{
	"id": "70b22041-0a5e-438d-a596-778add08c1c2",
	"created_at": "2026-04-06T00:19:03.931098Z",
	"updated_at": "2026-04-10T03:38:09.877164Z",
	"deleted_at": null,
	"sha1_hash": "2ae6cbde95649e0801dd28792c2435ec1635f3c5",
	"title": "南亚APT组织“透明部落”在移动端上与对手的较量",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 2523921,
	"plain_text": "南亚APT组织“透明部落”在移动端上与对手的较量\r\nBy 奇安信威胁情报中心\r\nArchived: 2026-04-05 15:44:08 UTC\r\n概述\r\n2020年8月，奇安信威胁情报中心移动安全团队在日常的威胁分析运营过程中，捕获到Android平台上一款\r\n新型的恶意RAT，基于该家族C2的特点，我们将其命名为Tahorse。Tahorse RAT携带有Ahmyth开源远控新\r\n变种子包及qu1ckr00开源项目中利用CVE-2019-2215漏洞的ELF模块，并针对中国数款主流品牌国产手机\r\n进行了定制，这类新活动引起了我们的关注。\r\n2019年9月，Google公司Project Zero小组发现并提交了CVE-2019-2215漏洞。该漏洞是存在于Android\r\nBinder组件中的UAF漏洞，可被利用来提升权限到root级别。2020年1月，趋势科技安全厂商发布报告披露\r\n南亚“响尾蛇”（SideWinder）APT组织利用该漏洞进行开展移动端上的在野攻击。\r\n经关联分析，此次攻击活动一共涉及Android平台攻击样本41个，Windows平台攻击样本9个， C2域名4\r\n个。其中通过关联到的Windows平台攻击样本相关信息表明，此次攻击活动与南亚“透明部落”\r\n（Transparent Tribe）APT组织相关。\r\n“透明部落”是一个南亚来源具有政府背景的APT组织，其长期针对周边国家和地区的军队和政府机构实施\r\n定向攻击，其和南亚“响尾蛇”APT组织属于两个相互 “敌对”的APT组织。有趣的是在趋势科技披露“响尾\r\n蛇”使用了CVE-2019-2215后的第二个月， “透明部落”也开始了对CVE-2019-2215的使用，这或许不是一种\r\n巧合，更像是一种回应。为了防止威胁的进一步扩散，奇安信威胁情报中心对该安全事件进行详细分析\r\n和披露，以提醒各安全厂商第一时间关注相关的攻击事件。\r\n载荷投递方式\r\n奇安信威胁情报中心通过追踪分析后发现：在2020年1月，奇安信威胁分析平台（https://ti.qianxin.com）\r\n显示攻击者采用邮箱 hunterbluff007@gmail.com注册了两个相似钓鱼域名，为载荷投递攻击提前做准备。\r\n且投递攻击不仅针对Windows平台，也针对Android平台。\r\nhttps://www.secrss.com/articles/24995\r\nPage 1 of 15\n\nAndroid平台\r\n目前Android上仅发现到一个历史传播载荷服务器，可惜现已失效。结合发现到的下载地址及扩展到的\r\nTahorse RAT样本信息分析，奇安信威胁情报中心推测攻击方主要采用色情相关话术进行诱导下载的投递\r\n方式。\r\nWindows平台\r\nWindows上的投递情况和奇安信威胁情报中心此前发布的报告《南亚APT组织“透明部落”借新冠肺炎针对\r\n周边国家和地区的攻击活动分析》投递方式有重叠，均是采用定向投递文档的方式，有所不同的是此次\r\n发现投递环节多采用了一层诱饵文档------首层无恶意功能的纯诱饵文档。\r\n1、首层诱饵文档\r\nhttps://www.secrss.com/articles/24995\r\nPage 2 of 15\n\n攻击者先采用定向投递首层诱饵文档方式，来诱导受害目标用户去下载真正的包含恶意宏代码的第二层\r\n诱饵文档。目前捕获到的首层诱饵文档均是与印度军队相关，目标比较明确。\r\n文件名\r\nCLAWS COAS CHAIR OF\r\nEXCELLENCE.docx\r\n文件名 Special Benefits.docx\r\nMD5 3576287635973a9d988de046e4aa4e0a MD5 15da10765b7becfcca3325a91d90db37\r\n文档目\r\n的\r\n仅诱导下载 文档目\r\n的\r\n仅诱导下载\r\n诱饵 印度陆战研究中心主席相关（参见下图\r\n左）\r\n诱饵 印度军队福利相关（参见下图右）\r\n2、第二层诱饵文档\r\n通过首层诱饵诱导下载到的三个相关的第二层诱饵文档，在追踪过程中，我们发现到其中两个已被今年3\r\n月奇安信威胁情报中心发布的报告《南亚APT组织“透明部落”借新冠肺炎针对周边国家和地区的攻击活动\r\n分析》所披露。由于手法一致，故此我们就不再展开分析，感兴趣的可以参阅此前的报告。\r\nhttps://www.secrss.com/articles/24995\r\nPage 3 of 15\n\n攻击样本分析\r\n“透明部落”组织在Windows平台上采用的RAT历史已有多家安全厂商披露过，其主要采用Crimson RAT及\r\nOblique RAT，此次发现到的亦是，故在此不再重复展开分析。需要注意的是此次捕获到的Android平台上\r\n的Tahorse RAT。\r\nTahorse RAT远控主体采用的是开源项目AhMyth-Android-RAT远控变种子包。该远控功能强大，可以获取\r\n通话记录、拍照、获取联系人、管理文件、获取定位信息、窃取并发送短信。攻击者可以根据自身能力\r\n扩展更丰富的监控功能，且可以在PC上便捷的对受害用户手机进行远程操控。\r\nhttps://www.secrss.com/articles/24995\r\nPage 4 of 15\n\nTahorse\r\nTahorse一旦启动，会释放资源文件res/raw/poc1，这个资源文件是qu1ckr00开源项目中利用CVE-2019-2215\r\n漏洞的ELF模块，进行调用执行可提权到root权限。不过目前尚未发现到该家族使用root权限执行后续命\r\n令的操作，猜测可能是在攻击后期进行。\r\nhttps://www.secrss.com/articles/24995\r\nPage 5 of 15\n\n启动2.5秒后，便会释放assets里面的AhMyth-Android-RAT远控变种APK子包，诱导目标用户进行安装运\r\n行，子包一旦运行后，便可实现后续的恶意远控功能。\r\nhttps://www.secrss.com/articles/24995\r\nPage 6 of 15\n\n需要注意的是这些子包名字伪装成viber等几款社交的名字，而这些应用正好出现在今年7月被印度陆军禁\r\n用的名单列表里。\r\nAhMyth-Android-RAT远控变种APK子包在启动后，为躲避安全检测，检测到模拟器就不执行，否则就开\r\n始进行后台白名单保活，隐藏自身图标，并开启一个唤醒远控的service。\r\nhttps://www.secrss.com/articles/24995\r\nPage 7 of 15\n\n开启的service会打开另外一个service用于实现远控操作。\r\nhttps://www.secrss.com/articles/24995\r\nPage 8 of 15\n\n经过对远控功能的分析，确定该远控子包本质使用的是开源项目AhMyth-Android-RAT远控项目。\r\nhttps://www.secrss.com/articles/24995\r\nPage 9 of 15\n\n有趣的是，我们在分析过程中发现到远控子包样本针对了中国数款主流品牌国产手机，在后期甚至引入\r\n了开源项目AutoStarter对国内更多主流品牌手机进行了定制优化。\r\nhttps://www.secrss.com/articles/24995\r\nPage 10 of 15\n\n通过互联网数据，我们发现到这些手机品牌正好符合印度国家当下的头部手机品牌，这也间接看出来攻\r\n击者的攻击目标非常明确。\r\n攻击组织溯源\r\n基于奇安信威胁情报中心移动安全团队的分析系统和红雨滴APT样本关联系统的追踪分析，奇安信威胁情\r\n报中心判断本次攻击活动的幕后黑手疑似为Transparent Tribe。主要依据如下：\r\n（1） PC端上的诱饵文档针对的目标是印度陆军，且部分文档之前已被披露过和Transparent Tribe有关。\r\nhttps://www.secrss.com/articles/24995\r\nPage 11 of 15\n\n（2） 移动端上的攻击样本针对的手机品牌符合当下印度国家的头部使用手机品牌。\r\n（3） 移动端上使用的远控子包，其伪装成的多个社交名字均出现在不久前印度陆军禁用的应用列表中，\r\n和PC端的针对目标正好保持一致。\r\n总结\r\n网络钓鱼可谓老生常谈，却仍是攻击者屡试不爽的惯用手法，最有效的武器。随着时间的推移，钓鱼攻\r\n击有增无减。应对这些攻击不仅需要安全厂商的各类安全产品的防护和到位的安全服务支持，更离不开\r\n企业对内部自身安全规程及企业内部员工安全防范意识的持续建设。务必确保企业员工拥有良好的安全\r\n防范意识，严格遵守内部的安全规程，并安装上必要的官方来源安全防护软件，做到个人敏感隐私数据\r\n不在公开的社交媒体平台上或者甚至不公开，不轻易点击或者接收其他人发来的图片、视频及链接等，\r\n不轻易扫描接收到的“二维码”!\r\n近几年，随着物联网时代的蓬勃发展，我们看到绝大多数攻击组织已经从传统PC扩展到时下热门的各类\r\n物联设备上，尤其是移动端上。但除已经相对成熟的PC端外，当下其他物联网设备的安全防护离PC端还\r\n有不小的差距。比如绝大数移动端上的攻击活动发现往往是通过PC上的攻击追踪扩展后发现到的。我们\r\n相信随着这些攻击带来的影响，及不同阶段的热门物联设备的发展，包含移动端的各种热门物联设备的\r\n安全建设也会是安全厂商致力发展涵盖的安全领域。作为安全厂商做到并做好安全产品涵盖全、安全问\r\n题发现快、安全服务好是本职；做好保障住国家安全、用户生命财产安全及数据安全是使命。\r\n奇安信威胁情报中心移动安全团队一直致力移动安全领域及Android安全生态的研究。目前，奇安信的移\r\n动安全产品除了可以查杀常见的移动端病毒木马，也可以精准查杀时下流行的刷量、诈骗、博彩、违\r\n规、色情等黑产类软件。我们也在今年年初发布了2019年移动安全总结报告，详细描述了2019年国内外\r\n的移动安全事件、威胁活动以及奇安信内部跟踪的移动安全攻击事件和APT攻击活动，对2019年移动互联\r\n网安全进行了详细总结。未来我们还会持续走在全球移动安全研究的前沿，第一时间追踪分析最新的移\r\n动安全事件、对国内移动相关的黑灰产攻击进行深入挖掘和跟踪，为维护我国网络安全砥砺前行。\r\n附录\r\nIOC\r\nAPK MD5\r\n04a6a6bb92be95f59ffc8b8a0b522571\r\n0294f46d0e8cb5377f97b49ea3593c25\r\n1c25ceee18f3813d78d5ef817005ede2\r\n216dc32c48cbea14e7af1e60085a6c66\r\n2ffd4f2ab4f00c78ef2661690fe349c9\r\n4136a0b56c635095d378d01828a79f85\r\n4ae2680320e8c0d2c202cd81eb5a220f\r\nhttps://www.secrss.com/articles/24995\r\nPage 12 of 15\n\nd8fd669eecaf6577994e4e4e99204527\r\n111d61aa7ebb22d3037465d515949479\r\n14c8e5ababe443e5bee69e713befbf21\r\n197ab57347843b00c8d9c23d695c5904\r\n1ef033bfd65a3eabe177c766940ae07c\r\n239df9a3257e0c432108b7532e7b10b7\r\n308ac61ecb808fae3698d8c1285d419e\r\n3117580ca2929da80150acd069cde4ab\r\n3eb36a9853c9c68524dbe8c44734ec35\r\n4556ccecbf24b2e3e07d3856f42c7072\r\n53cd72147b0ef6bf6e64d266bf3ccafe\r\n627aa2f8a8fc2787b783e64c8c57b0ed\r\n62fad3ac69db0e8e541efa2f479618ce\r\n6774b46183515353179a8455fefc9bf1\r\n67dc69a16ba744fc0fa2206a6ef1d10a\r\n681ff974adb54692e61551f9640f76bf\r\n6c3308cd8a060327d841626a677a0549\r\n752558e6386d5e512efb3d1288f3910d\r\n931435cb8a5b2542f8e5f29fd369e010\r\na09f4199a047e1ae5cf5728fbfc90831\r\na20fc273a49c3b882845ac8d6cc5beac\r\na7b7d3cfdcf975f296cf69d919dcffe3\r\na912e5967261656457fd076986bb327c\r\nb38991bd56d4d82c9c3bf5546bca3f2f\r\nb8006e986453a6f25fd94db6b7114ac2\r\nb955782e0bf948c4dcf77c60d1793d8d\r\nbace8f757b7b53980798f9920f0ea615\r\nhttps://www.secrss.com/articles/24995\r\nPage 13 of 15\n\nbae69f2ce9f002a11238dcf29101c14f\r\nbc97f303a61ea390c5fdb29f21785ba2\r\ncf71ba878434605a3506203829c63b9d\r\ne98ea14133925d26a5c34b8c0bd9fd49\r\nf1779d846f52e1aac07c19b46dc439c9\r\nfc155137f3de70071d7d0d80695febd0\r\nfcae3ba377548c4aab46f3e8ccbf4f1c\r\nC2 C2对应ip\r\ntryanotherhorse.com 185.165.168.35\r\n212.8.240.221\r\n185.117.73.222\r\n198.46.177.73\r\nEmail Domain\r\nhunterbluff007@gmail.com sharemydrives.com\r\nsharingmymedia.com\r\nPC MD5\r\nd7d6889bfa96724f7b3f951bc06e8c02\r\n3f39c1b5cd9ef1cfd0e3776c9d9af9d5\r\n48476da4403243b342a166d8a6be7a3f\r\n5308fba9ae4cf2c5e551ab02bae539ba\r\nb3f8eee133ae385d9c7655aae033ca3e\r\n36903d471c43b5d602aefd791e25c889\r\n5308aacaa532afd76767bb6dbece3d10\r\nbe3d0049549a00e5b99aeeb55e82e9b5\r\n529768c243e5e385d9563d332f2d6b8f\r\n参考信息\r\nhttps://www.secrss.com/articles/24995\r\nPage 14 of 15\n\n1. https://ti.qianxin.com/blog/articles/analysis-of-apt-attack-activities-in-neighboring-countries-and-regions/\r\n2. https://blog.trendmicro.com/trendlabs-security-intelligence/first-active-attack-exploiting-cve-2019-2215-\r\nfound-on-google-play-linked-to-sidewinder-apt-group/\r\n3. https://bugs.chromium.org/p/project-zero/issues/detail?id=1942\r\n4. https://bugs.chromium.org/p/project-zero/issues/attachmentText?aid=414885\r\n5. https://github.com/grant-h/qu1ckr00t\r\n6. https://github.com/AhMyth/AhMyth-Android-RAT\r\n7. https://www.counterpointresearch.com/zh-hans/india-smartphone-share/\r\n8. https://github.com/judemanutd/AutoStarter\r\n声明：本文来自奇安信威胁情报中心，版权归作者所有。文章内容仅代表作者独立观点，不代表安全内\r\n参立场，转载目的在于传递更多信息。如有侵权，请联系 anquanneican@163.com。\r\nSource: https://www.secrss.com/articles/24995\r\nhttps://www.secrss.com/articles/24995\r\nPage 15 of 15",
	"extraction_quality": 1,
	"language": "ZH",
	"sources": [
		"ETDA",
		"Malpedia"
	],
	"references": [
		"https://www.secrss.com/articles/24995"
	],
	"report_names": [
		"24995"
	],
	"threat_actors": [
		{
			"id": "fce5181c-7aab-400f-bd03-9db9e791da04",
			"created_at": "2022-10-25T15:50:23.759799Z",
			"updated_at": "2026-04-10T02:00:05.3002Z",
			"deleted_at": null,
			"main_name": "Transparent Tribe",
			"aliases": [
				"Transparent Tribe",
				"COPPER FIELDSTONE",
				"APT36",
				"Mythic Leopard",
				"ProjectM"
			],
			"source_name": "MITRE:Transparent Tribe",
			"tools": [
				"DarkComet",
				"ObliqueRAT",
				"njRAT",
				"Peppy"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "9f101d9c-05ea-48b9-b6f1-168cd6d06d12",
			"created_at": "2023-01-06T13:46:39.396409Z",
			"updated_at": "2026-04-10T02:00:03.312816Z",
			"deleted_at": null,
			"main_name": "Earth Lusca",
			"aliases": [
				"CHROMIUM",
				"ControlX",
				"TAG-22",
				"BRONZE UNIVERSITY",
				"AQUATIC PANDA",
				"RedHotel",
				"Charcoal Typhoon",
				"Red Scylla",
				"Red Dev 10",
				"BountyGlad"
			],
			"source_name": "MISPGALAXY:Earth Lusca",
			"tools": [
				"RouterGod",
				"SprySOCKS",
				"ShadowPad",
				"POISONPLUG",
				"Barlaiy",
				"Spyder",
				"FunnySwitch"
			],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "cf7fc640-acfe-41c4-9f3d-5515d53a3ffb",
			"created_at": "2023-01-06T13:46:38.228042Z",
			"updated_at": "2026-04-10T02:00:02.883048Z",
			"deleted_at": null,
			"main_name": "APT1",
			"aliases": [
				"PLA Unit 61398",
				"Comment Crew",
				"Byzantine Candor",
				"Comment Group",
				"GIF89a",
				"Group 3",
				"TG-8223",
				"Brown Fox",
				"ShadyRAT",
				"G0006",
				"COMMENT PANDA"
			],
			"source_name": "MISPGALAXY:APT1",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "d0c0a5ea-3066-42a5-846c-b13527f64a3e",
			"created_at": "2023-01-06T13:46:39.080551Z",
			"updated_at": "2026-04-10T02:00:03.206572Z",
			"deleted_at": null,
			"main_name": "RAZOR TIGER",
			"aliases": [
				"APT-C-17",
				"T-APT-04",
				"SideWinder"
			],
			"source_name": "MISPGALAXY:RAZOR TIGER",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "18a7b52d-a1cd-43a3-8982-7324e3e676b7",
			"created_at": "2025-08-07T02:03:24.688416Z",
			"updated_at": "2026-04-10T02:00:03.734754Z",
			"deleted_at": null,
			"main_name": "BRONZE UNIVERSITY",
			"aliases": [
				"Aquatic Panda",
				"Aquatic Panda ",
				"CHROMIUM",
				"CHROMIUM ",
				"Charcoal Typhoon",
				"Charcoal Typhoon ",
				"Earth Lusca",
				"Earth Lusca ",
				"FISHMONGER ",
				"Red Dev 10",
				"Red Dev 10 ",
				"Red Scylla",
				"Red Scylla ",
				"RedHotel",
				"RedHotel ",
				"Tag-22",
				"Tag-22 "
			],
			"source_name": "Secureworks:BRONZE UNIVERSITY",
			"tools": [
				"Cobalt Strike",
				"Fishmaster",
				"FunnySwitch",
				"Spyder",
				"njRAT"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "6b9fc913-06c6-4432-8c58-86a3ac614564",
			"created_at": "2022-10-25T16:07:24.185236Z",
			"updated_at": "2026-04-10T02:00:04.893541Z",
			"deleted_at": null,
			"main_name": "SideWinder",
			"aliases": [
				"APT-C-17",
				"APT-Q-39",
				"BabyElephant",
				"G0121",
				"GroupA21",
				"HN2",
				"Hardcore Nationalist",
				"Rattlesnake",
				"Razor Tiger",
				"SideWinder",
				"T-APT-04"
			],
			"source_name": "ETDA:SideWinder",
			"tools": [
				"BroStealer",
				"Capriccio RAT",
				"callCam"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "6abcc917-035c-4e9b-a53f-eaee636749c3",
			"created_at": "2022-10-25T16:07:23.565337Z",
			"updated_at": "2026-04-10T02:00:04.668393Z",
			"deleted_at": null,
			"main_name": "Earth Lusca",
			"aliases": [
				"Bronze University",
				"Charcoal Typhoon",
				"Chromium",
				"G1006",
				"Red Dev 10",
				"Red Scylla"
			],
			"source_name": "ETDA:Earth Lusca",
			"tools": [
				"Agentemis",
				"AntSword",
				"BIOPASS",
				"BIOPASS RAT",
				"BadPotato",
				"Behinder",
				"BleDoor",
				"Cobalt Strike",
				"CobaltStrike",
				"Doraemon",
				"FRP",
				"Fast Reverse Proxy",
				"FunnySwitch",
				"HUC Port Banner Scanner",
				"KTLVdoor",
				"Mimikatz",
				"NBTscan",
				"POISONPLUG.SHADOW",
				"PipeMon",
				"RbDoor",
				"RibDoor",
				"RouterGod",
				"SAMRID",
				"ShadowPad Winnti",
				"SprySOCKS",
				"WinRAR",
				"Winnti",
				"XShellGhost",
				"cobeacon",
				"fscan",
				"lcx",
				"nbtscan"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "abb24b7b-6baa-4070-9a2b-aa59091097d1",
			"created_at": "2022-10-25T16:07:24.339942Z",
			"updated_at": "2026-04-10T02:00:04.944806Z",
			"deleted_at": null,
			"main_name": "Transparent Tribe",
			"aliases": [
				"APT 36",
				"APT-C-56",
				"Copper Fieldstone",
				"Earth Karkaddan",
				"G0134",
				"Green Havildar",
				"Mythic Leopard",
				"Opaque Draco",
				"Operation C-Major",
				"Operation Honey Trap",
				"Operation Transparent Tribe",
				"ProjectM",
				"STEPPY-KAVACH",
				"Storm-0156",
				"TEMP.Lapis",
				"Transparent Tribe"
			],
			"source_name": "ETDA:Transparent Tribe",
			"tools": [
				"Amphibeon",
				"Android RAT",
				"Bezigate",
				"Bladabindi",
				"Bozok",
				"Bozok RAT",
				"BreachRAT",
				"Breut",
				"CapraRAT",
				"CinaRAT",
				"Crimson RAT",
				"DarkComet",
				"DarkKomet",
				"ElizaRAT",
				"FYNLOS",
				"Fynloski",
				"Jorik",
				"Krademok",
				"Limepad",
				"Luminosity RAT",
				"LuminosityLink",
				"MSIL",
				"MSIL/Crimson",
				"Mobzsar",
				"MumbaiDown",
				"Oblique RAT",
				"ObliqueRAT",
				"Peppy RAT",
				"Peppy Trojan",
				"Quasar RAT",
				"QuasarRAT",
				"SEEDOOR",
				"Scarimson",
				"SilentCMD",
				"Stealth Mango",
				"UPDATESEE",
				"USBWorm",
				"Waizsar RAT",
				"Yggdrasil",
				"beendoor",
				"klovbot",
				"njRAT"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "c68fa27f-e8d9-4932-856b-467ccfe39997",
			"created_at": "2023-01-06T13:46:38.450585Z",
			"updated_at": "2026-04-10T02:00:02.980334Z",
			"deleted_at": null,
			"main_name": "Operation C-Major",
			"aliases": [
				"APT36",
				"APT 36",
				"TMP.Lapis",
				"COPPER FIELDSTONE",
				"Storm-0156",
				"Transparent Tribe",
				"ProjectM",
				"Green Havildar",
				"Earth Karkaddan",
				"C-Major",
				"Mythic Leopard"
			],
			"source_name": "MISPGALAXY:Operation C-Major",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "d53593c3-2819-4af3-bf16-0c39edc64920",
			"created_at": "2022-10-27T08:27:13.212301Z",
			"updated_at": "2026-04-10T02:00:05.272802Z",
			"deleted_at": null,
			"main_name": "Earth Lusca",
			"aliases": [
				"Earth Lusca",
				"TAG-22",
				"Charcoal Typhoon",
				"CHROMIUM",
				"ControlX"
			],
			"source_name": "MITRE:Earth Lusca",
			"tools": [
				"Mimikatz",
				"PowerSploit",
				"Tasklist",
				"certutil",
				"Cobalt Strike",
				"Winnti for Linux",
				"Nltest",
				"NBTscan",
				"ShadowPad"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "173f1641-36e3-4bce-9834-c5372468b4f7",
			"created_at": "2022-10-25T15:50:23.349637Z",
			"updated_at": "2026-04-10T02:00:05.3486Z",
			"deleted_at": null,
			"main_name": "Sidewinder",
			"aliases": [
				"Sidewinder",
				"T-APT-04"
			],
			"source_name": "MITRE:Sidewinder",
			"tools": [
				"Koadic"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "3aaf0755-5c9b-4612-9f0e-e266ef1bdb4b",
			"created_at": "2022-10-25T16:07:23.480196Z",
			"updated_at": "2026-04-10T02:00:04.626125Z",
			"deleted_at": null,
			"main_name": "Comment Crew",
			"aliases": [
				"APT 1",
				"BrownFox",
				"Byzantine Candor",
				"Byzantine Hades",
				"Comment Crew",
				"Comment Panda",
				"G0006",
				"GIF89a",
				"Group 3",
				"Operation Oceansalt",
				"Operation Seasalt",
				"Operation Siesta",
				"Shanghai Group",
				"TG-8223"
			],
			"source_name": "ETDA:Comment Crew",
			"tools": [
				"Auriga",
				"Cachedump",
				"Chymine",
				"CookieBag",
				"Darkmoon",
				"GDOCUPLOAD",
				"GLOOXMAIL",
				"GREENCAT",
				"Gen:Trojan.Heur.PT",
				"GetMail",
				"Hackfase",
				"Hacksfase",
				"Helauto",
				"Kurton",
				"LETSGO",
				"LIGHTBOLT",
				"LIGHTDART",
				"LOLBAS",
				"LOLBins",
				"LONGRUN",
				"Living off the Land",
				"Lslsass",
				"MAPIget",
				"ManItsMe",
				"Mimikatz",
				"MiniASP",
				"Oceansalt",
				"Pass-The-Hash Toolkit",
				"Poison Ivy",
				"ProcDump",
				"Riodrv",
				"SPIVY",
				"Seasalt",
				"ShadyRAT",
				"StarsyPound",
				"TROJAN.COOKIES",
				"TROJAN.FOXY",
				"TabMsgSQL",
				"Tarsip",
				"Trojan.GTALK",
				"WebC2",
				"WebC2-AdSpace",
				"WebC2-Ausov",
				"WebC2-Bolid",
				"WebC2-Cson",
				"WebC2-DIV",
				"WebC2-GreenCat",
				"WebC2-Head",
				"WebC2-Kt3",
				"WebC2-Qbp",
				"WebC2-Rave",
				"WebC2-Table",
				"WebC2-UGX",
				"WebC2-Yahoo",
				"Wordpress Bruteforcer",
				"bangat",
				"gsecdump",
				"pivy",
				"poisonivy",
				"pwdump",
				"zxdosml"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434743,
	"ts_updated_at": 1775792289,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/2ae6cbde95649e0801dd28792c2435ec1635f3c5.pdf",
		"text": "https://archive.orkl.eu/2ae6cbde95649e0801dd28792c2435ec1635f3c5.txt",
		"img": "https://archive.orkl.eu/2ae6cbde95649e0801dd28792c2435ec1635f3c5.jpg"
	}
}