mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-30 10:47:17 +00:00
Merge branch 'danielplohmann-patch-8'
This commit is contained in:
commit
eaf8458f8e
1 changed files with 9 additions and 19 deletions
|
@ -2888,13 +2888,19 @@
|
||||||
"https://www.proofpoint.com/sites/default/files/proofpoint-operation-transparent-tribe-threat-insight-en.pdf",
|
"https://www.proofpoint.com/sites/default/files/proofpoint-operation-transparent-tribe-threat-insight-en.pdf",
|
||||||
"https://www.amnesty.org/en/documents/asa33/8366/2018/en/",
|
"https://www.amnesty.org/en/documents/asa33/8366/2018/en/",
|
||||||
"https://www.crowdstrike.com/blog/adversary-of-the-month-for-may/",
|
"https://www.crowdstrike.com/blog/adversary-of-the-month-for-may/",
|
||||||
"https://unit42.paloaltonetworks.com/unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribe"
|
"https://unit42.paloaltonetworks.com/unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribe",
|
||||||
|
"https://mkd-cirt.mk/wp-content/uploads/2018/08/20181009_3_1_M-Trends2018-May-2018-compressed.pdf",
|
||||||
|
"https://nciipc.gov.in/documents/NCIIPC_Newsletter_July18.pdf",
|
||||||
|
"https://aisa.org.au//PDF/AISA%20Sydney%20-%20Dec2016.pdf"
|
||||||
],
|
],
|
||||||
"synonyms": [
|
"synonyms": [
|
||||||
"C-Major",
|
"C-Major",
|
||||||
"Transparent Tribe",
|
"Transparent Tribe",
|
||||||
"Mythic Leopard",
|
"Mythic Leopard",
|
||||||
"ProjectM"
|
"ProjectM",
|
||||||
|
"APT36",
|
||||||
|
"APT 36",
|
||||||
|
"TMP.Lapis"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"related": [
|
"related": [
|
||||||
|
@ -6657,23 +6663,7 @@
|
||||||
},
|
},
|
||||||
"uuid": "401c30c7-4317-458a-9b0a-379a44d63457",
|
"uuid": "401c30c7-4317-458a-9b0a-379a44d63457",
|
||||||
"value": "Operation ShadowHammer"
|
"value": "Operation ShadowHammer"
|
||||||
},
|
|
||||||
{
|
|
||||||
"description": "FireEye details APT36 as a Pakistani espionage group that supports Pakistani military and diplomatic interests, targeting Indian military and government. Operations have been also observed in the US, Europe, and Central Asia. Uses social engineering emails, multiple open-source, and custom malware tools.",
|
|
||||||
"meta": {
|
|
||||||
"refs": [
|
|
||||||
"https://mkd-cirt.mk/wp-content/uploads/2018/08/20181009_3_1_M-Trends2018-May-2018-compressed.pdf",
|
|
||||||
"https://nciipc.gov.in/documents/NCIIPC_Newsletter_July18.pdf",
|
|
||||||
"https://aisa.org.au//PDF/AISA%20Sydney%20-%20Dec2016.pdf"
|
|
||||||
],
|
|
||||||
"synonyms": [
|
|
||||||
"APT 36",
|
|
||||||
"TMP.Lapis"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"uuid": "80fad97c-df3a-44ea-a127-cf29833b4946",
|
|
||||||
"value": "APT36"
|
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 106
|
"version": 107
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue