chore: move more rules

This commit is contained in:
Nasreddine Bencherchali
2023-04-20 18:24:40 +02:00
parent 7f88625c3c
commit b26f9a9793
17 changed files with 11 additions and 3 deletions
+1
View File
@@ -0,0 +1 @@
TBD
+1
View File
@@ -0,0 +1 @@
TBD
+1
View File
@@ -0,0 +1 @@
TBD
@@ -3,7 +3,7 @@ id: 33a2d1dd-f3b0-40bd-8baf-7974468927cc
status: test
description: Detects an image load pattern as seen when a tool named PRIVATELOG is used and rarely observed under legitimate circumstances
references:
- https://www.fireeye.com/blog/threat-research/2021/09/unknown-actor-using-clfs-log-files-for-stealth.html
- https://web.archive.org/web/20210901184449/https://www.fireeye.com/blog/threat-research/2021/09/unknown-actor-using-clfs-log-files-for-stealth.html
author: Florian Roth (Nextron Systems)
date: 2021/09/07
modified: 2022/10/09
+1
View File
@@ -0,0 +1 @@
TBD
+1
View File
@@ -0,0 +1 @@
TBD
+1
View File
@@ -0,0 +1 @@
TBD
+1
View File
@@ -0,0 +1 @@
TBD
+1
View File
@@ -0,0 +1 @@
TBD
@@ -1,12 +1,12 @@
title: Domestic Kitten FurBall Malware Pattern
id: 6c939dfa-c710-4e12-a4dd-47e1f10e68e1
status: test
status: deprecated
description: Detects specific malware patterns used by FurBall malware linked to Iranian Domestic Kitten APT group
references:
- https://research.checkpoint.com/2021/domestic-kitten-an-inside-look-at-the-iranian-surveillance-operations/
author: Florian Roth (Nextron Systems)
date: 2021/02/08
modified: 2022/10/09
modified: 2023/04/20
tags:
- attack.command_and_control
logsource: