Create Analysis APT33.md
This commit is contained in:
parent
c23543758a
commit
3635959957
32
Iran/APT/APT33/16-11-19/Analysis APT33.md
Normal file
32
Iran/APT/APT33/16-11-19/Analysis APT33.md
Normal file
@ -0,0 +1,32 @@
|
||||
# APT33 continue to target US companies
|
||||
## Table of Contents
|
||||
* [Malware analysis](#Malware-analysis)
|
||||
* [Threat Intelligence](#Intel)
|
||||
* [Cyber kill chain](#Cyber-kill-chain)
|
||||
* [Indicators Of Compromise (IOC)](#IOC)
|
||||
* [References MITRE ATT&CK Matrix](#Ref-MITRE-ATTACK)
|
||||
* [Knowledge Graph](#Knowledge)
|
||||
* [Links](#Links)
|
||||
+ [Originals Tweets](#Original-Tweet)
|
||||
+ [Link Anyrun](#Links-Anyrun)
|
||||
+ [Ressources](#Ressources)
|
||||
|
||||
<h2>Malware analysis <a name="Malware-analysis"></a></h2>
|
||||
<p align="center">
|
||||
<img src="">
|
||||
</p>
|
||||
|
||||
``` powershell ```
|
||||
<h2> Indicators Of Compromise (IOC) <a name="IOC"></a></h2>
|
||||
<h6> List of all the Indicators Of Compromise (IOC)</h6>
|
||||
<h2> References MITRE ATT&CK Matrix <a name="Ref-MITRE-ATTACK"></a></h2>
|
||||
<h2>Knowledge Graph<a name="Knowledge"></a></h2><a name="Know"></a>
|
||||
<h6>The following diagram shows the relationships of the techniques used by the groups and their corresponding malware:</h6>
|
||||
<h6> Original tweet: </h6><a name="tweet"></a>
|
||||
* [https://twitter.com/CTI_Marc/status/1194573048625729536](https://twitter.com/CTI_Marc/status/1194573048625729536)
|
||||
<h6> Links Anyrun: <a name="Links-Anyrun"></a></h6>
|
||||
* [6850189bbf5191a76761ab20f7c630ef.xls](https://app.any.run/tasks/27ea35e6-6211-468d-9b8a-8c4cf22764ce)
|
||||
* [AramCoJobs.hta](https://app.any.run/tasks/124bd8cf-4a93-4e39-94c2-fa7790706260)
|
||||
<h6> Ressources : </h6><a name="Ressources"></a>
|
||||
* [Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S.](https://www.symantec.com/blogs/threat-intelligence/elfin-apt33-espionage)
|
||||
* [APT33 PowerShell Malware](https://norfolkinfosec.com/apt33-powershell-malware/)
|
Loading…
Reference in New Issue
Block a user