@@ -4,12 +4,10 @@ Description: Something general about the binary
4
4
Aliases : # Optional field if any common aliases exist of the binary with nearly the same functionality,
5
5
- Alias : Binary64.exe # but for example, is built for different architecture.
6
6
Author : The name of the person that created this file
7
- Created : YYYY-MM-DD (date the person created this file)
7
+ Created : 1970-01-01 # YYYY-MM-DD (date the person created this file)
8
8
Commands :
9
9
- Command : The command
10
10
Description : Description of the command
11
- Aliases :
12
- - An alias for the command (example : ProcDump.exe & ProcDump64.exe)
13
11
Usecase : A description of the usecase
14
12
Category : Execute
15
13
Privileges : Required privs
@@ -26,19 +24,19 @@ Full_Path:
26
24
- Path : c:\windows\system32\bin.exe
27
25
- Path : c:\windows\syswow64\bin.exe
28
26
Code_Sample :
29
- - Code : http://url .com/git.txt
27
+ - Code : http://example .com/git.txt
30
28
Detection :
31
29
- IOC : Event ID 10
32
30
- IOC : binary.exe spawned
33
- - Analysis : https://link /to/blog/gist/writeup/if/applicable
34
- - Sigma : https://link /to/sigma/rule/if/applicable
35
- - Elastic : https://link /to/elastic/rule/if/applicable
36
- - Splunk : https://link /to/splunk/rule/if/applicable
37
- - BlockRule : https://link /to/microsoft/block/rules/if/applicable
31
+ - Analysis : https://example.com /to/blog/gist/writeup/if/applicable
32
+ - Sigma : https://example.com /to/sigma/rule/if/applicable
33
+ - Elastic : https://example.com /to/elastic/rule/if/applicable
34
+ - Splunk : https://example.com /to/splunk/rule/if/applicable
35
+ - BlockRule : https://example.com /to/microsoft/block/rules/if/applicable
38
36
Resources :
39
37
- Link : http://blogpost.com
40
38
- Link : http://twitter.com/something
41
- - Link : Threatintelreport...
39
+ - Link : http://example.com/Threatintelreport
42
40
Acknowledgement :
43
41
- Person : John Doe
44
42
Handle : ' @johndoe'
0 commit comments