Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. πŸ” Tool: APTs Adversary Simulation

πŸ” Tool: APTs Adversary Simulation

Scheduled Pinned Locked Moved Uncategorized
adversarysimulaaptbackdoor
1 Posts 1 Posters 2 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • hasamba@infosec.exchangeH This user is from outside of this forum
    hasamba@infosec.exchangeH This user is from outside of this forum
    hasamba@infosec.exchange
    wrote last edited by
    #1

    ----------------

    πŸ” Tool: APTs Adversary Simulation
    ===================

    This repository aggregates detailed adversary simulation campaigns that mirror tactics, techniques and procedures (TTPs) attributed to state-sponsored APT groups from Russia, China, Iran and North Korea. The collection documents multiple simulated campaigns and includes artifacts such as custom command-and-control (C2) components, backdoors, stagers, bootloaders and other payloads. Research sources referenced in the collection include major industry reports from Palo Alto Unit 42, Kaspersky, Microsoft, Cisco, Trellix, CrowdStrike and WithSecure.

    Structure and contents
    β€’ Cataloged APT simulations aligned with CrowdStrike-style group names and taxonomy. Group simulations listed include multiple β€œBear” variants for Russia and several β€œPanda” variants for Chinese actors, plus DPRK and Iranian-themed simulations.
    β€’ Artifact types enumerated in the repository include C2 servers and protocols, custom backdoor implants, initial stagers, secondary loaders/bootloaders and supporting scripts or tooling intended to emulate post-exploitation activity.
    β€’ Metadata and descriptive notes map simulated behaviors to observable TTPs and reference vendor reporting where applicable, enabling defenders to correlate simulation steps with published detections.

    Technical scope (what is present, not how-to)
    β€’ Emulated network components for C2 communications and session management.
    β€’ Multiple binary and scripting artifacts representing stagers and backdoors, designed to reflect operational patterns observed in public APT reporting.
    β€’ Behavioral sequences and campaign outlines that describe chain-of-actions executed by the simulated actors.

    Attack chain summary
    β€’ 🎣 Initial Access β€” Simulated vectors and initial stagers representing entry methods.
    β€’ πŸ“¦ Download β€” Artifacts and payload delivery stages mimicking secondary payload retrieval.
    β€’ βš™οΈ Execution β€” Stagers and loaders that transition payloads into memory or disk execution.
    β€’ 🦠 Infection β€” Backdoor implants and persistence mechanisms used to emulate sustained presence.
    β€’ πŸ“€ Exfiltration β€” Descriptions of simulated data staging and exfiltration patterns where included.

    Limitations and intent

    The repository is presented explicitly for educational, research and defensive security purposes. It documents emulated offensive behaviors based on public reports and is not a source of exploitation guidance. No installation, execution or deployment instructions are provided within this summary.

    πŸ”Ή MITRE_ATT&CK #C2 #adversary_simulation #APT #backdoor

    πŸ”— Source: https://github.com/S3N4T0R-0X0/APTs-Adversary-Simulation/tree/main/Iranian%20APT/Static%20Kitten

    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups