From 17bcb61102bab3a8d4e3dd9d66374b0c443dd226 Mon Sep 17 00:00:00 2001
From: StrangerealIntel <54320855+StrangerealIntel@users.noreply.github.com>
Date: Sun, 29 Sep 2019 16:21:03 +0200
Subject: [PATCH] Create Analysis_29-09-2019.md
---
.../Analysis_29-09-2019.md | 50 +++++++++++++++++++
1 file changed, 50 insertions(+)
create mode 100644 Unknown/Unknown phishing group/Analysis_29-09-2019.md
diff --git a/Unknown/Unknown phishing group/Analysis_29-09-2019.md b/Unknown/Unknown phishing group/Analysis_29-09-2019.md
new file mode 100644
index 0000000..7c59e04
--- /dev/null
+++ b/Unknown/Unknown phishing group/Analysis_29-09-2019.md
@@ -0,0 +1,50 @@
+# Analysis about campaign of unknown phishing group (29-09-2019)
+## Table of Contents
+* [Malware analysis](#Malware-analysis)
+ + [Initial vector](#Initial-vector)
+* [Cyber Threat Intel](#Cyber-Threat-Intel)
+* [Indicators Of Compromise (IOC)](#IOC)
+* [References MITRE ATT&CK Matrix](#Ref-MITRE-ATTACK)
+* [Links](#Links)
+ + [Original Tweet](#Original-Tweet)
+ + [Link Anyrun](#Links-Anyrun)
+ + [Documents](#Documents)
+
+## Malware analysis
+### Initial vector
+###### The initial vector
+![alt text](link "")
+
+## Cyber kill chain
+###### The process graph resume the cyber kill chain used by the attacker.
+![alt text]()
+## Cyber Threat Intel
+## References MITRE ATT&CK Matrix
+###### List of all the references with MITRE ATT&CK Matrix
+
+|Enterprise tactics|Technics used|Ref URL|
+| :---------------: |:-------------| :------------- |
+||||
+||||
+||||
+
+## Indicators Of Compromise (IOC)
+
+###### List of all the Indicators Of Compromise (IOC)
+
+| Indicator | Description|
+| ------------- |:-------------:|
+|||
+||Domain requested|
+||IP requested|
+||HTTP/HTTPS requests||
+||IP C2|
+||Domain C2|
+###### This can be exported as JSON format [Export in JSON]()
+
+## Links
+###### Original tweet: [https://twitter.com/dvk01uk/status/1176483058058440705](https://twitter.com/dvk01uk/status/1176483058058440705)
+###### Links Anyrun:
+* []()
+###### Documents:
+* [link]()