Y en a un peut plus je vous le mets quand meme ?

This commit is contained in:
Thanat0s 2022-06-11 04:24:04 -04:00
parent 57befd7259
commit 44a99d066a

View file

@ -1488,7 +1488,8 @@
"Sneaky Panda",
"Elderwood",
"Elderwood Gang",
"SIG22"
"SIG22",
"G0066"
]
},
"related": [
@ -2744,7 +2745,8 @@
"Quedagh",
"Voodoo Bear",
"TEMP.Noble",
"Iron Viking"
"Iron Viking",
"G0034"
]
},
"related": [
@ -2864,7 +2866,8 @@
"GOLD NIAGARA",
"Calcium",
"ATK32",
"G0046"
"G0046",
"G0008"
]
},
"related": [
@ -2977,7 +2980,8 @@
"https://attack.mitre.org/groups/G0085/"
],
"synonyms": [
"FIN4"
"FIN4",
"G0085"
]
},
"uuid": "ff449346-aa9f-45f6-b482-71e886a5cf57",
@ -3375,7 +3379,8 @@
"https://attack.mitre.org/groups/G0038/"
],
"synonyms": [
"FruityArmor"
"FruityArmor",
"G0038"
]
},
"related": [
@ -3470,6 +3475,9 @@
"https://attack.mitre.org/wiki/Groups",
"https://unit42.paloaltonetworks.com/scarlet-mimic-years-long-espionage-targets-minority-activists/",
"https://attack.mitre.org/groups/G0029/"
],
"synonyms": [
"G0029"
]
},
"related": [
@ -3493,6 +3501,9 @@
"https://securelist.com/poseidon-group-a-targeted-attack-boutique-specializing-in-global-cyber-espionage/73673/",
"https://attack.mitre.org/wiki/Groups",
"https://attack.mitre.org/groups/G0033/"
],
"synonyms": [
"G0033"
]
},
"related": [
@ -3535,7 +3546,9 @@
],
"synonyms": [
"Moafee",
"BRONZE OVERBROOK"
"BRONZE OVERBROOK",
"G0017",
"G0002"
]
},
"related": [
@ -3586,7 +3599,8 @@
"synonyms": [
"Strider",
"Sauron",
"Project Sauron"
"Project Sauron",
"G0041"
]
},
"related": [
@ -3635,7 +3649,8 @@
"https://www.cfr.org/interactive/cyber-operations/apt-30"
],
"synonyms": [
"APT30"
"APT30",
"G0013"
]
},
"related": [
@ -3691,6 +3706,9 @@
"refs": [
"https://securelist.com/apt-style-bank-robberies-increase-with-metel-gcman-and-carbanak-2-0-attacks/73638/",
"https://attack.mitre.org/groups/G0036/"
],
"synonyms": [
"G0036"
]
},
"related": [
@ -3714,6 +3732,9 @@
"https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=62e325ae-f551-4855-b9cf-28a7d52d1534&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments",
"https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=7a60af1f-7786-446c-976b-7c71a16e9d3b&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments",
"https://attack.mitre.org/groups/G0039/"
],
"synonyms": [
"G0039"
]
},
"related": [
@ -4014,7 +4035,8 @@
"Operation Molerats",
"Extreme Jackal",
"Moonlight",
"ALUMINUM SARATOGA"
"ALUMINUM SARATOGA",
"G0021"
]
},
"related": [
@ -4041,7 +4063,9 @@
"https://attack.mitre.org/groups/G0056/"
],
"synonyms": [
"StrongPity"
"StrongPity",
"G0055",
"G0056"
]
},
"related": [
@ -4216,7 +4240,8 @@
"Lamberts",
"EQGRP",
"Longhorn",
"PLATINUM TERMINAL"
"PLATINUM TERMINAL",
"G0020"
]
},
"related": [
@ -4287,7 +4312,8 @@
"synonyms": [
"Primitive Bear",
"Shuckworm",
"ACTINIUM"
"ACTINIUM",
"G0047"
]
},
"related": [
@ -4487,6 +4513,7 @@
"cfr-type-of-incident": "Espionage",
"country": "VN",
"refs": [
"https://attack.mitre.org/groups/G0050/",
"https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html",
"https://www.cybereason.com/labs-operation-cobalt-kitty-a-large-scale-apt-in-asia-carried-out-by-the-oceanlotus-group/",
"https://www.scmagazineuk.com/ocean-lotus-groupapt-32-identified-as-vietnamese-apt-group/article/663565/",
@ -4657,9 +4684,7 @@
"since": "2017",
"synonyms": [
"LeafMiner",
"Raspite",
"ATK113",
"G0061"
"Raspite"
],
"victimology": "Electric utility sector"
},
@ -4676,6 +4701,10 @@
"https://afyonluoglu.org/PublicWebFiles/Reports-TR/2017%20FireEye%20M-Trends%20Report.pdf",
"https://www.fireeye.com/blog/threat-research/2017/06/obfuscation-in-the-wild.html",
"https://attack.mitre.org/groups/G0061"
],
"synonyms": [
"ATK113",
"G0061"
]
},
"related": [
@ -4718,6 +4747,7 @@
],
"cfr-type-of-incident": "Espionage",
"refs": [
"https://attack.mitre.org/groups/G0095/",
"https://securelist.com/el-machete/66108/",
"https://www.cylance.com/en_us/blog/el-machete-malware-attacks-cut-through-latam.html",
"https://www.cfr.org/interactive/cyber-operations/machete",
@ -4727,7 +4757,8 @@
"synonyms": [
"Machete",
"machete-apt",
"APT-C-43"
"APT-C-43",
"G0095"
]
},
"uuid": "827c17e0-c3f5-4ad1-a4f4-30a40ed0a2d3",
@ -4758,7 +4789,8 @@
"Cobalt Group",
"Cobalt Gang",
"GOLD KINGSWOOD",
"COBALT SPIDER"
"COBALT SPIDER",
"G0080"
]
},
"uuid": "01967480-c49b-4d4a-a7fa-aef0eaf535fe",
@ -4771,6 +4803,9 @@
"refs": [
"https://www.proofpoint.com/us/threat-insight/post/apt-targets-financial-analysts",
"https://attack.mitre.org/groups/G0062/"
],
"synonyms": [
"G0062"
]
},
"related": [
@ -4901,7 +4936,8 @@
"Nian",
"BRONZE BUTLER",
"REDBALDKNIGHT",
"STALKER PANDA"
"STALKER PANDA",
"G0060"
]
},
"related": [
@ -5064,7 +5100,8 @@
"https://attack.mitre.org/groups/G0052/"
],
"synonyms": [
"Slayer Kitten"
"Slayer Kitten",
"G0052"
]
},
"related": [
@ -5216,7 +5253,8 @@
"Velvet Chollima",
"Black Banshee",
"Thallium",
"Operation Stolen Pencil"
"Operation Stolen Pencil",
"G0086"
]
},
"uuid": "bcaaad6f-0597-4b89-b69b-84a6be2b7bc3",
@ -5616,6 +5654,9 @@
"https://www.symantec.com/connect/blogs/sowbug-cyber-espionage-group-targets-south-american-and-southeast-asian-governments",
"https://www.cfr.org/interactive/cyber-operations/sowbug",
"https://attack.mitre.org/groups/G0054/"
],
"synonyms": [
"G0054"
]
},
"related": [
@ -5723,7 +5764,11 @@
"country": "LB",
"refs": [
"https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf",
"https://research.checkpoint.com/2020/bandook-signed-delivered",
"https://attack.mitre.org/groups/G0070/"
],
"synonyms": [
"G0070"
]
},
"uuid": "3d449c83-4426-431a-b06a-cb4f8a0fca94",
@ -6177,7 +6222,8 @@
"synonyms": [
"Rancor group",
"Rancor",
"Rancor Group"
"Rancor Group",
"G0075"
]
},
"uuid": "79c7c7e0-79d5-11e8-9b9c-1ff96be20c0b",
@ -6235,7 +6281,8 @@
"https://attack.mitre.org/groups/G0079/"
],
"synonyms": [
"LazyMeerkat"
"LazyMeerkat",
"G0079"
]
},
"uuid": "ce2c2dfd-2445-4fbc-a747-9e7092e383f9",
@ -6444,7 +6491,8 @@
"https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf"
],
"synonyms": [
"LOTUS PANDA"
"LOTUS PANDA",
"G0076"
]
},
"uuid": "98be4300-a9ef-11e8-9a95-bb9221083cfc",
@ -6472,7 +6520,8 @@
"cfr-type-of-incident": "Espionage",
"country": "PK",
"refs": [
"https://www.cfr.org/interactive/cyber-operations/stealth-mango-and-tangelo"
"https://www.cfr.org/interactive/cyber-operations/stealth-mango-and-tangelo",
"https://attack.mitre.org/groups/G0076"
],
"synonyms": [
"ATK78",
@ -6599,7 +6648,8 @@
"cfr-type-of-incident": "Espionage",
"country": "RU",
"refs": [
"https://www.cfr.org/interactive/cyber-operations/cloud-atlas"
"https://www.cfr.org/interactive/cyber-operations/cloud-atlas",
"https://attack.mitre.org/groups/G0100/"
],
"synonyms": [
"ATK116",
@ -7034,7 +7084,8 @@
"synonyms": [
"Chafer",
"REMIX KITTEN",
"COBALT HICKMAN"
"COBALT HICKMAN",
"G0087"
]
},
"uuid": "c2c64bd3-a325-446f-91a8-b4c0f173a30b",
@ -7362,6 +7413,9 @@
"https://securelist.com/blackoasis-apt-and-new-targeted-attacks-leveraging-zero-day-exploit/82732/",
"https://www.fireeye.com/blog/threat-research/2017/09/zero-day-used-to-distribute-finspy.html",
"https://attack.mitre.org/groups/G0063/"
],
"synonyms": [
"G0063"
]
},
"uuid": "8fbd195f-5e03-4e85-8ca5-4f1dff300bec",
@ -7395,6 +7449,9 @@
"refs": [
"https://www.darkreading.com/analytics/prolific-cybercrime-gang-favors-legit-login-credentials/d/d-id/1322645?",
"https://attack.mitre.org/groups/G0053/"
],
"synonyms": [
"G0053"
]
},
"uuid": "44dc2f9c-8c28-11e9-9b9a-7fdced8cbf70",
@ -7417,6 +7474,9 @@
"refs": [
"https://www2.fireeye.com/rs/848-DID-242/images/rpt-fin10.pdf",
"https://attack.mitre.org/groups/G0051/"
],
"synonyms": [
"G0051"
]
},
"uuid": "f2d02410-8c2c-11e9-8df1-a31c1fb33d79",
@ -7456,6 +7516,9 @@
"refs": [
"https://www.securityweek.com/iranian-actor-group5-targeting-syrian-opposition",
"https://attack.mitre.org/groups/G0043/"
],
"synonyms": [
"G0043"
]
},
"uuid": "bc8390aa-8c4e-11e9-a9cb-e37c361210af",
@ -7467,6 +7530,9 @@
"refs": [
"https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups/",
"https://attack.mitre.org/groups/G0072/"
],
"synonyms": [
"G0072"
]
},
"uuid": "2d82a18e-8c53-11e9-b0ec-536b62fa3d86",
@ -7489,6 +7555,9 @@
"refs": [
"https://www.welivesecurity.com/wp-content/uploads/2017/02/Read-The-Manual.pdf",
"https://attack.mitre.org/groups/G0048/"
],
"synonyms": [
"G0048"
]
},
"uuid": "88100602-8e8b-11e9-bb7c-1bf20b58e305",
@ -7520,6 +7589,9 @@
"refs": [
"https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp_the_taidoor_campaign.pdf",
"https://attack.mitre.org/groups/G0015/"
],
"synonyms": [
"G0015"
]
},
"uuid": "e6669606-91ad-11e9-b6f5-374843911989",
@ -8507,6 +8579,7 @@
"attribution-confidence": "100",
"country": "CN",
"refs": [
"https://attack.mitre.org/groups/G0125/",
"https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers",
"https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/",
"https://www.splunk.com/en_us/blog/security/detecting-hafnium-exchange-server-zero-day-activity-in-splunk.html",
@ -8532,7 +8605,8 @@
],
"synonyms": [
"ATK233",
"G0125"
"G0125",
"Operation Exchange Marauder"
]
},
"uuid": "4f05d6c1-3fc1-4567-91cd-dd4637cc38b5",