technique
https://attack.mitre.org/techniques/T1602
technique
https://www.fireeye.com/blog/threat-research/2016/11/fireeye_respondsto.html
FireEye. (2016, November 30). FireEye Responds to Wave of Destructive Cyber Attacks in Gulf Region. Retrieved January 11, 2017.
technique
https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07180722/Report_Shamoon_St
Kaspersky Lab. (2017, March 7). From Shamoon to StoneDrill: Wipers attacking Saudi organizations and beyond. Retrieved March 14, 2019.
technique
https://docs.microsoft.com/sysinternals/downloads/sysmon
Russinovich, M. & Garnier, T. (2017, May 22). Sysmon v6.20. Retrieved December 13, 2017.
technique
http://researchcenter.paloaltonetworks.com/2016/11/unit42-shamoon-2-return-disttrack-wiper/
Falcone, R.. (2016, November 30). Shamoon 2: Return of the Disttrack Wiper. Retrieved January 11, 2017.
technique
https://www.symantec.com/connect/blogs/shamoon-attacks
Symantec. (2012, August 16). The Shamoon Attacks. Retrieved March 14, 2019.
technique
https://unit42.paloaltonetworks.com/shamoon-3-targets-oil-gas-organization/
Falcone, R. (2018, December 13). Shamoon 3 Targets Oil and Gas Organization. Retrieved March 14, 2019.
technique
https://attack.mitre.org/techniques/T1561/002
technique
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/15-mt/nf-15-mt-book/nf-detct
Cisco. (n.d.). Detecting and Analyzing Network Threats With NetFlow. Retrieved April 25, 2019.
technique
https://www.justice.gov/opa/pr/seven-iranians-working-islamic-revolutionary-guard-corps-affiliated-e
Preet Bharara, US Attorney. (2016, March 24). Retrieved April 23, 2019.