{
	"id": "56cf64e3-44be-49b7-9c94-1f86a1da1267",
	"created_at": "2026-04-06T03:37:10.462105Z",
	"updated_at": "2026-04-10T13:12:38.075622Z",
	"deleted_at": null,
	"sha1_hash": "e919e7b91b2e019edfc258ebc14357905ca0ce31",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 49499,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-06 03:09:20 UTC\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool yty\n Tool: yty\nNames\nyty\nJaca\nCategory Malware\nType Backdoor, Keylogger, Info stealer\nDescription\nyty is a modular, plugin-based malware framework. The components of the framework\nare written in a variety of programming languages.\nInformation\nMITRE ATT\u0026CK Malpedia Last change to this tool card: 12 September 2022\nDownload this tool card in JSON format\nAll groups using tool yty\nChanged Name Country Observed\nAPT groups\n Donot Team 2016-Oct 2024\n1 group listed (1 APT, 0 other, 0 unknown)\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=89e8151b-8183-4eb7-b3f8-de7afa31f378\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=89e8151b-8183-4eb7-b3f8-de7afa31f378\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=89e8151b-8183-4eb7-b3f8-de7afa31f378"
	],
	"report_names": [
		"listgroups.cgi?u=89e8151b-8183-4eb7-b3f8-de7afa31f378"
	],
	"threat_actors": [
		{
			"id": "2ac63ef4-a7b8-4a30-96ad-b30ccb2073fc",
			"created_at": "2022-10-25T16:07:23.546262Z",
			"updated_at": "2026-04-10T02:00:04.651083Z",
			"deleted_at": null,
			"main_name": "Donot Team",
			"aliases": [
				"APT-C-35",
				"Mint Tempest",
				"Origami Elephant",
				"SectorE02"
			],
			"source_name": "ETDA:Donot Team",
			"tools": [
				"BackConfig",
				"EHDevel",
				"Jaca",
				"yty"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "cfdd350b-de30-4d29-bbee-28159f26c8c2",
			"created_at": "2023-01-06T13:46:38.433736Z",
			"updated_at": "2026-04-10T02:00:02.972971Z",
			"deleted_at": null,
			"main_name": "VICEROY TIGER",
			"aliases": [
				"OPERATION HANGOVER",
				"Donot Team",
				"APT-C-35",
				"SectorE02",
				"Orange Kala"
			],
			"source_name": "MISPGALAXY:VICEROY TIGER",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775446630,
	"ts_updated_at": 1775826758,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/e919e7b91b2e019edfc258ebc14357905ca0ce31.pdf",
		"text": "https://archive.orkl.eu/e919e7b91b2e019edfc258ebc14357905ca0ce31.txt",
		"img": "https://archive.orkl.eu/e919e7b91b2e019edfc258ebc14357905ca0ce31.jpg"
	}
}