{
	"id": "40990370-4ddf-4416-8aee-b690f9d26022",
	"created_at": "2026-04-06T00:10:51.619469Z",
	"updated_at": "2026-04-10T03:36:50.351197Z",
	"deleted_at": null,
	"sha1_hash": "0055ea5e8c14f729a988b9d97e5d98559bc531d3",
	"title": "Transparent Tribe, APT 36 - Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 100529,
	"plain_text": "Transparent Tribe, APT 36 - Threat Group Cards: A Threat Actor\r\nEncyclopedia\r\nArchived: 2026-04-05 19:22:58 UTC\r\nHome \u003e List all groups \u003e Transparent Tribe, APT 36\r\n APT group: Transparent Tribe, APT 36\r\nNames\r\nTransparent Tribe (Proofpoint)\r\nAPT 36 (Mandiant)\r\nProjectM (Palo Alto)\r\nMythic Leopard (CrowdStrike)\r\nTEMP.Lapis (FireEye)\r\nCopper Fieldstone (SecureWorks)\r\nEarth Karkaddan (Trend Micro)\r\nSTEPPY-KAVACH (Securonix)\r\nGreen Havildar (PWC)\r\nAPT-C-56 (Qihoo 360)\r\nStorm-0156 (Microsoft)\r\nOpaque Draco (Palo Alto)\r\nG0134 (MITRE)\r\nCountry Pakistan\r\nMotivation Information theft and espionage\r\nFirst seen 2013\r\nDescription\r\n(Proofpoint) Proofpoint researchers recently uncovered evidence of an advanced persistent threat (APT) agai\r\nIndian diplomatic and military resources. Our investigation began with malicious emails sent to Indian emba\r\nin Saudi Arabia and Kazakstan but turned up connections to watering hole sites focused on Indian military\r\npersonnel and designed to drop a remote access Trojan (RAT) with a variety of data exfiltration functions. Ou\r\nanalysis shows that many of the campaigns and attacks appear related by common IOCs, vectors, payloads, a\r\nlanguage, but the exact nature and attribution associated with this APT remain under investigation.\r\nAt this time, the background and analysis in this paper provide useful forensics and detail our current thinkin\r\nthe malware that we have dubbed “MSIL/Crimson”.\r\nTransparent Tribe may be related to Gorgon Group and SideCopy.\r\nTheir malicious infrastructure was infiltrated by Turla, Waterbug, Venomous Bear in 2022.\r\nTransparant Tribe has been observed to use the Andromeda botnet (operated by Andromeda Spider).\r\nObserved\r\nSectors: Defense, Education, Embassies, Government.\r\nCountries: Afghanistan, Australia, Austria, Azerbaijan, Belgium, Botswana, Bulgaria, Canada, China, Czech,\r\nGermany, India, Iran, Japan, Kazakhstan, Kenya, Malaysia, Mongolia, Nepal, Netherlands, Oman, Pakistan,\r\nRomania, Saudi Arabia, Spain, Sweden, Thailand, Turkey, UAE, UK, USA.\r\nhttps://apt.etda.or.th/cgi-bin/showcard.cgi?u=be967aec-2b55-45f2-86e8-7f22cc66db85\r\nPage 1 of 4\n\nTools used\nAmphibeon, Android RAT, beendoor, Bezigate, Bozok, BreachRAT, CapraRAT, Crimson RAT, DarkComet,\nElizaRAT, Limepad, Luminosity RAT, Mobzsar, MumbaiDown, njRAT, ObliqueRAT, Peppy RAT, QuasarRA\nSilentCMD, Stealth Mango, UPDATESEE, USBWorm, Waizsar RAT.\nOperations performed\n2012\nOperation “Transparent Tribe”\nOn February 11, 2016, we discovered two attacks minutes apart directed towards officials at I\nembassies in both Saudi Arabia and Kazakhstan. Both e-mails (Fig. 1, 2) were sent from the s\noriginating IP address (5.189.145[.]248) belonging to Contabo GmbH, a hosting provider that\nseems to be currently favored by these threat actors. The e-mails also likely utilized Rackspac\nMailGun service and both of them were carrying the same exact attachment.\nMar 2016\nIndian TV station CNN-IBN has discovered that Pakistani officials were collecting data about\nIndian troop movements using an Android app called SmeshApp.\nMar 2016\nOperation “C-Major”\nTrend Micro is reporting on a third campaign, which they’ve named Operation C-Major.\nAccording to the security firm, this campaign targeted Indian military officials via spear-phish\nemails, distributing spyware to its victims via an Adobe Reader vulnerability.\nFeb 2017\nThis blog post describes another attack campaign where attackers impersonated identity of Ind\nthink tank IDSA (Institute for Defence Studies and Analyses) and sent out spear-phishing ema\ntarget officials of the Central Bureau of Investigation (CBI) and possibly the officials of India\nArmy.\nJun 2019\nOver the past year, we have seen this group undergo an evolution, stepping up its activities,\nstarting massive infection campaigns, developing new tools and strengthening their focus on\nAfghanistan.\nJan 2020\nInvestigating APT36 or Earth Karkaddan’s Attack Chain and Malware Arsenal\nJan 2020\nTransparent tribe is back with a new campaign after several years of (apparently) inactivity. W\ncan confirm that this campaign is completely new, relying on the registration record of the C2\ndates back to 29 January 2020.\nEarly 2020\nTransparentTribe started using a new module named USBWorm at the beginning of 2020, as w\nas improving its custom .NET tool named CrimsonRAT.\nhttps://apt.etda.or.th/cgi-bin/showcard.cgi?u=be967aec-2b55-45f2-86e8-7f22cc66db85\nPage 2 of 4\n\nMar 2020\nAPT36 spreads fake coronavirus health advisory\nApr 2020\nOperation “Honey Trap”\nAPT36 Targets Defense Organizations in India\nFeb 2021\nObliqueRAT returns with new campaign using hijacked websites\nJun 2021\nTransparent Tribe campaign uses new bespoke malware to target Indian government officials\nDec 2021\nTransparent Tribe begins targeting education sector in latest campaign\n2022\nAPT-36 Uses New TTPs and New Tools to Target Indian Governmental Organizations\nJul 2022\nLove scam or espionage? Transparent Tribe lures Indian and Pakistani officials\nJul 2022\nPakistan-Aligned Threat Actor Expands Interest in Indian Education Sector\nNov 2022\nNew STEPPY#KAVACH Attack Campaign Likely Targeting Indian Government: Technical\nInsights and Detection Using Securonix\nApr 2023\nCyber Espionage in India: Decoding APT-36's New Linux Malware Campaign\nSep 2023\nThe Evolution of Transparent Tribe’s New Malware\nLate 2023\nTransparent Tribe Targets Indian Government, Defense, and Aerospace Sectors Leveraging Cr\nPlatform Programming Languages\nJun 2024\nCapraTube Remix | Transparent Tribe’s Android Spyware Targeting Gamers, Weapons Enthus\nMar 2025\nAPT36-Style ClickFix Attack Spoofs Indian Ministry to Target Windows \u0026 Linux\nhttps://apt.etda.or.th/cgi-bin/showcard.cgi?u=be967aec-2b55-45f2-86e8-7f22cc66db85\nPage 3 of 4\n\nInformation\nMITRE ATT\u0026CK Last change to this card: 16 August 2025\nDownload this actor card in PDF or JSON format\nSource: https://apt.etda.or.th/cgi-bin/showcard.cgi?u=be967aec-2b55-45f2-86e8-7f22cc66db85\nhttps://apt.etda.or.th/cgi-bin/showcard.cgi?u=be967aec-2b55-45f2-86e8-7f22cc66db85\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/showcard.cgi?u=be967aec-2b55-45f2-86e8-7f22cc66db85"
	],
	"report_names": [
		"showcard.cgi?u=be967aec-2b55-45f2-86e8-7f22cc66db85"
	],
	"threat_actors": [
		{
			"id": "8aaa5515-92dd-448d-bb20-3a253f4f8854",
			"created_at": "2024-06-19T02:03:08.147099Z",
			"updated_at": "2026-04-10T02:00:03.685355Z",
			"deleted_at": null,
			"main_name": "IRON HUNTER",
			"aliases": [
				"ATK13 ",
				"Belugasturgeon ",
				"Blue Python ",
				"CTG-8875 ",
				"ITG12 ",
				"KRYPTON ",
				"MAKERSMARK ",
				"Pensive Ursa ",
				"Secret Blizzard ",
				"Turla",
				"UAC-0003 ",
				"UAC-0024 ",
				"UNC4210 ",
				"Venomous Bear ",
				"Waterbug "
			],
			"source_name": "Secureworks:IRON HUNTER",
			"tools": [
				"Carbon-DLL",
				"ComRAT",
				"LightNeuron",
				"Mosquito",
				"PyFlash",
				"Skipper",
				"Snake",
				"Tavdig"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "414d7c65-5872-4e56-8a7d-49a2aeef1632",
			"created_at": "2025-08-07T02:03:24.7983Z",
			"updated_at": "2026-04-10T02:00:03.76109Z",
			"deleted_at": null,
			"main_name": "COPPER FIELDSTONE",
			"aliases": [
				"APT36 ",
				"Earth Karkaddan ",
				"Gorgon Group ",
				"Green Havildar ",
				"Mythic Leopard ",
				"Operation C-Major ",
				"Operation Transparent Tribe ",
				"Pasty Draco ",
				"ProjectM ",
				"Storm-0156 "
			],
			"source_name": "Secureworks:COPPER FIELDSTONE",
			"tools": [
				"CapraRAT",
				"Crimson RAT",
				"DarkComet",
				"ElizaRAT",
				"LuminosityLink",
				"ObliqueRAT",
				"Peppy",
				"njRAT"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "187a0668-a968-4cf0-8bfd-4bc97c02f6dc",
			"created_at": "2022-10-27T08:27:12.955905Z",
			"updated_at": "2026-04-10T02:00:05.376527Z",
			"deleted_at": null,
			"main_name": "SideCopy",
			"aliases": [
				"SideCopy"
			],
			"source_name": "MITRE:SideCopy",
			"tools": [
				"AuTo Stealer",
				"Action RAT"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "fce5181c-7aab-400f-bd03-9db9e791da04",
			"created_at": "2022-10-25T15:50:23.759799Z",
			"updated_at": "2026-04-10T02:00:05.3002Z",
			"deleted_at": null,
			"main_name": "Transparent Tribe",
			"aliases": [
				"Transparent Tribe",
				"COPPER FIELDSTONE",
				"APT36",
				"Mythic Leopard",
				"ProjectM"
			],
			"source_name": "MITRE:Transparent Tribe",
			"tools": [
				"DarkComet",
				"ObliqueRAT",
				"njRAT",
				"Peppy"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "02360638-1e6e-428e-8912-2ffeba84d6d4",
			"created_at": "2023-01-06T13:46:38.690458Z",
			"updated_at": "2026-04-10T02:00:03.069409Z",
			"deleted_at": null,
			"main_name": "ANDROMEDA SPIDER",
			"aliases": [],
			"source_name": "MISPGALAXY:ANDROMEDA SPIDER",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "a97cf06d-c2e2-4771-99a2-c9dee0d6a0ac",
			"created_at": "2022-10-25T16:07:24.349252Z",
			"updated_at": "2026-04-10T02:00:04.949821Z",
			"deleted_at": null,
			"main_name": "Turla",
			"aliases": [
				"ATK 13",
				"Belugasturgeon",
				"Blue Python",
				"CTG-8875",
				"G0010",
				"Group 88",
				"ITG12",
				"Iron Hunter",
				"Krypton",
				"Makersmark",
				"Operation Epic Turla",
				"Operation Moonlight Maze",
				"Operation Penguin Turla",
				"Operation Satellite Turla",
				"Operation Skipper Turla",
				"Operation Turla Mosquito",
				"Operation WITCHCOVEN",
				"Pacifier APT",
				"Pensive Ursa",
				"Popeye",
				"SIG15",
				"SIG2",
				"SIG23",
				"Secret Blizzard",
				"TAG-0530",
				"Turla",
				"UNC4210",
				"Venomous Bear",
				"Waterbug"
			],
			"source_name": "ETDA:Turla",
			"tools": [
				"ASPXSpy",
				"ASPXTool",
				"ATI-Agent",
				"AdobeARM",
				"Agent.BTZ",
				"Agent.DNE",
				"ApolloShadow",
				"BigBoss",
				"COMpfun",
				"Chinch",
				"Cloud Duke",
				"CloudDuke",
				"CloudLook",
				"Cobra Carbon System",
				"ComRAT",
				"DoublePulsar",
				"EmPyre",
				"EmpireProject",
				"Epic Turla",
				"EternalBlue",
				"EternalRomance",
				"GoldenSky",
				"Group Policy Results Tool",
				"HTML5 Encoding",
				"HyperStack",
				"IcedCoffee",
				"IronNetInjector",
				"KSL0T",
				"Kapushka",
				"Kazuar",
				"KopiLuwak",
				"Kotel",
				"LOLBAS",
				"LOLBins",
				"LightNeuron",
				"Living off the Land",
				"Maintools.js",
				"Metasploit",
				"Meterpreter",
				"MiamiBeach",
				"Mimikatz",
				"MiniDionis",
				"Minit",
				"NBTscan",
				"NETTRANS",
				"NETVulture",
				"Neptun",
				"NetFlash",
				"NewPass",
				"Outlook Backdoor",
				"Penquin Turla",
				"Pfinet",
				"PowerShell Empire",
				"PowerShellRunner",
				"PowerShellRunner-based RPC backdoor",
				"PowerStallion",
				"PsExec",
				"PyFlash",
				"QUIETCANARY",
				"Reductor RAT",
				"RocketMan",
				"SMBTouch",
				"SScan",
				"Satellite Turla",
				"SilentMoon",
				"Sun rootkit",
				"TTNG",
				"TadjMakhal",
				"Tavdig",
				"TinyTurla",
				"TinyTurla Next Generation",
				"TinyTurla-NG",
				"Topinambour",
				"Tunnus",
				"Turla",
				"Turla SilentMoon",
				"TurlaChopper",
				"Uroburos",
				"Urouros",
				"WCE",
				"WITCHCOVEN",
				"WhiteAtlas",
				"WhiteBear",
				"Windows Credential Editor",
				"Windows Credentials Editor",
				"Wipbot",
				"WorldCupSec",
				"XTRANS",
				"certutil",
				"certutil.exe",
				"gpresult",
				"nbtscan",
				"nbtstat",
				"pwdump"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "18278778-fa63-4a9a-8988-4d266b8c5c1a",
			"created_at": "2023-01-06T13:46:38.769816Z",
			"updated_at": "2026-04-10T02:00:03.094179Z",
			"deleted_at": null,
			"main_name": "The Gorgon Group",
			"aliases": [
				"Gorgon Group",
				"Subaat",
				"ATK92",
				"G0078",
				"Pasty Gemini"
			],
			"source_name": "MISPGALAXY:The Gorgon Group",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "97fdaf9f-cae1-4ccc-abe2-76e5cbc0febd",
			"created_at": "2022-10-25T15:50:23.296989Z",
			"updated_at": "2026-04-10T02:00:05.347085Z",
			"deleted_at": null,
			"main_name": "Gorgon Group",
			"aliases": [
				"Gorgon Group"
			],
			"source_name": "MITRE:Gorgon Group",
			"tools": [
				"NanoCore",
				"QuasarRAT",
				"Remcos",
				"njRAT"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "a4f0e383-f447-4cd6-80e3-ffc073ed4e00",
			"created_at": "2023-01-06T13:46:39.30167Z",
			"updated_at": "2026-04-10T02:00:03.280161Z",
			"deleted_at": null,
			"main_name": "SideCopy",
			"aliases": [],
			"source_name": "MISPGALAXY:SideCopy",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "a97fee0d-af4b-4661-ae17-858925438fc4",
			"created_at": "2023-01-06T13:46:38.396415Z",
			"updated_at": "2026-04-10T02:00:02.957137Z",
			"deleted_at": null,
			"main_name": "Turla",
			"aliases": [
				"TAG_0530",
				"Pacifier APT",
				"Blue Python",
				"UNC4210",
				"UAC-0003",
				"VENOMOUS Bear",
				"Waterbug",
				"Pfinet",
				"KRYPTON",
				"Popeye",
				"SIG23",
				"ATK13",
				"ITG12",
				"Group 88",
				"Uroburos",
				"Hippo Team",
				"IRON HUNTER",
				"MAKERSMARK",
				"Secret Blizzard",
				"UAC-0144",
				"UAC-0024",
				"G0010"
			],
			"source_name": "MISPGALAXY:Turla",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "d11c89bb-1640-45fa-8322-6f4e4053d7f3",
			"created_at": "2022-10-25T15:50:23.509601Z",
			"updated_at": "2026-04-10T02:00:05.277674Z",
			"deleted_at": null,
			"main_name": "Turla",
			"aliases": [
				"Turla",
				"IRON HUNTER",
				"Group 88",
				"Waterbug",
				"WhiteBear",
				"Krypton",
				"Venomous Bear",
				"Secret Blizzard",
				"BELUGASTURGEON"
			],
			"source_name": "MITRE:Turla",
			"tools": [
				"PsExec",
				"nbtstat",
				"ComRAT",
				"netstat",
				"certutil",
				"KOPILUWAK",
				"IronNetInjector",
				"LunarWeb",
				"Arp",
				"Uroburos",
				"PowerStallion",
				"Kazuar",
				"Systeminfo",
				"LightNeuron",
				"Mimikatz",
				"Tasklist",
				"LunarMail",
				"HyperStack",
				"NBTscan",
				"TinyTurla",
				"Penquin",
				"LunarLoader"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "b584b10a-7d54-4d05-9e21-b223563df7b8",
			"created_at": "2022-10-25T16:07:24.181589Z",
			"updated_at": "2026-04-10T02:00:04.892659Z",
			"deleted_at": null,
			"main_name": "SideCopy",
			"aliases": [
				"G1008",
				"Mocking Draco",
				"TAG-140",
				"UNC2269",
				"White Dev 55"
			],
			"source_name": "ETDA:SideCopy",
			"tools": [
				"ActionRAT",
				"AllaKore",
				"Allakore RAT",
				"AresRAT",
				"Bladabindi",
				"CetaRAT",
				"DetaRAT",
				"EpicenterRAT",
				"Jorik",
				"Lilith",
				"Lilith RAT",
				"MargulasRAT",
				"ReverseRAT",
				"njRAT"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "6c4e4b91-1f98-49e2-90e6-435cea8d3d53",
			"created_at": "2022-10-25T16:07:23.693797Z",
			"updated_at": "2026-04-10T02:00:04.711987Z",
			"deleted_at": null,
			"main_name": "Gorgon Group",
			"aliases": [
				"ATK 92",
				"G0078",
				"Pasty Draco",
				"Subaat",
				"TAG-CR5"
			],
			"source_name": "ETDA:Gorgon Group",
			"tools": [
				"AgenTesla",
				"Agent Tesla",
				"AgentTesla",
				"Atros2.CKPN",
				"Bladabindi",
				"CinaRAT",
				"Crimson RAT",
				"ForeIT",
				"Jorik",
				"LOLBAS",
				"LOLBins",
				"Living off the Land",
				"Loki",
				"Loki.Rat",
				"LokiBot",
				"LokiPWS",
				"MSIL",
				"MSIL/Crimson",
				"Nancrat",
				"NanoCore",
				"NanoCore RAT",
				"Negasteal",
				"NetWeird",
				"NetWire",
				"NetWire RAT",
				"NetWire RC",
				"NetWired RC",
				"Origin Logger",
				"Quasar RAT",
				"QuasarRAT",
				"Recam",
				"Remcos",
				"RemcosRAT",
				"Remvio",
				"Revenge RAT",
				"RevengeRAT",
				"Revetrat",
				"SEEDOOR",
				"Scarimson",
				"Socmer",
				"Yggdrasil",
				"ZPAQ",
				"Zurten",
				"njRAT"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "05dc568a-6039-476a-8175-a396cdc79fa7",
			"created_at": "2022-10-25T16:07:24.447328Z",
			"updated_at": "2026-04-10T02:00:04.995568Z",
			"deleted_at": null,
			"main_name": "Andromeda Spider",
			"aliases": [],
			"source_name": "ETDA:Andromeda Spider",
			"tools": [
				"Andromeda",
				"B106-Gamarue",
				"B67-SS-Gamarue",
				"Gamarue",
				"b66"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "abb24b7b-6baa-4070-9a2b-aa59091097d1",
			"created_at": "2022-10-25T16:07:24.339942Z",
			"updated_at": "2026-04-10T02:00:04.944806Z",
			"deleted_at": null,
			"main_name": "Transparent Tribe",
			"aliases": [
				"APT 36",
				"APT-C-56",
				"Copper Fieldstone",
				"Earth Karkaddan",
				"G0134",
				"Green Havildar",
				"Mythic Leopard",
				"Opaque Draco",
				"Operation C-Major",
				"Operation Honey Trap",
				"Operation Transparent Tribe",
				"ProjectM",
				"STEPPY-KAVACH",
				"Storm-0156",
				"TEMP.Lapis",
				"Transparent Tribe"
			],
			"source_name": "ETDA:Transparent Tribe",
			"tools": [
				"Amphibeon",
				"Android RAT",
				"Bezigate",
				"Bladabindi",
				"Bozok",
				"Bozok RAT",
				"BreachRAT",
				"Breut",
				"CapraRAT",
				"CinaRAT",
				"Crimson RAT",
				"DarkComet",
				"DarkKomet",
				"ElizaRAT",
				"FYNLOS",
				"Fynloski",
				"Jorik",
				"Krademok",
				"Limepad",
				"Luminosity RAT",
				"LuminosityLink",
				"MSIL",
				"MSIL/Crimson",
				"Mobzsar",
				"MumbaiDown",
				"Oblique RAT",
				"ObliqueRAT",
				"Peppy RAT",
				"Peppy Trojan",
				"Quasar RAT",
				"QuasarRAT",
				"SEEDOOR",
				"Scarimson",
				"SilentCMD",
				"Stealth Mango",
				"UPDATESEE",
				"USBWorm",
				"Waizsar RAT",
				"Yggdrasil",
				"beendoor",
				"klovbot",
				"njRAT"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "c68fa27f-e8d9-4932-856b-467ccfe39997",
			"created_at": "2023-01-06T13:46:38.450585Z",
			"updated_at": "2026-04-10T02:00:02.980334Z",
			"deleted_at": null,
			"main_name": "Operation C-Major",
			"aliases": [
				"APT36",
				"APT 36",
				"TMP.Lapis",
				"COPPER FIELDSTONE",
				"Storm-0156",
				"Transparent Tribe",
				"ProjectM",
				"Green Havildar",
				"Earth Karkaddan",
				"C-Major",
				"Mythic Leopard"
			],
			"source_name": "MISPGALAXY:Operation C-Major",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434251,
	"ts_updated_at": 1775792210,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/0055ea5e8c14f729a988b9d97e5d98559bc531d3.pdf",
		"text": "https://archive.orkl.eu/0055ea5e8c14f729a988b9d97e5d98559bc531d3.txt",
		"img": "https://archive.orkl.eu/0055ea5e8c14f729a988b9d97e5d98559bc531d3.jpg"
	}
}