You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It would be interesting to consider capturing the set of rules, heuristics, etc. that triggered during the analysis of a malware instance. For example, this could include the Yara rules, Cuckoo sandbox rules, and the like.
We probably don't want to capture the actual rule itself, since that could be done elsewhere (like the STIX Indicator), but instead we may just want something that captures the type of rule (Yara, etc.) and its identifier/name.
The text was updated successfully, but these errors were encountered:
It would be interesting to consider capturing the set of rules, heuristics, etc. that triggered during the analysis of a malware instance. For example, this could include the Yara rules, Cuckoo sandbox rules, and the like.
We probably don't want to capture the actual rule itself, since that could be done elsewhere (like the STIX Indicator), but instead we may just want something that captures the type of rule (Yara, etc.) and its identifier/name.
The text was updated successfully, but these errors were encountered: