Transparent Tribe is a suspected Pakistan-based threat group that has been active since at least 2013, primarily targeting diplomatic, defense, and research organizations in India and Afghanistan.[1][2][3]
Name | Description |
---|---|
COPPER FIELDSTONE | |
APT36 | |
Mythic Leopard | |
ProjectM |
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1583 | .001 | Acquire Infrastructure: Domains |
Transparent Tribe has registered domains to mimic file sharing, government, defense, and research websites for use in targeted campaigns.[1][3] |
Enterprise | T1059 | .005 | Command and Scripting Interpreter: Visual Basic |
Transparent Tribe has crafted VBS-based malicious documents.[1][2] |
Enterprise | T1584 | .001 | Compromise Infrastructure: Domains |
Transparent Tribe has compromised domains for use in targeted malicious campaigns.[1] |
Enterprise | T1189 | Drive-by Compromise |
Transparent Tribe has used websites with malicious hyperlinks and iframes to infect targeted victims with Crimson, njRAT, and other malicious tools.[1][6][3] |
|
Enterprise | T1568 | Dynamic Resolution |
Transparent Tribe has used dynamic DNS services to set up C2.[1] |
|
Enterprise | T1203 | Exploitation for Client Execution |
Transparent Tribe has crafted malicious files to exploit CVE-2012-0158 and CVE-2010-3333 for execution.[1] |
|
Enterprise | T1564 | .001 | Hide Artifacts: Hidden Files and Directories |
Transparent Tribe can hide legitimate directories and replace them with malicious copies of the same name.[2] |
Enterprise | T1036 | .005 | Masquerading: Match Legitimate Name or Location |
Transparent Tribe can mimic legitimate Windows directories by using the same icons and names.[2] |
Enterprise | T1027 | Obfuscated Files or Information |
Transparent Tribe has dropped encoded executables on compromised hosts.[1] |
|
Enterprise | T1566 | .001 | Phishing: Spearphishing Attachment |
Transparent Tribe has sent spearphishing e-mails with attachments to deliver malicious payloads.[1][2][7][3][6] |
.002 | Phishing: Spearphishing Link |
Transparent Tribe has embedded links to malicious downloads in e-mails.[7][3] |
||
Enterprise | T1608 | .004 | Stage Capabilities: Drive-by Target |
Transparent Tribe has set up websites with malicious hyperlinks and iframes to infect targeted victims with Crimson, njRAT, and other malicious tools.[1][6][3] |
Enterprise | T1204 | .001 | User Execution: Malicious Link |
Transparent Tribe has directed users to open URLs hosting malicious content.[7][3] |
.002 | User Execution: Malicious File |
Transparent Tribe has used weaponized documents in e-mail to compromise targeted systems.[1][2][7][3][6] |