Transparent Tribe, APT 36

Description

(Proofpoint) Proofpoint researchers recently uncovered evidence of an advanced persistent threat (APT) against Indian diplomatic and military resources. Our investigation began with malicious emails sent to Indian embassies in Saudi Arabia and Kazakstan but turned up connections to watering hole sites focused on Indian military personnel and designed to drop a remote access Trojan (RAT) with a variety of data exfiltration functions. Our analysis shows that many of the campaigns and attacks appear related by common IOCs, vectors, payloads, and language, but the exact nature and attribution associated with this APT remain under investigation. At this time, the background and analysis in this paper provide useful forensics and detail our current thinking on the malware that we have dubbed “MSIL/Crimson”.

Transparent Tribe may be related to Gorgon Group and SideCopy.

Their malicious infrastructure was infiltrated by Turla, Waterbug, Venomous Bear in 2022.

Transparant Tribe has been observed to use the Andromeda botnet (operated by Andromeda Spider).

Names

NameName-Giver
Transparent TribeProofpoint
APT 36Mandiant
ProjectMPalo Alto
Mythic LeopardCrowdStrike
TEMP.LapisFireEye
Copper FieldstoneSecureWorks
Earth KarkaddanTrend Micro
STEPPY-KAVACHSecuronix
Green HavildarPWC
APT-C-56Qihoo 360
Storm-0156Microsoft
Opaque DracoPalo Alto

Country

Motivation

  • Information theft and espionage

First Seen

2013

Observed Sectors

Observed Countries

Tools

Operations

Information

Mitre Attack

Other Information

Uuid

be967aec-2b55-45f2-86e8-7f22cc66db85

Last Card Change

2025-06-27