SigmaHQ/rules/windows/malware
2019-01-12 12:03:36 +01:00
..
av_exploiting.yml ATT&CK tagging QA 2018-09-20 12:44:44 +02:00
av_password_dumper.yml ATT&CK tagging QA 2018-09-20 12:44:44 +02:00
av_relevant_files.yml Update av_relevant_files.yml 2018-12-05 07:53:53 +03:00
av_webshell.yml ATT&CK tagging QA 2018-09-20 12:44:44 +02:00
sysmon_malware_dridex.yml Rule: Dridex pattern 2019-01-12 12:03:36 +01:00
sysmon_malware_notpetya.yml Tagged windows powershell, other and malware rules. 2018-07-24 10:56:41 +02:00
sysmon_malware_wannacry.yml Simplified rule conditions with new condition constructs 2018-03-06 23:14:43 +01:00
win_mal_adwind.yml Bugfix: wrong field for 4688 process creation events 2018-12-11 16:10:15 +01:00
win_mal_wannacry.yml Replace "logsource: description" with "definition" to match the specs 2018-11-15 09:00:06 +03:00