diff --git a/rules/windows/file/file_event/file_event_win_apt_cozy_bear_phishing_campaing_indicators.yml b/rules/windows/file/file_event/file_event_win_apt_cozy_bear_phishing_campaign_indicators.yml similarity index 91% rename from rules/windows/file/file_event/file_event_win_apt_cozy_bear_phishing_campaing_indicators.yml rename to rules/windows/file/file_event/file_event_win_apt_cozy_bear_phishing_campaign_indicators.yml index 1a9d3869d..1dd7c3377 100644 --- a/rules/windows/file/file_event/file_event_win_apt_cozy_bear_phishing_campaing_indicators.yml +++ b/rules/windows/file/file_event/file_event_win_apt_cozy_bear_phishing_campaign_indicators.yml @@ -1,4 +1,4 @@ -title: APT29 2018 Phishing Campaing File Indicators +title: APT29 2018 Phishing Campaign File Indicators id: 3a3f81ca-652c-482b-adeb-b1c804727f74 related: - id: 7453575c-a747-40b9-839b-125a0aae324b # ProcessCreation @@ -10,7 +10,7 @@ references: - https://www.mandiant.com/resources/blog/not-so-cozy-an-uncomfortable-examination-of-a-suspected-apt29-phishing-campaign author: '@41thexplorer' date: 2018/11/20 -modified: 2023/02/16 +modified: 2023/02/20 tags: - attack.execution - attack.t1218.011