I'd like to introduce about a process to name APT group name or campaign name with concrete example of the feature obtained by malware analysis and the like.
case is majority – After extracting the compressed file, if it exists separately • Font – Display font of decoy file • Simsun font used on Emdivi's decoy file
in the spreading mail • Procurement faction – In many cases, files that have been published – Although some case are cross off docs, but it's public file. • Earnest faction – Obtained file at intrusion • This file turns out intrusion and information leakage
a vulnerability found(release) – Vulnerability of Ichitaro • Clearly, target to Japan • Original User Agent (Ref.)http://d.hatena.ne.jp/Kango/20141113/1415901362
– Which service? – AVTOKYO 2015 • Collecting information of targeted attacks by OSINT • Language information • Compiled date – We can see trend but hard to recognize time zone
Japan • Version – t17:Used in targeted mail – t20:Used after intrusion – From around t17.08.23 – Campaign name or Attack target + Attack date • Let's see about some Emdivi we can get it online
aviation, railway, power supply, gas, government services ,health care ,water supply, logistics, chemical, credit, oil • Other・・・ – Small and medium sized enterprises – University (Ref.)http://www.nisc.go.jp/active/infra/outline.html
is relatively easy to define name by it. – However, once define malware name,It will be confusing future • Since the consolidation of the attacker group name is common ,let's name for the time being. • Easy to define campaign name – Add name with characteristics of the attack for now
that US Air Force of the intelligence agencies had been using • APT1 • People's Liberation Army General Staff Department Part 3 second station – PLA Unit 61398 – Specific locations (Shanghai Pudong New Area) And, it is
– Russia • Kitten Series – Iran – Cat is a revered animal in Islam • Tiger Series – India – National animal:Bengal tiger • Chollima – North Korea – Cheollima (千里馬) is a symbol of socialism
as easy to uderstand • Trying to unify the rules of name – Already decided naming rule like Panda blah blah • Let's make a catchy name – Easy to image by icons
type To mail address Link to online strage service Malware type Domain name to connect Sender IP address Suspicious mail common point ※ line is rerated to
6,788,443 people • Possibly aiming on 3 days off • Attacks using Elirks – Case of Elirks(Attack on Taiwan) (Ref)https://media.blackhat.com/us-13/US-13-Yarochkin- In-Depth-Analysis-of-Escalated-APT-Attacks-Slides.pdf • May related to Ise-Shima summit (Ref.)http://csirt.ninja/?p=772 Convert to IP addr , and connect