DAAM 分析
IOB - 行为指标 (2)
活动
利益
漏洞
These are the vulnerabilities that we have identified as researched, approached, or attacked.
IOC - 入侵指标 (1)
These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.
ID | IP地址 | 主机名 | 参与者 | 活动 | 已识别 | 类型 | 可信度 |
---|---|---|---|---|---|---|---|
1 | 192.99.251.51 | DAAM | 2024-04-02 | 已验证 | Very High |
TTP - 战术、技术和程序 (2)
Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.
ID | 技术 | 分类 | 漏洞 | 访问向量 | 类型 | 可信度 |
---|---|---|---|---|---|---|
1 | T1059.007 | CAPEC-209 | CWE-79 | Basic Cross Site Scripting | 预测性 | 高 |
2 | TXXXX | CAPEC-XXX | CWE-XXX | Xxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxx | 预测性 | 高 |
IOA - 攻击指标 (1)
These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.
ID | 分类 | 指標 | 类型 | 可信度 |
---|---|---|---|---|
1 | 文件 | data/gbconfiguration.dat | 预测性 | 高 |
参考 (2)
The following list contains external sources which discuss the actor and the associated activities: