mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-29 18:27:19 +00:00
55 lines
1.9 KiB
JSON
55 lines
1.9 KiB
JSON
{
|
|
"authors": [
|
|
"MITRE"
|
|
],
|
|
"category": "actor",
|
|
"description": "Name of ATT&CK Group",
|
|
"name": "Mobile Attack - intrusion Set",
|
|
"source": "https://github.com/mitre/cti",
|
|
"type": "mitre-mobile-attack-intrusion-set",
|
|
"uuid": "02ab4018-1708-11e8-8f9d-e735aabdfa53",
|
|
"values": [
|
|
{
|
|
"description": "APT28 is a threat group that has been attributed to the Russian government. (Citation: FireEye APT28) (Citation: SecureWorks TG-4127) (Citation: FireEye APT28) January 2017 (Citation: GRIZZLY STEPPE JAR) This group reportedly compromised the Democratic National Committee in April 2016. (Citation: Crowdstrike DNC June 2016)",
|
|
"meta": {
|
|
"external_id": "G0007",
|
|
"refs": [
|
|
"https://attack.mitre.org/wiki/Group/G0007",
|
|
"https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/",
|
|
"https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-apt28.pdf",
|
|
"https://www.secureworks.com/research/threat-group-4127-targets-hillary-clinton-presidential-campaign"
|
|
],
|
|
"synonyms": [
|
|
"APT28",
|
|
"Sednit",
|
|
"Sofacy",
|
|
"Pawn Storm",
|
|
"Fancy Bear",
|
|
"STRONTIUM",
|
|
"Tsar Team",
|
|
"Threat Group-4127",
|
|
"TG-4127"
|
|
]
|
|
},
|
|
"related": [
|
|
{
|
|
"dest-uuid": "5b4ee3ea-eee3-4c8e-8323-85ae32658754",
|
|
"tags": [
|
|
"estimative-language:likelihood-probability=\"likely\""
|
|
],
|
|
"type": "similar"
|
|
},
|
|
{
|
|
"dest-uuid": "213cdde9-c11a-4ea9-8ce0-c868e9826fec",
|
|
"tags": [
|
|
"estimative-language:likelihood-probability=\"likely\""
|
|
],
|
|
"type": "similar"
|
|
}
|
|
],
|
|
"uuid": "bef4c620-0787-42a8-a96d-b7eb6e85917c",
|
|
"value": "APT28 - G0007"
|
|
}
|
|
],
|
|
"version": 6
|
|
}
|