diff --git a/.travis.yml b/.travis.yml index 96744ae..c413fe7 100644 --- a/.travis.yml +++ b/.travis.yml @@ -1,17 +1,16 @@ -language: bash +language: python + +cache: pip + +python: + - "3.6" sudo: required -dist: trusty - install: - - git clone https://github.com/stedolan/jq.git - - pushd jq - - autoreconf -i - - ./configure --disable-maintainer-mode - - make - - sudo make install - - popd + - sudo apt-get update -qq + - sudo apt-get install -y -qq jq moreutils + - pip install jsonschema script: - - cat */*.json | jq . + - ./validate_all.sh diff --git a/clusters/exploit-kit.json b/clusters/exploit-kit.json index 006b21d..102fcfb 100755 --- a/clusters/exploit-kit.json +++ b/clusters/exploit-kit.json @@ -1,453 +1,447 @@ { - "values": [ - { "value": "Astrum", + "values": [ + { + "value": "Astrum", "description": "Astrum Exploit Kit is a private Exploit Kit used in massive scale malvertising campaigns. It's notable by its use of Steganography", "meta": { "refs": [ "http://malware.dontneedcoffee.com/2014/09/astrum-ek.html", "http://www.welivesecurity.com/2016/12/06/readers-popular-websites-targeted-stealthy-stegano-exploit-kit-hiding-pixels-malicious-ads/" ], - "synonyms": [ + "synonyms": [ "Stegano EK" ], - "status": "Unknown - Last Seen 2016-12-07" - } - } -, - { "value": "DealersChoice", + "status": "Unknown - Last Seen 2016-12-07" + } + }, + { + "value": "DealersChoice", "description": "DealersChoice is a Flash Player Exploit platform triggered by RTF", "meta": { "refs": [ "http://researchcenter.paloaltonetworks.com/2016/10/unit42-dealerschoice-sofacys-flash-player-exploit-platform/", "http://blog.trendmicro.com/trendlabs-security-intelligence/pawn-storm-ramps-up-spear-phishing-before-zero-days-get-patched/" ], - "synonyms": [ + "synonyms": [ "Sednit RTF EK" ], - "status": "Active" - } - } -, - { "value": "DNSChanger", + "status": "Active" + } + }, + { + "value": "DNSChanger", "description": "DNSChanger Exploit Kit is an exploit kit targeting Routers via the browser", "meta": { "refs": [ "http://malware.dontneedcoffee.com/2015/05/an-exploit-kit-dedicated-to-csrf.html", "https://www.proofpoint.com/us/threat-insight/post/home-routers-under-attack-malvertising-windows-android-devices" ], - "synonyms": [ + "synonyms": [ "RouterEK" ], - "status": "Active" - } - } -, - { "value": "Empire", + "status": "Active" + } + }, + { + "value": "Empire", "description": "The Empire Pack is a variation of RIG operated by a load seller. It's being fed by many traffic actors", "meta": { "refs": [ "http://malware.dontneedcoffee.com/2016/10/rig-evolves-neutrino-waves-goodbye.html" ], - "synonyms": [ + "synonyms": [ "RIG-E" - ] - , - "status": "Unknown - Last seen: 2016-12-29" - } - } -, - { "value": "Hunter", + ], + "status": "Unknown - Last seen: 2016-12-29" + } + }, + { + "value": "Hunter", "description": "Hunter EK is an evolution of 3Ros EK", "meta": { "refs": [ "https://www.proofpoint.com/us/threat-insight/post/Hunter-Exploit-Kit-Targets-Brazilian-Banking-Customers" ], - "synonyms": [ + "synonyms": [ "3ROS Exploit Kit" - ] - , - "status": "Active" - } - } -, - { "value": "Kaixin", + ], + "status": "Active" + } + }, + { + "value": "Kaixin", "description": "Kaixin is an exploit kit mainly seen behind compromised website in Asia", "meta": { "refs": [ "http://www.kahusecurity.com/2013/deobfuscating-the-ck-exploit-kit/", "http://www.kahusecurity.com/2012/new-chinese-exploit-pack/" ], - "synonyms": [ + "synonyms": [ "CK vip" - ] , - "status": "Active" - } - } -, - { "value": "Magnitude", + ], + "status": "Active" + } + }, + { + "value": "Magnitude", "description": "Magnitude EK", "meta": { "refs": [ - "http://malware.dontneedcoffee.com/2013/10/Magnitude.html", + "http://malware.dontneedcoffee.com/2013/10/Magnitude.html", "https://www.trustwave.com/Resources/SpiderLabs-Blog/A-Peek-Into-the-Lion-s-Den-%E2%80%93-The-Magnitude--aka-PopAds--Exploit-Kit/", "http://malware.dontneedcoffee.com/2014/02/and-real-name-of-magnitude-is.html" ], - "synonyms": [ + "synonyms": [ "Popads EK", "TopExp" ], - "status": "Active" - } - } -, - { "value": "MWI", + "status": "Active" + } + }, + { + "value": "MWI", "description": "Microsoft Word Intruder is an exploit kit focused on Word and embedded flash exploits. The author wants to avoid their customer to use it in mass spam campaign, so it's most often connected to semi-targeted attacks", "meta": { "refs": [ "https://www.fireeye.com/blog/threat-research/2015/04/a_new_word_document.html", "https://www.sophos.com/en-us/medialibrary/PDFs/technical%20papers/sophos-microsoft-word-intruder-revealed.pdf" ], - "status": "Active" - } - } -, - { "value": "Neutrino", + "status": "Active" + } + }, + { + "value": "Neutrino", "description": "Neutrino Exploit Kit has been one of the major exploit kit from its launch in 2013 till september 2016 when it become private (defense name for this variation is Neutrino-v). This EK vanished from march 2014 till november 2014.", "meta": { "refs": [ "http://malware.dontneedcoffee.com/2013/03/hello-neutrino-just-one-more-exploit-kit.html", "http://malware.dontneedcoffee.com/2014/11/neutrino-come-back.html" ], - "synonyms": [ + "synonyms": [ "Job314", "Neutrino Rebooted", "Neutrino-v" - ] - , - "status": "Active" - } - } -, - { "value": "RIG", + ], + "status": "Active" + } + }, + { + "value": "RIG", "description": "RIG is an exploit kit that takes its source in Infinity EK itself an evolution of Redkit. It became dominant after the fall of Angler, Nuclear Pack and the end of public access to Neutrino. RIG-v is the name given to RIG 4 when it was only accessible by \"vip\" customers and when RIG 3 was still in use.", "meta": { "refs": [ "http://www.kahusecurity.com/2014/rig-exploit-pack/", "https://www.trustwave.com/Resources/SpiderLabs-Blog/RIG-Reloaded---Examining-the-Architecture-of-RIG-Exploit-Kit-3-0/", - "https://www.trustwave.com/Resources/SpiderLabs-Blog/RIG-Exploit-Kit-%E2%80%93-Diving-Deeper-into-the-Infrastructure/", - "http://malware.dontneedcoffee.com/2016/10/rig-evolves-neutrino-waves-goodbye.html" + "https://www.trustwave.com/Resources/SpiderLabs-Blog/RIG-Exploit-Kit-%E2%80%93-Diving-Deeper-into-the-Infrastructure/", + "http://malware.dontneedcoffee.com/2016/10/rig-evolves-neutrino-waves-goodbye.html" ], - "synonyms": [ + "synonyms": [ "RIG 3", - "RIG-v", - "RIG 4", - "Meadgive" + "RIG-v", + "RIG 4", + "Meadgive" ], - "status": "Active" - } - } -, - { "value": "Sednit EK", + "status": "Active" + } + }, + { + "value": "Sednit EK", "description": "Sednit EK is the exploit kit used by APT28", "meta": { "refs": [ "http://www.welivesecurity.com/2014/10/08/sednit-espionage-group-now-using-custom-exploit-kit/", "http://blog.trendmicro.com/trendlabs-security-intelligence/new-adobe-flash-zero-day-used-in-pawn-storm-campaign/" ], - "status": "Active" - } - } -, - { "value": "Bizarro Sundown", + "status": "Active" + } + }, + { + "value": "Bizarro Sundown", "description": "Bizarro Sundown appears to be a fork of Sundown with added anti-analysis features", "meta": { "refs": [ "http://blog.trendmicro.com/trendlabs-security-intelligence/new-bizarro-sundown-exploit-kit-spreads-locky/", "https://blog.malwarebytes.com/cybercrime/exploits/2016/10/yet-another-sundown-ek-variant/" ], - "synonyms": [ + "synonyms": [ "Sundown-b" ], - "status": "Active" - } - } -, - { "value": "GreenFlash Sundown", + "status": "Active" + } + }, + { + "value": "GreenFlash Sundown", "description": "GreenFlash Sundown is a variation of Bizarro Sundown without landing", "meta": { "refs": [ "http://blog.trendmicro.com/trendlabs-security-intelligence/new-bizarro-sundown-exploit-kit-spreads-locky/" ], - "synonyms": [ + "synonyms": [ "Sundown-GF" ], - "status": "Active" - } - } -, - { "value": "Sundown", + "status": "Active" + } + }, + { + "value": "Sundown", "description": "Sundown Exploit Kit is mainly built out of stolen code from other exploit kits", "meta": { "refs": [ "http://malware.dontneedcoffee.com/2015/06/fast-look-at-sundown-ek.html", "https://www.virusbulletin.com/virusbulletin/2015/06/beta-exploit-pack-one-more-piece-crimeware-infection-road" ], - "synonyms": [ + "synonyms": [ "Beps", "Xer", "Beta" ], - "status": "Active", - "colour": "#C03701" - } - } -, - { "value": "Angler", + "status": "Active", + "colour": "#C03701" + } + }, + { + "value": "Angler", "description": "The Angler Exploit Kit has been the most popular and evolved exploit kit from 2014 to middle of 2016. There was several variation. The historical \"indexm\" variant was used to spread Lurk. A vip version used notabily to spread Poweliks, the \"standard\" commercial version, and a declinaison tied to load selling (mostly bankers) that can be associated to EmpirePPC", "meta": { "refs": [ "https://blogs.sophos.com/2015/07/21/a-closer-look-at-the-angler-exploit-kit/", "http://malware.dontneedcoffee.com/2015/12/xxx-is-angler-ek.html", - "http://malware.dontneedcoffee.com/2016/06/is-it-end-of-angler.html" + "http://malware.dontneedcoffee.com/2016/06/is-it-end-of-angler.html" ], - "synonyms": [ + "synonyms": [ "XXX", "AEK", "Axpergle" ], - "status": "Retired - Last seen: 2016-06-07" - } - } -, - { "value": "Archie", + "status": "Retired - Last seen: 2016-06-07" + } + }, + { + "value": "Archie", "description": "Archie EK", "meta": { "refs": [ "https://www.alienvault.com/blogs/labs-research/archie-just-another-exploit-kit" ], - "status": "Retired" - } - } -, - { "value": "BlackHole", + "status": "Retired" + } + }, + { + "value": "BlackHole", "description": "The BlackHole Exploit Kit has been the most popular exploit kit from 2011 to 2013. Its activity stopped with Paunch's arrest (all activity since then is anecdotal and based on an old leak)", "meta": { "refs": [ "https://www.trustwave.com/Resources/SpiderLabs-Blog/Blackhole-Exploit-Kit-v2/", "https://nakedsecurity.sophos.com/exploring-the-blackhole-exploit-kit/" ], - "synonyms": [ + "synonyms": [ "BHEK" ], - "status": "Retired - Last seen: 2013-10-07" - } - } -, - { "value": "Bleeding Life", + "status": "Retired - Last seen: 2013-10-07" + } + }, + { + "value": "Bleeding Life", "description": "Bleeding Life is an exploit kit that became open source with its version 2", "meta": { "refs": [ "http://www.kahusecurity.com/2011/flash-used-in-idol-malvertisement/", "http://thehackernews.com/2011/10/bleeding-life-2-exploit-pack-released.html" ], - "synonyms": [ + "synonyms": [ "BL", "BL2" - ] - , - "status": "Retired" - } - } -, - { "value": "Cool", + ], + "status": "Retired" + } + }, + { + "value": "Cool", "description": "The Cool Exploit Kit was a kind of BlackHole VIP in 2012/2013", "meta": { "refs": [ "http://malware.dontneedcoffee.com/2012/10/newcoolek.html", "http://malware.dontneedcoffee.com/2013/07/a-styxy-cool-ek.html", - "http://blog.trendmicro.com/trendlabs-security-intelligence/styx-exploit-pack-how-it-works/" + "http://blog.trendmicro.com/trendlabs-security-intelligence/styx-exploit-pack-how-it-works/" ], - "synonyms": [ + "synonyms": [ "CEK", - "Styxy Cool" + "Styxy Cool" ], - "status": "Retired - Last seen: 2013-10-07" - } - } -, - { "value": "Fiesta", + "status": "Retired - Last seen: 2013-10-07" + } + }, + { + "value": "Fiesta", "description": "Fiesta Exploit Kit", "meta": { "refs": [ "http://blog.0x3a.com/post/110052845124/an-in-depth-analysis-of-the-fiesta-exploit-kit-an", "http://www.kahusecurity.com/2011/neosploit-is-back/" ], - "synonyms": [ + "synonyms": [ "NeoSploit", "Fiexp" - ] - , - "status": "Retired - Last Seen: beginning of 2015-07" - } - } -, - { "value": "FlashPack", + ], + "status": "Retired - Last Seen: beginning of 2015-07" + } + }, + { + "value": "FlashPack", "description": "FlashPack EK got multiple fork. The most common variant seen was the standalone Flash version", "meta": { "refs": [ "http://malware.dontneedcoffee.com/2012/11/meet-critxpack-previously-vintage-pack.html", "http://malware.dontneedcoffee.com/2013/04/meet-safe-pack-v20-again.html" ], - "synonyms": [ + "synonyms": [ "FlashEK", "SafePack", "CritXPack", "Vintage Pack" - ] - , - "status": "Retired - Last seen: middle of 2015-04" - } - } -, - { "value": "GrandSoft", + ], + "status": "Retired - Last seen: middle of 2015-04" + } + }, + { + "value": "GrandSoft", "description": "GrandSoft Exploit Kit was a quite common exploit kit used in 2012/2013", "meta": { "refs": [ "http://malware.dontneedcoffee.com/2013/09/FinallyGrandSoft.html", "http://malware.dontneedcoffee.com/2012/10/neosploit-now-showing-bh-ek-20-like.html", - "https://nakedsecurity.sophos.com/2012/08/24/sophos-sucks-malware/" + "https://nakedsecurity.sophos.com/2012/08/24/sophos-sucks-malware/" ], - "synonyms": [ + "synonyms": [ "StampEK", "SofosFO" - ] , - "status": "Retired - Last seen: 2014-03" - } - } -, - { "value": "HanJuan", + ], + "status": "Retired - Last seen: 2014-03" + } + }, + { + "value": "HanJuan", "description": "Hanjuan EK was a one actor fed variation of Angler EK used in evolved malvertising chain targeting USA. It has been using a 0day (CVE-2015-0313) from beginning of December 2014 till beginning of February 2015", "meta": { "refs": [ - "http://www.malwaresigs.com/2013/10/14/unknown-ek/", - "https://blog.malwarebytes.com/threat-analysis/2014/08/shining-some-light-on-the-unknown-exploit-kit/", + "http://www.malwaresigs.com/2013/10/14/unknown-ek/", + "https://blog.malwarebytes.com/threat-analysis/2014/08/shining-some-light-on-the-unknown-exploit-kit/", "http://blog.trendmicro.com/trendlabs-security-intelligence/a-closer-look-at-the-exploit-kit-in-cve-2015-0313-attack", "https://twitter.com/kafeine/status/562575744501428226" ], - "status": "Retired - Last seen: 2015-07" - } - } -, - { "value": "Himan", + "status": "Retired - Last seen: 2015-07" + } + }, + { + "value": "Himan", "description": "Himan Exploit Kit", "meta": { "refs": [ "http://malware.dontneedcoffee.com/2013/10/HiMan.html" ], - "synonyms": [ + "synonyms": [ "High Load" ], - "status": "Retired - Last seen: 2014-04" - } - } -, - { "value": "Impact", + "status": "Retired - Last seen: 2014-04" + } + }, + { + "value": "Impact", "description": "Impact EK", "meta": { "refs": [ "http://malware.dontneedcoffee.com/2012/12/inside-impact-exploit-kit-back-on-track.html" - ] - , - "status": "Retired" - } - } -, - { "value": "Infinity", + ], + "status": "Retired" + } + }, + { + "value": "Infinity", "description": "Infinity is an evolution of Redkit", "meta": { "refs": [ "http://blog.talosintel.com/2013/11/im-calling-this-goon-exploit-kit-for-now.html", - "http://www.kahusecurity.com/2014/the-resurrection-of-redkit/" + "http://www.kahusecurity.com/2014/the-resurrection-of-redkit/" ], - "synonyms": [ + "synonyms": [ "Redkit v2.0", "Goon" ], - "status": "Retired - Last seen: 2014-07" - } - } -, - { "value": "Lightsout", + "status": "Retired - Last seen: 2014-07" + } + }, + { + "value": "Lightsout", "description": "Lightsout Exploit Kit has been used in Watering Hole attack performed by the APT Group havex", "meta": { "refs": [ "http://blog.talosintel.com/2014/03/hello-new-exploit-kit.html", "http://blog.talosintel.com/2014/05/continued-analysis-of-lightsout-exploit.html", - "http://malwageddon.blogspot.fr/2013/09/unknown-ek-by-way-how-much-is-fish.html" + "http://malwageddon.blogspot.fr/2013/09/unknown-ek-by-way-how-much-is-fish.html" ], - "status": "Unknown - Last seen: 2014-03" - } - } -, - { "value": "Niteris", + "status": "Unknown - Last seen: 2014-03" + } + }, + { + "value": "Niteris", "description": "Niteris was used mainly to target Russian.", "meta": { "refs": [ "http://malware.dontneedcoffee.com/2014/06/cottoncastle.html", "http://malware.dontneedcoffee.com/2015/05/another-look-at-niteris-post.html" ], - "synonyms": [ + "synonyms": [ "CottonCastle" ], - "status": "Unknown - Last seen: 2015-11" - } - } -, - { "value": "Nuclear", + "status": "Unknown - Last seen: 2015-11" + } + }, + { + "value": "Nuclear", "description": "The Nuclear Pack appeared in 2009 and has been one of the longer living one. Spartan EK was a landing less variation of Nuclear Pack", "meta": { "refs": [ "http://blog.checkpoint.com/2016/05/17/inside-nuclears-core-unraveling-a-ransomware-as-a-service-infrastructure/" ], - "synonyms": [ + "synonyms": [ "NEK", "Nuclear Pack", - "Spartan", - "Neclu" - ] , - "status": "Retired - Last seen: 2015-04-30" - } - } -, - { "value": "Phoenix", + "Spartan", + "Neclu" + ], + "status": "Retired - Last seen: 2015-04-30" + } + }, + { + "value": "Phoenix", "description": "Phoenix Exploit Kit", "meta": { "refs": [ "http://malwareint.blogspot.fr/2010/09/phoenix-exploits-kit-v21-inside.html", "http://blog.trendmicro.com/trendlabs-security-intelligence/now-exploiting-phoenix-exploit-kit-version-2-5/" ], - "synonyms": [ + "synonyms": [ "PEK" ], - "status": "Retired" - } - } -, - { "value": "Private Exploit Pack", + "status": "Retired" + } + }, + { + "value": "Private Exploit Pack", "description": "Private Exploit Pack", "meta": { "refs": [ "http://malware.dontneedcoffee.com/2013/07/pep-new-bep.html", "http://malwageddon.blogspot.fr/2013/07/unknown-ek-well-hey-hey-i-wanna-be.html" ], - "synonyms": [ + "synonyms": [ "PEP" ], - "status": "Retired" - } - } -, - { "value": "Redkit", + "status": "Retired" + } + }, + { + "value": "Redkit", "description": "Redkit has been a major exploit kit in 2012. One of its specific features was to allow its access against a share of a percentage of the customer's traffic", "meta": { "refs": [ @@ -455,35 +449,35 @@ "http://malware.dontneedcoffee.com/2012/05/inside-redkit.html", "https://nakedsecurity.sophos.com/2013/05/09/redkit-exploit-kit-part-2/" ], - "status": "Retired" - } - } -, - { "value": "Sakura", + "status": "Retired" + } + }, + { + "value": "Sakura", "description": "Description Here", "meta": { "refs": [ "http://www.xylibox.com/2012/01/sakura-exploit-pack-10.html" ], - "status": "Retired - Last seen: 2013-09" - } - } -, - { "value": "Sweet-Orange", + "status": "Retired - Last seen: 2013-09" + } + }, + { + "value": "Sweet-Orange", "description": "Sweet Orange", "meta": { "refs": [ "http://malware.dontneedcoffee.com/2012/12/juice-sweet-orange-2012-12.html" ], - "synonyms": [ + "synonyms": [ "SWO", "Anogre" ], - "status": "Retired - Last seen: 2015-04-05" - } - } -, - { "value": "Styx", + "status": "Retired - Last seen: 2015-04-05" + } + }, + { + "value": "Styx", "description": "Styx Exploit Kit", "meta": { "refs": [ @@ -491,11 +485,11 @@ "https://krebsonsecurity.com/2013/07/styx-exploit-pack-domo-arigato-pc-roboto/", "http://malware.dontneedcoffee.com/2013/05/inside-styx-2013-05.html" ], - "status":"Retired - Last seen: 2014-06" - } - } -, - { "value": "Unknown", + "status": "Retired - Last seen: 2014-06" + } + }, + { + "value": "Unknown", "description": "Unknown Exploit Kit. This is a place holder for any undocumented Exploit Kit. If you use this tag, we will be more than happy to give the associated EK a deep look.", "meta": { "refs": [ @@ -503,9 +497,9 @@ "https://twitter.com/node5", "https://twitter.com/kahusecurity" ] - } + } } -], + ], "version": 3, "uuid": "454f4e78-bd7c-11e6-a4a6-cec0c932ce01", "description": "Exploit-Kit is an enumeration of some exploitation kits used by adversaries. The list includes document, browser and router exploit kits.It's not meant to be totally exhaustive but aim at covering the most seen in the past 5 years", diff --git a/clusters/microsoft-activity-group.json b/clusters/microsoft-activity-group.json index 116c4e1..5c771ea 100644 --- a/clusters/microsoft-activity-group.json +++ b/clusters/microsoft-activity-group.json @@ -1,30 +1,49 @@ { + "version": 3, + "uuid": "28b5e55d-acba-4748-a79d-0afa3512689a", + "description": "Activity groups as described by Microsoft", + "authors": [ + "Various" + ], + "source": "MISP Project", + "type": "microsoft-activity-group", + "name": "Microsoft Activity Group actor", "values": [ { - "value": "PROMETHIUM", + "meta": { + "refs": [ + "https://blogs.technet.microsoft.com/mmpc/2016/12/14/twin-zero-day-attacks-promethium-and-neodymium-target-individuals-in-europe/" + ] + }, "description": "PROMETHIUM is an activity group that has been active as early as 2012. The group primarily uses Truvasys, a first-stage malware that has been in circulation for several years. Truvasys has been involved in several attack campaigns, where it has masqueraded as one of server common computer utilities, including WinUtils, TrueCrypt, WinRAR, or SanDisk. In each of the campaigns, Truvasys malware evolved with additional features—this shows a close relationship between the activity groups behind the campaigns and the developers of the malware.", - "meta": { - "refs": ["https://blogs.technet.microsoft.com/mmpc/2016/12/14/twin-zero-day-attacks-promethium-and-neodymium-target-individuals-in-europe/"] - } + "value": "PROMETHIUM" }, { - "value": "NEODYMIUM", + "meta": { + "refs": [ + "https://blogs.technet.microsoft.com/mmpc/2016/12/14/twin-zero-day-attacks-promethium-and-neodymium-target-individuals-in-europe/" + ] + }, "description": "NEODYMIUM is an activity group that is known to use a backdoor malware detected by Microsoft as Wingbird. This backdoor’s characteristics closely match FinFisher, a government-grade commercial surveillance package. Data about Wingbird activity indicate that it is typically used to attack individual computers instead of networks.", - "meta": { - "refs": ["https://blogs.technet.microsoft.com/mmpc/2016/12/14/twin-zero-day-attacks-promethium-and-neodymium-target-individuals-in-europe/"] - } + "value": "NEODYMIUM" }, { - "value": "TERBIUM", + "meta": { + "refs": [ + "https://blogs.technet.microsoft.com/mmpc/2016/12/09/windows-10-protection-detection-and-response-against-recent-attacks/" + ] + }, "description": "Microsoft Threat Intelligence identified similarities between this recent attack and previous 2012 attacks against tens of thousands of computers belonging to organizations in the energy sector. Microsoft Threat Intelligence refers to the activity group behind these attacks as TERBIUM, following our internal practice of assigning rogue actors chemical element names.", - "meta" : { - "refs": ["https://blogs.technet.microsoft.com/mmpc/2016/12/09/windows-10-protection-detection-and-response-against-recent-attacks/"] - } + "value": "TERBIUM" }, { - "value": "STRONTIUM", - "description": "STRONTIUM has been active since at least 2007. Whereas most modern untargeted malware is ultimately profit-oriented, STRONTIUM mainly seeks sensitive information. Its primary institutional targets have included government bodies, diplomatic institutions, and military forces and installations in NATO member states and certain Eastern European countries. Additional targets have included journalists, political advisors, and organizations associated with political activism in central Asia. STRONTIUM is an activity group that usually targets government agencies, diplomatic institutions, and military organizations, as well as affiliated private sector organizations such as defense contractors and public policy research institutes. Microsoft has attributed more 0-day exploits to STRONTIUM than any other tracked group in 2016. STRONTIUM frequently uses compromised e-mail accounts from one victim to send malicious e-mails to a second victim and will persistently pursue specific targets for months until they are successful in compromising the victims’ computer. ", "meta": { + "refs": [ + "https://blogs.technet.microsoft.com/mmpc/2016/11/01/our-commitment-to-our-customers-security/", + "http://download.microsoft.com/download/4/4/C/44CDEF0E-7924-4787-A56A-16261691ACE3/Microsoft_Security_Intelligence_Report_Volume_19_A_Profile_Of_A_Persistent_Adversary_English.pdf", + "https://blogs.technet.microsoft.com/mmpc/2015/11/16/microsoft-security-intelligence-report-strontium/" + ], + "country": "RU", "synonyms": [ "APT 28", "APT28", @@ -36,62 +55,62 @@ "Group-4127", "Sofacy", "Grey-Cloud" - ], - "country": "RU", - "refs": [ - "https://blogs.technet.microsoft.com/mmpc/2016/11/01/our-commitment-to-our-customers-security/", - "http://download.microsoft.com/download/4/4/C/44CDEF0E-7924-4787-A56A-16261691ACE3/Microsoft_Security_Intelligence_Report_Volume_19_A_Profile_Of_A_Persistent_Adversary_English.pdf", - "https://blogs.technet.microsoft.com/mmpc/2015/11/16/microsoft-security-intelligence-report-strontium/" ] - } + }, + "description": "STRONTIUM has been active since at least 2007. Whereas most modern untargeted malware is ultimately profit-oriented, STRONTIUM mainly seeks sensitive information. Its primary institutional targets have included government bodies, diplomatic institutions, and military forces and installations in NATO member states and certain Eastern European countries. Additional targets have included journalists, political advisors, and organizations associated with political activism in central Asia. STRONTIUM is an activity group that usually targets government agencies, diplomatic institutions, and military organizations, as well as affiliated private sector organizations such as defense contractors and public policy research institutes. Microsoft has attributed more 0-day exploits to STRONTIUM than any other tracked group in 2016. STRONTIUM frequently uses compromised e-mail accounts from one victim to send malicious e-mails to a second victim and will persistently pursue specific targets for months until they are successful in compromising the victims’ computer. ", + "value": "STRONTIUM" }, { + "description": "DUBNIUM (which shares indicators with what Kaspersky researchers have called DarkHotel) is one of the activity groups that has been very active in recent years, and has many distinctive features.", + "value": "DUBNIUM", "meta": { - "synonyms": [ - "darkhotel" - ], "refs": [ "https://securelist.com/blog/research/71713/darkhotels-attacks-in-2015/", "https://blogs.technet.microsoft.com/mmpc/2016/06/09/reverse-engineering-dubnium-2", "https://blogs.technet.microsoft.com/mmpc/2016/06/20/reverse-engineering-dubniums-flash-targeting-exploit/", "https://blogs.technet.microsoft.com/mmpc/2016/07/14/reverse-engineering-dubnium-stage-2-payload-analysis/" + ], + "synonyms": [ + "darkhotel" ] - }, - "value": "DUBNIUM", - "description": "DUBNIUM (which shares indicators with what Kaspersky researchers have called DarkHotel) is one of the activity groups that has been very active in recent years, and has many distinctive features." + } }, { + "description": "PLATINUM has been targeting its victims since at least as early as 2009, and may have been active for several years prior. Its activities are distinctly different not only from those typically seen in untargeted attacks, but from many targeted attacks as well. A large share of targeted attacks can be characterized as opportunistic: the activity group changes its target profiles and attack geographies based on geopolitical seasons, and may attack institutions all over the world. Like many such groups, PLATINUM seeks to steal sensitive intellectual property related to government interests, but its range of preferred targets is consistently limited to specific governmental organizations, defense institutes, intelligence agencies, diplomatic institutions, and telecommunication providers in South and Southeast Asia. The group’s persistent use of spear phishing tactics (phishing attempts aimed at specific individuals) and access to previously undiscovered zero-day exploits have made it a highly resilient threat.", + "value": "PLATINUM", "meta": { "refs": [ "https://blogs.technet.microsoft.com/mmpc/2016/04/26/digging-deep-for-platinum/", "http://download.microsoft.com/download/2/2/5/225BFE3E-E1DE-4F5B-A77B-71200928D209/Platinum%20feature%20article%20-%20Targeted%20attacks%20in%20South%20and%20Southeast%20Asia%20April%202016.pdf" ] - }, - "value": "PLATINUM", - "description": "PLATINUM has been targeting its victims since at least as early as 2009, and may have been active for several years prior. Its activities are distinctly different not only from those typically seen in untargeted attacks, but from many targeted attacks as well. A large share of targeted attacks can be characterized as opportunistic: the activity group changes its target profiles and attack geographies based on geopolitical seasons, and may attack institutions all over the world. Like many such groups, PLATINUM seeks to steal sensitive intellectual property related to government interests, but its range of preferred targets is consistently limited to specific governmental organizations, defense institutes, intelligence agencies, diplomatic institutions, and telecommunication providers in South and Southeast Asia. The group’s persistent use of spear phishing tactics (phishing attempts aimed at specific individuals) and access to previously undiscovered zero-day exploits have made it a highly resilient threat." - }, - { - "value": "BARIUM", - "description": "Microsoft Threat Intelligence associates Winnti with multiple activity groups—collections of malware, supporting infrastructure, online personas, victimology, and other attack artifacts that the Microsoft intelligent security graph uses to categorize and attribute threat activity. Microsoft labels activity groups using code names derived from elements in the periodic table. In the case of this malware, the activity groups strongly associated with Winnti are BARIUM and LEAD. But even though they share the use of Winnti, the BARIUM and LEAD activity groups are involved in very different intrusion scenarios. BARIUM begins its attacks by cultivating relationships with potential victims—particularly those working in Business Development or Human Resources—on various social media platforms. Once BARIUM has established rapport, they spear-phish the victim using a variety of unsophisticated malware installation vectors, including malicious shortcut (.lnk) files with hidden payloads, compiled HTML help (.chm) files, or Microsoft Office documents containing macros or exploits. Initial intrusion stages feature the Win32/Barlaiy implant—notable for its use of social network profiles, collaborative document editing sites, and blogs for C&C. Later stages of the intrusions rely upon Winnti for persistent access. The majority of victims recorded to date have been in electronic gaming, multimedia, and Internet content industries, although occasional intrusions against technology companies have occurred.", - "meta": { - "refs": ["https://blogs.technet.microsoft.com/mmpc/2017/01/25/detecting-threat-actors-in-recent-german-industrial-attacks-with-windows-defender-atp/"] } }, { - "value": "LEAD", - "description": "In contrast, LEAD has established a far greater reputation for industrial espionage. In the past few years, LEAD’s victims have included: Multinational, multi-industry companies involved in the manufacture of textiles, chemicals, and electronics Pharmaceutical companies A company in the chemical industry University faculty specializing in aeronautical engineering and research A company involved in the design and manufacture of motor vehicles A cybersecurity company focusing on protecting industrial control systems During these intrusions, LEAD’s objective was to steal sensitive data, including research materials, process documents, and project plans. LEAD also steals code-signing certificates to sign its malware in subsequent attacks. In most cases, LEAD’s attacks do not feature any advanced exploit techniques. The group also does not make special effort to cultivate victims prior to an attack. Instead, the group often simply emails a Winnti installer to potential victims, relying on basic social engineering tactics to convince recipients to run the attached malware. In some other cases, LEAD gains access to a target by brute-forcing remote access login credentials, performing SQL injection, or exploiting unpatched web servers, and then they copy the Winnti installer directly to compromised machines.", - "meta": { - "refs": ["https://blogs.technet.microsoft.com/mmpc/2017/01/25/detecting-threat-actors-in-recent-german-industrial-attacks-with-windows-defender-atp/"] } + "meta": { + "refs": [ + "https://blogs.technet.microsoft.com/mmpc/2017/01/25/detecting-threat-actors-in-recent-german-industrial-attacks-with-windows-defender-atp/" + ] + }, + "description": "Microsoft Threat Intelligence associates Winnti with multiple activity groups—collections of malware, supporting infrastructure, online personas, victimology, and other attack artifacts that the Microsoft intelligent security graph uses to categorize and attribute threat activity. Microsoft labels activity groups using code names derived from elements in the periodic table. In the case of this malware, the activity groups strongly associated with Winnti are BARIUM and LEAD. But even though they share the use of Winnti, the BARIUM and LEAD activity groups are involved in very different intrusion scenarios. BARIUM begins its attacks by cultivating relationships with potential victims—particularly those working in Business Development or Human Resources—on various social media platforms. Once BARIUM has established rapport, they spear-phish the victim using a variety of unsophisticated malware installation vectors, including malicious shortcut (.lnk) files with hidden payloads, compiled HTML help (.chm) files, or Microsoft Office documents containing macros or exploits. Initial intrusion stages feature the Win32/Barlaiy implant—notable for its use of social network profiles, collaborative document editing sites, and blogs for C&C. Later stages of the intrusions rely upon Winnti for persistent access. The majority of victims recorded to date have been in electronic gaming, multimedia, and Internet content industries, although occasional intrusions against technology companies have occurred.", + "value": "BARIUM" + }, + { + "meta": { + "refs": [ + "https://blogs.technet.microsoft.com/mmpc/2017/01/25/detecting-threat-actors-in-recent-german-industrial-attacks-with-windows-defender-atp/" + ] + }, + "description": "In contrast, LEAD has established a far greater reputation for industrial espionage. In the past few years, LEAD’s victims have included: Multinational, multi-industry companies involved in the manufacture of textiles, chemicals, and electronics Pharmaceutical companies A company in the chemical industry University faculty specializing in aeronautical engineering and research A company involved in the design and manufacture of motor vehicles A cybersecurity company focusing on protecting industrial control systems During these intrusions, LEAD’s objective was to steal sensitive data, including research materials, process documents, and project plans. LEAD also steals code-signing certificates to sign its malware in subsequent attacks. In most cases, LEAD’s attacks do not feature any advanced exploit techniques. The group also does not make special effort to cultivate victims prior to an attack. Instead, the group often simply emails a Winnti installer to potential victims, relying on basic social engineering tactics to convince recipients to run the attached malware. In some other cases, LEAD gains access to a target by brute-forcing remote access login credentials, performing SQL injection, or exploiting unpatched web servers, and then they copy the Winnti installer directly to compromised machines.", + "value": "LEAD" + }, + { + "meta": { + "refs": [ + "https://blogs.technet.microsoft.com/mmpc/2017/03/27/detecting-and-mitigating-elevation-of-privilege-exploit-for-cve-2017-0005/" + ] + }, + "description": "In addition to strengthening generic detection of EoP exploits, Microsoft security researchers are actively gathering threat intelligence and indicators attributable to ZIRCONIUM, the activity group using the CVE-2017-0005 exploit. ", + "value": "ZIRCONIUM" } - ], - "name": "Microsoft Activity Group actor", - "type": "microsoft-activity-group", - "source": "MISP Project", - "authors": [ - "Various" - ], - "description": "Activity groups as described by Microsoft", - "uuid": "28b5e55d-acba-4748-a79d-0afa3512689a", - "version": 2 + ] } - diff --git a/clusters/preventive-measure.json b/clusters/preventive-measure.json index 491a24a..fd9c867 100644 --- a/clusters/preventive-measure.json +++ b/clusters/preventive-measure.json @@ -5,10 +5,12 @@ "refs": [ "http://windows.microsoft.com/en-us/windows/back-up-restore-faq#1TC=windows-7." ], - "Complexity": "Medium", - "Effectiveness": "High", - "Impact": "Low", - "Type": "Recovery" + "complexity": "Medium", + "effectiveness": "High", + "impact": "Low", + "type": [ + "Recovery" + ] }, "value": "Backup and Restore Process", "description": "Make sure to have adequate backup processes on place and frequently test a restore of these backups.\n(Schrödinger's backup - it is both existent and non-existent until you've tried a restore" @@ -19,10 +21,12 @@ "https://support.office.com/en-us/article/Enable-or-disable-macros-in-Office-files-12b036fd-d140-4e74-b45e-16fed1a7e5c6?ui=en-US&rs=en-US&ad=US", "https://www.404techsupport.com/2016/04/office2016-macro-group-policy/?utm_source=dlvr.it&utm_medium=twitter" ], - "Complexity": "Low", - "Effectiveness": "High", - "Impact": "Low", - "Type": "GPO" + "complexity": "Low", + "effectiveness": "High", + "impact": "Low", + "type": [ + "GPO" + ] }, "value": "Block Macros", "description": "Disable macros in Office files downloaded from the Internet. This can be configured to work in two different modes:\nA.) Open downloaded documents in 'Protected View'\nB.) Open downloaded documents and block all macros" @@ -32,60 +36,70 @@ "refs": [ "http://www.windowsnetworking.com/kbase/WindowsTips/WindowsXP/AdminTips/Customization/DisableWindowsScriptingHostWSH.html" ], - "Complexity": "Low", - "Effectiveness": "Medium", - "Impact": "Medium", - "Type": "GPO" + "complexity": "Low", + "effectiveness": "Medium", + "impact": "Medium", + "type": [ + "GPO" + ], + "possible_issues": "Administrative VBS scripts on Workstations" }, "value": "Disable WSH", - "description": "Disable Windows Script Host", - "Possible Issues": "Administrative VBS scripts on Workstations" + "description": "Disable Windows Script Host" }, { "meta": { - "Complexity": "Low", - "Effectiveness": "Medium", - "Impact": "Low", - "Type": "Mail Gateway" + "complexity": "Low", + "effectiveness": "Medium", + "impact": "Low", + "type": [ + "Mail Gateway" + ] }, "value": "Filter Attachments Level 1", "description": "Filter the following attachments on your mail gateway:\n.ade, .adp, .ani, .bas, .bat, .chm, .cmd, .com, .cpl, .crt, .exe, .hlp, .ht, .hta, .inf, .ins, .isp, .jar, .job, .js, .jse, .lnk, .mda, .mdb, .mde, .mdz, .msc, .msi, .msp, .mst, .ocx, .pcd, .ps1, .reg, .scr, .sct, .shs, .svg, .url, .vb, .vbe, .vbs, .wbk, .wsc, .ws, .wsf, .wsh, .exe, .pif, .pub" }, { "meta": { - "Complexity": "Low", - "Effectiveness": "High", - "Impact": "High", - "Type": "Mail Gateway" + "complexity": "Low", + "effectiveness": "High", + "impact": "High", + "type": [ + "Mail Gateway" + ], + "possible_issues": "Office Communication with old versions of Microsoft Office files (.doc, .xls) " }, "value": "Filter Attachments Level 2", - "description": "Filter the following attachments on your mail gateway:\n(Filter expression of Level 1 plus) .doc, .xls, .rtf, .docm, .xlsm, .pptm", - "Possible Issues": "Office Communication with old versions of Microsoft Office files (.doc, .xls) " + "description": "Filter the following attachments on your mail gateway:\n(Filter expression of Level 1 plus) .doc, .xls, .rtf, .docm, .xlsm, .pptm" }, { "meta": { "refs": [ - "http://www.fatdex.net/php/2014/06/01/disable-exes-from-running-inside-any-user-appdata-directory-gpo/", + "http://www.fatdex.net/php/2014/06/01/disable-exes-from-running-inside-any-user-appdata-directory-gpo/", "http://www.thirdtier.net/ransomware-prevention-kit/" ], - "Complexity": "Medium", - "Effectiveness": "Medium", - "Impact": "Medium", - "Type": "GPO" + "complexity": "Medium", + "effectiveness": "Medium", + "impact": "Medium", + "type": [ + "GPO" + ], + "possible_issues": "Web embedded software installers" }, "value": "Restrict program execution", - "description": "Block all program executions from the %LocalAppData% and %AppData% folder", - "Possible Issues": "Web embedded software installers" + "description": "Block all program executions from the %LocalAppData% and %AppData% folder" }, { "meta": { "refs": [ "http://www.sevenforums.com/tutorials/10570-file-extensions-hide-show.htm" ], - "Complexity": "Low", - "Effectiveness": "Low", - "Impact": "Low", - "Type": "User Assistence" + "complexity": "Low", + "effectiveness": "Low", + "impact": "Low", + "type": [ + "User Assistence" + ] }, "value": "Show File Extensions", "description": "Set the registry key \"HideFileExt\" to 0 in order to show all file extensions, even of known file types. This helps avoiding cloaking tricks that use double extensions. (e.g. \"not_a_virus.pdf.exe\")" @@ -95,50 +109,60 @@ "refs": [ "https://technet.microsoft.com/en-us/library/dd835564(WS.10).aspx" ], - "Complexity": "Low", - "Effectiveness": "Medium", - "Impact": "Low", - "Type": "GPO" + "complexity": "Low", + "effectiveness": "Medium", + "impact": "Low", + "type": [ + "GPO" + ], + "possible_issues": "administrator resentment" }, "value": "Enforce UAC Prompt", - "description": "Enforce administrative users to confirm an action that requires elevated rights", - "Possible Issues": "administrator resentment" + "description": "Enforce administrative users to confirm an action that requires elevated rights" }, { "meta": { - "Complexity": "Medium", - "Effectiveness": "Medium", - "Impact": "Medium", - "Type": "Best Practice" + "complexity": "Medium", + "effectiveness": "Medium", + "impact": "Medium", + "type": [ + "Best Practice" + ], + "possible_issues": "igher administrative costs" }, "value": "Remove Admin Privileges", - "description": "Remove and restrict administrative rights whenever possible. Malware can only modify files that users have write access to.", - "Possible Issues": "igher administrative costs" + "description": "Remove and restrict administrative rights whenever possible. Malware can only modify files that users have write access to." }, { "meta": { - "Complexity": "Medium", - "Effectiveness": "Low", - "Impact": "Low", - "Type": "Best Practice" + "complexity": "Medium", + "effectiveness": "Low", + "impact": "Low", + "type": [ + "Best Practice" + ] }, "value": "Restrict Workstation Communication", "description": "Activate the Windows Firewall to restrict workstation to workstation communication" }, { "meta": { - "Complexity": "Medium", - "Effectiveness": "High", - "Type": "Advanced Malware Protection" + "complexity": "Medium", + "effectiveness": "High", + "type": [ + "Advanced Malware Protection" + ] }, "value": "Sandboxing Email Input", "description": "Using sandbox that opens email attachments and removes attachments based on behavior analysis" }, { "meta": { - "Complexity": "Medium", - "Effectiveness": "Medium", - "Type": "3rd Party Tools" + "complexity": "Medium", + "effectiveness": "Medium", + "type": [ + "3rd Party Tools" + ] }, "value": "Execution Prevention", "description": "Software that allows to control the execution of processes - sometimes integrated in Antivirus software\nFree: AntiHook, ProcessGuard, System Safety Monitor" @@ -148,24 +172,28 @@ "refs": [ "https://bluesoul.me/2016/05/12/use-gpo-to-change-the-default-behavior-of-potentially-malicious-file-extensions/" ], - "Complexity": "Low", - "Effectiveness": "Medium", - "Impact": "Medium", - "Type": "GPO" + "complexity": "Low", + "effectiveness": "Medium", + "impact": "Medium", + "type": [ + "GPO" + ], + "possible_issues": "Some extensions will have legitimate uses, e.g., .vbs for logon scripts." }, "value": "Change Default \"Open With\" to Notepad", - "description": "Force extensions primarily used for infections to open up in Notepad rather than Windows Script Host or Internet Explorer", - "Possible Issues": "Some extensions will have legitimate uses, e.g., .vbs for logon scripts." + "description": "Force extensions primarily used for infections to open up in Notepad rather than Windows Script Host or Internet Explorer" }, { "meta": { "refs": [ "http://jpelectron.com/sample/Info%20and%20Documents/Stop%20crypto%20badware%20before%20it%20ruins%20your%20day/1-PreventCrypto-Readme.htm" ], - "Complexity": "Low", - "Effectiveness": "Medium", - "Impact": "Low", - "Type": "Monitoring" + "complexity": "Low", + "effectiveness": "Medium", + "impact": "Low", + "type": [ + "Monitoring" + ] }, "value": "File Screening", "description": "Server-side file screening with the help of File Server Resource Manager" @@ -176,14 +204,16 @@ "https://technet.microsoft.com/en-us/library/dd759117%28v=ws.11%29.aspx", "http://social.technet.microsoft.com/wiki/contents/articles/5211.how-to-configure-applocker-group-policy-to-prevent-software-from-running.aspx" ], - "Complexity": "Medium", - "Effectiveness": "Medium", - "Impact": "Medium", - "Type": "GPO" + "complexity": "Medium", + "effectiveness": "Medium", + "impact": "Medium", + "type": [ + "GPO" + ], + "possible_issues": "Configure & test extensively" }, "value": "Restrict program execution #2", - "description": "Block program executions (AppLocker)", - "Possible Issues": "Configure & test extensively" + "description": "Block program executions (AppLocker)" }, { "meta": { @@ -191,10 +221,12 @@ "www.microsoft.com/emet", "http://windowsitpro.com/security/control-emet-group-policy" ], - "Complexity": "Medium", - "Effectiveness": "Medium", - "Impact": "Low", - "Type": "GPO" + "complexity": "Medium", + "effectiveness": "Medium", + "impact": "Low", + "type": [ + "GPO" + ] }, "value": "EMET", "description": "Detect and block exploitation techniques" @@ -204,10 +236,12 @@ "refs": [ "https://twitter.com/JohnLaTwC/status/799792296883388416" ], - "Complexity": "Medium", - "Effectiveness": "Low", - "Impact": "Low", - "Type": "3rd Party Tools" + "complexity": "Medium", + "effectiveness": "Low", + "impact": "Low", + "type": [ + "3rd Party Tools" + ] }, "value": "Sysmon", "description": "Detect Ransomware in an early stage with new Sysmon 5 File/Registry monitoring" @@ -221,5 +255,5 @@ ], "description": "Preventive measures based on the ransomware document overview as published in https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml# . The preventive measures are quite generic and can fit any standard Windows infrastructure and their security measures.", "uuid": "1a8e55eb-a0ff-425b-80e0-30df866f8f65", - "version": 1 + "version": 2 } diff --git a/clusters/tds.json b/clusters/tds.json index 4fcb935..6a06fbb 100755 --- a/clusters/tds.json +++ b/clusters/tds.json @@ -1,79 +1,94 @@ -{ - "values": [ - { "value": "Keitaro", - "description": "Keitaro TDS is among the mostly used TDS in drive by infection chains", - "meta": { - "refs": [ - "https://keitarotds.com/" - ] - }, - "type":"Commercial" - } -, - { "value": "Sutra", - "description": "Sutra TDS was dominant from 2012 till 2015", - "meta": { - "refs": [ - "http://kytoon.com/sutra-tds.html" - ], - "type":"Commercial" - } - } -, - { "value": "SimpleTDS", - "description": "SimpleTDS is a basic open source TDS", - "meta": { - "refs": [ - "https://sourceforge.net/projects/simpletds/" - ], - "synonyms": [ - "Stds" - ], - "type":"OpenSource" - } - } -, - { "value": "BossTDS", - "description": "BossTDS", - "meta": { - "refs": [ - "http://bosstds.com/" - ], - "type":"Commercial" - } - } -, - { "value": "BlackHat TDS", - "description": "BlackHat TDS is sold underground.", - "meta": { - "refs": [ - "http://malware.dontneedcoffee.com/2014/04/meet-blackhat-tds.html" - ], - "type":"Underground" - } - } -, - { "value": "Futuristic TDS", - "description": "Futuristic TDS is the TDS component of BlackOS/CookieBomb/NorthTale Iframer", - "meta": { - "type":"Underground" - } - } -, - { "value": "Orchid TDS", - "description": "Orchid TDS was sold underground. Rare usage", - "meta": { - "type":"Underground" - } - } - ], - "version": 1, - "uuid": "ab5fffaa-c5f6-11e6-9d9d-cec0c932ce01", - "description": "TDS is a list of Traffic Direction System used by adversaries", - "authors": [ - "Kafeine" - ], - "source": "MISP Project", - "type": "tds", - "name": "TDS" -} +{ + "values": [ + { + "value": "Keitaro", + "description": "Keitaro TDS is among the mostly used TDS in drive by infection chains", + "meta": { + "refs": [ + "https://keitarotds.com/" + ], + "type": [ + "Commercial" + ] + } + }, + { + "value": "Sutra", + "description": "Sutra TDS was dominant from 2012 till 2015", + "meta": { + "refs": [ + "http://kytoon.com/sutra-tds.html" + ], + "type": [ + "Commercial" + ] + } + }, + { + "value": "SimpleTDS", + "description": "SimpleTDS is a basic open source TDS", + "meta": { + "refs": [ + "https://sourceforge.net/projects/simpletds/" + ], + "synonyms": [ + "Stds" + ], + "type": [ + "OpenSource" + ] + } + }, + { + "value": "BossTDS", + "description": "BossTDS", + "meta": { + "refs": [ + "http://bosstds.com/" + ], + "type": [ + "Commercial" + ] + } + }, + { + "value": "BlackHat TDS", + "description": "BlackHat TDS is sold underground.", + "meta": { + "refs": [ + "http://malware.dontneedcoffee.com/2014/04/meet-blackhat-tds.html" + ], + "type": [ + "Underground" + ] + } + }, + { + "value": "Futuristic TDS", + "description": "Futuristic TDS is the TDS component of BlackOS/CookieBomb/NorthTale Iframer", + "meta": { + "type": [ + "Underground" + ] + } + }, + { + "value": "Orchid TDS", + "description": "Orchid TDS was sold underground. Rare usage", + "meta": { + "type": [ + "Underground" + ] + } + } + ], + "version": 2, + "uuid": "ab5fffaa-c5f6-11e6-9d9d-cec0c932ce01", + "description": "TDS is a list of Traffic Direction System used by adversaries", + "authors": [ + "Kafeine" + ], + "source": "MISP Project", + "type": "tds", + "name": "TDS" +} diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 82f390b..b54ea59 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -9,7 +9,8 @@ "Advanced Persistent Threat 1", "Byzantine Candor", "Group 3", - "TG-8223" + "TG-8223", + "Comment Group" ], "country": "CN", "refs": [ @@ -28,6 +29,7 @@ }, { "value": "Nitro", + "description": "These attackers were the subject of an extensive report by Symantec in 2011, which termed the attackers Nitro and stated: 'The goal of the attackers appears to be to collect intellectual property such as design documents, formulas, and manufacturing processes. In addition, the same attackers appear to have a lengthy operation history including attacks on other industries and organizations. Attacks on the chemical industry are merely their latest attack wave. As part of our investigations, we were also able to identify and contact one of the attackers to try and gain insights into the motivations behind these attacks.' Palo Alto Networks reported on continued activity by the attackers in 2014. ", "meta": { "country": "CN", "refs": [ @@ -40,10 +42,12 @@ }, { "value": "Codoso", + "description": "The New York Times described Codoso as: 'A collection of hackers for hire that the security industry has been tracking for years. Over the years, the group has breached banks, law firms and tech companies, and once hijacked the Forbes website to try to infect visitors’ computers with malware.'", "meta": { "country": "CN", "refs": [ - "https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks" + "https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks", + "https://www.nytimes.com/2016/06/12/technology/the-chinese-hackers-in-the-back-office.html" ], "synonyms": [ "C0d0so", @@ -137,7 +141,7 @@ "http://cdn0.vox-cdn.com/assets/4589853/crowdstrike-intelligence-report-putter-panda.original.pdf" ] }, - "description": "The CrowdStrike Intelligence team has been tracking this particular unit since 2012, under the codename PUTTER PANDA, and has documented activity dating back to 2007. The report identifies Chen Ping, aka cpyy, and the primary location of Unit 61486. ", + "description": "Putter Panda were the subject of an extensive report by CrowdStrike, which stated: 'The CrowdStrike Intelligence team has been tracking this particular unit since2012, under the codename PUTTER PANDA, and has documented activity dating back to 2007. The report identifies Chen Ping, aka cpyy, and the primary location of Unit 61486.'", "value": "Putter Panda" }, { @@ -157,19 +161,22 @@ "http://www.symantec.com/connect/blogs/buckeye-cyberespionage-group-shifts-gaze-us-hong-kong" ] }, - "value": "UPS" + "value": "UPS", + "description": "Symantec described UPS in 2016 report as: 'Buckeye (also known as APT3, Gothic Panda, UPS Team, and TG-0110) is a cyberespionage group that is believed to have been operating for well over half a decade. Traditionally, the group attacked organizations in the US as well as other targets. However, Buckeyes focus appears to have changed as of June 2015, when the group began compromising political entities in Hong Kong.'" }, { "meta": { "synonyms": [ - "DUBNIUM" + "DUBNIUM", + "Fallout Team" ], "refs": [ "https://securelist.com/blog/research/71713/darkhotels-attacks-in-2015/", "https://blogs.technet.microsoft.com/mmpc/2016/06/09/reverse-engineering-dubnium-2" ] }, - "value": "darkhotel" + "value": "DarkHotel", + "description": "Kaspersky described DarkHotel in a 2014 report as: '... DarkHotel drives its campaigns by spear-phishing targets with highly advanced Flash zero-day exploits that effectively evade the latest Windows and Adobe defenses, and yet they also imprecisely spread among large numbers of vague targets with peer-to-peer spreading tactics. Moreover, this crews most unusual characteristic is that for several years the Darkhotel APT has maintained a capability to use hotel networks to follow and hit selected targets as they travel around the world.'" }, { "meta": { @@ -215,7 +222,8 @@ "http://www.fireeye.com/blog/technical/cyber-exploits/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html" ] }, - "value": "Aurora Panda" + "value": "Aurora Panda", + "description": "FireEye described APT17 in a 2015 report as: 'APT17, also known as DeputyDog, is a China based threat group that FireEye Intelligence has observed conducting network intrusions against U.S. government entities, the defense industry, law firms, information technology companies, mining companies, and non-government organizations.'" }, { "meta": { @@ -231,7 +239,8 @@ "https://threatpost.com/apt-gang-branches-out-to-medical-espionage-in-community-health-breach/107828" ] }, - "value": "Wekby" + "value": "Wekby", + "description": "Wekby was described by Palo Alto Networks in a 2015 report as: 'Wekby is a group that has been active for a number of years, targeting various industries such as healthcare, telecommunications, aerospace, defense, and high tech. The group is known to leverage recently released exploits very shortly after those exploits are available, such as in the case of HackingTeams Flash zero - day exploit.'" }, { "meta": { @@ -243,7 +252,8 @@ "http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-tropic-trooper.pdf" ] }, - "value": "Tropic Trooper" + "value": "Tropic Trooper", + "description": "TrendMicro described Tropic Trooper in a 2015 report as: 'Taiwan and the Philippines have become the targets of an ongoing campaign called Operation TropicTrooper. Active since 2012, the attackers behind the campaign haveset their sights on the Taiwanese government as well as a number of companies in the heavy industry. The same campaign has also targeted key Philippine military agencies.'" }, { "meta": { @@ -254,15 +264,19 @@ "Group72", "Tailgater", "Ragebeast", - "Blackfly" + "Blackfly", + "Lead", + "Wicked Spider" ], "country": "CN", "refs": [ "http://securelist.com/blog/research/57585/winnti-faq-more-than-just-a-game/", - "http://williamshowalter.com/a-universal-windows-bootkit/" + "http://williamshowalter.com/a-universal-windows-bootkit/", + "https://blogs.technet.microsoft.com/mmpc/2017/01/25/detecting-threat-actors-in-recent-german-industrial-attacks-with-windows-defender-atp" ] }, - "value": "Axiom" + "value": "Axiom", + "description": "The Winnti grouping of activity is large and may actually be a number of linked groups rather than a single discrete entity. Kaspersky describe Winnti as: 'The Winnti group has been attacking companies in the online video game industry since 2009 and is currently still active. The groups objectives are stealing digital certificates signed by legitimate software vendors in addition to intellectual property theft, including the source code of online game projects. The majority of the victims are from South East Asia.'" }, { "meta": { @@ -299,7 +313,8 @@ "http://www.fireeye.com/blog/technical/malware-research/2014/03/spear-phishing-the-news-cycle-apt-actors-leverage-interest-in-the-disappearance-of-malaysian-flight-mh-370.html" ] }, - "value": "Naikon" + "value": "Naikon", + "description": "Kaspersky described Naikon in a 2015 report as: 'The Naikon group is mostly active in countries such as the Philippines, Malaysia, Cambodia, Indonesia, Vietnam, Myanmar, Singapore, and Nepal, hitting a variety of targets in a very opportunistic way.'" }, { "meta": { @@ -359,9 +374,13 @@ "APT 10", "menuPass", "happyyongzi", - "POTASSIUM" + "POTASSIUM", + "DustStorm" ], - "country": "CN" + "country": "CN", + "refs": [ + "http://researchcenter.paloaltonetworks.com/2017/02/unit42-menupass-returns-new-malware-new-attacks-japanese-academics-organizations/" + ] }, "value": "Stone Panda" }, @@ -432,10 +451,10 @@ "refs": [ "http://www.crowdstrike.com/blog/whois-anchor-panda/" ], - "Motive": "Espionage" + "motive": "Espionage" }, "value": "Anchor Panda", - "Description": "PLA Navy" + "description": "PLA Navy" }, { "meta": { @@ -451,7 +470,7 @@ }, { "meta": { - "synomyns": [ + "synonyms": [ "IceFog", "Dagger Panda" ], @@ -469,7 +488,10 @@ "PittyTiger", "MANGANESE" ], - "country": "CN" + "country": "CN", + "refs": [ + "http://blog.airbuscybersecurity.com/post/2014/07/The-Eye-of-the-Tiger2" + ] }, "value": "Pitty Panda", "description": "The Pitty Tiger group has been active since at least 2011. They have been seen using HeartBleed vulnerability in order to directly get valid credentials" @@ -544,6 +566,9 @@ { "meta": { "country": "CN", + "refs": [ + "http://researchcenter.paloaltonetworks.com/2014/09/recent-watering-hole-attacks-attributed-apt-group-th3bug-using-poison-ivy/" + ], "synonyms": [ "APT20", "APT 20", @@ -582,6 +607,9 @@ { "meta": { "country": "CN", + "refs": [ + "https://community.rapid7.com/community/infosec/blog/2013/06/07/keyboy-targeted-attacks-against-vietnam-and-india" + ], "synonyms": [ "APT23", "KeyBoy" @@ -598,6 +626,9 @@ "AjaxSecurityTeam", "Ajax Security Team", "Group 26" + ], + "refs": [ + "https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-operation-saffron-rose.pdf" ] }, "value": "Flying Kitten", @@ -627,6 +658,9 @@ "Parastoo", "Group 83", "Newsbeef" + ], + "refs": [ + "https://en.wikipedia.org/wiki/Operation_Newscaster" ] }, "value": "Charming Kitten", @@ -670,7 +704,9 @@ "synonyms": [ "Operation Cleaver", "Tarh Andishan", - "Alibaba" + "Alibaba", + "2889", + "TG-2889" ], "refs": [ "http://cdn2.hubspot.net/hubfs/270968/assets/Cleaver/Cylance_Operation_Cleaver_Report.pdf" @@ -717,8 +753,8 @@ "TG-4127", "Group-4127", "STRONTIUM", - "Grey-Cloud", - "TAG_0700" + "TAG_0700", + "IRON TWILIGHT" ], "country": "RU", "refs": [ @@ -752,7 +788,8 @@ "https://labsblog.f-secure.com/2015/09/17/the-dukes-7-years-of-russian-cyber-espionage/" ] }, - "value": "APT 29" + "value": "APT 29", + "description": "A 2015 report by F-Secure describe APT29 as: 'The Dukes are a well-resourced, highly dedicated and organized cyberespionage group that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making. The Dukes show unusual confidence in their ability to continue successfully compromising their targets, as well as in their ability to operate with impunity. The Dukes primarily target Western governments and related organizations, such as government ministries and agencies, political think tanks, and governmental subcontractors. Their targets have also included the governments of members of the Commonwealth of Independent States;Asian, African, and Middle Eastern governments;organizations associated with Chechen extremism;and Russian speakers engaged in the illicit trade of controlled substances and drugs. The Dukes are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke. In recent years, the Dukes have engaged in apparently biannual large - scale spear - phishing campaigns against hundreds or even thousands of recipients associated with governmental institutions and affiliated organizations. These campaigns utilize a smash - and - grab approach involving a fast but noisy breakin followed by the rapid collection and exfiltration of as much data as possible.If the compromised target is discovered to be of value, the Dukes will quickly switch the toolset used and move to using stealthier tactics focused on persistent compromise and long - term intelligence gathering '" }, { "meta": { @@ -772,11 +809,13 @@ ], "refs": [ "https://www.first.org/resources/papers/tbilisi2014/turla-operations_and_development.pdf", - "https://www.circl.lu/pub/tr-25/" + "https://www.circl.lu/pub/tr-25/", + "https://www.theguardian.com/technology/2014/aug/07/turla-hackers-spying-governments-researcher-kaspersky-symantec" ], "country": "RU" }, - "value": "Turla Group" + "value": "Turla Group", + "description": "A 2014 Guardian article described Turla as: 'Dubbed the Turla hackers, initial intelligence had indicated western powers were key targets, but it was later determined embassies for Eastern Bloc nations were of more interest. Embassies in Belgium, Ukraine, China, Jordan, Greece, Kazakhstan, Armenia, Poland, and Germany were all attacked, though researchers from Kaspersky Lab and Symantec could not confirm which countries were the true targets. In one case from May 2012, the office of the prime minister of a former Soviet Union member country was infected, leading to 60 further computers being affected, Symantec researchers said. There were some other victims, including the ministry for health of a Western European country, the ministry for education of a Central American country, a state electricity provider in the Middle East and a medical organisation in the US, according to Symantec. It is believed the group was also responsible for a much - documented 2008 attack on the US Central Command. The attackers - who continue to operate - have ostensibly sought to carry out surveillance on targets and pilfer data, though their use of encryption across their networks has made it difficult to ascertain exactly what the hackers took.Kaspersky Lab, however, picked up a number of the attackers searches through their victims emails, which included terms such as Nato and EU energy dialogue Though attribution is difficult to substantiate, Russia has previously been suspected of carrying out the attacks and Symantecs Gavin O’ Gorman told the Guardian a number of the hackers appeared to be using Russian names and language in their notes for their malicious code. Cyrillic was also seen in use.'" }, { "meta": { @@ -829,6 +868,9 @@ "Carbon Spider" ], "country": "RU", + "refs": [ + "https://en.wikipedia.org/wiki/Carbanak" + ], "motive": "Cybercrime" }, "description": "Groups targeting financial organizations or people with significant financial assets.", @@ -929,7 +971,10 @@ "Appin", "OperationHangover" ], - "country": "IN" + "country": "IN", + "refs": [ + "http://enterprise-manage.norman.c.bitbit.net/resources/files/Unveiling_an_Indian_Cyberattack_Infrastructure.pdf" + ] }, "value": "Viceroy Tiger" }, @@ -956,11 +1001,14 @@ "value": "SNOWGLOBE", "meta": { "country": "FR", + "refs": [ + "https://securelist.com/blog/research/69114/animals-in-the-apt-farm/" + ], "synonyms": [ "Animal Farm" - ], - "description": "In 2014, researchers at Kaspersky Lab discovered and reported on three zero-days that were being used in cyberattacks in the wild. Two of these zero-day vulnerabilities are associated with an advanced threat actor we call Animal Farm. Over the past few years, Animal Farm has targeted a wide range of global organizations. The group has been active since at least 2009 and there are signs that earlier malware versions were developed as far back as 2007." - } + ] + }, + "description": "In 2014, researchers at Kaspersky Lab discovered and reported on three zero-days that were being used in cyberattacks in the wild. Two of these zero-day vulnerabilities are associated with an advanced threat actor we call Animal Farm. Over the past few years, Animal Farm has targeted a wide range of global organizations. The group has been active since at least 2009 and there are signs that earlier malware versions were developed as far back as 2007." }, { "meta": { @@ -990,24 +1038,28 @@ "description": "Group targeting Indian Army or related assets in India. Attribution to a Pakistani connection has been made by TrendMicro." }, { - "refs": [ - "https://citizenlab.org/2016/05/stealth-falcon/" - ], - "country": "UAE", + "meta": { + "refs": [ + "https://citizenlab.org/2016/05/stealth-falcon/" + ], + "synonyms": [ + "FruityArmor" + ], + "country": "UAE" + }, "value": "Stealth Falcon", - "description": "Group targeting Emirati journalists, activists, and dissidents.", - "synonyms": [ - "FruityArmor" - ] + "description": "Group targeting Emirati journalists, activists, and dissidents." }, { - "synonyms": [ - "Operation Daybreak", - "Operation Erebus" - ], - "refs": [ - "https://securelist.com/blog/research/75082/cve-2016-4171-adobe-flash-zero-day-used-in-targeted-attacks/" - ], + "meta": { + "synonyms": [ + "Operation Daybreak", + "Operation Erebus" + ], + "refs": [ + "https://securelist.com/blog/research/75082/cve-2016-4171-adobe-flash-zero-day-used-in-targeted-attacks/" + ] + }, "value": "ScarCruft", "description": "ScarCruft is a relatively new APT group; victims have been observed in several countries, including Russia, Nepal, South Korea, China, India, Kuwait and Romania. The group has several ongoing operations utilizing multiple exploits — two for Adobe Flash and one for Microsoft Internet Explorer." }, @@ -1015,7 +1067,12 @@ "meta": { "refs": [ "http://download.bitdefender.com/resources/files/News/CaseStudies/study/115/Bitdefender-Whitepaper-PAC-A4-en-EN1.pdf" - ] + ], + "synonyms": [ + "Skipper", + "Popeye" + ], + "country": "RU" }, "value": "Pacifier APT", "description": "Bitdefender detected and blocked an ongoing cyber-espionage campaign against Romanian institutions and other foreign targets. The attacks started in 2014, with the latest reported occurrences in May of 2016. The APT, dubbed Pacifier by Bitdefender researchers, makes use of malicious .doc documents and .zip files distributed via spear phishing e-mail." @@ -1096,6 +1153,10 @@ }, { "meta": { + "synonyms": [ + "TG-3390", + "Emissary Panda" + ], "refs": [ "http://www.secureworks.com/cyber-threat-intelligence/threats/threat-group-3390-targets-organizations-for-cyberespionage/", "https://attack.mitre.org" @@ -1125,12 +1186,12 @@ "https://attack.mitre.org/wiki/Group/G0013" ], "synonyms": [ - "APT 30" + "APT30" ], "country": "CN" }, - "value": "APT30", - "description": "APT30 is a threat group suspected to be associated with the Chinese government. While Naikon shares some characteristics with APT30, the two groups do not appear to be exact matches." + "value": "APT 30", + "description": "APT 30 is a threat group suspected to be associated with the Chinese government. While Naikon shares some characteristics with APT30, the two groups do not appear to be exact matches." }, { "meta": { @@ -1175,15 +1236,6 @@ "description": "Libyan Scorpions is a malware operation in use since September 2015 and operated by a politically motivated group whose main objective is intelligence gathering, spying on influentials and political figures and operate an espionage campaign within Libya.", "value": "Libyan Scorpions" }, - { - "meta": { - "refs": [ - "https://www.virusbulletin.com/conference/vb2016/abstracts/last-minute-paper-strongpity-waterhole-attacks-targeting-italian-and-belgian-encryption-users" - ], - "country": "TU" - }, - "value": "StrongPity" - }, { "meta": { "synonyms": [ @@ -1218,16 +1270,12 @@ { "meta": { "synonyms": [ - "Grey-Pro", - "Coldriver", "Reuse team", - "Malware reusers", - "Callisto Group", "Dancing Salome" ] }, "description": "Threat Group conducting cyber espionage while re-using tools from other teams; like those of Hacking Team, and vmprotect to obfuscate.", - "value": "Callisto" + "value": "Malware reusers" }, { "value": "TERBIUM", @@ -1243,12 +1291,14 @@ "description": "In October 2012, malware attacks against Israeli government targets grabbed media attention as officials temporarily cut off Internet access for its entire police force and banned the use of USB memory sticks. Security researchers subsequently linked these attacks to a broader, yearlong campaign that targeted not just Israelis but Palestinians as well. and as discovered later, even the U.S. and UK governments. Further research revealed a connection between these attacks and members of the so-called “Gaza Hackers Team.” We refer to this campaign as “Molerats.”", "meta": { "refs": [ - "https://www.fireeye.com/blog/threat-research/2013/08/operation-molerats-middle-east-cyber-attacks-using-poison-ivy.html" + "https://www.fireeye.com/blog/threat-research/2013/08/operation-molerats-middle-east-cyber-attacks-using-poison-ivy.html", + "http://blog.vectranetworks.com/blog/moonlight-middle-east-targeted-attacks" ], "synonyms": [ "Gaza Hackers Team", "Operation Molerats", - "Extreme Jackal" + "Extreme Jackal", + "Moonlight" ] } }, @@ -1257,8 +1307,13 @@ "description": "PROMETHIUM is an activity group that has been active as early as 2012. The group primarily uses Truvasys, a first-stage malware that has been in circulation for several years. Truvasys has been involved in several attack campaigns, where it has masqueraded as one of server common computer utilities, including WinUtils, TrueCrypt, WinRAR, or SanDisk. In each of the campaigns, Truvasys malware evolved with additional features—this shows a close relationship between the activity groups behind the campaigns and the developers of the malware.", "meta": { "refs": [ - "https://blogs.technet.microsoft.com/mmpc/2016/12/14/twin-zero-day-attacks-promethium-and-neodymium-target-individuals-in-europe/" - ] + "https://blogs.technet.microsoft.com/mmpc/2016/12/14/twin-zero-day-attacks-promethium-and-neodymium-target-individuals-in-europe/", + "https://www.virusbulletin.com/conference/vb2016/abstracts/last-minute-paper-strongpity-waterhole-attacks-targeting-italian-and-belgian-encryption-users" + ], + "synonyms": [ + "StrongPity" + ], + "country": "TU" } }, { @@ -1356,15 +1411,107 @@ "description": "The Equation Group is a highly sophisticated threat actor described by its discoverers at Kaspersky Labs as one of the most sophisticated cyber attack groups in the world, operating alongside but always from a position of superiority with the creators of Stuxnet and Flame", "meta": { "country": "US", - "refs": ["https://en.wikipedia.org/wiki/Equation_Group"] + "refs": [ + "https://en.wikipedia.org/wiki/Equation_Group" + ] } }, { "value": "Greenbug", "description": "Greenbug was discovered targeting a range of organizations in the Middle East including companies in the aviation, energy, government, investment, and education sectors.", "meta": { - "refs": ["https://www.symantec.com/connect/blogs/greenbug-cyberespionage-group-targeting-middle-east-possible-links-shamoon"] + "refs": [ + "https://www.symantec.com/connect/blogs/greenbug-cyberespionage-group-targeting-middle-east-possible-links-shamoon" + ] } + }, + { + "value": "Gamaredon Group", + "description": "Unit 42 threat researchers have recently observed a threat group distributing new, custom developed malware. We have labelled this threat group the Gamaredon Group and our research shows that the Gamaredon Group has been active since at least 2013. In the past, the Gamaredon Group has relied heavily on off-the-shelf tools. Our new research shows the Gamaredon Group have made a shift to custom-developed malware. We believe this shift indicates the Gamaredon Group have improved their technical capabilities.", + "meta": { + "refs": [ + "http://researchcenter.paloaltonetworks.com/2017/02/unit-42-title-gamaredon-group-toolset-evolution" + ] + } + }, + { + "meta": { + "country": "CHN", + "synonyms": [ + "Zhenbao" + ], + "refs": [ + "http://www.darkreading.com/endpoint/chinese-cyberspies-pivot-to-russia-in-wake-of-obama-xi-pact/d/d-id/1324242" + ] + }, + "value": "Hammer Panda", + "description": "Hammer Panda is a group of suspected Chinese origin targeting organisations in Russia." + }, + { + "meta": { + "country": "CHN", + "refs": [ + "https://blogs.technet.microsoft.com/mmpc/2017/01/25/detecting-threat-actors-in-recent-german-industrial-attacks-with-windows-defender-atp" + ] + }, + "value": "Barium", + "description": "Barium is one of the groups using Winnti." + }, + { + "meta": { + "country": "IRN", + "synonyms": [ + "Operation Mermaid" + ], + "refs": [ + "https://www.blackhat.com/docs/us-16/materials/us-16-Guarnieri-Iran-And-The-Soft-War-For-Internet-Dominance-wp.pdf" + ] + }, + "value": "Infy", + "description": "Infy is a group of suspected Iranian origin." + }, + { + "meta": { + "country": "IRN", + "refs": [ + "https://www.blackhat.com/docs/us-16/materials/us-16-Guarnieri-Iran-And-The-Soft-War-For-Internet-Dominance-wp.pdf" + ] + }, + "value": "Sima", + "description": "Sima is a group of suspected Iranian origin targeting Iranians in diaspora." + }, + { + "meta": { + "country": "CHN", + "synonyms": [ + "Cloudy Omega" + ], + "refs": [ + "https://securelist.com/blog/research/71876/new-activity-of-the-blue-termite-apt/" + ] + }, + "value": "Blue Termite", + "description": "Blue Termite is a group of suspected Chinese origin active in Japan." + }, + { + "meta": { + "country": "UKR", + "refs": [ + "http://www.welivesecurity.com/2016/05/18/groundbait" + ] + }, + "value": "Groundbait", + "description": "Groundbait is a group targeting anti-government separatists in the self-declared Donetsk and Luhansk People’s Republics." + }, + { + "meta": { + "refs": [ + "https://www.symantec.com/connect/blogs/longhorn-tools-used-cyberespionage-group-linked-vault-7" + ], + "country": "US" + }, + "value": "Longhorn", + "description": "Longhorn has been active since at least 2011. It has used a range of back door Trojans in addition to zero-day vulnerabilities to compromise its targets. Longhorn has infiltrated governments and internationally operating organizations, in addition to targets in the financial, telecoms, energy, aerospace, information technology, education, and natural resources sectors. All of the organizations targeted would be of interest to a nation-state attacker. Longhorn has infected 40 targets in at least 16 countries across the Middle East, Europe, Asia, and Africa. On one occasion a computer in the United States was compromised but, following infection, an uninstaller was launched within hours, which may indicate this victim was infected unintentionally." } ], "name": "Threat actor", @@ -1379,5 +1526,5 @@ ], "description": "Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign.", "uuid": "7cdff317-a673-4474-84ec-4f1754947823", - "version": 13 + "version": 19 } diff --git a/clusters/tool.json b/clusters/tool.json index cd3e1e2..a7b32f9 100644 --- a/clusters/tool.json +++ b/clusters/tool.json @@ -1,73 +1,175 @@ { + "name": "Tool", + "type": "tool", + "source": "MISP Project", + "authors": [ + "Alexandre Dulaunoy", + "Florian Roth", + "Timo Steffens", + "Christophe Vandeplas" + ], + "description": "threat-actor-tools is an enumeration of tools used by adversaries. The list includes malware but also common software regularly used by the adversaries.", + "uuid": "0d821b68-9d82-4c6d-86a6-1071a9e0f79f", + "version": 28, "values": [ { - "value": "PlugX", - "description": "Malware" + "meta": { + "type": [ + "Banking" + ], + "synonyms": [ + "Hunter", + "Zusy", + "TinyBanker" + ], + "refs": [ + "https://thehackernews.com/search/label/Zusy%20Malware", + "http://blog.trendmicro.com/trendlabs-security-intelligence/the-tinbatinybanker-malware/" + ] + }, + "description": "Banking Malware", + "value": "Tinba" }, { + "meta": { + "type": [ + "Backdoor" + ], + "synonyms": [ + "Backdoor.FSZO-5117", + "Trojan.Heur.JP.juW@ayZZvMb", + "Trojan.Inject1.6386", + "Korplug", + "Agent.dhwf" + ], + "refs": [ + "https://www.trendmicro.com/vinfo/us/threat-encyclopedia/web-attack/112/pulling-the-plug-on-plugx" + ] + }, + "description": "Malware", + "value": "PlugX" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://www.zscaler.com/pdf/whitepapers/msupdater_trojan_whitepaper.pdfx" + ] + }, + "description": " Trojan (RAT) linked to current targeted attacks and others dating back to at least early 2009", "value": "MSUpdater" }, { - "value": "Lazagne", - "description": "A password recovery tool regularly used by attackers" - }, - { - "value": "Poison Ivy", - "description": "Poison Ivy is a RAT which was freely available and first released in 2005.", "meta": { + "type": [ + "HackTool" + ], "refs": [ - "https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-poison-ivy.pdf" + "https://github.com/AlessandroZ/LaZagne" ] - } + }, + "description": "A password sthealing tool regularly used by attackers", + "value": "Lazagne" }, { - "value": "SPIVY", - "description": "In March 2016, Unit 42 observed this new Poison Ivy variant we’ve named SPIVY being deployed via weaponized documents leveraging CVE-2015-2545.", "meta": { + "type": [ + "Backdoor" + ], + "synonyms": [ + "Backdoor.Win32.PoisonIvy", + "Gen:Trojan.Heur.PT" + ], + "refs": [ + "https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-poison-ivy.pdf", + "https://www.f-secure.com/v-descs/backdoor_w32_poisonivy.shtml" + ] + }, + "description": "Poison Ivy is a RAT which was freely available and first released in 2005.", + "value": "Poison Ivy" + }, + { + "meta": { + "type": [ + "Backdoor" + ], "refs": [ "http://researchcenter.paloaltonetworks.com/2016/04/unit42-new-poison-ivy-rat-variant-targets-hong-kong-pro-democracy-activists/" ] - } + }, + "description": "In March 2016, Unit 42 observed this new Poison Ivy variant we’ve named SPIVY being deployed via weaponized documents leveraging CVE-2015-2545.", + "value": "SPIVY" }, { + "meta": { + "type": [ + "Backdoor" + ], + "synonyms": [ + "Anchor Panda" + ], + "refs": [ + "https://www.crowdstrike.com/blog/whois-anchor-panda/" + ] + }, "value": "Torn RAT" }, { - "value": "OzoneRAT", "meta": { - "refs": [ - "https://blog.fortinet.com/2016/08/29/german-speakers-targeted-by-spam-leading-to-ozone-rat" + "type": [ + "Backdoor" ], "synonyms": [ "Ozone RAT", "ozonercp" + ], + "refs": [ + "https://blog.fortinet.com/2016/08/29/german-speakers-targeted-by-spam-leading-to-ozone-rat" ] - } + }, + "value": "OzoneRAT" }, { + "meta": { + "type": [ + "Backdoor" + ], + "synonyms": [ + "BackDoor-FBZT!52D84425CDF2", + "Trojan.Win32.Staser.ytq", + "Win32/Zegost.BW" + ], + "refs": [ + "https://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Backdoor%3aWin32%2fZegost.BW" + ] + }, + "description": "ZeGhots is a RAT which was freely available and first released in 2014.", "value": "ZeGhost" }, { - "value": "Backdoor.Dripion", - "description": "Backdoor.Dripion was custom developed, deployed in a highly targeted fashion, and used command and control servers disguised as antivirus company websites.", "meta": { - "refs": [ - "http://www.symantec.com/connect/blogs/taiwan-targeted-new-cyberespionage-back-door-trojan" + "type": [ + "dropper", + "PWS" ], "synonyms": [ - "Dripion" + "Elise" + ], + "refs": [ + "http://thehackernews.com/2015/08/elise-malware-hacking.html" ] - } + }, + "description": "Trojan (RAT) linked to current targeted attacks and others dating back to at least early 2009", + "value": "Elise Backdoor" }, { - "value": "Elise Backdoor", - "synonyms": [ - "Elise" - ] - }, - { - "value": "Trojan.Laziok", "meta": { + "type": [ + "PWS", + "reco" + ], "synonyms": [ "Laziok" ], @@ -75,336 +177,583 @@ "http://www.symantec.com/connect/blogs/new-reconnaissance-threat-trojanlaziok-targets-energy-sector" ] }, - "description": "A new information stealer, Trojan.Laziok, acts as a reconnaissance tool allowing attackers to gather information and tailor their attack methods for each compromised computer." + "description": "A new information stealer, Trojan.Laziok, acts as a reconnaissance tool allowing attackers to gather information and tailor their attack methods for each compromised computer.", + "value": "Trojan.Laziok" }, { - "value": "Slempo", - "description": "Android-based malware", "meta": { + "type": [ + "Spyware", + "AndroidOS" + ], "synonyms": [ "GM-Bot", + "SlemBunk", + "Bankosy", "Acecard" + ], + "refs": [ + "https://securityintelligence.com/android-malware-about-to-get-worse-gm-bot-source-code-leaked/" ] - } + }, + "description": "Android-based malware", + "value": "Slempo" }, { - "value": "PWOBot", - "description": "We have discovered a malware family named ‘PWOBot’ that is fairly unique because it is written entirely in Python, and compiled via PyInstaller to generate a Microsoft Windows executable. The malware has been witnessed affecting a number of Europe-based organizations, particularly in Poland. Additionally, the malware is delivered via a popular Polish file-sharing web service.", "meta": { + "type": [ + "Dropper", + "Miner", + "Spyware" + ], + "synonyms": [ + "PWOLauncher", + "PWOHTTPD", + "PWOKeyLogger", + "PWOMiner", + "PWOPyExec", + "PWOQuery" + ], "refs": [ "http://researchcenter.paloaltonetworks.com/2016/04/unit42-python-based-pwobot-targets-european-organizations/" ] - } + }, + "description": "We have discovered a malware family named ‘PWOBot’ that is fairly unique because it is written entirely in Python, and compiled via PyInstaller to generate a Microsoft Windows executable. The malware has been witnessed affecting a number of Europe-based organizations, particularly in Poland. Additionally, the malware is delivered via a popular Polish file-sharing web service.", + "value": "PWOBot" }, { - "value": "Lstudio" - }, - { - "value": "Joy RAT" - }, - { - "value": "Lost Door RAT", - "descriptions": "We recently came across a cyber attack that used a remote access Trojan (RAT) called Lost Door, a tool currently offered on social media sites. What also struck us the most about this RAT (detected as BKDR_LODORAT.A) is how it abuses the Port Forward feature in routers.", "meta": { - "synonyms": [ - "LostDoor RAT" + "type": [ + "Backdoor" ], "refs": [ "http://blog.trendmicro.com/trendlabs-security-intelligence/lost-door-rat-accessible-customizable-attack-tool/" + ], + "synonyms": [ + "LostDoor RAT", + "BKDR_LODORAT" ] - } + }, + "description": "We recently came across a cyber attack that used a remote access Trojan (RAT) called Lost Door, a tool currently offered on social media sites. What also struck us the most about this RAT (detected as BKDR_LODORAT.A) is how it abuses the Port Forward feature in routers.", + "value": "Lost Door RAT" }, { - "value": "njRAT", "meta": { - "synonyms": [ - "Bladabindi" + "type": [ + "Backdoor" ], "refs": [ - "http://www.fidelissecurity.com/files/files/FTA_1009-njRAT_Uncovered_rev2.pdf" + "http://www.fidelissecurity.com/files/files/FTA_1009-njRAT_Uncovered_rev2.pdf", + "https://github.com/kevthehermit/RATDecoders/blob/master/yaraRules/njRat.yar" + ], + "synonyms": [ + "Bladabindi", + "Jorik" ] - } + }, + "value": "njRAT" }, { - "value": "NanoCoreRAT", "meta": { - "synonyms": [ - "NanoCore" + "type": [ + "Backdoor" ], "refs": [ - "http://www.symantec.com/connect/blogs/nanocore-another-rat-tries-make-it-out-gutter" + "http://www.symantec.com/connect/blogs/nanocore-another-rat-tries-make-it-out-gutter", + "https://nanocore.io/" + ], + "synonyms": [ + "NanoCore", + "Nancrat", + "Zurten", + "Atros2.CKPN" ] - } + }, + "value": "NanoCoreRAT" }, { - "value": "Sakula", "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://www.secureworks.com/research/sakula-malware-family" + ], "synonyms": [ "Sakurel" ] - } + }, + "value": "Sakula" }, { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "http://www.threatgeek.com/2016/01/introducing-hi-zor-rat.html" + ] + }, + "value": "Hi-ZOR" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "http://www.novetta.com/wp-content/uploads/2014/11/Derusbi.pdf", + "https://www.rsaconference.com/writable/presentations/file_upload/hta-w02-dissecting-derusbi.pdf" + ], + "synonyms": [ + "TROJ_DLLSERV.BE" + ] + }, "value": "Derusbi" }, { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "http://blog.trendmicro.com/trendlabs-security-intelligence/evilgrab-malware-family-used-in-targeted-attacks-in-asia/", + "http://researchcenter.paloaltonetworks.com/2015/06/evilgrab-delivered-by-watering-hole-attack-on-president-of-myanmars-website/" + ], + "synonyms": [ + "BKDR_HGDER", + "BKDR_EVILOGE", + "BKDR_NVICM", + "Wmonder" + ] + }, "value": "EvilGrab" }, { - "value": "IEChecker" - }, - { + "meta": { + "type": [ + "Dropper" + ], + "refs": [ + "https://www.symantec.com/connect/blogs/cve-2012-1875-exploited-wild-part-1-trojannaid", + "http://telussecuritylabs.com/threats/show/TSL20120614-05" + ], + "synonyms": [ + "Naid", + "Mdmbot.E", + "AGENT.GUNZ", + "AGENT.AQUP.DROPPER", + "AGENT.BMZA", + "MCRAT.A", + "AGENT.ABQMR" + ] + }, "value": "Trojan.Naid" }, { - "value": "Backdoor.Moudoor" + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "http://www.darkreading.com/attacks-breaches/elite-chinese-cyberspy-group-behind-bit9-hack/d/d-id/1140495", + "https://securityledger.com/2013/09/apt-for-hire-symantec-outs-hidden-lynx-hacking-crew/" + ], + "synonyms": [ + "SCAR", + "KillProc.14145" + ] + }, + "description": "Backdoor.Moudoor, a customized version of Gh0st RAT", + "value": "Moudoor" }, { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://securelist.com/blog/incidents/57455/nettraveler-is-back-the-red-star-apt-returns-with-new-tricks/" + ], + "synonyms": [ + "TravNet", + "Netfile" + ] + }, + "description": "APT that infected hundreds of high profile victims in more than 40 countries. Known targets of NetTraveler include Tibetan/Uyghur activists, oil industry companies, scientific research centers and institutes, universities, private companies, governments and governmental institutions, embassies and military contractors.", "value": "NetTraveler" }, { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://securelist.com/blog/incidents/57455/nettraveler-is-back-the-red-star-apt-returns-with-new-tricks/" + ], + "synonyms": [ + "Etso", + "SUQ", + "Agent.ALQHI" + ] + }, + "description": "APT used As part of Operation SMN, Novetta analyzed recent versions of the Winnti malware. The samples, compiled from mid- to late 2014, exhibited minimal functional changes over the previous generations Kaspersky reported in 2013.", "value": "Winnti" }, { + "meta": { + "type": [ + "HackTool" + ], + "refs": [ + "https://github.com/gentilkiwi/mimikatz" + ], + "synonyms": [ + "Mikatz" + ] + }, + "description": "Ease Credential stealh and replay, A little tool to play with Windows security.", "value": "Mimikatz" }, { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/gnaegle/cse4990-practical3", + "https://www.securestate.com/blog/2013/02/20/apt-if-it-aint-broke" + ] + }, + "description": "Backdoor attribued to APT1", "value": "WEBC2" }, { - "value": "Pirpi", "meta": { + "type": [ + "Backdoor" + ], "refs": [ "http://www.symantec.com/connect/blogs/buckeye-cyberespionage-group-shifts-gaze-us-hong-kong" + ], + "synonyms": [ + "Badey", + "EXL" ] - } + }, + "description": "Symantec has observed Buckeye activity dating back to 2009, involving attacks on various organizations in several regions. Buckeye used a remote access Trojan (Backdoor.Pirpi) in attacks against a US organization’s network in 2009. The group delivered Backdoor.Pirpi through malicious attachments or links in convincing spear-phishing emails.", + "value": "Pirpi" }, { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "http://blog.trendmicro.com/trendlabs-security-intelligence/bkdr_rarstone-new-rat-to-watch-out-for/" + ] + }, + "description": "RARSTONE is a Remote Access Tool (RAT) discovered early 2013 by TrendMicro, it’s characterized by a great affinity with the other RAT know as Plug is and was used in April for phishing campaigns that followed the dramatic attack to the Boston Marathon.", "value": "RARSTONE" }, { - "value": "BACKSPACe" + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://www2.fireeye.com/WEB-2015RPTAPT30.html", + "https://www.fireeye.com/content/dam/fireeye-www/current-threats/pdfs/rpt-southeast-asia-threat-landscape.pdf" + ], + "synonyms": [ + "Lecna" + ] + }, + "description": "Backspace is a Backdoor that targets the Windows platform. This malware is reportedly associated with targeted attacks against Association of Southeast Asian Nations (ASEAN) members (APT30).", + "value": "Backspace" }, { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://securelist.com/analysis/publications/69953/the-naikon-apt/", + "https://kasperskycontenthub.com/securelist/files/2015/05/TheNaikonAPT-MsnMM.pdf" + ] + }, + "description": "Backdoor user by he Naikon APT group", "value": "XSControl" }, { - "value": "NETEAGLE" + "meta": { + "type": [ + "Backdoor" + ], + "synonyms": [ + "scout", + "norton" + ], + "refs": [ + "https://attack.mitre.org/wiki/Software/S0034", + "https://www2.fireeye.com/rs/fireye/images/rpt-apt30.pdf" + ] + }, + "description": "NETEAGLE is a backdoor developed by APT30 with compile dates as early as 2008. It has two main variants known as Scout and Norton.", + "value": "Neteagle" }, { - "value": "Agent.BTZ", "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://blog.gdatasoftware.com/2015/01/23927-evolution-of-sophisticated-spyware-from-agent-btz-to-comrat" + ], "synonyms": [ "ComRat" ] - } + }, + "description": "In November 2014, the experts of the G DATA SecurityLabs published an article about ComRAT, the Agent.BTZ successor. We explained that this case is linked to the Uroburos rootkit.", + "value": "Agent.BTZ" }, { - "value": "Heseber BOT", - "description": "RAT bundle with standard VNC (to avoid/limit A/V detection)." + "description": "RAT bundle with standard VNC (to avoid/limit A/V detection).", + "value": "Heseber BOT" }, { "value": "Agent.dne" }, { - "value": "Wipbot", - "description": "Waterbug is the name given to the actors who use the malware tools Trojan.Wipbot (also known as Tavdig and Epic Turla)", "meta": { - "synonyms": ["Tavdig", "Epic Turla"], - "refs": ["https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/waterbug-attack-group.pdf"] - } + "type": [ + "Backdoor" + ], + "refs": [ + "https://securelist.com/analysis/publications/65545/the-epic-turla-operation/", + "https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/waterbug-attack-group.pdf" + ], + "synonyms": [ + "Tavdig", + "Epic Turla", + "WorldCupSec", + "TadjMakhal" + ] + }, + "description": "Waterbug is the name given to the actors who use the malware tools Trojan.Wipbot (also known as Tavdig and Epic Turla)", + "value": "Wipbot" }, { + "meta": { + "type": [ + "Backdoor", + "Rootkit" + ], + "refs": [ + "https://www.first.org/resources/papers/tbilisi2014/turla-operations_and_development.pdf" + ], + "synonyms": [ + "Snake", + "Uroburos", + "Urouros" + ] + }, + "description": "Family of related sophisticated backdoor software - Name comes from Microsoft detection signature – anagram of Ultra (Ultra3) was a name of the fake driver).", "value": "Turla" }, - { - "value": "Uroburos" - }, { "value": "Winexe" }, { - "value": "Dark Comet", - "description": "RAT initialy identified in 2011 and still actively used." + "description": "RAT initialy identified in 2011 and still actively used.", + "value": "Dark Comet" }, { - "value": "AlienSpy", - "description": "RAT for Apple OS X platforms" - }, - { - "value": "Cadelspy", "meta": { "synonyms": [ "WinSpy" ] - } + }, + "value": "Cadelspy" }, { - "value": "CMStar", "meta": { "refs": [ "http://researchcenter.paloaltonetworks.com/2016/03/digital-quartermaster-scenario-demonstrated-in-attacks-against-the-mongolian-government/" ] - } + }, + "value": "CMStar" }, { - "value": "DHS2015", "meta": { - "synonyms": [ - "iRAT" - ], "refs": [ "https://securelist.com/files/2015/02/The-Desert-Falcons-targeted-attacks.pdf" + ], + "synonyms": [ + "iRAT" ] - } + }, + "value": "DHS2015" }, { - "value": "Gh0st Rat", - "description": "Gh0st Rat is a well-known Chinese remote access trojan which was originally made by C.Rufus Security Team several years ago.", "meta": { - "synonyms": [ - "Gh0stRat, GhostRat" - ], "refs": [ "http://download01.norman.no/documents/ThemanyfacesofGh0stRat.pdf" + ], + "synonyms": [ + "Gh0stRat, GhostRat" ] - } + }, + "description": "Gh0st Rat is a well-known Chinese remote access trojan which was originally made by C.Rufus Security Team several years ago.", + "value": "Gh0st Rat" }, { - "value": "Fakem RAT", - "description": "Fakem RAT makes their network traffic look like well-known protocols (e.g. Messenger traffic, HTML pages). ", "meta": { - "synonyms": [ - "FAKEM" - ], "refs": [ "http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-fakem-rat.pdf" + ], + "synonyms": [ + "FAKEM" ] - } + }, + "description": "Fakem RAT makes their network traffic look like well-known protocols (e.g. Messenger traffic, HTML pages). ", + "value": "Fakem RAT" }, { - "value": "MFC Huner", "meta": { + "refs": [ + "http://blog.trendmicro.com/trendlabs-security-intelligence/japan-us-defense-industries-among-targeted-entities-in-latest-attack/" + ], "synonyms": [ "Hupigon", "BKDR_HUPIGON" - ], - "refs": [ - "http://blog.trendmicro.com/trendlabs-security-intelligence/japan-us-defense-industries-among-targeted-entities-in-latest-attack/" ] - } + }, + "value": "MFC Huner" }, { - "value": "Blackshades", - "description": "Blackshades Remote Access Tool targets Microsoft Windows operating systems. Authors were arrested in 2012 and 2014.", "meta": { "refs": [ "https://www.justice.gov/usao-sdny/pr/manhattan-us-attorney-and-fbi-assistant-director-charge-announce-charges-connection", "https://blog.malwarebytes.org/intelligence/2012/06/you-dirty-rat-part-2-blackshades-net/" ] - } + }, + "description": "Blackshades Remote Access Tool targets Microsoft Windows operating systems. Authors were arrested in 2012 and 2014.", + "value": "Blackshades" }, { - "value": "CORESHELL" - }, - { - "value": "CHOPSTICK", - "description": "backdoor", "meta": { + "type": [ + "Backdoor" + ], + "possible_issues": "Report tells that is could be Xagent alias (Java Rat)", + "refs": [ + "https://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdf" + ], "synonyms": [ - "Xagent", "webhp", "SPLM", "(.v2 fysbis)" - ], - "refs": [ - "https://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdf" ] - } + }, + "description": "backdoor used by apt28 ", + "value": "CHOPSTICK" }, { - "value": "EVILTOSS", - "description": "backdoor", "meta": { + "type": [ + "Backdoor" + ], + "possible_issues": "Report tells that is could be Xagent alias (Java Rat)", + "refs": [ + "https://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdf" + ], "synonyms": [ "Sedreco", "AZZY", - "Xagent", "ADVSTORESHELL", "NETUI" + ] + }, + "description": "backdoor used by apt28", + "value": "EVILTOSS" + }, + { + "meta": { + "type": [ + "Backdoor" ], "refs": [ "https://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdf" - ] - } - }, - { - "value": "GAMEFISH", - "description": "backdoor", - "meta": { + ], "synonyms": [ "Sednit", "Seduploader", "JHUHUGIT", "Sofacy" - ], - "refs": [ - "https://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdf" ] - } + }, + "description": "backdoor", + "value": "GAMEFISH" }, { - "value": "SOURFACE", + "meta": { + "refs": [ + "https://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdf" + ], + "synonyms": [ + "Sofacy" + ] + }, "description": "downloader - Older version of CORESHELL", - "meta": { - "synonyms": [ - "Sofacy" - ], - "refs": [ - "https://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdf" - ] - } + "value": "SOURFACE" }, { - "value": "OLDBAIT", + "meta": { + "type": [ + "PWS" + ], + "refs": [ + "https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/troj_sasfis.tl", + "https://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdf" + ], + "synonyms": [ + "Sasfis", + "BackDoor-FDU", + "IEChecker" + ] + }, "description": "credential harvester", - "meta": { - "synonyms": [ - "Sasfis" - ], - "refs": [ - "https://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdf" - ] - } + "value": "OLDBAIT" }, { - "value": "CORESHELL", - "description": "downloader - Newer version of SOURFACE", "meta": { + "refs": [ + "https://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdf" + ], "synonyms": [ "Sofacy" - ], - "refs": [ - "https://www2.fireeye.com/rs/848-DID-242/images/APT28-Center-of-Storm-2017.pdf" ] - } + }, + "description": "downloader - Newer version of SOURFACE", + "value": "CORESHELL" }, { - "value": "Havex RAT", "meta": { "synonyms": [ "Havex" ] - } + }, + "value": "Havex RAT" }, { - "value": "KjW0rm", - "description": "RAT initially written in VB.", "meta": { "refs": [ "https://www.sentinelone.com/blog/understanding-kjw0rm-malware-we-dive-in-to-the-tv5-cyber-attack/" ] - } + }, + "description": "RAT initially written in VB.", + "value": "KjW0rm" }, { "value": "TinyTyphon" @@ -437,12 +786,17 @@ "value": "FireMalv" }, { - "value": "Regin", - "description": "Regin (also known as Prax or WarriorPride) is a sophisticated malware toolkit revealed by Kaspersky Lab, Symantec, and The Intercept in November 2014. The malware targets specific users of Microsoft Windows-based computers and has been linked to the US intelligence gathering agency NSA and its British counterpart, the GCHQ. The Intercept provided samples of Regin for download including malware discovered at Belgian telecommunications provider, Belgacom. Kaspersky Lab says it first became aware of Regin in spring 2012, but that some of the earliest samples date from 2003. The name Regin is first found on the VirusTotal website on 9 March 2011.", "meta": { - "refs": ["https://en.wikipedia.org/wiki/Regin_(malware)"], - "synonyms": ["Prax","WarriorPride"] - } + "synonyms": [ + "Prax", + "WarriorPride" + ], + "refs": [ + "https://en.wikipedia.org/wiki/Regin_(malware)" + ] + }, + "description": "Regin (also known as Prax or WarriorPride) is a sophisticated malware toolkit revealed by Kaspersky Lab, Symantec, and The Intercept in November 2014. The malware targets specific users of Microsoft Windows-based computers and has been linked to the US intelligence gathering agency NSA and its British counterpart, the GCHQ. The Intercept provided samples of Regin for download including malware discovered at Belgian telecommunications provider, Belgacom. Kaspersky Lab says it first became aware of Regin in spring 2012, but that some of the earliest samples date from 2003. The name Regin is first found on the VirusTotal website on 9 March 2011.", + "value": "Regin" }, { "value": "Duqu" @@ -496,85 +850,85 @@ "value": "Tdrop2" }, { - "value": "ZXShell", "meta": { - "synonyms": [ - "Sensode" - ], "refs": [ "http://www.fireeye.com/blog/uncategorized/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html" + ], + "synonyms": [ + "Sensode" ] - } + }, + "value": "ZXShell" }, { - "value": "T9000", "meta": { "refs": [ "http://researchcenter.paloaltonetworks.com/2016/02/t9000-advanced-modular-backdoor-uses-complex-anti-analysis-techniques/" ] - } + }, + "value": "T9000" }, { - "value": "T5000", "meta": { - "synonyms": [ - "Plat1" - ], "refs": [ "http://www.cylance.com/techblog/Grand-Theft-Auto-Panda.shtml" + ], + "synonyms": [ + "Plat1" ] - } + }, + "value": "T5000" }, { - "value": "Taidoor", "meta": { "refs": [ "http://www.symantec.com/connect/blogs/trojantaidoor-takes-aim-policy-think-tanks" ] - } + }, + "value": "Taidoor" }, { - "value": "Swisyn", "meta": { "refs": [ "http://labs.alienvault.com/labs/index.php/2013/latest-adobe-pdf-exploit-used-to-target-uyghur-and-tibetan-activists/" ] - } + }, + "value": "Swisyn" }, { - "value": "Rekaf", "meta": { "refs": [ "https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks" ] - } + }, + "value": "Rekaf" }, { "value": "Scieron" }, { - "value": "SkeletonKey", "meta": { "refs": [ "http://www.secureworks.com/cyber-threat-intelligence/threats/skeleton-key-malware-analysis/" ] - } + }, + "value": "SkeletonKey" }, { - "value": "Skyipot", "meta": { "refs": [ "http://labs.alienvault.com/labs/index.php/2011/another-sykipot-sample-likely-targeting-us-federal-agencies/" ] - } + }, + "value": "Skyipot" }, { - "value": "Spindest", "meta": { "refs": [ "http://www.threatconnect.com/news/threatconnect-enables-healthy-networking-biomed-life-sciences-industry/" ] - } + }, + "value": "Spindest" }, { "value": "Preshin" @@ -583,111 +937,111 @@ "value": "Oficla" }, { - "value": "PCClient RAT", "meta": { "refs": [ "http://researchcenter.paloaltonetworks.com/2014/10/new-indicators-compromise-apt-group-nitro-uncovered/" ] - } + }, + "value": "PCClient RAT" }, { "value": "Plexor" }, { - "value": "Mongall", "meta": { "refs": [ "https://www.fireeye.com/blog/threat-research/2014/09/the-path-to-mass-producing-cyber-attacks.html" ] - } + }, + "value": "Mongall" }, { - "value": "NeD Worm", "meta": { "refs": [ "http://www.clearskysec.com/dustysky/" ] - } + }, + "value": "NeD Worm" }, { - "value": "NewCT", "meta": { "refs": [ "https://www.fireeye.com/blog/threat-research/2014/09/the-path-to-mass-producing-cyber-attacks.html" ] - } + }, + "value": "NewCT" }, { - "value": "Nflog", "meta": { "refs": [ "https://www.fireeye.com/blog/threat-research/2014/09/the-path-to-mass-producing-cyber-attacks.html" ] - } + }, + "value": "Nflog" }, { - "value": "Janicab", "meta": { "refs": [ "http://blog.avast.com/2013/07/22/multisystem-trojan-janicab-attacks-windows-and-macosx-via-scripts/" ] - } + }, + "value": "Janicab" }, { - "value": "Jripbot", "meta": { - "synonyms": [ - "Jiripbot" - ], "refs": [ "http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/butterfly-corporate-spies-out-for-financial-gain.pdf" + ], + "synonyms": [ + "Jiripbot" ] - } + }, + "value": "Jripbot" }, { - "value": "Jolob", "meta": { "refs": [ "http://pwc.blogs.com/cyber_security_updates/2014/10/scanbox-framework-whos-affected-and-whos-using-it-1.html" ] - } + }, + "value": "Jolob" }, { - "value": "IsSpace", "meta": { "refs": [ "https://www.fireeye.com/blog/threat-research/2014/09/the-path-to-mass-producing-cyber-attacks.html" ] - } + }, + "value": "IsSpace" }, { - "value": "Hoardy", "meta": { "synonyms": [ "Hoarde", "Phindolp", "BS2005" ] - } + }, + "value": "Hoardy" }, { - "value": "Htran", "meta": { "refs": [ "http://www.secureworks.com/research/threats/htran/" ] - } + }, + "value": "Htran" }, { - "value": "HTTPBrowser", "meta": { - "synonyms": [ - "TokenControl" - ], "refs": [ "https://www.threatstream.com/blog/evasive-maneuvers-the-wekby-group-attempts-to-evade-analysis-via-custom-rop" + ], + "synonyms": [ + "TokenControl" ] - } + }, + "value": "HTTPBrowser" }, { "value": "Disgufa" @@ -696,270 +1050,278 @@ "value": "Elirks" }, { - "value": "Snifula", "meta": { - "synonyms": [ - "Ursnif" - ], "refs": [ "https://www.circl.lu/pub/tr-13/" + ], + "synonyms": [ + "Ursnif" ] - } + }, + "value": "Snifula" }, { - "value": "Aumlib", "meta": { + "refs": [ + "http://www.cybersquared.com/killing-with-a-borrowed-knife-chaining-core-cloud-service-profile-infrastructure-for-cyber-attacks" + ], "synonyms": [ "Yayih", "mswab", "Graftor" - ], - "refs": [ - "http://www.cybersquared.com/killing-with-a-borrowed-knife-chaining-core-cloud-service-profile-infrastructure-for-cyber-attacks" ] - } + }, + "value": "Aumlib" }, { - "value": "CTRat", "meta": { "refs": [ "http://www.fireeye.com/blog/technical/threat-intelligence/2014/07/spy-of-the-tiger.html" ] - } + }, + "value": "CTRat" }, { - "value": "Emdivi", "meta": { - "synonyms": [ - "Newsripper" - ], "refs": [ "http://www.symantec.com/connect/blogs/operation-cloudyomega-ichitaro-zero-day-and-ongoing-cyberespionage-campaign-targeting-japan" + ], + "synonyms": [ + "Newsripper" ] - } + }, + "value": "Emdivi" }, { - "value": "Etumbot", "meta": { + "refs": [ + "www.arbornetworks.com/asert/wp-content/uploads/2014/06/ASERT-Threat-Intelligence-Brief-2014-07-Illuminating-Etumbot-APT.pdf" + ], "synonyms": [ "Exploz", "Specfix", "RIPTIDE" - ], - "refs": [ - "www.arbornetworks.com/asert/wp-content/uploads/2014/06/ASERT-Threat-Intelligence-Brief-2014-07-Illuminating-Etumbot-APT.pdf" ] - } + }, + "value": "Etumbot" }, { - "value": "Fexel", "meta": { "synonyms": [ "Loneagent" ] - } + }, + "value": "Fexel" }, { - "value": "Fysbis", "meta": { "refs": [ "http://researchcenter.paloaltonetworks.com/2016/02/a-look-into-fysbis-sofacys-linux-backdoor/" ] - } + }, + "value": "Fysbis" }, { - "value": "Hikit", "meta": { "refs": [ "https://blog.bit9.com/2013/02/25/bit9-security-incident-update/" ] - } + }, + "value": "Hikit" }, { - "value": "Hancitor", "meta": { - "refs": [ - "https://www.proofpoint.com/us/threat-insight/post/hancitor-ruckguv-reappear" - ], "synonyms": [ "Tordal", "Chanitor" + ], + "refs": [ + "https://www.proofpoint.com/us/threat-insight/post/hancitor-ruckguv-reappear" ] - } + }, + "value": "Hancitor" }, { - "value": "Ruckguv", "meta": { "refs": [ "https://www.proofpoint.com/us/threat-insight/post/hancitor-ruckguv-reappear" ] - } + }, + "value": "Ruckguv" }, { - "value": "HerHer Trojan", "meta": { "refs": [ "http://researchcenter.paloaltonetworks.com/2016/05/the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoor/" ] - } + }, + "value": "HerHer Trojan" }, { - "value": "Helminth backdoor", "meta": { "refs": [ "http://researchcenter.paloaltonetworks.com/2016/05/the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoor/" ] - } + }, + "value": "Helminth backdoor" }, { - "value": "HDRoot", "meta": { "refs": [ "http://williamshowalter.com/a-universal-windows-bootkit/" ] - } + }, + "value": "HDRoot" }, { - "value": "IRONGATE", "meta": { "refs": [ "https://www.fireeye.com/blog/threat-research/2016/06/irongate_ics_malware.html" ] - } + }, + "value": "IRONGATE" }, { - "value": "ShimRAT", "meta": { "refs": [ "https://foxitsecurity.files.wordpress.com/2016/06/fox-it_mofang_threatreport_tlp-white.pdf" ] - } + }, + "value": "ShimRAT" }, { - "value": "X-Agent", "meta": { - "refs": [ - "http://blog.trendmicro.com/trendlabs-security-intelligence/pawn-storm-update-ios-espionage-app-found/" + "type": [ + "Backdoor" ], "synonyms": [ "XAgent" + ], + "refs": [ + "http://blog.trendmicro.com/trendlabs-security-intelligence/pawn-storm-update-ios-espionage-app-found/", + "https://app.box.com/s/l7n781ig6n8wlf1aff5hgwbh4qoi5jqq" ] - } + }, + "description": "This backdoor component is known to have a modular structure featuring various espionage functionalities, such as key-logging, screen grabbing and file exfiltration. This component is available for Osx, Windows, Linux and iOS operating systems.", + "value": "X-Agent" }, { - "value": "X-Tunnel", "meta": { "synonyms": [ "XTunnel" ] - } + }, + "value": "X-Tunnel" }, { - "value": "Foozer", "meta": { "refs": [ "https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/" ] - } + }, + "value": "Foozer" }, { - "value": "WinIDS", "meta": { "refs": [ "https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/" ] - } + }, + "value": "WinIDS" }, { - "value": "DownRange", "meta": { "refs": [ "https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/" ] - } + }, + "value": "DownRange" }, { - "value": "Mad Max", "meta": { "refs": [ "https://www.arbornetworks.com/blog/asert/mad-max-dga/" ] - } + }, + "value": "Mad Max" }, { - "value": "Crimson", - "description": "Crimson is malware used as part of a campaign known as Operation Transparent Tribe that targeted Indian diplomatic and military victims", "meta": { + "type": [ + "Backdoor" + ], "refs": [ "https://www.proofpoint.com/sites/default/files/proofpoint-operation-transparent-tribe-threat-insight-en.pdf" ] - } + }, + "description": "Crimson is malware used as part of a campaign known as Operation Transparent Tribe that targeted Indian diplomatic and military victims", + "value": "Crimson" }, { - "value": "Prikormka", - "description": "Operation Groundbait based on our research into the Prikormka malware family. This includes detailed technical analysis of the Prikormka malware family and its spreading mechanisms, and a description of the most noteworthy attack campaigns.", "meta": { + "type": [ + "Backdoor" + ], "refs": [ "http://www.welivesecurity.com/wp-content/uploads/2016/05/Operation-Groundbait.pdf" ] - } + }, + "description": "Operation Groundbait based on our research into the Prikormka malware family. This includes detailed technical analysis of the Prikormka malware family and its spreading mechanisms, and a description of the most noteworthy attack campaigns.", + "value": "Prikormka" }, { - "value": "NanHaiShu", - "description": "This whitepaper details a malicious program we identify as NanHaiShu. Based on our analysis, the threat actor behind this malware targets government and private-sector organizations.", "meta": { "refs": [ "https://www.f-secure.com/documents/996508/1030745/nanhaishu_whitepaper.pdf" ] - } + }, + "description": "This whitepaper details a malicious program we identify as NanHaiShu. Based on our analysis, the threat actor behind this malware targets government and private-sector organizations.", + "value": "NanHaiShu" }, { - "value": "Umbreon", - "description": "Umbreon (sharing the same name as the Pokémon) targets Linux systems, including systems running both Intel and ARM processors, expanding the scope of this threat to include embedded devices as well.", "meta": { "refs": [ "http://blog.trendmicro.com/trendlabs-security-intelligence/pokemon-themed-umbreon-linux-rootkit-hits-x86-arm-systems/" ] - } + }, + "description": "Umbreon (sharing the same name as the Pokémon) targets Linux systems, including systems running both Intel and ARM processors, expanding the scope of this threat to include embedded devices as well.", + "value": "Umbreon" }, { - "value": "Odinaff", - "description": "Odinaff is typically deployed in the first stage of an attack, to gain a foothold onto the network, providing a persistent presence and the ability to install additional tools onto the target network. These additional tools bear the hallmarks of a sophisticated attacker which has plagued the financial industry since at least 2013–Carbanak. This new wave of attacks has also used some infrastructure that has previously been used in Carbanak campaigns.", - "refs": [ - "https://www.symantec.com/connect/blogs/odinaff-new-trojan-used-high-level-financial-attacks" - ] - }, - { - "value": "Hworm", - "description": "Unit 42 has observed a new version of Hworm (or Houdini) being used within multiple attacks. This blog outlines technical details of this new Hworm version and documents an attack campaign making use of the backdoor. Of the samples used in this attack, the first we observed were June 2016, while as-of publication we were still seeing attacks as recently as mid-October, suggesting that this is likely an active, ongoing campaign.", "meta": { "refs": [ - "http://researchcenter.paloaltonetworks.com/2016/10/unit42-houdinis-magic-reappearance/" - ], + "https://www.symantec.com/connect/blogs/odinaff-new-trojan-used-high-level-financial-attacks" + ] + }, + "description": "Odinaff is typically deployed in the first stage of an attack, to gain a foothold onto the network, providing a persistent presence and the ability to install additional tools onto the target network. These additional tools bear the hallmarks of a sophisticated attacker which has plagued the financial industry since at least 2013–Carbanak. This new wave of attacks has also used some infrastructure that has previously been used in Carbanak campaigns.", + "value": "Odinaff" + }, + { + "meta": { "synonyms": [ "Houdini" + ], + "refs": [ + "http://researchcenter.paloaltonetworks.com/2016/10/unit42-houdinis-magic-reappearance/" ] - } + }, + "description": "Unit 42 has observed a new version of Hworm (or Houdini) being used within multiple attacks. This blog outlines technical details of this new Hworm version and documents an attack campaign making use of the backdoor. Of the samples used in this attack, the first we observed were June 2016, while as-of publication we were still seeing attacks as recently as mid-October, suggesting that this is likely an active, ongoing campaign.", + "value": "Hworm" }, { - "value": "Backdoor.Dripion", - "description": "Backdoor.Dripion was custom developed, deployed in a highly targeted fashion, and used command and control servers disguised as antivirus company websites.", "meta": { - "refs": [ - "http://www.symantec.com/connect/blogs/taiwan-targeted-new-cyberespionage-back-door-trojan" - ], "synonyms": [ "Dripion" + ], + "refs": [ + "http://www.symantec.com/connect/blogs/taiwan-targeted-new-cyberespionage-back-door-trojan" ] - } + }, + "description": "Backdoor.Dripion was custom developed, deployed in a highly targeted fashion, and used command and control servers disguised as antivirus company websites.", + "value": "Backdoor.Dripion" }, { - "value": "Adwind", - "description": "Adwind is a backdoor written purely in Java that targets system supporting the Java runtime environment. Commands that can be used, among other things, to display messages on the system, open URLs, update the malware, download/execute files, and download/load plugins. A significant amount of additional functionality can be provided through downloadable plugins, including such things as remote control options and shell command execution.", "meta": { - "refs": [ - "https://securelist.com/blog/research/73660/adwind-faq/" - ], "synonyms": [ "AlienSpy", "Frutas", @@ -968,18 +1330,13 @@ "JSocket", "jRat", "Backdoor:Java/Adwind" - ] - } - }, - { - "value": "Angler EK", - "description": "Angler Exploit Kit is a hacking tool that is produced to search for Java and Flash Player vulnerabilities on the attacked PC and use them with the aim to distribute malware infections. Angler Exploit Kit commonly checks to see if the PC it is proliferating to has Java or Flash.", - "meta": { + ], "refs": [ - "http://researchcenter.paloaltonetworks.com/2016/06/unit42-understanding-angler-exploit-kit-part-1-exploit-kit-fundamentals/", - "https://blogs.sophos.com/2015/07/21/a-closer-look-at-the-angler-exploit-kit/" + "https://securelist.com/blog/research/73660/adwind-faq/" ] - } + }, + "description": "Adwind is a backdoor written purely in Java that targets system supporting the Java runtime environment. Commands that can be used, among other things, to display messages on the system, open URLs, update the malware, download/execute files, and download/load plugins. A significant amount of additional functionality can be provided through downloadable plugins, including such things as remote control options and shell command execution.", + "value": "Adwind" }, { "value": "Bedep" @@ -988,23 +1345,16 @@ "value": "Cromptui" }, { - "value": "Cryptowall", - "description": "CryptoWall is a new and highly destructive variant of ransomware. Ransomware is malicious software (malware) that infects your computer and holds hostage something of value to you in exchange for money. Older ransomware used to block access to computers. Newer ransomware, such as CryptoWall, takes your data hostage." - }, - { - "value": "CTB-Locker" - }, - { - "value": "Dridex", - "description": "Dridex is a strain of banking malware that leverages macros in Microsoft Office to infect systems. Once a computer has been infected, Dridex attackers can steal banking credentials and other personal information on the system to gain access to the financial records of a user.", "meta": { - "refs": [ - "http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/dridex-financial-trojan.pdf" - ], "synonyms": [ "Cridex" + ], + "refs": [ + "http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/dridex-financial-trojan.pdf" ] - } + }, + "description": "Dridex is a strain of banking malware that leverages macros in Microsoft Office to infect systems. Once a computer has been infected, Dridex attackers can steal banking credentials and other personal information on the system to gain access to the financial records of a user.", + "value": "Dridex" }, { "value": "Fareit" @@ -1013,151 +1363,133 @@ "value": "Gafgyt" }, { - "value": "Gamarue", "meta": { - "refs": [ - "https://blog.gdatasoftware.com/2015/03/24274-the-andromeda-gamarue-botnet-is-on-the-rise-again" - ], "synonyms": [ "Andromeda" + ], + "refs": [ + "https://blog.gdatasoftware.com/2015/03/24274-the-andromeda-gamarue-botnet-is-on-the-rise-again" ] - } + }, + "value": "Gamarue" }, { - "value": "Locky", - "description": "Ransomware" - }, - { - "value": "Necurs", - "description": "The Necurs botnet is a distributor of many pieces of malware, most notably Locky.", "meta": { "refs": [ "https://en.wikipedia.org/wiki/Necurs_botnet" ] - } - }, - { - "value": "Nuclear Pack", - "meta": { - "synonyms": [ - "Nuclear EK" - ] - } + }, + "description": "The Necurs botnet is a distributor of many pieces of malware, most notably Locky.", + "value": "Necurs" }, { "value": "Palevo" }, { - "value": "Akbot", "meta": { - "refs": [ - "https://en.wikipedia.org/wiki/Akbot" - ], "synonyms": [ "Qbot", "Qakbot", "PinkSlipBot" + ], + "refs": [ + "https://en.wikipedia.org/wiki/Akbot" ] - } + }, + "value": "Akbot" }, { - "value": "Rig EK" + "description": "Upatre is a Trojan downloader that is used to set up other threats on the victim's PC. Upatre has been used recently in several high profile Trojan attacks involving the Gameover Trojan. ", + "value": "Upatre" }, { - "value": "Teslacrypt" - }, - { - "value": "Upatre", - "description": "Upatre is a Trojan downloader that is used to set up other threats on the victim's PC. Upatre has been used recently in several high profile Trojan attacks involving the Gameover Trojan. " - }, - { - "value": "Vawtrak", - "description": "Vawtrak is an information stealing malware family that is primarily used to gain unauthorised access to bank accounts through online banking websites.", "meta": { "refs": [ "https://www.sophos.com/medialibrary/PDFs/technical%20papers/sophos-vawtrak-international-crimeware-as-a-service-tpna.pdf" ] - } + }, + "description": "Vawtrak is an information stealing malware family that is primarily used to gain unauthorised access to bank accounts through online banking websites.", + "value": "Vawtrak" }, { - "value": "Empire", - "description": "Empire is a pure PowerShell post-exploitation agent built on cryptologically-secure communications and a flexible architecture. Empire implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable post-exploitation modules ranging from key loggers to Mimikatz, and adaptable communications to evade network detection, all wrapped up in a usability-focused framework", "meta": { "refs": [ "https://github.com/adaptivethreat/Empire" ] - } + }, + "description": "Empire is a pure PowerShell post-exploitation agent built on cryptologically-secure communications and a flexible architecture. Empire implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable post-exploitation modules ranging from key loggers to Mimikatz, and adaptable communications to evade network detection, all wrapped up in a usability-focused framework", + "value": "Empire" }, { - "value": "Explosive", - "description": "Beginning in late 2012, a carefully orchestrated attack campaign we call Volatile Cedar has been targeting individuals, companies and institutions worldwide. This campaign, led by a persistent attacker group, has successfully penetrated a large number of targets using various attack techniques, and specifically, a custom-made malware implant codenamed Explosive. ", "meta": { "refs": [ "https://www.checkpoint.com/downloads/volatile-cedar-technical-report.pdf" ] - } + }, + "description": "Beginning in late 2012, a carefully orchestrated attack campaign we call Volatile Cedar has been targeting individuals, companies and institutions worldwide. This campaign, led by a persistent attacker group, has successfully penetrated a large number of targets using various attack techniques, and specifically, a custom-made malware implant codenamed Explosive. ", + "value": "Explosive" }, { - "value": "KeyBoy", - "description": "The actors used a new version of “KeyBoy,” a custom backdoor first disclosed by researchers at Rapid7 in June 2013. Their work outlined the capabilities of the backdoor, and exposed the protocols and algorithms used to hide the network communication and configuration data", "meta": { "refs": [ "https://citizenlab.org/2016/11/parliament-keyboy/", "https://community.rapid7.com/community/infosec/blog/2013/06/07/keyboy-targeted-attacks-against-vietnam-and-india" ] - } + }, + "description": "The actors used a new version of “KeyBoy,” a custom backdoor first disclosed by researchers at Rapid7 in June 2013. Their work outlined the capabilities of the backdoor, and exposed the protocols and algorithms used to hide the network communication and configuration data", + "value": "KeyBoy" }, { - "value": "Yahoyah", - "description": "The attacks in this case are associated with a campaign called Tropic Trooper, which has been active since at least 2011 and is known for heavily targeting Taiwan. One of the attacks used their known Yahoyah malware...", "meta": { - "refs": [ - "http://researchcenter.paloaltonetworks.com/2016/11/unit42-tropic-trooper-targets-taiwanese-government-and-fossil-fuel-provider-with-poison-ivy/" - ], "synonyms": [ "W32/Seeav" - ] - } - }, - { - "value": "Tartine", - "description": "Delphi RAT used by Sofacy." - }, - { - "value": "Mirai", - "description": "Mirai (Japanese for \"the future\") is malware that turns computer systems running Linux into remotely controlled \"bots\", that can be used as part of a botnet in large-scale network attacks. It primarily targets online consumer devices such as remote cameras and home routers. The Mirai botnet has been used in some of the largest and most disruptive distributed denial of service (DDoS) attacks, including an attack on 20 September 2016 on computer security journalist Brian Krebs's web site, an attack on French web host OVH and the October 2016 Dyn cyberattack.", - "meta": { - "refs": [ - "https://en.wikipedia.org/wiki/Mirai_(malware)" ], + "refs": [ + "http://researchcenter.paloaltonetworks.com/2016/11/unit42-tropic-trooper-targets-taiwanese-government-and-fossil-fuel-provider-with-poison-ivy/" + ] + }, + "description": "The attacks in this case are associated with a campaign called Tropic Trooper, which has been active since at least 2011 and is known for heavily targeting Taiwan. One of the attacks used their known Yahoyah malware...", + "value": "Yahoyah" + }, + { + "description": "Delphi RAT used by Sofacy.", + "value": "Tartine" + }, + { + "meta": { "synonyms": [ "Linux/Mirai" + ], + "refs": [ + "https://en.wikipedia.org/wiki/Mirai_(malware)" ] - } + }, + "description": "Mirai (Japanese for \"the future\") is malware that turns computer systems running Linux into remotely controlled \"bots\", that can be used as part of a botnet in large-scale network attacks. It primarily targets online consumer devices such as remote cameras and home routers. The Mirai botnet has been used in some of the largest and most disruptive distributed denial of service (DDoS) attacks, including an attack on 20 September 2016 on computer security journalist Brian Krebs's web site, an attack on French web host OVH and the October 2016 Dyn cyberattack.", + "value": "Mirai" }, { "value": "BASHLITE" }, { - "value": "BlackEnergy", - "description": "BlackEnergy is a trojan which has undergone significant functional changes since it was first publicly analysed by Arbor Networks in 2007. It has evolved from a relatively simple DDoS trojan into a relatively sophisticated piece of modern malware with a modular architecture, making it a suitable tool for sending spam and for online bank fraud, as well as for targeted attacks. BlackEnergy version 2, which featured rootkit techniques, was documented by SecureWorks in 2010. The targeted attacks recently discovered are proof that the trojan is still alive and kicking in 2014. We provide a technical analysis of the BlackEnergy family, focusing on novel functionality and the differences introduced by new lite variants. We describe the most notable aspects of the malware, including its techniques for bypassing UAC, defeating the signed driver requirement in Windows and a selection of BlackEnergy2 plug-ins used for parasitic file infections, network discovery and remote code execution and data collection.", "meta": { "refs": [ "https://www.virusbulletin.com/conference/vb2014/abstracts/back-blackenergy-2014-targeted-attacks-ukraine-and-poland/" ] - } + }, + "description": "BlackEnergy is a trojan which has undergone significant functional changes since it was first publicly analysed by Arbor Networks in 2007. It has evolved from a relatively simple DDoS trojan into a relatively sophisticated piece of modern malware with a modular architecture, making it a suitable tool for sending spam and for online bank fraud, as well as for targeted attacks. BlackEnergy version 2, which featured rootkit techniques, was documented by SecureWorks in 2010. The targeted attacks recently discovered are proof that the trojan is still alive and kicking in 2014. We provide a technical analysis of the BlackEnergy family, focusing on novel functionality and the differences introduced by new lite variants. We describe the most notable aspects of the malware, including its techniques for bypassing UAC, defeating the signed driver requirement in Windows and a selection of BlackEnergy2 plug-ins used for parasitic file infections, network discovery and remote code execution and data collection.", + "value": "BlackEnergy" }, { - "value": "Trojan.Seaduke", "meta": { - "description": "Trojan.Seaduke is a Trojan horse that opens a back door on the compromised computer. It may also download potentially malicious files.", - "refs": [ - "https://www.symantec.com/security_response/writeup.jsp?docid=2015-031915-4935-99" - ], "synonyms": [ "Seaduke" + ], + "refs": [ + "https://www.symantec.com/security_response/writeup.jsp?docid=2015-031915-4935-99" ] - } + }, + "description": "Trojan.Seaduke is a Trojan horse that opens a back door on the compromised computer. It may also download potentially malicious files.", + "value": "Trojan.Seaduke" }, { "value": "Backdoor.Tinybaron" @@ -1166,141 +1498,616 @@ "value": "Incognito RAT" }, { - "value": "DownRage", - "synonyms": [ - "Carberplike" - ], "meta": { + "synonyms": [ + "Carberplike" + ], "refs": [ "https://labsblog.f-secure.com/2015/09/08/sofacy-recycles-carberp-and-metasploit-code/", "https://twitter.com/Timo_Steffens/status/814781584536719360" ] - } + }, + "value": "DownRage" }, { - "value": "Chthonic", "meta": { "refs": [ "https://www.proofpoint.com/us/threat-insight/post/threat-actors-using-legitimate-paypal-accounts-to-distribute-chthonic-banking-trojan" ] - } + }, + "value": "Chthonic" }, { + "value": "GeminiDuke", + "description": "GeminiDuke is malware that was used by APT29 from 2009 to 2012.", "meta": { "refs": [ "https://attack.mitre.org/wiki/Software/S0049" ] - }, - "description": "GeminiDuke is malware that was used by APT29 from 2009 to 2012.", - "value": "GeminiDuke" + } }, { + "value": "Zeus", + "description": "Trojan.Zbot, also called Zeus, is a Trojan horse that attempts to steal confidential information from the compromised computer. It may also download configuration files and updates from the Internet. The Trojan is created using a Trojan-building toolkit.", "meta": { - "synonyms": [ - "Trojan.Zbot", - "Zbot", - "ZeuS" - ], "refs": [ "https://en.wikipedia.org/wiki/Zeus_(malware)", "https://www.symantec.com/security_response/writeup.jsp?docid=2010-011016-3514-99" + ], + "synonyms": [ + "Trojan.Zbot", + "Zbot" ] - }, - "description": "Trojan.Zbot, also called Zeus, is a Trojan horse that attempts to steal confidential information from the compromised computer. It may also download configuration files and updates from the Internet. The Trojan is created using a Trojan-building toolkit.", - "value": "Zeus" + } }, { + "value": "Shifu", + "description": "Shifu is a Banking Trojan first discovered in 2015. Shifu is based on the Shiz source code which incorporated techniques used by Zeus. Attackers use Shifu to steal credentials for online banking websites around the world, starting in Russia but later including the UK, Italy, and others.", "meta": { - "derivated-from": [ - "Shiz" - ], "refs": [ "http://researchcenter.paloaltonetworks.com/2017/01/unit42-2016-updates-shifu-banking-trojan/" + ], + "derivated_from": [ + "Shiz" ] - }, - "description": "Shifu is a Banking Trojan first discovered in 2015. Shifu is based on the Shiz source code which incorporated techniques used by Zeus. Attackers use Shifu to steal credentials for online banking websites around the world, starting in Russia but later including the UK, Italy, and others.", - "value": "Shifu" + } }, { + "value": "Shiz", + "description": "The new variant of the Shiz Trojan malware targets mission-critical enterprise resource planning (ERP) applications — particularly SAP users. ", "meta": { "refs": [ "https://securityintelligence.com/tag/shiz-trojan-malware/" ] - }, - "description": "The new variant of the Shiz Trojan malware targets mission-critical enterprise resource planning (ERP) applications — particularly SAP users. ", - "value": "Shiz" + } }, { + "value": "MM Core", + "description": "Also known as “BaneChant”, MM Core is a file-less APT which is executed in memory by a downloader component. It was first reported in 2013 under the version number “2.0-LNK” where it used the tag “BaneChant” in its command-and-control (C2) network request. A second version “2.1-LNK” with the network tag “StrangeLove” was discovered shortly after.", "meta": { + "refs": [ + "https://blogs.forcepoint.com/security-labs/mm-core-memory-backdoor-returns-bigboss-and-sillygoose" + ], "synonyms": [ "MM Core backdoor", "BigBoss", "SillyGoose", "BaneChant", "StrangeLove" - ], + ] + } + }, + { + "value": "Shamoon", + "description": "Shamoon,[a] also known as Disttrack, is a modular computer virus discovered by Seculert[1] in 2012, targeting recent NT kernel-based versions of Microsoft Windows. The virus has been used for cyber espionage in the energy sector.[2][3][4] Its discovery was announced on 16 August 2012 by Symantec,[3] Kaspersky Lab,[5] and Seculert.[6] Similarities have been highlighted by Kaspersky Lab and Seculert between Shamoon and the Flame malware.[5][6]", + "meta": { "refs": [ - "https://blogs.forcepoint.com/security-labs/mm-core-memory-backdoor-returns-bigboss-and-sillygoose" + "https://en.wikipedia.org/wiki/Shamoon" + ] + } + }, + { + "meta": { + "refs": [ + "https://www.bleepingcomputer.com/news/security/new-ghostadmin-malware-used-for-data-theft-and-exfiltration/" ] }, - "description": "Also known as “BaneChant”, MM Core is a file-less APT which is executed in memory by a downloader component. It was first reported in 2013 under the version number “2.0-LNK” where it used the tag “BaneChant” in its command-and-control (C2) network request. A second version “2.1-LNK” with the network tag “StrangeLove” was discovered shortly after.", - "value": "MM Core" + "description": "According to MalwareHunterTeam and other researchers that have looked at the malware's source code, GhostAdmin seems to be a reworked version of CrimeScene, another botnet malware family that was active around 3-4 years ago.", + "value": "GhostAdmin" }, { - "meta": { - "refs": ["https://en.wikipedia.org/wiki/Shamoon"] - }, - "description": "Shamoon,[a] also known as Disttrack, is a modular computer virus discovered by Seculert[1] in 2012, targeting recent NT kernel-based versions of Microsoft Windows. The virus has been used for cyber espionage in the energy sector.[2][3][4] Its discovery was announced on 16 August 2012 by Symantec,[3] Kaspersky Lab,[5] and Seculert.[6] Similarities have been highlighted by Kaspersky Lab and Seculert between Shamoon and the Flame malware.[5][6]", - "value": "Shamoon" - }, - { - "value": "GhostAdmin", - "description": "According to MalwareHunterTeam and other researchers that have looked at the malware's source code, GhostAdmin seems to be a reworked version of CrimeScene, another botnet malware family that was active around 3-4 years ago.", - "meta": { - "refs": ["https://www.bleepingcomputer.com/news/security/new-ghostadmin-malware-used-for-data-theft-and-exfiltration/"] - } + "meta": { + "country": "IT", + "refs": [ + "http://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-inner-workings-eyepyramid/" + ] + }, + "description": "Two Italians referred to as the “Occhionero brothers” have been arrested and accused of using malware and a carefully-prepared spear-phishing scheme to spy on high-profile politicians and businessmen. This case has been called “EyePyramid”, which we first discussed last week. (Conspiracy theories aside, the name came from a domain name and directory path that was found during the research.)", + "value": " EyePyramid Malware" }, { - "value": " EyePyramid Malware", - "description": "Two Italians referred to as the “Occhionero brothers” have been arrested and accused of using malware and a carefully-prepared spear-phishing scheme to spy on high-profile politicians and businessmen. This case has been called “EyePyramid”, which we first discussed last week. (Conspiracy theories aside, the name came from a domain name and directory path that was found during the research.)", - "meta": { - "refs": ["http://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-inner-workings-eyepyramid/"], - "country": "IT" - } + "meta": { + "refs": [ + "http://researchcenter.paloaltonetworks.com/2016/07/unit42-investigating-the-luminositylink-remote-access-trojan-configuration/" + ] + }, + "description": "LuminosityLink is a malware family costing $40 that purports to be a system administration utility", + "value": "LuminosityLink" }, { - "value": "LuminosityLink", - "description": "LuminosityLink is a malware family costing $40 that purports to be a system administration utility", - "meta": { - "refs": ["http://researchcenter.paloaltonetworks.com/2016/07/unit42-investigating-the-luminositylink-remote-access-trojan-configuration/"] - } + "meta": { + "synonyms": [ + "Floki Bot" + ], + "refs": [ + "https://www.arbornetworks.com/blog/asert/flokibot-flock-bots/", + "https://blog.malwarebytes.com/threat-analysis/2016/11/floki-bot-and-the-stealthy-dropper/" + ] + }, + "description": "Floki Bot, described recently by Dr. Peter Stephenson from SC Magazine, is yet another bot based on the leaked Zeus code. However, the author came up with various custom modifications that makes it more interesting.", + "value": "Flokibot" }, { - "value": "Flokibot", - "description": "Floki Bot, described recently by Dr. Peter Stephenson from SC Magazine, is yet another bot based on the leaked Zeus code. However, the author came up with various custom modifications that makes it more interesting.", - "meta": { - "refs": ["https://www.arbornetworks.com/blog/asert/flokibot-flock-bots/", "https://blog.malwarebytes.com/threat-analysis/2016/11/floki-bot-and-the-stealthy-dropper/"], - "synonyms": ["Floki Bot"] - } + "meta": { + "refs": [ + "https://www.proofpoint.com/us/threat-insight/post/APT-targets-russia-belarus-zerot-plugx" + ] + }, + "description": "Most recently, we have observed the same group targeting military and aerospace interests in Russia and Belarus. Since the summer of 2016, this group began using a new downloader known as ZeroT to install the PlugX remote access Trojan (RAT) and added Microsoft Compiled HTML Help (.chm) as one of the initial droppers delivered in spear-phishing emails.", + "value": "ZeroT" }, { - "value": "ZeroT", - "description": "Most recently, we have observed the same group targeting military and aerospace interests in Russia and Belarus. Since the summer of 2016, this group began using a new downloader known as ZeroT to install the PlugX remote access Trojan (RAT) and added Microsoft Compiled HTML Help (.chm) as one of the initial droppers delivered in spear-phishing emails.", - "meta": { - "refs": ["https://www.proofpoint.com/us/threat-insight/post/APT-targets-russia-belarus-zerot-plugx"] - } + "meta": { + "refs": [ + "https://blog.cylance.com/shell-crew-variants-continue-to-fly-under-big-avs-radar" + ] + }, + "description": "Cylance dubbed this family of malware StreamEx, based upon a common exported function used across all samples ‘stream’, combined with the dropper functionality to append ‘ex’ to the DLL file name. The StreamEx family has the ability to access and modify the user’s file system, modify the registry, create system services, enumerate process and system information, enumerate network resources and drive types, scan for security tools such as firewall products and antivirus products, change browser security settings, and remotely execute commands. The malware documented in this post was predominantly 64-bit, however, there are 32-bit versions of the malware in the wild. ", + "value": "StreamEx" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "adzok" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "albertino" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "arcom" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "blacknix" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "bluebanana" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "bozok" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "clientmesh" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "cybergate" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "darkcomet" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "darkrat" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "gh0st" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "greame" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "hawkeye" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "javadropper" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "lostdoor" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "luxnet" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "pandora" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "poisonivy" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "predatorpain" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "punisher" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "qrat" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "shadowtech" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "smallnet" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "spygate" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "template" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "tapaoux" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "vantom" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "virusrat" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "xena" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "xtreme" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "darkddoser" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "jspy" + }, + { + "meta": { + "type": [ + "Backdoor" + ], + "refs": [ + "https://github.com/kevthehermit/RATDecoders" + ] + }, + "description": "Remote Access Trojan", + "value": "xrat" + }, + { + "meta": { + "refs": [ + "https://github.com/n1nj4sec/pupy" + ] + }, + "description": "Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python.", + "value": "PupyRAT" + }, + { + "meta": { + "refs": [ + "https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/elf_imeij.a" + ] + }, + "description": "Linux Arm malware spread via RFIs in cgi-bin scripts. This backdoor executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.", + "value": "ELF_IMEIJ" + }, + { + "meta": { + "refs": [ + "https://blogs.forcepoint.com/security-labs/trojanized-adobe-installer-used-install-dragonok%E2%80%99s-new-custom-backdoor" + ] + }, + "description": "KHRAT is a small backdoor that has three exports (functions), namely, K1, K2, and K3. K1 checks if the current user is an administrator. If not, it uninstalls itself by calling the K2 function.", + "value": "KHRAT" + }, + { + "meta": { + "refs": [ + "http://www.enigmasoftware.com/trochilusrat-removal/" + ] + }, + "description": "The Trochilus RAT is a threatening RAT (Remote Access Trojan) that may evade many anti-virus programs. The Trochilus RAT is currently being used as part of an extended threat campaign in South East Asia. The first appearance of the Trochilus RAT in this campaign, which has been active since August of 2015, was first detected in the summer of 2015. The Trochilus RAT is currently being used against civil society organizations and government computers in the South East Asia region, particularly in attacks directed towards the government of Myanmar.", + "value": "Trochilus" + }, + { + "meta": { + "refs": [ + "http://researchcenter.paloaltonetworks.com/2017/03/unit42-trochilus-rat-new-moonwind-rat-used-attack-thai-utility-organizations/" + ] + }, + "description": "The MoonWind sample used for this analysis was compiled with a Chinese compiler known as BlackMoon, the same compiler used for the BlackMoon banking Trojan. While a number of attributes match the BlackMoon banking Trojan, the malware is not the same. Both malware families were simply compiled using the same compiler, and it was the BlackMoon artifacts that resulted in the naming of the BlackMoon banking Trojan. But because this new sample is different from the BlackMoon banking Trojan,", + "value": "MoonWind" + }, + { + "description": "Chrysaor is spyware believed to be created by NSO Group Technologies, specializing in the creation and sale of software and infrastructure for targeted attacks. Chrysaor is believed to be related to the Pegasus spyware that was first identified on iOS and analyzed by Citizen Lab and Lookout.", + "value": "Chrysaor", + "meta": { + "refs": [ + "https://security.googleblog.com/2017/04/an-investigation-of-chrysaor-malware-on.html" + ], + "synonyms": [ + "Pegasus", + "Pegasus spyware" + ] + } + }, + { + "meta": { + "refs": [ + "http://virusradar.com/en/Win32_Sathurbot.A/description", + "https://www.welivesecurity.com/2017/04/06/sathurbot-distributed-wordpress-password-attack/" + ] + }, + "description": "The trojan serves as a backdoor. It can be controlled remotely.", + "value": "Sathurbot" } - ], - "version": 18, - "uuid": "0d821b68-9d82-4c6d-86a6-1071a9e0f79f", - "description": "threat-actor-tools is an enumeration of tools used by adversaries. The list includes malware but also common software regularly used by the adversaries.", - "author": [ - "Alexandre Dulaunoy", - "Florian Roth", - "Timo Steffens", - "Christophe Vandeplas" - ], - "source": "MISP Project", - "type": "tool", - "name": "Tool" + ] } diff --git a/galaxies/exploit-kit.json b/galaxies/exploit-kit.json index f86ddf1..4707448 100644 --- a/galaxies/exploit-kit.json +++ b/galaxies/exploit-kit.json @@ -1,7 +1,7 @@ { - "type" : "exploit-kit", - "name" : "Exploit-Kit", - "description":"Exploit-Kit is an enumeration of some exploitation kits used by adversaries. The list includes document, browser and router exploit kits.It's not meant to be totally exhaustive but aim at covering the most seen in the past 5 years", - "version": 2, - "uuid": "6ab240ec-bd79-11e6-a4a6-cec0c932ce01" + "type": "exploit-kit", + "name": "Exploit-Kit", + "description": "Exploit-Kit is an enumeration of some exploitation kits used by adversaries. The list includes document, browser and router exploit kits.It's not meant to be totally exhaustive but aim at covering the most seen in the past 5 years", + "version": 2, + "uuid": "6ab240ec-bd79-11e6-a4a6-cec0c932ce01" } diff --git a/galaxies/microsoft-activity-group.json b/galaxies/microsoft-activity-group.json index 6ddcfb0..9bfa2a3 100644 --- a/galaxies/microsoft-activity-group.json +++ b/galaxies/microsoft-activity-group.json @@ -1,7 +1,7 @@ { - "name": "Microsoft Activity Group actor", - "type": "microsoft-activity-group", - "description": "Activity groups as described by Microsoft", - "version": 1, - "uuid": "74c869e8-0b8e-4e5f-96e6-cd992e07a505" + "name": "Microsoft Activity Group actor", + "type": "microsoft-activity-group", + "description": "Activity groups as described by Microsoft", + "version": 1, + "uuid": "74c869e8-0b8e-4e5f-96e6-cd992e07a505" } diff --git a/galaxies/preventive-measure.json b/galaxies/preventive-measure.json index 9046977..40b5d91 100644 --- a/galaxies/preventive-measure.json +++ b/galaxies/preventive-measure.json @@ -1,7 +1,7 @@ { - "name": "Preventive Measure", - "type": "preventive-measure", - "description": "Preventive measures based on the ransomware document overview as published in https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml# . The preventive measures are quite generic and can fit any standard Windows infrastructure and their security measures.", - "version": 1, - "uuid": "8168995b-adcd-4684-9e37-206c5771505a" + "name": "Preventive Measure", + "type": "preventive-measure", + "description": "Preventive measures based on the ransomware document overview as published in https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml# . The preventive measures are quite generic and can fit any standard Windows infrastructure and their security measures.", + "version": 1, + "uuid": "8168995b-adcd-4684-9e37-206c5771505a" } diff --git a/galaxies/tds.json b/galaxies/tds.json index 2763cf0..e773d3a 100644 --- a/galaxies/tds.json +++ b/galaxies/tds.json @@ -1,7 +1,7 @@ { - "type" : "tds", - "name" : "TDS", - "description": "TDS is a list of Traffic Direction System used by adversaries", - "version": 2, - "uuid": "1b9a7d8e-bd7a-11e6-a4a6-cec0c932ce01" + "type": "tds", + "name": "TDS", + "description": "TDS is a list of Traffic Direction System used by adversaries", + "version": 2, + "uuid": "1b9a7d8e-bd7a-11e6-a4a6-cec0c932ce01" } diff --git a/galaxies/threat-actor.json b/galaxies/threat-actor.json index 9b1a57b..d5f64ec 100644 --- a/galaxies/threat-actor.json +++ b/galaxies/threat-actor.json @@ -1,7 +1,7 @@ { - "name" : "Threat Actor", - "type" : "threat-actor", - "description": "Threat actors are characteristics of malicious actors (or adversaries) representing a cyber attack threat including presumed intent and historically observed behaviour.", - "version": 1, - "uuid": "698774c7-8022-42c4-917f-8d6e4f06ada3" + "name": "Threat Actor", + "type": "threat-actor", + "description": "Threat actors are characteristics of malicious actors (or adversaries) representing a cyber attack threat including presumed intent and historically observed behaviour.", + "version": 1, + "uuid": "698774c7-8022-42c4-917f-8d6e4f06ada3" } diff --git a/galaxies/tool.json b/galaxies/tool.json index 2237162..b4adbfd 100644 --- a/galaxies/tool.json +++ b/galaxies/tool.json @@ -1,7 +1,7 @@ { - "type" : "tool", - "name" : "Tool", - "description": "Threat actors tools is an enumeration of tools used by adversaries. The list includes malware but also common software regularly used by the adversaries.", - "version": 1, - "uuid": "9b8037f7-bc8f-4de1-a797-37266619bc0b" + "type": "tool", + "name": "Tool", + "description": "Threat actors tools is an enumeration of tools used by adversaries. The list includes malware but also common software regularly used by the adversaries.", + "version": 1, + "uuid": "9b8037f7-bc8f-4de1-a797-37266619bc0b" } diff --git a/jq_all_the_things.sh b/jq_all_the_things.sh new file mode 100755 index 0000000..2d9cc62 --- /dev/null +++ b/jq_all_the_things.sh @@ -0,0 +1,30 @@ +#!/bin/bash + +# Seeds sponge, from moreutils + +#Validate all Jsons first +for dir in `find . -name "*.json"` +do + echo validating ${dir} + cat ${dir} | jq . >/dev/null + rc=$? + if [[ $rc != 0 ]]; then exit $rc; fi +done + +set -e +set -x + +for dir in clusters/*.json +do + # Beautify it + cat ${dir} | jq . | sponge ${dir} +done + +for dir in galaxies/*.json +do + # Beautify it + cat ${dir} | jq . | sponge ${dir} +done + +cat schema_clusters.json | jq . | sponge schema_clusters.json +cat schema_galaxies.json | jq . | sponge schema_galaxies.json diff --git a/schema_clusters.json b/schema_clusters.json new file mode 100644 index 0000000..861e560 --- /dev/null +++ b/schema_clusters.json @@ -0,0 +1,121 @@ +{ + "$schema": "http://json-schema.org/schema#", + "title": "Validator for misp-galaxies", + "id": "https://www.github.com/MISP/misp-galaxies/schema.json", + "type": "object", + "additionalProperties": false, + "properties": { + "description": { + "type": "string" + }, + "type": { + "type": "string" + }, + "version": { + "type": "integer" + }, + "name": { + "type": "string" + }, + "uuid": { + "type": "string" + }, + "source": { + "type": "string" + }, + "values": { + "type": "array", + "uniqueItems": true, + "items": { + "type": "object", + "additionalProperties": false, + "properties": { + "description": { + "type": "string" + }, + "value": { + "type": "string" + }, + "meta": { + "type": "object", + "additionalProperties": false, + "properties": { + "type": { + "type": "array", + "uniqueItems": true, + "items": { + "type": "string" + } + }, + "complexity": { + "type": "string" + }, + "effectiveness": { + "type": "string" + }, + "country": { + "type": "string" + }, + "possible_issues": { + "type": "string" + }, + "colour": { + "type": "string" + }, + "motive": { + "type": "string" + }, + "impact": { + "type": "string" + }, + "refs": { + "type": "array", + "uniqueItems": true, + "items": { + "type": "string" + } + }, + "synonyms": { + "type": "array", + "uniqueItems": true, + "items": { + "type": "string" + } + }, + "derivated_from": { + "type": "array", + "uniqueItems": true, + "items": { + "type": "string" + } + }, + "status": { + "type": "string" + } + } + } + }, + "required": [ + "value" + ] + } + }, + "authors": { + "type": "array", + "uniqueItems": true, + "items": { + "type": "string" + } + } + }, + "required": [ + "description", + "type", + "version", + "name", + "uuid", + "values", + "authors", + "source" + ] +} diff --git a/schema_galaxies.json b/schema_galaxies.json new file mode 100644 index 0000000..5f4a629 --- /dev/null +++ b/schema_galaxies.json @@ -0,0 +1,31 @@ +{ + "$schema": "http://json-schema.org/schema#", + "title": "Validator for misp-galaxies", + "id": "https://www.github.com/MISP/misp-galaxies/schema.json", + "type": "object", + "additionalProperties": false, + "properties": { + "description": { + "type": "string" + }, + "type": { + "type": "string" + }, + "version": { + "type": "integer" + }, + "name": { + "type": "string" + }, + "uuid": { + "type": "string" + } + }, + "required": [ + "description", + "type", + "version", + "name", + "uuid" + ] +} diff --git a/tools/chk_dup.py b/tools/chk_dup.py new file mode 100755 index 0000000..2ed2f89 --- /dev/null +++ b/tools/chk_dup.py @@ -0,0 +1,51 @@ +#!/usr/bin/env python3 +# coding=utf-8 +""" + Tools to find duplicate in galaxies +""" +import json +import os +import collections + + +def loadjsons(path): + """ + Find all Jsons and load them in a dict + """ + files = [] + data = [] + for name in os.listdir(path): + if os.path.isfile(os.path.join(path, name)) and name.endswith('.json'): + files.append(name) + for jfile in files: + data.append(json.load(open("%s/%s" % (path, jfile)))) + return data + +if __name__ == '__main__': + """ + Iterate all name + synonyms + tell what is duplicated. + """ + jsons = loadjsons("../clusters") + counter = collections.Counter() + namespace = [] + for djson in jsons: + items = djson.get('values') + for entry in items: + name = entry.get('value').strip().lower() + counter[name]+=1 + namespace.append([name, djson.get('name')]) + try: + for synonym in entry.get('meta').get('synonyms'): + name = synonym.strip().lower() + counter[name]+=1 + namespace.append([name, djson.get('name')]) + except (AttributeError, TypeError): + pass + counter = dict(counter) + for key, val in counter.items(): + if val>1: + print ("Warning duplicate %s" % key) + for item in namespace: + if item[0]==key: + print (item) diff --git a/validate_all.sh b/validate_all.sh new file mode 100755 index 0000000..31f47d7 --- /dev/null +++ b/validate_all.sh @@ -0,0 +1,50 @@ +#!/bin/bash + +# This file launch all validation of the jsons and schemas +# By default, It stop on file not commited. + +# you could test with command ./validate_all.sh something + + +# Check Jsons format, and beautify +./jq_all_the_things.sh +rc=$? +if [[ $rc != 0 ]]; then + exit $rc +fi + +set -e +set -x + +diffs=`git status --porcelain | wc -l` +if ! [ $diffs -eq 0 ]; then + echo "Please make sure you run ./jq_all_the_things.sh before commiting." + if [ $# -eq 0 ]; then + exit 1 + fi +fi + +# Validate schemas +for dir in clusters/*.json +do + echo -n "${dir}: " + jsonschema -i ${dir} schema_clusters.json + rc=$? + if [[ $rc != 0 ]]; then + echo "Error on ${dir}" + exit $rc + fi + echo '' +done + +for dir in galaxies/*.json +do + echo -n "${dir}: " + jsonschema -i ${dir} schema_galaxies.json + rc=$? + if [[ $rc != 0 ]]; then + echo "Error on ${dir}" + exit $rc + fi + echo '' +done