From cd76f19f52e94a61f0d500fa3cdbf89a758e1c19 Mon Sep 17 00:00:00 2001
From: Alexandre Dulaunoy
Date: Wed, 15 Aug 2018 20:25:57 +0200
Subject: [PATCH 1/2] chg: [threat-actor] APT-C-35 actor added
ref: https://ti.360.net/blog/articles/latest-activity-of-apt-c-35/
---
clusters/threat-actor.json | 15 ++++++++++++++-
1 file changed, 14 insertions(+), 1 deletion(-)
diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json
index 251b002..045640b 100644
--- a/clusters/threat-actor.json
+++ b/clusters/threat-actor.json
@@ -5365,7 +5365,20 @@
},
"uuid": "71a3b962-9a36-11e8-88f8-b31d20c6fa2a",
"value": "RedAlpha"
+ },
+ {
+ "value": "APT-C-35",
+ "uuid": "b9dc4e81-909f-4324-8b25-a0f359cd88e0",
+ "description": "In March 2017, the 360 Chasing Team found a sample of targeted attacks that confirmed the previously unknown sample of APT's attack actions, which the organization can now trace back at least in April 2016. The chasing team named the attack organization APT-C-35. In June 2017, the 360 Threat Intelligence Center discovered the organization’s new attack activity, confirmed and exposed the gang’s targeted attacks against Pakistan, and analyzed in detail. The unique EHDevel malicious code framework used by the organization",
+ "meta": {
+ "refs": [
+ "https://ti.360.net/blog/articles/latest-activity-of-apt-c-35/"
+ ],
+ "synonyms": [
+ "DoNot Team"
+ ]
+ }
}
],
- "version": 52
+ "version": 53
}
From f8c56406138dbc455da054e9d0ac98f8579463c7 Mon Sep 17 00:00:00 2001
From: Alexandre Dulaunoy
Date: Tue, 21 Aug 2018 10:48:47 +0200
Subject: [PATCH 2/2] chg: [tool] biscuit biscvt tool BISKVIT
ref: https://www.fortinet.com/blog/threat-research/russian-army-exhibition-decoy-leads-to-new-biskvit-malware.html
---
clusters/tool.json | 12 +++++++++++-
1 file changed, 11 insertions(+), 1 deletion(-)
diff --git a/clusters/tool.json b/clusters/tool.json
index 6cc4dae..d800258 100644
--- a/clusters/tool.json
+++ b/clusters/tool.json
@@ -5706,7 +5706,17 @@
},
"uuid": "f7f53bb8-37ed-4bbe-9809-ca1594431536",
"value": "KEYMARBLE"
+ },
+ {
+ "value": "BISKVIT",
+ "description": "The BISKVIT Trojan is a multi-component malware written in C#. We dubbed this malware BISKVIT based on the namespaces used in the code, which contain the word “biscuit”. Unfortunately, there is already an existing unrelated malware called BISCUIT, so BISKVIT is used instead, which is the Russian translation of biscuit.",
+ "meta": {
+ "refs": [
+ "https://www.fortinet.com/blog/threat-research/russian-army-exhibition-decoy-leads-to-new-biskvit-malware.html"
+ ]
+ },
+ "uuid": "69ed8a69-8b33-4195-9b21-a1f4cd76acde"
}
],
- "version": 84
+ "version": 85
}