APT Groups and Operations Logo

APT Groups and Operations

0
Free
Visit Website

A Google sheet spreadsheet containing a comprehensive list of APT groups and operations, providing a reference for tracking and mapping different names and naming schemes used by cybersecurity companies and antivirus vendors. The spreadsheet includes tabs for different countries and regions, as well as an 'Unknown' tab for groups with no attribution. It also highlights overlaps between different groups and provides a search function for easy lookup. The spreadsheet is licensed under CC Creative Commons - Attribution 4.0 International (CC BY 4.0) and is open for contributions from threat intel researchers, malware analysts, and vendor representatives.

FEATURES

ALTERNATIVES

Tools to export data from MISP MySQL database for post-incident analysis and correlation.

Amazon GuardDuty is a threat detection service for AWS accounts.

MISP is an open source threat intelligence platform that enhances threat information sharing and analysis.

An IOC tracker written in Python that queries Google Custom Search Engines for various cybersecurity indicators and monitors domain status using Google Safe Browsing APIs.

Signature-based YARA rules for detecting and preventing threats within Linux, Windows, and macOS systems.

A repository of Yara signatures under the GNU-GPLv2 license for the cybersecurity community.

Converts OpenIOC v1.0 XML files into STIX Indicators, generating STIX v1.2 and CybOX v2.1 content.

Tool for dataviz and statistical analysis of threat intelligence feeds, presented in cybersecurity conferences for measuring IQ of threat intelligence feeds.