You are on page 1of 2

Key Findings:

A short description of the key findings (brief explanation about the threat, malicious server, malicious
domain, threat goals, etc.). For example:

Zeus has advanced anti-detection mechanics

Zeus can change its code to bypass anti-virus tools detection

Zeus malicious IP address is 54.36.66.45

Incident Description:

A description of the incident (for example, if it is an XSS attack, information about the attack, the
information can be collected from any source).

Static Information:

Date and time the attack occurred

Incident severity

Incident status

Discover method (software, tools, the products that triggered the attack. For example: Snort.)

Threat Capabilities and Behavior:

Attack/threat name

Source of the attack/threat (txt files, documents, executable files, etc.)

Suspicious IP addresses involved in the attack

Destination victim's IP addresses

Services/systems infected

Attack cycle (stages)

IOC:

IP addresses

URLs

Domains

Recommendations and Prevention:

Steps to mitigate and prevent the threat, such as blocking IP addresses on the firewall, and blocking the
domain source.
Conclusion:

Conclusion of the report.

You might also like