Skip to content

Commit 1a244a7

Browse files
committed
YAML strings should be quoted.
1 parent 7cc9652 commit 1a244a7

File tree

2 files changed

+104
-105
lines changed

2 files changed

+104
-105
lines changed

assets/channels.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,5 +19,5 @@ GitHub:
1919
BitBucket: "https://bitbucket.org/Maikuolan/compatibility-charts/raw/"
2020
VirusTotal_HTTPS:
2121
VirusTotal:
22-
VirusTotal_HTTPS: https://www.virustotal.com/vtapi
23-
VirusTotal_HTTP: http://www.virustotal.com/vtapi
22+
VirusTotal_HTTPS: "https://www.virustotal.com/vtapi"
23+
VirusTotal_HTTP: "http://www.virustotal.com/vtapi"

assets/shorthand.yml

Lines changed: 102 additions & 103 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
# License: GNU/GPLv2
88
# @see LICENSE.txt
99
#
10-
# This file: phpMussel shorthand data (last modified: 2020.07.16).
10+
# This file: phpMussel shorthand data (last modified: 2022.02.13).
1111
#
1212
# Warning: When modifying the information in this file, be careful to ensure
1313
# that any changes made won't conflict with the what phpMussel recognises as
@@ -19,20 +19,20 @@
1919
##/
2020

2121
Vendor Shorthand:
22-
2: ClamAV
23-
3: phpMussel
24-
5: ZBB
25-
6: NLNetLabs
26-
7: FoxIT
22+
2: "ClamAV"
23+
3: "phpMussel"
24+
5: "ZBB"
25+
6: "NLNetLabs"
26+
7: "FoxIT"
2727
8:
28-
0: PhishTank
29-
3: Spam404
28+
0: "PhishTank"
29+
3: "Spam404"
3030
4: Cybercrime.Tracker
31-
9: phpMussel
31+
9: "phpMussel"
3232
10: Malware.Expert
3333
Vendor Weight Options:
34-
9: Weighted
35-
15: Weighted
34+
9: "Weighted"
35+
15: "Weighted"
3636
Vendor Search Patterns:
3737
ClamAV: "\x1a[\x20-\x2f]|ClamAV"
3838
phpMussel: "\x1a[\x30-\x3f\x90-\x9f]|phpMussel"
@@ -44,16 +44,16 @@ Vendor Search Patterns:
4444
Cybercrime.Tracker: "\x1a\x84"
4545
Malware.Expert: "\x1a[\xa0-\xaf]"
4646
Metadata Shorthand:
47-
1: Testfile
48-
2: FN
49-
3: VT
50-
4: META
51-
5: Chameleon
52-
6: Werewolf
53-
7: Suspect
54-
8: Fake
55-
9: CVE
56-
15: HEUR
47+
1: "Testfile"
48+
2: "FN"
49+
3: "VT"
50+
4: "META"
51+
5: "Chameleon"
52+
6: "Werewolf"
53+
7: "Suspect"
54+
8: "Fake"
55+
9: "CVE"
56+
15: "HEUR"
5757
Metadata Search Pattern Partials:
5858
Testfile: "1"
5959
FN: "2"
@@ -67,40 +67,40 @@ Metadata Search Pattern Partials:
6767
HEUR: "f"
6868
Vector Shorthand:
6969
1:
70-
1: Win
71-
2: W32
72-
3: W64
73-
4: ELF
74-
5: OSX
75-
6: Android
76-
7: Email
77-
8: JS
78-
9: Java
79-
10: XXE
80-
11: Graphics
81-
12: OLE
82-
13: HTML
83-
14: RTF
84-
15: Archive
70+
1: "Win"
71+
2: "W32"
72+
3: "W64"
73+
4: "ELF"
74+
5: "OSX"
75+
6: "Android"
76+
7: "Email"
77+
8: "JS"
78+
9: "Java"
79+
10: "XXE"
80+
11: "Graphics"
81+
12: "OLE"
82+
13: "HTML"
83+
14: "RTF"
84+
15: "Archive"
8585
2:
86-
0: PHP
87-
1: XML
88-
2: ASP
89-
3: VBS
90-
4: BAT
91-
5: PDF
92-
6: SWF
93-
7: W97M
94-
8: X97M
95-
9: O97M
96-
10: ASCII
97-
11: Unix
98-
12: Python
99-
13: Perl
100-
14: Ruby
86+
0: "PHP"
87+
1: "XML"
88+
2: "ASP"
89+
3: "VBS"
90+
4: "BAT"
91+
5: "PDF"
92+
6: "SWF"
93+
7: "W97M"
94+
8: "X97M"
95+
9: "O97M"
96+
10: "ASCII"
97+
11: "Unix"
98+
12: "Python"
99+
13: "Perl"
100+
14: "Ruby"
101101
15: INF/INI
102102
3:
103-
0: CGI
103+
0: "CGI"
104104
Vector Search Patterns:
105105
Win: "\x1a.[\x11\x12\x13]|[Ww](?:[Ii][Nn]|32|64)"
106106
W32: "\x1a.\x12|[Ww](?:[Ii][Nn])?32"
@@ -136,65 +136,65 @@ Vector Search Patterns:
136136
CGI: "\x1a.\x30"
137137
Malware Type Shorthand:
138138
1:
139-
1: Worm
140-
2: Trojan
141-
3: Adware
142-
4: Flooder
143-
5: IRCBot
144-
6: Exploit
145-
7: VirTool
146-
8: Dialer
139+
1: "Worm"
140+
2: "Trojan"
141+
3: "Adware"
142+
4: "Flooder"
143+
5: "IRCBot"
144+
6: "Exploit"
145+
7: "VirTool"
146+
8: "Dialer"
147147
9: Joke/Hoax
148-
11: Malware
149-
12: Riskware
150-
13: Rootkit
151-
14: Backdoor
152-
15: Hacktool
148+
11: "Malware"
149+
12: "Riskware"
150+
13: "Rootkit"
151+
14: "Backdoor"
152+
15: "Hacktool"
153153
2:
154-
0: Keylogger
155-
1: Ransomware
156-
2: Spyware
157-
3: Virus
158-
4: Dropper
159-
5: Dropped
160-
6: Downloader
161-
7: Obfuscation
162-
8: Obfuscator
163-
9: Obfuscated
164-
10: Packer
165-
11: Packed
154+
0: "Keylogger"
155+
1: "Ransomware"
156+
2: "Spyware"
157+
3: "Virus"
158+
4: "Dropper"
159+
5: "Dropped"
160+
6: "Downloader"
161+
7: "Obfuscation"
162+
8: "Obfuscator"
163+
9: "Obfuscated"
164+
10: "Packer"
165+
11: "Packed"
166166
12: PUA/PUP
167-
13: Shell
168-
14: Defacer
169-
15: Defacement
167+
13: "Shell"
168+
14: "Defacer"
169+
15: "Defacement"
170170
3:
171-
0: Cryptor
172-
1: Phish
173-
2: Spam
174-
3: Spammer
175-
4: Scam
176-
5: ZipBomb
177-
6: ForkBomb
178-
7: LogicBomb
179-
8: CyberBomb
180-
9: Malvertisement
181-
13: Encrypted
182-
15: BadURL
171+
0: "Cryptor"
172+
1: "Phish"
173+
2: "Spam"
174+
3: "Spammer"
175+
4: "Scam"
176+
5: "ZipBomb"
177+
6: "ForkBomb"
178+
7: "LogicBomb"
179+
8: "CyberBomb"
180+
9: "Malvertisement"
181+
13: "Encrypted"
182+
15: "BadURL"
183183
4:
184-
0: Miner
184+
0: "Miner"
185185
Malware Type Ignore Options:
186186
1:
187-
3: detect_adware
188-
9: detect_joke_hoax
187+
3: "detect_adware"
188+
9: "detect_joke_hoax"
189189
2:
190-
10: detect_packer_packed
191-
11: detect_packer_packed
192-
12: detect_pua_pup
193-
13: detect_shell
194-
14: detect_deface
195-
15: detect_deface
190+
10: "detect_packer_packed"
191+
11: "detect_packer_packed"
192+
12: "detect_pua_pup"
193+
13: "detect_shell"
194+
14: "detect_deface"
195+
15: "detect_deface"
196196
3:
197-
13: detect_encryption
197+
13: "detect_encryption"
198198
Malware Type Search Patterns:
199199
Worm: "\x1a..\x11"
200200
Trojan: "\x1a..\x12"
@@ -239,4 +239,3 @@ Malware Type Search Patterns:
239239
Encrypted: "\x1a..\x3d"
240240
BadURL: "\x1a..\x3f"
241241
Miner: "\x1a..\x40"
242-

0 commit comments

Comments
 (0)