<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Cagatay Yucel</style></author><author><style face="normal" font="default" size="100%">Adam Lockett</style></author><author><style face="normal" font="default" size="100%">Ioannis Chalkias</style></author><author><style face="normal" font="default" size="100%">Dimitrios Mallis</style></author><author><style face="normal" font="default" size="100%">Vasilios Katos</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">MAIT: Malware Analysis and Intelligence Tool</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber threat intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">dynamic analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">malware analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">malware intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">static analysis</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">49-65 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;Malware is the instrument that delivers the decisive blow in cyber-attacks. A first-time presented malware or an updated malware can remain undetected and stealth until the attackers achieve their objectives. Information about malware and its use needs to be shared with other entities that are protecting their infrastructure from the same or similar threats. Malware intelligence can be critical in a rapidly changing threat landscape, allowing entities to respond to incidents in a successful and timely manner. We introduce the &lt;em&gt;Malware Analysis and Intelligence Tool,&lt;/em&gt; a tool that uses state-of-the-art malware analysers (static and dynamic), combined with open-source malware databases to provide a malware signature and an intelligence report that is collected from publicly available cyber threat intelligence sources. The tool can be used to obtain chronological data for a malicious file, related vulnerabilities, and towards providing attribution and techniques, tactics and procedures when used in attacks from Advanced Persistent Threat groups.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record></records></xml>