More adversary tools

This commit is contained in:
Alexandre Dulaunoy 2016-03-24 07:42:27 +01:00
parent 1f26cca3b8
commit 577fb4c479

View file

@ -110,6 +110,19 @@
"value": "AlienSpy", "value": "AlienSpy",
"description": "RAT for Apple OS X platforms" "description": "RAT for Apple OS X platforms"
}, },
{
"value": "Cadelspy",
"synonyms": ["WinSpy"]
},
{
"value": "CMStar",
"refs": ["http://researchcenter.paloaltonetworks.com/2016/03/digital-quartermaster-scenario-demonstrated-in-attacks-against-the-mongolian-government/"]
},
{
"value": "DHS2015",
"synonyms": ["iRAT"],
"refs": ["https://securelist.com/files/2015/02/The-Desert-Falcons-targeted-attacks.pdf"]
},
{ {
"value": "Gh0st Rat", "value": "Gh0st Rat",
"description": "Gh0st Rat is a well-known Chinese remote access trojan which was originally made by C.Rufus Security Team several years ago.", "description": "Gh0st Rat is a well-known Chinese remote access trojan which was originally made by C.Rufus Security Team several years ago.",
@ -341,6 +354,15 @@
{ {
"value": "Elirks" "value": "Elirks"
}, },
{
"value": "Aumlib",
"synonyms": ["Yayih", "mswab", "Graftor"],
"refs": ["http://www.cybersquared.com/killing-with-a-borrowed-knife-chaining-core-cloud-service-profile-infrastructure-for-cyber-attacks"]
},
{
"value": "CTRat",
"refs": ["http://www.fireeye.com/blog/technical/threat-intelligence/2014/07/spy-of-the-tiger.html"]
},
{ {
"value": "Emdivi", "value": "Emdivi",
"synonyms": ["Newsripper"], "synonyms": ["Newsripper"],