Secure Endpoint Naming Conventions

Cisco's Secure Endpoint solutions protect organizations before, during, and after an attack. Secure Endpoint is built on an extensive collection of real-time threat intelligence and dynamic malware analytics supplied by Talos and Cisco Secure Endpoint Threat Grid intelligence feeds. The table below provides a sample of the naming convention patterns of threats collected in Secure Endpoint to help with threat analysis. This list is not exhaustive and is subject to change at any time without notice.

Pattern Example Engine Description Notes
/^*(\.vv)|(\.1201)$/ W32.Trojan:TR.23m3.1201 Malicious file feed
/^W32.*.ab.(VRT|Talos)$/ or /^W32.*.ab2$/ W32.BD0A0522.ab.tht.VRT or W32.BD0A0522.ab2 Malicious files related to other malicious files
/APK.[A-F0-9]{10}.agent.tht.Talos/ APK.B2AA59B140.agent.tht.Talos Malicious android applications
/.*\.amphr.hunt.talos/ Auto.AB6DE0.amphr.hunt.talos Malicious files based on in-field telemetry
W32.XXXXXXXXXX.auto.Talos W32.XXXXXXXXXX.auto.Talos Files marked malicious as a result of analysis by Cisco security researchers
/^.*.bck.(VRT|Talos)$/ W32.7DC9F0E149.bck.tht.VRT Malicious file feed
/^.*Clam\.Heuristics.*/i Clam.Heuristics.SWF.SuspectImage.E ClamAV heuristics engine
/^.*\.Dao\.MRT\.TALOS$/ Win.Dropper.Zbot.Dao.MRT.TALOS Files marked malicious as a result of tracking multiple malware families
/^\.dk$/ W32.SirefefA.15gc.dk Malicious files related to other malicious files
Auto\.[A-F0-9]{10}\.Docfile\.tht\.Talos Auto.040ADE11C9.Docfile.tht.Talos Malicious office documents
/^W32.*.Dridex.(VRT|Talos)$/ Doc.2436D135A6.Dridex.tht.Talos Files marked malicious as a result of tracking multiple malware families
/^W32.substr($sha256,0,9).Dyre.(VRT|Talos)/ W32.C975F49E5D.Dyre.tht.Talos Files marked malicious as a result of tracking multiple malware families
/.*\.Emotet\.hunt\.Talos/ Doc.Dropper.Emotet.hunt.Talos Files marked malicious as a result of tracking multiple malware families
W32\.Trojan\.Emotet::MxP::(Original Poke Name) / Doc\.Downloader\.Emotet::MxP::(Original Poke Name) W32.Trojan.Emotet::MxP::W32.Auto:bcd3208902.in03.Talos W32.Trojan.Emotet::MxP::W32.Auto:bcd3208902.in03.Talos
W32.Auto.%s.EncrOff.MRT.TALOS W32.Auto.FEEDABBA.EncrOff.MRT.TALOS Malicious office documents
Win32.%s.EP.RET Win32.9E193268C9.EP.RET Malicious files based on in-field telemetry
/^Family::gravity::.*$/ TrickBot::gravity::Auto.3EF943A3A9.221767.in07.Talos Files marked malicious as a result of tracking multiple malware families
/^Family::MRTART::.*$/ Emotet::MRTART::Auto.4ED743A3A9.334789.Talos Files marked malicious as a result of tracking multiple malware families
/^W32.Auto.substr($sha256,0,10).FN.MRT.TALOS/ Emotet::MRTART::Auto.4ED743A3A9.334789.Talos Files marked malicious as a result of tracking multiple malware families
/^.*.gba.(VRT|Talos)$/ W32.BD0A0522.gba.tht.VRT Malicious files related to other malicious files
/^.*\.gravity\.MRT\.TALOS$/ Auto.Coinminer.Generic.gravity.MRT.Talos Files marked malicious as a result of tracking multiple malware families
/^W32.substr($sha256,0,9).hide.(VRT|Talos)/ Auto.EE5E0A4141.hide.dropped.tht.Talos Malicious files based on in-field telemetry
/File..*\.HPS\.Talos/ File.2fd8fb4a4c.HPS.Talos Files marked malicious as a result of tracking multiple malware families
/^.*.Hunt.Talos$/ W32.3cfdda.Krypt.Hunt.Talos Files marked malicious as a result of analysis by Cisco security researchers
/^\.hw$/ W32.Downloader:Suspicious_Gen2.15fo.hw Clean files based on in-field telemetry
/^W32.Auto.substr($sha256,0,6).\d+.in01 W32.Auto.4e5a83.181857.in01 Malicious file feed
/^W32.Auto.substr($sha256,0,6).\d+.in02 W32.Auto.4e5a83.181857.in02 Malicious file feed
/.**\.in03\.talos/ W32.Auto.4e5a83.181857.in02 Malicious file feed
/.**\.in03\.talos/ Auto.17CC985B71.in04.Talos Malicious file feed
/.*.\in05\.Talos/ SPAM.ATCH:60337a9f4e.in05.Talos Malicious files based on email telemetry
*.in06.Talos Auto.A41DB2B4D4.in06.tht.Talos Malicious files based on email telemetry
*.in07.talos Auto.F07D7E1549.232539.in07.Talos Malicious file feed
Auto.%s.in10.tht.Talos Auto.F9C80D1C36.in10.tht.Talos Malicious file feed
*.in11.Talos Win32.BD0A0522.in11.Talos Malicious file feed
*.in12.Talos Win32.BD0A0522.in12.Talos Malicious file feed
/.*\.inPG\.Talos/ W32.Auto.456789ABCD.inPG.Talos Malicious file feed
/^.*\.SHEATH.*/ W32.SHEATH.COHORS.DEC.DCB1B0 Malicious files based on heuristics
/^.*.jtti.(VRT|Talos)$/ Zip.FC8BFFC169.jtti.tht.Talos Malicious file feed
/Dropper.%s.Locky.tht.Talos/ Dropper.2A4A09DDBA.Locky.tht.Talos Files marked malicious as a result of tracking multiple malware families
/^.*\.mAGIC\.MRT\.TALOS$/ Win.Dropper.Zbot.521a55ca65.mAGIC.MRT.TALOS Win.Dropper.Zbot.521a55ca65.mAGIC.MRT.TALOS
Auto.B9F33CB5AC.MalJS.tht.Talos Auto.B9F33CB5AC.MalJS.tht.Talos Files marked malicious as a result of tracking multiple malware families
Auto.A18451F177.MalJSDrop.tht.Talos Auto.A18451F177.MalJSDrop.tht.Talos Files marked malicious as a result of tracking multiple malware families
Auto.A18451F177.MalJSDropped.tht.Talos Auto.A18451F177.MalJSDropped.tht.Talos Files marked malicious as a result of tracking multiple malware families
DOC\..*\.MalMacro\.tht\.Talos DOC.2B49340786.MalMacro.tht.Talos Files marked malicious as a result of tracking multiple malware families
PDF.%s.MalPDF.MRT.Talos PDF.ABBAFEED.MalPDF.MRT.Talos Malicious files based on email telemetry
W32.%s.Malspam.MRT.Talos W32.ABBAFEED.Malspam.MRT.Talos Malicious files based on email telemetry
/^.*\.MASH\.SBX.VIOC$/g W32.Auto.B0D869.MASH.SBX.VIOC Malicious files based on automated malware analysis
/W32\.Auto\..*\.MASH\.SR\.SBX\.VIOC$/ W32.Auto.ddea78.MASH.SR.SBX.VIOC Malicious files based on automated malware analysis
/^.*\.MRT\.VRT$/ W32.Auto.2FC12C.SNPE.MRT.VRT Malicious files based on email telemetry
!/^W32\./ Suspect.Adware.MWS Malicious files based on heuristics
PDF.%s.Phishing.EE.e01.Talos PDF.ABBAFEED.Phishing.EE.e01.Talos Malicious files based on email telemetry
PDF.%s.Phishing.MRT.Talos PDF.ABBAFEED.Phishing.MRT.Talos Malicious files based on email telemetry
/^*\.ETHOS*$/ W32.ETHOS.COHORS.MAR.E552D1 Malicious files based on heuristics
/^.*\.rc$/ W32.agent.rc Malicious files based on heuristics
*.ret W32.Downloader:Sisha.RET Files marked malicious as a result of tracking multiple malware families
/^W32.substr($sha256,0,9).(TPD1|TPD2|LP|MPOKE).RET.SBX.TG/ W32.E4AE2ECDB5-90.TPD1.RET.SBX.TG Malicious files based on automated malware analysis, and heuristics
/^Auto\.[A-F0-9]{10}\.RSU-\d+\.tht\.Talos Auto.058EEB5727.RSU-1202.tht.Talos Malicious file feed
*.sbmt.tht.talos Auto.13190D1051.Sbmt.tht.Talos Malicious file feed
/^W32.substr($sha256,0,9).SBX.TG/ W32.B87EA8206E-95.SBX.TG Malicious files based on automated malware analysis
/^.*\.IOC$/ W32.Driveby.08.08.IOC Malicious files based on in-field telemetry
/^.*\.SBX.VIOC$/g W32.45EFB1547A-100.SBX.VIOC Malicious files based on automated malware analysis
W32.%s.PTP.CAM W32.2B3A9A4200.PTP.CAM Malicious files based on heuristics
/^.*\.SPERO.*$/ W32.SPERO.Sality.02.12 Malicious files based on heuristics
/spmc.tht.Talos$/ W32.6799F51988.spmc.tht.Talos Malicious files based on email telemetry
/^.*\.SR\.MRT\.TALOS$/ Win.Dropper.Zbot.521a55ca65.SR.MRT.TALOS Files marked malicious as a result of tracking multiple malware families
/SSO\.Talos$/ 1536252E40.spam.sso.Talos Files marked malicious as a result of analysis by Cisco security researchers
/.*\.TC/ W32.Generic.Malware.FWdld.9CEF586D.TC Malicious files based on heuristics
*.tdt.Talos PDF.ABBAFEED.malicious.tdt.Talos Files marked malicious as a result of analysis by Cisco security researchers
/.*\.tg\.talos/ PUA.Win.Dropper.Liuliangbao::tg.talos Malicious files based on automated malware analysis
/^.*\.tht\.(VRT|Talos)$/ Word.Trojan.Dropper.tht.VRT Malicious file feed
*.tht.Talos JAR.ABBAFEED.malicious.tht.Talos Malicious file feed
/^.*\d[1,2].(VRT|Talos) W32.ZoxPNG.72.tht.Talos Malicious files related to known threat actors
tht W32.BD0A0522.tht.VRT Files marked malicious as a result of analysis by Cisco security researchers
/^.*.TO.Talos$/ JS.10CE91BB1A.malicious.TO.Talos Files marked malicious as a result of analysis by Cisco security researchers
*.toc.talos DOC.Auto.A48C1F.TOC.Talos Malicious file feed
*.tpd TROJ_GEN:Artemis-tpd Malicious file feed
/^\.tt$/ W32.Gen:Suspicious_Gen5.15e0.tt Malicious file feed
/^W32.*.Upatre.(VRT|Talos)$/ W32.86A4C82E01.Upatre.tht.Talos Files marked malicious as a result of tracking multiple malware families
/^.*\.VIOC/ W32.VRT.Mashup.VIOC Malicious files based on automated malware analysis
/^.*\.VRT$/ Win.Trojan.Agent.vrt Files marked malicious as a result of analysis by Cisco security researchers
Doc.%s.xPhish.MRT.Talos Doc.ABBAFEED.xPhish.MRT.Talos Malicious files based on email telemetry