diff --git a/clusters/malpedia.json b/clusters/malpedia.json index cd5f97a..09c02f1 100644 --- a/clusters/malpedia.json +++ b/clusters/malpedia.json @@ -15459,6 +15459,15 @@ "synonyms": [], "type": [] }, + "related": [ + { + "dest-uuid": "c4ce1174-9462-47e9-8038-794f40a184b3", + "tags": [ + "estimative-language:likelihood-probability=\"likely\"" + ], + "type": "similar" + } + ], "uuid": "3c43bd4c-8c40-47b5-ae97-3dd0f0c0e8d8", "value": "SideWinder" }, diff --git a/clusters/threat-actor.json b/clusters/threat-actor.json index 610e7fe..8023ccd 100644 --- a/clusters/threat-actor.json +++ b/clusters/threat-actor.json @@ -8021,12 +8021,24 @@ "meta": { "refs": [ "https://securelist.com/apt-trends-report-q1-2018/85280/", - "https://blog.trendmicro.com/trendlabs-security-intelligence/first-active-attack-exploiting-cve-2019-2215-found-on-google-play-linked-to-sidewinder-apt-group/" + "https://blog.trendmicro.com/trendlabs-security-intelligence/first-active-attack-exploiting-cve-2019-2215-found-on-google-play-linked-to-sidewinder-apt-group/", + "https://malpedia.caad.fkie.fraunhofer.de/details/win.sidewinder", + "https://otx.alienvault.com/pulse/5fd10760f9afb730d37c4742/", + " https://www.trendmicro.com/en_us/research/20/l/sidewinder-leverages-south-asian-territorial-issues-for-spear-ph.html" ], "synonyms": [ "RAZOR TIGER" ] }, + "related": [ + { + "dest-uuid": "3c43bd4c-8c40-47b5-ae97-3dd0f0c0e8d8", + "tags": [ + "estimative-language:likelihood-probability=\"likely\"" + ], + "type": "similar" + } + ], "uuid": "c4ce1174-9462-47e9-8038-794f40a184b3", "value": "SideWinder" }, @@ -8503,5 +8515,5 @@ "value": "Operation Skeleton Key" } ], - "version": 194 + "version": 195 }