58 lines
1.3 KiB
JSON
58 lines
1.3 KiB
JSON
{
|
|
"id": "CASE-2026-0003",
|
|
"memory_type": "case",
|
|
"scenario": "phishing",
|
|
"title": "Executive impersonation email requested urgent wire transfer",
|
|
"abstract": "An executive impersonation email targeted finance staff with an urgent wire transfer request from a lookalike domain.",
|
|
"verdict": "true_positive",
|
|
"severity": "high",
|
|
"entities": {
|
|
"users": [
|
|
"carol@corp.example"
|
|
],
|
|
"hosts": [
|
|
"FIN-LAPTOP-08"
|
|
],
|
|
"mailboxes": [
|
|
"carol@corp.example"
|
|
]
|
|
},
|
|
"observables": {
|
|
"sender_emails": [
|
|
"ceo@c0rp-example.com"
|
|
],
|
|
"domains": [
|
|
"c0rp-example.com"
|
|
],
|
|
"urls": [],
|
|
"ips": [
|
|
"203.0.113.45"
|
|
],
|
|
"hashes": []
|
|
},
|
|
"evidence": [
|
|
"Lookalike domain used numeric substitution.",
|
|
"Language pressure matched prior BEC pattern.",
|
|
"No historical communication from sender domain."
|
|
],
|
|
"patterns": [
|
|
"verdict:true_positive",
|
|
"scenario:phishing",
|
|
"alert_type:mail_bec_impersonation"
|
|
],
|
|
"related_refs": {
|
|
"playbooks": [
|
|
"PB-PHISH-001"
|
|
],
|
|
"kb": [
|
|
"KB-CRED-HARVEST-PATTERNS"
|
|
],
|
|
"cases": []
|
|
},
|
|
"source_path": "/home/tom/soc_memory_poc/evaluation/datasets/mock_cases/phishing/CASE-2026-0003.json",
|
|
"tags": [
|
|
"phishing",
|
|
"bec",
|
|
"executive-impersonation"
|
|
]
|
|
} |