This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant yara rules and IDS signatures to detect these indicators.
Our public PGP Key can be found here.
||IOC : IDS : PCAP : PDF
|May 03, 2018
||Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers
|Apr 02, 2018
||Building a Data Lake for Threat Research
|Feb 22, 2018
||Analysis of Active Satori Botnet Infections
|Dec 20, 2017
||An Introduction to SMB for Network Security Analysts
|Nov 28, 2017
||Triaging Large Packet Captures - Methods for Extracting & Analyzing Domains
|Nov 14, 2017
||Using Emerging Threats Suricata Ruleset to Scan PCAP
|Nov 01, 2017
||Exposing a Phishing Kit
|Oct 26, 2017
||Large Scale IRCbot Infection Attempts
|Oct 16, 2017
||An Update on Winnti
|Oct 10, 2017
||Turla Watering Hole Campaigns 2016/2017
|Oct 02, 2017
||Identifying and Triaging DNS Traffic on Your Network
|Sept 28, 2017
||Triaging Large Packet Captures - 4 Key TShark Commands to Start Your Investigation
|Jul 11, 2017
||Winnti (LEAD/APT17) Evolution - Going Open Source
This directory contains IDS signatures to detect the indicators located in the IOC directory. These signatures are compatible with Suricata v4.0.4.
This directory contains IOCs from posts at 401trg.com. The csv files follow the unified format described below. These indicators are not defanged and should be considered malicious.
This directory contains example pcaps from "knowledge" posts at 401trg.com.
This directory contains PDFs of 401TRG long-form posts.
All IOC files are in CSV and have the following format:
There are several types of indicators:
CODE SIGN CERT SERIAL
asdf.asdf.com,DOMAIN,This is a malicious domain,https://401trg.com/this-post-does-not-exist
The description field is left blank when there is no context to add to the indicator. The reference field will contain a link to the 401TRG post that disclosed the indicator.
All data is provided under Apache License, Version 2.0 which can be found here.