Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
SideWinder
ID: 432a7ada458a856deb38ed1eecd9634929552
Cybercrime
State-Sponsored
Threat types: Intrusion, Espionage, Phishing
Progress: 38%
Completeness: 33%
Freshness: 50%
Operation zone: UNKNOWN
Aliases
Limited alias preview
| APT-C-17 | Razor Tiger | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium
Sidewinder is a suspected Indian threat actor group that has been active since at least 2012. They have been observed targeting government, military, and business entities throughout Asia, primarily focusing on Pakistan, China, Nepal, and Afghanistan. Ref: https://attack.mitre.org/groups/G0121/
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1027.010 | Command Obfuscation | TA0005 |
|
| T1027.013 | Encrypted/Encoded File | TA0005 |
|
| T1036.005 | Match Legitimate Resource Name or Location | TA0005 |
|
| T1059.001 | PowerShell | TA0002 |
|
| T1059.005 | Visual Basic | TA0002 |
|
| T1059.007 | JavaScript | TA0002 |
|
| T1071.001 | Web Protocols | TA0011 |
|
| T1074.001 | Local Data Staging | TA0009 |
|
| T1204.001 | Malicious Link | TA0002 |
|
| T1204.002 | Malicious File | TA0002 |
|
| T1218.005 | Mshta | TA0005 |
|
| T1518.001 | Security Software Discovery | TA0007 |
|
| T1547.001 | Registry Run Keys / Startup Folder | TA0003 TA0004 |
|
| T1559.002 | Dynamic Data Exchange | TA0002 |
|
| T1566.001 | Spearphishing Attachment | TA0001 |
|
| T1566.002 | Spearphishing Link | TA0001 |
|
| T1574.001 | DLL | TA0003 TA0004 TA0005 |
|
| T1598.002 | Spearphishing Attachment | TA0043 |
|
| T1598.003 | Spearphishing Link | TA0043 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.