From 17bcb61102bab3a8d4e3dd9d66374b0c443dd226 Mon Sep 17 00:00:00 2001 From: StrangerealIntel <54320855+StrangerealIntel@users.noreply.github.com> Date: Sun, 29 Sep 2019 16:21:03 +0200 Subject: [PATCH] Create Analysis_29-09-2019.md --- .../Analysis_29-09-2019.md | 50 +++++++++++++++++++ 1 file changed, 50 insertions(+) create mode 100644 Unknown/Unknown phishing group/Analysis_29-09-2019.md diff --git a/Unknown/Unknown phishing group/Analysis_29-09-2019.md b/Unknown/Unknown phishing group/Analysis_29-09-2019.md new file mode 100644 index 0000000..7c59e04 --- /dev/null +++ b/Unknown/Unknown phishing group/Analysis_29-09-2019.md @@ -0,0 +1,50 @@ +# Analysis about campaign of unknown phishing group (29-09-2019) +## Table of Contents +* [Malware analysis](#Malware-analysis) + + [Initial vector](#Initial-vector) +* [Cyber Threat Intel](#Cyber-Threat-Intel) +* [Indicators Of Compromise (IOC)](#IOC) +* [References MITRE ATT&CK Matrix](#Ref-MITRE-ATTACK) +* [Links](#Links) + + [Original Tweet](#Original-Tweet) + + [Link Anyrun](#Links-Anyrun) + + [Documents](#Documents) + +## Malware analysis +### Initial vector +###### The initial vector +![alt text](link "") + +## Cyber kill chain +###### The process graph resume the cyber kill chain used by the attacker. +![alt text]() +## Cyber Threat Intel +## References MITRE ATT&CK Matrix +###### List of all the references with MITRE ATT&CK Matrix + +|Enterprise tactics|Technics used|Ref URL| +| :---------------: |:-------------| :------------- | +|||| +|||| +|||| + +## Indicators Of Compromise (IOC) + +###### List of all the Indicators Of Compromise (IOC) + +| Indicator | Description| +| ------------- |:-------------:| +||| +||Domain requested| +||IP requested| +||HTTP/HTTPS requests|| +||IP C2| +||Domain C2| +###### This can be exported as JSON format [Export in JSON]() + +## Links +###### Original tweet: [https://twitter.com/dvk01uk/status/1176483058058440705](https://twitter.com/dvk01uk/status/1176483058058440705) +###### Links Anyrun: +* []() +###### Documents: +* [link]()