mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-29 18:27:19 +00:00
jq
This commit is contained in:
parent
91cd3a6eec
commit
ad22bafdba
10 changed files with 7597 additions and 7597 deletions
|
@ -307,7 +307,7 @@
|
|||
}
|
||||
},
|
||||
{
|
||||
"description": "APT1 is a Chinese threat group that has been attributed to the 2nd Bureau of the People\u2019s Liberation Army (PLA) General Staff Department\u2019s (GSD) 3rd Department, commonly known by its Military Unit Cover Designator (MUCD) as Unit 61398.[[Citation: Mandiant APT1]]",
|
||||
"description": "APT1 is a Chinese threat group that has been attributed to the 2nd Bureau of the People’s Liberation Army (PLA) General Staff Department’s (GSD) 3rd Department, commonly known by its Military Unit Cover Designator (MUCD) as Unit 61398.[[Citation: Mandiant APT1]]",
|
||||
"value": "APT1",
|
||||
"meta": {
|
||||
"refs": [
|
||||
|
@ -539,7 +539,7 @@
|
|||
}
|
||||
},
|
||||
{
|
||||
"description": "Darkhotel is a threat group that has been active since at least 2004. The group has conducted activity on hotel and business center Wi\u2011Fi and physical connections as well as peer-to-peer and file sharing networks. The actors have also conducted spearphishing.[[Citation: Kaspersky Darkhotel]]",
|
||||
"description": "Darkhotel is a threat group that has been active since at least 2004. The group has conducted activity on hotel and business center Wi‑Fi and physical connections as well as peer-to-peer and file sharing networks. The actors have also conducted spearphishing.[[Citation: Kaspersky Darkhotel]]",
|
||||
"value": "Darkhotel",
|
||||
"meta": {
|
||||
"refs": [
|
||||
|
@ -675,7 +675,7 @@
|
|||
}
|
||||
},
|
||||
{
|
||||
"description": "Putter Panda is a Chinese threat group that has been attributed to Unit 61486 of the 12th Bureau of the PLA\u2019s 3rd General Staff Department (GSD).[[Citation: CrowdStrike Putter Panda]]",
|
||||
"description": "Putter Panda is a Chinese threat group that has been attributed to Unit 61486 of the 12th Bureau of the PLA’s 3rd General Staff Department (GSD).[[Citation: CrowdStrike Putter Panda]]",
|
||||
"value": "Putter Panda",
|
||||
"meta": {
|
||||
"refs": [
|
||||
|
|
|
@ -698,7 +698,7 @@
|
|||
"value": "Prikormka"
|
||||
},
|
||||
{
|
||||
"description": "NETEAGLE is a backdoor developed by APT30 with compile dates as early as 2008. It has two main variants known as \u201cScout\u201d and \u201cNorton.\u201d[[Citation: FireEye APT30]]",
|
||||
"description": "NETEAGLE is a backdoor developed by APT30 with compile dates as early as 2008. It has two main variants known as “Scout” and “Norton.”[[Citation: FireEye APT30]]",
|
||||
"meta": {
|
||||
"uuid": "53cf6cc4-65aa-445a-bcf8-c3d296f8a7a2",
|
||||
"refs": [
|
||||
|
|
|
@ -308,7 +308,7 @@
|
|||
},
|
||||
{
|
||||
"value": "Cachedump",
|
||||
"description": "Cachedump is a publicly-available tool that program extracts cached password hashes from a system\u2019s registry.[[Citation: Mandiant APT1]]",
|
||||
"description": "Cachedump is a publicly-available tool that program extracts cached password hashes from a system’s registry.[[Citation: Mandiant APT1]]",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://attack.mitre.org/wiki/Software/S0119",
|
||||
|
|
Loading…
Reference in a new issue