Merge branch 'danielplohmann-patch-8'

This commit is contained in:
Alexandre Dulaunoy 2019-04-12 05:59:24 +02:00
commit eaf8458f8e
Signed by: adulau
GPG key ID: 09E2CD4944E6CBCD

View file

@ -2888,13 +2888,19 @@
"https://www.proofpoint.com/sites/default/files/proofpoint-operation-transparent-tribe-threat-insight-en.pdf",
"https://www.amnesty.org/en/documents/asa33/8366/2018/en/",
"https://www.crowdstrike.com/blog/adversary-of-the-month-for-may/",
"https://unit42.paloaltonetworks.com/unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribe"
"https://unit42.paloaltonetworks.com/unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribe",
"https://mkd-cirt.mk/wp-content/uploads/2018/08/20181009_3_1_M-Trends2018-May-2018-compressed.pdf",
"https://nciipc.gov.in/documents/NCIIPC_Newsletter_July18.pdf",
"https://aisa.org.au//PDF/AISA%20Sydney%20-%20Dec2016.pdf"
],
"synonyms": [
"C-Major",
"Transparent Tribe",
"Mythic Leopard",
"ProjectM"
"ProjectM",
"APT36",
"APT 36",
"TMP.Lapis"
]
},
"related": [
@ -6657,23 +6663,7 @@
},
"uuid": "401c30c7-4317-458a-9b0a-379a44d63457",
"value": "Operation ShadowHammer"
},
{
"description": "FireEye details APT36 as a Pakistani espionage group that supports Pakistani military and diplomatic interests, targeting Indian military and government. Operations have been also observed in the US, Europe, and Central Asia. Uses social engineering emails, multiple open-source, and custom malware tools.",
"meta": {
"refs": [
"https://mkd-cirt.mk/wp-content/uploads/2018/08/20181009_3_1_M-Trends2018-May-2018-compressed.pdf",
"https://nciipc.gov.in/documents/NCIIPC_Newsletter_July18.pdf",
"https://aisa.org.au//PDF/AISA%20Sydney%20-%20Dec2016.pdf"
],
"synonyms": [
"APT 36",
"TMP.Lapis"
]
},
"uuid": "80fad97c-df3a-44ea-a127-cf29833b4946",
"value": "APT36"
}
],
"version": 106
"version": 107
}