Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Ability to Capture Rules/Heuristics that Triggered on a Malware Instance #132

Open
ikiril01 opened this issue Aug 9, 2016 · 0 comments
Labels

Comments

@ikiril01
Copy link
Member

ikiril01 commented Aug 9, 2016

It would be interesting to consider capturing the set of rules, heuristics, etc. that triggered during the analysis of a malware instance. For example, this could include the Yara rules, Cuckoo sandbox rules, and the like.

We probably don't want to capture the actual rule itself, since that could be done elsewhere (like the STIX Indicator), but instead we may just want something that captures the type of rule (Yara, etc.) and its identifier/name.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant