Skip to main content

Actor Navigation Workbench

Use this page as the click-through hub from an actor to its structured TTPs, IOC reference locations, malware/tool references, mapped hunts, mapped detections, and evidence records.

The page is generated from repository CSV/register data. It is an analyst navigation aid, not an attribution shortcut.

Actor Coverage Matrix

ActorPriorityTTPsIOC refsToolsHuntsDetectionsEvidenceResearch intakesIntel leads
MuddyWaterHigh442622111
OilRigHigh213100221
Magic HoundHigh201411121
APT42High32311201
AgriusHigh211011101
CyberAv3ngersHigh31211300
Imperial KittenHigh30200101
Pioneer KittenHigh30122111
DarkBitHigh20100100
LyceumHigh201200101
Cotton SandstormHigh31111100
APT39Medium201100111
APT-C-23High23700111
UNC3890Medium-High11100110
Cyber ToufanMedium-High30111110
Void Manticore / HandalaHigh72922201
Lebanese CedarMedium21211101
WIRTEHigh52222101
TA402Medium-High22100102
UNC1860High52911200
Scarred ManticoreHigh50111100

Actor Drilldowns

MuddyWater

OilRig

Magic Hound

APT42

Agrius

CyberAv3ngers

  • Actor workbench: CyberAv3ngers
  • TTP-to-detection matrix: all mapped techniques
  • Surface and capability routes: OT, PLC, HMI, And Exposed Engineering Interfaces
  • Detection status: dashboard
  • Hunt workflow: hunt workflow
  • ATT&CK mappings: T0883 Internet Accessible Device (M2); T0836 Modify Parameter (M2); T0832 Manipulation of View (M2)
  • Mapped detections: DET-003 Unitronics PLC HMI Web Interface Access (Hunt, DRL-4)
  • Mapped hunts: HUNT-003 If exposed PLC/HMI surfaces are targeted then OT management paths or ports will show external access
  • IOC reference sources: SRC-CISA-AA23-335A IP; device exposure; affected product context
  • Tool detail pages: Unitronics Vision PLC Web/HMI; IOControl
  • Tool matrix: all actor-linked tools (2 mapped tool row(s))
  • Evidence records: EVD-002 / CLM-CYBERAV3NGERS-001; EVD-009 / CLM-CYBERAV3NGERS-002; EVD-026 / CLM-CYBERAV3NGERS-003
  • Imported research intakes: None currently mapped.
  • Intel update candidates: None in current feed pull.
  • Source IDs in structured data: SRC-CISA-AA23-335A, SRC-CISA-AA26-097A, SRC-CLAROTY-IOCONTROL-2024

Imperial Kitten

Pioneer Kitten

DarkBit

  • Actor workbench: DarkBit
  • TTP-to-detection matrix: all mapped techniques
  • Surface and capability routes: Destructive Operations, Backup Deletion, And Wipers
  • Detection status: dashboard
  • Hunt workflow: hunt workflow
  • ATT&CK mappings: T1486 Data Encrypted for Impact (M2); T1490 Inhibit System Recovery (M2)
  • Mapped detections: None currently mapped.
  • Mapped hunts: None currently mapped.
  • IOC reference sources: None currently mapped.
  • Tool detail pages: DarkBit ransomware
  • Tool matrix: all actor-linked tools (1 mapped tool row(s))
  • Evidence records: EVD-020 / CLM-DARKBIT-001
  • Imported research intakes: None currently mapped.
  • Intel update candidates: None in current feed pull.
  • Source IDs in structured data: SRC-INCD-DARKBIT-MUDDYWATER-2023, SRC-MS-MERCURY-DEV1084-2023

Lyceum

Cotton Sandstorm

  • Actor workbench: Cotton Sandstorm
  • TTP-to-detection matrix: all mapped techniques
  • Surface and capability routes: None currently mapped.
  • Detection status: dashboard
  • Hunt workflow: hunt workflow
  • ATT&CK mappings: T1585 Establish Accounts (M1); T1204.002 User Execution: Malicious File (M3); T1566 Phishing (M3)
  • Mapped detections: DET-004 Mail Click To Execution Correlation (Hunt, DRL-4)
  • Mapped hunts: HUNT-004 If VIP phishing is active then mail click events will correlate to risky sign-in or execution
  • IOC reference sources: SRC-CP-WEZRAT Email sender; domains; hashes; C2 paths; malware behavior
  • Tool detail pages: WezRat
  • Tool matrix: all actor-linked tools (1 mapped tool row(s))
  • Evidence records: EVD-022 / CLM-COTTONSANDSTORM-001
  • Imported research intakes: None currently mapped.
  • Intel update candidates: None in current feed pull.
  • Source IDs in structured data: SRC-CP-WEZRAT, SRC-FBI-EMENNET-2024, SRC-MS-IRAN-IO

APT39

APT-C-23

UNC3890

  • Actor workbench: UNC3890
  • TTP-to-detection matrix: all mapped techniques
  • Surface and capability routes: None currently mapped.
  • Detection status: dashboard
  • Hunt workflow: hunt workflow
  • ATT&CK mappings: T1189 Drive-by Compromise (M2)
  • Mapped detections: None currently mapped.
  • Mapped hunts: None currently mapped.
  • IOC reference sources: SRC-MANDIANT-UNC3890 Punycode domains; malware references; infrastructure
  • Tool detail pages: SUGARUSH / SUGARDUMP
  • Tool matrix: all actor-linked tools (1 mapped tool row(s))
  • Evidence records: EVD-025 / CLM-UNC3890-001
  • Imported research intakes: APT39 Arid Viper UNC3890 Cyber Toufan Deep Research Intake (Medium, Needs source validation)
  • Intel update candidates: None in current feed pull.
  • Source IDs in structured data: SRC-MANDIANT-UNC3890, SRC-SECWEEK-UNC3890

Cyber Toufan

Void Manticore / Handala

Lebanese Cedar

WIRTE

  • Actor workbench: WIRTE
  • TTP-to-detection matrix: all mapped techniques
  • Surface and capability routes: Endpoint RMM, Scripting, And User-Path Execution
  • Detection status: dashboard
  • Hunt workflow: hunt workflow
  • ATT&CK mappings: T1566 Phishing (M2); T1574.001 DLL Search Order Hijacking (M3); T1485 Data Destruction (M2); T1105 Ingress Tool Transfer (M3); T1567.002 Exfiltration to Cloud Storage (M3)
  • Mapped detections: DET-001 Intune Bulk Device Wipe Anomaly (Hunt, DRL-5); DET-004 Mail Click To Execution Correlation (Hunt, DRL-4)
  • Mapped hunts: HUNT-001 If identity-plane destructive tradecraft is attempted then privileged role activation or bulk device actions will appear in audit logs; HUNT-004 If VIP phishing is active then mail click events will correlate to risky sign-in or execution
  • IOC reference sources: SRC-CP-WIRTE-2024 Wiper references; trusted sender abuse; fake update artifacts; SRC-UNIT42-ASHTAG-2025 Malware hashes; domains; C2 paths; tool behavior
  • Tool detail pages: SameCoin; AshTag
  • Tool matrix: all actor-linked tools (2 mapped tool row(s))
  • Evidence records: EVD-010 / CLM-WIRTE-001
  • Imported research intakes: None currently mapped.
  • Intel update candidates: 1 current candidate(s)
  • Source IDs in structured data: SRC-CP-WIRTE-2024, SRC-UNIT42-ASHTAG-2025

TA402

  • Actor workbench: TA402
  • TTP-to-detection matrix: all mapped techniques
  • Surface and capability routes: Endpoint RMM, Scripting, And User-Path Execution
  • Detection status: dashboard
  • Hunt workflow: hunt workflow
  • ATT&CK mappings: T1566.001 Spearphishing Attachment (M3); T1574.001 DLL Search Order Hijacking (M3)
  • Mapped detections: None currently mapped.
  • Mapped hunts: None currently mapped.
  • IOC reference sources: SRC-PROOFPOINT-TA402-IRONWIND Domains; payload hashes; attachment chain details; SRC-S1-ISRAEL-HAMAS-CYBER-2023 Actor context; lure and malware family references
  • Tool detail pages: IronWind
  • Tool matrix: all actor-linked tools (1 mapped tool row(s))
  • Evidence records: EVD-024 / CLM-TA402-001
  • Imported research intakes: None currently mapped.
  • Intel update candidates: 2 current candidate(s)
  • Source IDs in structured data: SRC-PROOFPOINT-TA402-IRONWIND, SRC-S1-ISRAEL-HAMAS-CYBER-2023

UNC1860

Scarred Manticore