mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-30 02:37:17 +00:00
New actors + refs added
This commit is contained in:
parent
9c140266f3
commit
0fff0e0bfa
1 changed files with 23 additions and 3 deletions
|
@ -22,6 +22,11 @@
|
||||||
"country": "CN",
|
"country": "CN",
|
||||||
"group": "Stalker Panda"
|
"group": "Stalker Panda"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"country": "CN",
|
||||||
|
"group": "Keyhole Panda"
|
||||||
|
},
|
||||||
|
|
||||||
{
|
{
|
||||||
"country": "CN",
|
"country": "CN",
|
||||||
"group": "Wet Panda"
|
"group": "Wet Panda"
|
||||||
|
@ -160,9 +165,11 @@
|
||||||
"PinkPanther",
|
"PinkPanther",
|
||||||
"Sh3llCr3w"
|
"Sh3llCr3w"
|
||||||
],
|
],
|
||||||
|
"description": "Adversary group targeting financial, technology, non-profit organisations.",
|
||||||
"country": "CN",
|
"country": "CN",
|
||||||
"refs": [
|
"refs": [
|
||||||
"http://cybercampaigns.net/wp-content/uploads/2013/06/Deep-Panda.pdf"
|
"http://cybercampaigns.net/wp-content/uploads/2013/06/Deep-Panda.pdf",
|
||||||
|
"http://www.rsaconference.com/writable/presentations/file_upload/anf-t07b-the-art-of-attribution-identifying-and-pursuing-your-cyber-adversaries_final.pdf"
|
||||||
],
|
],
|
||||||
"group": "Shell Crew"
|
"group": "Shell Crew"
|
||||||
},
|
},
|
||||||
|
@ -547,12 +554,23 @@
|
||||||
"country": "RU",
|
"country": "RU",
|
||||||
"group": "Shark Spider"
|
"group": "Shark Spider"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "Union Spider",
|
||||||
|
"country": "RU",
|
||||||
|
"refs": [
|
||||||
|
"http://www.rsaconference.com/writable/presentations/file_upload/anf-t07b-the-art-of-attribution-identifying-and-pursuing-your-cyber-adversaries_final.pdf"
|
||||||
|
],
|
||||||
|
"description": "Adversary targeting manufacturing and industrial organizations."
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"country": "KP",
|
"country": "KP",
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
"OperationTroy"
|
"OperationTroy"
|
||||||
],
|
],
|
||||||
"group": "Silent Chollima"
|
"group": "Silent Chollima",
|
||||||
|
"refs": [
|
||||||
|
"http://www.rsaconference.com/writable/presentations/file_upload/anf-t07b-the-art-of-attribution-identifying-and-pursuing-your-cyber-adversaries_final.pdf"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
|
@ -653,7 +671,9 @@
|
||||||
"Charming Kitten",
|
"Charming Kitten",
|
||||||
"Deadeye Jackal",
|
"Deadeye Jackal",
|
||||||
"Spicy Panda",
|
"Spicy Panda",
|
||||||
"Magic Kitten"
|
"Magic Kitten",
|
||||||
|
"Keyhole Panda",
|
||||||
|
"Union Spider"
|
||||||
],
|
],
|
||||||
"type": "Adversary Groups",
|
"type": "Adversary Groups",
|
||||||
"authors": [
|
"authors": [
|
||||||
|
|
Loading…
Reference in a new issue