From 1ae83ef2d45ecef41081bc5f91ea63c1bd49b226 Mon Sep 17 00:00:00 2001
From: StrangerealIntel <54320855+StrangerealIntel@users.noreply.github.com>
Date: Thu, 10 Oct 2019 12:07:54 +0200
Subject: [PATCH] Create New_tendencies.md
---
Additional Analysis/New_tendencies.md | 36 +++++++++++++++++++++++++++
1 file changed, 36 insertions(+)
create mode 100644 Additional Analysis/New_tendencies.md
diff --git a/Additional Analysis/New_tendencies.md b/Additional Analysis/New_tendencies.md
new file mode 100644
index 0000000..aec4c5a
--- /dev/null
+++ b/Additional Analysis/New_tendencies.md
@@ -0,0 +1,36 @@
+# New tendencies in ransomware threat
+## Table of Contents
+* [Malware analysis](#Malware-analysis)
+* [Cyber Threat Intel](#Cyber-Threat-Intel)
+* [Cyber kill chain](#Cyber-kill-chain)
+* [Indicators Of Compromise (IOC)](#IOC)
+* [References MITRE ATT&CK Matrix](#Ref-MITRE-ATTACK)
+* [Links](#Links)
+ + [Original Tweet](#Original-Tweet)
+ + [Link Anyrun](#Links-Anyrun)
+
+## Malware analysis
+
+## Cyber kill chain
+###### The process graphs resume all the cyber kill chains used by the attacker.
+![alt text]()
+## References MITRE ATT&CK Matrix
+###### List of all the references with MITRE ATT&CK Matrix
+
+|Enterprise tactics|Technics used|Ref URL|
+| :---------------: |:-------------| :------------- |
+|||
+
+## Indicators Of Compromise (IOC)
+###### List of all the Indicators Of Compromise (IOC)
+|Indicator|Description|
+| ------------- |:-------------:|
+||
+
+###### This can be exported as JSON format [Export in JSON]()
+
+## Links
+###### Original tweet:
+* [https://twitter.com/Rmy_Reserve/status/1181194017402322944](https://twitter.com/Rmy_Reserve/status/1181194017402322944)
+###### Links Anyrun:
+* [Panduan_Kemaskini.doc](https://app.any.run/tasks/9bffa01e-34c2-4816-889b-a91f4fac77d3/)