{
	"id": "151abeae-9efb-445d-b5cd-9a37cf084a36",
	"created_at": "2026-04-06T00:07:16.780885Z",
	"updated_at": "2026-04-10T13:12:03.146709Z",
	"deleted_at": null,
	"sha1_hash": "13eb065f3102569fbe1bcac2cd9ec2d0915163e6",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 48431,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\r\nArchived: 2026-04-05 16:35:23 UTC\r\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool Tcp_transfer\r\n Tool: Tcp_transfer\r\nNames Tcp_transfer\r\nCategory Malware\r\nType Tunneling\r\nDescription\r\n(Bitdefender) The executable binds to “0.0.0.0:8080’ address and starts listening for local\r\nconnection. For each incoming connection on the local address, it creates a new connection to\r\nthe C\u0026C and start receiving and sending the data.\r\nThe goal of such tool is to bypass network restriction such that the compromised machines that\r\nare not connected directly to the internet can communicate with the C\u0026C through another\r\ncompromised machine that has an internet connection.\r\nInformation\r\n\u003chttps://www.bitdefender.com/files/News/CaseStudies/study/379/Bitdefender-Whitepaper-Chinese-APT.pdf\u003e\r\nLast change to this tool card: 06 January 2021\r\nDownload this tool card in JSON format\r\nAll groups using tool Tcp_transfer\r\nChanged Name Country Observed\r\nAPT groups\r\n  FunnyDream 2018  \r\n1 group listed (1 APT, 0 other, 0 unknown)\r\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=c15386a1-c3f9-4c8b-ac4d-47588edbef70\r\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=c15386a1-c3f9-4c8b-ac4d-47588edbef70\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=c15386a1-c3f9-4c8b-ac4d-47588edbef70"
	],
	"report_names": [
		"listgroups.cgi?u=c15386a1-c3f9-4c8b-ac4d-47588edbef70"
	],
	"threat_actors": [
		{
			"id": "b98eb1ec-dc8b-4aea-b112-9e485408dd14",
			"created_at": "2022-10-25T16:07:23.649308Z",
			"updated_at": "2026-04-10T02:00:04.701157Z",
			"deleted_at": null,
			"main_name": "FunnyDream",
			"aliases": [
				"Bronze Edgewood",
				"Red Hariasa",
				"TAG-16"
			],
			"source_name": "ETDA:FunnyDream",
			"tools": [
				"Chinoxy",
				"Filepak",
				"FilepakMonitor",
				"FunnyDream",
				"Keyrecord",
				"LOLBAS",
				"LOLBins",
				"Living off the Land",
				"Md_client",
				"PCShare",
				"ScreenCap",
				"TcpBridge",
				"Tcp_transfer",
				"ccf32"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434036,
	"ts_updated_at": 1775826723,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/13eb065f3102569fbe1bcac2cd9ec2d0915163e6.pdf",
		"text": "https://archive.orkl.eu/13eb065f3102569fbe1bcac2cd9ec2d0915163e6.txt",
		"img": "https://archive.orkl.eu/13eb065f3102569fbe1bcac2cd9ec2d0915163e6.jpg"
	}
}