Worked Cases
These worked cases show how the repository expects analysts to move from public reporting to defensive action without overstating attribution or detection readiness. They are still examples: each one needs local telemetry, owner approval, and DRL evidence before production use.
Case 1: MuddyWater Phishing To RMM / BugSleep / Fooder / MuddyViper
Source Claim
Public reporting by INCD, Check Point, and ESET supports MuddyWater relevance to Israeli cyber-domain defense through phishing, tooling evolution, backdoor use, and critical-infrastructure targeting.
Source set:
SRC-INCD-MUDDYWATER-2024SRC-INCD-MUDDYWATER-PHISHINGSRC-CP-BUGSLEEPSRC-ESET-MUDDYWATER-SNAKESSRC-KASPERSKY-ICS-Q4-2025as supporting synthesis
Evidence IDs:
EVD-004
Actor confidence:
- High for MuddyWater as an Israeli-relevant actor.
- Moderate for any single incident until local telemetry links the source claim to the environment.
PIR / SIR
PIR:
PIR-002: approve near-term threat-hunting sprint.
SIRs:
SIR-003: identify approved and unauthorized RMM tools.- Additional SIR required: identify which trusted senders recently delivered executable, archive, script, or cloud-link lures.
Scenario Score
Scenario:
SCN-002
Priority score:
- 19
Reason:
- Likelihood 4, impact 4, exposure 4, detection gap 3, time sensitivity 4.
ATT&CK Mapping
Relevant mappings:
G0069 / T1566 / Phishing / M2G0069 / T1059.001 / PowerShell / M2G0069 / T1219 / Remote Access Software / M3
Mapping rationale:
- Phishing and PowerShell remain M2 because they are broad actor behaviors.
- RMM abuse can be treated as M3 when tied to the repository's process-path and approved-tool inventory logic.
Observable Chain
- Email delivery from trusted or newly compromised sender.
- URL click or attachment open.
- Script, archive, or installer execution from user-controlled paths.
- RMM binary, PowerShell, BugSleep, Fooder, MuddyViper, or other backdoor execution.
- Cloud, proxy, or RMM service communication.
Required Telemetry
- Email gateway and URL-click telemetry.
- EDR process and file events.
- DNS/proxy logs.
- Identity sign-in logs.
- Approved RMM inventory.
Required fields:
RecipientEmailAddress,SenderFromAddress,Url,Timestamp.DeviceName,FileName,FolderPath,ProcessCommandLine.InitiatingProcessFileName,RemoteUrl,RemoteIP.
Hunt Query / Detection Rule
Hunts:
HUNT-002HUNT-004
Rules:
detections/kql/mail-click-to-exec-correlation.kqldetections/kql/suspicious-rmm-file-sharing-download.kqldetections/sigma/suspicious-rmm-file-sharing-download.yml
Detection IDs:
DET-002- supporting correlation:
DET-004
Test Plan
Positive test:
- Execute an approved benign RMM installer from a user-controlled test path in a lab tenant and confirm the rule detects the path/parent-process behavior.
Negative test:
- Execute the same approved RMM from the enterprise software-distribution path and confirm the allowlist suppresses the event.
Replay / pilot:
- Replay 14 days of EDR process telemetry and compare hits against approved RMM inventory and helpdesk deployment tickets.
SOC Triage
- Confirm whether the RMM binary is approved and expected on that host.
- Review parent process, user, source path, and network destination.
- Preserve email, URL-click, process, file, and network evidence.
- Isolate host if RMM is unauthorized and remote session is active.
- Rotate credentials for the affected user and any accounts touched by the process tree.
DRL Level
Current DRL:
DET-002: DRL-6.DET-004: DRL-4.
Target DRL:
- DRL-7 after historical replay and false-positive review.
- DRL-9 only after pilot, owner approval, SOC triage, and rollback plan.
Residual Gaps
- Need local approved-RMM inventory.
- Need customer-specific mail and EDR table names.
- Need positive and negative test outputs committed to a DRL evidence pack.
- Need source-specific separation of BugSleep, Fooder, and MuddyViper claims.
Case 2: Scarred Manticore / UNC1860 Access To Void Manticore Destructive Scenario
Source Claim
Check Point and Mandiant reporting support a model in which Iranian access and persistence clusters can support later destructive activity, but incident-level handoff attribution must remain source-specific and cautious.
Source set:
SRC-CP-SCARRED-MANTICORE-2023SRC-CP-VOID-2024SRC-MANDIANT-UNC1860SRC-MITRE-G1055
Evidence IDs:
EVD-005EVD-006EVD-007EVD-008
Actor confidence:
- High for Scarred Manticore and UNC1860 as access/persistence concerns.
- High for Void Manticore as destructive persona/cluster context.
- Moderate for any specific handoff until telemetry and primary reporting link the phases.
PIR / SIR
PIR:
PIR-001: prioritize identity and MDM protection.PIR-002: approve near-term threat-hunting sprint.
SIRs:
SIR-001: identify sources describing identity-plane destructive tradecraft.- Additional SIR required: identify internet-facing IIS, SharePoint, Exchange, and edge applications with incomplete file-integrity coverage.
Scenario Score
Related scenario:
SCN-001for destructive identity-plane actions.
Recommended additional scenario:
SCN-005: edge access to destructive handoff.
Suggested score:
- Likelihood 3, impact 5, exposure 4, detection gap 4, time sensitivity 5.
- Priority score 21.
ATT&CK Mapping
Relevant mappings:
SCARREDMANTICORE / T1190 / Exploit Public-Facing Application / M2SCARREDMANTICORE / T1505.004 / IIS Components / M2SCARREDMANTICORE / T1505.003 / Web Shell / M2HANDALA / T1485 / Data Destruction / M2HANDALA / T1490 / Inhibit System Recovery / M2
Mapping rationale:
- IIS/native-module mappings remain M2 until a rule specifically detects module registration, HTTP.sys listener behavior, or a tested Liontail-like artifact.
- VSS and backup deletion detections can become M3 when tied to rule logic and command telemetry.
Observable Chain
- Public-facing web application exploitation.
- Webroot, IIS, SharePoint, or module-level persistence.
- Passive listener behavior or webshell access.
- Internal RDP, service-account, or valid-account activity.
- Backup deletion, recovery inhibition, mass file operations, or public claim.
Required Telemetry
- WAF and reverse-proxy logs.
- IIS, Exchange, SharePoint, and webroot file-integrity logs.
- EDR process, file, and image-load telemetry.
- Authentication, RDP, and service-control logs.
- Backup, VSS, and shadow-copy command telemetry.
- Persona-claims register.
Required fields:
cs_uri_stem,cs_user_agent,src_ip,dest_ip.FileName,FolderPath,ProcessCommandLine,ParentImage.AccountName,LogonType,SourceNetworkAddress.OperationName,TargetResources,InitiatedBy.
Hunt Query / Detection Rule
Hunts:
HUNT-001for destructive identity-plane activity.- New hunt required: edge-to-destruction correlation.
Rules:
detections/sigma/exchange-webshell-post-exploitation.ymldetections/sigma/vss-backup-deletion-chain.ymldetections/sigma/liontail-system32-dll-service-load.yml
Detection IDs:
DET-001for identity-plane destructive actions.- New detection required for IIS/native-module integrity.
Test Plan
Positive test:
- In a lab IIS host, create a benign test module or controlled webroot file change and confirm file-integrity/image-load telemetry is collected.
- Execute benign
vssadminandwmic shadowcopytest commands in an isolated lab and confirm the VSS rule fires.
Negative test:
- Run approved IIS patching or module installation and confirm the allowlist prevents expected maintenance from becoming high severity.
- Run backup-administration scripts during approved maintenance and document expected false positives.
Replay / pilot:
- Replay 30 days of webroot file changes and backup-control commands across internet-facing servers.
SOC Triage
- Preserve server image, web logs, webroot, IIS configuration, and EDR history.
- Identify whether persistence is webshell, native module, service hijack, or another mechanism.
- Scope internal pivots through RDP, SMB, service accounts, and admin shares.
- Freeze suspicious privileged sessions.
- Correlate any public persona claim in
persona-claims-register.csvwith telemetry before making external statements.
DRL Level
Current DRL:
- Identity-plane destructive detection: DRL-5.
- Webshell and VSS rules: hunt/prototype level unless locally tested.
Target DRL:
- DRL-7 after web/IIS baseline replay and command telemetry tests.
- DRL-9 after pilot, false-positive tuning, and SOC approval.
Residual Gaps
- Need IIS/native-module-specific rule that aligns better with Liontail.
- Need local baseline of legitimate IIS modules and service DLL loads.
- Need incident-level handoff evidence before asserting Scarred Manticore to Void Manticore continuity.
- Need persona-claim legal/comms workflow tested in tabletop exercise.
Case 3: CyberAv3ngers OT / PLC Exposure
Source Claim
CISA joint advisories and Claroty reporting support CyberAv3ngers / IRGC-CEC relevance to exposed PLC/HMI and OT/IoT defense.
Source set:
SRC-CISA-AA23-335ASRC-CISA-AA26-097ASRC-CLAROTY-IOCONTROL-2024
Evidence IDs:
EVD-002EVD-009
Actor confidence:
- High for CyberAv3ngers / IRGC-CEC relevance to exposed OT assets.
- Moderate for any local incident until asset logs and configuration evidence confirm targeting or manipulation.
PIR / SIR
PIR:
PIR-003: reduce exposed OT management risk.
SIR:
SIR-004: identify which PLC/HMI interfaces are internet exposed.
Scenario Score
Scenario:
SCN-003
Priority score:
- 22
Reason:
- Likelihood 4, impact 5, exposure 5, detection gap 3, time sensitivity 5.
ATT&CK Mapping
Relevant mappings:
CYBERAV3NGERS / T0883 / Internet Accessible Device / M2CYBERAV3NGERS / T0836 / Modify Parameter / M2CYBERAV3NGERS / T0832 / Manipulation of View / M2
Mapping rationale:
- These remain M2 until a site has OT telemetry, known asset inventory, and test evidence for the observable. Use ATT&CK for ICS for PLC/HMI effects.
Observable Chain
- PLC/HMI management surface exposed to the internet.
- External access to OT management paths or OT ports.
- Authentication using default or weak credentials.
- HMI manipulation, parameter modification, or unexpected communication settings.
- Public defacement or claim.
Required Telemetry
- External attack-surface inventory.
- Firewall and VPN logs.
- OT network flows.
- PLC/HMI web logs where available.
- Engineering workstation logs.
- Controller configuration backups.
Required fields:
src_ip,dest_ip,dest_port,protocol,action.url,user_agent,asset_owner,device_model.engineering_workstation,project_file,configuration_hash.
Hunt Query / Detection Rule
Hunt:
HUNT-003
Rule:
detections/sigma/unitronics-plc-hmi-web-access.yml
Detection ID:
DET-003
Test Plan
Positive test:
- In a lab or approved OT test segment, generate controlled access to known Unitronics/Rockwell management paths or OT ports and confirm firewall/proxy/OT logs contain required fields.
Negative test:
- Confirm approved vendor access through VPN/jump host is excluded while direct internet-origin access remains visible.
Replay / pilot:
- Review 30 days of firewall and external attack-surface data for direct PLC/HMI exposure.
SOC Triage
- Determine whether the asset is directly internet-accessible.
- Confirm vendor, model, firmware, password state, and remote-access path.
- Preserve OT network logs and controller/HMI configuration state.
- Compare current configuration to trusted backup.
- Involve OT owner before rebooting, changing state, or blocking traffic that may affect operations.
DRL Level
Current DRL:
DET-003: DRL-4.
Target DRL:
- DRL-6 after local field mapping and benign access validation.
- DRL-8 after pilot in monitored OT segment.
- DRL-9 only after OT owner approval, response plan, and rollback procedure.
Residual Gaps
- Need site-specific OT asset inventory.
- Need approved vendor remote-access list.
- Need controller/HMI configuration backup process.
- Need safety-reviewed response playbook before automated blocking.