Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Tonto Team
ID: 6a2c459fbcb088e063b54965f138b67481095
Cybercrime
State-Sponsored
Threat types: Intrusion, Espionage, Malware
Progress: 35%
Completeness: 28%
Freshness: 50%
Operation zone: UNKNOWN
Aliases
Limited alias preview
No aliases registered.
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium
Tonto Team is a suspected Chinese state-sponsored cyber espionage threat group that has primarily targeted South Korea, Japan, Taiwan, and the United States since at least 2009; by 2020 they expanded operations to include other Asian as well as Eastern European countries. Tonto Team has targeted government, military, energy, mining, financial, education, healthcare, and technology organizations, including through the Heartbeat Campaign (2009-2012) and Operation Bitter Biscuit (2017). Ref: https://attack.mitre.org/groups/G0131/
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1056.001 | Keylogging | TA0006 TA0009 |
|
| T1059.001 | PowerShell | TA0002 |
|
| T1059.006 | Python | TA0002 |
|
| T1069.001 | Local Groups | TA0007 |
|
| T1090.002 | External Proxy | TA0011 |
|
| T1204.002 | Malicious File | TA0002 |
|
| T1505.003 | Web Shell | TA0003 |
|
| T1566.001 | Spearphishing Attachment | TA0001 |
|
| T1574.001 | DLL | TA0003 TA0004 TA0005 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.