References

Type
Url
Description

technique

https://attack.mitre.org/techniques/T1602


technique

https://www.fireeye.com/blog/threat-research/2016/11/fireeye_respondsto.html

FireEye. (2016, November 30). FireEye Responds to Wave of Destructive Cyber Attacks in Gulf Region. Retrieved January 11, 2017.


technique

https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07180722/Report_Shamoon_St

Kaspersky Lab. (2017, March 7). From Shamoon to StoneDrill: Wipers attacking Saudi organizations and beyond. Retrieved March 14, 2019.


technique

https://docs.microsoft.com/sysinternals/downloads/sysmon

Russinovich, M. & Garnier, T. (2017, May 22). Sysmon v6.20. Retrieved December 13, 2017.


technique

http://researchcenter.paloaltonetworks.com/2016/11/unit42-shamoon-2-return-disttrack-wiper/

Falcone, R.. (2016, November 30). Shamoon 2: Return of the Disttrack Wiper. Retrieved January 11, 2017.


technique

https://www.symantec.com/connect/blogs/shamoon-attacks

Symantec. (2012, August 16). The Shamoon Attacks. Retrieved March 14, 2019.


technique

https://unit42.paloaltonetworks.com/shamoon-3-targets-oil-gas-organization/

Falcone, R. (2018, December 13). Shamoon 3 Targets Oil and Gas Organization. Retrieved March 14, 2019.


technique

https://attack.mitre.org/techniques/T1561/002


technique

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/15-mt/nf-15-mt-book/nf-detct

Cisco. (n.d.). Detecting and Analyzing Network Threats With NetFlow. Retrieved April 25, 2019.


technique

https://www.justice.gov/opa/pr/seven-iranians-working-islamic-revolutionary-guard-corps-affiliated-e

Preet Bharara, US Attorney. (2016, March 24). Retrieved April 23, 2019.