Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

updated Malware Analysis vocabulary definitions #328

Merged
merged 2 commits into from
Aug 21, 2024
Merged

updated Malware Analysis vocabulary definitions #328

merged 2 commits into from
Aug 21, 2024

Conversation

ejratl
Copy link
Contributor

@ejratl ejratl commented Aug 20, 2024

This PR incorporates the Malware analysis vocabulary definitions suggested by Sean Carroll. Fixes #294

@adulau
Copy link
Contributor

adulau commented Aug 20, 2024

Looks great to me. Thank you. Maybe someone with write access could merge it...

@ejratl
Copy link
Contributor Author

ejratl commented Aug 20, 2024

Thanks for your review @adulau ! I believe that this will be merged during the next STIX WG meeting.

@adulau adulau merged commit 13d0958 into main Aug 21, 2024
|[stixliteral]#benign# |The tool reported the malware binary as benign.
|[stixliteral]#unknown# |The tool was unable to determine whether the malware binary is malicious.
|[stixliteral]#malicious# |The tool or human analysis determined that the sample is designed to operate, execute or take place in a manner that is not expected by legitimate users, or performs one or more actions generally deemed harmful to a system, or the legitimate users of a system. These can take the form of executables, source code, scripts or any other software or commands.
|[stixliteral]#suspicious# |The tool or human analysis determined that the sample does not operate as expected or is is usually present in conjunction with a malicious file. But does not itself demonstrate malicious behaviors. Examples may include files not expected to be present or that support applications that have not been installed, files with an incorrect attribute (location, version, size), or which are accessed or loaded with unusual frequency or at unusual times. Other examples include files dropped or created when malware runs.
Copy link

@dzbeck dzbeck Aug 21, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

typo - two "is" in first sentence. Also, one sentence needs a subject - suggest, "But the sample does not itself..."

@dzbeck
Copy link

dzbeck commented Aug 21, 2024

Looks great to me too - a nice update!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Improve the definitions in Malware Result Vocabulary
3 participants