Skip to content

Add Ability to Capture Rules/Heuristics that Triggered on a Malware Instance #132

@ikiril01

Description

@ikiril01

It would be interesting to consider capturing the set of rules, heuristics, etc. that triggered during the analysis of a malware instance. For example, this could include the Yara rules, Cuckoo sandbox rules, and the like.

We probably don't want to capture the actual rule itself, since that could be done elsewhere (like the STIX Indicator), but instead we may just want something that captures the type of rule (Yara, etc.) and its identifier/name.

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions