East Asia Unknown Analyse

IOB - Indicator of Behavior (2)

Chronologie

Langue

en2

De campagne

Acteurs

Activités

Intérêt

Chronologie

Taper

Fournisseur

Produit

Task Rabbit Clone2

Vulnérabilités

IOC - Indicator of Compromise (7)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (2)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueClasseVulnérabilitésVecteur d'accèsTaperConfiance
1T1059.007CAPEC-209CWE-79Cross Site ScriptingpredictiveÉlevé
2TXXXXCAPEC-108CWE-XXXxx XxxxxxxxxpredictiveÉlevé

IOA - Indicator of Attack (3)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDClasseIndicatorTaperConfiance
1File/uncpath/predictiveMoyen
2Filexxxxxx_xxxx.xxxpredictiveÉlevé
3ArgumentxxpredictiveFaible

Références (2)

The following list contains external sources which discuss the actor and the associated activities:

Do you want to use VulDB in your project?

Use the official API to access entries easily!