "Trend Micro September 02 2022" + }, + { + "description": "Axel F; Selena Larson; The Proofpoint Threat Research Team. (2024, February 12). Bumblebee Buzzes Back in Black . Retrieved February 14, 2024.", + "meta": { + "date_accessed": "2024-02-14T00:00:00Z", + "date_published": "2024-02-12T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.proofpoint.com/us/blog/threat-insight/bumblebee-buzzes-back-black" + ], + "source": "Tidal Cyber", + "title": "Bumblebee Buzzes Back in Black" + }, + "related": [], + "uuid": "643968ec-bc01-4317-ba91-b2bafeb421c9", + "value": "Proofpoint 2 12 2024" + }, + { + "description": "Toxin Labs. (2023, March 4). BumbleBee DocuSign Campaign. Retrieved February 19, 2024.", + "meta": { + "date_accessed": "2024-02-19T00:00:00Z", + "date_published": "2023-03-04T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://0xtoxin.github.io/malware%20analysis/Bumblebee-DocuSign-Campaign/" + ], + "source": "Tidal Cyber", + "title": "BumbleBee DocuSign Campaign" + }, + "related": [], + "uuid": "8404527a-9197-47ea-8bdf-c824b66ffede", + "value": "Toxin Labs 3 4 2023" + }, + { + "description": "Angelo Violetti. (2023, April 11). BumbleBee hunting with a Velociraptor. Retrieved May 6, 2023.", + "meta": { + "date_accessed": "2023-05-06T00:00:00Z", + "date_published": "2023-04-11T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://sec-consult.com/blog/detail/bumblebee-hunting-with-a-velociraptor/" + ], + "source": "Tidal Cyber", + "title": "BumbleBee hunting with a Velociraptor" + }, + "related": [], + "uuid": "c4cdaaeb-5776-4899-bdcf-8daf9d6ea615", + "value": "SEC Consult Bumblebee April 11 2023" + }, { "description": "Cybereason. (2022, August 17). Bumblebee Loader – The High Road to Enterprise Domain Control. Retrieved August 29, 2022.", "meta": { @@ -8782,6 +9197,22 @@ "uuid": "64bfb605-af69-4df0-ae56-32fa997516bc", "value": "Cybereason Bumblebee August 2022" }, + { + "description": "Counter Threat Unit Research Team. (2023, April 20). Bumblebee Malware Distributed Via Trojanized Installer Downloads. Retrieved May 6, 2023.", + "meta": { + "date_accessed": "2023-05-06T00:00:00Z", + "date_published": "2023-04-20T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.secureworks.com/blog/bumblebee-malware-distributed-via-trojanized-installer-downloads" + ], + "source": "Tidal Cyber", + "title": "Bumblebee Malware Distributed Via Trojanized Installer Downloads" + }, + "related": [], + "uuid": "ac31c45d-ba78-4158-b163-723ab22c4dc4", + "value": "Secureworks Bumblebee April 20 2023" + }, { "description": "Kamble, V. (2022, June 28). Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem. Retrieved August 24, 2022.", "meta": { @@ -8797,6 +9228,54 @@ "uuid": "81bfabad-b5b3-4e45-ac1d-1e2e829fca33", "value": "Symantec Bumblebee June 2022" }, + { + "description": "Cybleinc. (2022, September 7). Bumblebee Returns with New Infection Technique. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2022-09-07T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://blog.cyble.com/2022/09/07/bumblebee-returns-with-new-infection-technique/" + ], + "source": "Tidal Cyber", + "title": "Bumblebee Returns with New Infection Technique" + }, + "related": [], + "uuid": "9d194526-2d01-4f92-9055-39e66d26081a", + "value": "Cyble September 07 2022" + }, + { + "description": "The DFIR Report. (2022, September 26). BumbleBee: Round Two. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2022-09-26T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://thedfirreport.com/2022/09/26/bumblebee-round-two/" + ], + "source": "Tidal Cyber", + "title": "BumbleBee: Round Two" + }, + "related": [], + "uuid": "8b51d35c-7a2a-4f03-95b1-c0b319f73c05", + "value": "The DFIR Report Bumblebee September 26 2022" + }, + { + "description": "The DFIR Report. (2022, November 14). BumbleBee Zeros in on Meterpreter. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2022-11-14T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://thedfirreport.com/2022/11/14/bumblebee-zeros-in-on-meterpreter/" + ], + "source": "Tidal Cyber", + "title": "BumbleBee Zeros in on Meterpreter" + }, + "related": [], + "uuid": "831e1b4e-6edd-498f-863c-606d2392b622", + "value": "The DFIR Report Bumblebee November 14 2022" + }, { "description": "Patrick Wardle. (2019, June 20). Burned by Fire(fox). Retrieved October 1, 2021.", "meta": { @@ -9004,21 +9483,6 @@ "uuid": "74df644a-06b8-4331-85a3-932358d65b62", "value": "Hybrid Analysis Icacls1 June 2018" }, - { - "description": "Microsoft. (2016, August 21). Cached and Stored Credentials Technical Overview. Retrieved February 21, 2020.", - "meta": { - "date_accessed": "2020-02-21T00:00:00Z", - "date_published": "2016-08-21T00:00:00Z", - "refs": [ - "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh994565(v%3Dws.11)" - ], - "source": "MITRE", - "title": "Cached and Stored Credentials Technical Overview" - }, - "related": [], - "uuid": "590ea63f-f800-47e4-8d39-df11a184ba84", - "value": "Microsoft - Cached Creds" - }, { "description": "Microsoft. (2016, August 31). Cached and Stored Credentials Technical Overview. Retrieved November 24, 2020.", "meta": { @@ -9034,6 +9498,21 @@ "uuid": "c949a29b-bb31-4bd7-a967-ddd48c7efb8e", "value": "Microsoft Credential Manager store" }, + { + "description": "Microsoft. (2016, August 21). Cached and Stored Credentials Technical Overview. Retrieved February 21, 2020.", + "meta": { + "date_accessed": "2020-02-21T00:00:00Z", + "date_published": "2016-08-21T00:00:00Z", + "refs": [ + "https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh994565(v%3Dws.11)" + ], + "source": "MITRE", + "title": "Cached and Stored Credentials Technical Overview" + }, + "related": [], + "uuid": "590ea63f-f800-47e4-8d39-df11a184ba84", + "value": "Microsoft - Cached Creds" + }, { "description": "Zykov, K. (2020, August 13). CactusPete APT group’s updated Bisonal backdoor. Retrieved May 5, 2021.", "meta": { @@ -9049,6 +9528,22 @@ "uuid": "1c393964-e717-45ad-8eb6-5df5555d3c70", "value": "Kaspersky CactusPete Aug 2020" }, + { + "description": "Laurie Iacono, Stephen Green, Dave Truman. (2023, May 10). CACTUS Ransomware: Prickly New Variant Evades Detection. Retrieved August 10, 2023.", + "meta": { + "date_accessed": "2023-08-10T00:00:00Z", + "date_published": "2023-05-10T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.kroll.com/en/insights/publications/cyber/cactus-ransomware-prickly-new-variant-evades-detection" + ], + "source": "Tidal Cyber", + "title": "CACTUS Ransomware: Prickly New Variant Evades Detection" + }, + "related": [], + "uuid": "f50de2f6-465f-4cae-a79c-cc135ebfee4f", + "value": "Kroll CACTUS Ransomware May 10 2023" + }, { "description": "ESET. (2022, March 15). CaddyWiper: New wiper malware discovered in Ukraine. Retrieved March 23, 2022.", "meta": { @@ -9094,6 +9589,22 @@ "uuid": "584e7ace-ef33-423b-9801-4728a447cb34", "value": "Cado Security Denonia" }, + { + "description": "jbowen. (2022, April 3). Cado Discovers Denonia: The First Malware Specifically Targeting Lambda. Retrieved April 11, 2024.", + "meta": { + "date_accessed": "2024-04-11T00:00:00Z", + "date_published": "2022-04-03T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.cadosecurity.com/blog/cado-discovers-denonia-the-first-malware-specifically-targeting-lambda" + ], + "source": "Tidal Cyber", + "title": "Cado Discovers Denonia: The First Malware Specifically Targeting Lambda" + }, + "related": [], + "uuid": "b276c28d-1488-4a21-86d1-7acdfd77794b", + "value": "Cado Denonia April 3 2022" + }, { "description": "William Turton. (2023, September 13). Caesars Entertainment Paid Millions to Hackers in Attack. Retrieved September 14, 2023.", "meta": { @@ -9157,19 +9668,20 @@ "value": "FSI Andariel Campaign Rifle July 2017" }, { - "description": "Kaspersky Lab's Global Research & Analysis Team. (2015, February). CARBANAK APT THE GREAT BANK ROBBERY. Retrieved March 27, 2017.", + "description": "Check Point Research. (2022, January 5). Can You Trust a File's Digital Signature? New Zloader Campaign Exploits Microsoft's Signature Verification Putting Users at Risk. Retrieved May 11, 2023.", "meta": { - "date_accessed": "2017-03-27T00:00:00Z", - "date_published": "2015-02-01T00:00:00Z", + "date_accessed": "2023-05-11T00:00:00Z", + "date_published": "2022-01-05T00:00:00Z", + "owner": "TidalCyberIan", "refs": [ - "https://securelist.com/the-great-bank-robbery-the-carbanak-apt/68732/" + "https://research.checkpoint.com/2022/can-you-trust-a-files-digital-signature-new-zloader-campaign-exploits-microsofts-signature-verification-putting-users-at-risk/" ], - "source": "MITRE", - "title": "CARBANAK APT THE GREAT BANK ROBBERY" + "source": "Tidal Cyber", + "title": "Can You Trust a File's Digital Signature? New Zloader Campaign Exploits Microsoft's Signature Verification Putting Users at Risk" }, "related": [], - "uuid": "053a2bbb-5509-4aba-bbd7-ccc3d8074291", - "value": "KasperskyCarbanak" + "uuid": "d26dfc4d-e563-4262-b527-0fffb7228234", + "value": "Check Point Research January 5 2022" }, { "description": "Kaspersky Lab's Global Research and Analysis Team. (2015, February). CARBANAK APT THE GREAT BANK ROBBERY. Retrieved August 23, 2018.", @@ -9186,6 +9698,21 @@ "uuid": "2f7e77db-fe39-4004-9945-3c8943708494", "value": "Kaspersky Carbanak" }, + { + "description": "Kaspersky Lab's Global Research & Analysis Team. (2015, February). CARBANAK APT THE GREAT BANK ROBBERY. Retrieved March 27, 2017.", + "meta": { + "date_accessed": "2017-03-27T00:00:00Z", + "date_published": "2015-02-01T00:00:00Z", + "refs": [ + "https://securelist.com/the-great-bank-robbery-the-carbanak-apt/68732/" + ], + "source": "MITRE", + "title": "CARBANAK APT THE GREAT BANK ROBBERY" + }, + "related": [], + "uuid": "053a2bbb-5509-4aba-bbd7-ccc3d8074291", + "value": "KasperskyCarbanak" + }, { "description": "Griffin, N. (2017, January 17). CARBANAK GROUP USES GOOGLE FOR MALWARE COMMAND-AND-CONTROL. Retrieved February 15, 2017.", "meta": { @@ -10389,6 +10916,38 @@ "uuid": "fdc86cea-0015-48d1-934f-b22244de6306", "value": "Malwarebytes Citrix Bleed November 24 2023" }, + { + "description": "Cybleinc. (2023, April 28). Citrix Users at Risk: AresLoader Spreading Through Disguised GitLab Repo. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2023-04-28T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://blog.cyble.com/2023/04/28/citrix-users-at-risk-aresloader-spreading-through-disguised-gitlab-repo/" + ], + "source": "Tidal Cyber", + "title": "Citrix Users at Risk: AresLoader Spreading Through Disguised GitLab Repo" + }, + "related": [], + "uuid": "2d6bea2c-cc19-4ff7-873f-151f1ff354cb", + "value": "Cyble April 28 2023" + }, + { + "description": "Cybleinc. (2023, April 3). Cl0p Ransomware: Active Threat Plaguing Businesses Worldwide. Retrieved May 25, 2023.", + "meta": { + "date_accessed": "2023-05-25T00:00:00Z", + "date_published": "2023-04-03T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://blog.cyble.com/2023/04/03/cl0p-ransomware-active-threat-plaguing-businesses-worldwide/" + ], + "source": "Tidal Cyber", + "title": "Cl0p Ransomware: Active Threat Plaguing Businesses Worldwide" + }, + "related": [], + "uuid": "8c7815c4-ed8d-47c3-84af-b7cdabd49652", + "value": "Cyble April 03 2023" + }, { "description": "Chen, T. and Chen, Z. (2020, February 17). CLAMBLING - A New Backdoor Base On Dropbox. Retrieved November 12, 2021.", "meta": { @@ -10541,6 +11100,20 @@ "uuid": "75b89502-21ed-4920-95cc-212eaf17f281", "value": "CL_Mutexverifiers.ps1 - LOLBAS Project" }, + { + "description": "Cybereason Nocturnus. (2020, December 23). Cybereason vs. Clop Ransomware. Retrieved May 11, 2021.", + "meta": { + "date_accessed": "2021-05-11T00:00:00Z", + "refs": [ + "https://www.cybereason.com/blog/cybereason-vs.-clop-ransomware" + ], + "source": "MITRE", + "title": "Clop Ransomware" + }, + "related": [], + "uuid": "f54d682d-100e-41bb-96be-6a79ea422066", + "value": "Cybereason Clop Dec 2020" + }, { "description": "Mundo, A. (2019, August 1). Clop Ransomware. Retrieved May 10, 2021.", "meta": { @@ -10557,18 +11130,20 @@ "value": "Mcafee Clop Aug 2019" }, { - "description": "Cybereason Nocturnus. (2020, December 23). Cybereason vs. Clop Ransomware. Retrieved May 11, 2021.", + "description": "Sergiu Gatlan. (2023, February 10). Clop ransomware claims it breached 130 orgs using GoAnywhere zero-day. Retrieved May 8, 2023.", "meta": { - "date_accessed": "2021-05-11T00:00:00Z", + "date_accessed": "2023-05-08T00:00:00Z", + "date_published": "2023-02-10T00:00:00Z", + "owner": "TidalCyberIan", "refs": [ - "https://www.cybereason.com/blog/cybereason-vs.-clop-ransomware" + "https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-it-breached-130-orgs-using-goanywhere-zero-day/" ], - "source": "MITRE", - "title": "Clop Ransomware" + "source": "Tidal Cyber", + "title": "Clop ransomware claims it breached 130 orgs using GoAnywhere zero-day" }, "related": [], - "uuid": "f54d682d-100e-41bb-96be-6a79ea422066", - "value": "Cybereason Clop Dec 2020" + "uuid": "ccfa7e78-1ee9-4d46-9f03-137eb12cf474", + "value": "Bleeping Computer Clop February 2023" }, { "description": "GReAT. (2014, December 10). Cloud Atlas: RedOctober APT is back in style. Retrieved May 8, 2020.", @@ -10585,6 +11160,22 @@ "uuid": "41a9b3e3-0953-4bde-9e1d-c2f51de1120e", "value": "Kaspersky Cloud Atlas December 2014" }, + { + "description": "Adam Kohler; Christopher Lopez. (2024, April 8). CloudChat Infostealer How It Works, What It Does. Retrieved April 19, 2024.", + "meta": { + "date_accessed": "2024-04-19T00:00:00Z", + "date_published": "2024-04-08T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://blog.kandji.io/cloudchat-infostealer" + ], + "source": "Tidal Cyber", + "title": "CloudChat Infostealer How It Works, What It Does" + }, + "related": [], + "uuid": "f2e74613-f578-4408-bc76-144ec671808b", + "value": "Kandji 4 8 2024" + }, { "description": "Rhino Labs. (2019, September). Cloud Container Attack Tool (CCAT). Retrieved September 12, 2019.", "meta": { @@ -11259,6 +11850,22 @@ "uuid": "edcd917d-ca5b-4e5c-b3be-118e828abe97", "value": "Microsoft COM" }, + { + "description": "Dror Alon. (2022, December 8). Compromised Cloud Compute Credentials Case Studies From the Wild. Retrieved April 17, 2024.", + "meta": { + "date_accessed": "2024-04-17T00:00:00Z", + "date_published": "2022-12-08T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials/" + ], + "source": "Tidal Cyber", + "title": "Compromised Cloud Compute Credentials Case Studies From the Wild" + }, + "related": [], + "uuid": "e7a4a0cf-ffa2-48cc-9b21-a2333592c773", + "value": "Unit 42 12 8 2022" + }, { "description": "Dror Alon. (2022, December 8). Compromised Cloud Compute Credentials: Case Studies From the Wild. Retrieved March 9, 2023.", "meta": { @@ -11573,21 +12180,6 @@ "uuid": "4adfc72b-cd32-46a6-bdf4-a4c2c6cffa73", "value": "Microsoft Configure LSA" }, - { - "description": "Microsoft. (2013, July 31). Configuring Additional LSA Protection. Retrieved February 13, 2015.", - "meta": { - "date_accessed": "2015-02-13T00:00:00Z", - "date_published": "2013-07-31T00:00:00Z", - "refs": [ - "https://technet.microsoft.com/en-us/library/dn408187.aspx" - ], - "source": "MITRE", - "title": "Configuring Additional LSA Protection" - }, - "related": [], - "uuid": "3ad49746-4e42-4663-a49e-ae64152b9463", - "value": "Microsoft LSA" - }, { "description": "Microsoft. (2014, March 12). Configuring Additional LSA Protection. Retrieved November 27, 2017.", "meta": { @@ -11603,6 +12195,21 @@ "uuid": "da3f1d7d-188f-4500-9bc6-3299ba043b5c", "value": "Microsoft LSA Protection Mar 2014" }, + { + "description": "Microsoft. (2013, July 31). Configuring Additional LSA Protection. Retrieved February 13, 2015.", + "meta": { + "date_accessed": "2015-02-13T00:00:00Z", + "date_published": "2013-07-31T00:00:00Z", + "refs": [ + "https://technet.microsoft.com/en-us/library/dn408187.aspx" + ], + "source": "MITRE", + "title": "Configuring Additional LSA Protection" + }, + "related": [], + "uuid": "3ad49746-4e42-4663-a49e-ae64152b9463", + "value": "Microsoft LSA" + }, { "description": "Google. (n.d.). Configuring Data Access audit logs. Retrieved October 16, 2020.", "meta": { @@ -11722,6 +12329,22 @@ "uuid": "deefa5b7-5a28-524c-b500-bc5574aa9920", "value": "EC2 Instance Connect" }, + { + "description": "Andrew Brandt. (2024, February 23). ConnectWise ScreenConnect attacks deliver malware. Retrieved February 23, 2024.", + "meta": { + "date_accessed": "2024-02-23T00:00:00Z", + "date_published": "2024-02-23T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://news.sophos.com/en-us/2024/02/23/connectwise-screenconnect-attacks-deliver-malware/" + ], + "source": "Tidal Cyber", + "title": "ConnectWise ScreenConnect attacks deliver malware" + }, + "related": [], + "uuid": "3d342acf-a451-4473-82ac-8afee61bc984", + "value": "Sophos News 2 23 2024" + }, { "description": "docker docs. (n.d.). Containers. Retrieved October 13, 2021.", "meta": { @@ -11796,6 +12419,21 @@ "uuid": "7a511f0d-8feb-5370-87db-b33b96ea2367", "value": "Microsoft File Folder Exclusions" }, + { + "description": "Steven Campbell, Akshay Suthar, & Connor Belfiorre. (2023, July 26). Conti and Akira: Chained Together. Retrieved February 20, 2024.", + "meta": { + "date_accessed": "2024-02-20T00:00:00Z", + "date_published": "2023-07-26T00:00:00Z", + "refs": [ + "https://arcticwolf.com/resources/blog/conti-and-akira-chained-together/" + ], + "source": "MITRE", + "title": "Conti and Akira: Chained Together" + }, + "related": [], + "uuid": "aa34f2a1-a398-5dc4-b898-cdc02afeca5d", + "value": "Arctic Wolf Akira 2023" + }, { "description": "Steven Campbell, Akshay Suthar, Connor Belfiore, Arctic Wolf Labs Team. (2023, July 26). Conti and Akira: Chained Together. Retrieved March 13, 2024.", "meta": { @@ -11812,21 +12450,6 @@ "uuid": "72e1b75b-edf7-45b0-9c14-14776a146d0e", "value": "Arctic Wolf Conti Akira July 26 2023" }, - { - "description": "Steven Campbell, Akshay Suthar, & Connor Belfiorre. (2023, July 26). Conti and Akira: Chained Together. Retrieved February 20, 2024.", - "meta": { - "date_accessed": "2024-02-20T00:00:00Z", - "date_published": "2023-07-26T00:00:00Z", - "refs": [ - "https://arcticwolf.com/resources/blog/conti-and-akira-chained-together/" - ], - "source": "MITRE", - "title": "Conti and Akira: Chained Together" - }, - "related": [], - "uuid": "aa34f2a1-a398-5dc4-b898-cdc02afeca5d", - "value": "Arctic Wolf Akira 2023" - }, { "description": "DFIR Report. (2021, November 29). CONTInuing the Bazar Ransomware Story. Retrieved September 29, 2022.", "meta": { @@ -12049,6 +12672,22 @@ "uuid": "0ef05e47-1305-4715-a677-67f1b55b24a3", "value": "Apple Core Services" }, + { + "description": "MSRC Team. (2019, August 5). Corporate IoT - a path to intrusion. Retrieved August 24, 2023.", + "meta": { + "date_accessed": "2023-08-24T00:00:00Z", + "date_published": "2019-08-05T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://msrc.microsoft.com/blog/2019/08/corporate-iot-a-path-to-intrusion/" + ], + "source": "Tidal Cyber", + "title": "Corporate IoT - a path to intrusion" + }, + "related": [], + "uuid": "037ace78-e997-40f3-a891-916bc596a9c0", + "value": "Microsoft IoT Compromises August 05 2019" + }, { "description": "MSRC Team. (2019, August 5). Corporate IoT – a path to intrusion. Retrieved August 16, 2019.", "meta": { @@ -12599,6 +13238,22 @@ "uuid": "ec3e7b3f-99dd-4f2f-885b-09d66b01fe3e", "value": "Microsoft CredEnumerate" }, + { + "description": "Aleksandar Milenkoski, Jim Walter. (2022, September 8). Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection. Retrieved August 10, 2023.", + "meta": { + "date_accessed": "2023-08-10T00:00:00Z", + "date_published": "2022-09-08T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.sentinelone.com/labs/crimeware-trends-ransomware-developers-turn-to-intermittent-encryption-to-evade-detection/" + ], + "source": "Tidal Cyber", + "title": "Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection" + }, + "related": [], + "uuid": "09cae6de-e026-43a5-a8bc-7ff8e8205232", + "value": "SentinelLabs Intermittent Encryption September 08 2022" + }, { "description": "Max Goncharov. (2015, July 15). Criminal Hideouts for Lease: Bulletproof Hosting Services. Retrieved March 6, 2017.", "meta": { @@ -12704,21 +13359,6 @@ "uuid": "51e67e37-2d61-4228-999b-bec6f80cf106", "value": "Bishop Fox Sliver Framework August 2019" }, - { - "description": "Okta Defensive Cyber Operations. (2023, August 31). Cross-Tenant Impersonation: Prevention and Detection. Retrieved March 4, 2024.", - "meta": { - "date_accessed": "2024-03-04T00:00:00Z", - "date_published": "2023-08-31T00:00:00Z", - "refs": [ - "https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection" - ], - "source": "MITRE", - "title": "Cross-Tenant Impersonation: Prevention and Detection" - }, - "related": [], - "uuid": "77dbd22f-ce57-50f7-9c6b-8dc874a4d80d", - "value": "Okta Cross-Tenant Impersonation" - }, { "description": "Okta Defensive Cyber Operations. (2023, August 31). Cross-Tenant Impersonation: Prevention and Detection. Retrieved February 15, 2024.", "meta": { @@ -12734,6 +13374,21 @@ "uuid": "d54188b5-86eb-52a0-8384-823c45431762", "value": "Okta Cross-Tenant Impersonation 2023" }, + { + "description": "Okta Defensive Cyber Operations. (2023, August 31). Cross-Tenant Impersonation: Prevention and Detection. Retrieved March 4, 2024.", + "meta": { + "date_accessed": "2024-03-04T00:00:00Z", + "date_published": "2023-08-31T00:00:00Z", + "refs": [ + "https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection" + ], + "source": "MITRE", + "title": "Cross-Tenant Impersonation: Prevention and Detection" + }, + "related": [], + "uuid": "77dbd22f-ce57-50f7-9c6b-8dc874a4d80d", + "value": "Okta Cross-Tenant Impersonation" + }, { "description": "Crowdstrike. (2013, October 16). CrowdCasts Monthly: You Have an Adversary Problem. Retrieved March 1, 2017.", "meta": { @@ -13285,6 +13940,22 @@ "uuid": "bd9c14dd-0e2a-447b-a245-f548734d2400", "value": "CyberArk Labs Safe Mode 2016" }, + { + "description": "PJ04857920. (2023, November 30). Cyber Army of Russia — DDoS Tool. Retrieved April 30, 2024.", + "meta": { + "date_accessed": "2024-04-30T00:00:00Z", + "date_published": "2023-11-30T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://medium.com/@PJ04857920/cyber-army-of-russia-ddos-tool-3b3050419225" + ], + "source": "Tidal Cyber", + "title": "Cyber Army of Russia — DDoS Tool" + }, + "related": [], + "uuid": "3e42ff96-fc7e-418e-8d8b-076a1a47981e", + "value": "PJ Cyber Army of Russia 2023" + }, { "description": "Cyware. (2019, May 29). Cyber attackers leverage tunneling service to drop Lokibot onto victims’ systems. Retrieved September 15, 2020.", "meta": { @@ -13300,6 +13971,22 @@ "uuid": "583a01b6-cb4e-41e7-aade-ac2fd19bda4e", "value": "Cyware Ngrok May 2019" }, + { + "description": "Jonathan Greig. (2024, June 3). Cyberattack on telecom giant Frontier claimed by RansomHub. Retrieved June 7, 2024.", + "meta": { + "date_accessed": "2024-06-07T00:00:00Z", + "date_published": "2024-06-03T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://therecord.media/frontier-communications-cyberattack-ransomhub" + ], + "source": "Tidal Cyber", + "title": "Cyberattack on telecom giant Frontier claimed by RansomHub" + }, + "related": [], + "uuid": "1e474240-bd12-4472-8e69-1631b0e4c102", + "value": "The Record RansomHub June 3 2024" + }, { "description": "Burt, T. (2020, October 28). Cyberattacks target international conference attendees. Retrieved March 8, 2021.", "meta": { @@ -13315,6 +14002,22 @@ "uuid": "8986c21c-16a0-4a53-8e37-9935bbbfaa4b", "value": "Microsoft Phosphorus Oct 2020" }, + { + "description": "Check Point Software. (2022, August 3). Cyber Attack Trends: Check Point's 2022 Mid-Year Report. Retrieved May 18, 2022.", + "meta": { + "date_accessed": "2022-05-18T00:00:00Z", + "date_published": "2022-08-03T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.checkpoint.com/downloads/resources/cyber-attack-trends-report-mid-year-2022.pdf" + ], + "source": "Tidal Cyber", + "title": "Cyber Attack Trends: Check Point's 2022 Mid-Year Report" + }, + "related": [], + "uuid": "e929cd86-9903-481c-a841-ba387831cb77", + "value": "Check Point Mid-Year Report 2022" + }, { "description": "Mercer, W., et al. (2017, October 22). \"Cyber Conflict\" Decoy Document Used in Real Cyber Conflict. Retrieved November 2, 2018.", "meta": { @@ -13525,6 +14228,22 @@ "uuid": "c6948dfc-b133-556b-a8ac-b3a4dba09c0e", "value": "SCILabs Malteiro 2021" }, + { + "description": "blog.scilabs.mx. (2021, December 23). Cyber Threat Profile MALTEIRO – Sciblog. Retrieved May 17, 2023.", + "meta": { + "date_accessed": "2023-05-17T00:00:00Z", + "date_published": "2021-12-23T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://blog.scilabs.mx/en/cyber-threat-profile-malteiro/" + ], + "source": "Tidal Cyber", + "title": "Cyber Threat Profile MALTEIRO – Sciblog" + }, + "related": [], + "uuid": "1f46872c-6255-4ce0-a6c3-2bfa9e767765", + "value": "Cyber Threat Profile MALTEIRO – Sciblog" + }, { "description": "NCSC. (2022, February 23). Cyclops Blink Malware Analysis Report. Retrieved March 3, 2022.", "meta": { @@ -13963,6 +14682,22 @@ "uuid": "7a58938f-058b-4c84-aa95-9c37dcdda1fb", "value": "Hijacking VNC" }, + { + "description": "Zscaler. (2023, March 27). DBatLoader Actively Distributing Malwares Targeting European Businesses. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2023-03-27T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.zscaler.com/blogs/security-research/dbatloader-actively-distributing-malwares-targeting-european-businesses" + ], + "source": "Tidal Cyber", + "title": "DBatLoader Actively Distributing Malwares Targeting European Businesses" + }, + "related": [], + "uuid": "42ee2e91-4dac-41ce-b2ec-fde21c258a28", + "value": "DBatLoader Actively Distributing Malwares Targeting European Businesses" + }, { "description": "Microsoft. (n.d.). DCOM Security Enhancements in Windows XP Service Pack 2 and Windows Server 2003 Service Pack 1. Retrieved November 22, 2017.", "meta": { @@ -14246,6 +14981,22 @@ "uuid": "aee3179e-1536-40ab-9965-1c10bdaa6dff", "value": "Bitdefender FIN8 July 2021" }, + { + "description": "Cybleinc. (2022, January 20). Deep dive into Ragnar_locker Ransomware Gang. Retrieved September 29, 2023.", + "meta": { + "date_accessed": "2023-09-29T00:00:00Z", + "date_published": "2022-01-20T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://cyble.com/blog/deep-dive-into-ragnar-locker-ransomware-gang/" + ], + "source": "Tidal Cyber", + "title": "Deep dive into Ragnar_locker Ransomware Gang" + }, + "related": [], + "uuid": "390b3063-8d7b-4dee-b5f7-bfd0804f2e30", + "value": "Cyble Ragnar Locker January 20 2022" + }, { "description": "Karl Ackerman. (2023, June 12). Deep dive into the Pikabot cyber threat. Retrieved January 11, 2024.", "meta": { @@ -14845,21 +15596,6 @@ "uuid": "e0c1fcd3-b7a8-42af-8984-873a6f969975", "value": "Microsoft WhisperGate January 2022" }, - { - "description": "NSA and ASD. (2020, April 3). Detect and Prevent Web Shell Malware. Retrieved July 23, 2021.", - "meta": { - "date_accessed": "2021-07-23T00:00:00Z", - "date_published": "2020-04-03T00:00:00Z", - "refs": [ - "https://media.defense.gov/2020/Jun/09/2002313081/-1/-1/0/CSI-DETECT-AND-PREVENT-WEB-SHELL-MALWARE-20200422.PDF" - ], - "source": "MITRE", - "title": "Detect and Prevent Web Shell Malware" - }, - "related": [], - "uuid": "e9a882a5-1a88-4fdf-9349-205f4fa167c9", - "value": "NSA and ASD Detect and Prevent Web Shells 2020" - }, { "description": "Australian Cyber Security Centre. National Security Agency. (2020, April 21). Detect and Prevent Web Shell Malware. Retrieved February 9, 2024.", "meta": { @@ -14875,6 +15611,21 @@ "uuid": "b91963c4-07ea-5e36-9cc8-8a2149ee7473", "value": "URI Unique" }, + { + "description": "NSA and ASD. (2020, April 3). Detect and Prevent Web Shell Malware. Retrieved July 23, 2021.", + "meta": { + "date_accessed": "2021-07-23T00:00:00Z", + "date_published": "2020-04-03T00:00:00Z", + "refs": [ + "https://media.defense.gov/2020/Jun/09/2002313081/-1/-1/0/CSI-DETECT-AND-PREVENT-WEB-SHELL-MALWARE-20200422.PDF" + ], + "source": "MITRE", + "title": "Detect and Prevent Web Shell Malware" + }, + "related": [], + "uuid": "e9a882a5-1a88-4fdf-9349-205f4fa167c9", + "value": "NSA and ASD Detect and Prevent Web Shells 2020" + }, { "description": "Fox, C., Vangel, D. (2018, April 22). Detect and Remediate Outlook Rules and Custom Forms Injections Attacks in Office 365. Retrieved February 4, 2019.", "meta": { @@ -16246,21 +16997,6 @@ "uuid": "a1b987cc-7789-411c-9673-3cf6357b207c", "value": "ASERT Donot March 2018" }, - { - "description": "Simonian, Nick. (2023, May 22). Don't @ Me: URL Obfuscation Through Schema Abuse. Retrieved January 17, 2024.", - "meta": { - "date_accessed": "2024-01-17T00:00:00Z", - "date_published": "2023-05-22T00:00:00Z", - "refs": [ - "https://www.mandiant.com/resources/blog/url-obfuscation-schema-abuse" - ], - "source": "MITRE", - "title": "Don't @ Me: URL Obfuscation Through Schema Abuse" - }, - "related": [], - "uuid": "d5ed4c98-6d37-5000-bba0-9aada295a50c", - "value": "mandiant-masking" - }, { "description": "Nick Simonian. (2023, May 22). Don't @ Me: URL Obfuscation Through Schema Abuse. Retrieved August 4, 2023.", "meta": { @@ -16276,6 +17012,21 @@ "uuid": "b63f5934-2ace-5326-89be-7a850469a563", "value": "Mandiant URL Obfuscation 2023" }, + { + "description": "Simonian, Nick. (2023, May 22). Don't @ Me: URL Obfuscation Through Schema Abuse. Retrieved January 17, 2024.", + "meta": { + "date_accessed": "2024-01-17T00:00:00Z", + "date_published": "2023-05-22T00:00:00Z", + "refs": [ + "https://www.mandiant.com/resources/blog/url-obfuscation-schema-abuse" + ], + "source": "MITRE", + "title": "Don't @ Me: URL Obfuscation Through Schema Abuse" + }, + "related": [], + "uuid": "d5ed4c98-6d37-5000-bba0-9aada295a50c", + "value": "mandiant-masking" + }, { "description": "Nick Simonian. (2023, May 22). Don't @ Me: URL Obfuscation Through Schema Abuse. Retrieved February 13, 2024.", "meta": { @@ -16487,21 +17238,6 @@ "uuid": "9514c5cd-2ed6-4dbf-aa9e-1c425e969226", "value": "Symantec Dragonfly" }, - { - "description": "Symantec Security Response. (2014, July 7). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved September 9, 2017.", - "meta": { - "date_accessed": "2017-09-09T00:00:00Z", - "date_published": "2014-07-07T00:00:00Z", - "refs": [ - "https://docs.broadcom.com/doc/dragonfly_threat_against_western_energy_suppliers" - ], - "source": "MITRE", - "title": "Dragonfly: Western energy sector targeted by sophisticated attack group" - }, - "related": [], - "uuid": "11bbeafc-ed5d-4d2b-9795-a0a9544fb64e", - "value": "Symantec Dragonfly Sept 2017" - }, { "description": "Symantec. (2017, October 7). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved April 19, 2022.", "meta": { @@ -16517,6 +17253,21 @@ "uuid": "a0439d4a-a3ea-4be5-9a01-f223ca259681", "value": "Symantec Dragonfly 2.0 October 2017" }, + { + "description": "Symantec Security Response. (2014, July 7). Dragonfly: Western energy sector targeted by sophisticated attack group. Retrieved September 9, 2017.", + "meta": { + "date_accessed": "2017-09-09T00:00:00Z", + "date_published": "2014-07-07T00:00:00Z", + "refs": [ + "https://docs.broadcom.com/doc/dragonfly_threat_against_western_energy_suppliers" + ], + "source": "MITRE", + "title": "Dragonfly: Western energy sector targeted by sophisticated attack group" + }, + "related": [], + "uuid": "11bbeafc-ed5d-4d2b-9795-a0a9544fb64e", + "value": "Symantec Dragonfly Sept 2017" + }, { "description": "Slepogin, N. (2017, May 25). Dridex: A History of Evolution. Retrieved May 31, 2019.", "meta": { @@ -16936,6 +17687,20 @@ "uuid": "9349f864-79e9-4481-ad77-44099621795a", "value": "rfc3315" }, + { + "description": "Microsoft. (n.d.). Dynamic-Link Library Redirection. Retrieved December 5, 2014.", + "meta": { + "date_accessed": "2014-12-05T00:00:00Z", + "refs": [ + "http://msdn.microsoft.com/en-US/library/ms682600" + ], + "source": "MITRE", + "title": "Dynamic-Link Library Redirection" + }, + "related": [], + "uuid": "ac60bb28-cb14-4ff9-bc05-df48273a28a9", + "value": "Microsoft DLL Redirection" + }, { "description": "Microsoft. (2018, May 31). Dynamic-Link Library Redirection. Retrieved March 13, 2020.", "meta": { @@ -16952,18 +17717,19 @@ "value": "Microsoft Dynamic-Link Library Redirection" }, { - "description": "Microsoft. (n.d.). Dynamic-Link Library Redirection. Retrieved December 5, 2014.", + "description": "Microsoft. (2018, May 31). Dynamic-Link Library Search Order. Retrieved November 30, 2014.", "meta": { - "date_accessed": "2014-12-05T00:00:00Z", + "date_accessed": "2014-11-30T00:00:00Z", + "date_published": "2018-05-31T00:00:00Z", "refs": [ - "http://msdn.microsoft.com/en-US/library/ms682600" + "https://docs.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-search-order?redirectedfrom=MSDN" ], "source": "MITRE", - "title": "Dynamic-Link Library Redirection" + "title": "Dynamic-Link Library Search Order" }, "related": [], - "uuid": "ac60bb28-cb14-4ff9-bc05-df48273a28a9", - "value": "Microsoft DLL Redirection" + "uuid": "7b1f945b-2547-4bc6-98bf-30248bdf3587", + "value": "Microsoft Dynamic Link Library Search Order" }, { "description": "Microsoft. (n.d.). Dynamic-Link Library Search Order. Retrieved November 30, 2014.", @@ -16979,21 +17745,6 @@ "uuid": "c157444d-bf2b-4806-b069-519122b7a459", "value": "Microsoft DLL Search" }, - { - "description": "Microsoft. (2018, May 31). Dynamic-Link Library Search Order. Retrieved November 30, 2014.", - "meta": { - "date_accessed": "2014-11-30T00:00:00Z", - "date_published": "2018-05-31T00:00:00Z", - "refs": [ - "https://docs.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-search-order?redirectedfrom=MSDN" - ], - "source": "MITRE", - "title": "Dynamic-Link Library Search Order" - }, - "related": [], - "uuid": "7b1f945b-2547-4bc6-98bf-30248bdf3587", - "value": "Microsoft Dynamic Link Library Search Order" - }, { "description": "Microsoft. (n.d.). Dynamic-Link Library Security. Retrieved July 25, 2016.", "meta": { @@ -17096,6 +17847,22 @@ "uuid": "16b4b834-2f44-4bac-b810-f92080c41f09", "value": "Trend Micro Muddy Water March 2021" }, + { + "description": "rootkiter. (2019, March 9). Earthworm. Retrieved July 7, 2023.", + "meta": { + "date_accessed": "2023-07-07T00:00:00Z", + "date_published": "2019-03-09T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "http://rootkiter.com/EarthWorm/en/index.html" + ], + "source": "Tidal Cyber", + "title": "Earthworm" + }, + "related": [], + "uuid": "88170ef5-03ac-42f2-9b03-2ce204b5d45c", + "value": "Earthworm English Project Page" + }, { "description": "U.S. SEC. (n.d.). EDGAR - Search and Access. Retrieved August 27, 2021.", "meta": { @@ -17362,6 +18129,22 @@ "uuid": "92a9a311-1e0b-4819-9856-2dfc8dbfc08d", "value": "Cylance Machete Mar 2017" }, + { + "description": "Sophos News. (2020, September 24). Email-delivered MoDi RAT attack pastes PowerShell commands. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2020-09-24T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://news.sophos.com/en-us/2020/09/24/email-delivered-modi-rat-attack-pastes-powershell-commands/" + ], + "source": "Tidal Cyber", + "title": "Email-delivered MoDi RAT attack pastes PowerShell commands" + }, + "related": [], + "uuid": "8cfa3dc4-a6b4-4204-b1e5-5b325955936d", + "value": "Sophos News September 24 2020" + }, { "description": "Microsoft. (2022, February 15). Email exfiltration controls for connectors. Retrieved May 27, 2022.", "meta": { @@ -17466,6 +18249,22 @@ "uuid": "0bd01e6c-6fb5-4bae-9fe9-395de061c1da", "value": "Sophos Emotet Apr 2019" }, + { + "description": "Deep Instinct. (2023, March 10). Emotet Again! The First Malspam Wave of 2023 | Deep Instinct. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2023-03-10T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.deepinstinct.com/blog/emotet-again-the-first-malspam-wave-of-2023" + ], + "source": "Tidal Cyber", + "title": "Emotet Again! The First Malspam Wave of 2023 | Deep Instinct" + }, + "related": [], + "uuid": "8016eca2-f702-4081-83ba-06262c29e6c2", + "value": "Deep Instinct March 10 2023" + }, { "description": "CIS. (2017, April 28). Emotet Changes TTPs and Arrives in United States. Retrieved January 17, 2019.", "meta": { @@ -17540,6 +18339,22 @@ "uuid": "83180391-89b6-4431-87f4-2703b47cb81b", "value": "Talos Emotet Jan 2019" }, + { + "description": "Equipe cti. (2023, January 9). Emotet returns and deploys loaders. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2023-01-09T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.intrinsec.com/emotet-returns-and-deploys-loaders/" + ], + "source": "Tidal Cyber", + "title": "Emotet returns and deploys loaders" + }, + "related": [], + "uuid": "6d39aba3-ae77-4a95-8242-7dacae8c89d8", + "value": "Cybersécurité - INTRINSEC January 09 2023" + }, { "description": "The DFIR Report. (2022, November 8). Emotet Strikes Again – LNK File Leads to Domain Wide Ransomware. Retrieved March 6, 2023.", "meta": { @@ -17805,21 +18620,6 @@ "uuid": "ad3eda19-08eb-4d59-a2c9-3b5ed8302205", "value": "Google Ensuring Your Information is Safe" }, - { - "description": "Adi Zeligson & Rotem Kerner. (2018, November 13). Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign. Retrieved February 9, 2024.", - "meta": { - "date_accessed": "2024-02-09T00:00:00Z", - "date_published": "2018-11-13T00:00:00Z", - "refs": [ - "https://www.fortinet.com/blog/threat-research/enter-the-darkgate-new-cryptocurrency-mining-and-ransomware-campaign" - ], - "source": "MITRE", - "title": "Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign" - }, - "related": [], - "uuid": "31796564-4154-54c0-958a-7d6802dfefad", - "value": "Ensilo Darkgate 2018" - }, { "description": "Fortinet Blog. (2018, November 13). Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign. Retrieved October 20, 2023.", "meta": { @@ -17837,20 +18637,19 @@ "value": "Fortinet Blog November 13 2018" }, { - "description": "Splunk Threat Research Team. (2024, January 17). Enter The Gates: An Analysis of the DarkGate AutoIt Loader. Retrieved January 24, 2024.", + "description": "Adi Zeligson & Rotem Kerner. (2018, November 13). Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign. Retrieved February 9, 2024.", "meta": { - "date_accessed": "2024-01-24T00:00:00Z", - "date_published": "2024-01-17T00:00:00Z", - "owner": "TidalCyberIan", + "date_accessed": "2024-02-09T00:00:00Z", + "date_published": "2018-11-13T00:00:00Z", "refs": [ - "https://www.splunk.com/en_us/blog/security/enter-the-gates-an-analysis-of-the-darkgate-autoit-loader.html" + "https://www.fortinet.com/blog/threat-research/enter-the-darkgate-new-cryptocurrency-mining-and-ransomware-campaign" ], - "source": "Tidal Cyber", - "title": "Enter The Gates: An Analysis of the DarkGate AutoIt Loader" + "source": "MITRE", + "title": "Enter The DarkGate - New Cryptocurrency Mining and Ransomware Campaign" }, "related": [], - "uuid": "a45a920c-3bda-4442-8650-4ad78f950283", - "value": "Splunk DarkGate January 17 2024" + "uuid": "31796564-4154-54c0-958a-7d6802dfefad", + "value": "Ensilo Darkgate 2018" }, { "description": "Splunk Threat Research Team. (2024, January 17). Enter The Gates: An Analysis of the DarkGate AutoIt Loader. Retrieved March 29, 2024.", @@ -17867,6 +18666,22 @@ "uuid": "adc6384c-e0d7-547f-a1e3-2c57ff0525ae", "value": "Splunk DarkGate" }, + { + "description": "Splunk Threat Research Team. (2024, January 17). Enter The Gates: An Analysis of the DarkGate AutoIt Loader. Retrieved January 24, 2024.", + "meta": { + "date_accessed": "2024-01-24T00:00:00Z", + "date_published": "2024-01-17T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.splunk.com/en_us/blog/security/enter-the-gates-an-analysis-of-the-darkgate-autoit-loader.html" + ], + "source": "Tidal Cyber", + "title": "Enter The Gates: An Analysis of the DarkGate AutoIt Loader" + }, + "related": [], + "uuid": "a45a920c-3bda-4442-8650-4ad78f950283", + "value": "Splunk DarkGate January 17 2024" + }, { "description": "Microsoft. (2021, October 12). EnumDeviceDrivers function (psapi.h). Retrieved March 28, 2023.", "meta": { @@ -17911,6 +18726,20 @@ "uuid": "af842a1f-8f39-4b4f-b4d2-0bbb810e6c31", "value": "Deloitte Environment Awareness" }, + { + "description": "Microsoft. (n.d.). Environment Property. Retrieved July 27, 2016.", + "meta": { + "date_accessed": "2016-07-27T00:00:00Z", + "refs": [ + "https://msdn.microsoft.com/en-us/library/fd7hxfdd.aspx" + ], + "source": "MITRE", + "title": "Environment Property" + }, + "related": [], + "uuid": "79ea888c-2dd7-40cb-9149-e2469a35ea3a", + "value": "MSDN Environment Property" + }, { "description": "Microsoft. (2011, October 24). Environment Property. Retrieved July 27, 2016.", "meta": { @@ -17926,20 +18755,6 @@ "uuid": "64598969-864d-4bc7-805e-c289cccb7bc6", "value": "Microsoft Environment Property" }, - { - "description": "Microsoft. (n.d.). Environment Property. Retrieved July 27, 2016.", - "meta": { - "date_accessed": "2016-07-27T00:00:00Z", - "refs": [ - "https://msdn.microsoft.com/en-us/library/fd7hxfdd.aspx" - ], - "source": "MITRE", - "title": "Environment Property" - }, - "related": [], - "uuid": "79ea888c-2dd7-40cb-9149-e2469a35ea3a", - "value": "MSDN Environment Property" - }, { "description": "Kaspersky Lab's Global Research and Analysis Team. (2015, February). Equation Group: Questions and Answers. Retrieved December 21, 2015.", "meta": { @@ -18328,6 +19143,22 @@ "uuid": "aafa27e8-5df7-4fc6-9fe5-9a438f2b507a", "value": "Evil Clippy May 2019" }, + { + "description": "Cybleinc. (2022, August 19). EvilCoder Project Selling Multiple Dangerous Tools Online. Retrieved May 10, 2023.", + "meta": { + "date_accessed": "2023-05-10T00:00:00Z", + "date_published": "2022-08-19T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://blog.cyble.com/2022/08/19/evilcoder-project-selling-multiple-dangerous-tools-online/" + ], + "source": "Tidal Cyber", + "title": "EvilCoder Project Selling Multiple Dangerous Tools Online" + }, + "related": [], + "uuid": "7b5617f8-5d0d-4185-97c7-82acf023f3c3", + "value": "Cyble August 19 2022" + }, { "description": "Gretzky, K.. (2018, July 26). Evilginx 2 - Next Generation of Phishing 2FA Tokens. Retrieved October 14, 2019.", "meta": { @@ -18600,6 +19431,22 @@ "uuid": "0156d408-a36d-5876-96fd-f0b0cf296ea2", "value": "DFIR Phosphorus November 2021" }, + { + "description": "Tyler McLellan, Joshua Shilko, Shambavi Sadayappan. (2022, February 23). (Ex)Change of Pace: UNC2596 Observed Leveraging Vulnerabilities to Deploy Cuba Ransomware. Retrieved May 19, 2023.", + "meta": { + "date_accessed": "2023-05-19T00:00:00Z", + "date_published": "2022-02-23T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.mandiant.com/resources/blog/unc2596-cuba-ransomware" + ], + "source": "Tidal Cyber", + "title": "(Ex)Change of Pace: UNC2596 Observed Leveraging Vulnerabilities to Deploy Cuba Ransomware" + }, + "related": [], + "uuid": "c03c0f35-3b86-4733-8a2c-71524f0e3d17", + "value": "Mandiant UNC2596 Cuba Ransomware February 2022" + }, { "description": "Microsoft. (2017, September 25). ExchangePowerShell. Retrieved June 10, 2022.", "meta": { @@ -19036,21 +19883,6 @@ "uuid": "186c1213-d0c5-4eb6-aa0f-0fd61b07a1f7", "value": "ThreatPost Social Media Phishing" }, - { - "description": "Phil Stokes. (2021, January 11). FADE DEAD | Adventures in Reversing Malicious Run-Only AppleScripts. Retrieved September 30, 2022.", - "meta": { - "date_accessed": "2022-09-30T00:00:00Z", - "date_published": "2021-01-11T00:00:00Z", - "refs": [ - "https://www.sentinelone.com/labs/fade-dead-adventures-in-reversing-malicious-run-only-applescripts/" - ], - "source": "MITRE", - "title": "FADE DEAD | Adventures in Reversing Malicious Run-Only AppleScripts" - }, - "related": [], - "uuid": "785f7692-2be8-4f5d-921e-51efdfe0c0b9", - "value": "Sentinel Labs" - }, { "description": "Phil Stokes. (2021, January 11). FADE DEAD | Adventures in Reversing Malicious Run-Only AppleScripts. Retrieved September 29, 2022.", "meta": { @@ -19066,6 +19898,21 @@ "uuid": "34dc9010-e800-420c-ace4-4f426c915d2f", "value": "SentinelLabs reversing run-only applescripts 2021" }, + { + "description": "Phil Stokes. (2021, January 11). FADE DEAD | Adventures in Reversing Malicious Run-Only AppleScripts. Retrieved September 30, 2022.", + "meta": { + "date_accessed": "2022-09-30T00:00:00Z", + "date_published": "2021-01-11T00:00:00Z", + "refs": [ + "https://www.sentinelone.com/labs/fade-dead-adventures-in-reversing-malicious-run-only-applescripts/" + ], + "source": "MITRE", + "title": "FADE DEAD | Adventures in Reversing Malicious Run-Only AppleScripts" + }, + "related": [], + "uuid": "785f7692-2be8-4f5d-921e-51efdfe0c0b9", + "value": "Sentinel Labs" + }, { "description": "Dumont, R. (2019, March 20). Fake or Fake: Keeping up with OceanLotus decoys. Retrieved April 1, 2019.", "meta": { @@ -19639,6 +20486,22 @@ "uuid": "6ee27fdb-1753-4fdf-af72-3295b072ff10", "value": "FireEye FIN7 April 2017" }, + { + "description": "Bryce Abdo, Zander Work, Ioana Teaca, Brendan McKeague. (2022, April 4). FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7. Retrieved May 25, 2023.", + "meta": { + "date_accessed": "2023-05-25T00:00:00Z", + "date_published": "2022-04-04T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.mandiant.com/resources/blog/evolution-of-fin7" + ], + "source": "Tidal Cyber", + "title": "FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7" + }, + "related": [], + "uuid": "fbc3ea90-d3d4-440e-964d-6cd2e991df0c", + "value": "Mandiant FIN7 April 4 2022" + }, { "description": "Abdo, B., et al. (2022, April 4). FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7. Retrieved April 5, 2022.", "meta": { @@ -19714,6 +20577,22 @@ "uuid": "3831173c-7c67-4f16-b652-ad992a7ce411", "value": "Morphisec FIN7 June 2017" }, + { + "description": "Esentire Threat Response Unit. (2024, May 8). FIN7 Uses Trusted Brands and Sponsored Google Ads to Distribute MSIX…. Retrieved May 14, 2024.", + "meta": { + "date_accessed": "2024-05-14T00:00:00Z", + "date_published": "2024-05-08T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.esentire.com/blog/fin7-uses-trusted-brands-and-sponsored-google-ads-to-distribute-msix-payloads" + ], + "source": "Tidal Cyber", + "title": "FIN7 Uses Trusted Brands and Sponsored Google Ads to Distribute MSIX…" + }, + "related": [], + "uuid": "67c3a7ed-e2e2-4566-aca7-61e766f177bf", + "value": "Esentire 5 8 2024" + }, { "description": "Waterman, S. (2017, October 16). Fin7 weaponization of DDE is just their latest slick move, say researchers. Retrieved November 21, 2017.", "meta": { @@ -20193,6 +21072,22 @@ "uuid": "691ada65-fe64-4917-b379-1db2573eea32", "value": "Symantec Beetlejuice" }, + { + "description": "Microsoft Threat Intelligence. (2023, August 24). Flax Typhoon using legitimate software to quietly access Taiwanese organizations. Retrieved August 28, 2023.", + "meta": { + "date_accessed": "2023-08-28T00:00:00Z", + "date_published": "2023-08-24T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.microsoft.com/en-us/security/blog/2023/08/24/flax-typhoon-using-legitimate-software-to-quietly-access-taiwanese-organizations/" + ], + "source": "Tidal Cyber", + "title": "Flax Typhoon using legitimate software to quietly access Taiwanese organizations" + }, + "related": [], + "uuid": "ec962b72-7b7f-4f7e-b6d6-7c5380b07201", + "value": "Microsoft Flax Typhoon August 24 2023" + }, { "description": "LOLBAS. (2021, September 18). fltMC.exe. Retrieved December 4, 2023.", "meta": { @@ -20360,6 +21255,38 @@ "uuid": "9e2c3833-b667-431c-a9e5-1b412583cc5a", "value": "Forfiles.exe - LOLBAS Project" }, + { + "description": "Geoff Ackerman, Tufail Ahmed, James Maclachlan, Dallin Warne, John Wolfram, Brandon Wilbur. (2022, March 28). Forged in Fire: A Survey of MobileIron Log4Shell Exploitation. Retrieved November 1, 2023.", + "meta": { + "date_accessed": "2023-11-01T00:00:00Z", + "date_published": "2022-03-28T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.mandiant.com/resources/blog/mobileiron-log4shell-exploitation" + ], + "source": "Tidal Cyber", + "title": "Forged in Fire: A Survey of MobileIron Log4Shell Exploitation" + }, + "related": [], + "uuid": "62d4d685-09c4-47b6-865c-4a6096e551cd", + "value": "Mandiant Log4Shell March 28 2022" + }, + { + "description": "Proofpoint. (2023, March 24). Fork in the Ice: The New Era of IcedID | Proofpoint US. Retrieved May 10, 2023.", + "meta": { + "date_accessed": "2023-05-10T00:00:00Z", + "date_published": "2023-03-24T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.proofpoint.com/us/blog/threat-insight/fork-ice-new-era-icedid" + ], + "source": "Tidal Cyber", + "title": "Fork in the Ice: The New Era of IcedID | Proofpoint US" + }, + "related": [], + "uuid": "71d5e4ce-3785-48f9-9566-fe5151ad6dc2", + "value": "Proofpoint March 24 2023" + }, { "description": "Symantec Security Response. (2015, July 13). “Forkmeiamfamous”: Seaduke, latest weapon in the Duke armory. Retrieved July 22, 2015.", "meta": { @@ -20405,6 +21332,22 @@ "uuid": "9442e08d-0858-5aa5-b642-a6b1e46018bc", "value": "format_cmd_cisco" }, + { + "description": "Quick Heal Blog. (2023, February 17). FormBook Malware Returns: New Variant Uses Steganography and In-Memory Loading of multiple stages to steal data. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2023-02-17T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://blogs.quickheal.com/formbook-malware-returns-new-variant-uses-steganography-and-in-memory-loading-of-multiple-stages-to-steal-data/" + ], + "source": "Tidal Cyber", + "title": "FormBook Malware Returns: New Variant Uses Steganography and In-Memory Loading of multiple stages to steal data" + }, + "related": [], + "uuid": "02233ce3-abb2-4aed-95b8-56b65c68a665", + "value": "Quick Heal Blog February 17 2023" + }, { "description": "ALEXANDER MARVI, BRAD SLAYBAUGH, DAN EBREO, TUFAIL AHMED, MUHAMMAD UMAIR, TINA JOHNSON. (2023, March 16). Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation. Retrieved May 15, 2023.", "meta": { @@ -21239,6 +22182,22 @@ "uuid": "85056eba-c587-4619-b5e4-dff9680be7b3", "value": "rowland linux at 2019" }, + { + "description": "Daniel Stepanic. (2023, December 5). Getting gooey with GULOADER: deobfuscating the downloader. Retrieved February 27, 2024.", + "meta": { + "date_accessed": "2024-02-27T00:00:00Z", + "date_published": "2023-12-05T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.elastic.co/security-labs/getting-gooey-with-guloader-downloader" + ], + "source": "Tidal Cyber", + "title": "Getting gooey with GULOADER: deobfuscating the downloader" + }, + "related": [], + "uuid": "291fb8ac-a3d6-48a0-9c78-09e358634012", + "value": "Elastic GuLoader December 5 2023" + }, { "description": "Ryan, T. (2010). “Getting In Bed with Robin Sage.”. Retrieved March 6, 2017.", "meta": { @@ -21418,6 +22377,21 @@ "uuid": "8ef4bcee-673d-4bab-8e18-947f45c6fc77", "value": "GitHub ADRecon" }, + { + "description": "BeichenDream. (n.d.). GitHub BeichenDream BadPotato. Retrieved August 28, 2023.", + "meta": { + "date_accessed": "2023-08-28T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://github.com/BeichenDream/BadPotato" + ], + "source": "Tidal Cyber", + "title": "GitHub BeichenDream BadPotato" + }, + "related": [], + "uuid": "e7f1d932-4bcd-4a78-b975-f4ebbce8c05e", + "value": "GitHub BeichenDream BadPotato" + }, { "description": "jpillora. (n.d.). GitHub Chisel. Retrieved October 20, 2023.", "meta": { @@ -21460,7 +22434,7 @@ }, "related": [], "uuid": "eea178f4-80bd-49d1-84b1-f80671e9a3e4", - "value": "GitHub evilginx2" + "value": "GitHub evilginx2 - Duplicate" }, { "description": "Mudge, R. (2014, July 14). Github Malleable-C2-Profiles safebrowsing.profile. Retrieved June 18, 2017.", @@ -21507,6 +22481,36 @@ "uuid": "6e59c47d-597c-4687-942f-9f1cf1db75d5", "value": "GitHub meganz MEGAsync" }, + { + "description": "GitHub. (n.d.). GitHub - NYAN-x-CAT/AsyncRAT-C-Sharp: Open-Source Remote Administration Tool For Windows C#. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://github.com/NYAN-x-CAT/AsyncRAT-C-Sharp/" + ], + "source": "Tidal Cyber", + "title": "GitHub - NYAN-x-CAT/AsyncRAT-C-Sharp: Open-Source Remote Administration Tool For Windows C#" + }, + "related": [], + "uuid": "6747f2cf-61bd-4d26-9bc1-10ce7a8e3e39", + "value": "GitHub - NYAN-x-CAT/AsyncRAT-C-Sharp: Open-Source Remote Administration Tool For Windows C#" + }, + { + "description": "ohpe. (n.d.). GitHub ohpe Juicy Potato. Retrieved August 28, 2023.", + "meta": { + "date_accessed": "2023-08-28T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://github.com/ohpe/juicy-potato" + ], + "source": "Tidal Cyber", + "title": "GitHub ohpe Juicy Potato" + }, + "related": [], + "uuid": "16d0dd05-763a-4503-aa88-c8867d8f202d", + "value": "GitHub ohpe Juicy Potato" + }, { "description": "Leo Pitt. (2020, November 11). Github - PersistentJXA/BashProfilePersist.js. Retrieved January 11, 2021.", "meta": { @@ -21550,6 +22554,21 @@ "uuid": "69d5cb59-6545-4405-8ca6-733db99d3ee9", "value": "GitHub Pupy" }, + { + "description": "praetorian-inc. (n.d.). GitHub purple-team-attack-automation - Available Modules. Retrieved September 8, 2023.", + "meta": { + "date_accessed": "2023-09-08T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://github.com/praetorian-inc/purple-team-attack-automation/wiki/Available-Modules" + ], + "source": "Tidal Cyber", + "title": "GitHub purple-team-attack-automation - Available Modules" + }, + "related": [], + "uuid": "9bca14cc-1302-49b3-b905-cdf48dedc32b", + "value": "GitHub purple-team-attack-automation - Available Modules" + }, { "description": "threatexpress. (n.d.). GitHub random_c2_profile. Retrieved September 21, 2023.", "meta": { @@ -21669,6 +22688,21 @@ "uuid": "cff66280-c592-4e3c-a56c-32a9620cf95c", "value": "GitHub SILENTTRINITY March 2022" }, + { + "description": "SoftEtherVPN. (n.d.). GitHub SoftEtherVPN SoftEtherVPN_Stable. Retrieved August 28, 2023.", + "meta": { + "date_accessed": "2023-08-28T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://github.com/SoftEtherVPN/SoftEtherVPN_Stable" + ], + "source": "Tidal Cyber", + "title": "GitHub SoftEtherVPN SoftEtherVPN_Stable" + }, + "related": [], + "uuid": "f9d28db2-499f-407c-94d2-652b9ed5f928", + "value": "GitHub SoftEtherVPN SoftEtherVPN_Stable" + }, { "description": "ZeroMemoryEx. (n.d.). GitHub Terminator. Retrieved March 13, 2024.", "meta": { @@ -22046,6 +23080,22 @@ "uuid": "5104f0ea-1fb6-4260-a9b6-95922b3a8e5b", "value": "Google Workspace Global Access List" }, + { + "description": "Trend Micro. (2023, January 9). Gootkit Loader Actively Targets Australian Healthcare Industry. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2023-01-09T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.trendmicro.com/en_us/research/23/a/gootkit-loader-actively-targets-the-australian-healthcare-indust.html" + ], + "source": "Tidal Cyber", + "title": "Gootkit Loader Actively Targets Australian Healthcare Industry" + }, + "related": [], + "uuid": "903861d2-cd45-4bda-bc70-2a44c6d49aa6", + "value": "Trend Micro January 09 2023" + }, { "description": "Szappanos, G. & Brandt, A. (2021, March 1). “Gootloader” expands its payload delivery options. Retrieved September 30, 2022.", "meta": { @@ -22061,6 +23111,54 @@ "uuid": "63357292-0f08-4405-a45a-34b606ab7110", "value": "Sophos Gootloader" }, + { + "description": "Antonio Pirozzi. (2021, June 16). Gootloader: ‘Initial Access as a Service’ Platform Expands Its Search for High Value Targets. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2021-06-16T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.sentinelone.com/labs/gootloader-initial-access-as-a-service-platform-expands-its-search-for-high-value-targets/" + ], + "source": "Tidal Cyber", + "title": "Gootloader: ‘Initial Access as a Service’ Platform Expands Its Search for High Value Targets" + }, + "related": [], + "uuid": "1ab5b9c2-4e91-420f-9a27-661588d0bd71", + "value": "SentinelLabs Gootloader June 2021" + }, + { + "description": "Loïc Castel, Jakes Jansen, Nitin Grover. (2023, February 14). GootLoader - SEO Poisoning and Large Payloads Leading to Compromise. Retrieved May 18, 2023.", + "meta": { + "date_accessed": "2023-05-18T00:00:00Z", + "date_published": "2023-02-14T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.cybereason.com/hubfs/Research-Reports/THREAT%20ALERT%20GootLoader%20-%20Large%20payload%20leading%20to%20compromise%20(BLOG)%20-%20v2.1.pdf" + ], + "source": "Tidal Cyber", + "title": "GootLoader - SEO Poisoning and Large Payloads Leading to Compromise" + }, + "related": [], + "uuid": "098bf58f-3868-4892-bb4d-c78ce8817a02", + "value": "Cybereason Gootloader February 2023" + }, + { + "description": "Jim Walter. (2023, January 16). Gotta Catch 'Em All . Retrieved January 1, 2024.", + "meta": { + "date_accessed": "2024-01-01T00:00:00Z", + "date_published": "2023-01-16T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.sentinelone.com/blog/gotta-catch-em-all-understanding-the-netsupport-rat-campaigns-hiding-behind-pokemon-lures/" + ], + "source": "Tidal Cyber", + "title": "Gotta Catch 'Em All" + }, + "related": [], + "uuid": "1482155f-e70d-434c-ade0-23543a4124fe", + "value": "SentinelOne 1 16 2023" + }, { "description": "McCabe, A. (2020, January 23). The Fractured Statue Campaign: U.S. Government Agency Targeted in Spear-Phishing Attacks. Retrieved June 2, 2020.", "meta": { @@ -22297,6 +23395,21 @@ "uuid": "f22d033c-4474-4bd7-b194-c7a4d9819a2b", "value": "Glitch-Cat Green Lambert ATTCK Oct 2021" }, + { + "description": "blog.bushidotoken.net. (n.d.). GreenMwizi - Kenyan scamming campaign using Twitter bots. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://blog.bushidotoken.net/2023/05/greenmwizi-kenyan-scamming-campaign.html" + ], + "source": "Tidal Cyber", + "title": "GreenMwizi - Kenyan scamming campaign using Twitter bots" + }, + "related": [], + "uuid": "3b09696a-1345-4283-a59b-e9a13124ef59", + "value": "GreenMwizi - Kenyan scamming campaign using Twitter bots" + }, { "description": "Cherepanov, A. (2018, October). GREYENERGY A successor to BlackEnergy. Retrieved November 15, 2018.", "meta": { @@ -22520,6 +23633,21 @@ "uuid": "b42f119d-144a-470a-b9fe-ccbf80a78fbb", "value": "Unit 42 NETWIRE April 2020" }, + { + "description": "www.picussecurity.com. (n.d.). H0lyGh0st - North Korean Threat Group Strikes Back With New Ransomware. Retrieved May 19, 2023.", + "meta": { + "date_accessed": "2023-05-19T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.picussecurity.com/resource/h0lygh0st-north-korean-threat-group-strikes-back-with-new-ransomware" + ], + "source": "Tidal Cyber", + "title": "H0lyGh0st - North Korean Threat Group Strikes Back With New Ransomware" + }, + "related": [], + "uuid": "3f66ef62-ac0d-4ece-9a4b-917ae70f1617", + "value": "H0lyGh0st - North Korean Threat Group Strikes Back With New Ransomware" + }, { "description": "Reynolds, J.. (2016, September 13). H1N1: Technical analysis reveals new capabilities. Retrieved September 26, 2016.", "meta": { @@ -22610,6 +23738,22 @@ "uuid": "97d16d3a-98a0-4a7d-9f74-8877c8088ddf", "value": "Data Destruction - Threat Post" }, + { + "description": "Katrina Manson. (2024, May 8). Hackers Behind MGM Attack Targeting Financial Sector in New Campaign. Retrieved May 22, 2024.", + "meta": { + "date_accessed": "2024-05-22T00:00:00Z", + "date_published": "2024-05-08T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.bloomberg.com/news/articles/2024-05-08/notorious-scattered-spider-hacking-gang-targeting-finance-sector" + ], + "source": "Tidal Cyber", + "title": "Hackers Behind MGM Attack Targeting Financial Sector in New Campaign" + }, + "related": [], + "uuid": "2bf7e84a-805d-48aa-b911-8cd8a9dbf1cf", + "value": "Bloomberg Scattered Spider May 8 2024" + }, { "description": "Bill Toulas. (2023, August 2). Hackers exploited Salesforce zero-day in Facebook phishing attack. Retrieved September 18, 2023.", "meta": { @@ -22640,6 +23784,22 @@ "uuid": "b56c5b41-b8e0-4fef-a6d8-183bb283dc7c", "value": "Fortune Dragonfly 2.0 Sept 2017" }, + { + "description": "Andy Greenberg. (2024, April 17). Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities. Retrieved April 30, 2024.", + "meta": { + "date_accessed": "2024-04-30T00:00:00Z", + "date_published": "2024-04-17T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.wired.com/story/cyber-army-of-russia-reborn-sandworm-us-cyberattacks/" + ], + "source": "Tidal Cyber", + "title": "Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities" + }, + "related": [], + "uuid": "53583baf-4e09-4d19-9348-6110206b88be", + "value": "Wired Cyber Army of Russia April 17 2024" + }, { "description": "Brennan, M. (2022, February 16). Hackers No Hashing: Randomizing API Hashes to Evade Cobalt Strike Shellcode Detection. Retrieved August 22, 2022.", "meta": { @@ -23030,21 +24190,6 @@ "uuid": "49bd8841-a4b5-4ced-adfa-0ad0c8625ccd", "value": "Securelist Dtrack" }, - { - "description": "Mark Baggett. (2012, November 8). Help eliminate unquoted path vulnerabilities. Retrieved November 8, 2012.", - "meta": { - "date_accessed": "2012-11-08T00:00:00Z", - "date_published": "2012-11-08T00:00:00Z", - "refs": [ - "https://isc.sans.edu/diary/Help+eliminate+unquoted+path+vulnerabilities/14464" - ], - "source": "MITRE", - "title": "Help eliminate unquoted path vulnerabilities" - }, - "related": [], - "uuid": "23ad5a8c-cbe1-4f40-8757-f1784a4003a1", - "value": "Help eliminate unquoted path" - }, { "description": "Baggett, M. (2012, November 8). Help eliminate unquoted path vulnerabilities. Retrieved December 4, 2014.", "meta": { @@ -23060,6 +24205,21 @@ "uuid": "9b234329-5e05-4035-af38-dd8ab20fd68e", "value": "Baggett 2012" }, + { + "description": "Mark Baggett. (2012, November 8). Help eliminate unquoted path vulnerabilities. Retrieved November 8, 2012.", + "meta": { + "date_accessed": "2012-11-08T00:00:00Z", + "date_published": "2012-11-08T00:00:00Z", + "refs": [ + "https://isc.sans.edu/diary/Help+eliminate+unquoted+path+vulnerabilities/14464" + ], + "source": "MITRE", + "title": "Help eliminate unquoted path vulnerabilities" + }, + "related": [], + "uuid": "23ad5a8c-cbe1-4f40-8757-f1784a4003a1", + "value": "Help eliminate unquoted path" + }, { "description": "Kellie Eickmeyer. (2022, February 7). Helping users stay safe: Blocking internet macros by default in Office. Retrieved February 7, 2022.", "meta": { @@ -23405,19 +24565,20 @@ "value": "Drakonia HInvoke" }, { - "description": "Microsoft. (2021, August 5). HKLM\\SYSTEM\\CurrentControlSet\\Services Registry Tree. Retrieved August 25, 2021.", + "description": "Stephen Green, Elio Biasiotto. (2023, February 2). Hive Ransomware Analysis | Kroll. Retrieved May 7, 2023.", "meta": { - "date_accessed": "2021-08-25T00:00:00Z", - "date_published": "2021-08-05T00:00:00Z", + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2023-02-02T00:00:00Z", + "owner": "TidalCyberIan", "refs": [ - "https://docs.microsoft.com/en-us/windows-hardware/drivers/install/hklm-system-currentcontrolset-services-registry-tree" + "https://www.kroll.com/en/insights/publications/cyber/hive-ransomware-technical-analysis-initial-access-discovery" ], - "source": "MITRE", - "title": "HKLM\\SYSTEM\\CurrentControlSet\\Services Registry Tree" + "source": "Tidal Cyber", + "title": "Hive Ransomware Analysis | Kroll" }, "related": [], - "uuid": "171cfdf1-d91c-4df3-831e-89b6237e3c8b", - "value": "microsoft_services_registry_tree" + "uuid": "f5e43446-04ea-4dcd-be3a-22f8b10b8aa1", + "value": "Hive Ransomware Analysis | Kroll" }, { "description": "Microsoft. (2017, April 20). HKLM\\SYSTEM\\CurrentControlSet\\Services Registry Tree. Retrieved March 16, 2020.", @@ -23434,6 +24595,21 @@ "uuid": "cb9b5391-773f-4b56-8c41-d4f548c7b835", "value": "Microsoft CurrentControlSet Services" }, + { + "description": "Microsoft. (2021, August 5). HKLM\\SYSTEM\\CurrentControlSet\\Services Registry Tree. Retrieved August 25, 2021.", + "meta": { + "date_accessed": "2021-08-25T00:00:00Z", + "date_published": "2021-08-05T00:00:00Z", + "refs": [ + "https://docs.microsoft.com/en-us/windows-hardware/drivers/install/hklm-system-currentcontrolset-services-registry-tree" + ], + "source": "MITRE", + "title": "HKLM\\SYSTEM\\CurrentControlSet\\Services Registry Tree" + }, + "related": [], + "uuid": "171cfdf1-d91c-4df3-831e-89b6237e3c8b", + "value": "microsoft_services_registry_tree" + }, { "description": "Accenture Security. (2018, April 23). Hogfish Redleaves Campaign. Retrieved July 2, 2018.", "meta": { @@ -23792,6 +24968,22 @@ "uuid": "78a8137d-694e-533d-aed3-6bd48fc0cd4a", "value": "Microsoft Threat Actor Naming July 2023" }, + { + "description": "diannegali, schmurky, Dansimp, chrisda, Stacyrch140. (2023, April 20). How Microsoft names threat actors. Retrieved June 22, 2023.", + "meta": { + "date_accessed": "2023-06-22T00:00:00Z", + "date_published": "2023-04-20T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming" + ], + "source": "Tidal Cyber", + "title": "How Microsoft names threat actors" + }, + "related": [], + "uuid": "de9cda86-0b23-4bc8-b524-e74fecf99448", + "value": "Microsoft Threat Actor Naming" + }, { "description": "How Notarization Works. (2020, August 28). How notarization works. Retrieved September 13, 2021.", "meta": { @@ -24428,6 +25620,22 @@ "uuid": "6533d5df-7388-5c59-8c63-0923de34b61d", "value": "NPPSPY Video" }, + { + "description": "Lawrence Abrams. (2024, January 24). HPE: Russian hackers breached its security team’s email accounts. Retrieved February 5, 2024.", + "meta": { + "date_accessed": "2024-02-05T00:00:00Z", + "date_published": "2024-01-24T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.bleepingcomputer.com/news/security/hpe-russian-hackers-breached-its-security-teams-email-accounts/" + ], + "source": "Tidal Cyber", + "title": "HPE: Russian hackers breached its security team’s email accounts" + }, + "related": [], + "uuid": "fc77948f-332a-4e59-8c93-f430cbbbf68f", + "value": "BleepingComputer HPE January 24 2024" + }, { "description": "Cylance. (2019, July 3). hreat Spotlight: Sodinokibi Ransomware. Retrieved August 4, 2020.", "meta": { @@ -25485,6 +26693,22 @@ "uuid": "f26d3aa4-6966-53c4-b9d1-848420377eae", "value": "Dark Reading Microsoft 365 Attacks 2021" }, + { + "description": "Nicole Hoffman. (2023, July 26). Incident Response trends Q2 2023: Data theft extortion rises, while healthcare is still most-targeted vertical. Retrieved August 4, 2023.", + "meta": { + "date_accessed": "2023-08-04T00:00:00Z", + "date_published": "2023-07-26T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://blog.talosintelligence.com/talos-ir-q2-2023-quarterly-recap/" + ], + "source": "Tidal Cyber", + "title": "Incident Response trends Q2 2023: Data theft extortion rises, while healthcare is still most-targeted vertical" + }, + "related": [], + "uuid": "f5367abc-e776-41a0-b8e5-6dc60079c081", + "value": "Cisco Talos Q2 Trends July 26 2023" + }, { "description": "Cybersecurity and Infrastructure Security Agency. (2023, July 6). Increased Truebot Activity Infects U.S. and Canada Based Networks. Retrieved July 6, 2023.", "meta": { @@ -25877,6 +27101,21 @@ "uuid": "616c9177-ca57-45f3-a613-d6450a94697d", "value": "SANS Information Security Reading Room Securing SNMP Securing SNMP" }, + { + "description": "SANS Internet Storm Center. (n.d.). InfoSec Handlers Diary Blog - SANS Internet Storm Center. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://isc.sans.edu/diary/rss/29626" + ], + "source": "Tidal Cyber", + "title": "InfoSec Handlers Diary Blog - SANS Internet Storm Center" + }, + "related": [], + "uuid": "227fd123-65ed-48da-af8b-3f7674f33e12", + "value": "InfoSec Handlers Diary Blog - SANS Internet Storm Center" + }, { "description": "Balanza, M. (2018, April 02). Infostealer.Catchamas. Retrieved July 10, 2018.", "meta": { @@ -25922,6 +27161,22 @@ "uuid": "96d479df-d312-4af7-a47d-2597a66291f1", "value": "ThreatConnect Infrastructure Dec 2020" }, + { + "description": "Colson Wilhoit. (2023, June 21). Initial research exposing JOKERSPY — Elastic Security Labs. Retrieved April 19, 2024.", + "meta": { + "date_accessed": "2024-04-19T00:00:00Z", + "date_published": "2023-06-21T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.elastic.co/security-labs/inital-research-of-jokerspy" + ], + "source": "Tidal Cyber", + "title": "Initial research exposing JOKERSPY — Elastic Security Labs" + }, + "related": [], + "uuid": "42c40ec8-f46a-48fa-bd97-818e3d3d320e", + "value": "elastic.co 6 21 2023" + }, { "description": "Kerrisk, M. (2021, March 22). INIT_MODULE(2). Retrieved September 28, 2021.", "meta": { @@ -26231,6 +27486,22 @@ "uuid": "bffb9e71-ba97-4010-9ad7-29eb330a350c", "value": "Intel Hardware-based Security Technologies" }, + { + "description": "The Red Canary Team. (2023, July 20). Intelligence Insights: July 2023. Retrieved July 28, 2023.", + "meta": { + "date_accessed": "2023-07-28T00:00:00Z", + "date_published": "2023-07-20T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://redcanary.com/blog/intelligence-insights-july-2023/" + ], + "source": "Tidal Cyber", + "title": "Intelligence Insights: July 2023" + }, + "related": [], + "uuid": "ad1d3f99-e5bf-41c6-871b-dd2c9d540341", + "value": "Red Canary Intelligence Insights July 20 2023" + }, { "description": "Kayal, A. (2018, August 26). Interactive Mapping of APT-C-23. Retrieved March 4, 2024.", "meta": { @@ -26722,6 +27993,20 @@ "uuid": "956b3d80-4e19-4cab-a65f-ad86f233aa12", "value": "GitHub Invoke-Obfuscation" }, + { + "description": "Barrett Adams . (n.d.). Invoke-PSImage . Retrieved September 30, 2022.", + "meta": { + "date_accessed": "2022-09-30T00:00:00Z", + "refs": [ + "https://github.com/peewpw/Invoke-PSImage" + ], + "source": "MITRE", + "title": "Invoke-PSImage" + }, + "related": [], + "uuid": "449c873c-c5af-45b8-8bd7-505d2181a05c", + "value": "GitHub PSImage" + }, { "description": "Adams, B. (2017, December 17). Invoke-PSImage. Retrieved April 10, 2018.", "meta": { @@ -26738,18 +28023,20 @@ "value": "GitHub Invoke-PSImage" }, { - "description": "Barrett Adams . (n.d.). Invoke-PSImage . Retrieved September 30, 2022.", + "description": "PowerShellMafia. (2016, December 14). Invoke-Shellcode. Retrieved May 25, 2023.", "meta": { - "date_accessed": "2022-09-30T00:00:00Z", + "date_accessed": "2023-05-25T00:00:00Z", + "date_published": "2016-12-14T00:00:00Z", + "owner": "TidalCyberIan", "refs": [ - "https://github.com/peewpw/Invoke-PSImage" + "https://github.com/PowerShellMafia/PowerSploit/blob/master/CodeExecution/Invoke-Shellcode.ps1" ], - "source": "MITRE", - "title": "Invoke-PSImage" + "source": "Tidal Cyber", + "title": "Invoke-Shellcode" }, "related": [], - "uuid": "449c873c-c5af-45b8-8bd7-505d2181a05c", - "value": "GitHub PSImage" + "uuid": "cf75a442-c6c0-4e83-87bf-8bb42839452b", + "value": "GitHub - PowerSploit Invoke-Shellcode" }, { "description": "Xen. (n.d.). In Wikipedia. Retrieved November 13, 2014.", @@ -27526,6 +28813,22 @@ "uuid": "5a9e4f0f-83d6-4f18-a358-a9ad450c2734", "value": "James TermServ DLL" }, + { + "description": "March. (2024, March 29). Jamf Threat Labs dissects infostealer malware. Retrieved April 5, 2024.", + "meta": { + "date_accessed": "2024-04-05T00:00:00Z", + "date_published": "2024-03-29T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.jamf.com/blog/infostealers-pose-threat-to-macos/" + ], + "source": "Tidal Cyber", + "title": "Jamf Threat Labs dissects infostealer malware" + }, + "related": [], + "uuid": "8b8fedb6-0922-441a-8e17-6bd92055a9b0", + "value": "Jamfsoftware 3 29 2024" + }, { "description": "Symantec. (2020, November 17). Japan-Linked Organizations Targeted in Long-Running and Sophisticated Attack Campaign. Retrieved December 17, 2020.", "meta": { @@ -27690,6 +28993,21 @@ "uuid": "09c99ca2-5f10-5f78-9ba3-5e0e79ce8d96", "value": "Microsoft PS JEA" }, + { + "description": "Office of Public Affairs. (2024, February 15). Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). Retrieved March 28, 2024.", + "meta": { + "date_accessed": "2024-03-28T00:00:00Z", + "date_published": "2024-02-15T00:00:00Z", + "refs": [ + "https://www.justice.gov/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian" + ], + "source": "MITRE", + "title": "Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU)" + }, + "related": [], + "uuid": "957488f8-c2a8-54b0-a3cb-7b510640a2c4", + "value": "Justice GRU 2024" + }, { "description": "Office of Public Affairs. (2024, February 15). Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). Retrieved February 29, 2024.", "meta": { @@ -27707,19 +29025,19 @@ "value": "U.S. Justice Department GRU Botnet February 2024" }, { - "description": "Office of Public Affairs. (2024, February 15). Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). Retrieved March 28, 2024.", + "description": "Dr. Nestori Syynimaa. (2020, June 13). Just looking: Azure Active Directory reconnaissance as an outsider. Retrieved May 27, 2022.", "meta": { - "date_accessed": "2024-03-28T00:00:00Z", - "date_published": "2024-02-15T00:00:00Z", + "date_accessed": "2022-05-27T00:00:00Z", + "date_published": "2020-06-13T00:00:00Z", "refs": [ - "https://www.justice.gov/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian" + "https://o365blog.com/post/just-looking/" ], "source": "MITRE", - "title": "Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU)" + "title": "Just looking: Azure Active Directory reconnaissance as an outsider" }, "related": [], - "uuid": "957488f8-c2a8-54b0-a3cb-7b510640a2c4", - "value": "Justice GRU 2024" + "uuid": "42dad2a3-5b33-4be4-a19b-58a27fb3ee5d", + "value": "Azure Active Directory Reconnaisance" }, { "description": "Dr. Nestori Syynimaa. (2020, June 13). Just looking: Azure Active Directory reconnaissance as an outsider. Retrieved February 1, 2022.", @@ -27736,21 +29054,6 @@ "uuid": "16565eaf-44fb-44f4-b490-40dc1160ff2b", "value": "Azure AD Recon" }, - { - "description": "Dr. Nestori Syynimaa. (2020, June 13). Just looking: Azure Active Directory reconnaissance as an outsider. Retrieved May 27, 2022.", - "meta": { - "date_accessed": "2022-05-27T00:00:00Z", - "date_published": "2020-06-13T00:00:00Z", - "refs": [ - "https://o365blog.com/post/just-looking/" - ], - "source": "MITRE", - "title": "Just looking: Azure Active Directory reconnaissance as an outsider" - }, - "related": [], - "uuid": "42dad2a3-5b33-4be4-a19b-58a27fb3ee5d", - "value": "Azure Active Directory Reconnaisance" - }, { "description": "Paul Litvak. (2020, May 4). Kaiji: New Chinese Linux malware turning to Golang. Retrieved December 17, 2020.", "meta": { @@ -28940,21 +30243,6 @@ "uuid": "ba6a5fcc-9391-42c0-8b90-57b729525f41", "value": "Kaspersky ThreatNeedle Feb 2021" }, - { - "description": "GReAT. (2017, April 3). Lazarus Under the Hood. Retrieved October 3, 2018.", - "meta": { - "date_accessed": "2018-10-03T00:00:00Z", - "date_published": "2017-04-03T00:00:00Z", - "refs": [ - "https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07180244/Lazarus_Under_The_Hood_PDF_final.pdf" - ], - "source": "MITRE", - "title": "Lazarus Under the Hood" - }, - "related": [], - "uuid": "312b30b1-3bd6-46ea-8f77-504f442499bc", - "value": "Kaspersky Lazarus Under The Hood APR 2017" - }, { "description": "GReAT. (2017, April 3). Lazarus Under the Hood. Retrieved April 17, 2019.", "meta": { @@ -28970,6 +30258,21 @@ "uuid": "a1e1ab6a-8db0-4593-95ec-78784607dfa0", "value": "Kaspersky Lazarus Under The Hood Blog 2017" }, + { + "description": "GReAT. (2017, April 3). Lazarus Under the Hood. Retrieved October 3, 2018.", + "meta": { + "date_accessed": "2018-10-03T00:00:00Z", + "date_published": "2017-04-03T00:00:00Z", + "refs": [ + "https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07180244/Lazarus_Under_The_Hood_PDF_final.pdf" + ], + "source": "MITRE", + "title": "Lazarus Under the Hood" + }, + "related": [], + "uuid": "312b30b1-3bd6-46ea-8f77-504f442499bc", + "value": "Kaspersky Lazarus Under The Hood APR 2017" + }, { "description": "Mclellan, M.. (2018, November 19). Lazy Passwords Become Rocket Fuel for Emotet SMB Spreader. Retrieved March 25, 2019.", "meta": { @@ -29481,6 +30784,21 @@ "uuid": "a73a2819-61bd-5bd2-862d-5eeed344909f", "value": "Polop Linux PrivEsc Gitbook" }, + { + "description": "Michael Kerrisk. (2017, September 15). Linux Programmer's Manual. Retrieved September 21, 2018.", + "meta": { + "date_accessed": "2018-09-21T00:00:00Z", + "date_published": "2017-09-15T00:00:00Z", + "refs": [ + "http://man7.org/linux/man-pages/man2/setuid.2.html" + ], + "source": "MITRE", + "title": "Linux Programmer's Manual" + }, + "related": [], + "uuid": "c07e9d6c-18f2-4246-a265-9bec7d833bba", + "value": "setuid man page" + }, { "description": "Kerrisk, M. (2020, June 13). Linux Programmer's Manual. Retrieved June 15, 2020.", "meta": { @@ -29497,19 +30815,20 @@ "value": "Man LD.SO" }, { - "description": "Michael Kerrisk. (2017, September 15). Linux Programmer's Manual. Retrieved September 21, 2018.", + "description": "Lawrence Abrams. (2023, December 3). Linux version of Qilin ransomware focuses on VMware ESXi. Retrieved January 10, 2024.", "meta": { - "date_accessed": "2018-09-21T00:00:00Z", - "date_published": "2017-09-15T00:00:00Z", + "date_accessed": "2024-01-10T00:00:00Z", + "date_published": "2023-12-03T00:00:00Z", + "owner": "TidalCyberIan", "refs": [ - "http://man7.org/linux/man-pages/man2/setuid.2.html" + "https://www.bleepingcomputer.com/news/security/linux-version-of-qilin-ransomware-focuses-on-vmware-esxi/" ], - "source": "MITRE", - "title": "Linux Programmer's Manual" + "source": "Tidal Cyber", + "title": "Linux version of Qilin ransomware focuses on VMware ESXi" }, "related": [], - "uuid": "c07e9d6c-18f2-4246-a265-9bec7d833bba", - "value": "setuid man page" + "uuid": "8cb73f97-0256-472d-88b7-92b6d63578fd", + "value": "BleepingComputer 12 3 2023" }, { "description": "skape. (2003, January 19). Linux x86 run-time process manipulation. Retrieved December 20, 2017.", @@ -29833,6 +31152,22 @@ "uuid": "a3b7540d-20cc-4d94-8321-9fd730486f8c", "value": "Sophos Geolocation 2016" }, + { + "description": "Sanseo. (2022, November 8). LockBit 3.0 Being Distributed via Amadey Bot - ASEC BLOG. Retrieved May 15, 2023.", + "meta": { + "date_accessed": "2023-05-15T00:00:00Z", + "date_published": "2022-11-08T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://asec.ahnlab.com/en/41450/" + ], + "source": "Tidal Cyber", + "title": "LockBit 3.0 Being Distributed via Amadey Bot - ASEC BLOG" + }, + "related": [], + "uuid": "36144a43-ccac-4380-8595-76116dcb6706", + "value": "ASEC BLOG November 08 2022" + }, { "description": "Dana Behling. (2022, October 15). LockBit 3.0 Ransomware Unlocked. Retrieved May 19, 2023.", "meta": { @@ -29865,6 +31200,22 @@ "uuid": "9a73b140-b483-4274-a134-ed1bb15ac31c", "value": "Sentinel Labs LockBit 3.0 July 2022" }, + { + "description": "Cybleinc. (2022, July 5). Lockbit 3.0 –  Ransomware group launches new version. Retrieved May 19, 2023.", + "meta": { + "date_accessed": "2023-05-19T00:00:00Z", + "date_published": "2022-07-05T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://blog.cyble.com/2022/07/05/lockbit-3-0-ransomware-group-launches-new-version/" + ], + "source": "Tidal Cyber", + "title": "Lockbit 3.0 –  Ransomware group launches new version" + }, + "related": [], + "uuid": "9b9bd080-e727-4c41-bb2a-abff48b0fedc", + "value": "Cyble LockBit 3.0 July 2022" + }, { "description": "Cary, M. (2018, December 6). Locked File Access Using ESENTUTL.exe. Retrieved September 5, 2019.", "meta": { @@ -30026,6 +31377,22 @@ "uuid": "80e649f5-6c74-4d66-a452-4f4cd51501da", "value": "t1105_lolbas" }, + { + "description": "frack113, Nasreddine Bencherchali. (2023, January 26). Lolbin Ssh.exe Use As Proxy. Retrieved May 25, 2023.", + "meta": { + "date_accessed": "2023-05-25T00:00:00Z", + "date_published": "2023-01-26T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_lolbin_ssh.yml" + ], + "source": "Tidal Cyber", + "title": "Lolbin Ssh.exe Use As Proxy" + }, + "related": [], + "uuid": "c7af164d-549d-44de-b491-542ef2eb4334", + "value": "Lolbin Ssh.exe Use As Proxy" + }, { "description": "Pradhan, A. (2022, February 8). LolZarus: Lazarus Group Incorporating Lolbins into Campaigns. Retrieved March 22, 2022.", "meta": { @@ -30471,6 +31838,22 @@ "uuid": "13773d75-6fc1-4289-bf45-6ee147279052", "value": "Add List Remove Login Items Apple Script" }, + { + "description": "Phil Stokes. (2023, September 11). macOS MetaStealer . Retrieved January 1, 2024.", + "meta": { + "date_accessed": "2024-01-01T00:00:00Z", + "date_published": "2023-09-11T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.sentinelone.com/blog/macos-metastealer-new-family-of-obfuscated-go-infostealers-spread-in-targeted-attacks/" + ], + "source": "Tidal Cyber", + "title": "macOS MetaStealer" + }, + "related": [], + "uuid": "0d015be9-34ba-4c59-9cea-80b76ee89dd0", + "value": "SentinelOne 9 11 2023" + }, { "description": "Cedric Owens. (2021, May 22). macOS MS Office Sandbox Brain Dump. Retrieved August 20, 2021.", "meta": { @@ -30591,6 +31974,21 @@ "uuid": "80bb8646-1eb0-442a-aa51-ee3efaf75915", "value": "alientvault macspy" }, + { + "description": "Thomas Reed. (2020, July 7). Mac ThiefQuest malware may not be ransomware after all. Retrieved March 18, 2021.", + "meta": { + "date_accessed": "2021-03-18T00:00:00Z", + "date_published": "2020-07-07T00:00:00Z", + "refs": [ + "https://blog.malwarebytes.com/detections/osx-thiefquest/" + ], + "source": "MITRE", + "title": "Mac ThiefQuest malware may not be ransomware after all" + }, + "related": [], + "uuid": "b265ef93-c1fb-440d-a9e0-89cf25a3de05", + "value": "Reed thiefquest fake ransom" + }, { "description": "Thomas Reed. (2020, July 7). Mac ThiefQuest malware may not be ransomware after all. Retrieved March 22, 2021.", "meta": { @@ -30607,19 +32005,20 @@ "value": "reed thiefquest ransomware analysis" }, { - "description": "Thomas Reed. (2020, July 7). Mac ThiefQuest malware may not be ransomware after all. Retrieved March 18, 2021.", + "description": "Jerome Segura. (2023, September 6). Mac users targeted in new malvertising campaign delivering Atomic Stealer. Retrieved April 19, 2024.", "meta": { - "date_accessed": "2021-03-18T00:00:00Z", - "date_published": "2020-07-07T00:00:00Z", + "date_accessed": "2024-04-19T00:00:00Z", + "date_published": "2023-09-06T00:00:00Z", + "owner": "TidalCyberIan", "refs": [ - "https://blog.malwarebytes.com/detections/osx-thiefquest/" + "https://www.malwarebytes.com/blog/threat-intelligence/2023/09/atomic-macos-stealer-delivered-via-malvertising" ], - "source": "MITRE", - "title": "Mac ThiefQuest malware may not be ransomware after all" + "source": "Tidal Cyber", + "title": "Mac users targeted in new malvertising campaign delivering Atomic Stealer" }, "related": [], - "uuid": "b265ef93-c1fb-440d-a9e0-89cf25a3de05", - "value": "Reed thiefquest fake ransom" + "uuid": "5f2f6a12-26c5-4c74-98ad-48b67379a716", + "value": "Malwarebytes 9 6 2023" }, { "description": "Sandvik, Runa. (2021, October 1). Made In America: Green Lambert for OS X. Retrieved March 21, 2022.", @@ -30801,21 +32200,6 @@ "uuid": "afe89472-ac42-4a0d-b398-5ed6a5dee74f", "value": "NetSPI Startup Stored Procedures" }, - { - "description": "Raymond, Nathaniel. (2023, August 16). Major Energy Company Targeted in Large QR Code Phishing Campaign. Retrieved January 17, 2024.", - "meta": { - "date_accessed": "2024-01-17T00:00:00Z", - "date_published": "2023-08-16T00:00:00Z", - "refs": [ - "https://cofense.com/blog/major-energy-company-targeted-in-large-qr-code-campaign/" - ], - "source": "MITRE", - "title": "Major Energy Company Targeted in Large QR Code Phishing Campaign" - }, - "related": [], - "uuid": "450da173-3573-5502-ab53-6d6b9955714d", - "value": "Cofense-redirect" - }, { "description": "Nathaniel Raymond. (2023, August 16). Major Energy Company Targeted in Large QR Code Phishing Campaign. Retrieved February 13, 2024.", "meta": { @@ -30831,6 +32215,21 @@ "uuid": "eda8270f-c76f-5d01-b45f-74246945ec50", "value": "QR-cofense" }, + { + "description": "Raymond, Nathaniel. (2023, August 16). Major Energy Company Targeted in Large QR Code Phishing Campaign. Retrieved January 17, 2024.", + "meta": { + "date_accessed": "2024-01-17T00:00:00Z", + "date_published": "2023-08-16T00:00:00Z", + "refs": [ + "https://cofense.com/blog/major-energy-company-targeted-in-large-qr-code-campaign/" + ], + "source": "MITRE", + "title": "Major Energy Company Targeted in Large QR Code Phishing Campaign" + }, + "related": [], + "uuid": "450da173-3573-5502-ab53-6d6b9955714d", + "value": "Cofense-redirect" + }, { "description": "LOLBAS. (2018, May 25). Makecab.exe. Retrieved December 4, 2023.", "meta": { @@ -31314,21 +32713,6 @@ "uuid": "9b52a72b-938a-5eb6-a3b7-5a925657f0a3", "value": "Malware Monday VBE" }, - { - "description": "Patrick Wardle. (2015). Malware Persistence on OS X Yosemite. Retrieved July 10, 2017.", - "meta": { - "date_accessed": "2017-07-10T00:00:00Z", - "date_published": "2015-01-01T00:00:00Z", - "refs": [ - "https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Wardle.pdf" - ], - "source": "MITRE", - "title": "Malware Persistence on OS X Yosemite" - }, - "related": [], - "uuid": "d4e3b066-c439-4284-ba28-3b8bd8ec270e", - "value": "Malware Persistence on OS X" - }, { "description": "Wardle, P. (2015, April). Malware Persistence on OS X Yosemite. Retrieved April 6, 2018.", "meta": { @@ -31344,6 +32728,21 @@ "uuid": "7e3f3dda-c407-4b06-a6b0-8b72c4dad6e6", "value": "RSAC 2015 San Francisco Patrick Wardle" }, + { + "description": "Patrick Wardle. (2015). Malware Persistence on OS X Yosemite. Retrieved July 10, 2017.", + "meta": { + "date_accessed": "2017-07-10T00:00:00Z", + "date_published": "2015-01-01T00:00:00Z", + "refs": [ + "https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Wardle.pdf" + ], + "source": "MITRE", + "title": "Malware Persistence on OS X Yosemite" + }, + "related": [], + "uuid": "d4e3b066-c439-4284-ba28-3b8bd8ec270e", + "value": "Malware Persistence on OS X" + }, { "description": "Harbour, N. (2010, July 15). Malware Persistence without the Windows Registry. Retrieved November 17, 2020.", "meta": { @@ -32730,6 +34129,22 @@ "uuid": "2ee27b55-b7a7-40a8-8c0b-5e28943cd273", "value": "The Hacker News Microsoft DDoS June 19 2023" }, + { + "description": "Andy Robbins. (2024, February 2). Microsoft Breach - What Happened What Should Azure Admins Do. Retrieved February 5, 2024.", + "meta": { + "date_accessed": "2024-02-05T00:00:00Z", + "date_published": "2024-02-02T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://posts.specterops.io/microsoft-breach-what-happened-what-should-azure-admins-do-da2b7e674ebc" + ], + "source": "Tidal Cyber", + "title": "Microsoft Breach - What Happened What Should Azure Admins Do" + }, + "related": [], + "uuid": "b4c9a3a7-c7d0-4a1d-98cd-6018c072d537", + "value": "Posts By SpecterOps Team Members 2 5 2024" + }, { "description": "Microsoft 365 Defender Threat Intelligence Team. (2021, June 14). Microsoft delivers comprehensive solution to battle rise in consent phishing emails. Retrieved December 13, 2021.", "meta": { @@ -33010,21 +34425,6 @@ "uuid": "86955cd2-5980-44ba-aa7b-4b9f8e347730", "value": "Microsoft WDAC" }, - { - "description": "Jordan Geurten et al. . (2022, March 29). Microsoft recommended driver block rules. Retrieved April 7, 2022.", - "meta": { - "date_accessed": "2022-04-07T00:00:00Z", - "date_published": "2022-03-29T00:00:00Z", - "refs": [ - "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules" - ], - "source": "MITRE", - "title": "Microsoft recommended driver block rules" - }, - "related": [], - "uuid": "9bb5c330-56bd-47e7-8414-729d8e6cb3b3", - "value": "Microsoft driver block rules" - }, { "description": "Microsoft. (2020, October 15). Microsoft recommended driver block rules. Retrieved March 16, 2021.", "meta": { @@ -33040,6 +34440,21 @@ "uuid": "2ad8414a-4490-4896-8266-556b8bdbb77f", "value": "Microsoft Driver Block Rules" }, + { + "description": "Jordan Geurten et al. . (2022, March 29). Microsoft recommended driver block rules. Retrieved April 7, 2022.", + "meta": { + "date_accessed": "2022-04-07T00:00:00Z", + "date_published": "2022-03-29T00:00:00Z", + "refs": [ + "https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules" + ], + "source": "MITRE", + "title": "Microsoft recommended driver block rules" + }, + "related": [], + "uuid": "9bb5c330-56bd-47e7-8414-729d8e6cb3b3", + "value": "Microsoft driver block rules - Duplicate" + }, { "description": "Microsoft. (n.d.). Retrieved January 24, 2020.", "meta": { @@ -33222,6 +34637,22 @@ "uuid": "8b0ebcb5-d531-4f49-aa2d-bceb5e491b3f", "value": "Microsoft Threat Intelligence Tweet August 17 2023" }, + { + "description": "MsftSecIntel. (2020, June 17). Microsoft Threat Intelligence Tweet June 17 2020. Retrieved June 22, 2023.", + "meta": { + "date_accessed": "2023-06-22T00:00:00Z", + "date_published": "2020-06-17T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://twitter.com/MsftSecIntel/status/1273359829390655488" + ], + "source": "Tidal Cyber", + "title": "Microsoft Threat Intelligence Tweet June 17 2020" + }, + "related": [], + "uuid": "98fc7485-9424-412f-8162-a69d6c10c243", + "value": "Microsoft Threat Intelligence Tweet June 17 2020" + }, { "description": "MsftSecIntel. (2023, May 18). Microsoft Threat Intelligence Tweet May 18 2023. Retrieved May 25, 2023.", "meta": { @@ -33359,6 +34790,22 @@ "uuid": "8d0db0f2-9b29-5216-8c9c-de8bf0c541de", "value": "Int SP - chat apps" }, + { + "description": "Microsoft Threat Intelligence. (2024, January 25). Midnight Blizzard Guidance for responders on nation-state attack . Retrieved January 26, 2024.", + "meta": { + "date_accessed": "2024-01-26T00:00:00Z", + "date_published": "2024-01-25T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.microsoft.com/en-us/security/blog/2024/01/25/midnight-blizzard-guidance-for-responders-on-nation-state-attack/" + ], + "source": "Tidal Cyber", + "title": "Midnight Blizzard Guidance for responders on nation-state attack" + }, + "related": [], + "uuid": "10dedea9-35e9-476f-84e8-e49e3f057039", + "value": "Microsoft Security Blog 1 26 2024" + }, { "description": "Deply, B. (n.d.). Mimikatz. Retrieved September 29, 2015.", "meta": { @@ -33403,21 +34850,6 @@ "uuid": "07ff57eb-1e23-433b-8da7-80f1caf7543e", "value": "ADSecurity AD Kerberos Attacks" }, - { - "description": "Schroeder, W. (2015, September 22). Mimikatz and DCSync and ExtraSids, Oh My. Retrieved August 7, 2017.", - "meta": { - "date_accessed": "2017-08-07T00:00:00Z", - "date_published": "2015-09-22T00:00:00Z", - "refs": [ - "http://www.harmj0y.net/blog/redteaming/mimikatz-and-dcsync-and-extrasids-oh-my/" - ], - "source": "MITRE", - "title": "Mimikatz and DCSync and ExtraSids, Oh My" - }, - "related": [], - "uuid": "2afa76c1-caa1-4f16-9289-7abc7eb3a102", - "value": "Harmj0y Mimikatz and DCSync" - }, { "description": "Schroeder, W. (2015, September 22). Mimikatz and DCSync and ExtraSids, Oh My. Retrieved December 4, 2017.", "meta": { @@ -33434,19 +34866,19 @@ "value": "Harmj0y DCSync Sept 2015" }, { - "description": "Metcalf, S. (2015, September 25). Mimikatz DCSync Usage, Exploitation, and Detection. Retrieved December 4, 2017.", + "description": "Schroeder, W. (2015, September 22). Mimikatz and DCSync and ExtraSids, Oh My. Retrieved August 7, 2017.", "meta": { - "date_accessed": "2017-12-04T00:00:00Z", - "date_published": "2015-09-25T00:00:00Z", + "date_accessed": "2017-08-07T00:00:00Z", + "date_published": "2015-09-22T00:00:00Z", "refs": [ - "https://adsecurity.org/?p=1729" + "http://www.harmj0y.net/blog/redteaming/mimikatz-and-dcsync-and-extrasids-oh-my/" ], "source": "MITRE", - "title": "Mimikatz DCSync Usage, Exploitation, and Detection" + "title": "Mimikatz and DCSync and ExtraSids, Oh My" }, "related": [], - "uuid": "856ed70b-29b0-4f56-b5ae-a98981a22eaf", - "value": "AdSecurity DCSync Sept 2015" + "uuid": "2afa76c1-caa1-4f16-9289-7abc7eb3a102", + "value": "Harmj0y Mimikatz and DCSync" }, { "description": "Metcalf, S. (2015, September 25). Mimikatz DCSync Usage, Exploitation, and Detection. Retrieved August 7, 2017.", @@ -33463,6 +34895,21 @@ "uuid": "61b0bb42-2ed6-413d-b331-0a84df12a87d", "value": "ADSecurity Mimikatz DCSync" }, + { + "description": "Metcalf, S. (2015, September 25). Mimikatz DCSync Usage, Exploitation, and Detection. Retrieved December 4, 2017.", + "meta": { + "date_accessed": "2017-12-04T00:00:00Z", + "date_published": "2015-09-25T00:00:00Z", + "refs": [ + "https://adsecurity.org/?p=1729" + ], + "source": "MITRE", + "title": "Mimikatz DCSync Usage, Exploitation, and Detection" + }, + "related": [], + "uuid": "856ed70b-29b0-4f56-b5ae-a98981a22eaf", + "value": "AdSecurity DCSync Sept 2015" + }, { "description": "Jamieson O'Reilly (putterpanda). (2016, July 4). mimikittenz. Retrieved June 20, 2019.", "meta": { @@ -33583,21 +35030,6 @@ "uuid": "0110500c-bf67-43a5-97cb-16eb6c01040b", "value": "APT15 Intezer June 2018" }, - { - "description": "ESET Security. (2019, November 19). Mispadu: Advertisement for a discounted Unhappy Meal. Retrieved March 13, 2024.", - "meta": { - "date_accessed": "2024-03-13T00:00:00Z", - "date_published": "2019-11-19T00:00:00Z", - "refs": [ - "https://www.welivesecurity.com/2019/11/19/mispadu-advertisement-discounted-unhappy-meal/" - ], - "source": "MITRE", - "title": "Mispadu: Advertisement for a discounted Unhappy Meal" - }, - "related": [], - "uuid": "e1b945f4-20e0-5b69-8fd7-f05afce8c0ba", - "value": "ESET Security Mispadu Facebook Ads 2019" - }, { "description": "ESET Research. (2019, November 19). Mispadu: Advertisement for a discounted Unhappy Meal. Retrieved April 4, 2024.", "meta": { @@ -33614,6 +35046,21 @@ "uuid": "a27753c1-2f7a-40c4-9e28-a37265bce28c", "value": "ESET Mispadu November 2019" }, + { + "description": "ESET Security. (2019, November 19). Mispadu: Advertisement for a discounted Unhappy Meal. Retrieved March 13, 2024.", + "meta": { + "date_accessed": "2024-03-13T00:00:00Z", + "date_published": "2019-11-19T00:00:00Z", + "refs": [ + "https://www.welivesecurity.com/2019/11/19/mispadu-advertisement-discounted-unhappy-meal/" + ], + "source": "MITRE", + "title": "Mispadu: Advertisement for a discounted Unhappy Meal" + }, + "related": [], + "uuid": "e1b945f4-20e0-5b69-8fd7-f05afce8c0ba", + "value": "ESET Security Mispadu Facebook Ads 2019" + }, { "description": "Duarte, H., Morrison, B. (2012). (Mis)trusting and (ab)using ssh. Retrieved January 8, 2018.", "meta": { @@ -34014,6 +35461,22 @@ "uuid": "ea64a3a5-a248-44bb-98cd-f7e3d4c23d4e", "value": "Forcepoint Monsoon" }, + { + "description": "Microsoft Threat Intelligence. (2024, May 28). Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks . Retrieved May 29, 2024.", + "meta": { + "date_accessed": "2024-05-29T00:00:00Z", + "date_published": "2024-05-28T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.microsoft.com/en-us/security/blog/2024/05/28/moonstone-sleet-emerges-as-new-north-korean-threat-actor-with-new-bag-of-tricks/" + ], + "source": "Tidal Cyber", + "title": "Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks" + }, + "related": [], + "uuid": "faf315ed-71f7-4e29-8334-701da35a69ad", + "value": "Microsoft Security Blog 5 28 2024" + }, { "description": "Villadsen, O.. (2019, August 29). More_eggs, Anyone? Threat Actor ITG08 Strikes Again. Retrieved September 16, 2019.", "meta": { @@ -34254,21 +35717,6 @@ "uuid": "e208c277-e477-4123-8c3c-313d55cdc1ea", "value": "Volatility Detecting Hooks Sept 2012" }, - { - "description": "Robert Kugler. (2012, November 20). Mozilla Foundation Security Advisory 2012-98. Retrieved March 10, 2017.", - "meta": { - "date_accessed": "2017-03-10T00:00:00Z", - "date_published": "2012-11-20T00:00:00Z", - "refs": [ - "https://www.mozilla.org/en-US/security/advisories/mfsa2012-98/" - ], - "source": "MITRE", - "title": "Mozilla Foundation Security Advisory 2012-98" - }, - "related": [], - "uuid": "cd720550-a0b5-4d1d-85dd-98da97f45b62", - "value": "mozilla_sec_adv_2012" - }, { "description": "Kugler, R. (2012, November 20). Mozilla Foundation Security Advisory 2012-98. Retrieved March 10, 2017.", "meta": { @@ -34284,6 +35732,21 @@ "uuid": "920d1607-154e-4c74-b1eb-0d8299be536f", "value": "Mozilla Firefox Installer DLL Hijack" }, + { + "description": "Robert Kugler. (2012, November 20). Mozilla Foundation Security Advisory 2012-98. Retrieved March 10, 2017.", + "meta": { + "date_accessed": "2017-03-10T00:00:00Z", + "date_published": "2012-11-20T00:00:00Z", + "refs": [ + "https://www.mozilla.org/en-US/security/advisories/mfsa2012-98/" + ], + "source": "MITRE", + "title": "Mozilla Foundation Security Advisory 2012-98" + }, + "related": [], + "uuid": "cd720550-a0b5-4d1d-85dd-98da97f45b62", + "value": "mozilla_sec_adv_2012" + }, { "description": "LOLBAS. (2020, March 20). MpCmdRun.exe. Retrieved December 4, 2023.", "meta": { @@ -34769,6 +36232,22 @@ "uuid": "811d433d-27a4-4411-8ec9-b3a173ba0033", "value": "Accenture MUDCARP March 2019" }, + { + "description": "Margaret Zimmermann. (2024, April 9). Muddled Libra's Evolution to the Cloud. Retrieved April 9, 2024.", + "meta": { + "date_accessed": "2024-04-09T00:00:00Z", + "date_published": "2024-04-09T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://unit42.paloaltonetworks.com/muddled-libra-evolution-to-cloud/" + ], + "source": "Tidal Cyber", + "title": "Muddled Libra's Evolution to the Cloud" + }, + "related": [], + "uuid": "85379fc0-18e5-4862-9629-d21fa686afa2", + "value": "Unit 42 4 9 2024" + }, { "description": "Lancaster, T.. (2017, November 14). Muddying the Water: Targeted Attacks in the Middle East. Retrieved March 15, 2018.", "meta": { @@ -35333,6 +36812,22 @@ "uuid": "84ac26d8-9c7c-4c8c-bf64-a9fb4578388c", "value": "TechNet Netstat" }, + { + "description": "The DFIR Report. (2023, October 30). NetSupport Intrusion Results in Domain Compromise. Retrieved May 22, 2024.", + "meta": { + "date_accessed": "2024-05-22T00:00:00Z", + "date_published": "2023-10-30T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise/" + ], + "source": "Tidal Cyber", + "title": "NetSupport Intrusion Results in Domain Compromise" + }, + "related": [], + "uuid": "0436db31-42f0-47c1-b9a9-c6bb7c60a1ec", + "value": "The DFIR Report NetSupport October 30 2023" + }, { "description": "Microsoft. (n.d.). Net time. Retrieved November 25, 2016.", "meta": { @@ -35810,21 +37305,6 @@ "uuid": "1641553f-96e7-4829-8c77-d96388dac5c7", "value": "Avast CCleaner3 2018" }, - { - "description": "Claud Xiao and Cong Zheng. (2017, April 6). New IoT/Linux Malware Targets DVRs, Forms Botnet. Retrieved December 17, 2020.", - "meta": { - "date_accessed": "2020-12-17T00:00:00Z", - "date_published": "2017-04-06T00:00:00Z", - "refs": [ - "https://unit42.paloaltonetworks.com/unit42-new-iotlinux-malware-targets-dvrs-forms-botnet/" - ], - "source": "MITRE", - "title": "New IoT/Linux Malware Targets DVRs, Forms Botnet" - }, - "related": [], - "uuid": "95b5b03e-f160-47cf-920c-8f4f3d4114a3", - "value": "Tsunami" - }, { "description": "Claud Xiao, Cong Zheng, Yanhui Jia. (2017, April 6). New IoT/Linux Malware Targets DVRs, Forms Botnet. Retrieved February 19, 2018.", "meta": { @@ -35840,6 +37320,21 @@ "uuid": "489a6c57-f64c-423b-a7bd-169fa36c4cdf", "value": "amnesia malware" }, + { + "description": "Claud Xiao and Cong Zheng. (2017, April 6). New IoT/Linux Malware Targets DVRs, Forms Botnet. Retrieved December 17, 2020.", + "meta": { + "date_accessed": "2020-12-17T00:00:00Z", + "date_published": "2017-04-06T00:00:00Z", + "refs": [ + "https://unit42.paloaltonetworks.com/unit42-new-iotlinux-malware-targets-dvrs-forms-botnet/" + ], + "source": "MITRE", + "title": "New IoT/Linux Malware Targets DVRs, Forms Botnet" + }, + "related": [], + "uuid": "95b5b03e-f160-47cf-920c-8f4f3d4114a3", + "value": "Tsunami" + }, { "description": "ClearSky Cyber Security . (2021, August). New Iranian Espionage Campaign By “Siamesekitten” - Lyceum. Retrieved June 6, 2022.", "meta": { @@ -35915,6 +37410,22 @@ "uuid": "6054e0ab-cf61-49ba-b7f5-58b304477451", "value": "Malwarebytes Higaisa 2020" }, + { + "description": "Intel471. (2023, March 22). New loader on the bloc - AresLoader. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2023-03-22T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://intel471.com/blog/new-loader-on-the-bloc-aresloader" + ], + "source": "Tidal Cyber", + "title": "New loader on the bloc - AresLoader" + }, + "related": [], + "uuid": "1bdd0957-1f5b-4323-bf49-f5c41b8c397a", + "value": "New loader on the bloc - AresLoader | Intel471" + }, { "description": "Gallagher, S.. (2015, August 5). Newly discovered Chinese hacking group hacked 100+ websites to use as “watering holes”. Retrieved January 25, 2016.", "meta": { @@ -36590,21 +38101,6 @@ "uuid": "bc7755a0-5ee3-477b-b8d7-67174a59d0e2", "value": "Avira Mustang Panda January 2020" }, - { - "description": "Grunzweig, J., et al. (2016, May 24). New Wekby Attacks Use DNS Requests As Command and Control Mechanism. Retrieved November 15, 2018.", - "meta": { - "date_accessed": "2018-11-15T00:00:00Z", - "date_published": "2016-05-24T00:00:00Z", - "refs": [ - "https://researchcenter.paloaltonetworks.com/2016/05/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism/" - ], - "source": "MITRE", - "title": "New Wekby Attacks Use DNS Requests As Command and Control Mechanism" - }, - "related": [], - "uuid": "6f08aa4e-c89f-4d3e-8f46-e856e21d2d50", - "value": "PaloAlto DNS Requests May 2016" - }, { "description": "Grunzweig, J., et al. (2016, May 24). New Wekby Attacks Use DNS Requests As Command and Control Mechanism. Retrieved August 17, 2016.", "meta": { @@ -36620,6 +38116,21 @@ "uuid": "4a946c3f-ee0a-4649-8104-2bd9d90ebd49", "value": "Palo Alto DNS Requests" }, + { + "description": "Grunzweig, J., et al. (2016, May 24). New Wekby Attacks Use DNS Requests As Command and Control Mechanism. Retrieved November 15, 2018.", + "meta": { + "date_accessed": "2018-11-15T00:00:00Z", + "date_published": "2016-05-24T00:00:00Z", + "refs": [ + "https://researchcenter.paloaltonetworks.com/2016/05/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism/" + ], + "source": "MITRE", + "title": "New Wekby Attacks Use DNS Requests As Command and Control Mechanism" + }, + "related": [], + "uuid": "6f08aa4e-c89f-4d3e-8f46-e856e21d2d50", + "value": "PaloAlto DNS Requests May 2016" + }, { "description": "Yan, T., et al. (2018, November 21). New Wine in Old Bottle: New Azorult Variant Found in FindMyName Campaign using Fallout Exploit Kit. Retrieved November 29, 2018.", "meta": { @@ -37188,6 +38699,21 @@ "uuid": "72d4b682-ed19-4e0f-aeff-faa52b3a0439", "value": "Github NoRunDll" }, + { + "description": "Parisi, T. (2022, December 2). Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies. Retrieved June 30, 2023.", + "meta": { + "date_accessed": "2023-06-30T00:00:00Z", + "date_published": "2022-12-02T00:00:00Z", + "refs": [ + "https://www.crowdstrike.com/blog/analysis-of-intrusion-campaign-targeting-telecom-and-bpo-companies/" + ], + "source": "MITRE", + "title": "Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies" + }, + "related": [], + "uuid": "382785e1-4ef3-506e-b74f-cd07df9ae46e", + "value": "Crowdstrike TELCO BPO Campaign December 2022" + }, { "description": "Tim Parisi. (2022, December 22). Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies. Retrieved September 14, 2023.", "meta": { @@ -37204,21 +38730,6 @@ "uuid": "e48760ba-2752-4d30-8f99-152c81f63017", "value": "CrowdStrike Scattered Spider SIM Swapping December 22 2022" }, - { - "description": "Parisi, T. (2022, December 2). Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies. Retrieved June 30, 2023.", - "meta": { - "date_accessed": "2023-06-30T00:00:00Z", - "date_published": "2022-12-02T00:00:00Z", - "refs": [ - "https://www.crowdstrike.com/blog/analysis-of-intrusion-campaign-targeting-telecom-and-bpo-companies/" - ], - "source": "MITRE", - "title": "Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies" - }, - "related": [], - "uuid": "382785e1-4ef3-506e-b74f-cd07df9ae46e", - "value": "Crowdstrike TELCO BPO Campaign December 2022" - }, { "description": "Ducklin, P. (2015, April 20). Notes from SophosLabs: Dyreza, the malware that discriminates against old computers. Retrieved June 16, 2020.", "meta": { @@ -37309,6 +38820,22 @@ "uuid": "30e769e0-4552-429b-b16e-27830d42edea", "value": "FireEye APT29 Nov 2018" }, + { + "description": "Anthony Galiette, Daniel Bunce, Doel Santos, Shawn Westfall. (2022, August 9). Novel News on Cuba Ransomware: Greetings From Tropical Scorpius. Retrieved June 4, 2022.", + "meta": { + "date_accessed": "2022-06-04T00:00:00Z", + "date_published": "2022-08-09T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://unit42.paloaltonetworks.com/cuba-ransomware-tropical-scorpius/" + ], + "source": "Tidal Cyber", + "title": "Novel News on Cuba Ransomware: Greetings From Tropical Scorpius" + }, + "related": [], + "uuid": "06f668d9-9a68-4d2f-b9a0-b92beb3b75d6", + "value": "Unit 42 Cuba August 9 2022" + }, { "description": "The NTinterlnals.net team. (n.d.). Nowak, T. Retrieved June 25, 2020.", "meta": { @@ -37683,6 +39210,22 @@ "uuid": "a7bcbaca-10c1-403a-9eb5-f111af1cbf6a", "value": "ESET OceanLotus" }, + { + "description": "David Bradbury. (2023, November 29). October Customer Support Security Incident - Update and Recommended Actions. Retrieved December 19, 2023.", + "meta": { + "date_accessed": "2023-12-19T00:00:00Z", + "date_published": "2023-11-29T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://sec.okta.com/harfiles" + ], + "source": "Tidal Cyber", + "title": "October Customer Support Security Incident - Update and Recommended Actions" + }, + "related": [], + "uuid": "5e09ab9c-8cb2-49f5-b65f-fd5447e71ef4", + "value": "Okta HAR Files Incident Update" + }, { "description": "Kaspersky Lab's Global Research & Analysis Team. (2018, October 15). Octopus-infested seas of Central Asia. Retrieved November 14, 2018.", "meta": { @@ -38254,6 +39797,22 @@ "uuid": "e5ca6811-cd22-4be5-a751-d23fb99d206e", "value": "OpenSSH Project Page" }, + { + "description": "mdecrevoisier. (2022, October 25). OpenSSH Server Listening On Socket. Retrieved May 25, 2023.", + "meta": { + "date_accessed": "2023-05-25T00:00:00Z", + "date_published": "2022-10-25T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://github.com/SigmaHQ/sigma/blob/master/rules/windows/builtin/openssh/win_sshd_openssh_server_listening_on_socket.yml" + ], + "source": "Tidal Cyber", + "title": "OpenSSH Server Listening On Socket" + }, + "related": [], + "uuid": "8ab9903b-db4b-4459-9791-f9ab12b7577b", + "value": "OpenSSH Server Listening On Socket" + }, { "description": "rvrsh3ll. (2016, May 18). Operating with EmPyre. Retrieved July 12, 2017.", "meta": { @@ -38705,21 +40264,6 @@ "uuid": "4035e871-9291-4d7f-9c5f-d8482d4dc8a7", "value": "AhnLab Kimsuky Kabar Cobra Feb 2019" }, - { - "description": "Villeneuve, N., Bennett, J. T., Moran, N., Haq, T., Scott, M., & Geers, K. (2014). OPERATION “KE3CHANG”: Targeted Attacks Against Ministries of Foreign Affairs. Retrieved November 12, 2014.", - "meta": { - "date_accessed": "2014-11-12T00:00:00Z", - "date_published": "2014-01-01T00:00:00Z", - "refs": [ - "https://www.mandiant.com/resources/operation-ke3chang-targeted-attacks-against-ministries-of-foreign-affairs" - ], - "source": "MITRE, Tidal Cyber", - "title": "OPERATION “KE3CHANG”: Targeted Attacks Against Ministries of Foreign Affairs" - }, - "related": [], - "uuid": "bb45cf96-ceae-4f46-a0f5-08cd89f699c9", - "value": "Mandiant Operation Ke3chang November 2014" - }, { "description": "Villeneuve, N., Bennett, J. T., Moran, N., Haq, T., Scott, M., & Geers, K. (2014). OPERATION “KE3CHANG”: Targeted Attacks Against Ministries of Foreign Affairs. Retrieved November 12, 2014.", "meta": { @@ -38735,6 +40279,21 @@ "uuid": "31504d92-6c4d-43f0-8548-ccc3aa05ba48", "value": "Villeneuve et al 2014" }, + { + "description": "Villeneuve, N., Bennett, J. T., Moran, N., Haq, T., Scott, M., & Geers, K. (2014). OPERATION “KE3CHANG”: Targeted Attacks Against Ministries of Foreign Affairs. Retrieved November 12, 2014.", + "meta": { + "date_accessed": "2014-11-12T00:00:00Z", + "date_published": "2014-01-01T00:00:00Z", + "refs": [ + "https://www.mandiant.com/resources/operation-ke3chang-targeted-attacks-against-ministries-of-foreign-affairs" + ], + "source": "MITRE, Tidal Cyber", + "title": "OPERATION “KE3CHANG”: Targeted Attacks Against Ministries of Foreign Affairs" + }, + "related": [], + "uuid": "bb45cf96-ceae-4f46-a0f5-08cd89f699c9", + "value": "Mandiant Operation Ke3chang November 2014" + }, { "description": "Ventura, V. (2021, September 16). Operation Layover: How we tracked an attack on the aviation industry to five years of compromise. Retrieved September 15, 2023.", "meta": { @@ -39288,6 +40847,22 @@ "uuid": "46eb883c-e203-4cd9-8f1c-c6ea12bc2742", "value": "Intego Shlayer Feb 2018" }, + { + "description": "Threat Intelligence Team. (2022, June 3). Outbreak of Follina in Australia. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2022-06-03T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://decoded.avast.io/threatintel/outbreak-of-follina-in-australia/" + ], + "source": "Tidal Cyber", + "title": "Outbreak of Follina in Australia" + }, + "related": [], + "uuid": "2b43d421-3921-4efa-9bde-4b482811523f", + "value": "Decoded Avast.io Follina June 3 2022" + }, { "description": "Stalmans, E. (2017, April 28). Outlook Forms and Shells. Retrieved February 4, 2019.", "meta": { @@ -40480,6 +42055,22 @@ "uuid": "929dbb22-34a5-4377-95dd-9e240ecb343a", "value": "phobos_virustotal" }, + { + "description": "Simon Kenin. (2023, June 29). PhonyC2: Revealing a New Malicious Command & Control Framework by MuddyWater. Retrieved October 10, 2023.", + "meta": { + "date_accessed": "2023-10-10T00:00:00Z", + "date_published": "2023-06-29T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.deepinstinct.com/blog/phonyc2-revealing-a-new-malicious-command-control-framework-by-muddywater" + ], + "source": "Tidal Cyber", + "title": "PhonyC2: Revealing a New Malicious Command & Control Framework by MuddyWater" + }, + "related": [], + "uuid": "fd42ac0b-eae5-41bb-b56c-cb1c6d19857b", + "value": "Deep Instinct PhonyC2 June 2023" + }, { "description": "Brumaghin, E., Unterbrink, H. (2018, August 22). Picking Apart Remcos Botnet-In-A-Box. Retrieved November 6, 2018.", "meta": { @@ -41445,18 +43036,20 @@ "value": "Print.exe - LOLBAS Project" }, { - "description": "Spencer Gietzen. (n.d.). Privilege Escalation in Google Cloud Platform – Part 1 (IAM). Retrieved May 27, 2022.", + "description": "Intel471. (2022, February 8). PrivateLoader: The first step in many malware schemes. Retrieved May 15, 2023.", "meta": { - "date_accessed": "2022-05-27T00:00:00Z", + "date_accessed": "2023-05-15T00:00:00Z", + "date_published": "2022-02-08T00:00:00Z", + "owner": "TidalCyberIan", "refs": [ - "https://rhinosecuritylabs.com/gcp/privilege-escalation-google-cloud-platform-part-1/" + "https://intel471.com/blog/privateloader-malware" ], - "source": "MITRE", - "title": "Privilege Escalation in Google Cloud Platform – Part 1 (IAM)" + "source": "Tidal Cyber", + "title": "PrivateLoader: The first step in many malware schemes" }, "related": [], - "uuid": "55373476-1cbe-49f5-aecb-69d60b336d38", - "value": "Rhingo Security Labs GCP Privilege Escalation" + "uuid": "c84be284-03ad-4674-94db-03f264f2db9f", + "value": "PrivateLoader: The first step in many malware schemes | Intel471" }, { "description": "Spencer Gietzen. (n.d.). Privilege Escalation in Google Cloud Platform – Part 1 (IAM). Retrieved September 21, 2023.", @@ -41472,6 +43065,20 @@ "uuid": "55173e12-9edc-5685-ac0b-acd51617cc6e", "value": "Rhino Google Cloud Privilege Escalation" }, + { + "description": "Spencer Gietzen. (n.d.). Privilege Escalation in Google Cloud Platform – Part 1 (IAM). Retrieved May 27, 2022.", + "meta": { + "date_accessed": "2022-05-27T00:00:00Z", + "refs": [ + "https://rhinosecuritylabs.com/gcp/privilege-escalation-google-cloud-platform-part-1/" + ], + "source": "MITRE", + "title": "Privilege Escalation in Google Cloud Platform – Part 1 (IAM)" + }, + "related": [], + "uuid": "55373476-1cbe-49f5-aecb-69d60b336d38", + "value": "Rhingo Security Labs GCP Privilege Escalation" + }, { "description": "Ahl, I. (2017, June 06). Privileges and Credentials: Phished at the Request of Counsel. Retrieved May 17, 2018.", "meta": { @@ -41756,6 +43363,22 @@ "uuid": "188d990e-f0be-40f2-90f3-913dfe687d27", "value": "Talos Promethium June 2020" }, + { + "description": "Intel471. (2022, September 14). Pro-Russian Hacktivist Groups Target Ukraine Supporters. Retrieved April 30, 2024.", + "meta": { + "date_accessed": "2024-04-30T00:00:00Z", + "date_published": "2022-09-14T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://intel471.com/blog/pro-russian-hacktivist-groups-target-ukraine-supporters" + ], + "source": "Tidal Cyber", + "title": "Pro-Russian Hacktivist Groups Target Ukraine Supporters" + }, + "related": [], + "uuid": "f51610a7-1323-4cc4-85ec-2ebdab2a2a50", + "value": "Intel471 Pro-Russian Hacktivist 2022" + }, { "description": "Lich, B. (2016, May 31). Protect derived domain credentials with Credential Guard. Retrieved June 1, 2016.", "meta": { @@ -42176,6 +43799,38 @@ "uuid": "a16f89a4-5142-559b-acfa-f69ad9410bd2", "value": "CrowdStrike PUNK SPIDER" }, + { + "description": "Abhay Yadav. (2023, February 23). PureCrypter targets government entities through Discord. Retrieved May 10, 2023.", + "meta": { + "date_accessed": "2023-05-10T00:00:00Z", + "date_published": "2023-02-23T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.menlosecurity.com/blog/purecrypter-targets-government-entities-through-discord/" + ], + "source": "Tidal Cyber", + "title": "PureCrypter targets government entities through Discord" + }, + "related": [], + "uuid": "58b4eb62-4bdc-47fd-98b2-22dfff1b9dc3", + "value": "Menlo Security PureCrypter February 2023" + }, + { + "description": "Sergiu Gatlan. (2024, June 11). Pure Storage confirms data breach after Snowflake account hack. Retrieved June 13, 2024.", + "meta": { + "date_accessed": "2024-06-13T00:00:00Z", + "date_published": "2024-06-11T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.bleepingcomputer.com/news/security/pure-storage-confirms-data-breach-after-snowflake-account-hack/" + ], + "source": "Tidal Cyber", + "title": "Pure Storage confirms data breach after Snowflake account hack" + }, + "related": [], + "uuid": "410920f2-8e0f-437b-928f-0a7b19a6b96e", + "value": "BleepingComputer Snowflake June 11 2024" + }, { "description": "Gamazo, William. Quist, Nathaniel.. (2023, January 5). PurpleUrchin Bypasses CAPTCHA and Steals Cloud Platform Resources. Retrieved February 28, 2024.", "meta": { @@ -42401,6 +44056,22 @@ "uuid": "e2791c37-e149-43e7-b7c3-c91a6d1bc91e", "value": "Trend Micro Qakbot May 2020" }, + { + "description": "Saikumaravel. (2024, January 4). Qakbot Returns. Retrieved January 24, 2024.", + "meta": { + "date_accessed": "2024-01-24T00:00:00Z", + "date_published": "2024-01-04T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://labs.k7computing.com/index.php/qakbot-returns/" + ], + "source": "Tidal Cyber", + "title": "Qakbot Returns" + }, + "related": [], + "uuid": "5cb5e645-b77b-4bd1-a742-c8f53f234713", + "value": "K7 QakBot Returns January 4 2024" + }, { "description": "Kuzmenko, A. et al. (2021, September 2). QakBot technical analysis. Retrieved September 27, 2021.", "meta": { @@ -42700,6 +44371,22 @@ "uuid": "45098a85-a61f-491a-a549-f62b02dc2ecd", "value": "Rancor Unit42 June 2018" }, + { + "description": "Threat Hunter Team Symantec. (2024, June 5). RansomHub New Ransomware has Origins in Older Knight. Retrieved June 7, 2024.", + "meta": { + "date_accessed": "2024-06-07T00:00:00Z", + "date_published": "2024-06-05T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://symantec-enterprise-blogs.security.com/threat-intelligence/ransomhub-knight-ransomware" + ], + "source": "Tidal Cyber", + "title": "RansomHub New Ransomware has Origins in Older Knight" + }, + "related": [], + "uuid": "3fa49490-cb22-4362-bf48-eaba9e83e6f5", + "value": "BroadcomSW June 5 2024" + }, { "description": "FBI. (n.d.). Ransomware. Retrieved August 18, 2023.", "meta": { @@ -42804,6 +44491,22 @@ "uuid": "833018b5-6ef6-5327-9af5-1a551df25cd2", "value": "Microsoft Ransomware as a Service" }, + { + "description": "Www.invictus-ir.com. (2024, January 11). Ransomware in the cloud. Retrieved April 17, 2024.", + "meta": { + "date_accessed": "2024-04-17T00:00:00Z", + "date_published": "2024-01-11T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.invictus-ir.com/news/ransomware-in-the-cloud" + ], + "source": "Tidal Cyber", + "title": "Ransomware in the cloud" + }, + "related": [], + "uuid": "5e2a0756-d8f6-4359-9ca3-1e96fb8b5ac9", + "value": "Www.invictus-ir.com 1 11 2024" + }, { "description": "Mundo, A. (2020, March 26). Ransomware Maze. Retrieved May 18, 2020.", "meta": { @@ -42835,6 +44538,22 @@ "uuid": "eca1301f-deeb-4a97-8c4e-e61210706116", "value": "Sophos SystemBC December 16 2020" }, + { + "description": "Shunichi Imano, James Slaughter. (2022, December 22). Ransomware Roundup – Play. Retrieved August 10, 2023.", + "meta": { + "date_accessed": "2023-08-10T00:00:00Z", + "date_published": "2022-12-22T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.fortinet.com/blog/threat-research/ransomware-roundup-play-ransomware" + ], + "source": "Tidal Cyber", + "title": "Ransomware Roundup – Play" + }, + "related": [], + "uuid": "a3fa463f-dd2f-4d23-8834-c428d90ea09b", + "value": "Fortinet Play Ransomware December 22 2022" + }, { "description": "Trend Micro Research. (2023, October 5). Ransomware Spotlight: Akira. Retrieved February 27, 2024.", "meta": { @@ -43188,6 +44907,22 @@ "uuid": "1feff728-2230-4a45-bd64-6093f8b42646", "value": "rdrleakdiag.exe - LOLBAS Project" }, + { + "description": "Yến Hứa. (2021, January 13). [RE019] From A to X analyzing some real cases which used recent Emotet samples. Retrieved February 27, 2024.", + "meta": { + "date_accessed": "2024-02-27T00:00:00Z", + "date_published": "2021-01-13T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://blog.vincss.net/re019-from-a-to-x-analyzing-some-real-cases-which-used-recent-emotet-samples/" + ], + "source": "Tidal Cyber", + "title": "[RE019] From A to X analyzing some real cases which used recent Emotet samples" + }, + "related": [], + "uuid": "1ebae9fa-bab1-4a26-8d49-ae6778fdf094", + "value": "blog.vincss.net 1 13 2021" + }, { "description": "Faou, M. and Boutin, J. (2017, February). Read The Manual: A Guide to the RTM Banking Trojan. Retrieved March 9, 2017.", "meta": { @@ -43729,20 +45464,6 @@ "uuid": "f58ac1e4-c470-4aac-a077-7f358e25b0fa", "value": "Microsoft Registry Auditing Aug 2016" }, - { - "description": "Microsoft. (n.d.). Registry Key Security and Access Rights. Retrieved March 16, 2017.", - "meta": { - "date_accessed": "2017-03-16T00:00:00Z", - "refs": [ - "https://msdn.microsoft.com/library/windows/desktop/ms724878.aspx" - ], - "source": "MITRE", - "title": "Registry Key Security and Access Rights" - }, - "related": [], - "uuid": "c5627d86-1b59-4c2a-aac0-88f1b4dc6974", - "value": "MSDN Registry Key Security" - }, { "description": "Microsoft. (2018, May 31). Registry Key Security and Access Rights. Retrieved March 16, 2017.", "meta": { @@ -43758,6 +45479,20 @@ "uuid": "f8f12cbb-029c-48b1-87ce-624a7f98c8ab", "value": "Registry Key Security" }, + { + "description": "Microsoft. (n.d.). Registry Key Security and Access Rights. Retrieved March 16, 2017.", + "meta": { + "date_accessed": "2017-03-16T00:00:00Z", + "refs": [ + "https://msdn.microsoft.com/library/windows/desktop/ms724878.aspx" + ], + "source": "MITRE", + "title": "Registry Key Security and Access Rights" + }, + "related": [], + "uuid": "c5627d86-1b59-4c2a-aac0-88f1b4dc6974", + "value": "MSDN Registry Key Security" + }, { "description": "Microsoft. (2021, December 14). Registry Trees for Devices and Drivers. Retrieved March 28, 2023.", "meta": { @@ -43859,21 +45594,6 @@ "uuid": "4054604b-7c0f-5012-b40c-2b117f6b54c2", "value": "Mandiant Remediation and Hardening Strategies for Microsoft 365" }, - { - "description": "Mike Burns, Matthew McWhirt, Douglas Bienstock, Nick Bennett. (2021, January 19). Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452. Retrieved September 25, 2021.", - "meta": { - "date_accessed": "2021-09-25T00:00:00Z", - "date_published": "2021-01-19T00:00:00Z", - "refs": [ - "https://www.fireeye.com/blog/threat-research/2021/01/remediation-and-hardening-strategies-for-microsoft-365-to-defend-against-unc2452.html" - ], - "source": "MITRE", - "title": "Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452" - }, - "related": [], - "uuid": "7aa5c294-df8e-4994-9b9e-69444d75ef37", - "value": "Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452" - }, { "description": "Mandiant. (2021, January 19). Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452. Retrieved January 22, 2021.", "meta": { @@ -43889,6 +45609,21 @@ "uuid": "ed031297-d0f5-44a7-9723-ba692e923a6e", "value": "Mandiant Defend UNC2452 White Paper" }, + { + "description": "Mike Burns, Matthew McWhirt, Douglas Bienstock, Nick Bennett. (2021, January 19). Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452. Retrieved September 25, 2021.", + "meta": { + "date_accessed": "2021-09-25T00:00:00Z", + "date_published": "2021-01-19T00:00:00Z", + "refs": [ + "https://www.fireeye.com/blog/threat-research/2021/01/remediation-and-hardening-strategies-for-microsoft-365-to-defend-against-unc2452.html" + ], + "source": "MITRE", + "title": "Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452" + }, + "related": [], + "uuid": "7aa5c294-df8e-4994-9b9e-69444d75ef37", + "value": "Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452" + }, { "description": "Microsoft. (n.d.). Remote Desktop Services. Retrieved June 1, 2016.", "meta": { @@ -44516,6 +46251,38 @@ "uuid": "3f6e2821-5073-4382-b5dd-08676eaa2240", "value": "HC3 Analyst Note Rhysida Ransomware August 2023" }, + { + "description": "Alex Delamotte, Jim Walter. (2023, June 29). Rhysida Ransomware | RaaS Crawls Out of Crimeware Undergrowth to Attack Chilean Army. Retrieved August 11, 2023.", + "meta": { + "date_accessed": "2023-08-11T00:00:00Z", + "date_published": "2023-06-29T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.sentinelone.com/blog/rhysida-ransomware-raas-crawls-out-of-crimeware-undergrowth-to-attack-chilean-army/" + ], + "source": "Tidal Cyber", + "title": "Rhysida Ransomware | RaaS Crawls Out of Crimeware Undergrowth to Attack Chilean Army" + }, + "related": [], + "uuid": "4fa2a841-71e8-4733-8622-cc068d077ad9", + "value": "SentinelOne Rhysida June 29 2023" + }, + { + "description": "PTI Team. (2023, February 27). [RIG] RIG Exploit Kit: In-Depth Analysis. Retrieved May 8, 2023.", + "meta": { + "date_accessed": "2023-05-08T00:00:00Z", + "date_published": "2023-02-27T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.prodaft.com/resource/detail/rig-rig-exploit-kit-depth-analysis" + ], + "source": "Tidal Cyber", + "title": "[RIG] RIG Exploit Kit: In-Depth Analysis" + }, + "related": [], + "uuid": "13ed0c11-f258-47d8-9253-8bd13661c2a9", + "value": "Prodaft RIG February 2023" + }, { "description": "Microsoft Threat Intelligence. (2022, May 19). Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices. Retrieved September 27, 2023.", "meta": { @@ -44858,6 +46625,21 @@ "uuid": "28aef64e-20d3-5227-a3c9-e657c6e2d07e", "value": "Cybereason Royal December 2022" }, + { + "description": "Cybereason global soc & cybereason security research teams. (n.d.). Royal Rumble: Analysis of Royal Ransomware. Retrieved May 18, 2023.", + "meta": { + "date_accessed": "2023-05-18T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.cybereason.com/blog/royal-ransomware-analysis" + ], + "source": "Tidal Cyber", + "title": "Royal Rumble: Analysis of Royal Ransomware" + }, + "related": [], + "uuid": "5afa7fd0-908e-4714-9ab3-2bbbc1fff976", + "value": "Royal Rumble: Analysis of Royal Ransomware" + }, { "description": "LOLBAS. (2018, May 25). Rpcping.exe. Retrieved December 4, 2023.", "meta": { @@ -44992,20 +46774,6 @@ "uuid": "0d633a50-4afd-4479-898e-1a785f5637da", "value": "Microsoft Run Key" }, - { - "description": "Microsoft TechNet. (n.d.). Runas. Retrieved April 21, 2017.", - "meta": { - "date_accessed": "2017-04-21T00:00:00Z", - "refs": [ - "https://technet.microsoft.com/en-us/library/bb490994.aspx" - ], - "source": "MITRE", - "title": "Runas" - }, - "related": [], - "uuid": "8b4bdce9-da19-443f-88d2-11466e126c09", - "value": "Microsoft runas" - }, { "description": "Microsoft. (2016, August 31). Runas. Retrieved October 1, 2021.", "meta": { @@ -45021,6 +46789,20 @@ "uuid": "af05c12e-f9c6-421a-9a5d-0797c01ab2dc", "value": "Microsoft RunAs" }, + { + "description": "Microsoft TechNet. (n.d.). Runas. Retrieved April 21, 2017.", + "meta": { + "date_accessed": "2017-04-21T00:00:00Z", + "refs": [ + "https://technet.microsoft.com/en-us/library/bb490994.aspx" + ], + "source": "MITRE", + "title": "Runas" + }, + "related": [], + "uuid": "8b4bdce9-da19-443f-88d2-11466e126c09", + "value": "Microsoft runas - Duplicate" + }, { "description": "Wikipedia. (2018, August 3). Run Command. Retrieved October 12, 2018.", "meta": { @@ -45713,21 +47495,6 @@ "uuid": "5135c600-b2a6-59e7-9023-8e293736f8de", "value": "NSA Sandworm 2020" }, - { - "description": "Ken Proska, John Wolfram, Jared Wilson, Dan Black, Keith Lunden, Daniel Kapellmann Zafra, Nathan Brubaker, Tyler Mclellan, Chris Sistrunk. (2023, November 9). Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology. Retrieved March 28, 2024.", - "meta": { - "date_accessed": "2024-03-28T00:00:00Z", - "date_published": "2023-11-09T00:00:00Z", - "refs": [ - "https://www.mandiant.com/resources/blog/sandworm-disrupts-power-ukraine-operational-technology" - ], - "source": "MITRE", - "title": "Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology" - }, - "related": [], - "uuid": "7ad64744-2790-54e4-97cd-e412423f6ada", - "value": "Mandiant-Sandworm-Ukraine-2022" - }, { "description": "Ken Proska, John Wolfram, Jared Wilson, Dan Black, Keith Lunden, Daniel Kapellmann Zafra, Nathan Brubaker, Tyler McLellan, Chris Sistrunk. (2023, November 9). Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology. Retrieved April 17, 2024.", "meta": { @@ -45744,6 +47511,21 @@ "uuid": "e35f005d-a3cd-4733-88ac-92bbf46e2c8a", "value": "Mandiant Sandworm November 9 2023" }, + { + "description": "Ken Proska, John Wolfram, Jared Wilson, Dan Black, Keith Lunden, Daniel Kapellmann Zafra, Nathan Brubaker, Tyler Mclellan, Chris Sistrunk. (2023, November 9). Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology. Retrieved March 28, 2024.", + "meta": { + "date_accessed": "2024-03-28T00:00:00Z", + "date_published": "2023-11-09T00:00:00Z", + "refs": [ + "https://www.mandiant.com/resources/blog/sandworm-disrupts-power-ukraine-operational-technology" + ], + "source": "MITRE", + "title": "Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology" + }, + "related": [], + "uuid": "7ad64744-2790-54e4-97cd-e412423f6ada", + "value": "Mandiant-Sandworm-Ukraine-2022" + }, { "description": "ANSSI. (2021, January 27). SANDWORM INTRUSION SET CAMPAIGN TARGETING CENTREON SYSTEMS. Retrieved March 30, 2021.", "meta": { @@ -45892,6 +47674,22 @@ "uuid": "90e60242-82d8-5648-b7e4-def6fd508e16", "value": "Sysdig ScarletEel 2.0" }, + { + "description": "Alberto Pellitteri. (2023, February 28). SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft. Retrieved February 2, 2023.", + "meta": { + "date_accessed": "2023-02-02T00:00:00Z", + "date_published": "2023-02-28T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://sysdig.com/blog/cloud-breach-terraform-data-theft/" + ], + "source": "Tidal Cyber", + "title": "SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft" + }, + "related": [], + "uuid": "18931f81-51bf-44af-9573-512ccb66c238", + "value": "Sysdig Scarleteel February 28 2023" + }, { "description": "Falcone, R. and Miller-Osborn, J.. (2016, January 24). Scarlet Mimic: Years-Long Espionage Campaign Targets Minority Activists. Retrieved February 10, 2016.", "meta": { @@ -46043,6 +47841,22 @@ "uuid": "2ef31677-b7ec-4200-a342-7c9196e1aa58", "value": "Schtasks.exe - LOLBAS Project" }, + { + "description": "Ryan Estes. (2023, May 23). Scratching the Surface of Rhysida Ransomware. Retrieved August 11, 2023.", + "meta": { + "date_accessed": "2023-08-11T00:00:00Z", + "date_published": "2023-05-23T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.secplicity.org/2023/05/23/scratching-the-surface-of-rhysida-ransomware/" + ], + "source": "Tidal Cyber", + "title": "Scratching the Surface of Rhysida Ransomware" + }, + "related": [], + "uuid": "1b73bfb6-376e-4252-b3a1-9b6cf5ccaaf3", + "value": "Secplicity Rhysida May 23 2023" + }, { "description": "Wikipedia. (2017, November 22). Screensaver. Retrieved December 5, 2017.", "meta": { @@ -46472,21 +48286,6 @@ "uuid": "3cc2c996-10e9-4e25-999c-21dc2c69e4af", "value": "CISA IDN ST05-016" }, - { - "description": "Dr. Nestori Syynimaa. (2017, November 16). Security vulnerability in Azure AD & Office 365 identity federation. Retrieved September 28, 2022.", - "meta": { - "date_accessed": "2022-09-28T00:00:00Z", - "date_published": "2017-11-16T00:00:00Z", - "refs": [ - "https://o365blog.com/post/federation-vulnerability/" - ], - "source": "MITRE", - "title": "Security vulnerability in Azure AD & Office 365 identity federation" - }, - "related": [], - "uuid": "d2005eb6-4da4-4938-97fb-caa0e2381f4e", - "value": "AADInternals zure AD Federated Domain" - }, { "description": "Dr. Nestori Syynimaa.. (2017, November 16). Security vulnerability in Azure AD & Office 365 identity federation. Retrieved February 1, 2022.", "meta": { @@ -46502,6 +48301,21 @@ "uuid": "123995be-36f5-4cd6-b80a-d601c2d0971e", "value": "Azure AD Federation Vulnerability" }, + { + "description": "Dr. Nestori Syynimaa. (2017, November 16). Security vulnerability in Azure AD & Office 365 identity federation. Retrieved September 28, 2022.", + "meta": { + "date_accessed": "2022-09-28T00:00:00Z", + "date_published": "2017-11-16T00:00:00Z", + "refs": [ + "https://o365blog.com/post/federation-vulnerability/" + ], + "source": "MITRE", + "title": "Security vulnerability in Azure AD & Office 365 identity federation" + }, + "related": [], + "uuid": "d2005eb6-4da4-4938-97fb-caa0e2381f4e", + "value": "AADInternals zure AD Federated Domain" + }, { "description": "ESET Research. (2015, July 10). Sednit APT Group Meets Hacking Team. Retrieved March 1, 2017.", "meta": { @@ -46677,21 +48491,6 @@ "uuid": "c2f7958b-f521-4133-9aeb-c5c8fae23e78", "value": "ProofPoint Serpent" }, - { - "description": "Wikipedia. (2017, December 16). Server Message Block. Retrieved December 21, 2017.", - "meta": { - "date_accessed": "2017-12-21T00:00:00Z", - "date_published": "2017-12-16T00:00:00Z", - "refs": [ - "https://en.wikipedia.org/wiki/Server_Message_Block" - ], - "source": "MITRE", - "title": "Server Message Block" - }, - "related": [], - "uuid": "3ea03c65-12e0-4e28-bbdc-17bb8c1e1831", - "value": "Wikipedia Server Message Block" - }, { "description": "Wikipedia. (2016, June 12). Server Message Block. Retrieved June 12, 2016.", "meta": { @@ -46707,6 +48506,21 @@ "uuid": "087b4779-22d5-4872-adb7-583904a92285", "value": "Wikipedia SMB" }, + { + "description": "Wikipedia. (2017, December 16). Server Message Block. Retrieved December 21, 2017.", + "meta": { + "date_accessed": "2017-12-21T00:00:00Z", + "date_published": "2017-12-16T00:00:00Z", + "refs": [ + "https://en.wikipedia.org/wiki/Server_Message_Block" + ], + "source": "MITRE", + "title": "Server Message Block" + }, + "related": [], + "uuid": "3ea03c65-12e0-4e28-bbdc-17bb8c1e1831", + "value": "Wikipedia Server Message Block" + }, { "description": "Schwarz, D. and Proofpoint Staff. (2019, January 9). ServHelper and FlawedGrace - New malware introduced by TA505. Retrieved May 28, 2019.", "meta": { @@ -46809,21 +48623,6 @@ "uuid": "dd5dc432-32de-4bf3-b2c7-0bbdda031dd0", "value": "Microsoft SetSPN" }, - { - "description": "@r0wdy_. (2017, November 30). Service Recovery Parameters. Retrieved April 9, 2018.", - "meta": { - "date_accessed": "2018-04-09T00:00:00Z", - "date_published": "2017-11-30T00:00:00Z", - "refs": [ - "https://twitter.com/r0wdy_/status/936365549553991680" - ], - "source": "MITRE", - "title": "Service Recovery Parameters" - }, - "related": [], - "uuid": "7757776d-b0e9-4a99-8a55-2cd1b248c4a0", - "value": "Tweet Registry Perms Weakness" - }, { "description": "The Cyber (@r0wdy_). (2017, November 30). Service Recovery Parameters. Retrieved April 9, 2018.", "meta": { @@ -46839,6 +48638,21 @@ "uuid": "8875ff5d-65bc-402a-bfe0-32adc10fb008", "value": "Twitter Service Recovery Nov 2017" }, + { + "description": "@r0wdy_. (2017, November 30). Service Recovery Parameters. Retrieved April 9, 2018.", + "meta": { + "date_accessed": "2018-04-09T00:00:00Z", + "date_published": "2017-11-30T00:00:00Z", + "refs": [ + "https://twitter.com/r0wdy_/status/936365549553991680" + ], + "source": "MITRE", + "title": "Service Recovery Parameters" + }, + "related": [], + "uuid": "7757776d-b0e9-4a99-8a55-2cd1b248c4a0", + "value": "Tweet Registry Perms Weakness" + }, { "description": "Microsoft. (n.d.). Services. Retrieved June 7, 2016.", "meta": { @@ -47178,20 +48992,6 @@ "uuid": "6f454218-91b7-4606-9467-c6d465c0fd1f", "value": "AWS EBS Snapshot Sharing" }, - { - "description": "The Linux Documentation Project. (n.d.). Shared Libraries. Retrieved January 31, 2020.", - "meta": { - "date_accessed": "2020-01-31T00:00:00Z", - "refs": [ - "https://www.tldp.org/HOWTO/Program-Library-HOWTO/shared-libraries.html" - ], - "source": "MITRE", - "title": "Shared Libraries" - }, - "related": [], - "uuid": "2862845b-72b3-41d8-aafb-b36e90c6c30a", - "value": "TLDP Shared Libraries" - }, { "description": "Wheeler, D. (2003, April 11). Shared Libraries. Retrieved September 7, 2023.", "meta": { @@ -47207,6 +49007,20 @@ "uuid": "054d769a-f88e-55e9-971a-f169ee434cfe", "value": "Linux Shared Libraries" }, + { + "description": "The Linux Documentation Project. (n.d.). Shared Libraries. Retrieved January 31, 2020.", + "meta": { + "date_accessed": "2020-01-31T00:00:00Z", + "refs": [ + "https://www.tldp.org/HOWTO/Program-Library-HOWTO/shared-libraries.html" + ], + "source": "MITRE", + "title": "Shared Libraries" + }, + "related": [], + "uuid": "2862845b-72b3-41d8-aafb-b36e90c6c30a", + "value": "TLDP Shared Libraries" + }, { "description": "halflife. (1997, September 1). Shared Library Redirection Techniques. Retrieved December 20, 2017.", "meta": { @@ -47971,6 +49785,22 @@ "uuid": "46c40ed4-5a15-4b38-b625-bebc569dbf69", "value": "Detectify Slack Tokens" }, + { + "description": "Team Huntress. (2024, February 23). SlashAndGrab ScreenConnect Post-Exploitation in the Wild (CVE-2024-1709 & CVE-2024-1708). Retrieved February 23, 2024.", + "meta": { + "date_accessed": "2024-02-23T00:00:00Z", + "date_published": "2024-02-23T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.huntress.com/blog/slashandgrab-screen-connect-post-exploitation-in-the-wild-cve-2024-1709-cve-2024-1708" + ], + "source": "Tidal Cyber", + "title": "SlashAndGrab ScreenConnect Post-Exploitation in the Wild (CVE-2024-1709 & CVE-2024-1708)" + }, + "related": [], + "uuid": "203e002f-09b0-436d-b9c2-a8988ee0b7aa", + "value": "Huntress ScreenConnect 2 23 2024" + }, { "description": "BishopFox. (n.d.). Sliver. Retrieved September 15, 2021.", "meta": { @@ -48246,21 +50076,6 @@ "uuid": "a81ad3ef-fd96-432c-a7c8-ccc86d127a1b", "value": "FireEye SMOKEDHAM June 2021" }, - { - "description": "Warren, R. (2017, August 8). Smuggling HTA files in Internet Explorer/Edge. Retrieved January 16, 2019.", - "meta": { - "date_accessed": "2019-01-16T00:00:00Z", - "date_published": "2017-08-08T00:00:00Z", - "refs": [ - "https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/august/smuggling-hta-files-in-internet-exploreredge/" - ], - "source": "MITRE", - "title": "Smuggling HTA files in Internet Explorer/Edge" - }, - "related": [], - "uuid": "b16bae1a-75aa-478b-b8c7-458ee5a3f7e5", - "value": "Environmental Keyed HTA" - }, { "description": "Warren, R. (2017, August 8). Smuggling HTA files in Internet Explorer/Edge. Retrieved May 20, 2021.", "meta": { @@ -48276,6 +50091,21 @@ "uuid": "f5615cdc-bc56-415b-8e38-6f3fd1c33c88", "value": "nccgroup Smuggling HTA 2017" }, + { + "description": "Warren, R. (2017, August 8). Smuggling HTA files in Internet Explorer/Edge. Retrieved January 16, 2019.", + "meta": { + "date_accessed": "2019-01-16T00:00:00Z", + "date_published": "2017-08-08T00:00:00Z", + "refs": [ + "https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2017/august/smuggling-hta-files-in-internet-exploreredge/" + ], + "source": "MITRE", + "title": "Smuggling HTA files in Internet Explorer/Edge" + }, + "related": [], + "uuid": "b16bae1a-75aa-478b-b8c7-458ee5a3f7e5", + "value": "Environmental Keyed HTA" + }, { "description": "Accenture Security. (2018, November 29). SNAKEMACKEREL. Retrieved April 15, 2019.", "meta": { @@ -48351,6 +50181,38 @@ "uuid": "f026dd44-1491-505b-8a8a-e4f28c6cd6a7", "value": "Telefonica Snip3 December 2021" }, + { + "description": "Cybereason Global SOC Team. (2022, April 25). SocGholish and Zloader – From Fake Updates and Installers to Owning Your Systems. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2022-04-25T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.cybereason.com/blog/threat-analysis-report-socgholish-and-zloader-from-fake-updates-and-installers-to-owning-your-systems" + ], + "source": "Tidal Cyber", + "title": "SocGholish and Zloader – From Fake Updates and Installers to Owning Your Systems" + }, + "related": [], + "uuid": "c28b2fbf-f309-4fb3-9743-1c11651e03ee", + "value": "Cybereason SocGholish Zloader April 2022" + }, + { + "description": "Dean Murphy, Brandon Tirado, Joseph Morales. (2023, January 30). SocGholish: A Tale of FakeUpdates. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2023-01-30T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.reliaquest.com/blog/socgholish-fakeupdates/" + ], + "source": "Tidal Cyber", + "title": "SocGholish: A Tale of FakeUpdates" + }, + "related": [], + "uuid": "de4c13b5-1707-4d8f-a562-6e5fd5504dda", + "value": "ReliaQuest SocGholish" + }, { "description": "Andrew Northern. (2022, November 22). SocGholish, a very real threat from a very fake update. Retrieved February 13, 2024.", "meta": { @@ -48381,6 +50243,22 @@ "uuid": "8a26eeb6-6f80-58f1-b773-b38835c6781d", "value": "SentinelOne SocGholish Infrastructure November 2022" }, + { + "description": "Aleksandar Milenkoski. (2022, November 7). SocGholish Diversifies and Expands Its Malware Staging Infrastructure to Counter Defenders. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2022-11-07T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.sentinelone.com/labs/socgholish-diversifies-and-expands-its-malware-staging-infrastructure-to-counter-defenders/" + ], + "source": "Tidal Cyber", + "title": "SocGholish Diversifies and Expands Its Malware Staging Infrastructure to Counter Defenders" + }, + "related": [], + "uuid": "c2dd119c-25d8-4e48-8eeb-89552a5a096c", + "value": "SentinelLabs SocGholish November 2022" + }, { "description": "Proofpoint. (2022, November 21). SocGholish Malware: A Real Threat from a Fake Update | Proofpoint US. Retrieved May 7, 2023.", "meta": { @@ -48397,6 +50275,22 @@ "uuid": "dc4117ea-be69-47db-ab75-03100fee230c", "value": "Proofpoint November 21 2022" }, + { + "description": "Rapid7. (2024, May 10). Social Engineering Campaign Linked to Black Basta Ransomware Operators . Retrieved May 21, 2024.", + "meta": { + "date_accessed": "2024-05-21T00:00:00Z", + "date_published": "2024-05-10T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.rapid7.com/blog/post/2024/05/10/ongoing-social-engineering-campaign-linked-to-black-basta-ransomware-operators/" + ], + "source": "Tidal Cyber", + "title": "Social Engineering Campaign Linked to Black Basta Ransomware Operators" + }, + "related": [], + "uuid": "ba749fe0-1ac7-4767-85df-97e6351c37f9", + "value": "Rapid7 Blog 5 10 2024" + }, { "description": "Felipe Duarte, Ido Naor. (2022, March 9). Sockbot in GoLand. Retrieved September 22, 2023.", "meta": { @@ -49294,19 +51188,36 @@ "value": "Mandiant Endpoint Evading 2019" }, { - "description": "Syynimaa, N. (2022, February 15). Stealing and faking Azure AD device identities. Retrieved August 3, 2022.", + "description": "Quentin Bourgue, Pierre Le Bourhis, Threat & Detection Research Team. (2023, February 20). Stealc: a copycat of Vidar and Raccoon infostealers gaining in popularity – Part 1. Retrieved July 28, 2023.", "meta": { - "date_accessed": "2022-08-03T00:00:00Z", - "date_published": "2022-02-15T00:00:00Z", + "date_accessed": "2023-07-28T00:00:00Z", + "date_published": "2023-02-20T00:00:00Z", + "owner": "TidalCyberIan", "refs": [ - "https://o365blog.com/post/deviceidentity/" + "https://blog.sekoia.io/stealc-a-copycat-of-vidar-and-raccoon-infostealers-gaining-in-popularity-part-1/" ], - "source": "MITRE", - "title": "Stealing and faking Azure AD device identities" + "source": "Tidal Cyber", + "title": "Stealc: a copycat of Vidar and Raccoon infostealers gaining in popularity – Part 1" }, "related": [], - "uuid": "ec94c043-92ef-4691-b21a-7ea68f39e338", - "value": "O365 Blog Azure AD Device IDs" + "uuid": "ca5b727d-f35b-4009-b4d4-21a69d41162d", + "value": "Sekoia.io Stealc February 20 2023" + }, + { + "description": "Pierre Le Bourhis, Quentin Bourgue, Threat & Detection Research Team. (2023, February 27). Stealc: a copycat of Vidar and Raccoon infostealers gaining in popularity – Part 2. Retrieved July 28, 2023.", + "meta": { + "date_accessed": "2023-07-28T00:00:00Z", + "date_published": "2023-02-27T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://blog.sekoia.io/stealc-a-copycat-of-vidar-and-raccoon-infostealers-gaining-in-popularity-part-2/" + ], + "source": "Tidal Cyber", + "title": "Stealc: a copycat of Vidar and Raccoon infostealers gaining in popularity – Part 2" + }, + "related": [], + "uuid": "edd0cab4-48f7-48d8-a318-ced118af6a63", + "value": "Sekoia.io Stealc February 27 2023" }, { "description": "Dr. Nestori Syynimaa. (2022, February 15). Stealing and faking Azure AD device identities. Retrieved February 21, 2023.", @@ -49323,6 +51234,21 @@ "uuid": "b5ef16c4-1db0-51e9-93ab-54a8e480debc", "value": "AADInternals Azure AD Device Identities" }, + { + "description": "Syynimaa, N. (2022, February 15). Stealing and faking Azure AD device identities. Retrieved August 3, 2022.", + "meta": { + "date_accessed": "2022-08-03T00:00:00Z", + "date_published": "2022-02-15T00:00:00Z", + "refs": [ + "https://o365blog.com/post/deviceidentity/" + ], + "source": "MITRE", + "title": "Stealing and faking Azure AD device identities" + }, + "related": [], + "uuid": "ec94c043-92ef-4691-b21a-7ea68f39e338", + "value": "O365 Blog Azure AD Device IDs" + }, { "description": "Fuller, R. (2013, September 11). Stealing passwords every time they change. Retrieved November 21, 2017.", "meta": { @@ -49554,6 +51480,22 @@ "uuid": "07e48ca8-b965-4234-b04a-dfad45d58b22", "value": "U.S. CISA CL0P CVE-2023-34362 Exploitation" }, + { + "description": "Cybersecurity and Infrastructure Security Agency. (2023, January 5). #StopRansomware: Cuba Ransomware. Retrieved May 19, 2023.", + "meta": { + "date_accessed": "2023-05-19T00:00:00Z", + "date_published": "2023-01-05T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.cisa.gov/uscert/ncas/alerts/aa22-335a" + ], + "source": "Tidal Cyber", + "title": "#StopRansomware: Cuba Ransomware" + }, + "related": [], + "uuid": "d6ed5172-a319-45b0-b1cb-d270a2a48fa3", + "value": "U.S. CISA Cuba Ransomware October 2022" + }, { "description": "Cybersecurity and Infrastructure Security Agency. (2022, October 26). #StopRansomware: Daixin Team. Retrieved May 19, 2023.", "meta": { @@ -49995,8 +51937,8 @@ "title": "SUNBURST, TEARDROP and the NetSec New Normal" }, "related": [], - "uuid": "a6b75979-af51-42ed-9bb9-01d5fb9ceac9", - "value": "Check Point Sunburst Teardrop December 2020" + "uuid": "4e3d9201-83d4-5375-b3b7-e00dfb16342d", + "value": "CheckPoint Sunburst & Teardrop December 2020" }, { "description": "Check Point Research. (2020, December 22). SUNBURST, TEARDROP and the NetSec New Normal. Retrieved January 6, 2021.", @@ -50010,8 +51952,8 @@ "title": "SUNBURST, TEARDROP and the NetSec New Normal" }, "related": [], - "uuid": "4e3d9201-83d4-5375-b3b7-e00dfb16342d", - "value": "CheckPoint Sunburst & Teardrop December 2020" + "uuid": "a6b75979-af51-42ed-9bb9-01d5fb9ceac9", + "value": "Check Point Sunburst Teardrop December 2020" }, { "description": "CrowdStrike Intelligence Team. (2021, January 11). SUNSPOT: An Implant in the Build Process. Retrieved January 11, 2021.", @@ -50269,6 +52211,20 @@ "uuid": "d9f0af0f-8a65-406b-9d7e-4051086ef301", "value": "SecureList SynAck Doppelgänging May 2018" }, + { + "description": "Strontic. (n.d.). SyncAppvPublishingServer.exe. Retrieved February 6, 2024.", + "meta": { + "date_accessed": "2024-02-06T00:00:00Z", + "refs": [ + "https://strontic.github.io/xcyclopedia/library/SyncAppvPublishingServer.exe-3C291419F60CDF9C2E4E19AD89944FA3.html" + ], + "source": "MITRE", + "title": "SyncAppvPublishingServer.exe" + }, + "related": [], + "uuid": "bc5d8a1a-5cf9-5974-bf13-245fa53721da", + "value": "6 - appv" + }, { "description": "LOLBAS. (2018, May 25). SyncAppvPublishingServer.exe. Retrieved December 4, 2023.", "meta": { @@ -50285,20 +52241,6 @@ "uuid": "ce371df7-aab6-4338-9491-656481cb5601", "value": "SyncAppvPublishingServer.exe - LOLBAS Project" }, - { - "description": "Strontic. (n.d.). SyncAppvPublishingServer.exe. Retrieved February 6, 2024.", - "meta": { - "date_accessed": "2024-02-06T00:00:00Z", - "refs": [ - "https://strontic.github.io/xcyclopedia/library/SyncAppvPublishingServer.exe-3C291419F60CDF9C2E4E19AD89944FA3.html" - ], - "source": "MITRE", - "title": "SyncAppvPublishingServer.exe" - }, - "related": [], - "uuid": "bc5d8a1a-5cf9-5974-bf13-245fa53721da", - "value": "6 - appv" - }, { "description": "Nick Landers, Casey Smith. (n.d.). /Syncappvpublishingserver.vbs. Retrieved February 6, 2024.", "meta": { @@ -50848,6 +52790,22 @@ "uuid": "30ebffb8-be3e-4094-a41b-882aec9e14b8", "value": "IBM TA577 OneNote Malspam" }, + { + "description": "Tommy Madjar, Kelsey Merriman, Selena Larson, Proofpoint Threat Research Team. (2024, March 4). TA577’s Unusual Attack Chain Leads to NTLM Data Theft. Retrieved March 11, 2024.", + "meta": { + "date_accessed": "2024-03-11T00:00:00Z", + "date_published": "2024-03-04T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.proofpoint.com/us/blog/threat-insight/ta577s-unusual-attack-chain-leads-ntlm-data-theft" + ], + "source": "Tidal Cyber", + "title": "TA577’s Unusual Attack Chain Leads to NTLM Data Theft" + }, + "related": [], + "uuid": "bbbef77a-8cd8-411c-a8a7-7faa7b5fdb2c", + "value": "Proofpoint TA577 NTLM March 4 2024" + }, { "description": "Cobalt Strike. (2017, December 8). Tactics, Techniques, and Procedures. Retrieved December 20, 2017.", "meta": { @@ -50907,6 +52865,22 @@ "uuid": "5908b04b-dbca-4fd8-bacc-141ef15546a1", "value": "Lacework TeamTNT May 2021" }, + { + "description": "Martin McCloskey, Christophe Tafani-Dereeper. (2024, January 19). Tales from the cloud trenches: Amazon ECS is the new EC2 for crypto mining. Retrieved April 11, 2024.", + "meta": { + "date_accessed": "2024-04-11T00:00:00Z", + "date_published": "2024-01-19T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://securitylabs.datadoghq.com/articles/tales-from-the-cloud-trenches-ecs-crypto-mining/" + ], + "source": "Tidal Cyber", + "title": "Tales from the cloud trenches: Amazon ECS is the new EC2 for crypto mining" + }, + "related": [], + "uuid": "7e4e44a7-b079-41af-b41d-176ba7e99563", + "value": "Datadog ECS January 19 2024" + }, { "description": "Kovar, R. (2017, December 11). Tall Tales of Hunting with TLS/SSL Certificates. Retrieved October 16, 2020.", "meta": { @@ -51281,21 +53255,6 @@ "uuid": "b98f1967-c62f-5afe-a2f7-4c426615d576", "value": "AquaSec TeamTNT 2023" }, - { - "description": "Darin Smith. (2022, April 21). TeamTNT targeting AWS, Alibaba. Retrieved August 4, 2022.", - "meta": { - "date_accessed": "2022-08-04T00:00:00Z", - "date_published": "2022-04-21T00:00:00Z", - "refs": [ - "https://blog.talosintelligence.com/teamtnt-targeting-aws-alibaba-2/" - ], - "source": "MITRE", - "title": "TeamTNT targeting AWS, Alibaba" - }, - "related": [], - "uuid": "f39b5f92-6e14-4c7f-b79d-7bade722e6d9", - "value": "Cisco Talos Intelligence Group" - }, { "description": "Darin Smith. (2022, April 21). TeamTNT targeting AWS, Alibaba. Retrieved July 8, 2022.", "meta": { @@ -51311,6 +53270,21 @@ "uuid": "acd1b4c5-da28-584e-b892-599180a8dbb0", "value": "Talos TeamTNT" }, + { + "description": "Darin Smith. (2022, April 21). TeamTNT targeting AWS, Alibaba. Retrieved August 4, 2022.", + "meta": { + "date_accessed": "2022-08-04T00:00:00Z", + "date_published": "2022-04-21T00:00:00Z", + "refs": [ + "https://blog.talosintelligence.com/teamtnt-targeting-aws-alibaba-2/" + ], + "source": "MITRE", + "title": "TeamTNT targeting AWS, Alibaba" + }, + "related": [], + "uuid": "f39b5f92-6e14-4c7f-b79d-7bade722e6d9", + "value": "Cisco Talos Intelligence Group" + }, { "description": "Cado Security. (2020, August 16). Team TNT – The First Crypto-Mining Worm to Steal AWS Credentials. Retrieved September 22, 2021.", "meta": { @@ -51446,6 +53420,22 @@ "uuid": "ec87676b-bc88-44b5-9e9a-5eb8eb39b4a1", "value": "Zscaler Pikabot May 24 2023" }, + { + "description": "Zscaler. (2022, June 13). Technical Analysis of PureCrypter | Zscaler Blog. Retrieved May 10, 2023.", + "meta": { + "date_accessed": "2023-05-10T00:00:00Z", + "date_published": "2022-06-13T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.zscaler.com/blogs/security-research/technical-analysis-purecrypter" + ], + "source": "Tidal Cyber", + "title": "Technical Analysis of PureCrypter | Zscaler Blog" + }, + "related": [], + "uuid": "5e3fa76b-0ca3-4935-830a-6ca132fa2fb4", + "value": "Technical Analysis of PureCrypter | Zscaler Blog" + }, { "description": "Crowdstrike. (2022, January 19). Technical Analysis of the WhisperGate Malicious Bootloader. Retrieved March 10, 2022.", "meta": { @@ -51627,6 +53617,22 @@ "uuid": "932897a6-0fa4-5be3-bf0b-20d6ddad238e", "value": "Sygnia Elephant Beetle Jan 2022" }, + { + "description": "Matthew Prince. (2024, February 1). Thanksgiving 2023 security incident. Retrieved February 5, 2024.", + "meta": { + "date_accessed": "2024-02-05T00:00:00Z", + "date_published": "2024-02-01T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://blog.cloudflare.com/thanksgiving-2023-security-incident" + ], + "source": "Tidal Cyber", + "title": "Thanksgiving 2023 security incident" + }, + "related": [], + "uuid": "0d183112-77d9-472f-8b0e-5724e1bb4706", + "value": "Cloudflare February 5 2024" + }, { "description": "Krebs, B. (2018, November 13). That Domain You Forgot to Renew? Yeah, it’s Now Stealing Credit Cards. Retrieved September 20, 2019.", "meta": { @@ -51878,6 +53884,22 @@ "uuid": "5f6752a7-50a9-4202-b69b-c5f9d24b86de", "value": "Medium Ali Salem Bumblebee April 2022" }, + { + "description": "Gurumoorthi Ramanathan. (2023, April 25). The Claws of Evilcode Gauntlet – XWorm RAT  . Retrieved May 10, 2023.", + "meta": { + "date_accessed": "2023-05-10T00:00:00Z", + "date_published": "2023-04-25T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.avira.com/en/blog/the-claws-of-evilcode-gauntlet-xworm-rat" + ], + "source": "Tidal Cyber", + "title": "The Claws of Evilcode Gauntlet – XWorm RAT" + }, + "related": [], + "uuid": "564931cf-a3e1-488f-bc90-be37c448f3b3", + "value": "Avira XWorm April 2023" + }, { "description": "Microsoft. (n.d.). The COM Elevation Moniker. Retrieved July 26, 2016.", "meta": { @@ -51980,6 +54002,22 @@ "uuid": "90d608b9-ddbf-5476-bce1-85e8466aca47", "value": "Invictus IR DangerDev 2024" }, + { + "description": "Www.invictus-ir.com. (2024, January 31). The curious case of DangerDev@protonmail.me. Retrieved April 17, 2024.", + "meta": { + "date_accessed": "2024-04-17T00:00:00Z", + "date_published": "2024-01-31T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.invictus-ir.com/news/the-curious-case-of-dangerdev-protonmail-me" + ], + "source": "Tidal Cyber", + "title": "The curious case of DangerDev@protonmail.me" + }, + "related": [], + "uuid": "803a084a-0468-4c43-9843-a0b5652acdba", + "value": "Www.invictus-ir.com 1 31 2024" + }, { "description": "Counter Threat Unit Research Team. (2017, July 27). The Curious Case of Mia Ash: Fake Persona Lures Middle Eastern Targets. Retrieved February 26, 2018.", "meta": { @@ -52086,6 +54124,22 @@ "uuid": "17ebabfb-6399-4b5f-8274-b34045e2d51a", "value": "Zscaler 2 12 2024" }, + { + "description": "Binary Reverse Engineering Blog. (2023, September 6). The DGA of BumbleBee. Retrieved February 19, 2024.", + "meta": { + "date_accessed": "2024-02-19T00:00:00Z", + "date_published": "2023-09-06T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://bin.re/blog/the-dga-of-bumblebee/" + ], + "source": "Tidal Cyber", + "title": "The DGA of BumbleBee" + }, + "related": [], + "uuid": "8cc9f506-65ce-4adb-aa79-c6cea1efb99b", + "value": "Binary Reverse Engineering Blog 9 6 2023" + }, { "description": "Kaspersky Lab's Global Research & Analysis Team. (2016, July 8). The Dropping Elephant – aggressive cyber-espionage in the Asian region. Retrieved August 3, 2016.", "meta": { @@ -52372,6 +54426,22 @@ "uuid": "5731d7e4-dd19-4d08-b493-7b1a467599d3", "value": "Proofpoint TA416 Europe March 2022" }, + { + "description": "Tony Lambert, Lauren Podber. (2023, April 28). The Goot cause: Detecting Gootloader and its follow-on activity. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2023-04-28T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://redcanary.com/blog/gootloader/" + ], + "source": "Tidal Cyber", + "title": "The Goot cause: Detecting Gootloader and its follow-on activity" + }, + "related": [], + "uuid": "658e3a1a-2f68-4e84-8dab-43e48766703e", + "value": "Red Canary Gootloader April 2023" + }, { "description": "Falcone, R., et al. (2018, August 02). The Gorgon Group: Slithering Between Nation State and Cybercrime. Retrieved August 7, 2018.", "meta": { @@ -53684,6 +55754,22 @@ "uuid": "82d41fd8-495d-41b6-b908-6ada5764c94d", "value": "Code Injection on Linux and macOS" }, + { + "description": "Ian Kenefick, Junestherry Dela Cruz, Peter Girnus. (2024, February 27). Threat Actor Groups, Including Black Basta, are Exploiting Recent ScreenConnect Vulnerabilities. Retrieved February 28, 2024.", + "meta": { + "date_accessed": "2024-02-28T00:00:00Z", + "date_published": "2024-02-27T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.trendmicro.com/en_us/research/24/b/threat-actor-groups-including-black-basta-are-exploiting-recent-.html" + ], + "source": "Tidal Cyber", + "title": "Threat Actor Groups, Including Black Basta, are Exploiting Recent ScreenConnect Vulnerabilities" + }, + "related": [], + "uuid": "186dff50-f68a-4a5a-aa55-8ffbd89859c8", + "value": "TrendMicros ScreenConnect February 27 2024" + }, { "description": "Kizhakkinan, D., et al. (2016, May 11). Threat Actor Leverages Windows Zero-day Exploit in Payment Card Data Attacks. Retrieved February 12, 2018.", "meta": { @@ -53729,6 +55815,22 @@ "uuid": "c1fff36f-802b-4436-abce-7f2787c148db", "value": "Proofpoint TA505 Sep 2017" }, + { + "description": "Cybleinc. (2023, April 26). Threat Actor Selling New Atomic macOS (AMOS) Stealer on Telegram. Retrieved January 1, 2024.", + "meta": { + "date_accessed": "2024-01-01T00:00:00Z", + "date_published": "2023-04-26T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://cyble.com/blog/threat-actor-selling-new-atomic-macos-amos-stealer-on-telegram/" + ], + "source": "Tidal Cyber", + "title": "Threat Actor Selling New Atomic macOS (AMOS) Stealer on Telegram" + }, + "related": [], + "uuid": "cdef460c-a2e0-4a44-83fe-1cf1adc3ebf1", + "value": "Cyble 4 26 2023" + }, { "description": "Cybersecurity and Infrastructure Security Agency. (2023, July 20). Threat Actors Exploiting Citrix CVE-2023-3519 to Implant Webshells. Retrieved July 24, 2023.", "meta": { @@ -53777,6 +55879,22 @@ "uuid": "a501b21d-916d-454e-b5a0-c3d3bdb4e45c", "value": "U.S. CISA Ivanti Exploits February 2024" }, + { + "description": "Microsoft Threat Intelligence. (2024, May 15). Threat actors misusing Quick Assist in social engineering attacks leading to ransomware . Retrieved May 16, 2024.", + "meta": { + "date_accessed": "2024-05-16T00:00:00Z", + "date_published": "2024-05-15T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.microsoft.com/en-us/security/blog/2024/05/15/threat-actors-misusing-quick-assist-in-social-engineering-attacks-leading-to-ransomware/" + ], + "source": "Tidal Cyber", + "title": "Threat actors misusing Quick Assist in social engineering attacks leading to ransomware" + }, + "related": [], + "uuid": "0876de6e-ea0c-4717-89a4-9c7baed53b6f", + "value": "Microsoft Security Blog 5 15 2024" + }, { "description": "Atlas Cybersecurity. (2021, April 19). Threat Actors use Search-Engine-Optimization Tactics to Redirect Traffic and Install Malware. Retrieved September 30, 2022.", "meta": { @@ -54017,6 +56135,22 @@ "uuid": "8670f4ee-7491-4c37-9832-99d6f8f54ba8", "value": "McAfee APT28 DDE1 Nov 2017" }, + { + "description": "Amer Elsad; Kristopher Russo; Austin Dever. (2023, September 15). Threat Group Assessment Muddled Libra (Updated). Retrieved January 1, 2024.", + "meta": { + "date_accessed": "2024-01-01T00:00:00Z", + "date_published": "2023-09-15T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://unit42.paloaltonetworks.com/muddled-libra/" + ], + "source": "Tidal Cyber", + "title": "Threat Group Assessment Muddled Libra (Updated)" + }, + "related": [], + "uuid": "5e9842ae-180f-4645-a5f5-5ddfb8b2d810", + "value": "Unit 42 9 15 2023" + }, { "description": "Gahlot, A. (n.d.). Threat Hunting for Avaddon Ransomware. Retrieved August 19, 2021.", "meta": { @@ -54031,20 +56165,6 @@ "uuid": "c113cde7-5dd5-45e9-af16-3ab6ed0b1728", "value": "Awake Security Avaddon" }, - { - "description": "Gary Golomb and Tory Kei. (n.d.). Threat Hunting Series: Detecting Command & Control in the Cloud. Retrieved May 27, 2022.", - "meta": { - "date_accessed": "2022-05-27T00:00:00Z", - "refs": [ - "https://awakesecurity.com/blog/threat-hunting-series-detecting-command-control-in-the-cloud/" - ], - "source": "MITRE", - "title": "Threat Hunting Series: Detecting Command & Control in the Cloud" - }, - "related": [], - "uuid": "fa3762ce-3e60-4991-b464-12601d2a6912", - "value": "Awake Security C2 Cloud" - }, { "description": "Gary Golomb. (n.d.). Threat Hunting Series: Detecting Command & Control in the Cloud. Retrieved July 8, 2022.", "meta": { @@ -54059,6 +56179,20 @@ "uuid": "b12e0288-48cd-46ec-8305-0f4d050782f2", "value": "Detecting Command & Control in the Cloud" }, + { + "description": "Gary Golomb and Tory Kei. (n.d.). Threat Hunting Series: Detecting Command & Control in the Cloud. Retrieved May 27, 2022.", + "meta": { + "date_accessed": "2022-05-27T00:00:00Z", + "refs": [ + "https://awakesecurity.com/blog/threat-hunting-series-detecting-command-control-in-the-cloud/" + ], + "source": "MITRE", + "title": "Threat Hunting Series: Detecting Command & Control in the Cloud" + }, + "related": [], + "uuid": "fa3762ce-3e60-4991-b464-12601d2a6912", + "value": "Awake Security C2 Cloud" + }, { "description": "Weizman, Y. (2020, April 2). Threat Matrix for Kubernetes. Retrieved March 30, 2021.", "meta": { @@ -54284,6 +56418,22 @@ "uuid": "1be27354-1326-4568-b26a-d0034acecba2", "value": "Ossmann Star Feb 2011" }, + { + "description": "Trend Micro. (2022, April 5). Thwarting Loaders: From SocGholish to BLISTER’s LockBit Payload. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2022-04-05T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.trendmicro.com/de_de/research/22/d/Thwarting-Loaders-From-SocGholish-to-BLISTERs-LockBit-Payload.html" + ], + "source": "Tidal Cyber", + "title": "Thwarting Loaders: From SocGholish to BLISTER’s LockBit Payload" + }, + "related": [], + "uuid": "c049ac17-1fa9-42ff-9220-1ed40890dc77", + "value": "Trend Micro April 05 2022" + }, { "description": "DiMaggio, J. (2016, April 28). Tick cyberespionage group zeros in on Japan. Retrieved July 16, 2018.", "meta": { @@ -54581,6 +56731,22 @@ "uuid": "d6b52135-6bb2-4e37-8f94-1e1d6354bdfd", "value": "Trend Micro TeamTNT" }, + { + "description": "David Bradbury. (2023, October 20). Tracking Unauthorized Access to Okta's Support System. Retrieved December 19, 2023.", + "meta": { + "date_accessed": "2023-12-19T00:00:00Z", + "date_published": "2023-10-20T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://sec.okta.com/articles/2023/10/tracking-unauthorized-access-oktas-support-system" + ], + "source": "Tidal Cyber", + "title": "Tracking Unauthorized Access to Okta's Support System" + }, + "related": [], + "uuid": "14855034-494e-477d-8c91-fc534fd7790d", + "value": "Okta HAR Files Incident Notice" + }, { "description": "Karim, T. (2018, August). TRAILS OF WINDSHIFT. Retrieved June 25, 2020.", "meta": { @@ -54700,21 +56866,6 @@ "uuid": "9bdda422-dbf7-4b70-a7b1-9e3ad658c239", "value": "tt_httrack_fake_domains" }, - { - "description": "Dedola, G. (2020, August 20). Transparent Tribe: Evolution analysis, part 1. Retrieved September 2, 2021.", - "meta": { - "date_accessed": "2021-09-02T00:00:00Z", - "date_published": "2020-08-20T00:00:00Z", - "refs": [ - "https://securelist.com/transparent-tribe-part-1/98127/" - ], - "source": "MITRE, Tidal Cyber", - "title": "Transparent Tribe: Evolution analysis, part 1" - }, - "related": [], - "uuid": "42c7faa2-f664-4e4a-9d23-93c88a09da5b", - "value": "Kaspersky Transparent Tribe August 2020" - }, { "description": "Dedola, G. (2020, August 20). Transparent Tribe: Evolution analysis, part 1. Retrieved April 1, 2021.", "meta": { @@ -54730,6 +56881,21 @@ "uuid": "0db470b1-ab22-4b67-a858-472e4de7c6f0", "value": "Securelist Trasparent Tribe 2020" }, + { + "description": "Dedola, G. (2020, August 20). Transparent Tribe: Evolution analysis, part 1. Retrieved September 2, 2021.", + "meta": { + "date_accessed": "2021-09-02T00:00:00Z", + "date_published": "2020-08-20T00:00:00Z", + "refs": [ + "https://securelist.com/transparent-tribe-part-1/98127/" + ], + "source": "MITRE, Tidal Cyber", + "title": "Transparent Tribe: Evolution analysis, part 1" + }, + "related": [], + "uuid": "42c7faa2-f664-4e4a-9d23-93c88a09da5b", + "value": "Kaspersky Transparent Tribe August 2020" + }, { "description": "Microsoft. (2016, June 1). Transport agents. Retrieved June 24, 2019.", "meta": { @@ -54849,6 +57015,21 @@ "uuid": "5590bb5c-d9d1-480c-bb69-1944c1cf2431", "value": "Mandiant APT29 Trello" }, + { + "description": "Mandiant. (n.d.). Trending Evil Q1 2022. Retrieved May 18, 2023.", + "meta": { + "date_accessed": "2023-05-18T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://experience.mandiant.com/trending-evil/p/1" + ], + "source": "Tidal Cyber", + "title": "Trending Evil Q1 2022" + }, + "related": [], + "uuid": "5643a6d5-a660-4416-a4d9-6fd4d0da74ef", + "value": "Mandiant Trending Evil Q1 2022" + }, { "description": "Trend Micro. (n.d.). Retrieved February 16, 2024.", "meta": { @@ -55614,6 +57795,22 @@ "uuid": "43773784-92b8-4722-806c-4b1fc4278bb0", "value": "Invincea XTunnel" }, + { + "description": "Jan reilink. (2015, April 28). Tunnel RDP through SSH & PuTTY. Retrieved May 25, 2023.", + "meta": { + "date_accessed": "2023-05-25T00:00:00Z", + "date_published": "2015-04-28T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.saotn.org/tunnel-rdp-through-ssh/" + ], + "source": "Tidal Cyber", + "title": "Tunnel RDP through SSH & PuTTY" + }, + "related": [], + "uuid": "4fc8c559-c2a1-4834-914f-c66621b117c3", + "value": "Sysadmins of the North April 28 2015" + }, { "description": "Fidelis Threat Research Team. (2016, May 2). Turbo Twist: Two 64-bit Derusbi Strains Converge. Retrieved August 16, 2018.", "meta": { @@ -56062,6 +58259,22 @@ "uuid": "a2fa7fb8-ddba-44cf-878f-448fb2aa6149", "value": "GitHub Ultimate AppLocker Bypass List" }, + { + "description": "David Bradbury. (2023, November 3). Unauthorized Access to Okta's Support Case Management System: Root Cause and Remediation. Retrieved December 19, 2023.", + "meta": { + "date_accessed": "2023-12-19T00:00:00Z", + "date_published": "2023-11-03T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://sec.okta.com/articles/2023/11/unauthorized-access-oktas-support-case-management-system-root-cause" + ], + "source": "Tidal Cyber", + "title": "Unauthorized Access to Okta's Support Case Management System: Root Cause and Remediation" + }, + "related": [], + "uuid": "742d095c-9bd1-4f4a-8bc6-16db6d15a9f4", + "value": "Okta HAR Files RCA" + }, { "description": "UCF. (n.d.). Unauthorized accounts must not have the Create symbolic links user right.. Retrieved December 18, 2017.", "meta": { @@ -56106,6 +58319,38 @@ "uuid": "452ca091-42b1-5bef-8a01-921c1f46bbee", "value": "Mandiant APT29 Eye Spy Email Nov 22" }, + { + "description": "Mandiant. (2024, June 10). UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion . Retrieved June 13, 2024.", + "meta": { + "date_accessed": "2024-06-13T00:00:00Z", + "date_published": "2024-06-10T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://cloud.google.com/blog/topics/threat-intelligence/unc5537-snowflake-data-theft-extortion" + ], + "source": "Tidal Cyber", + "title": "UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion" + }, + "related": [], + "uuid": "0afe3662-b55c-4189-9c9a-2be55a9b6a70", + "value": "Google Cloud June 10 2024" + }, + { + "description": "Ryan Tomcik, Rufus Brown, Josh Fleischer. (2023, March 23). UNC961 in the Multiverse of Mandiant: Three Encounters with a Financially Motivated Threat Actor. Retrieved November 1, 2023.", + "meta": { + "date_accessed": "2023-11-01T00:00:00Z", + "date_published": "2023-03-23T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.mandiant.com/resources/blog/unc961-multiverse-financially-motivated" + ], + "source": "Tidal Cyber", + "title": "UNC961 in the Multiverse of Mandiant: Three Encounters with a Financially Motivated Threat Actor" + }, + "related": [], + "uuid": "cef19ceb-179f-4d49-acba-5ce40ab9f65e", + "value": "Mandiant UNC961 March 23 2023" + }, { "description": "Lunghi, D. et al. (2020, February). Uncovering DRBControl. Retrieved November 12, 2021.", "meta": { @@ -56166,6 +58411,38 @@ "uuid": "f63b099d-a316-42a1-b1ce-17f11d0f3d2e", "value": "Juniper DAI 2020" }, + { + "description": "Emre Güler Threat Researcher. (2023, September 1). Understanding BumbleBee Loader The Delivery. Retrieved February 19, 2024.", + "meta": { + "date_accessed": "2024-02-19T00:00:00Z", + "date_published": "2023-09-01T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.vmray.com/cyber-security-blog/understanding-bumblebee-loader-the-delivery/" + ], + "source": "Tidal Cyber", + "title": "Understanding BumbleBee Loader The Delivery" + }, + "related": [], + "uuid": "ce1bddab-f63b-400f-ba49-0a06c4f5066a", + "value": "Understanding BumbleBee Loader The Delivery - VMRay 9 1 2023" + }, + { + "description": "Emre Güler Threat Researcher. (2023, September 1). Understanding BumbleBee The malicious behavior. Retrieved February 19, 2024.", + "meta": { + "date_accessed": "2024-02-19T00:00:00Z", + "date_published": "2023-09-01T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.vmray.com/cyber-security-blog/understanding-bumblebee-the-malicious-behavior/" + ], + "source": "Tidal Cyber", + "title": "Understanding BumbleBee The malicious behavior" + }, + "related": [], + "uuid": "b0bedc26-d075-448e-9adc-741c047a851c", + "value": "Understanding BumbleBee The malicious behavior - VMRay 9 1 2023" + }, { "description": "Google Cloud. (2022, March 31). Understanding policies. Retrieved April 1, 2022.", "meta": { @@ -56225,6 +58502,22 @@ "uuid": "84eb3d8a-f6b1-4bb5-9411-2c8da29b5946", "value": "Auth0 Understanding Refresh Tokens" }, + { + "description": "Team Huntress. (2024, February 19). Understanding the ConnectWise ScreenConnect CVE-2024-1709 & CVE-2024-1708 . Retrieved February 22, 2024.", + "meta": { + "date_accessed": "2024-02-22T00:00:00Z", + "date_published": "2024-02-19T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass" + ], + "source": "Tidal Cyber", + "title": "Understanding the ConnectWise ScreenConnect CVE-2024-1709 & CVE-2024-1708" + }, + "related": [], + "uuid": "8d08b5e2-13ed-4283-8bd2-f3d9a5d02bc5", + "value": "Huntress ScreenConnect 2 19 2024" + }, { "description": "baeldung. (2022, April 8). Understanding the Linux /proc/id/maps File. Retrieved March 31, 2023.", "meta": { @@ -56408,6 +58701,22 @@ "uuid": "b251ed65-a145-4053-9dc2-bf0dad83d76c", "value": "Adsecurity Mimikatz Guide" }, + { + "description": "Mov Eax. (2023, July 23). Unpacking Emotet Trojan. Retrieved February 27, 2024.", + "meta": { + "date_accessed": "2024-02-27T00:00:00Z", + "date_published": "2023-07-23T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://infosecwriteups.com/unpacking-emotet-trojan-dac7e6119a0a" + ], + "source": "Tidal Cyber", + "title": "Unpacking Emotet Trojan" + }, + "related": [], + "uuid": "684835bb-7d67-440d-82c2-5f98c3e29341", + "value": "InfoSec Write-ups 7 23 2023" + }, { "description": "Cybleinc. (2023, May 10). Unraveling Akira Ransomware. Retrieved February 27, 2024.", "meta": { @@ -56545,6 +58854,22 @@ "uuid": "df4b99f3-1796-57b3-a352-37be5380badc", "value": "Orange Residential Proxies" }, + { + "description": "The DFIR Report. (2023, January 9). Unwrapping Ursnifs Gifts. Retrieved May 10, 2023.", + "meta": { + "date_accessed": "2023-05-10T00:00:00Z", + "date_published": "2023-01-09T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://thedfirreport.com/2023/01/09/unwrapping-ursnifs-gifts/" + ], + "source": "Tidal Cyber", + "title": "Unwrapping Ursnifs Gifts" + }, + "related": [], + "uuid": "0c017bf7-0ec7-4e45-8c20-7db284c4a51e", + "value": "The DFIR Report Ursnif January 2023" + }, { "description": "Rapid7. (2013, August 26). Upcoming G20 Summit Fuels Espionage Operations. Retrieved March 6, 2017.", "meta": { @@ -56757,6 +59082,22 @@ "uuid": "d02287df-9d93-4cbe-8e59-8f4ef3debc65", "value": "TrendMicro Ursnif Mar 2015" }, + { + "description": "Proofpoint. (2016, August 29). Ursnif Variant Dreambot Adds Tor Functionality | Proofpoint. Retrieved May 11, 2023.", + "meta": { + "date_accessed": "2023-05-11T00:00:00Z", + "date_published": "2016-08-29T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.proofpoint.com/us/threat-insight/post/ursnif-variant-dreambot-adds-tor-functionality" + ], + "source": "Tidal Cyber", + "title": "Ursnif Variant Dreambot Adds Tor Functionality | Proofpoint" + }, + "related": [], + "uuid": "f05ecd1b-7844-4920-8c3a-0b30ff126ac9", + "value": "Proofpoint August 29 2016" + }, { "description": "US Coast Guard Cyber Command. (2022, August 17). US Coast Guard Cyber Command Maritime Cyber Alert 03-22. Retrieved October 9, 2023.", "meta": { @@ -57255,21 +59596,6 @@ "uuid": "32a30a3f-3ed1-4def-86b1-f40bbffa1cc5", "value": "Microsoft SMB Packet Signing" }, - { - "description": "Microsoft. (2012, June 27). Using Software Restriction Policies and AppLocker Policies. Retrieved April 7, 2016.", - "meta": { - "date_accessed": "2016-04-07T00:00:00Z", - "date_published": "2012-06-27T00:00:00Z", - "refs": [ - "https://technet.microsoft.com/en-us/library/ee791851.aspx" - ], - "source": "MITRE", - "title": "Using Software Restriction Policies and AppLocker Policies" - }, - "related": [], - "uuid": "84e1c53f-e858-4106-9c14-1b536d5b56f9", - "value": "TechNet Applocker vs SRP" - }, { "description": "Microsoft. (2012, June 27). Using Software Restriction Policies and AppLocker Policies. Retrieved April 7, 2016.", "meta": { @@ -57285,6 +59611,21 @@ "uuid": "774e6598-0926-4adb-890f-00824de07ae0", "value": "Microsoft Using Software Restriction" }, + { + "description": "Microsoft. (2012, June 27). Using Software Restriction Policies and AppLocker Policies. Retrieved April 7, 2016.", + "meta": { + "date_accessed": "2016-04-07T00:00:00Z", + "date_published": "2012-06-27T00:00:00Z", + "refs": [ + "https://technet.microsoft.com/en-us/library/ee791851.aspx" + ], + "source": "MITRE", + "title": "Using Software Restriction Policies and AppLocker Policies" + }, + "related": [], + "uuid": "84e1c53f-e858-4106-9c14-1b536d5b56f9", + "value": "TechNet Applocker vs SRP" + }, { "description": "Jan Schaumann. (2015, November 5). Using the OS X Keychain to store and retrieve passwords. Retrieved March 31, 2022.", "meta": { @@ -57434,6 +59775,22 @@ "uuid": "722755a8-305f-4e37-8278-afb360836bec", "value": "Veil_Ref" }, + { + "description": "Health Sector Cybersecurity Coordination Center (HC3). (2022, November 9). Venus Ransomware Targets Publicly Exposed Remote Desktop Services. Retrieved May 19, 2023.", + "meta": { + "date_accessed": "2023-05-19T00:00:00Z", + "date_published": "2022-11-09T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.hhs.gov/sites/default/files/venus-ransomware-analyst-note.pdf" + ], + "source": "Tidal Cyber", + "title": "Venus Ransomware Targets Publicly Exposed Remote Desktop Services" + }, + "related": [], + "uuid": "bd6e6a59-3a73-48f6-84cd-e7c027c8671f", + "value": "HC3 Analyst Note Venus Ransomware November 2022" + }, { "description": "LOLBAS. (n.d.). Verclsid.exe. Retrieved August 10, 2020.", "meta": { @@ -57863,6 +60220,22 @@ "uuid": "90a5ab3c-c2a8-4b02-9bd7-628672907737", "value": "Offensive Security VNC Authentication Check" }, + { + "description": "Feike Hacquebord, Stephen Hilt, Fernando Merces, Lord Alfred Remorin. (2023, May 30). Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals. Retrieved June 4, 2023.", + "meta": { + "date_accessed": "2023-06-04T00:00:00Z", + "date_published": "2023-05-30T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.trendmicro.com/en_us/research/23/e/void-rabisu-s-use-of-romcom-backdoor-shows-a-growing-shift-in-th.html" + ], + "source": "Tidal Cyber", + "title": "Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals" + }, + "related": [], + "uuid": "5fd628ca-f366-4f0d-b493-8be19fa4dd4e", + "value": "Trend Micro Void Rabisu May 30 2023" + }, { "description": "Threat Intelligence and Research. (2015, March 30). VOLATILE CEDAR. Retrieved February 8, 2021.", "meta": { @@ -57893,6 +60266,22 @@ "uuid": "8b74f0b7-9719-598c-b3ee-61d734393e6f", "value": "Microsoft Volt Typhoon May 2023" }, + { + "description": "Microsoft Threat Intelligence. (2023, May 24). Volt Typhoon targets US critical infrastructure with living-off-the-land techniques. Retrieved May 25, 2023.", + "meta": { + "date_accessed": "2023-05-25T00:00:00Z", + "date_published": "2023-05-24T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/" + ], + "source": "Tidal Cyber", + "title": "Volt Typhoon targets US critical infrastructure with living-off-the-land techniques" + }, + "related": [], + "uuid": "2e94c44a-d2a7-4e56-ac8a-df315fc14ec1", + "value": "Microsoft Volt Typhoon May 24 2023" + }, { "description": "LOLBAS. (2023, July 12). VSDiagnostics.exe. Retrieved December 4, 2023.", "meta": { @@ -57989,21 +60378,6 @@ "uuid": "70c168a0-9ddf-408d-ba29-885c0c5c936a", "value": "vstest.console.exe - LOLBAS Project" }, - { - "description": "Kanthak, S.. (2016, July 20). Vulnerability and Exploit Detector. Retrieved February 3, 2017.", - "meta": { - "date_accessed": "2017-02-03T00:00:00Z", - "date_published": "2016-07-20T00:00:00Z", - "refs": [ - "https://skanthak.homepage.t-online.de/sentinel.html" - ], - "source": "MITRE", - "title": "Vulnerability and Exploit Detector" - }, - "related": [], - "uuid": "d63d6e14-8fe7-4893-a42f-3752eaec8770", - "value": "Vulnerability and Exploit Detector" - }, { "description": "Kanthak, S. (2016, July 20). Vulnerability and Exploit Detector. Retrieved February 3, 2017.", "meta": { @@ -58019,6 +60393,21 @@ "uuid": "94f99326-1512-47ca-8c99-9b382e4d0261", "value": "Kanthak Sentinel" }, + { + "description": "Kanthak, S.. (2016, July 20). Vulnerability and Exploit Detector. Retrieved February 3, 2017.", + "meta": { + "date_accessed": "2017-02-03T00:00:00Z", + "date_published": "2016-07-20T00:00:00Z", + "refs": [ + "https://skanthak.homepage.t-online.de/sentinel.html" + ], + "source": "MITRE", + "title": "Vulnerability and Exploit Detector" + }, + "related": [], + "uuid": "d63d6e14-8fe7-4893-a42f-3752eaec8770", + "value": "Vulnerability and Exploit Detector" + }, { "description": "CertiK. (2020, June 30). Vulnerability in Electron-based Application: Unintentionally Giving Malicious Code Room to Run. Retrieved March 7, 2024.", "meta": { @@ -58921,6 +61310,36 @@ "uuid": "fedb345f-b5a7-40cd-98c7-6b14bab95ed9", "value": "Microsoft - Azure AD Federation" }, + { + "description": "www.blackberry.com. (n.d.). What Is FormBook Malware?. Retrieved May 18, 2023.", + "meta": { + "date_accessed": "2023-05-18T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.blackberry.com/us/en/solutions/endpoint-security/ransomware-protection/formbook" + ], + "source": "Tidal Cyber", + "title": "What Is FormBook Malware?" + }, + "related": [], + "uuid": "d1f57ed6-8f44-46cc-afb7-53d9543f68ed", + "value": "What Is FormBook Malware?" + }, + { + "description": "Check Point Software. (n.d.). What is FormBook Malware? - Check Point Software. Retrieved May 18, 2023.", + "meta": { + "date_accessed": "2023-05-18T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.checkpoint.com/cyber-hub/threat-prevention/what-is-malware/what-is-formbook-malware/" + ], + "source": "Tidal Cyber", + "title": "What is FormBook Malware? - Check Point Software" + }, + "related": [], + "uuid": "c7670c6d-014b-4937-ac0f-9f2aec60e2d8", + "value": "What is FormBook Malware? - Check Point Software" + }, { "description": "grsecurity. (2017, December 12). What is grsecurity?. Retrieved December 20, 2017.", "meta": { @@ -58978,7 +61397,7 @@ }, "related": [], "uuid": "b4727044-51bb-43b3-afdb-515bb4bb0f7e", - "value": "Microsoft NET" + "value": "Microsoft NET - Duplicate" }, { "description": "Ciarniello, A. (2019, September 24). What is Pastebin and Why Do Hackers Love It?. Retrieved April 11, 2023.", @@ -59112,6 +61531,22 @@ "uuid": "4459076e-7c79-4855-9091-5aabd274f586", "value": "taxonomy_downgrade_att_tls" }, + { + "description": "Jakub Kaloč. (2023, July 6). What’s up with Emotet?. Retrieved February 27, 2024.", + "meta": { + "date_accessed": "2024-02-27T00:00:00Z", + "date_published": "2023-07-06T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.welivesecurity.com/2023/07/06/whats-up-with-emotet/" + ], + "source": "Tidal Cyber", + "title": "What’s up with Emotet?" + }, + "related": [], + "uuid": "d351b4a1-72b8-488d-a926-176c77ee9d1c", + "value": "ESET Emotet July 6 2023" + }, { "description": "Harbour, N. (2011, June 3). What the fxsst?. Retrieved November 17, 2020.", "meta": { @@ -59968,21 +62403,6 @@ "uuid": "20ec94d1-4a5c-43f5-bb65-f3ea965d2b6e", "value": "TechNet PowerShell" }, - { - "description": "McFarland, R. (2018, January 26). Windows Privilege Escalation Guide. Retrieved August 10, 2018.", - "meta": { - "date_accessed": "2018-08-10T00:00:00Z", - "date_published": "2018-01-26T00:00:00Z", - "refs": [ - "https://www.sploitspren.com/2018-01-26-Windows-Privilege-Escalation-Guide/" - ], - "source": "MITRE", - "title": "Windows Privilege Escalation Guide" - }, - "related": [], - "uuid": "c52945dc-eb20-4e69-8f8e-a262f33c244c", - "value": "SploitSpren Windows Priv Jan 2018" - }, { "description": "absolomb. (2018, January 26). Windows Privilege Escalation Guide. Retrieved August 10, 2018.", "meta": { @@ -59998,6 +62418,21 @@ "uuid": "185154f2-5f2e-48bf-b609-991e9d6a037b", "value": "Windows Privilege Escalation Guide" }, + { + "description": "McFarland, R. (2018, January 26). Windows Privilege Escalation Guide. Retrieved August 10, 2018.", + "meta": { + "date_accessed": "2018-08-10T00:00:00Z", + "date_published": "2018-01-26T00:00:00Z", + "refs": [ + "https://www.sploitspren.com/2018-01-26-Windows-Privilege-Escalation-Guide/" + ], + "source": "MITRE", + "title": "Windows Privilege Escalation Guide" + }, + "related": [], + "uuid": "c52945dc-eb20-4e69-8f8e-a262f33c244c", + "value": "SploitSpren Windows Priv Jan 2018" + }, { "description": "HackHappy. (2018, April 23). Windows Privilege Escalation – Unquoted Services. Retrieved August 10, 2018.", "meta": { @@ -60972,6 +63407,38 @@ "uuid": "b2900049-444a-4fe5-af1f-b9cd2cd9491c", "value": "gist Arch package compromise 10JUL2018" }, + { + "description": "Cybleinc. (2022, July 1). Xloader Returns with New Infection Technique. Retrieved May 7, 2023.", + "meta": { + "date_accessed": "2023-05-07T00:00:00Z", + "date_published": "2022-07-01T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://blog.cyble.com/2022/07/01/xloader-returns-with-new-infection-technique/" + ], + "source": "Tidal Cyber", + "title": "Xloader Returns with New Infection Technique" + }, + "related": [], + "uuid": "1b0e143a-3c5d-4445-9a99-8e42815130ac", + "value": "Cyble July 01 2022" + }, + { + "description": "Dinesh Devadoss; Phil Stokes. (2023, August 21). XLoader's Latest Trick . Retrieved January 1, 2024.", + "meta": { + "date_accessed": "2024-01-01T00:00:00Z", + "date_published": "2023-08-21T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.sentinelone.com/blog/xloaders-latest-trick-new-macos-variant-disguised-as-signed-officenote-app/" + ], + "source": "Tidal Cyber", + "title": "XLoader's Latest Trick" + }, + "related": [], + "uuid": "fc9b3eac-a638-4b84-92ae-591bc16a845e", + "value": "SentinelOne 8 21 2023" + }, { "description": "Remillano II, A., et al. (2020, June 20). XORDDoS, Kaiji Variants Target Exposed Docker Servers. Retrieved April 5, 2021.", "meta": { @@ -61047,6 +63514,22 @@ "uuid": "615d7744-327e-4f14-bce0-a16c352e7486", "value": "Linux kernel Yama" }, + { + "description": "RED CANARY INTELLIGENCE. (2022, June 7). Yellow Cockatoo: Search engine redirects, in-memory remote access trojan, and more. Retrieved May 10, 2023.", + "meta": { + "date_accessed": "2023-05-10T00:00:00Z", + "date_published": "2022-06-07T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://redcanary.com/blog/yellow-cockatoo/" + ], + "source": "Tidal Cyber", + "title": "Yellow Cockatoo: Search engine redirects, in-memory remote access trojan, and more" + }, + "related": [], + "uuid": "f97537c2-f080-4438-8728-4d2a91388132", + "value": "Red Canary Yellow Cockatoo June 2022" + }, { "description": "PwC Threat Intelligence. (2023, October 25). Yellow Liderc ships its scripts and delivers IMAPLoader malware. Retrieved March 29, 2024.", "meta": { @@ -61062,6 +63545,22 @@ "uuid": "b6544ea7-befa-53ae-95fa-5c227c848c46", "value": "PwC Yellow Liderc" }, + { + "description": "PwC Threat Intelligence. (2023, October 25). Yellow Liderc ships its scripts and delivers IMAPLoader malware. Retrieved October 25, 2023.", + "meta": { + "date_accessed": "2023-10-25T00:00:00Z", + "date_published": "2023-10-25T00:00:00Z", + "owner": "TidalCyberIan", + "refs": [ + "https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/yellow-liderc-ships-its-scripts-delivers-imaploader-malware.html" + ], + "source": "Tidal Cyber", + "title": "Yellow Liderc ships its scripts and delivers IMAPLoader malware" + }, + "related": [], + "uuid": "cbeaf9b5-865f-44a1-a913-9eec28d7a5ff", + "value": "PwC Yellow Liderc October 25 2023" + }, { "description": "Douglas Bienstock. (2022, August 18). You Can’t Audit Me: APT29 Continues Targeting Microsoft 365. Retrieved February 23, 2023.", "meta": { @@ -61272,5 +63771,5 @@ "value": "Sysdig Kinsing November 2020" } ], - "version": 1 + "version": 2 } diff --git a/clusters/tidal-software.json b/clusters/tidal-software.json index 53003865..d27482d3 100644 --- a/clusters/tidal-software.json +++ b/clusters/tidal-software.json @@ -96,11 +96,52 @@ { "dest-uuid": "33159d02-a1ce-49ec-a381-60b069db66f7", "type": "used-by" + }, + { + "dest-uuid": "e47b2958-b7c4-4fe1-a006-03137db91963", + "type": "used-by" + }, + { + "dest-uuid": "b07431f8-fcf0-4204-8e7c-138eb5cd5342", + "type": "used-by" + }, + { + "dest-uuid": "fac6fbf1-935f-4106-ad8b-c8fd8389dd38", + "type": "used-by" } ], "uuid": "4665e52b-3c5c-4a7f-9432-c89ef26f2c93", "value": "7-Zip" }, + { + "description": "The 8Base ransomware operation began claiming significant numbers of victims on its data leak site in June 2023, including organizations in a range of sectors. Researchers have observed considerable similarities between aspects of 8Base's operations and those of other ransomware groups, leading them to suspect that 8Base may be an evolution or offshoot of existing operations. The language in 8Base's ransom notes is similar to the language seen in RansomHouse's notes, and there is strong overlap between the code of Phobos ransomware and 8Base.[[VMWare 8Base June 28 2023](/references/573e9520-6181-4535-9ed3-2338688a8e9f)][[Acronis 8Base July 17 2023](/references/c9822477-1578-4068-9882-41e4d6eaee3f)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5299", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "562e535e-19f5-4d6c-81ed-ce2aec544f09", + "5e7433ad-a894-4489-93bc-41e90da90019", + "7e7b0c67-bb85-4996-a289-da0e792d7172", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "00b45c13-d165-44d0-ad6b-99787d2a7ce3", + "type": "used-by" + } + ], + "uuid": "88a5435f-5586-4cb4-a9c0-1961ee060a67", + "value": "8Base Ransomware" + }, { "description": "[AADInternals](https://app.tidalcyber.com/software/3d33fbf5-c21e-4587-ba31-9aeec3cc10c0) is a PowerShell-based framework for administering, enumerating, and exploiting Azure Active Directory. The tool is publicly available on GitHub.[[AADInternals Github](https://app.tidalcyber.com/references/643d3947-c0ec-47c4-bb58-5e546084433c)][[AADInternals Documentation](https://app.tidalcyber.com/references/320231a1-4dbe-4eaa-b14d-48de738ba697)]", "meta": { @@ -355,6 +396,10 @@ "dest-uuid": "6eb50f82-86cc-4eff-b1d1-66e1c6fd74f3", "type": "used-by" }, + { + "dest-uuid": "b07431f8-fcf0-4204-8e7c-138eb5cd5342", + "type": "used-by" + }, { "dest-uuid": "b3220638-6682-4a4e-ab64-e7dc4202a3f1", "type": "used-by" @@ -740,6 +785,8 @@ "software_attack_id": "S1025", "source": "MITRE", "tags": [ + "fa84181d-fd9a-4c7b-8e18-e47011993b5e", + "263adb48-051c-4384-90cf-1d4c937c3f05", "f8669b82-2194-49a9-8e20-92e7f9ab0a6f" ], "type": [ @@ -860,6 +907,10 @@ ] }, "related": [ + { + "dest-uuid": "ee2da206-2532-44e3-a343-d66e9bfdbca0", + "type": "used-by" + }, { "dest-uuid": "a2add2a0-2b54-4623-a380-a9ad91f1f2dd", "type": "used-by" @@ -896,9 +947,21 @@ "dest-uuid": "86b97a39-49c3-431e-bcc8-f4e13dbfcdf5", "type": "used-by" }, + { + "dest-uuid": "00b45c13-d165-44d0-ad6b-99787d2a7ce3", + "type": "used-by" + }, { "dest-uuid": "0fcb2205-e75b-46c9-ac54-00f218d5e331", "type": "used-by" + }, + { + "dest-uuid": "fac6fbf1-935f-4106-ad8b-c8fd8389dd38", + "type": "used-by" + }, + { + "dest-uuid": "7f52cadb-7a12-4b9d-9290-1ef02123fbe4", + "type": "used-by" } ], "uuid": "922447fd-f41e-4bcf-b479-88137c81099c", @@ -999,6 +1062,29 @@ "uuid": "1328ae5d-7220-46bb-a7ee-0c5a31eeda7f", "value": "Appvlp" }, + { + "description": "AresLoader is a loader malware distributed as malware-as-a-service. It has been observed being both dropped by and delivering SystemBC, a known ransomware precursor.[[New loader on the bloc - AresLoader | Intel471](/references/1bdd0957-1f5b-4323-bf49-f5c41b8c397a)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5286", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "a2e000da-8181-4327-bacd-32013dbd3654", + "84615fe0-c2a5-4e07-8957-78ebc29b4635", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [], + "uuid": "5bf1ed41-8fe5-4c4b-8d80-a55980289e1f", + "value": "AresLoader" + }, { "description": "[Aria-body](https://app.tidalcyber.com/software/7ba79887-d496-47aa-8b71-df7f46329322) is a custom backdoor that has been used by [Naikon](https://app.tidalcyber.com/groups/a80c00b2-b8b6-4780-99bb-df8fe921947d) since approximately 2017.[[CheckPoint Naikon May 2020](https://app.tidalcyber.com/references/f080acab-a6a0-42e1-98ff-45e415393648)]", "meta": { @@ -1147,6 +1233,9 @@ "software_attack_id": "S1087", "source": "MITRE", "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "f8669b82-2194-49a9-8e20-92e7f9ab0a6f", + "2feda37d-5579-4102-a073-aa02e82cb49f", "fdd53e62-5bf1-41f1-8bd6-b970a866c39d", "d431939f-2dc0-410b-83f7-86c458125444" ], @@ -1264,6 +1353,10 @@ "dest-uuid": "33159d02-a1ce-49ec-a381-60b069db66f7", "type": "used-by" }, + { + "dest-uuid": "3290dcb9-5781-4b87-8fa0-6ae820e152cd", + "type": "used-by" + }, { "dest-uuid": "d0f3353c-fbdd-4bd5-8793-a42e1f319b59", "type": "used-by" @@ -1280,6 +1373,27 @@ "uuid": "f8113a9f-a706-46df-8370-a9cef1c75f30", "value": "Atera Agent" }, + { + "description": "Atomic Stealer is an information-stealing malware (\"infostealer\") designed to harvest passwords, cookies, and other sensitive information from macOS systems. It is often delivered via malicious download sites promoted via malvertising.[[Malwarebytes 9 6 2023](/references/5f2f6a12-26c5-4c74-98ad-48b67379a716)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "macOS" + ], + "software_attack_id": "S5314", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [], + "uuid": "ce914eea-8db9-425b-8ae2-a56a264b4951", + "value": "Atomic Stealer" + }, { "description": "[Attor](https://app.tidalcyber.com/software/89c35e9f-b435-4f58-9073-f24c1ee8754f) is a Windows-based espionage platform that has been seen in use since 2013. [Attor](https://app.tidalcyber.com/software/89c35e9f-b435-4f58-9073-f24c1ee8754f) has a loadable plugin architecture to customize functionality for specific targets.[[ESET Attor Oct 2019](https://app.tidalcyber.com/references/fdd57c56-d989-4a6f-8cc5-5b3713605dec)]", "meta": { @@ -1576,6 +1690,9 @@ ], "software_attack_id": "S0093", "source": "MITRE", + "tags": [ + "3ed3f7a6-b446-4fbc-a433-ff1d63c0e647" + ], "type": [ "malware" ] @@ -1759,6 +1876,33 @@ "uuid": "10e76722-4b52-47f6-9276-70e95fecb26b", "value": "BadPatch" }, + { + "description": "BadPotato is an open-source software project that, according to its GitHub page, can be used for privilege escalation purposes.[[GitHub BeichenDream BadPotato](/references/e7f1d932-4bcd-4a78-b975-f4ebbce8c05e)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5304", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "ed2b3f47-3e07-4019-a9bf-ec9d87f28c96", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "b39d8eae-12e3-4903-a387-4c31d16a73b2", + "type": "used-by" + } + ], + "uuid": "4b59bf81-d351-436e-aebc-f0111a892395", + "value": "BadPotato" + }, { "description": "[Bad Rabbit](https://app.tidalcyber.com/software/a1d86d8f-fa48-43aa-9833-7355750e455c) is a self-propagating ransomware that affected the Ukrainian transportation sector in 2017. [Bad Rabbit](https://app.tidalcyber.com/software/a1d86d8f-fa48-43aa-9833-7355750e455c) has also targeted organizations and consumers in Russia. [[Secure List Bad Rabbit](https://app.tidalcyber.com/references/f4cec03a-ea94-4874-9bea-16189e967ff9)][[ESET Bad Rabbit](https://app.tidalcyber.com/references/a9664f01-78f0-4461-a757-12f54ec99a56)][[Dragos IT ICS Ransomware](https://app.tidalcyber.com/references/60187301-8d70-4023-8e6d-59cbb1468f0d)] ", "meta": { @@ -1768,6 +1912,7 @@ "software_attack_id": "S0606", "source": "MITRE", "tags": [ + "3ed3f7a6-b446-4fbc-a433-ff1d63c0e647", "5a463cb3-451d-47f7-93e4-1886150697ce", "5e7433ad-a894-4489-93bc-41e90da90019", "7e7b0c67-bb85-4996-a289-da0e792d7172" @@ -1794,6 +1939,8 @@ "software_attack_id": "S0234", "source": "MITRE", "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "2feda37d-5579-4102-a073-aa02e82cb49f", "f8669b82-2194-49a9-8e20-92e7f9ab0a6f" ], "type": [ @@ -2034,6 +2181,34 @@ "uuid": "a4fb341d-8010-433f-b8f1-a8781f961435", "value": "BianLian Ransomware (Backdoor)" }, + { + "description": "This Software object represents the custom Go encryptor tool (`encryptor.exe`) used during intrusions conducted by the BianLian Ransomware Group.[[U.S. CISA BianLian Ransomware May 2023](/references/aa52e826-f292-41f6-985d-0282230c8948)]. The tool will skip encryption of files based on a hardcoded file extension exclusion list.[[BianLian Ransomware Gang Gives It a Go! | [redacted]](/references/fc1aa979-7dbc-4fff-a8d1-b35a3b2bec3d)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5292", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "5e7433ad-a894-4489-93bc-41e90da90019", + "7e7b0c67-bb85-4996-a289-da0e792d7172", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "a2add2a0-2b54-4623-a380-a9ad91f1f2dd", + "type": "used-by" + } + ], + "uuid": "252f56c2-4c85-4a19-8451-371cb04c6ceb", + "value": "BianLian Ransomware (Encryptor)" + }, { "description": "[BISCUIT](https://app.tidalcyber.com/software/3ad98097-2d10-4aa1-9594-7e74828a3643) is a backdoor that has been used by [APT1](https://app.tidalcyber.com/groups/5307bba1-2674-4fbd-bfd5-1db1ae06fc5f) since as early as 2007. [[Mandiant APT1](https://app.tidalcyber.com/references/865eba93-cf6a-4e41-bc09-de9b0b3c2669)]", "meta": { @@ -2149,6 +2324,10 @@ "dest-uuid": "275ca7b0-3b21-4c3a-8b6f-57b6f0ffb6fb", "type": "used-by" }, + { + "dest-uuid": "b39d8eae-12e3-4903-a387-4c31d16a73b2", + "type": "used-by" + }, { "dest-uuid": "eadd78e3-3b5d-430a-b994-4360b172c871", "type": "used-by" @@ -2170,6 +2349,7 @@ "software_attack_id": "S1070", "source": "MITRE", "tags": [ + "89c5b94b-ecf4-4d53-9b74-3465086d4565", "d903e38b-600d-4736-9e3b-cf1a6e436481", "e551ae97-d1b4-484e-9267-89f33829ec2c", "d819ae1a-e385-49fd-88d5-f66660729ecb", @@ -2273,6 +2453,9 @@ ], "software_attack_id": "S0089", "source": "MITRE", + "tags": [ + "3ed3f7a6-b446-4fbc-a433-ff1d63c0e647" + ], "type": [ "malware" ] @@ -2286,6 +2469,29 @@ "uuid": "908216c7-3ad4-4e0c-9dd3-a7ed5d1c695f", "value": "BlackEnergy" }, + { + "description": "BlackLotus is a Unified Extensible Firmware Interface (UEFI) bootkit that enables bypass of Secure Boot, a UEFI feature that provides verification about the state of the boot chain, even on fully updated UEFI systems. It is considered the first “in-the-wild” UEFI bootkit, as it was observed for sale on underground forums in October 2022 and researchers were able to then confirm its existence. BlackLotus bypasses UEFI Secure Boot and establishes persistence by exploiting CVE-2022-21894, and after installation, it is designed to deploy a kernel driver for further persistence and an HTTP downloader, which allows communication with a command-and-control server and loading of additional user-mode or kernel-mode payloads. BlackLotus is also capable of disabling operating system security features, and some instances of the malware include a location-based check where it will terminate if the system uses a location associated with one of several Eastern European countries.[[ESET BlackLotus March 01 2023](/references/1a4c134b-c701-400f-beee-e6b3cc835042)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5306", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "1a5a32ac-1db6-46b1-b72e-18bc3d776aed", + "df78b317-ce5d-423c-ac42-1e328ab27ffd", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [], + "uuid": "4cd25fac-0b5d-44e2-8df1-2c7de06b4b39", + "value": "BlackLotus" + }, { "description": "[BlackMould](https://app.tidalcyber.com/software/da348a51-d047-4144-9ba4-34d2ce964a11) is a web shell based on [China Chopper](https://app.tidalcyber.com/software/723c5ab7-23ca-46f2-83bb-f1d1e550122c) for servers running Microsoft IIS. First reported in December 2019, it has been used in malicious campaigns by [GALLIUM](https://app.tidalcyber.com/groups/15ff1ce0-44f0-4f1d-a4ef-83444570e572) against telecommunication providers.[[Microsoft GALLIUM December 2019](https://app.tidalcyber.com/references/5bc76b47-ff68-4031-a347-f2dc0daba203)]", "meta": { @@ -2307,6 +2513,30 @@ "uuid": "da348a51-d047-4144-9ba4-34d2ce964a11", "value": "BlackMould" }, + { + "description": "BlackSuit is a ransomware capable of running on Windows and Linux systems. BlackSuit is believed to be a successor to Royal, a ransomware operation which itself derives from the notorious Russia-based Conti gang. BlackSuit operations were first observed in May 2023, and although they were relatively low in number, U.S. authorities issued a warning for healthcare sector organizations due to the ransomware's suspected pedigree.[[HC3 Analyst Note BlackSuit Ransomware November 2023](/references/d956f0c6-d90e-49e8-a64c-a46bfc177cc6)] The number of attacks claimed by BlackSuit operators increased notably in Q2 2024.[[GitHub ransomwatch](/references/62037959-58e4-475a-bb91-ff360d20c1d7)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Linux", + "Windows" + ], + "software_attack_id": "S5324", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "5e7433ad-a894-4489-93bc-41e90da90019", + "7e7b0c67-bb85-4996-a289-da0e792d7172", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [], + "uuid": "6e200813-4379-457b-9cce-2203bed4b072", + "value": "BlackSuit Ransomware" + }, { "description": "[BLINDINGCAN](https://app.tidalcyber.com/software/1af8ea81-40df-4fba-8d63-1858b8b31217) is a remote access Trojan that has been used by the North Korean government since at least early 2020 in cyber operations against defense, engineering, and government organizations in Western Europe and the US.[[US-CERT BLINDINGCAN Aug 2020](https://app.tidalcyber.com/references/0421788c-b807-4e19-897c-bfb4323feb16)][[NHS UK BLINDINGCAN Aug 2020](https://app.tidalcyber.com/references/acca4c89-acce-4916-88b6-f4dac7d8ab19)]", "meta": { @@ -2762,6 +2992,36 @@ "uuid": "7c03fb92-3cd8-4ce4-a1e0-75e47465e4bc", "value": "Cachedump" }, + { + "description": "This Software object reflects the TTPs associated with the CACTUS ransomware binary, a malware that researchers believe has been used since at least March 2023.[[Kroll CACTUS Ransomware May 10 2023](/references/f50de2f6-465f-4cae-a79c-cc135ebfee4f)] Other pre- and post-exploit TTPs associated with threat actors known to deploy CACTUS can be found in the separate dedicated Group object.", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5309", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "a2e000da-8181-4327-bacd-32013dbd3654", + "562e535e-19f5-4d6c-81ed-ce2aec544f09", + "5e7433ad-a894-4489-93bc-41e90da90019", + "7e7b0c67-bb85-4996-a289-da0e792d7172", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "fac6fbf1-935f-4106-ad8b-c8fd8389dd38", + "type": "used-by" + } + ], + "uuid": "ad51e7c6-7d3c-4c5d-a7e2-e50afb11a0ca", + "value": "CACTUS Ransomware" + }, { "description": "[CaddyWiper](https://app.tidalcyber.com/software/62d0ddcd-790d-4d2d-9d94-276f54b40cf0) is a destructive data wiper that has been used in attacks against organizations in Ukraine since at least March 2022.[[ESET CaddyWiper March 2022](https://app.tidalcyber.com/references/9fa97444-311f-40c1-8728-c5f91634c750)][[Cisco CaddyWiper March 2022](https://app.tidalcyber.com/references/88fc1f96-2d55-4c92-a929-234248490c30)]", "meta": { @@ -3228,6 +3488,14 @@ "dest-uuid": "d01abdb1-0378-4654-aa38-1a4a292703e2", "type": "used-by" }, + { + "dest-uuid": "b39d8eae-12e3-4903-a387-4c31d16a73b2", + "type": "used-by" + }, + { + "dest-uuid": "e47b2958-b7c4-4fe1-a006-03137db91963", + "type": "used-by" + }, { "dest-uuid": "646e35d2-75de-4c1d-8ad3-616d3e155c5e", "type": "used-by" @@ -3406,6 +3674,10 @@ "dest-uuid": "79be2f31-5626-425e-844c-fd9c99e38fe5", "type": "used-by" }, + { + "dest-uuid": "b39d8eae-12e3-4903-a387-4c31d16a73b2", + "type": "used-by" + }, { "dest-uuid": "e5b0da2b-12bc-4113-9459-9c51329c9ae0", "type": "used-by" @@ -3466,6 +3738,10 @@ { "dest-uuid": "86b97a39-49c3-431e-bcc8-f4e13dbfcdf5", "type": "used-by" + }, + { + "dest-uuid": "fac6fbf1-935f-4106-ad8b-c8fd8389dd38", + "type": "used-by" } ], "uuid": "bd2b2375-4f16-42b2-a862-959b5b41c2af", @@ -3644,6 +3920,8 @@ "software_attack_id": "S0611", "source": "MITRE", "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "2feda37d-5579-4102-a073-aa02e82cb49f", "562e535e-19f5-4d6c-81ed-ce2aec544f09", "b15c16f7-b8c7-4962-9acc-a98a39f87b69", "b18b5401-d88d-4f28-8f50-a884a5e58349", @@ -3664,11 +3942,40 @@ { "dest-uuid": "b3220638-6682-4a4e-ab64-e7dc4202a3f1", "type": "used-by" + }, + { + "dest-uuid": "4348c510-50fc-4448-ab8d-c8cededd19ff", + "type": "used-by" + }, + { + "dest-uuid": "ecdbd431-d62b-4b30-8663-b1ecb4304ec0", + "type": "used-by" } ], "uuid": "5321aa75-924c-47ae-b97a-b36f023abf2a", "value": "Clop" }, + { + "description": "CloudChat Infostealer is an information-stealing malware designed to harvest passwords, cookies, and other sensitive information from macOS systems.[[Kandji 4 8 2024](/references/f2e74613-f578-4408-bc76-144ec671808b)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "macOS" + ], + "software_attack_id": "S5316", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [], + "uuid": "7a57e81b-2453-4aaf-94ad-c007bd7105a2", + "value": "CloudChat Infostealer" + }, { "description": "[CloudDuke](https://app.tidalcyber.com/software/b3dd424b-ee96-449c-aa52-abbc7d4dfb86) is malware that was used by [APT29](https://app.tidalcyber.com/groups/4c3e48b9-4426-4271-a7af-c3dfad79f447) in 2015. [[F-Secure The Dukes](https://app.tidalcyber.com/references/cc0dc623-ceb5-4ac6-bfbb-4f8514d45a27)] [[Securelist Minidionis July 2015](https://app.tidalcyber.com/references/af40a05e-02fb-4943-b3ff-9a292679e93d)]", "meta": { @@ -3981,6 +4288,10 @@ "dest-uuid": "ca93af75-0ffa-4df4-b86a-92d4d50e496e", "type": "used-by" }, + { + "dest-uuid": "ee2da206-2532-44e3-a343-d66e9bfdbca0", + "type": "used-by" + }, { "dest-uuid": "4a4641b1-7686-49da-8d83-00d8013f4b47", "type": "used-by" @@ -4025,6 +4336,10 @@ "dest-uuid": "393da13e-016c-41a3-9d89-b33173adecbf", "type": "used-by" }, + { + "dest-uuid": "ecdbd431-d62b-4b30-8663-b1ecb4304ec0", + "type": "used-by" + }, { "dest-uuid": "0898e7cb-118e-5eeb-b856-04e56ed18182", "type": "used-by" @@ -4069,6 +4384,10 @@ "dest-uuid": "33159d02-a1ce-49ec-a381-60b069db66f7", "type": "used-by" }, + { + "dest-uuid": "fac6fbf1-935f-4106-ad8b-c8fd8389dd38", + "type": "used-by" + }, { "dest-uuid": "eadd78e3-3b5d-430a-b994-4360b172c871", "type": "used-by" @@ -4296,6 +4615,9 @@ ], "software_attack_id": "S0608", "source": "MITRE", + "tags": [ + "3ed3f7a6-b446-4fbc-a433-ff1d63c0e647" + ], "type": [ "malware" ] @@ -4379,6 +4701,10 @@ ] }, "related": [ + { + "dest-uuid": "ee2da206-2532-44e3-a343-d66e9bfdbca0", + "type": "used-by" + }, { "dest-uuid": "7f52cadb-7a12-4b9d-9290-1ef02123fbe4", "type": "used-by" @@ -4412,6 +4738,7 @@ "software_attack_id": "S0575", "source": "MITRE", "tags": [ + "89c5b94b-ecf4-4d53-9b74-3465086d4565", "562e535e-19f5-4d6c-81ed-ce2aec544f09", "0ed7d10c-c65b-4174-9edb-446bf301d250", "3d90eed2-862d-4f61-8c8f-0b8da3e45af0", @@ -4939,6 +5266,7 @@ "software_attack_id": "S0625", "source": "MITRE", "tags": [ + "89c5b94b-ecf4-4d53-9b74-3465086d4565", "562e535e-19f5-4d6c-81ed-ce2aec544f09", "4bc9ab8f-7f57-4b1a-8857-ffaa7e5cc930", "17864218-bc4f-4564-8abf-97c988eea9f7", @@ -4956,7 +5284,16 @@ "malware" ] }, - "related": [], + "related": [ + { + "dest-uuid": "5216ac81-da4c-4b87-86ce-b90a651f1048", + "type": "used-by" + }, + { + "dest-uuid": "c2015888-72c0-4367-b2cf-df85688a56b7", + "type": "used-by" + } + ], "uuid": "095064c6-144e-4935-b878-f82151bc08e4", "value": "Cuba" }, @@ -5108,6 +5445,31 @@ } ], "uuid": "39d81c48-8f7c-54cb-8fac-485598e31a55", + "value": "DarkGate - Duplicate" + }, + { + "description": "*Operationalize this intelligence by pivoting to relevant defensive resources via the Techniques below. Alternatively, use the **Add to Matrix** button above, then overlay entire sets of capabilities from your own defensive stack to identify threat overlaps & potential gaps (watch a [60-second tutorial here](https://www.youtube.com/watch?v=4jBo3XLO01E)).*\n\nDarkGate is a commodity downloader. Researchers have often observed DarkGate samples making use of legitimate copies of AutoIt, a freeware BASIC-like scripting language, using it to run AutoIt scripts as part of its execution chain. Reports of DarkGate infections surged following the announcement of the disruption of the QakBot botnet by international authorities in late August 2023.[[Bleeping Computer DarkGate October 14 2023](/references/313e5558-d8f9-4457-9004-810d9fa5340c)] The delivery of DarkGate payloads via instant messaging platforms including Microsoft Teams and Skype was reported in September and October 2023.[[DarkGate Loader delivered via Teams - Truesec](/references/4222a06f-9528-4076-8037-a27012c2930c)][[Trend Micro DarkGate October 12 2023](/references/81650f5b-628b-4e76-80d6-2c15cf70d37a)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5266", + "source": "Tidal Cyber", + "tags": [ + "84615fe0-c2a5-4e07-8957-78ebc29b4635" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "28f3dbcc-b248-442f-9ff3-234210bb2f2a", + "type": "used-by" + } + ], + "uuid": "7144b703-f471-4bde-bedc-e8b274854de5", "value": "DarkGate" }, { @@ -5188,6 +5550,28 @@ "uuid": "dd555a4c-3b04-48c1-988f-d530d699a5bf", "value": "DataSvcUtil" }, + { + "description": "DBatLoader is a malware used for downloading/dropping purposes.", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5287", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "84615fe0-c2a5-4e07-8957-78ebc29b4635", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [], + "uuid": "789791b7-1ea1-4b18-8253-4663bb7ec143", + "value": "DBatLoader" + }, { "description": "[DCSrv](https://app.tidalcyber.com/software/26ae3cd1-6710-4807-b674-957bd67d3e76) is destructive malware that has been used by [Moses Staff](https://app.tidalcyber.com/groups/a41725c5-eb3a-4772-8d1e-17c3bbade79c) since at least September 2021. Though [DCSrv](https://app.tidalcyber.com/software/26ae3cd1-6710-4807-b674-957bd67d3e76) has ransomware-like capabilities, [Moses Staff](https://app.tidalcyber.com/groups/a41725c5-eb3a-4772-8d1e-17c3bbade79c) does not demand ransom or offer a decryption key.[[Checkpoint MosesStaff Nov 2021](https://app.tidalcyber.com/references/d6da2849-cff0-408a-9f09-81a33fc88a56)]", "meta": { @@ -5375,6 +5759,29 @@ "uuid": "df4002d2-f557-4f95-af7a-9a4582fb7068", "value": "Denis" }, + { + "description": "Denonia is described as \"the first malware specifically targeting Lambda\", the AWS serverless computing platform. Early samples appeared to possess cryptomining capabilities, but researchers believe Denonia could be used to carry out other types of activities as well.[[Cado Denonia April 3 2022](/references/b276c28d-1488-4a21-86d1-7acdfd77794b)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "IaaS" + ], + "software_attack_id": "S5313", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "2e5f6e4a-4579-46f7-9997-6923180815dd", + "8d95e4d6-9a1e-4920-9f5c-83d9fe07a66e", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [], + "uuid": "3c14ea0a-c85f-41b3-acd0-15d2565e3e07", + "value": "Denonia" + }, { "description": "[Derusbi](https://app.tidalcyber.com/software/9222aa77-922e-43c7-89ad-71067c428fb2) is malware used by multiple Chinese APT groups.[[Novetta-Axiom](https://app.tidalcyber.com/references/0dd428b9-849b-4108-87b1-20050b86f420)][[ThreatConnect Anthem](https://app.tidalcyber.com/references/61ecd0b4-6cac-4d9f-8e8c-3d488fef6fec)] Both Windows and Linux variants have been observed.[[Fidelis Turbo](https://app.tidalcyber.com/references/f19877f1-3e0f-4c68-b6c9-ef5b0bd470ed)]", "meta": { @@ -6190,6 +6597,9 @@ ], "software_attack_id": "S0038", "source": "MITRE", + "tags": [ + "3ed3f7a6-b446-4fbc-a433-ff1d63c0e647" + ], "type": [ "malware" ] @@ -6399,6 +6809,7 @@ "software_attack_id": "S0605", "source": "MITRE", "tags": [ + "3ed3f7a6-b446-4fbc-a433-ff1d63c0e647", "5e7433ad-a894-4489-93bc-41e90da90019", "7e7b0c67-bb85-4996-a289-da0e792d7172" ], @@ -6561,6 +6972,10 @@ "dest-uuid": "713e2963-fbf4-406f-a8cf-6a4489d90439", "type": "used-by" }, + { + "dest-uuid": "6eb50f82-86cc-4eff-b1d1-66e1c6fd74f3", + "type": "used-by" + }, { "dest-uuid": "2e2d3e75-1160-4ba5-80cc-8e7685fcfc44", "type": "used-by" @@ -7060,6 +7475,34 @@ "uuid": "8c64a330-1457-4c32-ab2f-12b6eb37d607", "value": "FakeM" }, + { + "description": "FakePenny is a ransomware, which includes both a loader and an encryptor, that is believed to have been developed by the North Korean threat actor Moonstone Sleet.[[Microsoft Security Blog 5 28 2024](/references/faf315ed-71f7-4e29-8334-701da35a69ad)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5321", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "5e7433ad-a894-4489-93bc-41e90da90019", + "7e7b0c67-bb85-4996-a289-da0e792d7172", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "3b8a2c50-5d8e-49b4-bd50-10ae66ca6c72", + "type": "used-by" + } + ], + "uuid": "acbff463-ba1c-4d26-ab99-b9aa47b81c68", + "value": "FakePenny" + }, { "description": "[FALLCHILL](https://app.tidalcyber.com/software/ea47f1fd-0171-4254-8c92-92b7a5eec5e1) is a RAT that has been used by [Lazarus Group](https://app.tidalcyber.com/groups/0bc66e95-de93-4de7-b415-4041b7191f08) since at least 2016 to target the aerospace, telecommunications, and finance industries. It is usually dropped by other [Lazarus Group](https://app.tidalcyber.com/groups/0bc66e95-de93-4de7-b415-4041b7191f08) malware or delivered when a victim unknowingly visits a compromised website. [[US-CERT FALLCHILL Nov 2017](https://app.tidalcyber.com/references/045e03f9-af83-4442-b69e-b80f68e570ac)]", "meta": { @@ -7385,6 +7828,9 @@ ], "software_attack_id": "S0143", "source": "MITRE", + "tags": [ + "3ed3f7a6-b446-4fbc-a433-ff1d63c0e647" + ], "type": [ "malware" ] @@ -7464,6 +7910,14 @@ { "dest-uuid": "b3220638-6682-4a4e-ab64-e7dc4202a3f1", "type": "used-by" + }, + { + "dest-uuid": "ecdbd431-d62b-4b30-8663-b1ecb4304ec0", + "type": "used-by" + }, + { + "dest-uuid": "eb10ed9e-ea8d-4b61-bfc3-5994d30970df", + "type": "used-by" } ], "uuid": "c558e948-c817-4494-a95d-ad3207f10e26", @@ -7594,6 +8048,28 @@ "uuid": "c6dc67a6-587d-4700-a7de-bee043a0031a", "value": "Forfiles" }, + { + "description": "Formbook is an information-stealing malware, discovered in 2016, that is capable of stealing data entered into HTML website forms and logging keystrokes and also acting as a downloader for other malware.[[What Is FormBook Malware?](/references/d1f57ed6-8f44-46cc-afb7-53d9543f68ed)][[What is FormBook Malware? - Check Point Software](/references/c7670c6d-014b-4937-ac0f-9f2aec60e2d8)] xLoader is a JavaScript-based, cross-platform Formbook variant discovered in 2020 that is crafted to infect macOS as well as Windows systems. Check Point Research's 2022 Mid-Year Report released in August 2022 placed Formbook as the \"most prevalent\" infostealer malware globally (and second-most prevalent of all malware types globally, behind only Emotet).[[Check Point Mid-Year Report 2022](/references/e929cd86-9903-481c-a841-ba387831cb77)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5288", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "84615fe0-c2a5-4e07-8957-78ebc29b4635", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [], + "uuid": "376d1383-17a7-48b0-8a8b-d6142b2f3003", + "value": "Formbook" + }, { "description": "[FRAMESTING](https://app.tidalcyber.com/software/83721b89-df58-50bf-be2a-0b696fb0da78) is a Python web shell that was used during [Cutting Edge](https://app.tidalcyber.com/campaigns/4e605e33-57fe-5bb2-b0ad-ec146aac041b) to embed into an Ivanti Connect Secure Python package for command execution.[[Mandiant Cutting Edge Part 2 January 2024](https://app.tidalcyber.com/references/5209d259-4293-58c0-bbdc-f30ff77d57f7)]", "meta": { @@ -8220,6 +8696,56 @@ "uuid": "a75855fd-2b6b-43d8-99a5-2be03b544f34", "value": "Goopy" }, + { + "description": "GooseEgg is a custom tool developed by Russian espionage group Forest Blizzard that is designed for privilege escalation and credential access purposes. GooseEgg exploits CVE-2022-38028, a vulnerability in the Windows Print Spooler service. Researchers describe the tool as a \"simple\" launcher application, but a range of subsequent post-exploitation actions are possible, including remote code execution, backdoor deployment, and lateral movement within the compromised network.[[Microsoft Security Blog 4 22 2024](/references/050ff793-d81d-499f-a136-905e76bce321)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5318", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "dcd6d78a-50e9-4fbd-a36a-06fbe6b7b40c", + "7de7d799-f836-4555-97a4-0db776eb6932", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "5b1a5b9e-4722-41fc-a15d-196a549e3ac5", + "type": "used-by" + } + ], + "uuid": "f9c32a11-964c-4480-968b-e520b8c7b26e", + "value": "GooseEgg" + }, + { + "description": "Gootloader is a highly active banking Trojan-turned-loader malware that has attacked organizations in a wide range of verticals and countries. Gootloader, also referred to by its related payload, Gootkit, first emerged in 2014 but has been especially active since 2020. In the past two years alone, verticals including finance, healthcare, defense, pharmaceutical, energy, & automotive have faced Gootloader campaigns, with victims across North America, Western Europe, & South Korea, and the malware is regularly used to deliver high-impact payloads, including Cobalt Strike, IcedID (a common ransomware precursor), & more. Cybereason indicates the financial & healthcare sectors are especially impacted.[[Cybereason Gootloader February 2023](/references/098bf58f-3868-4892-bb4d-c78ce8817a02)] Red Canary & The DFIR Report provide tool-agnostic suggested detection logic for key behaviors observed during recent Gootloader campaigns.[[Red Canary Gootloader April 2023](/references/658e3a1a-2f68-4e84-8dab-43e48766703e)][[DFIR Report Gootloader](/references/aa12dc30-ba81-46c5-b412-ca4a01e72d7f)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5289", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "84615fe0-c2a5-4e07-8957-78ebc29b4635", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [], + "uuid": "3eec857e-dce3-4865-a65f-3ad5a559a3e6", + "value": "Gootloader" + }, { "description": "This object contains information sourced from the [Living Off The Land Binaries, Scripts and Libraries (LOLBAS)](https://github.com/LOLBAS-Project/LOLBAS) project, which is licensed under [GNU General Public License v3.0](https://github.com/LOLBAS-Project/LOLBAS/blob/master/LICENSE).\n\n**Description:** Used by group policy to process scripts\n\n**Author:** Oddvar Moe\n\n**Paths:**\n* C:\\Windows\\System32\\gpscript.exe\n* C:\\Windows\\SysWOW64\\gpscript.exe\n\n**Resources:**\n* [https://oddvar.moe/2018/04/27/gpscript-exe-another-lolbin-to-the-list/](https://oddvar.moe/2018/04/27/gpscript-exe-another-lolbin-to-the-list/)\n\n**Detection:**\n* Sigma: [proc_creation_win_lolbin_gpscript.yml](https://github.com/SigmaHQ/sigma/blob/c04bef2fbbe8beff6c7620d5d7ea6872dbe7acba/rules/windows/process_creation/proc_creation_win_lolbin_gpscript.yml)\n* IOC: Scripts added in local group policy\n* IOC: Execution of Gpscript.exe after logon[[Gpscript.exe - LOLBAS Project](/references/619f57d9-d93b-4e9b-aae0-6ce89d91deb6)]", "meta": { @@ -8400,6 +8926,9 @@ ], "software_attack_id": "S5079", "source": "Tidal Cyber", + "tags": [ + "4d767e87-4cf6-438a-927a-43d2d0beaab7" + ], "type": [ "malware" ] @@ -8462,6 +8991,8 @@ "software_attack_id": "S0561", "source": "MITRE", "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "2feda37d-5579-4102-a073-aa02e82cb49f", "84615fe0-c2a5-4e07-8957-78ebc29b4635" ], "type": [ @@ -9365,6 +9896,33 @@ "uuid": "492104c0-79d6-461e-9dc5-0e4bfd3f2387", "value": "Ilasm" }, + { + "description": "IMAPLoader is a .NET downloader that uses email-based channels for command and control communication. It is believed to be developed and used by Yellow Liderc a threat actor group based in Iran and aligned with the Iranian Islamic Revolutionary Guard Corp (IRGC). IMAPLoader is delivered via drive-by compromises and phishing attacks.[[PwC Yellow Liderc October 25 2023](/references/cbeaf9b5-865f-44a1-a913-9eec28d7a5ff)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5308", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "84615fe0-c2a5-4e07-8957-78ebc29b4635", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "9e8620c4-a560-4081-aefc-118c7ec3fc22", + "type": "used-by" + } + ], + "uuid": "0832ffda-240a-4455-a53b-71b2683bea09", + "value": "IMAPLoader" + }, { "description": "This object contains information sourced from the [Living Off The Land Binaries, Scripts and Libraries (LOLBAS)](https://github.com/LOLBAS-Project/LOLBAS) project, which is licensed under [GNU General Public License v3.0](https://github.com/LOLBAS-Project/LOLBAS/blob/master/LICENSE).\n\n**Description:** Microsoft IME Open Extended Dictionary Module\n\n**Author:** Wade Hickey\n\n**Paths:**\n* C:\\Windows\\System32\\IME\\SHARED\\IMEWDBLD.exe\n\n**Resources:**\n* [https://twitter.com/notwhickey/status/1367493406835040265](https://twitter.com/notwhickey/status/1367493406835040265)\n\n**Detection:**\n* Sigma: [net_connection_win_imewdbld.yml](https://github.com/SigmaHQ/sigma/blob/bea6f18d350d9c9fdc067f93dde0e9b11cc22dc2/rules/windows/network_connection/net_connection_win_imewdbld.yml)[[IMEWDBLD.exe - LOLBAS Project](/references/9d1d6bc1-61cf-4465-b3cb-b6af36769027)]", "meta": { @@ -9476,10 +10034,22 @@ "dest-uuid": "b3061284-0335-4dcb-9f8e-a3b0412fd46f", "type": "used-by" }, + { + "dest-uuid": "ee2da206-2532-44e3-a343-d66e9bfdbca0", + "type": "used-by" + }, + { + "dest-uuid": "ecdbd431-d62b-4b30-8663-b1ecb4304ec0", + "type": "used-by" + }, { "dest-uuid": "d0f3353c-fbdd-4bd5-8793-a42e1f319b59", "type": "used-by" }, + { + "dest-uuid": "4348c510-50fc-4448-ab8d-c8cededd19ff", + "type": "used-by" + }, { "dest-uuid": "3d77fb6c-cfb4-5563-b0be-7aa1ad535337", "type": "used-by" @@ -9511,6 +10081,10 @@ { "dest-uuid": "570198e3-b59c-5772-b1ee-15d7ea14d48a", "type": "used-by" + }, + { + "dest-uuid": "7f52cadb-7a12-4b9d-9290-1ef02123fbe4", + "type": "used-by" } ], "uuid": "cf2c5666-e8ad-49c1-ac8f-30ed65f9e52c", @@ -9525,6 +10099,7 @@ "software_attack_id": "S0604", "source": "MITRE", "tags": [ + "3ed3f7a6-b446-4fbc-a433-ff1d63c0e647", "37dff778-95a6-4e51-a26a-1d399ef713be" ], "type": [ @@ -9546,6 +10121,7 @@ "software_attack_id": "S1072", "source": "MITRE", "tags": [ + "3ed3f7a6-b446-4fbc-a433-ff1d63c0e647", "37dff778-95a6-4e51-a26a-1d399ef713be" ], "type": [ @@ -9808,6 +10384,10 @@ "dest-uuid": "15ff1ce0-44f0-4f1d-a4ef-83444570e572", "type": "used-by" }, + { + "dest-uuid": "e47b2958-b7c4-4fe1-a006-03137db91963", + "type": "used-by" + }, { "dest-uuid": "4c3e48b9-4426-4271-a7af-c3dfad79f447", "type": "used-by" @@ -10086,6 +10666,33 @@ "uuid": "c67f3029-a26c-4752-b7f1-8e3369c2f79d", "value": "JSS Loader" }, + { + "description": "Juicy Potato is an open-source software project that, according to its GitHub page, can be used for privilege escalation purposes.[[GitHub ohpe Juicy Potato](/references/16d0dd05-763a-4503-aa88-c8867d8f202d)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5303", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "ed2b3f47-3e07-4019-a9bf-ec9d87f28c96", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "b39d8eae-12e3-4903-a387-4c31d16a73b2", + "type": "used-by" + } + ], + "uuid": "57e9c32b-a1fa-45bc-9a57-098834a2c356", + "value": "Juicy Potato" + }, { "description": "[KARAE](https://app.tidalcyber.com/software/ca883d21-97ca-420d-a66b-ef19a8355467) is a backdoor typically used by [APT37](https://app.tidalcyber.com/groups/013fdfdc-aa32-4779-8f6e-7920615cbf66) as first-stage malware. [[FireEye APT37 Feb 2018](https://app.tidalcyber.com/references/4d575c1a-4ff9-49ce-97cd-f9d0637c2271)]", "meta": { @@ -10323,6 +10930,7 @@ "software_attack_id": "S0607", "source": "MITRE", "tags": [ + "3ed3f7a6-b446-4fbc-a433-ff1d63c0e647", "5e7433ad-a894-4489-93bc-41e90da90019", "7e7b0c67-bb85-4996-a289-da0e792d7172" ], @@ -10739,7 +11347,12 @@ "malware" ] }, - "related": [], + "related": [ + { + "dest-uuid": "ecdbd431-d62b-4b30-8663-b1ecb4304ec0", + "type": "used-by" + } + ], "uuid": "d5d79a51-3756-40de-81cd-4dac172fbb74", "value": "LEMURLOOT" }, @@ -11080,6 +11693,7 @@ "software_attack_id": "S0372", "source": "MITRE", "tags": [ + "3ed3f7a6-b446-4fbc-a433-ff1d63c0e647", "5e7433ad-a894-4489-93bc-41e90da90019", "7e7b0c67-bb85-4996-a289-da0e792d7172" ], @@ -11663,6 +12277,33 @@ "uuid": "3c206491-45c0-4ff7-9f40-45f9aae4de64", "value": "Maze" }, + { + "description": "MBR Killer is a wiper malware observed during a May 2023 data theft and wiper campaign and a 2016 attack on Banco de Chile.[[The DFIR Report Truebot June 12 2023](/references/a6311a66-bb36-4cad-a98f-2b0b89aafa3d)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5297", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "2e621fc5-dea4-4cb9-987e-305845986cd3", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "ecdbd431-d62b-4b30-8663-b1ecb4304ec0", + "type": "used-by" + } + ], + "uuid": "fb879c66-92b1-4a43-8df8-987fc3bc1b1b", + "value": "MBR Killer" + }, { "description": "[MCMD](https://app.tidalcyber.com/software/939cbe39-5b63-4651-b0c0-85ac39cb9f0e) is a remote access tool that provides remote command shell capability used by [Dragonfly 2.0](https://app.tidalcyber.com/groups/).[[Secureworks MCMD July 2019](https://app.tidalcyber.com/references/f7364cfc-5a3b-4538-80d0-cae65f3c6592)]", "meta": { @@ -11823,6 +12464,10 @@ "dest-uuid": "d0f3353c-fbdd-4bd5-8793-a42e1f319b59", "type": "used-by" }, + { + "dest-uuid": "ecdbd431-d62b-4b30-8663-b1ecb4304ec0", + "type": "used-by" + }, { "dest-uuid": "3d77fb6c-cfb4-5563-b0be-7aa1ad535337", "type": "used-by" @@ -11928,6 +12573,8 @@ "software_attack_id": "S5050", "source": "Tidal Cyber", "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "2feda37d-5579-4102-a073-aa02e82cb49f", "ed2b3f47-3e07-4019-a9bf-ec9d87f28c96", "15787198-6c8b-4f79-bf50-258d55072fee", "e81ba503-60b0-4b64-8f20-ef93e7783796" @@ -11940,11 +12587,36 @@ { "dest-uuid": "33159d02-a1ce-49ec-a381-60b069db66f7", "type": "used-by" + }, + { + "dest-uuid": "b39d8eae-12e3-4903-a387-4c31d16a73b2", + "type": "used-by" } ], "uuid": "8d3b1150-8bb3-49a8-8266-7023e3c5e50a", "value": "Metasploit" }, + { + "description": "MetaStealer is an information-stealing malware (\"infostealer\") designed to harvest passwords, cookies, and other sensitive information from victim systems.[[SentinelOne 9 11 2023](/references/0d015be9-34ba-4c59-9cea-80b76ee89dd0)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "macOS" + ], + "software_attack_id": "S5315", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [], + "uuid": "e95281ef-a1b1-4da0-b7cc-fa0a9236a4fc", + "value": "MetaStealer" + }, { "description": "[Meteor](https://app.tidalcyber.com/software/ee07030e-ff50-404b-ad27-ab999fc1a23a) is a wiper that was used against Iranian government organizations, including Iranian Railways, the Ministry of Roads, and Urban Development systems, in July 2021. [Meteor](https://app.tidalcyber.com/software/ee07030e-ff50-404b-ad27-ab999fc1a23a) is likely a newer version of similar wipers called Stardust and Comet that were reportedly used by a group called \"Indra\" since at least 2019 against private companies in Syria.[[Check Point Meteor Aug 2021](https://app.tidalcyber.com/references/bb79207f-3ab4-4b86-8b1c-d587724efb7c)]", "meta": { @@ -12255,10 +12927,18 @@ "dest-uuid": "15ff1ce0-44f0-4f1d-a4ef-83444570e572", "type": "used-by" }, + { + "dest-uuid": "b39d8eae-12e3-4903-a387-4c31d16a73b2", + "type": "used-by" + }, { "dest-uuid": "33159d02-a1ce-49ec-a381-60b069db66f7", "type": "used-by" }, + { + "dest-uuid": "b07431f8-fcf0-4204-8e7c-138eb5cd5342", + "type": "used-by" + }, { "dest-uuid": "f2b31240-0b4a-4fa4-82a4-6bb00e146e75", "type": "used-by" @@ -13543,6 +14223,10 @@ "dest-uuid": "15ff1ce0-44f0-4f1d-a4ef-83444570e572", "type": "used-by" }, + { + "dest-uuid": "e47b2958-b7c4-4fe1-a006-03137db91963", + "type": "used-by" + }, { "dest-uuid": "eadd78e3-3b5d-430a-b994-4360b172c871", "type": "used-by" @@ -13665,6 +14349,10 @@ "dest-uuid": "a2add2a0-2b54-4623-a380-a9ad91f1f2dd", "type": "used-by" }, + { + "dest-uuid": "6eb50f82-86cc-4eff-b1d1-66e1c6fd74f3", + "type": "used-by" + }, { "dest-uuid": "472080b0-e3d4-4546-9272-c4359fe856e1", "type": "used-by" @@ -13767,6 +14455,41 @@ "uuid": "132fb908-9f13-4bcf-aa64-74cbc72f5491", "value": "netstat" }, + { + "description": "NetSupport is a legitimate utility that has been long-used for remote management and monitoring (RMM) purposes. In recent years, it has been heavily abused by threat actors for maintaining persistent remote access to victim systems.[[The DFIR Report NetSupport October 30 2023](/references/0436db31-42f0-47c1-b9a9-c6bb7c60a1ec)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "macOS", + "Linux", + "Windows" + ], + "software_attack_id": "S5320", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "e1af18e3-3224-4e4c-9d0f-533768474508", + "e727eaa6-ef41-4965-b93a-8ad0c51d0236", + "509a90c7-9ca9-4b23-bca2-cd38ef6a6207", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "tool" + ] + }, + "related": [ + { + "dest-uuid": "ee2da206-2532-44e3-a343-d66e9bfdbca0", + "type": "used-by" + }, + { + "dest-uuid": "7f52cadb-7a12-4b9d-9290-1ef02123fbe4", + "type": "used-by" + } + ], + "uuid": "96ecdb59-b047-4557-b2a7-c9712e8c903b", + "value": "NetSupport" + }, { "description": "[NetTraveler](https://app.tidalcyber.com/software/1b8f9cf9-db8f-437d-800e-5ddd090fe30d) is malware that has been used in multiple cyber espionage campaigns for basic surveillance of victims. The earliest known samples have timestamps back to 2005, and the largest number of observed samples were created between 2010 and 2013. [[Kaspersky NetTraveler](https://app.tidalcyber.com/references/a7d4b322-3710-436f-bd51-e5c258073dba)]", "meta": { @@ -13800,6 +14523,7 @@ "software_attack_id": "S0457", "source": "MITRE", "tags": [ + "89c5b94b-ecf4-4d53-9b74-3465086d4565", "562e535e-19f5-4d6c-81ed-ce2aec544f09", "242bc007-5ac5-4d96-8638-699a06d06d24", "e554bd60-5de3-4162-9ed3-66073ae9d6b3", @@ -14278,6 +15002,7 @@ "software_attack_id": "S0368", "source": "MITRE", "tags": [ + "3ed3f7a6-b446-4fbc-a433-ff1d63c0e647", "09de661e-60c4-43fb-bfef-df017215d1d8", "5a463cb3-451d-47f7-93e4-1886150697ce", "c2380542-36f2-4922-9ed2-80ced06645c9", @@ -14370,6 +15095,10 @@ { "dest-uuid": "fb93231d-2ae4-45da-9dea-4c372a11f322", "type": "used-by" + }, + { + "dest-uuid": "b07431f8-fcf0-4204-8e7c-138eb5cd5342", + "type": "used-by" } ], "uuid": "9af571bb-f3c7-434b-8187-3e4ceb0ec6fc", @@ -14658,6 +15387,9 @@ "software_attack_id": "S5273", "source": "Tidal Cyber", "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "509a90c7-9ca9-4b23-bca2-cd38ef6a6207", + "2feda37d-5579-4102-a073-aa02e82cb49f", "e1af18e3-3224-4e4c-9d0f-533768474508", "febea5b6-2ea2-402b-8bec-f3f5b3f73c59", "ed2b3f47-3e07-4019-a9bf-ec9d87f28c96" @@ -14667,6 +15399,10 @@ ] }, "related": [ + { + "dest-uuid": "ee2da206-2532-44e3-a343-d66e9bfdbca0", + "type": "used-by" + }, { "dest-uuid": "3d77fb6c-cfb4-5563-b0be-7aa1ad535337", "type": "used-by" @@ -14678,6 +15414,10 @@ { "dest-uuid": "4348c510-50fc-4448-ab8d-c8cededd19ff", "type": "used-by" + }, + { + "dest-uuid": "7f52cadb-7a12-4b9d-9290-1ef02123fbe4", + "type": "used-by" } ], "uuid": "5edec691-d2f1-4928-a12d-1ff59ba959a6", @@ -14912,6 +15652,10 @@ { "dest-uuid": "3d77fb6c-cfb4-5563-b0be-7aa1ad535337", "type": "used-by" + }, + { + "dest-uuid": "788ffbf6-1a36-481a-a504-bbcd9f907886", + "type": "used-by" } ], "uuid": "e90eb529-1665-5fd7-a44e-695715e4081b", @@ -15053,6 +15797,7 @@ "software_attack_id": "S0556", "source": "MITRE", "tags": [ + "562e535e-19f5-4d6c-81ed-ce2aec544f09", "5e7433ad-a894-4489-93bc-41e90da90019", "7e7b0c67-bb85-4996-a289-da0e792d7172" ], @@ -15247,6 +15992,10 @@ { "dest-uuid": "325c11be-e1ee-47db-afa6-44ac5d16f0e7", "type": "used-by" + }, + { + "dest-uuid": "788ffbf6-1a36-481a-a504-bbcd9f907886", + "type": "used-by" } ], "uuid": "52a19c73-2454-4893-8f84-8d05c37a9472", @@ -15345,6 +16094,34 @@ "uuid": "d7015696-0aa1-4c13-a0e6-b9d8e027dabf", "value": "Phobos Ransomware" }, + { + "description": "PhonyC2 is a command and control framework attributed to the MuddyWater group. Researchers believe the tool has existed since at least 2021 and has been regularly updated since that time. PhonyC2 is believed to have been used in a 2023 attack on an institute of technology in Israel, as well as in a MuddyWater campaign beginning in May 2023 that featured exploitation of a vulnerability in PaperCut print management software (CVE-2023-27350).[[Deep Instinct PhonyC2 June 2023](/references/fd42ac0b-eae5-41bb-b56c-cb1c6d19857b)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5307", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "992bdd33-4a47-495d-883a-58010a2f0efb", + "f8669b82-2194-49a9-8e20-92e7f9ab0a6f", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "dcb260d8-9d53-404f-9ff5-dbee2c6effe6", + "type": "used-by" + } + ], + "uuid": "c6fc073b-fa8a-4fff-a066-3fd788d3ac85", + "value": "PhonyC2" + }, { "description": "[PHOREAL](https://app.tidalcyber.com/software/fd63cec1-9f72-4ed0-9926-2dbbb3d9cead) is a signature backdoor used by [APT32](https://app.tidalcyber.com/groups/c0fe9859-e8de-4ce1-bc3c-b489e914a145). [[FireEye APT32 May 2017](https://app.tidalcyber.com/references/b72d017b-a70f-4003-b3d9-90d79aca812d)]", "meta": { @@ -15492,6 +16269,14 @@ "dest-uuid": "26c0925f-1a3c-4df6-b27a-62b9731299b8", "type": "used-by" }, + { + "dest-uuid": "e47b2958-b7c4-4fe1-a006-03137db91963", + "type": "used-by" + }, + { + "dest-uuid": "b07431f8-fcf0-4204-8e7c-138eb5cd5342", + "type": "used-by" + }, { "dest-uuid": "43f826a1-e8c8-47b8-9b00-38e1b3e4293b", "type": "used-by" @@ -15678,6 +16463,39 @@ "uuid": "9445f18a-a796-447a-a35f-94a9fb72411c", "value": "PLAINTEE" }, + { + "description": "Play is a ransomware operation first observed in July 2022. Security researchers have observed filename, filepath, and TTP overlaps between Play and Hive and Nokayawa ransomwares, which themselves are believed to be linked.[[Trend Micro Play Playbook September 06 2022](/references/2d2b527d-25b0-4b58-9ae6-c87060b64069)] According to publicly available ransomware extortion threat data, Play has claimed nearly 200 victims from a wide range of sectors on its data leak site since December 2022.[[GitHub ransomwatch](/references/62037959-58e4-475a-bb91-ff360d20c1d7)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5300", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "562e535e-19f5-4d6c-81ed-ce2aec544f09", + "5e7433ad-a894-4489-93bc-41e90da90019", + "7e7b0c67-bb85-4996-a289-da0e792d7172", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "6d6ed42c-760c-4964-a81e-1d4df06a8800", + "type": "used-by" + }, + { + "dest-uuid": "6eb50f82-86cc-4eff-b1d1-66e1c6fd74f3", + "type": "used-by" + } + ], + "uuid": "aeafc9f4-e3b4-42ec-a156-4a05f1aa5ea3", + "value": "Play Ransomware" + }, { "description": "[PLEAD](https://app.tidalcyber.com/software/9a890a85-afbe-4c35-a3e7-1adad481bdf7) is a remote access tool (RAT) and downloader used by [BlackTech](https://app.tidalcyber.com/groups/528ab2ea-b8f1-44d8-8831-2a89fefd97cb) in targeted attacks in East Asia including Taiwan, Japan, and Hong Kong.[[TrendMicro BlackTech June 2017](https://app.tidalcyber.com/references/abb9cb19-d30e-4048-b106-eb29a6dad7fc)][[JPCert PLEAD Downloader June 2018](https://app.tidalcyber.com/references/871f4af2-ed99-4256-a74d-b8c0816a82ab)] [PLEAD](https://app.tidalcyber.com/software/9a890a85-afbe-4c35-a3e7-1adad481bdf7) has also been referred to as [TSCookie](https://app.tidalcyber.com/software/9872ab5a-c76e-4404-91f9-5b745722443b), though more recent reporting indicates likely separation between the two. [PLEAD](https://app.tidalcyber.com/software/9a890a85-afbe-4c35-a3e7-1adad481bdf7) was observed in use as early as March 2017.[[JPCert TSCookie March 2018](https://app.tidalcyber.com/references/ff1717f7-0d2e-4947-87d7-44576affe9f8)][[JPCert PLEAD Downloader June 2018](https://app.tidalcyber.com/references/871f4af2-ed99-4256-a74d-b8c0816a82ab)]", "meta": { @@ -16415,6 +17233,33 @@ "uuid": "b8a101e4-e0d2-4002-94c6-18ea30da7aa7", "value": "PowerTool" }, + { + "description": "A PowerShell-based, in-memory loader that executes embedded payloads.[[Mandiant FIN7 April 4 2022](/references/fbc3ea90-d3d4-440e-964d-6cd2e991df0c)] According to Mandiant, POWERTRASH is a \"uniquely obfuscated\" version of PowerSploit's `Invoke-Shellcode.ps1` shellcode invoker module known to be used by FIN7.[[GitHub - PowerSploit Invoke-Shellcode](/references/cf75a442-c6c0-4e83-87bf-8bb42839452b)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5294", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "84615fe0-c2a5-4e07-8957-78ebc29b4635", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "4348c510-50fc-4448-ab8d-c8cededd19ff", + "type": "used-by" + } + ], + "uuid": "3192d79f-2a24-4461-b4c8-4b40ef7c163f", + "value": "POWERTRASH" + }, { "description": "[PowGoop](https://app.tidalcyber.com/software/7ed984bb-d098-4d0a-90fd-b03e68842479) is a loader that consists of a DLL loader and a PowerShell-based downloader; it has been used by [MuddyWater](https://app.tidalcyber.com/groups/dcb260d8-9d53-404f-9ff5-dbee2c6effe6) as their main loader.[[DHS CISA AA22-055A MuddyWater February 2022](https://app.tidalcyber.com/references/e76570e1-43ab-4819-80bc-895ede67a205)][[CYBERCOM Iranian Intel Cyber January 2022](https://app.tidalcyber.com/references/671e1559-c7dc-4cb4-a9a1-21776f2ae56a)]", "meta": { @@ -16637,6 +17482,10 @@ ] }, "related": [ + { + "dest-uuid": "6eb50f82-86cc-4eff-b1d1-66e1c6fd74f3", + "type": "used-by" + }, { "dest-uuid": "d0f3353c-fbdd-4bd5-8793-a42e1f319b59", "type": "used-by" @@ -16842,6 +17691,10 @@ "dest-uuid": "a2add2a0-2b54-4623-a380-a9ad91f1f2dd", "type": "used-by" }, + { + "dest-uuid": "ee2da206-2532-44e3-a343-d66e9bfdbca0", + "type": "used-by" + }, { "dest-uuid": "7f52cadb-7a12-4b9d-9290-1ef02123fbe4", "type": "used-by" @@ -16918,6 +17771,10 @@ "dest-uuid": "3c7ad595-1940-40fc-b9ca-3e649c1e5d87", "type": "used-by" }, + { + "dest-uuid": "fac6fbf1-935f-4106-ad8b-c8fd8389dd38", + "type": "used-by" + }, { "dest-uuid": "528ab2ea-b8f1-44d8-8831-2a89fefd97cb", "type": "used-by" @@ -17190,6 +18047,28 @@ "uuid": "0a8bedc2-b404-4a9a-b4f5-ff90ff8294be", "value": "Pupy" }, + { + "description": "PureCrypter is a malware used for downloading/dropping purposes.", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5291", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "84615fe0-c2a5-4e07-8957-78ebc29b4635", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [], + "uuid": "a381cec1-9e87-415e-9025-a6e31fc8a48d", + "value": "PureCrypter" + }, { "description": "PuTTy is an open-source SSH and telnet client.[[PuTTY Download Page](/references/bf278270-128e-483b-9f09-ce24f5f6ed80)]", "meta": { @@ -17298,6 +18177,7 @@ "software_attack_id": "S0583", "source": "MITRE", "tags": [ + "562e535e-19f5-4d6c-81ed-ce2aec544f09", "5e7433ad-a894-4489-93bc-41e90da90019", "7e7b0c67-bb85-4996-a289-da0e792d7172" ], @@ -17330,6 +18210,10 @@ ] }, "related": [ + { + "dest-uuid": "ee2da206-2532-44e3-a343-d66e9bfdbca0", + "type": "used-by" + }, { "dest-uuid": "7f52cadb-7a12-4b9d-9290-1ef02123fbe4", "type": "used-by" @@ -17346,6 +18230,57 @@ "uuid": "9050b418-5ffd-481a-a30d-f9059b0871ea", "value": "QakBot" }, + { + "description": "Qilin (also known as Agenda) is a ransomware discovered in 2022. Attacks by threat actors deploying Qilin increased considerably in Q1 2024, impacting organizations in a wide range of sectors and locations across the globe.[[Trend Micro March 26 2024](/references/d5634b8e-420a-4721-a3d2-19d9f36697f4)]\n\nThe ransomware's capabilities have evolved over time, and multiple Qilin/Agenda variants and versions have been observed. The techniques featured in this object mainly derive from a variant observed in February 2024 written in the Rust programming language. A variant focused on encrypting Linux-based virtual machine servers can be found in the separate \"Qilin Ransomware (Linux)\" Software object.", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Linux", + "Windows" + ], + "software_attack_id": "S5326", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "a2e000da-8181-4327-bacd-32013dbd3654", + "562e535e-19f5-4d6c-81ed-ce2aec544f09", + "5e7433ad-a894-4489-93bc-41e90da90019", + "7e7b0c67-bb85-4996-a289-da0e792d7172", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [], + "uuid": "3b78dda9-d273-4ffc-9a9f-75e80178c7b2", + "value": "Qilin Ransomware" + }, + { + "description": "Qilin is a Linux-based ransomware. The malware is technically capable of running on Linux, FreeBSD, and VMware ESXi servers, but researchers have most often observed Qilin being used to encrypt virtual machines. Qilin users can use various flags to customize its capabilities. Qilin operators maintain a website where they threaten to leak data exfiltrated during their attacks, in an attempt to pressure victims into paying a ransom.[[BleepingComputer 12 3 2023](/references/8cb73f97-0256-472d-88b7-92b6d63578fd)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Linux" + ], + "software_attack_id": "S5310", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "a2e000da-8181-4327-bacd-32013dbd3654", + "562e535e-19f5-4d6c-81ed-ce2aec544f09", + "5e7433ad-a894-4489-93bc-41e90da90019", + "7e7b0c67-bb85-4996-a289-da0e792d7172", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [], + "uuid": "01a33c16-7eb3-4494-8c05-b163f871b951", + "value": "Qilin Ransomware (Linux)" + }, { "description": "[QUADAGENT](https://app.tidalcyber.com/software/2bf68242-1dbd-405b-ac35-330eda887081) is a PowerShell backdoor used by [OilRig](https://app.tidalcyber.com/groups/d01abdb1-0378-4654-aa38-1a4a292703e2). [[Unit 42 QUADAGENT July 2018](https://app.tidalcyber.com/references/320f49df-7b0a-4a6a-8542-17b0f56c94c9)]", "meta": { @@ -17410,6 +18345,39 @@ "uuid": "4bab7c2b-5ec4-467e-8df4-f2e6996e136b", "value": "QuasarRAT" }, + { + "description": "Quick Assist is a built-in Windows utility that can be used to grant external users remote access to a particular system. Financially motivated adversaries abused Quick Assist during an April 2024 campaign that in some cases led to Black Basta ransomware deployment.[[Microsoft Security Blog 5 15 2024](/references/0876de6e-ea0c-4717-89a4-9c7baed53b6f)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5319", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "e1af18e3-3224-4e4c-9d0f-533768474508", + "e727eaa6-ef41-4965-b93a-8ad0c51d0236", + "509a90c7-9ca9-4b23-bca2-cd38ef6a6207", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "tool" + ] + }, + "related": [ + { + "dest-uuid": "ee2da206-2532-44e3-a343-d66e9bfdbca0", + "type": "used-by" + }, + { + "dest-uuid": "7f52cadb-7a12-4b9d-9290-1ef02123fbe4", + "type": "used-by" + } + ], + "uuid": "9c4f3f26-c391-4b2c-9dd4-e4bb9bbc5ea3", + "value": "Quick Assist" + }, { "description": "[QUIETCANARY](https://app.tidalcyber.com/software/52d3515c-5184-5257-bf24-56adccb4cccd) is a backdoor tool written in .NET that has been used since at least 2022 to gather and exfiltrate data from victim networks.[[Mandiant Suspected Turla Campaign February 2023](https://app.tidalcyber.com/references/d8f43a52-a59e-5567-8259-821b1b6bde43)]", "meta": { @@ -17506,6 +18474,10 @@ { "dest-uuid": "4ea1245f-3f35-5168-bd10-1fc49142fd4e", "type": "used-by" + }, + { + "dest-uuid": "e47b2958-b7c4-4fe1-a006-03137db91963", + "type": "used-by" } ], "uuid": "7b78eb31-f251-493b-8058-14a3452e8ccc", @@ -17586,6 +18558,8 @@ "software_attack_id": "S0481", "source": "MITRE", "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "2feda37d-5579-4102-a073-aa02e82cb49f", "cb5803f0-8ab4-4ada-8540-7758dfc126e2", "5e7433ad-a894-4489-93bc-41e90da90019", "a2e000da-8181-4327-bacd-32013dbd3654", @@ -17665,6 +18639,31 @@ "uuid": "dc307b3c-9bc5-4624-b0bc-4807fa1fc57b", "value": "Ramsay" }, + { + "description": "This object represents the techniques associated with the payload binary used in attacks associated with the RansomHub ransomware-as-a-service (\"RaaS\") operation. The RansomHub gang is suspected of leaking victim data exfiltrated in attacks by other groups, but researchers have also observed an apparent original ransomware payload linked to the group.[[BroadcomSW June 5 2024](/references/3fa49490-cb22-4362-bf48-eaba9e83e6f5)][[The Record RansomHub June 3 2024](/references/1e474240-bd12-4472-8e69-1631b0e4c102)] This payload displays a high degree of code similarity with Knight ransomware, whose source code was offered for sale in cybercriminal forums in February 2024.[[BroadcomSW June 5 2024](/references/3fa49490-cb22-4362-bf48-eaba9e83e6f5)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5325", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "89c5b94b-ecf4-4d53-9b74-3465086d4565", + "562e535e-19f5-4d6c-81ed-ce2aec544f09", + "5e7433ad-a894-4489-93bc-41e90da90019", + "7e7b0c67-bb85-4996-a289-da0e792d7172", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [], + "uuid": "a3044fb5-3aae-4590-b589-cc88bf0d1f34", + "value": "RansomHub (Payload)" + }, { "description": "[RAPIDPULSE](https://app.tidalcyber.com/software/129abb68-7992-554e-92fa-fa376279c0b6) is a web shell that exists as a modification to a legitimate Pulse Secure file that has been used by [APT5](https://app.tidalcyber.com/groups/f46d6ee9-9d1d-586a-9f2d-6bff8fb92910) since at least 2021.[[Mandiant Pulse Secure Update May 2021](https://app.tidalcyber.com/references/5620adaf-c2a7-5f0f-ae70-554ce720426e)]", "meta": { @@ -17750,7 +18749,12 @@ "malware" ] }, - "related": [], + "related": [ + { + "dest-uuid": "ecdbd431-d62b-4b30-8663-b1ecb4304ec0", + "type": "used-by" + } + ], "uuid": "dc0dbd15-0916-43c7-a3b9-6dc3ce0771be", "value": "Raspberry Robin" }, @@ -17883,6 +18887,10 @@ "dest-uuid": "0fcb2205-e75b-46c9-ac54-00f218d5e331", "type": "used-by" }, + { + "dest-uuid": "fac6fbf1-935f-4106-ad8b-c8fd8389dd38", + "type": "used-by" + }, { "dest-uuid": "8e059c6b-d278-5454-a234-a8ad69feb66c", "type": "used-by" @@ -18130,6 +19138,14 @@ "dest-uuid": "472080b0-e3d4-4546-9272-c4359fe856e1", "type": "used-by" }, + { + "dest-uuid": "b39d8eae-12e3-4903-a387-4c31d16a73b2", + "type": "used-by" + }, + { + "dest-uuid": "b07431f8-fcf0-4204-8e7c-138eb5cd5342", + "type": "used-by" + }, { "dest-uuid": "47ae4fb1-fc61-4e8e-9310-66dda706e1a2", "type": "used-by" @@ -18572,6 +19588,7 @@ "software_attack_id": "S0496", "source": "MITRE", "tags": [ + "3ed3f7a6-b446-4fbc-a433-ff1d63c0e647", "562e535e-19f5-4d6c-81ed-ce2aec544f09", "286918d5-0b48-4655-9118-907b53de0ee0", "93c53801-5427-4678-a753-7fc761e9eda1", @@ -18631,6 +19648,35 @@ "uuid": "d5649d69-52d4-4198-9683-b250348dea32", "value": "RGDoor" }, + { + "description": "Rhysida is a ransomware-as-a-service (RaaS) operation that has been active since May 2023, claiming attacks on multiple sectors in several countries in North and South America, Western Europe, and Australia. Many alleged victims are education sector entities. Security researchers have observed TTP and victimology overlaps with the Vice Society extortion group.[[HC3 Analyst Note Rhysida Ransomware August 2023](/references/3f6e2821-5073-4382-b5dd-08676eaa2240)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5302", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "562e535e-19f5-4d6c-81ed-ce2aec544f09", + "5e7433ad-a894-4489-93bc-41e90da90019", + "7e7b0c67-bb85-4996-a289-da0e792d7172", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "0610cd57-2511-467a-97e3-3c810384074f", + "type": "used-by" + } + ], + "uuid": "f7c1e1cd-cc64-4417-92c3-76afed55d38c", + "value": "Rhysida Ransomware" + }, { "description": "[Rifdoor](https://app.tidalcyber.com/software/ca5ae7c8-467a-4434-82fc-db50ce3fc671) is a remote access trojan (RAT) that shares numerous code similarities with [HotCroissant](https://app.tidalcyber.com/software/a00e7fcc-b4e8-4f64-83d2-f9db64f0f3fe).[[Carbon Black HotCroissant April 2020](https://app.tidalcyber.com/references/43bcb35b-56e1-47a8-9c74-f7543a25b2a6)]", "meta": { @@ -18797,6 +19843,33 @@ "uuid": "a3479628-af0b-4088-8d2a-fafa384731dd", "value": "ROKRAT" }, + { + "description": "RomCom is a custom backdoor believed to be developed and distributed by the Void Rabisu threat actor. It has been used in attacks that Trend Micro researchers assess to be geopolitically motivated.[[Trend Micro Void Rabisu May 30 2023](/references/5fd628ca-f366-4f0d-b493-8be19fa4dd4e)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5295", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "f8669b82-2194-49a9-8e20-92e7f9ab0a6f", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "c2015888-72c0-4367-b2cf-df85688a56b7", + "type": "used-by" + } + ], + "uuid": "4af6326b-eba7-4446-83aa-8b98771d390f", + "value": "RomCom" + }, { "description": "[RotaJakiro](https://app.tidalcyber.com/software/169bfcf6-544c-5824-a7cd-2d5070304b57) is a 64-bit Linux backdoor used by [APT32](https://app.tidalcyber.com/groups/c0fe9859-e8de-4ce1-bc3c-b489e914a145). First seen in 2018, it uses a plugin architecture to extend capabilities. [RotaJakiro](https://app.tidalcyber.com/software/169bfcf6-544c-5824-a7cd-2d5070304b57) can determine it's permission level and execute according to access type (`root` or `user`).[[RotaJakiro 2021 netlab360 analysis](https://app.tidalcyber.com/references/7a9c53dd-2c0e-5452-9ee2-01531fbf8ba8)][[netlab360 rotajakiro vs oceanlotus](https://app.tidalcyber.com/references/20967c9b-5bb6-5cdd-9466-2c9efd9ab98c)]", "meta": { @@ -19199,6 +20272,8 @@ "software_attack_id": "S0446", "source": "MITRE", "tags": [ + "89c5b94b-ecf4-4d53-9b74-3465086d4565", + "3ed3f7a6-b446-4fbc-a433-ff1d63c0e647", "562e535e-19f5-4d6c-81ed-ce2aec544f09", "12a2e20a-7c27-46bb-954d-b372833a9925", "c2380542-36f2-4922-9ed2-80ced06645c9", @@ -19416,6 +20491,10 @@ "dest-uuid": "021b3c71-6467-4e46-a413-8b726f066f2c", "type": "used-by" }, + { + "dest-uuid": "fac6fbf1-935f-4106-ad8b-c8fd8389dd38", + "type": "used-by" + }, { "dest-uuid": "5825a840-5577-4ffc-a08d-3f48d64395cb", "type": "used-by" @@ -20507,6 +21586,10 @@ ] }, "related": [ + { + "dest-uuid": "00b45c13-d165-44d0-ad6b-99787d2a7ce3", + "type": "used-by" + }, { "dest-uuid": "f138c814-48c0-4638-a4d6-edc48e7ac23a", "type": "used-by" @@ -20621,6 +21704,35 @@ "uuid": "6ecd970c-427b-4421-a831-69f46047d22a", "value": "SodaMaster" }, + { + "description": "SoftEther VPN is an open-source software project that, according to its GitHub page, is \"cross-platform multi-protocol VPN software\".[[GitHub SoftEtherVPN SoftEtherVPN_Stable](/references/f9d28db2-499f-407c-94d2-652b9ed5f928)] In August 2023, Microsoft researchers reported how Flax Typhoon, a nation-state-sponsored espionage group based in China, used SoftEther VPN as a key element of its command and control infrastructure during attacks on targets in Taiwan and elsewhere.[[Microsoft Flax Typhoon August 24 2023](/references/ec962b72-7b7f-4f7e-b6d6-7c5380b07201)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "macOS", + "Linux", + "Windows" + ], + "software_attack_id": "S5305", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "ed2b3f47-3e07-4019-a9bf-ec9d87f28c96", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "tool" + ] + }, + "related": [ + { + "dest-uuid": "b39d8eae-12e3-4903-a387-4c31d16a73b2", + "type": "used-by" + } + ], + "uuid": "46a9ee9c-6c4a-4db9-9385-46d2617d8050", + "value": "SoftEther VPN" + }, { "description": "SoftPerfect Network Scanner is a tool used to perform network scans for systems management purposes.[[U.S. CISA Understanding LockBit June 2023](/references/9c03b801-2ebe-4c7b-aa29-1b7a3625964a)]", "meta": { @@ -20677,6 +21789,10 @@ { "dest-uuid": "33159d02-a1ce-49ec-a381-60b069db66f7", "type": "used-by" + }, + { + "dest-uuid": "fac6fbf1-935f-4106-ad8b-c8fd8389dd38", + "type": "used-by" } ], "uuid": "4272447f-8803-4947-b66f-051eecdd3385", @@ -20808,6 +21924,33 @@ "uuid": "b9b67878-4eb1-4a0b-9b36-a798881ed566", "value": "SpeakUp" }, + { + "description": "SpectralBlur is a malware targeting macOS systems that has backdoor functionality. Researchers have linked the malware to \"TA444/Bluenoroff\" actors.[[Objective_See 1 4 2024](/references/c96535be-4859-4ae3-9ba0-d482f1195863)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "macOS" + ], + "software_attack_id": "S5311", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "f8669b82-2194-49a9-8e20-92e7f9ab0a6f", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "dfbce236-735c-436d-b433-933bd6eae17b", + "type": "used-by" + } + ], + "uuid": "89e2bdbf-4839-4b35-bd19-316a953d7acf", + "value": "SpectralBlur" + }, { "description": "Sphynx is a variant of BlackCat ransomware (AKA ALPHV or Noberus) first observed in early 2023, which features multiple defense evasion-focused enhancements over the BlackCat strain. For example, Sphynx uses a more complex set of execution parameters, its configuration details are formatted as raw structures instead of JSON, and observed samples contain large amounts of “junk” code and encrypted strings.[[X-Force BlackCat May 30 2023](/references/b80c1f70-9d05-4f4b-bdc2-6157c6837202)] Sphynx also features built-in versions of other tools to support specific functions, including the open-source Impacket tool for lateral movement and Remcom, a hacking tool that facilitates remote code execution.[[Microsoft Threat Intelligence Tweet August 17 2023](/references/8b0ebcb5-d531-4f49-aa2d-bceb5e491b3f)]", "meta": { @@ -20818,6 +21961,7 @@ "software_attack_id": "S5055", "source": "Tidal Cyber", "tags": [ + "562e535e-19f5-4d6c-81ed-ce2aec544f09", "5e7433ad-a894-4489-93bc-41e90da90019", "7e7b0c67-bb85-4996-a289-da0e792d7172" ], @@ -20908,11 +22052,42 @@ { "dest-uuid": "3d77fb6c-cfb4-5563-b0be-7aa1ad535337", "type": "used-by" + }, + { + "dest-uuid": "fac6fbf1-935f-4106-ad8b-c8fd8389dd38", + "type": "used-by" } ], "uuid": "ecf8b878-19e5-425b-bc34-d5ed6e999fea", "value": "Splashtop" }, + { + "description": "SplitLoader is an intermediate-stage malware used by the North Korean threat actor Moonstone Sleet mainly for payload execution purposes. It is also capable of performing system reconnaissance.[[Microsoft Security Blog 5 28 2024](/references/faf315ed-71f7-4e29-8334-701da35a69ad)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5322", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "84615fe0-c2a5-4e07-8957-78ebc29b4635", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "3b8a2c50-5d8e-49b4-bd50-10ae66ca6c72", + "type": "used-by" + } + ], + "uuid": "9a20c7f3-4e17-4a79-994a-c577afef5c72", + "value": "SplitLoader" + }, { "description": "[spwebmember](https://app.tidalcyber.com/software/0fdabff3-d996-493c-af67-f3ac02e4b00b) is a Microsoft SharePoint enumeration and data dumping tool written in .NET. [[NCC Group APT15 Alive and Strong](https://app.tidalcyber.com/references/02a50445-de06-40ab-9ea4-da5c37e066cd)]", "meta": { @@ -21193,6 +22368,55 @@ "uuid": "ea561f0b-b891-5735-aa99-97cc8818fbef", "value": "STEADYPULSE" }, + { + "description": "Stealc is a credential and information stealer first discovered by researchers in January 2023. Researchers assess the malware contains code similarities to prominent stealer families including Vidar, Raccoon, Mars, and RedLine.[[Sekoia.io Stealc February 20 2023](/references/ca5b727d-f35b-4009-b4d4-21a69d41162d)] Red Canary researchers indicated in July 2023 that they observed a \"surge\" of Stealc activity during the second half of the preceding month.[[Red Canary Intelligence Insights July 20 2023](/references/ad1d3f99-e5bf-41c6-871b-dd2c9d540341)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5298", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "4d767e87-4cf6-438a-927a-43d2d0beaab7", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [], + "uuid": "7ae6b9f0-3a50-4ebc-ae2c-9569f00dbd81", + "value": "Stealc" + }, + { + "description": "STEALDEAL is a relatively simple information and credential stealer that is known to be downloaded by RomCom malware and used to collect and exfiltrate victim data, including locally stored web browser credentials, cookies, and history.[[Trend Micro Void Rabisu May 30 2023](/references/5fd628ca-f366-4f0d-b493-8be19fa4dd4e)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5296", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "4d767e87-4cf6-438a-927a-43d2d0beaab7", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "c2015888-72c0-4367-b2cf-df85688a56b7", + "type": "used-by" + } + ], + "uuid": "39aaa970-8c33-4fd3-a7f0-4b769f301460", + "value": "STEALDEAL" + }, { "description": "[StoneDrill](https://app.tidalcyber.com/software/9eee52a2-5ac1-4561-826c-23ec7fbc7876) is wiper malware discovered in destructive campaigns against both Middle Eastern and European targets in association with [APT33](https://app.tidalcyber.com/groups/99bbbe25-45af-492f-a7ff-7cbc57828bac).[[FireEye APT33 Sept 2017](https://app.tidalcyber.com/references/70610469-db0d-45ab-a790-6e56309a39ec)][[Kaspersky StoneDrill 2017](https://app.tidalcyber.com/references/e2637cb3-c449-4609-af7b-ac78a900cc8b)]", "meta": { @@ -21314,6 +22538,7 @@ "software_attack_id": "S0603", "source": "MITRE", "tags": [ + "3ed3f7a6-b446-4fbc-a433-ff1d63c0e647", "a98d7a43-f227-478e-81de-e7299639a355" ], "type": [ @@ -21512,7 +22737,7 @@ }, "related": [], "uuid": "6af0eac2-c35f-4569-ae09-47f1ca846961", - "value": "Syncappvpublishingserver" + "value": "Syncappvpublishingserver - Duplicate" }, { "description": "This object contains information sourced from the [Living Off The Land Binaries, Scripts and Libraries (LOLBAS)](https://github.com/LOLBAS-Project/LOLBAS) project, which is licensed under [GNU General Public License v3.0](https://github.com/LOLBAS-Project/LOLBAS/blob/master/LICENSE).\n\n**Description:** Used by App-v to get App-v server lists\n\n**Author:** Oddvar Moe\n\n**Paths:**\n* C:\\Windows\\System32\\SyncAppvPublishingServer.exe\n* C:\\Windows\\SysWOW64\\SyncAppvPublishingServer.exe\n\n**Resources:**\n* [https://twitter.com/monoxgas/status/895045566090010624](https://twitter.com/monoxgas/status/895045566090010624)\n\n**Detection:**\n* Sigma: [posh_ps_syncappvpublishingserver_exe.yml](https://github.com/SigmaHQ/sigma/blob/6312dd1d44d309608552105c334948f793e89f48/rules/windows/powershell/powershell_script/posh_ps_syncappvpublishingserver_exe.yml)\n* Sigma: [posh_pm_syncappvpublishingserver_exe.yml](https://github.com/SigmaHQ/sigma/blob/6312dd1d44d309608552105c334948f793e89f48/rules/windows/powershell/powershell_module/posh_pm_syncappvpublishingserver_exe.yml)\n* Sigma: [proc_creation_win_lolbin_syncappvpublishingserver_execute_psh.yml](https://github.com/SigmaHQ/sigma/blob/6312dd1d44d309608552105c334948f793e89f48/rules/windows/process_creation/proc_creation_win_lolbin_syncappvpublishingserver_execute_psh.yml)\n* IOC: SyncAppvPublishingServer.exe should never be in use unless App-V is deployed[[SyncAppvPublishingServer.exe - LOLBAS Project](/references/ce371df7-aab6-4338-9491-656481cb5601)]", @@ -22712,6 +23937,10 @@ { "dest-uuid": "393da13e-016c-41a3-9d89-b33173adecbf", "type": "used-by" + }, + { + "dest-uuid": "ecdbd431-d62b-4b30-8663-b1ecb4304ec0", + "type": "used-by" } ], "uuid": "669f8b7a-2404-47ab-843d-e63431faafec", @@ -23319,6 +24548,30 @@ "uuid": "150b6079-bb10-48a8-b570-fbe8b0e3287c", "value": "VBShower" }, + { + "description": "A prominent ransomware family.[[HC3 Analyst Note Venus Ransomware November 2022](/references/bd6e6a59-3a73-48f6-84cd-e7c027c8671f)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5293", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "562e535e-19f5-4d6c-81ed-ce2aec544f09", + "5e7433ad-a894-4489-93bc-41e90da90019", + "7e7b0c67-bb85-4996-a289-da0e792d7172", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [], + "uuid": "2f33ae13-8ab2-4ec1-8358-c81218c1f3a5", + "value": "Venus Ransomware" + }, { "description": "This object contains information sourced from the [Living Off The Land Binaries, Scripts and Libraries (LOLBAS)](https://github.com/LOLBAS-Project/LOLBAS) project, which is licensed under [GNU General Public License v3.0](https://github.com/LOLBAS-Project/LOLBAS/blob/master/LICENSE).\n\n**Description:** Used to verify a COM object before it is instantiated by Windows Explorer\n\n**Author:** @bohops\n\n**Paths:**\n* C:\\Windows\\System32\\verclsid.exe\n* C:\\Windows\\SysWOW64\\verclsid.exe\n\n**Resources:**\n* [https://gist.github.com/NickTyrer/0598b60112eaafe6d07789f7964290d5](https://gist.github.com/NickTyrer/0598b60112eaafe6d07789f7964290d5)\n* [https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/](https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/)\n\n**Detection:**\n* Sigma: [proc_creation_win_verclsid_runs_com.yml](https://github.com/SigmaHQ/sigma/blob/683b63f8184b93c9564c4310d10c571cbe367e1e/rules/windows/process_creation/proc_creation_win_verclsid_runs_com.yml)\n* Splunk: [verclsid_clsid_execution.yml](https://github.com/splunk/security_content/blob/a1afa0fa605639cbef7d528dec46ce7c8112194a/detections/endpoint/verclsid_clsid_execution.yml)[[LOLBAS Verclsid](/references/63ac9e95-aad8-4735-9e63-f45d8c499030)]", "meta": { @@ -23536,6 +24789,33 @@ "uuid": "99f752db-12c4-45a7-9f7b-f4fcda033462", "value": "vsls-agent" }, + { + "description": "Play ransomware operators are known to use a custom tool that serves as an interface for interacting with Windows Volume Shadow Copy Service (\"VSS\") over APIs. The tool can enumerate and copy files and folders in a VSS snapshot prior to encryption to serve as backups.[[Symantec Play Ransomware April 19 2023](/references/a78613a5-ce17-4d11-8f2f-3e642cd7673c)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5301", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "4d767e87-4cf6-438a-927a-43d2d0beaab7", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "6eb50f82-86cc-4eff-b1d1-66e1c6fd74f3", + "type": "used-by" + } + ], + "uuid": "a3ebc075-c87b-4400-9498-09bb95d47231", + "value": "VSS Copying Tool (Play Ransomware)" + }, { "description": "This object contains information sourced from the [Living Off The Land Binaries, Scripts and Libraries (LOLBAS)](https://github.com/LOLBAS-Project/LOLBAS) project, which is licensed under [GNU General Public License v3.0](https://github.com/LOLBAS-Project/LOLBAS/blob/master/LICENSE).\n\n**Description:** VSTest.Console.exe is the command-line tool to run tests\n\n**Author:** Onat Uzunyayla\n\n**Paths:**\n* C:\\Program Files\\Microsoft Visual Studio\\2022\\Community\\Common7\\IDE\\CommonExtensions\\Microsoft\\TestWindow\\vstest.console.exe\n* C:\\Program Files (x86)\\Microsoft Visual Studio\\2022\\TestAgent\\Common7\\IDE\\CommonExtensions\\Microsoft\\TestWindow\\vstest.console.exe\n\n**Resources:**\n* [https://learn.microsoft.com/en-us/visualstudio/test/vstest-console-options?view=vs-2022](https://learn.microsoft.com/en-us/visualstudio/test/vstest-console-options?view=vs-2022)\n\n**Detection:**\n* IOC: vstest.console.exe spawning unexpected processes[[vstest.console.exe - LOLBAS Project](/references/70c168a0-9ddf-408d-ba29-885c0c5c936a)]", "meta": { @@ -23588,6 +24868,7 @@ "software_attack_id": "S0366", "source": "MITRE", "tags": [ + "3ed3f7a6-b446-4fbc-a433-ff1d63c0e647", "45795633-a32b-4d9e-8620-4044ac056647", "09de661e-60c4-43fb-bfef-df017215d1d8", "5a463cb3-451d-47f7-93e4-1886150697ce", @@ -23812,6 +25093,10 @@ "dest-uuid": "3290dcb9-5781-4b87-8fa0-6ae820e152cd", "type": "used-by" }, + { + "dest-uuid": "6eb50f82-86cc-4eff-b1d1-66e1c6fd74f3", + "type": "used-by" + }, { "dest-uuid": "4ea1245f-3f35-5168-bd10-1fc49142fd4e", "type": "used-by" @@ -24254,6 +25539,10 @@ { "dest-uuid": "6eb50f82-86cc-4eff-b1d1-66e1c6fd74f3", "type": "used-by" + }, + { + "dest-uuid": "b07431f8-fcf0-4204-8e7c-138eb5cd5342", + "type": "used-by" } ], "uuid": "3ded75ea-b253-48cd-94e7-aef53e0d1e31", @@ -24715,6 +26004,27 @@ "uuid": "3672ecfa-20bf-4d69-948d-876be343563f", "value": "XCSSET" }, + { + "description": "Researchers discovered an updated macOS variant of the XLoader stealer/botnet malware, which is programmed in C and Objective C and signed with an Apple developer signature.[[SentinelOne 8 21 2023](/references/fc9b3eac-a638-4b84-92ae-591bc16a845e)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "macOS" + ], + "software_attack_id": "S5317", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [], + "uuid": "5ced31ef-8e03-4125-be9b-922dac49bfa2", + "value": "Xloader (macOS Variant)" + }, { "description": "XMRig is an open-source tool that uses the resources of the running system to mine Monero cryptocurrency. According to U.S. cybersecurity authorities, \"XMRig can cause a victim computer to overheat and perform poorly by using additional system resources that would otherwise not be active\".[[U.S. CISA Trends June 30 2020](/references/b97e9a02-4cc5-4845-8058-0be4c566cd7c)]", "meta": { @@ -24813,6 +26123,30 @@ "uuid": "d5663ff2-904b-42d6-b4d8-672017d91de2", "value": "Xwizard" }, + { + "description": "XWorm is a Remote Access Trojan (RAT)/Backdoor malware.", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5290", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "fdd53e62-5bf1-41f1-8bd6-b970a866c39d", + "d431939f-2dc0-410b-83f7-86c458125444", + "f8669b82-2194-49a9-8e20-92e7f9ab0a6f", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [], + "uuid": "15a19d45-8f31-4ee4-ba01-0c8c1f24a67b", + "value": "Xworm" + }, { "description": "[YAHOYAH](https://app.tidalcyber.com/software/0844bc42-5c29-47c3-b1b3-6bfffbf1732a) is a Trojan used by [Tropic Trooper](https://app.tidalcyber.com/groups/0a245c5e-c1a8-480f-8655-bb2594e3266b) as a second-stage backdoor.[[TrendMicro TropicTrooper 2015](https://app.tidalcyber.com/references/65d1f980-1dc2-4d36-8148-2d8747a39883)]", "meta": { @@ -24837,6 +26171,33 @@ "uuid": "0844bc42-5c29-47c3-b1b3-6bfffbf1732a", "value": "YAHOYAH" }, + { + "description": "YouieLoad is an intermediate-stage malware used by the North Korean threat actor Moonstone Sleet mainly for payload execution purposes. It is also capable of performing system reconnaissance.[[Microsoft Security Blog 5 28 2024](/references/faf315ed-71f7-4e29-8334-701da35a69ad)]", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5323", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "84615fe0-c2a5-4e07-8957-78ebc29b4635", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "3b8a2c50-5d8e-49b4-bd50-10ae66ca6c72", + "type": "used-by" + } + ], + "uuid": "2992159c-d71c-48cf-8302-020f90332390", + "value": "YouieLoad" + }, { "description": "[yty](https://app.tidalcyber.com/software/e0962ff7-5524-4683-9b95-0e4ba07dccb2) is a modular, plugin-based malware framework. The components of the framework are written in a variety of programming languages. [[ASERT Donot March 2018](https://app.tidalcyber.com/references/a1b987cc-7789-411c-9673-3cf6357b207c)]", "meta": { @@ -24990,6 +26351,34 @@ "uuid": "1ac8d363-2903-43da-9c1d-2b28179638c8", "value": "ZLib" }, + { + "description": "Zloader originated in 2016 as a modular banking trojan based on the popular Zeus malware. It has evolved in the years since to be used as an important distribution mechanism for various other malware, including ransomware.[[WeLiveSecurity April 19 2022](/references/f86845b9-03c4-446b-845f-b31b79b247ee)]\n\nThis object represents a collection of MITRE ATT&CK® Techniques associated with Zloader binaries. Techniques used by various actors to distribute Zloader can be found in the separate \"Zloader Threat Actors\" Group object.", + "meta": { + "owner": "TidalCyberIan", + "platforms": [ + "Windows" + ], + "software_attack_id": "S5312", + "source": "Tidal Cyber", + "tags": [ + "c6e1f516-1a18-4ff9-b563-e6ac8103b104", + "39357cc1-dbb1-49e4-9fe0-ff24032b94d5", + "f8669b82-2194-49a9-8e20-92e7f9ab0a6f", + "2feda37d-5579-4102-a073-aa02e82cb49f" + ], + "type": [ + "malware" + ] + }, + "related": [ + { + "dest-uuid": "d2fd3da1-e49c-4273-9add-3d15afc3b837", + "type": "used-by" + } + ], + "uuid": "a106fb66-bd68-40cc-9374-8b59234a0cec", + "value": "Zloader" + }, { "description": "[Zox](https://app.tidalcyber.com/software/75dd9acb-fcff-4b0b-b45b-f943fb589d78) is a remote access tool that has been used by [Axiom](https://app.tidalcyber.com/groups/90f4d3f9-3fe3-4a64-8dc1-172c6d037dca) since at least 2008.[[Novetta-Axiom](https://app.tidalcyber.com/references/0dd428b9-849b-4108-87b1-20050b86f420)]", "meta": { @@ -25088,5 +26477,5 @@ "value": "ZxxZ" } ], - "version": 1 + "version": 2 } diff --git a/clusters/ukhsa-culture-collections.json b/clusters/ukhsa-culture-collections.json index bfe899db..13fce646 100644 --- a/clusters/ukhsa-culture-collections.json +++ b/clusters/ukhsa-culture-collections.json @@ -12,19 +12,2780 @@ { "meta": { "catalogue_number": [ - "NCTC 13812" + "NCTC 30" ], "collection": [ "NCTC" ], "external_id": [ + "NCTC 30", + "NCTC 11502", + "NCTC 11507", + "NCTC 11500", + "NCTC 8042", + "NCTC 11348", + "NCTC 4716", + "NCTC 4711", + "NCTC 4714", + "NCTC 4715" + ], + "other_collection_numbers": [ + "Martin No. I, ATCC 14735" + ], + "product_name": [ + "Vibrio cholerae non O:1" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/vibrio-cholerae-non-o1", + "https://www.culturecollections.org.uk/nop/product/vibrio-cholerae-non-o1-10", + "https://www.culturecollections.org.uk/nop/product/vibrio-cholerae-non-o1-11", + "https://www.culturecollections.org.uk/nop/product/vibrio-cholerae-non-o1-9", + "https://www.culturecollections.org.uk/nop/product/vibrio-cholerae-non-o1-6", + "https://www.culturecollections.org.uk/nop/product/vibrio-cholerae-non-o1-8", + "https://www.culturecollections.org.uk/nop/product/vibrio-cholerae-non-o1-5", + "https://www.culturecollections.org.uk/nop/product/vibrio-cholerae-non-o1-2", + "https://www.culturecollections.org.uk/nop/product/vibrio-cholerae-non-o1-3", + "https://www.culturecollections.org.uk/nop/product/vibrio-cholerae-non-o1-4" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "0d03abed-fec5-5803-a265-7b14b25e3822", + "value": "Vibrio cholerae non O:1" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14181" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14181", + "NCTC 14318" + ], + "product_name": [ + "Eikenella exigua" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/eikenella-exigua-2", + "https://www.culturecollections.org.uk/nop/product/eikenella-exigua" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "f2764a44-784a-5cea-8b44-85616abb9d5c", + "value": "Eikenella exigua" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14382" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14382" + ], + "product_name": [ + "Yersinia canariae" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/yersinia-canariae" + ], + "type_strain": [ + "Type Strain" + ] + }, + "uuid": "1c1a7952-7171-59a3-a84b-f75a80841b65", + "value": "Yersinia canariae" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14220" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14220", + "NCTC 14218", + "NCTC 14219", + "NCTC 13360", + "NCTC 13924", + "NCTC 12100", + "NCTC 10519", + "NCTC 11964", + "NCTC 7474", + "NCTC 6513", + "NCTC 4133", + "NCTC 11047", + "NCTC 9865" + ], + "other_collection_numbers": [ + "Type 2" + ], + "product_name": [ + "Staphylococcus epidermidis" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-12", + "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-11", + "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-13", + "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-9", + "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-10", + "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-8", + "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-5", + "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-7", + "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-3", + "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-2", + "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis", + "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-6", + "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-4" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "d58cc121-78fd-5bdd-8885-72afa6000c92", + "value": "Staphylococcus epidermidis" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14582" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14582", + "NCTC 14364", + "NCTC 9091", + "NCTC 4169", + "NCTC 8006", + "NCTC 14916", + "NCTC 14805", + "NCTC 9112", + "NCTC 9008", + "NCTC 9024", + "NCTC 9033", + "NCTC 9036", + "NCTC 9087", + "NCTC 8620", + "NCTC 8623", + "NCTC 9009", + "NCTC 10650", + "NCTC 10962", + "NCTC 11116", + "NCTC 11129", + "NCTC 11131", + "NCTC 11132", + "NCTC 11560", + "NCTC 11954", + "NCTC 13351", + "NCTC 13352", + "NCTC 13353", + "NCTC 13400", + "NCTC 13441", + "NCTC 13450", + "NCTC 13451", + "NCTC 13452", + "NCTC 13461", + "NCTC 13462", + "NCTC 13463", + "NCTC 13919", + "NCTC 14746", + "NCTC 86", + "NCTC 14692", + "NCTC 14744", + "NCTC 14745", + "NCTC 14367", + "NCTC 14476", + "NCTC 14477", + "NCTC 14380", + "NCTC 14379", + "NCTC 14378", + "NCTC 14381", + "NCTC 14376", + "NCTC 14377", + "NCTC 14338", + "NCTC 14333", + "NCTC 14320", + "NCTC 14374", + "NCTC 14373", + "NCTC 13846", + "NCTC 14372", + "NCTC 14371", + "NCTC 14370", + "NCTC 14369", + "NCTC 14368", + "NCTC 14366", + "NCTC 14365", + "NCTC 14324", + "NCTC 14329", + "NCTC 14321", + "NCTC 14339", + "NCTC 13624", + "NCTC 13958", + "NCTC 13968", + "NCTC 13959", + "NCTC 13960", + "NCTC 13961", + "NCTC 13962", + "NCTC 13964", + "NCTC 13966", + "NCTC 13969", + "NCTC 13971", + "NCTC 13973", + "NCTC 13974", + "NCTC 13976", + "NCTC 13982", + "NCTC 13992", + "NCTC 14325", + "NCTC 14205", + "NCTC 11601", + "NCTC 13994", + "NCTC 13996", + "NCTC 13997", + "NCTC 13998", + "NCTC 13999", + "NCTC 14001", + "NCTC 13975", + "NCTC 13977", + "NCTC 13978", + "NCTC 13979", + "NCTC 13980", + "NCTC 13981", + "NCTC 13983", + "NCTC 13984", + "NCTC 13985", + "NCTC 13986", + "NCTC 13987", + "NCTC 13988", + "NCTC 13989", + "NCTC 13990", + "NCTC 13991", + "NCTC 13993", + "NCTC 14002", + "NCTC 14003", + "NCTC 14005", + "NCTC 4168", + "NCTC 7925", + "NCTC 9001", + "NCTC 9833", + "NCTC 9834", + "NCTC 10351", + "NCTC 13733", + "NCTC 13782", + "NCTC 13794", + "NCTC 13796", + "NCTC 13797", + "NCTC 13956", + "NCTC 13965", + "NCTC 13967", + "NCTC 14004", + "NCTC 14203", + "NCTC 10087", + "NCTC 13216", + "NCTC 12655", + "NCTC 12654", + "NCTC 12653", + "NCTC 12652", + "NCTC 12650", + "NCTC 13562", + "NCTC 10855", + "NCTC 9028", + "NCTC 9013", + "NCTC 9018", + "NCTC 12900", + "NCTC 11181", + "NCTC 11133", + "NCTC 9706", + "NCTC 8959", + "NCTC 1093", + "NCTC 122", + "NCTC 9778", + "NCTC 12080", + "NCTC 12079", + "NCTC 13128", + "NCTC 13127", + "NCTC 7922", + "NCTC 12923", + "NCTC 11476", + "NCTC 11475", + "NCTC 11474", + "NCTC 11473", + "NCTC 11472", + "NCTC 11341", + "NCTC 11151", + "NCTC 11130", + "NCTC 11128", + "NCTC 11127", + "NCTC 11126", + "NCTC 11124", + "NCTC 11123", + "NCTC 11121", + "NCTC 11120", + "NCTC 11119", + "NCTC 11118", + "NCTC 11117", + "NCTC 11115", + "NCTC 11114", + "NCTC 11113", + "NCTC 11112", + "NCTC 11111", + "NCTC 11109", + "NCTC 11108", + "NCTC 11107", + "NCTC 11106", + "NCTC 11105", + "NCTC 11102", + "NCTC 11101", + "NCTC 11024", + "NCTC 11023", + "NCTC 11022", + "NCTC 11021", + "NCTC 10974", + "NCTC 10973", + "NCTC 10964", + "NCTC 10963", + "NCTC 10961", + "NCTC 10960", + "NCTC 10959", + "NCTC 10958", + "NCTC 10957", + "NCTC 10865", + "NCTC 10864", + "NCTC 10863", + "NCTC 10758", + "NCTC 10757", + "NCTC 10677", + "NCTC 10664", + "NCTC 10444", + "NCTC 10430", + "NCTC 10429", + "NCTC 10361", + "NCTC 10279", + "NCTC 10090", + "NCTC 10089", + "NCTC 10002", + "NCTC 9969", + "NCTC 9968", + "NCTC 9967", + "NCTC 9966", + "NCTC 9965", + "NCTC 9964", + "NCTC 9963", + "NCTC 9962", + "NCTC 9961", + "NCTC 9855", + "NCTC 9708", + "NCTC 9707", + "NCTC 9705", + "NCTC 9704", + "NCTC 9703", + "NCTC 9702", + "NCTC 9701", + "NCTC 9699", + "NCTC 9123", + "NCTC 9122", + "NCTC 9121", + "NCTC 9120", + "NCTC 9119", + "NCTC 9118", + "NCTC 9117", + "NCTC 9116", + "NCTC 9114", + "NCTC 9113", + "NCTC 9111", + "NCTC 9110", + "NCTC 9109", + "NCTC 9108", + "NCTC 9107", + "NCTC 9106", + "NCTC 9105", + "NCTC 9104", + "NCTC 9103", + "NCTC 9102", + "NCTC 9101", + "NCTC 9100", + "NCTC 9099", + "NCTC 9098", + "NCTC 9097", + "NCTC 9096", + "NCTC 9095", + "NCTC 9093", + "NCTC 9092", + "NCTC 9090", + "NCTC 9089", + "NCTC 9088", + "NCTC 9086", + "NCTC 9085", + "NCTC 9084", + "NCTC 9083", + "NCTC 9082", + "NCTC 9081", + "NCTC 9080", + "NCTC 9079", + "NCTC 9078", + "NCTC 9077", + "NCTC 9076", + "NCTC 9075", + "NCTC 9074", + "NCTC 9073", + "NCTC 9072", + "NCTC 9071", + "NCTC 9070", + "NCTC 9069", + "NCTC 9068", + "NCTC 9066", + "NCTC 9065", + "NCTC 9064", + "NCTC 9063", + "NCTC 9062", + "NCTC 9061", + "NCTC 9060", + "NCTC 9059", + "NCTC 9058", + "NCTC 9057", + "NCTC 9056", + "NCTC 9055", + "NCTC 9054", + "NCTC 9053", + "NCTC 9052", + "NCTC 9051", + "NCTC 9050", + "NCTC 9049", + "NCTC 9048", + "NCTC 9047", + "NCTC 9046", + "NCTC 9045", + "NCTC 9044", + "NCTC 9043", + "NCTC 9042", + "NCTC 9041", + "NCTC 9040", + "NCTC 9039", + "NCTC 9038", + "NCTC 9037", + "NCTC 9035", + "NCTC 9034", + "NCTC 9032", + "NCTC 9031", + "NCTC 9030", + "NCTC 9029", + "NCTC 9027", + "NCTC 9026", + "NCTC 9023", + "NCTC 9022", + "NCTC 9021", + "NCTC 9020", + "NCTC 9019", + "NCTC 9017", + "NCTC 9016", + "NCTC 9015", + "NCTC 9014", + "NCTC 9012", + "NCTC 9011", + "NCTC 9010", + "NCTC 9007", + "NCTC 9006", + "NCTC 9005", + "NCTC 9004", + "NCTC 9003", + "NCTC 9002", + "NCTC 8960", + "NCTC 8783", + "NCTC 8781", + "NCTC 8622", + "NCTC 8621", + "NCTC 8603", + "NCTC 8333", + "NCTC 8179", + "NCTC 8009", + "NCTC 8008", + "NCTC 8007", + "NCTC 8003", + "NCTC 13167", + "NCTC 8164", + "NCTC 4174", + "NCTC 13476", + "NCTC 4450", + "NCTC 7921", + "NCTC 7928", + "NCTC 13148", + "NCTC 10850", + "NCTC 10766", + "NCTC 10764", + "NCTC 10537", + "NCTC 9777", + "NCTC 9776", + "NCTC 9775", + "NCTC 9434", + "NCTC 8985", + "NCTC 8196", + "NCTC 7926", + "NCTC 7362", + "NCTC 12950", + "NCTC 12839", + "NCTC 11122", + "NCTC 10418", + "NCTC 8500", + "NCTC 11186", + "NCTC 13384", + "NCTC 13125", + "NCTC 12241", + "NCTC 11103", + "NCTC 11100", + "NCTC 10538", + "NCTC 10487", + "NCTC 8984", + "NCTC 8450", + "NCTC 7927", + "NCTC 7360", + "NCTC 7152", + "NCTC 5934", + "NCTC 13126", + "NCTC 10767", + "NCTC 5933", + "NCTC 1601", + "NCTC 7923", + "NCTC 12464", + "NCTC 12486", + "NCTC 11603", + "NCTC 8986", + "NCTC 11633", + "NCTC 11602", + "NCTC 8136" + ], + "other_collection_numbers": [ + "DSM 18039; CGSC 6300" + ], + "product_name": [ + "Escherichia coli" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-448", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-438", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-133", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-6", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-458", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-457", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-456", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-151", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-53", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-73", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-61", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-82", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-31", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-35", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-38", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-54", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-206", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-225", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-249", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-262", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-264", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-265", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-363", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-280", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-364", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-365", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-366", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-367", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-353", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-355", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-354", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-356", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-357", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-358", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-359", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-371", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-455", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-454", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-453", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-452", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-451", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-450", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-449", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-447", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-446", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-445", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-442", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-443", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-444", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-441", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-440", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-439", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-437", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-436", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-370", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-435", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-434", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-433", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-432", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-431", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-430", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-429", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-428", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-427", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-426", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-425", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-368", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-377", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-384", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-378", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-379", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-380", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-381", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-382", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-383", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-385", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-386", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-387", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-388", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-389", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-390", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-403", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-424", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-422", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-277", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-410", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-417", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-411", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-412", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-413", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-405", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-406", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-394", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-395", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-396", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-397", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-398", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-407", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-399", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-392", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-400", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-408", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-418", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-409", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-401", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-402", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-404", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-414", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-415", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-416", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-5", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-18", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-46", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-179", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-180", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-199", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-372", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-376", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-373", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-374", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-375", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-419", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-420", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-393", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-423", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-421", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-195", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-306", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-291", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-290", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-289", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-288", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-287", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-369", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-216", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-76", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-58", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-67", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-293", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-268", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-266", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-172", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-41", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-3", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-2", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-178", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-282", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-281", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-299", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-298", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-16", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-294", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-275", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-274", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-273", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-272", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-271", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-270", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-267", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-263", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-261", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-260", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-259", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-257", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-256", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-254", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-253", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-252", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-251", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-250", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-248", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-247", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-246", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-245", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-244", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-242", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-241", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-240", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-239", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-238", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-236", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-235", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-233", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-232", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-231", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-205", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-229", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-228", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-227", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-226", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-224", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-223", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-222", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-221", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-220", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-219", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-218", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-217", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-211", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-210", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-209", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-207", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-201", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-164", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-163", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-182", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-198", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-197", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-196", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-192", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-191", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-190", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-189", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-188", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-187", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-186", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-185", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-184", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-183", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-181", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-174", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-173", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-171", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-170", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-169", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-168", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-167", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-166", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-161", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-160", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-159", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-158", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-157", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-156", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-155", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-154", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-153", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-152", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-150", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-149", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-148", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-147", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-146", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-145", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-144", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-143", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-63", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-62", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-142", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-141", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-140", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-139", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-138", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-137", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-136", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-135", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-134", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-132", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-131", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-130", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-30", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-129", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-128", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-127", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-126", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-125", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-124", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-123", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-122", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-121", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-120", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-119", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-118", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-117", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-116", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-115", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-114", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-113", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-112", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-29", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-111", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-110", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-109", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-108", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-107", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-106", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-105", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-104", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-103", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-102", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-101", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-100", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-99", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-98", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-97", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-96", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-95", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-94", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-93", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-92", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-91", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-90", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-89", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-88", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-87", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-86", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-85", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-84", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-83", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-81", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-80", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-60", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-79", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-78", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-77", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-75", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-74", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-72", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-71", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-70", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-69", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-68", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-66", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-65", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-64", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-59", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-57", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-56", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-55", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-52", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-51", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-50", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-49", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-48", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-47", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-42", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-40", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-39", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-37", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-36", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-362", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-32", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-27", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-25", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-24", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-23", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-22", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-303", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-14", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-7", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-360", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-8", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-15", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-21", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-302", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-215", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-213", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-212", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-203", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-177", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-176", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-175", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-162", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-44", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-28", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-19", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-13", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-295", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-292", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-255", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-200", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-34", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-269", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-310", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-296", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-283", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-237", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-234", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-204", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-202", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-43", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-33", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-20", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-12", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-11", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-10", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-297", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-214", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-9", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-4", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-17", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-284", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-285", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-230", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-45", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-279", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-278", + "https://www.culturecollections.org.uk/nop/product/escherichia-coli-26" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "f79cb2e0-99f5-5946-8dd8-0b3a8a15681c", + "value": "Escherichia coli" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14095" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14095", + "NCTC 14094", + "NCTC 14093", + "NCTC 14092", + "NCTC 14091", + "NCTC 14909", + "NCTC 14908", + "NCTC 14907", + "NCTC 14906", + "NCTC 14905", + "NCTC 14902", + "NCTC 14901", + "NCTC 14900", + "NCTC 14899", + "NCTC 14898", + "NCTC 14897", + "NCTC 14896", + "NCTC 14895", + "NCTC 14894", + "NCTC 13945", + "NCTC 13946", + "NCTC 13947", + "NCTC 13948", + "NCTC 13949", + "NCTC 9993", + "NCTC 9828", + "NCTC 8187", + "NCTC 8182", + "NCTC 11080", + "NCTC 8188", + "NCTC 8542", + "NCTC 8185", + "NCTC 8183", + "NCTC 8181", + "NCTC 8180", + "NCTC 11360", + "NCTC 11242", + "NCTC 6175", + "NCTC 11930", + "NCTC 11079", + "NCTC 8184", + "NCTC 8100", + "NCTC 8017", + "NCTC 8186", + "NCTC 9412", + "NCTC 11078", + "NCTC 11236", + "NCTC 11250", + "NCTC 11254", + "NCTC 11235", + "NCTC 11238", + "NCTC 11240", + "NCTC 11244", + "NCTC 11246", + "NCTC 11247", + "NCTC 11253", + "NCTC 8190", + "NCTC 9411", + "NCTC 12906", + "NCTC 11234", + "NCTC 11243", + "NCTC 11251", + "NCTC 8541", + "NCTC 9415", + "NCTC 12907", + "NCTC 9829", + "NCTC 11241", + "NCTC 11237", + "NCTC 11252", + "NCTC 9410", + "NCTC 11239", + "NCTC 11245", + "NCTC 11248", + "NCTC 11249", + "NCTC 8020", + "NCTC 9409" + ], + "other_collection_numbers": [ + "Type 2" + ], + "product_name": [ + "Streptococcus agalactiae" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-62", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-61", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-60", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-59", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-58", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-76", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-75", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-74", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-73", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-72", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-71", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-70", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-69", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-68", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-67", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-66", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-65", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-64", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-63", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-54", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-53", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-55", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-56", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-57", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-24", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-22", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-12", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-3", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-29", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-13", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-16", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-10", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-8", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-2", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-7", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-49", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-26", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-50", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-28", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-9", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-6", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-4", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-11", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-20", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-27", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-32", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-44", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-48", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-31", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-34", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-36", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-38", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-40", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-41", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-47", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-14", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-19", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-52", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-30", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-37", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-45", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-15", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-21", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-51", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-23", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-25", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-33", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-46", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-18", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-35", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-39", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-42", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-43", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-5", + "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-17" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "7540bb78-efde-593e-b12a-b896a0910c37", + "value": "Streptococcus agalactiae" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14167" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14167", + "NCTC 14166", + "NCTC 14172", + "NCTC 14173", + "NCTC 14169", + "NCTC 13746", + "NCTC 13747", + "NCTC 13748", + "NCTC 13749", + "NCTC 13750", + "NCTC 14175", + "NCTC 14176", + "NCTC 14174", + "NCTC 14171", + "NCTC 14170", + "NCTC 14168", + "NCTC 13574", + "NCTC 13573", + "NCTC 13572", + "NCTC 13569", + "NCTC 13568", + "NCTC 13567", + "NCTC 13566", + "NCTC 13404", + "NCTC 13571", + "NCTC 13307", + "NCTC 12728", + "NCTC 12733", + "NCTC 12726", + "NCTC 11206", + "NCTC 13366", + "NCTC 13565", + "NCTC 12730", + "NCTC 12732", + "NCTC 12734", + "NCTC 11204", + "NCTC 11205", + "NCTC 11208", + "NCTC 13287", + "NCTC 11209", + "NCTC 11223", + "NCTC 12727", + "NCTC 12729", + "NCTC 11382", + "NCTC 12731" + ], + "product_name": [ + "Clostridium difficile" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-48", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-39", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-43", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-44", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-49", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-34", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-35", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-36", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-37", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-38", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-47", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-46", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-45", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-42", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-41", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-40", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-21", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-29", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-28", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-27", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-26", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-25", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-24", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-33", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-32", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-19", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-11", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-16", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-9", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-3", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-30", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-23", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-13", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-15", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-17", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-2", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-5", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-18", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-6", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-7", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-10", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-12", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-8", + "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-14" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "50a0a678-7123-5dbb-b7db-f4f60ea5773d", + "value": "Clostridium difficile" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14611" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14611" + ], + "other_collection_numbers": [ + "ATCC TSD-231" + ], + "product_name": [ + "Campylobacter bilis" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/campylobacter-bilis" + ], + "type_strain": [ + "Type Strain" + ] + }, + "uuid": "223a4d26-0caa-5fdf-be44-35280d2f5c6a", + "value": "Campylobacter bilis" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14420" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14420", + "NCTC 14421", + "NCTC 14422", + "NCTC 14423", + "NCTC 14424", + "NCTC 14419" + ], + "product_name": [ + "Staphylococcus singaporensis" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/staphylococcus-singaporensis-2", + "https://www.culturecollections.org.uk/nop/product/staphylococcus-singaporensis-3", + "https://www.culturecollections.org.uk/nop/product/staphylococcus-singaporensis-4", + "https://www.culturecollections.org.uk/nop/product/staphylococcus-singaporensis-5", + "https://www.culturecollections.org.uk/nop/product/staphylococcus-singaporensis-6", + "https://www.culturecollections.org.uk/nop/product/staphylococcus-singaporensis" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "acf5ed40-fa09-5a16-985d-45f7ca3b6463", + "value": "Staphylococcus singaporensis" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 13866" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 13866" + ], + "other_collection_numbers": [ + "LMG 29779" + ], + "product_name": [ + "Helicobacter enhydrae" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/helicobacter-enhydrae" + ], + "type_strain": [ + "Type Strain" + ] + }, + "uuid": "ec2a8fa0-6147-5a32-bce7-688b5bdc6ea5", + "value": "Helicobacter enhydrae" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14665" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14665", + "NCTC 10910", + "NCTC 10908", + "NCTC 10905", + "NCTC 10902", + "NCTC 13667", + "NCTC 13668", + "NCTC 10911", + "NCTC 10907", + "NCTC 13251", + "NCTC 8474", + "NCTC 10906", + "NCTC 10909", + "NCTC 8189", + "NCTC 8616", + "NCTC 10739", + "NCTC 11089", + "NCTC 10901", + "NCTC 8605" + ], + "product_name": [ + "Bordetella pertussis" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-20", + "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-13", + "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-11", + "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-8", + "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-7", + "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-17", + "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-18", + "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-14", + "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-10", + "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-16", + "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-2", + "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-9", + "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-12", + "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis", + "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-4", + "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-5", + "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-15", + "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-6", + "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-3" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "cf75b2f0-77d1-5f34-8819-84ec4cb79062", + "value": "Bordetella pertussis" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14581" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14581" + ], + "other_collection_numbers": [ + "GTC 22699" + ], + "product_name": [ + "Legionella antarctica" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/legionella-antarctica" + ], + "type_strain": [ + "Type Strain" + ] + }, + "uuid": "640b580f-7cdf-57ca-aa80-26887aa3e92d", + "value": "Legionella antarctica" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14661" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14661" + ], + "other_collection_numbers": [ + "NRRL B-65642" + ], + "product_name": [ + "Vibrio floridensis" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/vibrio-floridensis" + ], + "type_strain": [ + "Type Strain" + ] + }, + "uuid": "85bff88f-9f9f-5edf-ba7b-069b36815c0f", + "value": "Vibrio floridensis" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14038" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14038", + "NCTC 14037", + "NCTC 14035", + "NCTC 11833" + ], + "product_name": [ + "Clostridium paraputrificum" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/clostridium-paraputrificum-3", + "https://www.culturecollections.org.uk/nop/product/clostridium-paraputrificum-2", + "https://www.culturecollections.org.uk/nop/product/clostridium-paraputrificum-4", + "https://www.culturecollections.org.uk/nop/product/clostridium-paraputrificum" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "2af54fb7-4d42-5a74-92a1-9940692d5ea8", + "value": "Clostridium paraputrificum" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14034" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14034", + "NCTC 541", + "NCTC 2917" + ], + "product_name": [ + "Clostridium tertium" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/clostridium-tertium-3", + "https://www.culturecollections.org.uk/nop/product/clostridium-tertium", + "https://www.culturecollections.org.uk/nop/product/clostridium-tertium-2" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "ddc9f2ca-87d5-5254-9a9a-c1d69c08f9af", + "value": "Clostridium tertium" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14036" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14036" + ], + "product_name": [ + "Clostridium cadaveris" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/clostridium-cadaveris" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "5167aea1-6972-5ab7-ba59-95335b8de7a8", + "value": "Clostridium cadaveris" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14449" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14449" + ], + "other_collection_numbers": [ + "LMG 31934" + ], + "product_name": [ + "Franklinella schreckenbergeri" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/franklinella-schreckenbergeri" + ], + "type_strain": [ + "Type Strain" + ] + }, + "uuid": "38d43c96-4070-5687-859b-a9df72e8b2ea", + "value": "Franklinella schreckenbergeri" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14452" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14452" + ], + "other_collection_numbers": [ + "CCUG 74789" + ], + "product_name": [ + "Staphylococcus caledonicus" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/staphylococcus-caledonicus" + ], + "type_strain": [ + "Type Strain" + ] + }, + "uuid": "36b7686b-3b47-59a6-a053-3862f765b974", + "value": "Staphylococcus caledonicus" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14450" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14450" + ], + "other_collection_numbers": [ + "LMG 31935" + ], + "product_name": [ + "Vandammella animalimorsus" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/vandammella-animalimorsus" + ], + "type_strain": [ + "Type Strain" + ] + }, + "uuid": "05d361a6-7166-5949-84e5-5912edc092f2", + "value": "Vandammella animalimorsus" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14468" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14468" + ], + "other_collection_numbers": [ + "CCM 8641; CCUG 67966; CIP 110478; CNCTC 7573; strain 1191" + ], + "product_name": [ + "Acinetobacter colistiniresistens" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/acinetobacter-colistiniresistens" + ], + "type_strain": [ + "Type Strain" + ] + }, + "uuid": "9f9c7c9d-5f45-57be-93ad-cd951c5e1e63", + "value": "Acinetobacter colistiniresistens" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14239" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14239" + ], + "other_collection_numbers": [ + "Type 2" + ], + "product_name": [ + "Salmonella enterica subsp. XI" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-xi" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "cfeb73f2-a211-5c4e-b77d-0b151812004a", + "value": "Salmonella enterica subsp. XI" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14478" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14478", + "NCTC 10727", + "NCTC 13717", + "NCTC 13618", + "NCTC 14383", + "NCTC 14361", + "NCTC 13714", + "NCTC 13715", + "NCTC 13716", + "NCTC 13718", + "NCTC 13719", + "NCTC 13921", + "NCTC 13713", + "NCTC 14207", + "NCTC 13621", + "NCTC 13620", + "NCTC 13619", + "NCTC 10728", + "NCTC 8506", + "NCTC 8203", + "NCTC 8058", + "NCTC 10561", + "NCTC 6749", + "NCTC 13646", + "NCTC 10299", + "NCTC 12934", + "NCTC 12903", + "NCTC 12449", + "NCTC 12448", + "NCTC 12447", + "NCTC 11839", + "NCTC 11452", + "NCTC 11451", + "NCTC 11450", + "NCTC 11449", + "NCTC 11448", + "NCTC 11447", + "NCTC 11446", + "NCTC 11445", + "NCTC 11444", + "NCTC 7244", + "NCTC 6750", + "NCTC 10783", + "NCTC 10782", + "NCTC 10731", + "NCTC 10730", + "NCTC 11456", + "NCTC 11455", + "NCTC 11453", + "NCTC 11443", + "NCTC 11442", + "NCTC 11441", + "NCTC 11440", + "NCTC 5083", + "NCTC 13437", + "NCTC 13359", + "NCTC 12951", + "NCTC 10662", + "NCTC 9433", + "NCTC 13416", + "NCTC 13415", + "NCTC 13414", + "NCTC 10332", + "NCTC 11672", + "NCTC 11673", + "NCTC 10701", + "NCTC 10781", + "NCTC 10784", + "NCTC 8505", + "NCTC 1999", + "NCTC 2000", + "NCTC 950", + "NCTC 6751", + "NCTC 10780", + "NCTC 5940", + "NCTC 7771", + "NCTC 11669", + "NCTC 11670", + "NCTC 11671", + "NCTC 10726", + "NCTC 10729", + "NCTC 11663", + "NCTC 8060" + ], + "other_collection_numbers": [ + "ATCC 15692; CIP 104116; CCUG 56489; JCM 14847; KCTC 1637; NCIMB 10548; Stainer 131" + ], + "product_name": [ + "Pseudomonas aeruginosa" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-91", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-23", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-84", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-74", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-90", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-89", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-81", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-82", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-83", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-85", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-86", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-80", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-87", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-88", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-77", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-76", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-75", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-24", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-15", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-13", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-11", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-19", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-6", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-79", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-17", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-62", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-60", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-59", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-58", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-57", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-56", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-45", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-44", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-43", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-42", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-41", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-40", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-39", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-38", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-37", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-9", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-7", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-31", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-30", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-27", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-26", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-49", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-48", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-46", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-36", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-35", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-34", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-33", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-4", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-69", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-64", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-63", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-20", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-16", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-72", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-71", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-70", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-18", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-54", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-55", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-21", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-29", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-32", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-14", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-2", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-3", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-8", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-28", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-5", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-10", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-51", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-52", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-53", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-22", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-25", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-50", + "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-12" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "66e25ad5-2b5f-5c4b-bee8-ba2315081a38", + "value": "Pseudomonas aeruginosa" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14549" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14549" + ], + "other_collection_numbers": [ + "DSM 112378" + ], + "product_name": [ + "\"Oerskovia douganii\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/oerskovia-douganii" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "3d3d91d1-b330-550f-8384-cbb3b08d7715", + "value": "\"Oerskovia douganii\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14557" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14557" + ], + "other_collection_numbers": [ + "DSM 112381" + ], + "product_name": [ + "\"Oceanitalea stevensii\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/oceanitalea-stevensii" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "172e8905-a51c-5a70-bc9c-a1e01443a0ca", + "value": "\"Oceanitalea stevensii\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14574" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14574" + ], + "product_name": [ + "\"Phocaeicola gallinarum\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/phocaeicola-gallinarum" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "6b7e638c-47bd-5b95-b6d9-f75c81e38a81", + "value": "\"Phocaeicola gallinarum\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14569" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14569" + ], + "other_collection_numbers": [ + "DSM 112355" + ], + "product_name": [ + "\"Corynebacterium gallinarum\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/corynebacterium-gallinarum" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "e3dede12-1e52-52ac-9e53-e45cdab252cb", + "value": "\"Corynebacterium gallinarum\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14563" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14563" + ], + "product_name": [ + "\"Kaistella pullorum\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/kaistella-pullorum" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "a5ba1db8-5702-533a-ad7d-414f77cfdc4e", + "value": "\"Kaistella pullorum\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14545" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14545" + ], + "other_collection_numbers": [ + "DSM 112314" + ], + "product_name": [ + "\"Acinetobacter pecorum\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/acinetobacter-pecorum" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "67921b3b-b60e-5d05-a4a1-9578eadc98b9", + "value": "\"Acinetobacter pecorum\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14552" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14552" + ], + "other_collection_numbers": [ + "DSM 112356" + ], + "product_name": [ + "\"Planococcus wigleyi\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/planococcus-wigleyi-2" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "67e133f1-8d42-5c5c-903b-feab9af1950b", + "value": "\"Planococcus wigleyi\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14546" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14546" + ], + "other_collection_numbers": [ + "DSM 112315" + ], + "product_name": [ + "\"Bacillus norwichensis\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/bacillus-norwichensis" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "cf126ce5-4717-53ae-a493-8bd5af887257", + "value": "\"Bacillus norwichensis\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14578" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14578" + ], + "product_name": [ + "\"Solibacillus faecavium\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/solibacillus-faecavium" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "886c00d1-be4a-5b24-b3dc-aa762d092fa7", + "value": "\"Solibacillus faecavium\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14547" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14547" + ], + "other_collection_numbers": [ + "DSM 112317" + ], + "product_name": [ + "\"Brevibacterium gallinarum\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/brevibacterium-gallinarum" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "fa5e3155-b0c8-5983-ae85-a5cec27161b0", + "value": "\"Brevibacterium gallinarum\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14559" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14559" + ], + "other_collection_numbers": [ + "DSM 112319" + ], + "product_name": [ + "\"Arthrobacter pullicola\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/arthrobacter-pullicola" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "ce75646c-2e0f-51e3-8111-259af248d489", + "value": "\"Arthrobacter pullicola\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14576" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14576" + ], + "product_name": [ + "\"Ureibacillus galli\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/ureibacillus-galli" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "06b6eb64-5fd3-5492-9332-b601d2f527ac", + "value": "\"Ureibacillus galli\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14560" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14560" + ], + "other_collection_numbers": [ + "DSM 112320" + ], + "product_name": [ + "\"Arthrobacter gallicola\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/arthrobacter-gallicola" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "fa65ad53-998a-50fe-8739-d7d1658e09cc", + "value": "\"Arthrobacter gallicola\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14618" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14618" + ], + "other_collection_numbers": [ + "DSM 112377" + ], + "product_name": [ + "\"Serpens gallinarum\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/serpens-gallinarum" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "8daa788b-e1b7-5387-aac6-dbdbee29bd1a", + "value": "\"Serpens gallinarum\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14554" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14554" + ], + "other_collection_numbers": [ + "DSM 112358" + ], + "product_name": [ + "\"Oerskovia merdavium\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/oerskovia-merdavium" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "f66c0a29-5690-5eb5-9c1a-b004425fef3e", + "value": "\"Oerskovia merdavium\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14550" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14550" + ], + "other_collection_numbers": [ + "DSM 112379" + ], + "product_name": [ + "\"Oerskovia gallyi\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/oerskovia-gallyi" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "386298fc-4c8a-547c-9728-ab6963d37152", + "value": "\"Oerskovia gallyi\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14555" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14555" + ], + "other_collection_numbers": [ + "DSM 112359" + ], + "product_name": [ + "\"Ochrobacterum gallinarum\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/ochrobacterum-gallinarum" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "36c5769e-a315-56e7-a65b-54952a144eb0", + "value": "\"Ochrobacterum gallinarum\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14567" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14567" + ], + "other_collection_numbers": [ + "DSM 112323" + ], + "product_name": [ + "\"Escherichia whittamii\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/escherichia-whittamii" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "712f0ea5-2498-5f83-a741-cf6969c77f9f", + "value": "\"Escherichia whittamii\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14571" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14571" + ], + "product_name": [ + "\"Comamonas avium\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/comamonas-avium" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "ad84a875-71e7-5c27-8a82-b68008230bf9", + "value": "\"Comamonas avium\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14570" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14570" + ], + "other_collection_numbers": [ + "DSM 112464" + ], + "product_name": [ + "\"Luteimonas colneyensis\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/luteimonas-colneyensis" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "3039967a-db29-59aa-8dde-0e11a70b68ea", + "value": "\"Luteimonas colneyensis\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14573" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14573" + ], + "product_name": [ + "\"Paenibacillus gallinarum\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/paenibacillus-gallinarum" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "48d9f67f-9b3d-56a5-9d67-97ce14dc5ed0", + "value": "\"Paenibacillus gallinarum\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14703" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14703" + ], + "other_collection_numbers": [ + "DSM 112361" + ], + "product_name": [ + "\"Sporosarcina quadrami\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/sporosarcina-quadrami" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "70cd1d99-a1ce-545e-8d87-6b88250bdce2", + "value": "\"Sporosarcina quadrami\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14577" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14577" + ], + "product_name": [ + "\"Stenotrophomonas pennii\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/stenotrophomonas-pennii" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "65e97222-10b9-59b5-a7e2-e08ba61b05ee", + "value": "\"Stenotrophomonas pennii\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14562" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14562" + ], + "other_collection_numbers": [ + "DSM 112390" + ], + "product_name": [ + "\"Microbacterium pullorum\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/microbacterium-pullorum" + ], + "type_strain": [ + "Type Strain" + ] + }, + "uuid": "144ff6d2-2b63-5d29-97b9-74f0544230c8", + "value": "\"Microbacterium pullorum\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14553" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14553" + ], + "other_collection_numbers": [ + "DSM 112357" + ], + "product_name": [ + "\"Psychrobacter communis\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/psychrobacter-communis" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "0ae5e6f7-7417-5004-a73f-2452817468ea", + "value": "\"Psychrobacter communis\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14564" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14564" + ], + "other_collection_numbers": [ + "DSM 112321" + ], + "product_name": [ + "\"Cellulomonas avistercoris\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/cellulomonas-avistercoris" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "342d2551-316c-5a97-8657-b5050f9049ff", + "value": "\"Cellulomonas avistercoris\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14551" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14551" + ], + "other_collection_numbers": [ + "DSM 112360" + ], + "product_name": [ + "\"Sporosarcina gallistercoris\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/sporosarcina-gallistercoris" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "037bb842-7413-55bc-93a3-2f529fc971aa", + "value": "\"Sporosarcina gallistercoris\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14558" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14558" + ], + "other_collection_numbers": [ + "DSM 112318" + ], + "product_name": [ + "\"Brevundimonas guildfordensis\"" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/brevundimonas-guildfordensis" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "878c2f54-dd70-5d67-b974-7c8baa132b50", + "value": "\"Brevundimonas guildfordensis\"" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14580" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14580" + ], + "other_collection_numbers": [ + "GTC 22698" + ], + "product_name": [ + "Pseudomonas tohonis" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/pseudomonas-tohonis" + ], + "type_strain": [ + "Type Strain" + ] + }, + "uuid": "9335ee5f-5e53-5eec-97b0-ddad18a436a8", + "value": "Pseudomonas tohonis" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14844" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14844", + "NCTC 14835", + "NCTC 13348", + "NCTC 74", + "NCTC 14006", + "NCTC 14020", + "NCTC 14011", + "NCTC 13954", + "NCTC 14029", + "NCTC 14028", + "NCTC 13952", + "NCTC 14016", + "NCTC 14186", + "NCTC 14007", + "NCTC 14008", + "NCTC 14009", + "NCTC 14010", + "NCTC 14015", + "NCTC 14017", + "NCTC 14018", + "NCTC 14019", + "NCTC 14021", + "NCTC 14022", + "NCTC 14023", + "NCTC 14026", + "NCTC 14030", + "NCTC 14031", + "NCTC 12023", + "NCTC 13347", + "NCTC 13171", + "NCTC 12485", + "NCTC 12484", + "NCTC 12416", + "NCTC 12190", + "NCTC 12118", + "NCTC 12117", + "NCTC 12116", + "NCTC 12115", + "NCTC 10413", + "NCTC 8392", + "NCTC 9324", + "NCTC 8391", + "NCTC 8298", + "NCTC 5715", + "NCTC 5714", + "NCTC 5713", + "NCTC 5712", + "NCTC 5711", + "NCTC 5710", + "NCTC 4782", + "NCTC 3048", + "NCTC 73", + "NCTC 11881" + ], + "other_collection_numbers": [ + "M102" + ], + "product_name": [ + "Salmonella enterica subsp. enterica serotype Typhimurium" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-59", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-58", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-28", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-2", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-53", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-46", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-44", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-50", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-48", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-47", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-51", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-45", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-52", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-29", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-30", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-31", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-32", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-33", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-34", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-35", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-36", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-37", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-38", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-39", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-40", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-42", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-49", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-17", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-27", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-26", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-25", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-24", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-23", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-22", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-21", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-20", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-19", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-18", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-15", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-13", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-14", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-12", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-11", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-10", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-9", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-8", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-7", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-6", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-5", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-4", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-3", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-16" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "cb8e9dc6-5934-5aa8-b064-25e93c69dc56", + "value": "Salmonella enterica subsp. enterica serotype Typhimurium" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14617" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14617", "NCTC 13812", "NCTC 13811", "NCTC 13435", "NCTC 14636", "NCTC 14637", "NCTC 14579", - "NCTC 14617", "NCTC 14462", "NCTC 14464", "NCTC 14465", @@ -229,20 +2990,17 @@ "NCTC 9318", "NCTC 12497" ], - "other_collection_numbers": [ - "UT 25, HIP13163, BAA-976" - ], "product_name": [ "Staphylococcus aureus" ], "refs": [ + "https://www.culturecollections.org.uk/nop/product/staphylococcus-aureus-216", "https://www.culturecollections.org.uk/nop/product/staphylococcus-aureus-201", "https://www.culturecollections.org.uk/nop/product/staphylococcus-aureus-200", "https://www.culturecollections.org.uk/nop/product/staphylococcus-aureus-195", "https://www.culturecollections.org.uk/nop/product/staphylococcus-aureus-218", "https://www.culturecollections.org.uk/nop/product/staphylococcus-aureus-217", "https://www.culturecollections.org.uk/nop/product/staphylococcus-aureus-215", - "https://www.culturecollections.org.uk/nop/product/staphylococcus-aureus-216", "https://www.culturecollections.org.uk/nop/product/staphylococcus-aureus-214", "https://www.culturecollections.org.uk/nop/product/staphylococcus-aureus-213", "https://www.culturecollections.org.uk/nop/product/staphylococcus-aureus-212", @@ -457,12 +3215,90 @@ { "meta": { "catalogue_number": [ - "NCTC 13810" + "NCTC 14240" ], "collection": [ "NCTC" ], "external_id": [ + "NCTC 14240" + ], + "product_name": [ + "Salmonella enterica subsp. essexiensis" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-essexiensis" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "56005325-1ddc-5434-89f2-ec6133280514", + "value": "Salmonella enterica subsp. essexiensis" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14831" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14831", + "NCTC 13665", + "NCTC 6676", + "NCTC 4444", + "NCTC 13349", + "NCTC 12694", + "NCTC 618", + "NCTC 8515", + "NCTC 5765", + "NCTC 5694", + "NCTC 5188", + "NCTC 4777", + "NCTC 4776", + "NCTC 3045" + ], + "other_collection_numbers": [ + "M89" + ], + "product_name": [ + "Salmonella enterica subsp. enterica serotype Enteritidis" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-21", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-13", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-9", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-3", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-12", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-11", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-10", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-8", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-7", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-6", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-5", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-4", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-2" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "f0725682-b0c5-50ef-8ac8-b0eda0a5eccb", + "value": "Salmonella enterica subsp. enterica serotype Enteritidis" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14052" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14052", "NCTC 13810", "NCTC 13809", "NCTC 9143", @@ -493,7 +3329,6 @@ "NCTC 9156", "NCTC 9144", "NCTC 14110", - "NCTC 14052", "NCTC 13699", "NCTC 13694", "NCTC 13691", @@ -613,13 +3448,11 @@ "NCTC 10896", "NCTC 9634" ], - "other_collection_numbers": [ - "AIS 2007023, BAA-1706" - ], "product_name": [ "Klebsiella pneumoniae" ], "refs": [ + "https://www.culturecollections.org.uk/nop/product/klebsiella-pneumoniae-138", "https://www.culturecollections.org.uk/nop/product/klebsiella-pneumoniae-137", "https://www.culturecollections.org.uk/nop/product/klebsiella-pneumoniae-136", "https://www.culturecollections.org.uk/nop/product/klebsiella-pneumoniae-14", @@ -650,7 +3483,6 @@ "https://www.culturecollections.org.uk/nop/product/klebsiella-pneumoniae-21", "https://www.culturecollections.org.uk/nop/product/klebsiella-pneumoniae-15", "https://www.culturecollections.org.uk/nop/product/klebsiella-pneumoniae-139", - "https://www.culturecollections.org.uk/nop/product/klebsiella-pneumoniae-138", "https://www.culturecollections.org.uk/nop/product/klebsiella-pneumoniae-129", "https://www.culturecollections.org.uk/nop/product/klebsiella-pneumoniae-101", "https://www.culturecollections.org.uk/nop/product/klebsiella-pneumoniae-126", @@ -780,193 +3612,522 @@ { "meta": { "catalogue_number": [ - "NCTC 14478" + "NCTC 14385" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14478", - "NCTC 10727", - "NCTC 13717", - "NCTC 13618", - "NCTC 14383", - "NCTC 14361", - "NCTC 13714", - "NCTC 13715", - "NCTC 13716", - "NCTC 13718", - "NCTC 13719", - "NCTC 13921", - "NCTC 13713", - "NCTC 14207", - "NCTC 13621", - "NCTC 13620", - "NCTC 13619", - "NCTC 10728", - "NCTC 8506", - "NCTC 8203", - "NCTC 8058", - "NCTC 10561", - "NCTC 6749", - "NCTC 13646", - "NCTC 10299", - "NCTC 12934", - "NCTC 12903", - "NCTC 12449", - "NCTC 12448", - "NCTC 12447", - "NCTC 11839", - "NCTC 11452", - "NCTC 11451", - "NCTC 11450", - "NCTC 11449", - "NCTC 11448", - "NCTC 11447", - "NCTC 11446", - "NCTC 11445", - "NCTC 11444", - "NCTC 7244", - "NCTC 6750", - "NCTC 10783", - "NCTC 10782", - "NCTC 10731", - "NCTC 10730", - "NCTC 11456", - "NCTC 11455", - "NCTC 11453", - "NCTC 11443", - "NCTC 11442", - "NCTC 11441", - "NCTC 11440", - "NCTC 5083", - "NCTC 13437", - "NCTC 13359", - "NCTC 12951", - "NCTC 10662", - "NCTC 9433", - "NCTC 13416", - "NCTC 13415", - "NCTC 13414", - "NCTC 10332", - "NCTC 11672", - "NCTC 11673", - "NCTC 10701", - "NCTC 10781", - "NCTC 10784", - "NCTC 8505", - "NCTC 1999", - "NCTC 2000", - "NCTC 950", - "NCTC 6751", - "NCTC 10780", - "NCTC 5940", - "NCTC 7771", - "NCTC 11669", - "NCTC 11670", - "NCTC 11671", - "NCTC 10726", - "NCTC 10729", - "NCTC 11663", - "NCTC 8060" - ], - "other_collection_numbers": [ - "ATCC 15692; CIP 104116; CCUG 56489; JCM 14847; KCTC 1637; NCIMB 10548; Stainer 131" + "NCTC 14385" ], "product_name": [ - "Pseudomonas aeruginosa" + "Clostridioides difficile" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-91", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-23", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-84", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-74", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-90", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-89", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-81", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-82", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-83", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-85", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-86", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-80", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-87", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-88", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-77", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-76", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-75", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-24", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-15", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-13", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-11", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-19", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-6", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-79", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-17", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-62", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-60", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-59", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-58", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-57", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-56", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-45", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-44", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-43", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-42", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-41", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-40", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-39", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-38", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-37", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-9", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-7", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-31", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-30", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-27", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-26", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-49", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-48", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-46", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-36", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-35", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-34", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-33", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-4", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-69", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-64", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-63", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-20", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-16", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-72", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-71", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-70", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-18", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-54", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-55", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-21", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-29", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-32", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-14", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-2", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-3", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-8", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-28", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-5", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-10", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-51", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-52", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-53", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-22", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-25", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-50", - "https://www.culturecollections.org.uk/nop/product/pseudomonas-aeruginosa-12" + "https://www.culturecollections.org.uk/nop/product/clostridioides-difficile" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "66e25ad5-2b5f-5c4b-bee8-ba2315081a38", - "value": "Pseudomonas aeruginosa" + "uuid": "7ac2c672-40cd-564e-a89c-52bde9c7f7e0", + "value": "Clostridioides difficile" + }, + { + "meta": { + "catalogue_number": [ + "91031101" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "None Stated" + ], + "external_id": [ + "91031101" + ], + "product_name": [ + "C2C12" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/c2c12" + ], + "species": [ + "Mouse" + ], + "tissue_of_origin": [ + "Muscle" + ] + }, + "uuid": "8b585db8-e54f-5fb2-8995-9d9decd2cb62", + "value": "C2C12" + }, + { + "meta": { + "antibody_isotype": [ + "None Secreted" + ], + "catalogue_number": [ + "94120825" + ], + "collection": [ + "Hybridoma" + ], + "external_id": [ + "94120825" + ], + "product_name": [ + "AFRC 17D1" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/afrc-17d1" + ], + "target_(reactivity)": [ + "Non Ig secreting" + ] + }, + "uuid": "0af34fa4-f923-5f85-becd-78c7b731a5f7", + "value": "AFRC 17D1" + }, + { + "meta": { + "catalogue_number": [ + "90011806" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "None Stated" + ], + "external_id": [ + "90011806" + ], + "product_name": [ + "142BR" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/142br" + ], + "species": [ + "Human" + ], + "tissue_of_origin": [ + "Skin" + ] + }, + "uuid": "1d09cf61-b1f3-5477-8e7d-3a96ec7a4e28", + "value": "142BR" + }, + { + "meta": { + "catalogue_number": [ + "01110916" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "None Stated" + ], + "external_id": [ + "01110916" + ], + "product_name": [ + "E11" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/e11-2" + ], + "species": [ + "Fish" + ], + "tissue_of_origin": [ + "Other" + ] + }, + "uuid": "58e5d3c8-11fc-57ed-abe6-101cb2eb8042", + "value": "E11" + }, + { + "meta": { + "catalogue_number": [ + "95122020" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "None Stated" + ], + "external_id": [ + "95122020" + ], + "product_name": [ + "STE-137" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/ste-137" + ], + "species": [ + "Fish" + ], + "tissue_of_origin": [ + "Embryo" + ] + }, + "uuid": "bb4ebbfd-8cd3-59a3-a011-1745d593d988", + "value": "STE-137" + }, + { + "meta": { + "catalogue_number": [ + "90031401" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "None Stated" + ], + "external_id": [ + "90031401" + ], + "product_name": [ + "FER" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/fer" + ], + "species": [ + "Feline" + ], + "tissue_of_origin": [ + "Embryo" + ] + }, + "uuid": "c135f1c2-f92e-550c-8647-14435ce71adb", + "value": "FER" + }, + { + "meta": { + "catalogue_number": [ + "87021902" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "Neoplasms" + ], + "external_id": [ + "87021902" + ], + "product_name": [ + "AtT20" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/att20" + ], + "species": [ + "Mouse" + ], + "tissue_of_origin": [ + "Pituitary gland" + ] + }, + "uuid": "11d7063e-1fca-5f31-98aa-673fe0861da2", + "value": "AtT20" + }, + { + "meta": { + "catalogue_number": [ + "06100302" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "Myeloma" + ], + "external_id": [ + "06100302" + ], + "product_name": [ + "KARPAS-417" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/karpas-417" + ], + "species": [ + "Human" + ], + "tissue_of_origin": [ + "Blood" + ] + }, + "uuid": "f61f627c-65bc-53d3-844a-10f521fc0790", + "value": "KARPAS-417" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 15041" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 15041", + "NCTC 15040", + "NCTC 15039", + "NCTC 15037", + "NCTC 15036", + "NCTC 15035", + "NCTC 15034", + "NCTC 15033", + "NCTC 15032", + "NCTC 15031", + "NCTC 15030", + "NCTC 15029", + "NCTC 15026", + "NCTC 15025", + "NCTC 15024", + "NCTC 15014", + "NCTC 15013", + "NCTC 15012", + "NCTC 15006", + "NCTC 15005", + "NCTC 15004", + "NCTC 15003", + "NCTC 15002", + "NCTC 15001", + "NCTC 15000", + "NCTC 14999", + "NCTC 14997", + "NCTC 15017", + "NCTC 15016", + "NCTC 15015", + "NCTC 15011", + "NCTC 15010", + "NCTC 15009", + "NCTC 15008", + "NCTC 15007", + "NCTC 14992", + "NCTC 14991", + "NCTC 14990", + "NCTC 14989", + "NCTC 14988", + "NCTC 14996", + "NCTC 14995", + "NCTC 14994" + ], + "other_collection_numbers": [ + "C115" + ], + "product_name": [ + "Clostridiodes difficile" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-44", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-43", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-42", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-41", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-40", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-39", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-38", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-37", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-36", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-35", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-33", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-32", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-31", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-30", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-29", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-25", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-24", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-23", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-17", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-16", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-15", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-14", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-13", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-12", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-11", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-10", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-9", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-28", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-27", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-26", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-22", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-21", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-20", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-19", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-18", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-5", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-4", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-3", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-2", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-8", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-7", + "https://www.culturecollections.org.uk/nop/product/clostridiodes-difficile-6" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "2aef175e-dbf5-5730-a072-0bac357eb5c6", + "value": "Clostridiodes difficile" + }, + { + "meta": { + "catalogue_number": [ + "98110201" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "Cancer" + ], + "external_id": [ + "98110201" + ], + "product_name": [ + "SHP-77" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/shp-77" + ], + "species": [ + "Human" + ], + "tissue_of_origin": [ + "Lung" + ] + }, + "uuid": "5e704562-c0a0-5dd3-94af-6cba15fc4627", + "value": "SHP-77" + }, + { + "meta": { + "catalogue_number": [ + "10092307" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "Mesothelioma" + ], + "external_id": [ + "10092307" + ], + "product_name": [ + "AB22" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/ab22-2" + ], + "species": [ + "Mouse" + ], + "tissue_of_origin": [ + "Lung" + ] + }, + "uuid": "857d57a9-d401-5fcf-b572-72376d79a253", + "value": "AB22" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 14222" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 14222" + ], + "other_collection_numbers": [ + "Type 2" + ], + "product_name": [ + "Yersinia hibernica" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/yersinia-hibernica" + ], + "type_strain": [ + "Type Strain" + ] + }, + "uuid": "a93d7b20-28fd-5875-a142-d20537ee2291", + "value": "Yersinia hibernica" + }, + { + "meta": { + "catalogue_number": [ + "NCPF 0896" + ], + "collection": [ + "NCPF" + ], + "external_id": [ + "NCPF 0896", + "NCPF 0843", + "NCPF 0824" + ], + "product_name": [ + "Trichophyton yaoundei" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/trichophyton-yaoundei-3", + "https://www.culturecollections.org.uk/nop/product/trichophyton-yaoundei-2", + "https://www.culturecollections.org.uk/nop/product/trichophyton-yaoundei" + ], + "site_of_origin": [ + "Scalp" + ], + "source": [ + "Human origin" + ] + }, + "uuid": "ab0a7c81-67ba-5d39-90c5-752faf27eb99", + "value": "Trichophyton yaoundei" + }, + { + "meta": { + "catalogue_number": [ + "88071401" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "None Stated" + ], + "external_id": [ + "88071401" + ], + "product_name": [ + "IEC 6" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/iec-6" + ], + "species": [ + "Rat" + ], + "tissue_of_origin": [ + "Intestine" + ] + }, + "uuid": "22ab8446-74a2-5a01-84c4-d8990caedb42", + "value": "IEC 6" }, { "meta": { @@ -998,6 +4159,526 @@ "uuid": "f7b4291a-cbbd-5197-b83c-83098fef75ec", "value": "RAW 264.7" }, + { + "meta": { + "age": [ + "Multiple" + ], + "catalogue_number": [ + "06041305" + ], + "collection": [ + "Human Random Control" + ], + "ethnic_origin": [ + "UK Caucasian" + ], + "external_id": [ + "06041305" + ], + "gender": [ + "Male and Female" + ], + "product_name": [ + "HRC-5 DNA Panel" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/hrc-5-dna-panel" + ] + }, + "uuid": "c1721423-b3d6-5992-836f-36492e9c2d10", + "value": "HRC-5 DNA Panel" + }, + { + "meta": { + "age": [ + "Multiple" + ], + "catalogue_number": [ + "06041302" + ], + "collection": [ + "Human Random Control" + ], + "ethnic_origin": [ + "UK Caucasian" + ], + "external_id": [ + "06041302" + ], + "gender": [ + "Male and Female" + ], + "product_name": [ + "HRC-2 DNA Panel" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/hrc-2-dna-panel" + ] + }, + "uuid": "af4bb9f1-a885-507b-991f-2a6035360a44", + "value": "HRC-2 DNA Panel" + }, + { + "meta": { + "age": [ + "Multiple" + ], + "catalogue_number": [ + "06041301" + ], + "collection": [ + "Human Random Control" + ], + "ethnic_origin": [ + "UK Caucasian" + ], + "external_id": [ + "06041301" + ], + "gender": [ + "Male and Female" + ], + "product_name": [ + "HRC-1 DNA Panel" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/hrc-1-dna-panel" + ] + }, + "uuid": "824de504-473b-5b60-bcce-0df493f49229", + "value": "HRC-1 DNA Panel" + }, + { + "meta": { + "catalogue_number": [ + "1806152v" + ], + "collection": [ + "NCPV" + ], + "external_id": [ + "1806152v", + "1806156v", + "0104151v", + "1806153v", + "1806154v", + "1806157v", + "1806146v", + "1806147v", + "1806145v" + ], + "hazard_group_(acdp)": [ + "ACDP HG2" + ], + "product_name": [ + "Herpes simplex virus 1" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/herpes-simplex-virus-1-13", + "https://www.culturecollections.org.uk/nop/product/herpes-simplex-virus-1-9", + "https://www.culturecollections.org.uk/nop/product/herpes-simplex-virus-1-7", + "https://www.culturecollections.org.uk/nop/product/herpes-simplex-virus-1-6", + "https://www.culturecollections.org.uk/nop/product/herpes-simplex-virus-1-5", + "https://www.culturecollections.org.uk/nop/product/herpes-simplex-virus-1-4", + "https://www.culturecollections.org.uk/nop/product/herpes-simplex-virus-1-3", + "https://www.culturecollections.org.uk/nop/product/herpes-simplex-virus-1-2", + "https://www.culturecollections.org.uk/nop/product/herpes-simplex-virus-1" + ], + "strain_designation": [ + "P15" + ] + }, + "uuid": "ba189b7b-19a6-5f19-bafb-bb58bc8cab68", + "value": "Herpes simplex virus 1" + }, + { + "meta": { + "catalogue_number": [ + "96090512" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "Lymphoma" + ], + "external_id": [ + "96090512" + ], + "product_name": [ + "Ci-1 (formerly known as Ri-1)" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/ci-1-formerly-known-as-ri-1" + ], + "species": [ + "Human" + ], + "tissue_of_origin": [ + "Blood" + ] + }, + "uuid": "9b4bf743-bf10-5af9-bf29-77ecf2abfa3f", + "value": "Ci-1 (formerly known as Ri-1)" + }, + { + "meta": { + "catalogue_number": [ + "02050101" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "None Stated" + ], + "external_id": [ + "02050101" + ], + "product_name": [ + "MDCK-Protein Free" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/mdck-protein-free" + ], + "species": [ + "Canine" + ], + "tissue_of_origin": [ + "Kidney" + ] + }, + "uuid": "b41de6c1-763a-532a-9769-b38e528c220b", + "value": "MDCK-Protein Free" + }, + { + "meta": { + "catalogue_number": [ + "93120820" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "None Stated" + ], + "external_id": [ + "93120820" + ], + "product_name": [ + "EPC" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/epc" + ], + "species": [ + "Fish" + ], + "tissue_of_origin": [ + "Skin" + ] + }, + "uuid": "82b416f5-f000-57a5-86c6-c05c39e9f3bc", + "value": "EPC" + }, + { + "meta": { + "catalogue_number": [ + "09061602" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "None Stated" + ], + "external_id": [ + "09061602" + ], + "product_name": [ + "h1RPE7" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/h1rpe7" + ], + "species": [ + "Human" + ], + "tissue_of_origin": [ + "Eye" + ] + }, + "uuid": "35f06f3f-8684-52eb-ba88-11ed694c985f", + "value": "h1RPE7" + }, + { + "meta": { + "catalogue_number": [ + "87061209" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "Small Cell Carcinoma" + ], + "external_id": [ + "87061209" + ], + "product_name": [ + "COLO 668" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/colo-668" + ], + "species": [ + "Human" + ], + "tissue_of_origin": [ + "Lung" + ] + }, + "uuid": "4578cafb-b306-5780-992a-cfbc14c59f0b", + "value": "COLO 668" + }, + { + "meta": { + "catalogue_number": [ + "07071902" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "Carcinoma" + ], + "external_id": [ + "07071902" + ], + "product_name": [ + "COV504" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/cov504" + ], + "species": [ + "Human" + ], + "tissue_of_origin": [ + "Ovary" + ] + }, + "uuid": "b47725d8-3151-575f-aaf4-964c7d1fbdb6", + "value": "COV504" + }, + { + "meta": { + "catalogue_number": [ + "10112001" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "None Stated" + ], + "external_id": [ + "10112001" + ], + "product_name": [ + "COCA" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/coca" + ], + "species": [ + "Mouse" + ], + "tissue_of_origin": [ + "Skin" + ] + }, + "uuid": "9f87a0f6-9387-5013-80d2-4ff037654782", + "value": "COCA" + }, + { + "meta": { + "catalogue_number": [ + "95051033" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "Non-Hodgkin Lymphoma" + ], + "external_id": [ + "95051033" + ], + "product_name": [ + "My-La, Lymphoma" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/my-la-lymphoma" + ], + "species": [ + "Human" + ], + "tissue_of_origin": [ + "Lymph node" + ] + }, + "uuid": "d81e7917-8d64-54e2-9769-94b145ef15eb", + "value": "My-La, Lymphoma" + }, + { + "meta": { + "catalogue_number": [ + "93093002" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "None Stated" + ], + "external_id": [ + "93093002" + ], + "product_name": [ + "MOH (TOU II-3)" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/moh-tou-ii-3" + ], + "species": [ + "Human" + ], + "tissue_of_origin": [ + "Blood" + ] + }, + "uuid": "a7f37247-d004-504a-a189-95bb809b8d9f", + "value": "MOH (TOU II-3)" + }, + { + "meta": { + "catalogue_number": [ + "00030814" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "None Stated" + ], + "external_id": [ + "00030814" + ], + "product_name": [ + "IIC9 (CH0)" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/iic9-ch0" + ], + "species": [ + "Hamster" + ], + "tissue_of_origin": [ + "Embryo" + ] + }, + "uuid": "82195ed6-83cc-5615-9bd4-b4c1ae1e3802", + "value": "IIC9 (CH0)" + }, + { + "meta": { + "catalogue_number": [ + "NCTC 506" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 506" + ], + "other_collection_numbers": [ + "F. 1, CN 4781, NCIB 506, WDCM 00079" + ], + "product_name": [ + "Paraclostridium bifermentans" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/paraclostridium-bifermentans" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "cb9d6a3b-b5c3-5e9d-8671-ea4b5cbea45c", + "value": "Paraclostridium bifermentans" + }, + { + "meta": { + "catalogue_number": [ + "91091004" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "Adenocarcinoma" + ], + "external_id": [ + "91091004" + ], + "product_name": [ + "SK-OV-3" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/sk-ov-3" + ], + "species": [ + "Human" + ], + "tissue_of_origin": [ + "Ovary" + ] + }, + "uuid": "bf7bfd2f-eace-509e-ab52-e7d37f3cff83", + "value": "SK-OV-3" + }, + { + "meta": { + "catalogue_number": [ + "93061524" + ], + "collection": [ + "General Cell" + ], + "disease": [ + "None Stated" + ], + "external_id": [ + "93061524" + ], + "product_name": [ + "NIH 3T3" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/nih-3t3" + ], + "species": [ + "Mouse" + ], + "tissue_of_origin": [ + "Embryo" + ] + }, + "uuid": "e98ac60e-adc3-5c3d-9885-d20c07d41ef6", + "value": "NIH 3T3" + }, { "meta": { "catalogue_number": [ @@ -2452,36 +6133,6 @@ "uuid": "90ede254-bdd4-54ac-b3e9-eeecff0508d6", "value": "Meyerozyma guilliermondii" }, - { - "meta": { - "catalogue_number": [ - "95051033" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "Non-Hodgkin Lymphoma" - ], - "external_id": [ - "95051033" - ], - "product_name": [ - "My-La CD8+" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/my-la-cd8" - ], - "species": [ - "Human" - ], - "tissue_of_origin": [ - "Lymph node" - ] - }, - "uuid": "8f885509-b77b-5ba5-b384-305788f5684f", - "value": "My-La CD8+" - }, { "meta": { "catalogue_number": [ @@ -2512,47 +6163,6 @@ "uuid": "0c157ecd-3002-535f-a288-8dd1b7a9ee6d", "value": "Grunt Fin (GF)" }, - { - "meta": { - "catalogue_number": [ - "1806156v" - ], - "collection": [ - "NCPV" - ], - "external_id": [ - "1806156v", - "0104151v", - "1806153v", - "1806154v", - "1806157v", - "1806146v", - "1806147v", - "1806145v" - ], - "hazard_group_(acdp)": [ - "ACDP HG2" - ], - "product_name": [ - "Herpes simplex virus 1" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/herpes-simplex-virus-1-9", - "https://www.culturecollections.org.uk/nop/product/herpes-simplex-virus-1-7", - "https://www.culturecollections.org.uk/nop/product/herpes-simplex-virus-1-6", - "https://www.culturecollections.org.uk/nop/product/herpes-simplex-virus-1-5", - "https://www.culturecollections.org.uk/nop/product/herpes-simplex-virus-1-4", - "https://www.culturecollections.org.uk/nop/product/herpes-simplex-virus-1-3", - "https://www.culturecollections.org.uk/nop/product/herpes-simplex-virus-1-2", - "https://www.culturecollections.org.uk/nop/product/herpes-simplex-virus-1" - ], - "strain_designation": [ - "P18" - ] - }, - "uuid": "ba189b7b-19a6-5f19-bafb-bb58bc8cab68", - "value": "Herpes simplex virus 1" - }, { "meta": { "catalogue_number": [ @@ -3349,829 +6959,6 @@ "uuid": "9f8aef5e-4abd-514f-a2c9-f166f880a52e", "value": "Rhodococcus hoagii" }, - { - "meta": { - "catalogue_number": [ - "NCTC 9091" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 9091", - "NCTC 4169", - "NCTC 8006", - "NCTC 14916", - "NCTC 14805", - "NCTC 9112", - "NCTC 9008", - "NCTC 9024", - "NCTC 9033", - "NCTC 9036", - "NCTC 9087", - "NCTC 8620", - "NCTC 8623", - "NCTC 9009", - "NCTC 10650", - "NCTC 10962", - "NCTC 11116", - "NCTC 11129", - "NCTC 11131", - "NCTC 11132", - "NCTC 11560", - "NCTC 11954", - "NCTC 13351", - "NCTC 13352", - "NCTC 13353", - "NCTC 13400", - "NCTC 13441", - "NCTC 13450", - "NCTC 13451", - "NCTC 13452", - "NCTC 13461", - "NCTC 13462", - "NCTC 13463", - "NCTC 13919", - "NCTC 14746", - "NCTC 86", - "NCTC 14692", - "NCTC 14744", - "NCTC 14745", - "NCTC 14367", - "NCTC 14476", - "NCTC 14477", - "NCTC 14582", - "NCTC 14380", - "NCTC 14379", - "NCTC 14378", - "NCTC 14381", - "NCTC 14376", - "NCTC 14377", - "NCTC 14338", - "NCTC 14333", - "NCTC 14320", - "NCTC 14364", - "NCTC 14374", - "NCTC 14373", - "NCTC 13846", - "NCTC 14372", - "NCTC 14371", - "NCTC 14370", - "NCTC 14369", - "NCTC 14368", - "NCTC 14366", - "NCTC 14365", - "NCTC 14324", - "NCTC 14329", - "NCTC 14321", - "NCTC 14339", - "NCTC 13624", - "NCTC 13958", - "NCTC 13968", - "NCTC 13959", - "NCTC 13960", - "NCTC 13961", - "NCTC 13962", - "NCTC 13964", - "NCTC 13966", - "NCTC 13969", - "NCTC 13971", - "NCTC 13973", - "NCTC 13974", - "NCTC 13976", - "NCTC 13982", - "NCTC 13992", - "NCTC 14325", - "NCTC 14205", - "NCTC 11601", - "NCTC 13994", - "NCTC 13996", - "NCTC 13997", - "NCTC 13998", - "NCTC 13999", - "NCTC 14001", - "NCTC 13975", - "NCTC 13977", - "NCTC 13978", - "NCTC 13979", - "NCTC 13980", - "NCTC 13981", - "NCTC 13983", - "NCTC 13984", - "NCTC 13985", - "NCTC 13986", - "NCTC 13987", - "NCTC 13988", - "NCTC 13989", - "NCTC 13990", - "NCTC 13991", - "NCTC 13993", - "NCTC 14002", - "NCTC 14003", - "NCTC 14005", - "NCTC 4168", - "NCTC 7925", - "NCTC 9001", - "NCTC 9833", - "NCTC 9834", - "NCTC 10351", - "NCTC 13733", - "NCTC 13782", - "NCTC 13794", - "NCTC 13796", - "NCTC 13797", - "NCTC 13956", - "NCTC 13965", - "NCTC 13967", - "NCTC 14004", - "NCTC 14203", - "NCTC 10087", - "NCTC 13216", - "NCTC 12655", - "NCTC 12654", - "NCTC 12653", - "NCTC 12652", - "NCTC 12650", - "NCTC 13562", - "NCTC 10855", - "NCTC 9028", - "NCTC 9013", - "NCTC 9018", - "NCTC 12900", - "NCTC 11181", - "NCTC 11133", - "NCTC 9706", - "NCTC 8959", - "NCTC 1093", - "NCTC 122", - "NCTC 9778", - "NCTC 12080", - "NCTC 12079", - "NCTC 13128", - "NCTC 13127", - "NCTC 7922", - "NCTC 12923", - "NCTC 11476", - "NCTC 11475", - "NCTC 11474", - "NCTC 11473", - "NCTC 11472", - "NCTC 11341", - "NCTC 11151", - "NCTC 11130", - "NCTC 11128", - "NCTC 11127", - "NCTC 11126", - "NCTC 11124", - "NCTC 11123", - "NCTC 11121", - "NCTC 11120", - "NCTC 11119", - "NCTC 11118", - "NCTC 11117", - "NCTC 11115", - "NCTC 11114", - "NCTC 11113", - "NCTC 11112", - "NCTC 11111", - "NCTC 11109", - "NCTC 11108", - "NCTC 11107", - "NCTC 11106", - "NCTC 11105", - "NCTC 11102", - "NCTC 11101", - "NCTC 11024", - "NCTC 11023", - "NCTC 11022", - "NCTC 11021", - "NCTC 10974", - "NCTC 10973", - "NCTC 10964", - "NCTC 10963", - "NCTC 10961", - "NCTC 10960", - "NCTC 10959", - "NCTC 10958", - "NCTC 10957", - "NCTC 10865", - "NCTC 10864", - "NCTC 10863", - "NCTC 10758", - "NCTC 10757", - "NCTC 10677", - "NCTC 10664", - "NCTC 10444", - "NCTC 10430", - "NCTC 10429", - "NCTC 10361", - "NCTC 10279", - "NCTC 10090", - "NCTC 10089", - "NCTC 10002", - "NCTC 9969", - "NCTC 9968", - "NCTC 9967", - "NCTC 9966", - "NCTC 9965", - "NCTC 9964", - "NCTC 9963", - "NCTC 9962", - "NCTC 9961", - "NCTC 9855", - "NCTC 9708", - "NCTC 9707", - "NCTC 9705", - "NCTC 9704", - "NCTC 9703", - "NCTC 9702", - "NCTC 9701", - "NCTC 9699", - "NCTC 9123", - "NCTC 9122", - "NCTC 9121", - "NCTC 9120", - "NCTC 9119", - "NCTC 9118", - "NCTC 9117", - "NCTC 9116", - "NCTC 9114", - "NCTC 9113", - "NCTC 9111", - "NCTC 9110", - "NCTC 9109", - "NCTC 9108", - "NCTC 9107", - "NCTC 9106", - "NCTC 9105", - "NCTC 9104", - "NCTC 9103", - "NCTC 9102", - "NCTC 9101", - "NCTC 9100", - "NCTC 9099", - "NCTC 9098", - "NCTC 9097", - "NCTC 9096", - "NCTC 9095", - "NCTC 9093", - "NCTC 9092", - "NCTC 9090", - "NCTC 9089", - "NCTC 9088", - "NCTC 9086", - "NCTC 9085", - "NCTC 9084", - "NCTC 9083", - "NCTC 9082", - "NCTC 9081", - "NCTC 9080", - "NCTC 9079", - "NCTC 9078", - "NCTC 9077", - "NCTC 9076", - "NCTC 9075", - "NCTC 9074", - "NCTC 9073", - "NCTC 9072", - "NCTC 9071", - "NCTC 9070", - "NCTC 9069", - "NCTC 9068", - "NCTC 9066", - "NCTC 9065", - "NCTC 9064", - "NCTC 9063", - "NCTC 9062", - "NCTC 9061", - "NCTC 9060", - "NCTC 9059", - "NCTC 9058", - "NCTC 9057", - "NCTC 9056", - "NCTC 9055", - "NCTC 9054", - "NCTC 9053", - "NCTC 9052", - "NCTC 9051", - "NCTC 9050", - "NCTC 9049", - "NCTC 9048", - "NCTC 9047", - "NCTC 9046", - "NCTC 9045", - "NCTC 9044", - "NCTC 9043", - "NCTC 9042", - "NCTC 9041", - "NCTC 9040", - "NCTC 9039", - "NCTC 9038", - "NCTC 9037", - "NCTC 9035", - "NCTC 9034", - "NCTC 9032", - "NCTC 9031", - "NCTC 9030", - "NCTC 9029", - "NCTC 9027", - "NCTC 9026", - "NCTC 9023", - "NCTC 9022", - "NCTC 9021", - "NCTC 9020", - "NCTC 9019", - "NCTC 9017", - "NCTC 9016", - "NCTC 9015", - "NCTC 9014", - "NCTC 9012", - "NCTC 9011", - "NCTC 9010", - "NCTC 9007", - "NCTC 9006", - "NCTC 9005", - "NCTC 9004", - "NCTC 9003", - "NCTC 9002", - "NCTC 8960", - "NCTC 8783", - "NCTC 8781", - "NCTC 8622", - "NCTC 8621", - "NCTC 8603", - "NCTC 8333", - "NCTC 8179", - "NCTC 8009", - "NCTC 8008", - "NCTC 8007", - "NCTC 8003", - "NCTC 13167", - "NCTC 8164", - "NCTC 4174", - "NCTC 13476", - "NCTC 4450", - "NCTC 7921", - "NCTC 7928", - "NCTC 13148", - "NCTC 10850", - "NCTC 10766", - "NCTC 10764", - "NCTC 10537", - "NCTC 9777", - "NCTC 9776", - "NCTC 9775", - "NCTC 9434", - "NCTC 8985", - "NCTC 8196", - "NCTC 7926", - "NCTC 7362", - "NCTC 12950", - "NCTC 12839", - "NCTC 11122", - "NCTC 10418", - "NCTC 8500", - "NCTC 11186", - "NCTC 13384", - "NCTC 13125", - "NCTC 12241", - "NCTC 11103", - "NCTC 11100", - "NCTC 10538", - "NCTC 10487", - "NCTC 8984", - "NCTC 8450", - "NCTC 7927", - "NCTC 7360", - "NCTC 7152", - "NCTC 5934", - "NCTC 13126", - "NCTC 10767", - "NCTC 5933", - "NCTC 1601", - "NCTC 7923", - "NCTC 12464", - "NCTC 12486", - "NCTC 11603", - "NCTC 8986", - "NCTC 11633", - "NCTC 11602", - "NCTC 8136" - ], - "other_collection_numbers": [ - "H 307b, O.91, CN 4472" - ], - "product_name": [ - "Escherichia coli" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-133", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-6", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-458", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-457", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-456", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-151", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-53", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-73", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-61", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-82", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-31", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-35", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-38", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-54", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-206", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-225", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-249", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-262", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-264", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-265", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-363", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-280", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-364", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-365", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-366", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-367", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-353", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-355", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-354", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-356", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-357", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-358", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-359", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-371", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-455", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-454", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-453", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-452", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-451", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-450", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-449", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-448", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-447", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-446", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-445", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-442", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-443", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-444", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-441", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-440", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-439", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-438", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-437", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-436", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-370", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-435", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-434", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-433", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-432", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-431", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-430", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-429", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-428", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-427", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-426", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-425", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-368", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-377", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-384", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-378", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-379", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-380", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-381", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-382", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-383", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-385", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-386", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-387", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-388", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-389", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-390", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-403", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-424", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-422", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-277", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-410", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-417", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-411", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-412", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-413", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-405", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-406", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-394", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-395", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-396", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-397", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-398", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-407", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-399", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-392", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-400", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-408", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-418", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-409", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-401", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-402", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-404", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-414", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-415", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-416", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-5", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-18", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-46", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-179", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-180", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-199", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-372", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-376", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-373", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-374", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-375", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-419", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-420", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-393", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-423", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-421", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-195", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-306", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-291", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-290", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-289", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-288", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-287", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-369", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-216", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-76", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-58", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-67", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-293", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-268", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-266", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-172", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-41", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-3", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-2", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-178", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-282", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-281", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-299", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-298", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-16", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-294", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-275", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-274", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-273", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-272", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-271", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-270", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-267", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-263", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-261", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-260", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-259", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-257", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-256", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-254", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-253", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-252", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-251", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-250", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-248", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-247", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-246", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-245", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-244", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-242", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-241", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-240", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-239", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-238", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-236", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-235", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-233", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-232", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-231", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-205", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-229", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-228", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-227", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-226", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-224", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-223", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-222", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-221", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-220", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-219", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-218", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-217", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-211", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-210", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-209", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-207", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-201", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-164", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-163", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-182", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-198", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-197", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-196", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-192", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-191", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-190", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-189", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-188", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-187", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-186", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-185", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-184", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-183", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-181", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-174", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-173", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-171", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-170", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-169", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-168", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-167", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-166", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-161", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-160", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-159", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-158", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-157", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-156", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-155", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-154", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-153", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-152", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-150", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-149", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-148", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-147", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-146", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-145", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-144", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-143", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-63", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-62", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-142", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-141", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-140", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-139", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-138", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-137", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-136", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-135", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-134", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-132", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-131", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-130", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-30", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-129", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-128", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-127", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-126", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-125", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-124", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-123", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-122", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-121", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-120", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-119", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-118", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-117", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-116", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-115", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-114", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-113", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-112", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-29", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-111", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-110", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-109", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-108", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-107", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-106", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-105", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-104", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-103", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-102", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-101", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-100", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-99", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-98", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-97", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-96", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-95", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-94", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-93", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-92", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-91", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-90", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-89", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-88", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-87", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-86", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-85", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-84", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-83", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-81", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-80", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-60", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-79", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-78", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-77", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-75", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-74", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-72", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-71", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-70", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-69", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-68", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-66", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-65", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-64", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-59", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-57", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-56", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-55", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-52", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-51", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-50", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-49", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-48", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-47", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-42", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-40", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-39", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-37", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-36", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-362", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-32", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-27", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-25", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-24", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-23", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-22", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-303", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-14", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-7", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-360", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-8", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-15", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-21", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-302", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-215", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-213", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-212", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-203", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-177", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-176", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-175", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-162", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-44", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-28", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-19", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-13", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-295", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-292", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-255", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-200", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-34", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-269", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-310", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-296", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-283", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-237", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-234", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-204", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-202", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-43", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-33", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-20", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-12", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-11", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-10", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-297", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-214", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-9", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-4", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-17", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-284", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-285", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-230", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-45", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-279", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-278", - "https://www.culturecollections.org.uk/nop/product/escherichia-coli-26" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "f79cb2e0-99f5-5946-8dd8-0b3a8a15681c", - "value": "Escherichia coli" - }, { "meta": { "catalogue_number": [ @@ -4214,33 +7001,6 @@ "uuid": "90eded97-642a-5782-b27c-97f40b24cce7", "value": "Burkholderia mallei" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14450" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14450" - ], - "other_collection_numbers": [ - "LMG 31935" - ], - "product_name": [ - "Vandammella animalimorsus" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/vandammella-animalimorsus" - ], - "type_strain": [ - "Type Strain" - ] - }, - "uuid": "05d361a6-7166-5949-84e5-5912edc092f2", - "value": "Vandammella animalimorsus" - }, { "meta": { "catalogue_number": [ @@ -4349,31 +7109,29 @@ { "meta": { "catalogue_number": [ - "NCTC 14829" + "NCTC 14826" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14829", - "NCTC 5791" + "NCTC 14826" ], "other_collection_numbers": [ - "(ex Kauffmann and Edwards 1952) Le Minor and Popoff 1987" + "M574" ], "product_name": [ - "Salmonella enterica subsp. enterica serotype Aberdeen" + "Salmonella enterica subsp. enterica Serotype Aberdeen" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-aberdeen-3", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-aberdeen" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-aberdeen-2" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "9b89c785-79a8-5aa0-a1a7-371a4b9e8565", - "value": "Salmonella enterica subsp. enterica serotype Aberdeen" + "uuid": "c29b3dea-7aec-5165-85df-0f101b7aab87", + "value": "Salmonella enterica subsp. enterica Serotype Aberdeen" }, { "meta": { @@ -4770,121 +7528,118 @@ { "meta": { "catalogue_number": [ - "NCTC 14756" + "NCTC 8486" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14756", - "NCTC 14255" - ], - "other_collection_numbers": [ - "M264" + "NCTC 8486" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Bispebjerg" + "Salmonella enterica subsp. enterica serotype Bispebjerg" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-bispebjerg-3", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-bispebjerg-2" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-bispebjerg" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "059e7f78-641f-5097-b44f-bfef08975d67", - "value": "Salmonella enterica subsp. enterica Serotype Bispebjerg" + "uuid": "0e37c039-36cd-53c5-b83e-03d8b523aaeb", + "value": "Salmonella enterica subsp. enterica serotype Bispebjerg" }, { "meta": { "catalogue_number": [ - "NCTC 14754" + "NCTC 12707" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14754", - "NCTC 14765", - "NCTC 14251" - ], - "other_collection_numbers": [ - "M135" + "NCTC 12707", + "NCTC 12706", + "NCTC 12705", + "NCTC 12704", + "NCTC 12703", + "NCTC 12702", + "NCTC 5717" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Heidelberg" + "Salmonella enterica subsp. enterica serotype Heidelberg" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-heidelberg-10", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-heidelberg-9", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-heidelberg-8" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-heidelberg-7", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-heidelberg-6", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-heidelberg-5", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-heidelberg-4", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-heidelberg-3", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-heidelberg-2", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-heidelberg" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "a8e01bcc-4107-5139-aa0a-cd32a395bc66", - "value": "Salmonella enterica subsp. enterica Serotype Heidelberg" + "uuid": "a4b91922-a99e-5248-b46b-0b037697a4be", + "value": "Salmonella enterica subsp. enterica serotype Heidelberg" }, { "meta": { "catalogue_number": [ - "NCTC 14752" + "NCTC 5745" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14752", - "NCTC 14751", - "NCTC 14834", - "NCTC 14709", - "NCTC 14256" + "NCTC 5745" ], "other_collection_numbers": [ - "M203" + "K44, 5745, 3213, SEROTYPE 6, 7:Y:1, 5" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Bareilly" + "Salmonella enterica subsp. enterica serotype Bareilly" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-bareilly-6", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-bareilly-5", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-bareilly-8", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-bareilly-4", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-bareilly-3" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-bareilly" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "e76af678-69d2-5c00-9027-1b4ac0cf1220", - "value": "Salmonella enterica subsp. enterica Serotype Bareilly" + "uuid": "6cd480bb-69d2-53aa-9e69-7baf53552c1e", + "value": "Salmonella enterica subsp. enterica serotype Bareilly" }, { "meta": { "catalogue_number": [ - "NCTC 14707" + "NCTC 14230" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14707" + "NCTC 14230", + "NCTC 5742" ], "other_collection_numbers": [ - "M141" + "Type 2" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Virchow" + "Salmonella enterica subsp. enterica serotype Virchow" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-virchow-3" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-virchow-2", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-virchow" + ], + "type_strain": [ + "Reference Strain" ] }, - "uuid": "33fec824-da58-5793-8b4e-5acda08d6ade", - "value": "Salmonella enterica subsp. enterica Serotype Virchow" + "uuid": "80481446-33c4-5088-bd78-bf40788d0e65", + "value": "Salmonella enterica subsp. enterica serotype Virchow" }, { "meta": { @@ -4913,33 +7668,6 @@ "uuid": "633fb7dc-e8fc-5d65-9d68-829a90a36d27", "value": "Legionella drozanskii" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14562" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14562" - ], - "other_collection_numbers": [ - "DSM 112390" - ], - "product_name": [ - "\"Microbacterium pullorum\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/microbacterium-pullorum" - ], - "type_strain": [ - "Type Strain" - ] - }, - "uuid": "144ff6d2-2b63-5d29-97b9-74f0544230c8", - "value": "\"Microbacterium pullorum\"" - }, { "meta": { "catalogue_number": [ @@ -5160,231 +7888,67 @@ { "meta": { "catalogue_number": [ - "NCTC 14909" + "NCTC 13346" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14909", - "NCTC 14908", - "NCTC 14907", - "NCTC 14906", - "NCTC 14905", - "NCTC 14902", - "NCTC 14901", - "NCTC 14900", - "NCTC 14899", - "NCTC 14898", - "NCTC 14897", - "NCTC 14896", - "NCTC 14895", - "NCTC 14894", - "NCTC 13945", - "NCTC 13946", - "NCTC 13947", - "NCTC 13948", - "NCTC 13949", - "NCTC 14091", - "NCTC 14092", - "NCTC 14093", - "NCTC 14094", - "NCTC 14095", - "NCTC 9993", - "NCTC 9828", - "NCTC 8187", - "NCTC 8182", - "NCTC 11080", - "NCTC 8188", - "NCTC 8542", - "NCTC 8185", - "NCTC 8183", - "NCTC 8181", - "NCTC 8180", - "NCTC 11360", - "NCTC 11242", - "NCTC 6175", - "NCTC 11930", - "NCTC 11079", - "NCTC 8184", - "NCTC 8100", - "NCTC 8017", - "NCTC 8186", - "NCTC 9412", - "NCTC 11078", - "NCTC 11236", - "NCTC 11250", - "NCTC 11254", - "NCTC 11235", - "NCTC 11238", - "NCTC 11240", - "NCTC 11244", - "NCTC 11246", - "NCTC 11247", - "NCTC 11253", - "NCTC 8190", - "NCTC 9411", - "NCTC 12906", - "NCTC 11234", - "NCTC 11243", - "NCTC 11251", - "NCTC 8541", - "NCTC 9415", - "NCTC 12907", - "NCTC 9829", - "NCTC 11241", - "NCTC 11237", - "NCTC 11252", - "NCTC 9410", - "NCTC 11239", - "NCTC 11245", - "NCTC 11248", - "NCTC 11249", - "NCTC 8020", - "NCTC 9409" - ], - "product_name": [ - "Streptococcus agalactiae" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-76", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-75", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-74", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-73", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-72", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-71", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-70", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-69", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-68", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-67", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-66", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-65", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-64", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-63", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-54", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-53", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-55", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-56", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-57", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-58", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-59", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-60", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-61", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-62", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-24", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-22", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-12", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-3", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-29", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-13", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-16", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-10", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-8", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-2", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-7", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-49", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-26", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-50", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-28", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-9", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-6", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-4", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-11", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-20", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-27", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-32", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-44", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-48", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-31", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-34", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-36", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-38", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-40", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-41", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-47", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-14", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-19", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-52", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-30", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-37", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-45", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-15", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-21", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-51", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-23", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-25", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-33", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-46", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-18", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-35", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-39", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-42", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-43", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-5", - "https://www.culturecollections.org.uk/nop/product/streptococcus-agalactiae-17" - ] - }, - "uuid": "7540bb78-efde-593e-b12a-b896a0910c37", - "value": "Streptococcus agalactiae" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14821" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14821", - "NCTC 14827" + "NCTC 13346", + "NCTC 10532", + "NCTC 9240", + "NCTC 423" ], "other_collection_numbers": [ - "M243" + "287/91" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Gallinarum" + "Salmonella enterica subsp. enterica serotype Gallinarum" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-gallinarum-6", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-gallinarum-5" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-gallinarum-4", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-gallinarum-3", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-gallinarum-2", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-gallinarum" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "c483f601-1f0d-57ed-9cc4-6294fe971f99", - "value": "Salmonella enterica subsp. enterica Serotype Gallinarum" + "uuid": "99a5fc97-8329-5700-8774-437b30269bbb", + "value": "Salmonella enterica subsp. enterica serotype Gallinarum" }, { "meta": { "catalogue_number": [ - "NCTC 14815" + "NCTC 5739" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14815", - "NCTC 14818" - ], - "other_collection_numbers": [ - "M554" + "NCTC 5739", + "NCTC 5096", + "NCTC 348", + "NCTC 347", + "NCTC 346" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Typhisuis" + "Salmonella enterica subsp. enterica serotype Typhisuis" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhisuis-7", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhisuis-6" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhisuis-5", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhisuis-4", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhisuis-3", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhisuis-2", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhisuis" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "9420b006-320c-5fca-9eec-a88aa0916863", - "value": "Salmonella enterica subsp. enterica Serotype Typhisuis" + "uuid": "8b05a26a-4153-5ddb-b628-0632b4de013a", + "value": "Salmonella enterica subsp. enterica serotype Typhisuis" }, { "meta": { @@ -5658,96 +8222,6 @@ "uuid": "6268c77f-b32b-5b47-97ef-b6e994b664fb", "value": "MM603" }, - { - "meta": { - "age": [ - "Multiple" - ], - "catalogue_number": [ - "06041301" - ], - "collection": [ - "Human Random Control" - ], - "ethnic_origin": [ - "UK Caucasian" - ], - "external_id": [ - "06041301" - ], - "gender": [ - "Male and Female" - ], - "product_name": [ - "HRC-1 DNA Panel" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/hrc-1-dna-panel" - ] - }, - "uuid": "824de504-473b-5b60-bcce-0df493f49229", - "value": "HRC-1 DNA Panel" - }, - { - "meta": { - "age": [ - "Multiple" - ], - "catalogue_number": [ - "06041302" - ], - "collection": [ - "Human Random Control" - ], - "ethnic_origin": [ - "UK Caucasian" - ], - "external_id": [ - "06041302" - ], - "gender": [ - "Male and Female" - ], - "product_name": [ - "HRC-2 DNA Panel" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/hrc-2-dna-panel" - ] - }, - "uuid": "af4bb9f1-a885-507b-991f-2a6035360a44", - "value": "HRC-2 DNA Panel" - }, - { - "meta": { - "age": [ - "Multiple" - ], - "catalogue_number": [ - "06041305" - ], - "collection": [ - "Human Random Control" - ], - "ethnic_origin": [ - "UK Caucasian" - ], - "external_id": [ - "06041305" - ], - "gender": [ - "Male and Female" - ], - "product_name": [ - "HRC-5 DNA Panel" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/hrc-5-dna-panel" - ] - }, - "uuid": "c1721423-b3d6-5992-836f-36492e9c2d10", - "value": "HRC-5 DNA Panel" - }, { "meta": { "catalogue_number": [ @@ -5916,32 +8390,29 @@ { "meta": { "catalogue_number": [ - "10021102" + "88052089" ], "collection": [ - "General Cell" + "HLA Defined" ], - "disease": [ - "Adenocarcinoma" + "ethnic_origin": [ + "Ethnicity Not Specified" ], "external_id": [ - "10021102" + "88052089" + ], + "ihw_number": [ + "IHW: 9089" ], "product_name": [ - "Bob" + "BOB" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/bob-2" - ], - "species": [ - "Human" - ], - "tissue_of_origin": [ - "Prostate gland" + "https://www.culturecollections.org.uk/nop/product/bob" ] }, - "uuid": "cad0db96-75a3-5d32-aa9d-27f55b82b871", - "value": "Bob" + "uuid": "41ae78e7-77ed-5a8b-b935-eca83f3df946", + "value": "BOB" }, { "meta": { @@ -6003,36 +8474,6 @@ "uuid": "559bb884-9cf2-5666-8101-1622b218cb9a", "value": "B95-8" }, - { - "meta": { - "catalogue_number": [ - "91031101" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "None Stated" - ], - "external_id": [ - "91031101" - ], - "product_name": [ - "C2C12" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/c2c12" - ], - "species": [ - "Mouse" - ], - "tissue_of_origin": [ - "Muscle" - ] - }, - "uuid": "8b585db8-e54f-5fb2-8995-9d9decd2cb62", - "value": "C2C12" - }, { "meta": { "catalogue_number": [ @@ -6515,33 +8956,6 @@ "uuid": "1d55e0f9-2e1e-51e6-911d-2c08f7d68a5c", "value": "VCaP" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14703" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14703" - ], - "other_collection_numbers": [ - "DSM 112361" - ], - "product_name": [ - "\"Sporosarcina quadrami\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/sporosarcina-quadrami" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "70cd1d99-a1ce-545e-8d87-6b88250bdce2", - "value": "\"Sporosarcina quadrami\"" - }, { "meta": { "catalogue_number": [ @@ -6575,29 +8989,33 @@ { "meta": { "catalogue_number": [ - "NCTC 14763" + "NCTC 14235" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14763" + "NCTC 14235", + "NCTC 12710", + "NCTC 12709" ], "other_collection_numbers": [ - "M277" + "Type 2" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Dublin" + "Salmonella enterica subsp. enterica serotype Dublin" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-dublin-4" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-dublin-3", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-dublin-2", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-dublin" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "81d99dea-22e0-5491-9a57-8b820cc11bd5", - "value": "Salmonella enterica subsp. enterica Serotype Dublin" + "uuid": "7d26092f-1419-5e04-8011-07481efecdcf", + "value": "Salmonella enterica subsp. enterica serotype Dublin" }, { "meta": { @@ -10602,35 +13020,35 @@ { "meta": { "catalogue_number": [ - "NCTC 14846" + "NCTC 14766" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14846", - "NCTC 5771", - "NCTC 4785", - "NCTC 3378" + "NCTC 14766", + "NCTC 14748", + "NCTC 14260", + "NCTC 14259" ], "other_collection_numbers": [ - "M180A" + "M421" ], "product_name": [ - "Salmonella enterica subsp. enterica serotype Eastbourne" + "Salmonella enterica subsp. enterica Serotype Eastbourne" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-eastbourne-8", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-eastbourne-3", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-eastbourne", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-eastbourne-2" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-eastbourne-7", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-eastbourne-6", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-eastbourne-5", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-eastbourne-4" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "39e3c469-e2c1-5921-aa20-035381041827", - "value": "Salmonella enterica subsp. enterica serotype Eastbourne" + "uuid": "c1d89eec-42f6-508b-adb4-80e0f9ee9e67", + "value": "Salmonella enterica subsp. enterica Serotype Eastbourne" }, { "meta": { @@ -10794,176 +13212,31 @@ { "meta": { "catalogue_number": [ - "NCTC 14844" + "NCTC 14816" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14844", - "NCTC 14835", - "NCTC 13348", - "NCTC 74", - "NCTC 14006", - "NCTC 14020", - "NCTC 14011", - "NCTC 13954", - "NCTC 14029", - "NCTC 14028", - "NCTC 13952", - "NCTC 14016", - "NCTC 14186", - "NCTC 14007", - "NCTC 14008", - "NCTC 14009", - "NCTC 14010", - "NCTC 14015", - "NCTC 14017", - "NCTC 14018", - "NCTC 14019", - "NCTC 14021", - "NCTC 14022", - "NCTC 14023", - "NCTC 14026", - "NCTC 14030", - "NCTC 14031", - "NCTC 12023", - "NCTC 13347", - "NCTC 13171", - "NCTC 12485", - "NCTC 12484", - "NCTC 12416", - "NCTC 12190", - "NCTC 12118", - "NCTC 12117", - "NCTC 12116", - "NCTC 12115", - "NCTC 10413", - "NCTC 8392", - "NCTC 9324", - "NCTC 8391", - "NCTC 8298", - "NCTC 5715", - "NCTC 5714", - "NCTC 5713", - "NCTC 5712", - "NCTC 5711", - "NCTC 5710", - "NCTC 4782", - "NCTC 3048", - "NCTC 73", - "NCTC 11881" + "NCTC 14816", + "NCTC 14257" ], "other_collection_numbers": [ - "M102" + "M576" ], "product_name": [ - "Salmonella enterica subsp. enterica serotype Typhimurium" + "Salmonella enterica subsp. enterica Serotype Newport" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-59", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-58", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-28", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-2", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-53", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-46", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-44", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-50", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-48", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-47", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-51", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-45", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-52", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-29", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-30", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-31", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-32", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-33", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-34", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-35", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-36", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-37", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-38", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-39", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-40", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-42", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-49", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-17", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-27", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-26", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-25", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-24", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-23", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-22", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-21", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-20", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-19", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-18", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-15", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-13", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-14", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-12", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-11", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-10", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-9", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-8", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-7", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-6", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-5", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-4", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-3", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-16" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-newport-9", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-newport-8" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "cb8e9dc6-5934-5aa8-b064-25e93c69dc56", - "value": "Salmonella enterica subsp. enterica serotype Typhimurium" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14843" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14843", - "NCTC 14833", - "NCTC 14234", - "NCTC 14032", - "NCTC 10414", - "NCTC 6704", - "NCTC 5752", - "NCTC 5751", - "NCTC 129" - ], - "other_collection_numbers": [ - "M96" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Newport" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-newport-11", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-newport-10", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-newport-7", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-newport-6", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-newport-5", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-newport-4", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-newport-3", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-newport-2", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-newport" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "71eda8e4-a033-58e6-ac98-b6983a4b37a6", - "value": "Salmonella enterica subsp. enterica serotype Newport" + "uuid": "5192832d-4d11-5ceb-9ebb-0df10d453233", + "value": "Salmonella enterica subsp. enterica Serotype Newport" }, { "meta": { @@ -10997,163 +13270,82 @@ { "meta": { "catalogue_number": [ - "NCTC 14832" + "NCTC 6495" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14832" - ], - "other_collection_numbers": [ - "M180B" + "NCTC 6495" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Javiana" + "Salmonella enterica subsp. enterica serotype Javiana" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-javiana-2" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-javiana" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "6a7fc0f0-4d4a-51ea-a447-0d401d5c298a", - "value": "Salmonella enterica subsp. enterica Serotype Javiana" + "uuid": "d95e0f97-da3c-551a-aa82-2cbf39add7e9", + "value": "Salmonella enterica subsp. enterica serotype Javiana" }, { "meta": { "catalogue_number": [ - "NCTC 14831" + "NCTC 5747" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14831", - "NCTC 13665", - "NCTC 6676", - "NCTC 4444", - "NCTC 13349", - "NCTC 12694", - "NCTC 618", - "NCTC 8515", - "NCTC 5765", - "NCTC 5694", - "NCTC 5188", - "NCTC 4777", - "NCTC 4776", - "NCTC 3045" + "NCTC 5747" ], "other_collection_numbers": [ - "M89" + "623 K. 46" ], "product_name": [ - "Salmonella enterica subsp. enterica serotype Enteritidis" + "Salmonella enterica subsp. enterica serotype Montevideo" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-21", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-13", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-9", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-3", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-12", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-11", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-10", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-8", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-7", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-6", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-5", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-4", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-2" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-montevideo" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "f0725682-b0c5-50ef-8ac8-b0eda0a5eccb", - "value": "Salmonella enterica subsp. enterica serotype Enteritidis" + "uuid": "f3476349-7db0-5c76-9abe-84a14a2778fd", + "value": "Salmonella enterica subsp. enterica serotype Montevideo" }, { "meta": { "catalogue_number": [ - "NCTC 14826" + "NCTC 14226" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14826" + "NCTC 14226", + "NCTC 5725" ], "other_collection_numbers": [ - "M574" + "Type 2" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Aberdeen" + "Salmonella enterica subsp. enterica serotype Brandenburg" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-aberdeen-2" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-brandenburg-2", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-brandenburg" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "c29b3dea-7aec-5165-85df-0f101b7aab87", - "value": "Salmonella enterica subsp. enterica Serotype Aberdeen" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14824" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14824" - ], - "other_collection_numbers": [ - "M476" - ], - "product_name": [ - "Salmonella enterica subsp. enterica Serotype Montevideo" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-montevideo-2" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "533043be-848a-54b6-b03f-91b3b1d807e6", - "value": "Salmonella enterica subsp. enterica Serotype Montevideo" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14823" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14823" - ], - "other_collection_numbers": [ - "NCTC 3209 (disc) (Orig. NCTC tube)" - ], - "product_name": [ - "Salmonella enterica subsp. enterica Serotype Brandenburg" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-brandenburg-3" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "a9c83a66-4cec-5d7a-981e-90f426be5287", - "value": "Salmonella enterica subsp. enterica Serotype Brandenburg" + "uuid": "48fef1ef-df58-5bbb-b3d0-b303f9128df9", + "value": "Salmonella enterica subsp. enterica serotype Brandenburg" }, { "meta": { @@ -11187,300 +13379,197 @@ { "meta": { "catalogue_number": [ - "NCTC 14817" + "NCTC 14224" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14817", - "NCTC 14254" + "NCTC 14224", + "NCTC 5740", + "NCTC 8496", + "NCTC 6592", + "NCTC 2252" ], "other_collection_numbers": [ - "M579" + "Type 2" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Thompson" + "Salmonella enterica subsp. enterica serotype Thompson" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-thompson-10", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-thompson-9" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-thompson-5", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-thompson-2", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-thompson-4", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-thompson-3", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-thompson" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "13a17231-efe9-5bd5-8f75-2318dd7b47c7", - "value": "Salmonella enterica subsp. enterica Serotype Thompson" + "uuid": "406e2518-96a2-5f58-85d7-0c5bae98b967", + "value": "Salmonella enterica subsp. enterica serotype Thompson" }, { "meta": { "catalogue_number": [ - "NCTC 14816" + "NCTC 5748" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14816", - "NCTC 14257" - ], - "other_collection_numbers": [ - "M576" + "NCTC 5748" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Newport" + "Salmonella enterica subsp. enterica serotype Oslo" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-newport-9", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-newport-8" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-oslo" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "5192832d-4d11-5ceb-9ebb-0df10d453233", - "value": "Salmonella enterica subsp. enterica Serotype Newport" + "uuid": "3c7b4e60-1a3b-5612-953d-d3b7f9b7876f", + "value": "Salmonella enterica subsp. enterica serotype Oslo" }, { "meta": { "catalogue_number": [ - "NCTC 14814" + "NCTC 5780" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14814", - "NCTC 14759" + "NCTC 5780" ], "other_collection_numbers": [ - "M450" + "4546, (K 79), 3, 10:e, h:1, 5, 5780" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Oslo" + "Salmonella enterica subsp. enterica serotype Muenster" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-oslo-4", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-oslo-3" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-muenster" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "aefde70d-894c-5ccb-9ff0-d800ffd19d71", - "value": "Salmonella enterica subsp. enterica Serotype Oslo" + "uuid": "33a16252-58f0-5b09-ac27-20a2186e6182", + "value": "Salmonella enterica subsp. enterica serotype Muenster" }, { "meta": { "catalogue_number": [ - "NCTC 14813" + "NCTC 9941" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14813" + "NCTC 9941", + "NCTC 8499" ], "other_collection_numbers": [ - "M449" + "JT 348, 2/56, (1), 13, 23:Z: 1, W, Sal. 348/56" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Muenster" + "Salmonella enterica subsp. enterica serotype Worthington" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-muenster-2" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-worthington-2", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-worthington" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "8f27cd2d-e36f-5392-b5c2-a4d3c497d15b", - "value": "Salmonella enterica subsp. enterica Serotype Muenster" + "uuid": "da925a25-daa2-5e17-9c14-024f73a46b62", + "value": "Salmonella enterica subsp. enterica serotype Worthington" }, { "meta": { "catalogue_number": [ - "NCTC 14811" + "NCTC 5744" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14811", - "NCTC 14711", - "NCTC 14743", - "NCTC 14676", - "NCTC 14675", - "NCTC 14674", - "NCTC 14253" - ], - "other_collection_numbers": [ - "M446" + "NCTC 5744" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Enteritidis" + "Salmonella enterica subsp. enterica serotype Potsdam" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-20", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-19", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-18", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-17", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-16", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-15", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-enteritidis-14" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-potsdam" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "d186c360-8cdc-5a37-b99f-18af628b12d0", - "value": "Salmonella enterica subsp. enterica Serotype Enteritidis" + "uuid": "84b186dc-3619-5af7-9252-f418f827e648", + "value": "Salmonella enterica subsp. enterica serotype Potsdam" }, { "meta": { "catalogue_number": [ - "NCTC 14810" + "NCTC 10241" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14810", - "NCTC 14809" + "NCTC 10241" ], "other_collection_numbers": [ - "M287" + "CAPM 5611" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Worthington" + "Salmonella enterica subsp. enterica serotype Abortusovis" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-worthington-4", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-worthington-3" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-abortusovis" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "4da2a920-4870-5175-b13c-8ef6b1ff08f4", - "value": "Salmonella enterica subsp. enterica Serotype Worthington" + "uuid": "8baafcc7-7c55-5693-a254-75c4c8da3400", + "value": "Salmonella enterica subsp. enterica serotype Abortusovis" }, { "meta": { "catalogue_number": [ - "NCTC 14808" + "NCTC 14232" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14808" + "NCTC 14232", + "NCTC 5769" ], "other_collection_numbers": [ - "M275" + "Type 2" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Potsdam" + "Salmonella enterica subsp. enterica serotype Blegdam" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-potsdam-2" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-blegdam-2", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-blegdam" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "eb3f7204-a62a-56b8-ae6a-7e19f9d5193b", - "value": "Salmonella enterica subsp. enterica Serotype Potsdam" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14807" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14807", - "NCTC 14806" - ], - "other_collection_numbers": [ - "M226" - ], - "product_name": [ - "Salmonella enterica subsp. enterica Serotype Abortusovis" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-abortusovis-3", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-abortusovis-2" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "bceb1c0c-8a84-55cb-b76d-7b4359889320", - "value": "Salmonella enterica subsp. enterica Serotype Abortusovis" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14766" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14766", - "NCTC 14748", - "NCTC 14260", - "NCTC 14259" - ], - "other_collection_numbers": [ - "M421" - ], - "product_name": [ - "Salmonella enterica subsp. enterica Serotype Eastbourne" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-eastbourne-7", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-eastbourne-6", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-eastbourne-5", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-eastbourne-4" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "c1d89eec-42f6-508b-adb4-80e0f9ee9e67", - "value": "Salmonella enterica subsp. enterica Serotype Eastbourne" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14764" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14764" - ], - "other_collection_numbers": [ - "M278" - ], - "product_name": [ - "Salmonella enterica subsp. enterica Serotype Blegdam" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-blegdam-3" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "4f2e6f3a-4b39-5a3d-a95d-068c5506facf", - "value": "Salmonella enterica subsp. enterica Serotype Blegdam" + "uuid": "6f6ff072-acba-50ab-bf8f-6a10a76eadaa", + "value": "Salmonella enterica subsp. enterica serotype Blegdam" }, { "meta": { @@ -11512,29 +13601,33 @@ { "meta": { "catalogue_number": [ - "NCTC 14761" + "NCTC 14231" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14761" + "NCTC 14231", + "NCTC 5716", + "NCTC 92" ], "other_collection_numbers": [ - "M272" + "Type 2" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Stanley" + "Salmonella enterica subsp. enterica serotype Stanley" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-stanley-4" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-stanley-3", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-stanley-2", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-stanley" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "332f9fe3-4978-5279-a705-ab9f34ae06b3", - "value": "Salmonella enterica subsp. enterica Serotype Stanley" + "uuid": "1a947ab6-00f6-5ba4-97c0-ad06aeacc3b3", + "value": "Salmonella enterica subsp. enterica serotype Stanley" }, { "meta": { @@ -11566,31 +13659,30 @@ { "meta": { "catalogue_number": [ - "NCTC 14758" + "NCTC 5992" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14758", - "NCTC 14757" - ], - "other_collection_numbers": [ - "M268" + "NCTC 5992", + "NCTC 5720", + "NCTC 72" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Reading" + "Salmonella enterica subsp. enterica serotype Reading" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-reading-5", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-reading-4" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-reading-3", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-reading-2", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-reading" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "45a774ab-0f34-5871-81a6-e554ed109f61", - "value": "Salmonella enterica subsp. enterica Serotype Reading" + "uuid": "ba7c8d7f-bb64-522e-b8e7-538e206da16d", + "value": "Salmonella enterica subsp. enterica serotype Reading" }, { "meta": { @@ -12906,31 +14998,33 @@ { "meta": { "catalogue_number": [ - "NCTC 14755" + "NCTC 14233" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14755", - "NCTC 14249" + "NCTC 14233", + "NCTC 5792", + "NCTC 4840" ], "other_collection_numbers": [ - "M254" + "Type 2" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Poona" + "Salmonella enterica subsp. enterica serotype Poona" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-poona-5", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-poona-4" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-poona-3", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-poona-2", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-poona" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "9f11d076-713b-52fd-9633-bbe8f533be46", - "value": "Salmonella enterica subsp. enterica Serotype Poona" + "uuid": "5f5c663d-5e44-52b7-b096-dd6725ae1392", + "value": "Salmonella enterica subsp. enterica serotype Poona" }, { "meta": { @@ -17270,26 +19364,31 @@ { "meta": { "catalogue_number": [ - "NCTC 14750" + "NCTC 14223" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14750" + "NCTC 14223", + "NCTC 5777" + ], + "other_collection_numbers": [ + "Type 2" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype London" + "Salmonella enterica subsp. enterica serotype London" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-london-3" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-london-2", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-london" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "3b279cac-859a-5b1f-9edd-e66fe594a0df", - "value": "Salmonella enterica subsp. enterica Serotype London" + "uuid": "d001d2d5-9ff4-5031-b97a-af7bec6cb821", + "value": "Salmonella enterica subsp. enterica serotype London" }, { "meta": { @@ -17348,57 +19447,6 @@ "uuid": "6b6a2f76-19f1-5577-8057-a7cbaeeb96fa", "value": "Lacrimispora algidixylanolytica" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14574" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14574" - ], - "product_name": [ - "\"Phocaeicola gallinarum\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/phocaeicola-gallinarum" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "6b7e638c-47bd-5b95-b6d9-f75c81e38a81", - "value": "\"Phocaeicola gallinarum\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14661" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14661" - ], - "other_collection_numbers": [ - "NRRL B-65642" - ], - "product_name": [ - "Vibrio floridensis" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/vibrio-floridensis" - ], - "type_strain": [ - "Type Strain" - ] - }, - "uuid": "85bff88f-9f9f-5edf-ba7b-069b36815c0f", - "value": "Vibrio floridensis" - }, { "meta": { "catalogue_number": [ @@ -17760,33 +19808,6 @@ "uuid": "0bec5154-a07e-538e-8b90-0e695460b3c3", "value": "Streptococcus pyogenes" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14545" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14545" - ], - "other_collection_numbers": [ - "DSM 112314" - ], - "product_name": [ - "\"Acinetobacter pecorum\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/acinetobacter-pecorum" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "67921b3b-b60e-5d05-a4a1-9578eadc98b9", - "value": "\"Acinetobacter pecorum\"" - }, { "meta": { "catalogue_number": [ @@ -39495,195 +41516,6 @@ "uuid": "f1e8caae-1538-5c51-bc74-247f1bad80b2", "value": "Streptococcus minor" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14580" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14580" - ], - "other_collection_numbers": [ - "GTC 22698" - ], - "product_name": [ - "Pseudomonas tohonis" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/pseudomonas-tohonis" - ], - "type_strain": [ - "Type Strain" - ] - }, - "uuid": "9335ee5f-5e53-5eec-97b0-ddad18a436a8", - "value": "Pseudomonas tohonis" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14558" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14558" - ], - "other_collection_numbers": [ - "DSM 112318" - ], - "product_name": [ - "\"Brevundimonas guildfordensis\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/brevundimonas-guildfordensis" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "878c2f54-dd70-5d67-b974-7c8baa132b50", - "value": "\"Brevundimonas guildfordensis\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14557" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14557" - ], - "other_collection_numbers": [ - "DSM 112381" - ], - "product_name": [ - "\"Oceanitalea stevensii\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/oceanitalea-stevensii" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "172e8905-a51c-5a70-bc9c-a1e01443a0ca", - "value": "\"Oceanitalea stevensii\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14555" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14555" - ], - "other_collection_numbers": [ - "DSM 112359" - ], - "product_name": [ - "\"Ochrobacterum gallinarum\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/ochrobacterum-gallinarum" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "36c5769e-a315-56e7-a65b-54952a144eb0", - "value": "\"Ochrobacterum gallinarum\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14554" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14554" - ], - "other_collection_numbers": [ - "DSM 112358" - ], - "product_name": [ - "\"Oerskovia merdavium\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/oerskovia-merdavium" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "f66c0a29-5690-5eb5-9c1a-b004425fef3e", - "value": "\"Oerskovia merdavium\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14552" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14552" - ], - "other_collection_numbers": [ - "DSM 112356" - ], - "product_name": [ - "\"Planococcus wigleyi\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/planococcus-wigleyi-2" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "67e133f1-8d42-5c5c-903b-feab9af1950b", - "value": "\"Planococcus wigleyi\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14449" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14449" - ], - "other_collection_numbers": [ - "LMG 31934" - ], - "product_name": [ - "Franklinella schreckenbergeri" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/franklinella-schreckenbergeri" - ], - "type_strain": [ - "Type Strain" - ] - }, - "uuid": "38d43c96-4070-5687-859b-a9df72e8b2ea", - "value": "Franklinella schreckenbergeri" - }, { "meta": { "catalogue_number": [ @@ -39711,57 +41543,6 @@ "uuid": "14d41c82-bb8e-5748-a967-68c9c3c86a74", "value": "Campylobacter estrildidarum" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14618" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14618" - ], - "other_collection_numbers": [ - "DSM 112377" - ], - "product_name": [ - "\"Serpens gallinarum\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/serpens-gallinarum" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "8daa788b-e1b7-5387-aac6-dbdbee29bd1a", - "value": "\"Serpens gallinarum\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14563" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14563" - ], - "product_name": [ - "\"Kaistella pullorum\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/kaistella-pullorum" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "a5ba1db8-5702-533a-ad7d-414f77cfdc4e", - "value": "\"Kaistella pullorum\"" - }, { "meta": { "catalogue_number": [ @@ -39792,195 +41573,6 @@ "uuid": "a5907ca9-8e84-5352-9c3e-02f0b6fd6d9f", "value": "LoVo" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14560" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14560" - ], - "other_collection_numbers": [ - "DSM 112320" - ], - "product_name": [ - "\"Arthrobacter gallicola\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/arthrobacter-gallicola" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "fa65ad53-998a-50fe-8739-d7d1658e09cc", - "value": "\"Arthrobacter gallicola\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14559" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14559" - ], - "other_collection_numbers": [ - "DSM 112319" - ], - "product_name": [ - "\"Arthrobacter pullicola\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/arthrobacter-pullicola" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "ce75646c-2e0f-51e3-8111-259af248d489", - "value": "\"Arthrobacter pullicola\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14553" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14553" - ], - "other_collection_numbers": [ - "DSM 112357" - ], - "product_name": [ - "\"Psychrobacter communis\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/psychrobacter-communis" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "0ae5e6f7-7417-5004-a73f-2452817468ea", - "value": "\"Psychrobacter communis\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14551" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14551" - ], - "other_collection_numbers": [ - "DSM 112360" - ], - "product_name": [ - "\"Sporosarcina gallistercoris\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/sporosarcina-gallistercoris" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "037bb842-7413-55bc-93a3-2f529fc971aa", - "value": "\"Sporosarcina gallistercoris\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14550" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14550" - ], - "other_collection_numbers": [ - "DSM 112379" - ], - "product_name": [ - "\"Oerskovia gallyi\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/oerskovia-gallyi" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "386298fc-4c8a-547c-9728-ab6963d37152", - "value": "\"Oerskovia gallyi\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14549" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14549" - ], - "other_collection_numbers": [ - "DSM 112378" - ], - "product_name": [ - "\"Oerskovia douganii\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/oerskovia-douganii" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "3d3d91d1-b330-550f-8384-cbb3b08d7715", - "value": "\"Oerskovia douganii\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14547" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14547" - ], - "other_collection_numbers": [ - "DSM 112317" - ], - "product_name": [ - "\"Brevibacterium gallinarum\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/brevibacterium-gallinarum" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "fa5e3155-b0c8-5983-ae85-a5cec27161b0", - "value": "\"Brevibacterium gallinarum\"" - }, { "meta": { "catalogue_number": [ @@ -40008,261 +41600,6 @@ "uuid": "d3b56d71-9510-5d2a-bfaa-7423c3082ac4", "value": "Mycoplasma miroungirhinis" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14578" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14578" - ], - "product_name": [ - "\"Solibacillus faecavium\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/solibacillus-faecavium" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "886c00d1-be4a-5b24-b3dc-aa762d092fa7", - "value": "\"Solibacillus faecavium\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14576" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14576" - ], - "product_name": [ - "\"Ureibacillus galli\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/ureibacillus-galli" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "06b6eb64-5fd3-5492-9332-b601d2f527ac", - "value": "\"Ureibacillus galli\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14577" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14577" - ], - "product_name": [ - "\"Stenotrophomonas pennii\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/stenotrophomonas-pennii" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "65e97222-10b9-59b5-a7e2-e08ba61b05ee", - "value": "\"Stenotrophomonas pennii\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14573" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14573" - ], - "product_name": [ - "\"Paenibacillus gallinarum\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/paenibacillus-gallinarum" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "48d9f67f-9b3d-56a5-9d67-97ce14dc5ed0", - "value": "\"Paenibacillus gallinarum\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14571" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14571" - ], - "product_name": [ - "\"Comamonas avium\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/comamonas-avium" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "ad84a875-71e7-5c27-8a82-b68008230bf9", - "value": "\"Comamonas avium\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14570" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14570" - ], - "other_collection_numbers": [ - "DSM 112464" - ], - "product_name": [ - "\"Luteimonas colneyensis\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/luteimonas-colneyensis" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "3039967a-db29-59aa-8dde-0e11a70b68ea", - "value": "\"Luteimonas colneyensis\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14569" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14569" - ], - "other_collection_numbers": [ - "DSM 112355" - ], - "product_name": [ - "\"Corynebacterium gallinarum\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/corynebacterium-gallinarum" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "e3dede12-1e52-52ac-9e53-e45cdab252cb", - "value": "\"Corynebacterium gallinarum\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14567" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14567" - ], - "other_collection_numbers": [ - "DSM 112323" - ], - "product_name": [ - "\"Escherichia whittamii\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/escherichia-whittamii" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "712f0ea5-2498-5f83-a741-cf6969c77f9f", - "value": "\"Escherichia whittamii\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14564" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14564" - ], - "other_collection_numbers": [ - "DSM 112321" - ], - "product_name": [ - "\"Cellulomonas avistercoris\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/cellulomonas-avistercoris" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "342d2551-316c-5a97-8657-b5050f9049ff", - "value": "\"Cellulomonas avistercoris\"" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14546" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14546" - ], - "other_collection_numbers": [ - "DSM 112315" - ], - "product_name": [ - "\"Bacillus norwichensis\"" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/bacillus-norwichensis" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "cf126ce5-4717-53ae-a493-8bd5af887257", - "value": "\"Bacillus norwichensis\"" - }, { "meta": { "catalogue_number": [ @@ -40320,26 +41657,29 @@ { "meta": { "catalogue_number": [ - "NCTC 14622" + "NCTC 9926" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14622" + "NCTC 9926" + ], + "other_collection_numbers": [ + "ISC 670" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Blockley" + "Salmonella enterica subsp. enterica serotype Blockley" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-blockley-2" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-blockley" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "d95e54a1-b21a-51ba-a25c-708732166d86", - "value": "Salmonella enterica subsp. enterica Serotype Blockley" + "uuid": "74b595b9-2f37-5a11-9591-984eb77d881d", + "value": "Salmonella enterica subsp. enterica serotype Blockley" }, { "meta": { @@ -41172,36 +42512,6 @@ "uuid": "7cc626fd-a1b6-5963-8884-71408d661355", "value": "THP 1" }, - { - "meta": { - "catalogue_number": [ - "93120820" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "None Stated" - ], - "external_id": [ - "93120820" - ], - "product_name": [ - "EPC" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/epc" - ], - "species": [ - "Fish" - ], - "tissue_of_origin": [ - "Skin" - ] - }, - "uuid": "82b416f5-f000-57a5-86c6-c05c39e9f3bc", - "value": "EPC" - }, { "meta": { "catalogue_number": [ @@ -41232,36 +42542,6 @@ "uuid": "9940b1b1-b790-53e9-bee6-43774e2d4eca", "value": "CHO-K1-AC-free" }, - { - "meta": { - "catalogue_number": [ - "10112001" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "None Stated" - ], - "external_id": [ - "10112001" - ], - "product_name": [ - "COCA" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/coca" - ], - "species": [ - "Mouse" - ], - "tissue_of_origin": [ - "Skin" - ] - }, - "uuid": "9f87a0f6-9387-5013-80d2-4ff037654782", - "value": "COCA" - }, { "meta": { "catalogue_number": [ @@ -41782,36 +43062,6 @@ "uuid": "722f32f6-61da-5811-88b1-df7cad2b4f61", "value": "SC3236" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14678" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14678", - "NCTC 14677", - "NCTC 14673", - "NCTC 14672" - ], - "product_name": [ - "Salmonella enterica subsp. enterica Serotype Typhimurium" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-57", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-56", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-55", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhimurium-54" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "1568ef1a-4bfb-530c-b088-00a1d0ce5e4a", - "value": "Salmonella enterica subsp. enterica Serotype Typhimurium" - }, { "meta": { "catalogue_number": [ @@ -41836,57 +43086,6 @@ "uuid": "8401ee94-cd5d-5820-a2d0-63c025fcff45", "value": "Salmonella enterica subsp. hibernicus" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14240" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14240" - ], - "product_name": [ - "Salmonella enterica subsp. essexiensis" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-essexiensis" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "56005325-1ddc-5434-89f2-ec6133280514", - "value": "Salmonella enterica subsp. essexiensis" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 13866" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 13866" - ], - "other_collection_numbers": [ - "LMG 29779" - ], - "product_name": [ - "Helicobacter enhydrae" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/helicobacter-enhydrae" - ], - "type_strain": [ - "Type Strain" - ] - }, - "uuid": "ec2a8fa0-6147-5a32-bce7-688b5bdc6ea5", - "value": "Helicobacter enhydrae" - }, { "meta": { "catalogue_number": [ @@ -41914,33 +43113,6 @@ "uuid": "0510ba8e-48c1-59ec-a384-bed3a6cf7bc1", "value": "Streptococcus hyovaginalis" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14611" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14611" - ], - "other_collection_numbers": [ - "ATCC TSD-231" - ], - "product_name": [ - "Campylobacter bilis" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/campylobacter-bilis" - ], - "type_strain": [ - "Type Strain" - ] - }, - "uuid": "223a4d26-0caa-5fdf-be44-35280d2f5c6a", - "value": "Campylobacter bilis" - }, { "meta": { "catalogue_number": [ @@ -42052,66 +43224,6 @@ "uuid": "e7556504-0024-5d07-9799-78046d760526", "value": "LC-2/ad" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14665" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14665", - "NCTC 10910", - "NCTC 10908", - "NCTC 10905", - "NCTC 10902", - "NCTC 13667", - "NCTC 13668", - "NCTC 10911", - "NCTC 10907", - "NCTC 13251", - "NCTC 8474", - "NCTC 10906", - "NCTC 10909", - "NCTC 8189", - "NCTC 8616", - "NCTC 10739", - "NCTC 11089", - "NCTC 10901", - "NCTC 8605" - ], - "product_name": [ - "Bordetella pertussis" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-20", - "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-13", - "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-11", - "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-8", - "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-7", - "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-17", - "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-18", - "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-14", - "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-10", - "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-16", - "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-2", - "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-9", - "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-12", - "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis", - "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-4", - "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-5", - "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-15", - "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-6", - "https://www.culturecollections.org.uk/nop/product/bordetella-pertussis-3" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "cf75b2f0-77d1-5f34-8819-84ec4cb79062", - "value": "Bordetella pertussis" - }, { "meta": { "catalogue_number": [ @@ -42307,33 +43419,6 @@ "uuid": "316f56af-c843-5d23-9bd5-7c272c9fffe9", "value": "Corynebacterium hindlerae" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14581" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14581" - ], - "other_collection_numbers": [ - "GTC 22699" - ], - "product_name": [ - "Legionella antarctica" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/legionella-antarctica" - ], - "type_strain": [ - "Type Strain" - ] - }, - "uuid": "640b580f-7cdf-57ca-aa80-26887aa3e92d", - "value": "Legionella antarctica" - }, { "meta": { "catalogue_number": [ @@ -42366,85 +43451,28 @@ { "meta": { "catalogue_number": [ - "NCTC 14263" + "NCTC 6246" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14263", - "NCTC 14264" - ], - "other_collection_numbers": [ - "M685" + "NCTC 6246", + "NCTC 5755" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Muenchen" + "Salmonella enterica subsp. enterica serotype Muenchen" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-muenchen-4", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-muenchen-3" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-muenchen-2", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-muenchen" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "b9278342-c205-543e-8b72-62eda45e916a", - "value": "Salmonella enterica subsp. enterica Serotype Muenchen" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14468" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14468" - ], - "other_collection_numbers": [ - "CCM 8641; CCUG 67966; CIP 110478; CNCTC 7573; strain 1191" - ], - "product_name": [ - "Acinetobacter colistiniresistens" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/acinetobacter-colistiniresistens" - ], - "type_strain": [ - "Type Strain" - ] - }, - "uuid": "9f9c7c9d-5f45-57be-93ad-cd951c5e1e63", - "value": "Acinetobacter colistiniresistens" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14452" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14452" - ], - "other_collection_numbers": [ - "CCUG 74789" - ], - "product_name": [ - "Staphylococcus caledonicus" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/staphylococcus-caledonicus" - ], - "type_strain": [ - "Type Strain" - ] - }, - "uuid": "36b7686b-3b47-59a6-a053-3862f765b974", - "value": "Staphylococcus caledonicus" + "uuid": "255272aa-bf0f-51f5-821d-9d0b52e0f03d", + "value": "Salmonella enterica subsp. enterica serotype Muenchen" }, { "meta": { @@ -42481,40 +43509,6 @@ "uuid": "d2796564-9ad3-5ff3-ad10-6a47d87d1069", "value": "Mycoplasma enhydrae" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14424" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14424", - "NCTC 14423", - "NCTC 14422", - "NCTC 14421", - "NCTC 14420", - "NCTC 14419" - ], - "product_name": [ - "Staphylococcus singaporensis" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/staphylococcus-singaporensis-6", - "https://www.culturecollections.org.uk/nop/product/staphylococcus-singaporensis-5", - "https://www.culturecollections.org.uk/nop/product/staphylococcus-singaporensis-4", - "https://www.culturecollections.org.uk/nop/product/staphylococcus-singaporensis-3", - "https://www.culturecollections.org.uk/nop/product/staphylococcus-singaporensis-2", - "https://www.culturecollections.org.uk/nop/product/staphylococcus-singaporensis" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "acf5ed40-fa09-5a16-985d-45f7ca3b6463", - "value": "Staphylococcus singaporensis" - }, { "meta": { "catalogue_number": [ @@ -42545,56 +43539,55 @@ { "meta": { "catalogue_number": [ - "NCTC 14261" + "NCTC 3072" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14261" + "NCTC 3072", + "NCTC 5779" ], "other_collection_numbers": [ - "M575" + "C 5" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Anatum" + "Salmonella enterica subsp. enterica serotype Anatum" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-anatum-3" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-anatum", + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-anatum-2" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "46d48d64-75b7-5bb0-8d91-5a128a08ac4c", - "value": "Salmonella enterica subsp. enterica Serotype Anatum" + "uuid": "c2f81d23-adfe-53b0-a8b9-e02f5ce0e4e9", + "value": "Salmonella enterica subsp. enterica serotype Anatum" }, { "meta": { "catalogue_number": [ - "NCTC 14252" + "NCTC 5767" ], "collection": [ "NCTC" ], "external_id": [ - "NCTC 14252" - ], - "other_collection_numbers": [ - "M386" + "NCTC 5767" ], "product_name": [ - "Salmonella enterica subsp. enterica Serotype Rostock" + "Salmonella enterica subsp. enterica serotype Rostock" ], "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-rostock-2" + "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-rostock" ], "type_strain": [ "Reference Strain" ] }, - "uuid": "64717b8c-708c-5ec0-ac46-038133ab4ef7", - "value": "Salmonella enterica subsp. enterica Serotype Rostock" + "uuid": "1c7bb28a-122a-5e9e-a81d-31ba13ae6c01", + "value": "Salmonella enterica subsp. enterica serotype Rostock" }, { "meta": { @@ -60169,37 +61162,6 @@ "uuid": "16117c10-c59b-51b3-8939-06be2ff4f1a0", "value": "Epidermophyton floccosum" }, - { - "meta": { - "catalogue_number": [ - "NCPF 0843" - ], - "collection": [ - "NCPF" - ], - "external_id": [ - "NCPF 0843", - "NCPF 0824", - "NCPF 0896" - ], - "product_name": [ - "Trichophyton yaoundei" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/trichophyton-yaoundei-2", - "https://www.culturecollections.org.uk/nop/product/trichophyton-yaoundei", - "https://www.culturecollections.org.uk/nop/product/trichophyton-yaoundei-3" - ], - "site_of_origin": [ - "Scalp" - ], - "source": [ - "Human origin" - ] - }, - "uuid": "ab0a7c81-67ba-5d39-90c5-752faf27eb99", - "value": "Trichophyton yaoundei" - }, { "meta": { "catalogue_number": [ @@ -71708,56 +72670,6 @@ "uuid": "bba79a57-f9b5-5acd-8a52-8e41858c412d", "value": "Legionella wadsworthii" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14181" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14181", - "NCTC 14318" - ], - "product_name": [ - "Eikenella exigua" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/eikenella-exigua-2", - "https://www.culturecollections.org.uk/nop/product/eikenella-exigua" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "f2764a44-784a-5cea-8b44-85616abb9d5c", - "value": "Eikenella exigua" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14385" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14385" - ], - "product_name": [ - "Clostridioides difficile" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/clostridioides-difficile" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "7ac2c672-40cd-564e-a89c-52bde9c7f7e0", - "value": "Clostridioides difficile" - }, { "meta": { "catalogue_number": [ @@ -72262,118 +73174,6 @@ "uuid": "df9a8e2c-34ea-5a6a-b2eb-85fb71751236", "value": "Human coronavirus NL63" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14169" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14169", - "NCTC 14167", - "NCTC 13746", - "NCTC 13747", - "NCTC 13748", - "NCTC 13749", - "NCTC 13750", - "NCTC 14166", - "NCTC 14175", - "NCTC 14172", - "NCTC 14173", - "NCTC 14176", - "NCTC 14174", - "NCTC 14171", - "NCTC 14170", - "NCTC 14168", - "NCTC 13574", - "NCTC 13573", - "NCTC 13572", - "NCTC 13569", - "NCTC 13568", - "NCTC 13567", - "NCTC 13566", - "NCTC 13404", - "NCTC 13571", - "NCTC 13307", - "NCTC 12728", - "NCTC 12733", - "NCTC 12726", - "NCTC 11206", - "NCTC 13366", - "NCTC 13565", - "NCTC 12730", - "NCTC 12732", - "NCTC 12734", - "NCTC 11204", - "NCTC 11205", - "NCTC 11208", - "NCTC 13287", - "NCTC 11209", - "NCTC 11223", - "NCTC 12727", - "NCTC 12729", - "NCTC 11382", - "NCTC 12731" - ], - "product_name": [ - "Clostridium difficile" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-49", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-48", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-34", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-35", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-36", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-37", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-38", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-39", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-47", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-43", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-44", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-46", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-45", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-42", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-41", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-40", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-21", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-29", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-28", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-27", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-26", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-25", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-24", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-33", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-32", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-19", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-11", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-16", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-9", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-3", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-30", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-23", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-13", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-15", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-17", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-2", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-5", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-18", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-6", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-7", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-10", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-12", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-8", - "https://www.culturecollections.org.uk/nop/product/clostridium-difficile-14" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "50a0a678-7123-5dbb-b7db-f4f60ea5773d", - "value": "Clostridium difficile" - }, { "meta": { "catalogue_number": [ @@ -72476,30 +73276,6 @@ "uuid": "be815a97-a731-5bca-958c-6f56792b77ce", "value": "Mycoplasma procyoni" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14382" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14382" - ], - "product_name": [ - "Yersinia canariae" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/yersinia-canariae" - ], - "type_strain": [ - "Type Strain" - ] - }, - "uuid": "1c1a7952-7171-59a3-a84b-f75a80841b65", - "value": "Yersinia canariae" - }, { "meta": { "catalogue_number": [ @@ -74478,36 +75254,6 @@ "uuid": "98a8b541-3b5e-5fe8-9ad2-8bd496b902a2", "value": "AE17" }, - { - "meta": { - "catalogue_number": [ - "10092307" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "Mesothelioma" - ], - "external_id": [ - "10092307" - ], - "product_name": [ - "AB22" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/ab22-2" - ], - "species": [ - "Mouse" - ], - "tissue_of_origin": [ - "Lung" - ] - }, - "uuid": "857d57a9-d401-5fcf-b572-72376d79a253", - "value": "AB22" - }, { "meta": { "catalogue_number": [ @@ -74676,57 +75422,6 @@ "uuid": "f4add514-dc8b-5995-9622-61864010b7d0", "value": "Bisgaardia hudsonensis" }, - { - "meta": { - "catalogue_number": [ - "NCTC 13360" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 13360", - "NCTC 14219", - "NCTC 13924", - "NCTC 14220", - "NCTC 14218", - "NCTC 12100", - "NCTC 10519", - "NCTC 11964", - "NCTC 7474", - "NCTC 6513", - "NCTC 4133", - "NCTC 11047", - "NCTC 9865" - ], - "other_collection_numbers": [ - "ATCC 12228, DSM 1798, WDCM 00036" - ], - "product_name": [ - "Staphylococcus epidermidis" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-9", - "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-13", - "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-10", - "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-12", - "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-11", - "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-8", - "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-5", - "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-7", - "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-3", - "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-2", - "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis", - "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-6", - "https://www.culturecollections.org.uk/nop/product/staphylococcus-epidermidis-4" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "d58cc121-78fd-5bdd-8885-72afa6000c92", - "value": "Staphylococcus epidermidis" - }, { "meta": { "catalogue_number": [ @@ -74817,64 +75512,6 @@ "uuid": "7fc5e87d-fba4-55f7-a5d7-9f24a260fdee", "value": "HeLa EGFP-Histone H2B" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14038" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14038", - "NCTC 14037", - "NCTC 14035", - "NCTC 11833" - ], - "product_name": [ - "Clostridium paraputrificum" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/clostridium-paraputrificum-3", - "https://www.culturecollections.org.uk/nop/product/clostridium-paraputrificum-2", - "https://www.culturecollections.org.uk/nop/product/clostridium-paraputrificum-4", - "https://www.culturecollections.org.uk/nop/product/clostridium-paraputrificum" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "2af54fb7-4d42-5a74-92a1-9940692d5ea8", - "value": "Clostridium paraputrificum" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14034" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14034", - "NCTC 541", - "NCTC 2917" - ], - "product_name": [ - "Clostridium tertium" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/clostridium-tertium-3", - "https://www.culturecollections.org.uk/nop/product/clostridium-tertium", - "https://www.culturecollections.org.uk/nop/product/clostridium-tertium-2" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "ddc9f2ca-87d5-5254-9a9a-c1d69c08f9af", - "value": "Clostridium tertium" - }, { "meta": { "catalogue_number": [ @@ -79089,35 +79726,6 @@ "uuid": "9568ced1-d5b8-533f-afa6-22f7fa5be3d9", "value": "Salmonella enterica subsp. X" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14232" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14232", - "NCTC 5769" - ], - "other_collection_numbers": [ - "Type 2" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Blegdam" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-blegdam-2", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-blegdam" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "6f6ff072-acba-50ab-bf8f-6a10a76eadaa", - "value": "Salmonella enterica subsp. enterica serotype Blegdam" - }, { "meta": { "catalogue_number": [ @@ -79145,33 +79753,6 @@ "uuid": "ccd50c2a-4a91-53fe-b69c-e919ed6e1861", "value": "Staphylococcus pseudoxylosus" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14239" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14239" - ], - "other_collection_numbers": [ - "Type 2" - ], - "product_name": [ - "Salmonella enterica subsp. XI" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-xi" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "cfeb73f2-a211-5c4e-b77d-0b151812004a", - "value": "Salmonella enterica subsp. XI" - }, { "meta": { "catalogue_number": [ @@ -79830,33 +80411,6 @@ "uuid": "58296a75-5c14-5fca-a287-d0b94a475ddf", "value": "Enterococcus durans" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14222" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14222" - ], - "other_collection_numbers": [ - "Type 2" - ], - "product_name": [ - "Yersinia hibernica" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/yersinia-hibernica" - ], - "type_strain": [ - "Type Strain" - ] - }, - "uuid": "a93d7b20-28fd-5875-a142-d20537ee2291", - "value": "Yersinia hibernica" - }, { "meta": { "catalogue_number": [ @@ -79959,41 +80513,6 @@ "uuid": "679113c4-6da1-5a8f-b994-4dd668ad5e2a", "value": "Aeromonas veronii" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14224" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14224", - "NCTC 5740", - "NCTC 8496", - "NCTC 6592", - "NCTC 2252" - ], - "other_collection_numbers": [ - "Type 2" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Thompson" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-thompson-5", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-thompson-2", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-thompson-4", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-thompson-3", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-thompson" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "406e2518-96a2-5f58-85d7-0c5bae98b967", - "value": "Salmonella enterica subsp. enterica serotype Thompson" - }, { "meta": { "catalogue_number": [ @@ -80025,35 +80544,6 @@ "uuid": "1b1cee71-6aba-5d0c-8496-5707a406efa9", "value": "Salmonella enterica subsp. enterica serotype Derby" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14226" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14226", - "NCTC 5725" - ], - "other_collection_numbers": [ - "Type 2" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Brandenburg" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-brandenburg-2", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-brandenburg" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "48fef1ef-df58-5bbb-b3d0-b303f9128df9", - "value": "Salmonella enterica subsp. enterica serotype Brandenburg" - }, { "meta": { "catalogue_number": [ @@ -80118,37 +80608,6 @@ "uuid": "fc4b1ec0-6ddf-52ff-b90e-735497440460", "value": "Nocardiopsis dassonvillei" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14233" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14233", - "NCTC 5792", - "NCTC 4840" - ], - "other_collection_numbers": [ - "Type 2" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Poona" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-poona-3", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-poona-2", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-poona" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "5f5c663d-5e44-52b7-b096-dd6725ae1392", - "value": "Salmonella enterica subsp. enterica serotype Poona" - }, { "meta": { "catalogue_number": [ @@ -80686,51 +81145,6 @@ "uuid": "37cc9f57-efb9-51b4-964c-bc3de7e4ea48", "value": "Campylobacter upsaliensis" }, - { - "meta": { - "catalogue_number": [ - "NCTC 30" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 30", - "NCTC 11502", - "NCTC 11507", - "NCTC 11500", - "NCTC 8042", - "NCTC 11348", - "NCTC 4716", - "NCTC 4711", - "NCTC 4714", - "NCTC 4715" - ], - "other_collection_numbers": [ - "Martin No. I, ATCC 14735" - ], - "product_name": [ - "Vibrio cholerae non O:1" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/vibrio-cholerae-non-o1", - "https://www.culturecollections.org.uk/nop/product/vibrio-cholerae-non-o1-10", - "https://www.culturecollections.org.uk/nop/product/vibrio-cholerae-non-o1-11", - "https://www.culturecollections.org.uk/nop/product/vibrio-cholerae-non-o1-9", - "https://www.culturecollections.org.uk/nop/product/vibrio-cholerae-non-o1-6", - "https://www.culturecollections.org.uk/nop/product/vibrio-cholerae-non-o1-8", - "https://www.culturecollections.org.uk/nop/product/vibrio-cholerae-non-o1-5", - "https://www.culturecollections.org.uk/nop/product/vibrio-cholerae-non-o1-2", - "https://www.culturecollections.org.uk/nop/product/vibrio-cholerae-non-o1-3", - "https://www.culturecollections.org.uk/nop/product/vibrio-cholerae-non-o1-4" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "0d03abed-fec5-5803-a265-7b14b25e3822", - "value": "Vibrio cholerae non O:1" - }, { "meta": { "catalogue_number": [ @@ -80829,30 +81243,6 @@ "uuid": "9b10dd1e-0671-593c-821d-214a8d368783", "value": "Streptococcus sanguinis" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14036" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14036" - ], - "product_name": [ - "Clostridium cadaveris" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/clostridium-cadaveris" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "5167aea1-6972-5ab7-ba59-95335b8de7a8", - "value": "Clostridium cadaveris" - }, { "meta": { "catalogue_number": [ @@ -80888,126 +81278,6 @@ "uuid": "b737f2fc-9495-5821-96d9-6fb0e872d200", "value": "Elizabethkingia meningoseptica" }, - { - "meta": { - "catalogue_number": [ - "NCTC 14223" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14223", - "NCTC 5777" - ], - "other_collection_numbers": [ - "Type 2" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype London" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-london-2", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-london" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "d001d2d5-9ff4-5031-b97a-af7bec6cb821", - "value": "Salmonella enterica subsp. enterica serotype London" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14230" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14230", - "NCTC 5742" - ], - "other_collection_numbers": [ - "Type 2" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Virchow" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-virchow-2", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-virchow" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "80481446-33c4-5088-bd78-bf40788d0e65", - "value": "Salmonella enterica subsp. enterica serotype Virchow" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14231" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14231", - "NCTC 5716", - "NCTC 92" - ], - "other_collection_numbers": [ - "Type 2" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Stanley" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-stanley-3", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-stanley-2", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-stanley" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "1a947ab6-00f6-5ba4-97c0-ad06aeacc3b3", - "value": "Salmonella enterica subsp. enterica serotype Stanley" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 14235" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 14235", - "NCTC 12710", - "NCTC 12709" - ], - "other_collection_numbers": [ - "Type 2" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Dublin" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-dublin-3", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-dublin-2", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-dublin" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "7d26092f-1419-5e04-8011-07481efecdcf", - "value": "Salmonella enterica subsp. enterica serotype Dublin" - }, { "meta": { "catalogue_number": [ @@ -83362,36 +83632,6 @@ "uuid": "1e8d2a71-06bd-51e3-a280-b9e6098b2ba3", "value": "NIH-3T3 4-2" }, - { - "meta": { - "catalogue_number": [ - "93061524" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "None Stated" - ], - "external_id": [ - "93061524" - ], - "product_name": [ - "NIH 3T3" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/nih-3t3" - ], - "species": [ - "Mouse" - ], - "tissue_of_origin": [ - "Embryo" - ] - }, - "uuid": "e98ac60e-adc3-5c3d-9885-d20c07d41ef6", - "value": "NIH 3T3" - }, { "meta": { "catalogue_number": [ @@ -84583,30 +84823,6 @@ "uuid": "a9cd6094-4f64-5fb0-a6b5-d9900385d321", "value": "Salmonella enterica subsp. enterica serotype Kedougou" }, - { - "meta": { - "catalogue_number": [ - "NCTC 6495" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 6495" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Javiana" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-javiana" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "d95e0f97-da3c-551a-aa82-2cbf39add7e9", - "value": "Salmonella enterica subsp. enterica serotype Javiana" - }, { "meta": { "catalogue_number": [ @@ -87117,39 +87333,6 @@ "uuid": "d8a9d90d-bac1-58c5-8b96-269ebd68a2ad", "value": "Salmonella enterica subsp. enterica serotype Seftenberg" }, - { - "meta": { - "catalogue_number": [ - "NCTC 13346" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 13346", - "NCTC 10532", - "NCTC 9240", - "NCTC 423" - ], - "other_collection_numbers": [ - "287/91" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Gallinarum" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-gallinarum-4", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-gallinarum-3", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-gallinarum-2", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-gallinarum" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "99a5fc97-8329-5700-8774-437b30269bbb", - "value": "Salmonella enterica subsp. enterica serotype Gallinarum" - }, { "meta": { "catalogue_number": [ @@ -87207,42 +87390,6 @@ "uuid": "dcf48a18-b4c4-58fa-8e46-77b396b28437", "value": "Salmonella enterica subsp. enterica serotype Berta" }, - { - "meta": { - "catalogue_number": [ - "NCTC 12707" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 12707", - "NCTC 12706", - "NCTC 12705", - "NCTC 12704", - "NCTC 12703", - "NCTC 12702", - "NCTC 5717" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Heidelberg" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-heidelberg-7", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-heidelberg-6", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-heidelberg-5", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-heidelberg-4", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-heidelberg-3", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-heidelberg-2", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-heidelberg" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "a4b91922-a99e-5248-b46b-0b037697a4be", - "value": "Salmonella enterica subsp. enterica serotype Heidelberg" - }, { "meta": { "catalogue_number": [ @@ -87811,33 +87958,6 @@ "uuid": "2058f60e-9829-57d4-87c7-d9d5d175a472", "value": "Salmonella enterica subsp. salamae serotype Tranoroa" }, - { - "meta": { - "catalogue_number": [ - "NCTC 10241" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 10241" - ], - "other_collection_numbers": [ - "CAPM 5611" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Abortusovis" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-abortusovis" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "8baafcc7-7c55-5693-a254-75c4c8da3400", - "value": "Salmonella enterica subsp. enterica serotype Abortusovis" - }, { "meta": { "catalogue_number": [ @@ -88205,35 +88325,6 @@ "uuid": "bb164007-4a20-5e7e-b7c6-a55ccd3d3bec", "value": "Salmonella enterica subsp. enterica serotype Warragul" }, - { - "meta": { - "catalogue_number": [ - "NCTC 9941" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 9941", - "NCTC 8499" - ], - "other_collection_numbers": [ - "JT 348, 2/56, (1), 13, 23:Z: 1, W, Sal. 348/56" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Worthington" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-worthington-2", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-worthington" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "da925a25-daa2-5e17-9c14-024f73a46b62", - "value": "Salmonella enterica subsp. enterica serotype Worthington" - }, { "meta": { "catalogue_number": [ @@ -88344,33 +88435,6 @@ "uuid": "5c3cca92-3b7c-57c1-9240-07f4e980b7f6", "value": "Salmonella enterica subsp. enterica serotype Yolo" }, - { - "meta": { - "catalogue_number": [ - "NCTC 9926" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 9926" - ], - "other_collection_numbers": [ - "ISC 670" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Blockley" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-blockley" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "74b595b9-2f37-5a11-9591-984eb77d881d", - "value": "Salmonella enterica subsp. enterica serotype Blockley" - }, { "meta": { "catalogue_number": [ @@ -95497,33 +95561,6 @@ "uuid": "8e2f875b-57df-53a1-9892-490255fb32f0", "value": "Salmonella enterica subsp. enterica serotype Give" }, - { - "meta": { - "catalogue_number": [ - "NCTC 5747" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 5747" - ], - "other_collection_numbers": [ - "623 K. 46" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Montevideo" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-montevideo" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "f3476349-7db0-5c76-9abe-84a14a2778fd", - "value": "Salmonella enterica subsp. enterica serotype Montevideo" - }, { "meta": { "catalogue_number": [ @@ -95686,35 +95723,6 @@ "uuid": "313616de-be81-5034-95f5-8237753294e0", "value": "Actinobacillus lignieresii" }, - { - "meta": { - "catalogue_number": [ - "NCTC 3072" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 3072", - "NCTC 5779" - ], - "other_collection_numbers": [ - "C 5" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Anatum" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-anatum", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-anatum-2" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "c2f81d23-adfe-53b0-a8b9-e02f5ce0e4e9", - "value": "Salmonella enterica subsp. enterica serotype Anatum" - }, { "meta": { "catalogue_number": [ @@ -98973,30 +98981,6 @@ "uuid": "f920542a-77fc-560f-a3cf-7db587a1bcc4", "value": "Salmonella enterica subsp. enterica serotype Stockholm" }, - { - "meta": { - "catalogue_number": [ - "NCTC 8486" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 8486" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Bispebjerg" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-bispebjerg" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "0e37c039-36cd-53c5-b83e-03d8b523aaeb", - "value": "Salmonella enterica subsp. enterica serotype Bispebjerg" - }, { "meta": { "catalogue_number": [ @@ -101597,32 +101581,6 @@ "uuid": "556e7e5e-4b9a-58f5-b708-b937439815f7", "value": "Salmonella enterica subsp. enterica serotype Salinatis" }, - { - "meta": { - "catalogue_number": [ - "NCTC 6246" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 6246", - "NCTC 5755" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Muenchen" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-muenchen-2", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-muenchen" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "255272aa-bf0f-51f5-821d-9d0b52e0f03d", - "value": "Salmonella enterica subsp. enterica serotype Muenchen" - }, { "meta": { "catalogue_number": [ @@ -102063,34 +102021,6 @@ "uuid": "fc58c743-2248-5b8c-8976-a80d18af3c39", "value": "Salmonella enterica subsp. enterica serotype Uganda" }, - { - "meta": { - "catalogue_number": [ - "NCTC 5992" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 5992", - "NCTC 5720", - "NCTC 72" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Reading" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-reading-3", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-reading-2", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-reading" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "ba7c8d7f-bb64-522e-b8e7-538e206da16d", - "value": "Salmonella enterica subsp. enterica serotype Reading" - }, { "meta": { "catalogue_number": [ @@ -102334,33 +102264,6 @@ "uuid": "0a2cf4e8-afdc-5c1b-bb93-caad00f5d6da", "value": "Salmonella enterica subsp. enterica serotype Nyborg" }, - { - "meta": { - "catalogue_number": [ - "NCTC 5780" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 5780" - ], - "other_collection_numbers": [ - "4546, (K 79), 3, 10:e, h:1, 5, 5780" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Muenster" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-muenster" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "33a16252-58f0-5b09-ac27-20a2186e6182", - "value": "Salmonella enterica subsp. enterica serotype Muenster" - }, { "meta": { "catalogue_number": [ @@ -102388,30 +102291,6 @@ "uuid": "6849e327-1388-5772-a488-181ea360eed1", "value": "Salmonella enterica subsp. salamae serotype Dar-Es-Salaam" }, - { - "meta": { - "catalogue_number": [ - "NCTC 5767" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 5767" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Rostock" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-rostock" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "1c7bb28a-122a-5e9e-a81d-31ba13ae6c01", - "value": "Salmonella enterica subsp. enterica serotype Rostock" - }, { "meta": { "catalogue_number": [ @@ -102535,113 +102414,6 @@ "uuid": "c23d11eb-e1fe-562f-afd4-1404e8174f32", "value": "Salmonella enterica subsp. enterica serotype Amersfoort" }, - { - "meta": { - "catalogue_number": [ - "NCTC 5748" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 5748" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Oslo" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-oslo" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "3c7b4e60-1a3b-5612-953d-d3b7f9b7876f", - "value": "Salmonella enterica subsp. enterica serotype Oslo" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 5745" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 5745" - ], - "other_collection_numbers": [ - "K44, 5745, 3213, SEROTYPE 6, 7:Y:1, 5" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Bareilly" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-bareilly" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "6cd480bb-69d2-53aa-9e69-7baf53552c1e", - "value": "Salmonella enterica subsp. enterica serotype Bareilly" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 5744" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 5744" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Potsdam" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-potsdam" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "84b186dc-3619-5af7-9252-f418f827e648", - "value": "Salmonella enterica subsp. enterica serotype Potsdam" - }, - { - "meta": { - "catalogue_number": [ - "NCTC 5739" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 5739", - "NCTC 5096", - "NCTC 348", - "NCTC 347", - "NCTC 346" - ], - "product_name": [ - "Salmonella enterica subsp. enterica serotype Typhisuis" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhisuis-5", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhisuis-4", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhisuis-3", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhisuis-2", - "https://www.culturecollections.org.uk/nop/product/salmonella-enterica-subsp-enterica-serotype-typhisuis" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "8b05a26a-4153-5ddb-b628-0632b4de013a", - "value": "Salmonella enterica subsp. enterica serotype Typhisuis" - }, { "meta": { "catalogue_number": [ @@ -104645,36 +104417,6 @@ "uuid": "6af28f01-71a0-58e1-85e9-e42fd7aae2dc", "value": "Lichtheimia corymbifera" }, - { - "meta": { - "catalogue_number": [ - "88071401" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "None Stated" - ], - "external_id": [ - "88071401" - ], - "product_name": [ - "IEC 6" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/iec-6" - ], - "species": [ - "Rat" - ], - "tissue_of_origin": [ - "Intestine" - ] - }, - "uuid": "22ab8446-74a2-5a01-84c4-d8990caedb42", - "value": "IEC 6" - }, { "meta": { "catalogue_number": [ @@ -109351,36 +109093,6 @@ "uuid": "804cd10b-db26-5ff3-aae6-76c71b4c4ac5", "value": "Klebsiella pneumoniae subsp. rhinoscleromatis" }, - { - "meta": { - "catalogue_number": [ - "00030814" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "None Stated" - ], - "external_id": [ - "00030814" - ], - "product_name": [ - "IIC9 (CH0)" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/iic9-ch0" - ], - "species": [ - "Hamster" - ], - "tissue_of_origin": [ - "Embryo" - ] - }, - "uuid": "82195ed6-83cc-5615-9bd4-b4c1ae1e3802", - "value": "IIC9 (CH0)" - }, { "meta": { "catalogue_number": [ @@ -109441,36 +109153,6 @@ "uuid": "5a229e95-63e7-5f9d-aece-7ec3b03837f6", "value": "AGLCL" }, - { - "meta": { - "catalogue_number": [ - "93093002" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "None Stated" - ], - "external_id": [ - "93093002" - ], - "product_name": [ - "MOH (TOU II-3)" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/moh-tou-ii-3" - ], - "species": [ - "Human" - ], - "tissue_of_origin": [ - "Blood" - ] - }, - "uuid": "a7f37247-d004-504a-a189-95bb809b8d9f", - "value": "MOH (TOU II-3)" - }, { "meta": { "catalogue_number": [ @@ -111385,36 +111067,6 @@ "uuid": "4a823baa-1961-55d1-ac4c-faf19d0ac87c", "value": "TPS" }, - { - "meta": { - "catalogue_number": [ - "87021902" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "Neoplasms" - ], - "external_id": [ - "87021902" - ], - "product_name": [ - "AtT20" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/att20" - ], - "species": [ - "Mouse" - ], - "tissue_of_origin": [ - "Pituitary gland" - ] - }, - "uuid": "11d7063e-1fca-5f31-98aa-673fe0861da2", - "value": "AtT20" - }, { "meta": { "catalogue_number": [ @@ -112029,66 +111681,6 @@ "uuid": "0e20bafe-f11f-584a-9578-76819a6d0880", "value": "Sp2/0-Ag14 (serum-free)" }, - { - "meta": { - "catalogue_number": [ - "02050101" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "None Stated" - ], - "external_id": [ - "02050101" - ], - "product_name": [ - "MDCK-Protein Free" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/mdck-protein-free" - ], - "species": [ - "Canine" - ], - "tissue_of_origin": [ - "Kidney" - ] - }, - "uuid": "b41de6c1-763a-532a-9769-b38e528c220b", - "value": "MDCK-Protein Free" - }, - { - "meta": { - "catalogue_number": [ - "87061209" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "Small Cell Carcinoma" - ], - "external_id": [ - "87061209" - ], - "product_name": [ - "COLO 668" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/colo-668" - ], - "species": [ - "Human" - ], - "tissue_of_origin": [ - "Lung" - ] - }, - "uuid": "4578cafb-b306-5780-992a-cfbc14c59f0b", - "value": "COLO 668" - }, { "meta": { "catalogue_number": [ @@ -114285,36 +113877,6 @@ "uuid": "3f23ce6b-20ab-5eae-99b9-d2ac11609cca", "value": "COV644" }, - { - "meta": { - "catalogue_number": [ - "07071902" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "Carcinoma" - ], - "external_id": [ - "07071902" - ], - "product_name": [ - "COV504" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/cov504" - ], - "species": [ - "Human" - ], - "tissue_of_origin": [ - "Ovary" - ] - }, - "uuid": "b47725d8-3151-575f-aaf4-964c7d1fbdb6", - "value": "COV504" - }, { "meta": { "catalogue_number": [ @@ -114705,36 +114267,6 @@ "uuid": "86b3b1a3-8508-5401-8d06-3b71e442121f", "value": "RPMI 8226" }, - { - "meta": { - "catalogue_number": [ - "98110201" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "Cancer" - ], - "external_id": [ - "98110201" - ], - "product_name": [ - "SHP-77" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/shp-77" - ], - "species": [ - "Human" - ], - "tissue_of_origin": [ - "Lung" - ] - }, - "uuid": "5e704562-c0a0-5dd3-94af-6cba15fc4627", - "value": "SHP-77" - }, { "meta": { "catalogue_number": [ @@ -114887,36 +114419,6 @@ "uuid": "d0de0ba5-ec2c-58f9-9c73-e93e221f0e94", "value": "CCRF-CEM" }, - { - "meta": { - "catalogue_number": [ - "91091004" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "Adenocarcinoma" - ], - "external_id": [ - "91091004" - ], - "product_name": [ - "SK-OV-3" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/sk-ov-3" - ], - "species": [ - "Human" - ], - "tissue_of_origin": [ - "Ovary" - ] - }, - "uuid": "bf7bfd2f-eace-509e-ab52-e7d37f3cff83", - "value": "SK-OV-3" - }, { "meta": { "catalogue_number": [ @@ -125791,36 +125293,6 @@ "uuid": "908370b8-b6ca-5f76-a65c-f06f4842f3f1", "value": "C3B9" }, - { - "meta": { - "catalogue_number": [ - "01110916" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "None Stated" - ], - "external_id": [ - "01110916" - ], - "product_name": [ - "E11" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/e11-2" - ], - "species": [ - "Fish" - ], - "tissue_of_origin": [ - "Other" - ] - }, - "uuid": "58e5d3c8-11fc-57ed-abe6-101cb2eb8042", - "value": "E11" - }, { "meta": { "catalogue_number": [ @@ -126202,53 +125674,6 @@ "uuid": "99459730-865d-502d-bc3b-0fc22c1b32b9", "value": "Legionella anisa" }, - { - "meta": { - "catalogue_number": [ - "NCTC 506" - ], - "collection": [ - "NCTC" - ], - "external_id": [ - "NCTC 506", - "NCTC 2914", - "NCTC 6800", - "NCTC 8780", - "NCTC 6929", - "NCTC 1340", - "NCTC 6801", - "NCTC 6928", - "NCTC 6927", - "NCTC 1341", - "NCTC 13019" - ], - "other_collection_numbers": [ - "F. 1, CN 4781, NCIB 506, WDCM 00079" - ], - "product_name": [ - "Clostridium bifermentans" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans", - "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans-4", - "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans-5", - "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans-10", - "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans-9", - "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans-2", - "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans-6", - "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans-8", - "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans-7", - "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans-3", - "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans-11" - ], - "type_strain": [ - "Reference Strain" - ] - }, - "uuid": "554e8dab-9115-5ce2-932f-89b8b34bab22", - "value": "Clostridium bifermentans" - }, { "meta": { "catalogue_number": [ @@ -133554,36 +132979,6 @@ "uuid": "c21a7122-47ff-5a00-9a00-dc9c104096b9", "value": "HT2 Clone A5E" }, - { - "meta": { - "catalogue_number": [ - "09061602" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "None Stated" - ], - "external_id": [ - "09061602" - ], - "product_name": [ - "h1RPE7" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/h1rpe7" - ], - "species": [ - "Human" - ], - "tissue_of_origin": [ - "Eye" - ] - }, - "uuid": "35f06f3f-8684-52eb-ba88-11ed694c985f", - "value": "h1RPE7" - }, { "meta": { "catalogue_number": [ @@ -139798,36 +139193,6 @@ "uuid": "04e2fc7c-174a-5f6f-8c60-c6abeb0ed24a", "value": "KARPAS-45" }, - { - "meta": { - "catalogue_number": [ - "06100302" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "Myeloma" - ], - "external_id": [ - "06100302" - ], - "product_name": [ - "KARPAS-417" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/karpas-417" - ], - "species": [ - "Human" - ], - "tissue_of_origin": [ - "Blood" - ] - }, - "uuid": "f61f627c-65bc-53d3-844a-10f521fc0790", - "value": "KARPAS-417" - }, { "meta": { "catalogue_number": [ @@ -140188,36 +139553,6 @@ "uuid": "e68f7563-5e0f-5004-9dcc-4d7b236f57bd", "value": "BSC1" }, - { - "meta": { - "catalogue_number": [ - "96090512" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "Lymphoma" - ], - "external_id": [ - "96090512" - ], - "product_name": [ - "Ri-1" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/ri-1" - ], - "species": [ - "Human" - ], - "tissue_of_origin": [ - "Blood" - ] - }, - "uuid": "5f012aa5-7699-58e9-81e7-bfb1d453b8ac", - "value": "Ri-1" - }, { "meta": { "catalogue_number": [ @@ -141619,36 +140954,6 @@ "uuid": "e347ca4c-e69b-5fae-8283-ce304a10a193", "value": "Subclone 707 DAP8" }, - { - "meta": { - "catalogue_number": [ - "95122020" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "None Stated" - ], - "external_id": [ - "95122020" - ], - "product_name": [ - "STE-137" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/ste-137" - ], - "species": [ - "Fish" - ], - "tissue_of_origin": [ - "Embryo" - ] - }, - "uuid": "bb4ebbfd-8cd3-59a3-a011-1745d593d988", - "value": "STE-137" - }, { "meta": { "catalogue_number": [ @@ -150117,36 +149422,6 @@ "uuid": "5e796337-8b2e-5a43-8af5-877a493e5602", "value": "174BR" }, - { - "meta": { - "catalogue_number": [ - "90011806" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "None Stated" - ], - "external_id": [ - "90011806" - ], - "product_name": [ - "142BR" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/142br" - ], - "species": [ - "Human" - ], - "tissue_of_origin": [ - "Skin" - ] - }, - "uuid": "1d09cf61-b1f3-5477-8e7d-3a96ec7a4e28", - "value": "142BR" - }, { "meta": { "catalogue_number": [ @@ -152255,6 +151530,48 @@ "uuid": "d401d1a3-d2ad-59cf-a947-73c25e5a28ad", "value": "Brevibacillus laterosporus" }, + { + "meta": { + "catalogue_number": [ + "NCTC 2914" + ], + "collection": [ + "NCTC" + ], + "external_id": [ + "NCTC 2914", + "NCTC 6800", + "NCTC 8780", + "NCTC 6929", + "NCTC 1340", + "NCTC 6801", + "NCTC 6928", + "NCTC 6927", + "NCTC 1341", + "NCTC 13019" + ], + "product_name": [ + "Clostridium bifermentans" + ], + "refs": [ + "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans-4", + "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans-5", + "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans-10", + "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans-9", + "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans-2", + "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans-6", + "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans-8", + "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans-7", + "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans-3", + "https://www.culturecollections.org.uk/nop/product/clostridium-bifermentans-11" + ], + "type_strain": [ + "Reference Strain" + ] + }, + "uuid": "554e8dab-9115-5ce2-932f-89b8b34bab22", + "value": "Clostridium bifermentans" + }, { "meta": { "catalogue_number": [ @@ -179586,33 +178903,6 @@ "uuid": "154bd4fe-269e-5e8e-a0aa-25a5261efab3", "value": "BEL6KG" }, - { - "meta": { - "catalogue_number": [ - "88052089" - ], - "collection": [ - "HLA Defined" - ], - "ethnic_origin": [ - "Ethnicity Not Specified" - ], - "external_id": [ - "88052089" - ], - "ihw_number": [ - "IHW: 9089" - ], - "product_name": [ - "BOB" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/bob" - ] - }, - "uuid": "41ae78e7-77ed-5a8b-b935-eca83f3df946", - "value": "BOB" - }, { "meta": { "catalogue_number": [ @@ -187065,36 +186355,6 @@ "uuid": "ed93ed0f-60e3-56e3-a47d-26bde6302b41", "value": "A6" }, - { - "meta": { - "catalogue_number": [ - "90031401" - ], - "collection": [ - "General Cell" - ], - "disease": [ - "None Stated" - ], - "external_id": [ - "90031401" - ], - "product_name": [ - "FER" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/fer" - ], - "species": [ - "Feline" - ], - "tissue_of_origin": [ - "Embryo" - ] - }, - "uuid": "c135f1c2-f92e-550c-8647-14435ce71adb", - "value": "FER" - }, { "meta": { "catalogue_number": [ @@ -190758,33 +190018,6 @@ "uuid": "0f875fa8-da90-5402-9f9e-db4d3b4d6e3d", "value": "50-11-10" }, - { - "meta": { - "antibody_isotype": [ - "None Secreted" - ], - "catalogue_number": [ - "94120825" - ], - "collection": [ - "Hybridoma" - ], - "external_id": [ - "94120825" - ], - "product_name": [ - "AFRC 17D1" - ], - "refs": [ - "https://www.culturecollections.org.uk/nop/product/afrc-17d1" - ], - "target_(reactivity)": [ - "Non Ig secreting" - ] - }, - "uuid": "0af34fa4-f923-5f85-becd-78c7b731a5f7", - "value": "AFRC 17D1" - }, { "meta": { "antibody_isotype": [ @@ -194134,5 +193367,5 @@ "value": "BC9" } ], - "version": 4 + "version": 5 } diff --git a/tools/gen_ukhsa_culture_collections.py b/tools/gen_ukhsa_culture_collections.py index cfbf2d29..dc05f99d 100755 --- a/tools/gen_ukhsa_culture_collections.py +++ b/tools/gen_ukhsa_culture_collections.py @@ -19,10 +19,10 @@ # along with this program. If not, see . -import os import json import requests import uuid +from pymispgalaxies import Cluster, Galaxy ''' From https://www.culturecollections.org.uk/search/?searchScope=Product&pageNumber=1&filter.collectionGroup=0&filter.collection=0&filter.sorting=DateCreated @@ -42,6 +42,7 @@ cell culture characteristics. Passage numbers where given act only as a guide an the passage number stated will be the passage number received by the customer. ''' + def download_items(): data = {'items': [], 'collections': {}, @@ -75,11 +76,13 @@ def save_items(d): json.dump(d, f, indent=2, sort_keys=True) return True + def load_saved_items(): with open('items.json', 'r') as f: d = json.load(f) return d + data = download_items() # save_items(data) # data = load_saved_items() @@ -110,33 +113,27 @@ for item in data['items']: clusters_dict[cluster['value']] = cluster # transform dict to list -clusters = [] +cluster = Cluster('ukhsa-culture-collections', skip_duplicates=True) +cluster.cluster_values = {} for item in clusters_dict.values(): - clusters.append(item) + cluster.append(item, skip_duplicates=True) +cluster.save('ukhsa-culture-collections') +for cluster, duplicate in cluster.duplicates: + print(f"WARNING: Skipped duplicate: {duplicate} in cluster {cluster}") -json_galaxy = { - 'icon': "virus", - 'name': "UKHSA Culture Collections", - 'description': "UK Health Security Agency Culture Collections represent deposits of cultures that consist of expertly preserved, authenticated cell lines and microbial strains of known provenance.", - 'namespace': "gov.uk", - 'type': "ukhsa-culture-collections", - 'uuid': "bbe11c06-1d6a-477e-88f1-cdda2d71de56", - 'version': 1 -} +try: + galaxy = Galaxy('ukhsa-culture-collections') +except KeyError: + galaxy = Galaxy({ + 'icon': "virus", + 'name': "UKHSA Culture Collections", + 'description': "UK Health Security Agency Culture Collections represent deposits of cultures that consist of expertly preserved, authenticated cell lines and microbial strains of known provenance.", + 'namespace': "gov.uk", + 'type': "ukhsa-culture-collections", + 'uuid': "bbe11c06-1d6a-477e-88f1-cdda2d71de56", + 'version': 1 + }) +galaxy.save('ukhsa-culture-collections') -with open(os.path.join('..', 'clusters', 'ukhsa-culture-collections.json'), 'r') as f: - json_cluster = json.load(f) -json_cluster['values'] = clusters -json_cluster['version'] += 1 - -# save the Galaxy and Cluster file -with open(os.path.join('..', 'galaxies', 'ukhsa-culture-collections.json'), 'w') as f: - json.dump(json_galaxy, f, indent=2, sort_keys=True, ensure_ascii=False) - f.write('\n') # only needed for the beauty and to be compliant with jq_all_the_things - -with open(os.path.join('..', 'clusters', 'ukhsa-culture-collections.json'), 'w') as f: - json.dump(json_cluster, f, indent=2, sort_keys=True, ensure_ascii=False) - f.write('\n') # only needed for the beauty and to be compliant with jq_all_the_things - -print("All done, please don't forget to ./jq_all_the_things.sh, commit, and then ./validate_all.sh.") \ No newline at end of file +print("All done, please don't forget to ./jq_all_the_things.sh, commit, and then ./validate_all.sh.") diff --git a/tools/tidal-api/models/cluster.py b/tools/tidal-api/models/cluster.py index 77f60eb7..c96c29ed 100644 --- a/tools/tidal-api/models/cluster.py +++ b/tools/tidal-api/models/cluster.py @@ -132,7 +132,8 @@ class Cluster: def save_to_file(self, path): with open(path, "w") as file: - file.write(json.dumps(self.__dict__(), indent=4)) + file.write(json.dumps(self.__dict__(), indent=2)) + file.write('\n') def __str__(self) -> str: return f"Cluster: {self.name} - {self.type} - {self.uuid}" @@ -270,7 +271,7 @@ class GroupCluster(Cluster): # Code Block for handling duplicate from Tidal API data (hopefully only temporary) if value.uuid == "3290dcb9-5781-4b87-8fa0-6ae820e152cd": - value.value = "Volt Typhoon - Tidal" + value.value = "Volt Typhoon - Tidal" self.values.append(value.return_value()) @@ -367,6 +368,7 @@ class SoftwareCluster(Cluster): uuid=associated_software.get("associated_software_id"), value=associated_software.get("name") + " - Associated Software", ) + self.values.append(value.return_value()) related.append( { @@ -384,6 +386,12 @@ class SoftwareCluster(Cluster): uuid=entry.get("id"), value=entry.get("name"), ) + # duplicates, manually handled + if value.uuid == '6af0eac2-c35f-4569-ae09-47f1ca846961': + value.value = f"{value.value} - Duplicate" + if value.uuid == '39d81c48-8f7c-54cb-8fac-485598e31a55': + value.value = f"{value.value} - Duplicate" + self.values.append(value.return_value()) @@ -493,7 +501,7 @@ class TechniqueCluster(Cluster): sub_value.value = "Spearphishing Link - Duplicate" elif sub_value.uuid == "350c12a3-33f6-5942-8892-4d6e70abbfc1": sub_value.value = "Spearphishing Voice - Duplicate" - + self.values.append(sub_value.return_value()) related.append( { @@ -585,6 +593,17 @@ class ReferencesCluster(Cluster): uuid=entry.get("id"), value=entry.get("name"), ) + + # handle duplicates manually + if value.uuid == 'eea178f4-80bd-49d1-84b1-f80671e9a3e4': + value.value = f"{value.value} - Duplicate" + if value.uuid == '9bb5c330-56bd-47e7-8414-729d8e6cb3b3': + value.value = f"{value.value} - Duplicate" + if value.uuid == '8b4bdce9-da19-443f-88d2-11466e126c09': + value.value = f"{value.value} - Duplicate" + if value.uuid == 'b4727044-51bb-43b3-afdb-515bb4bb0f7e': + value.value = f"{value.value} - Duplicate" + self.values.append(value.return_value()) diff --git a/tools/tidal-api/models/galaxy.py b/tools/tidal-api/models/galaxy.py index 075511a6..e63b4d76 100644 --- a/tools/tidal-api/models/galaxy.py +++ b/tools/tidal-api/models/galaxy.py @@ -14,4 +14,5 @@ class Galaxy: def save_to_file(self, path: str): with open(path, "w") as file: - file.write(json.dumps(asdict(self), indent=4)) + file.write(json.dumps(asdict(self), indent=2)) + file.write('\n')