Create a MISP event on a malware incident – dynamic malware analysis #3
Labels
needs triage
This issue has been automatically labelled and needs further triage
playbook:activity=3
Playbooks for activity 2
playbook:state=proposal
A 'proposal' for a new playbook
The title of the playbook
Create a MISP event on a malware incident – with sample
Purpose of the playbook
Variants of the malware incident playbook can be made with VMRay, Joe Sandbox or Cuckoo.
Similar as #2
External resources used by this playbook
VMRay, Joe Sandbox, Cuckoo, MWDBcore, VirusTotal, OTX, Hashlookup, Mattermost (or Slack), TheHive (optional), DFIR-IRIS (optional)
Target audience
SOC, CSIRT
Breefly list the execution steps or workflow
No response
The text was updated successfully, but these errors were encountered: