diff --git a/Indian/APT/Donot/17-09-19/Malware analysis.md b/Indian/APT/Donot/17-09-19/Malware analysis.md new file mode 100644 index 0000000..0e0c844 --- /dev/null +++ b/Indian/APT/Donot/17-09-19/Malware analysis.md @@ -0,0 +1,49 @@ +## Table of Contents +* [Malware analysis](#Malware-analysis) + + [Initial vector](#Initial-vector) +* [Cyber Threat Intel](#Cyber-Threat-Intel) +* [Indicators Of Compromise (IOC)](#IOC) +* [References MITRE ATT&CK Matrix](#Ref-MITRE-ATTACK) +* [Links](#Links) + + [Original Tweet](#Original-Tweet) + + [Link Anyrun](#Links-Anyrun) + + [Documents](#Documents) + +## Malware analysis +### Initial vector +###### The initial vector +![alt text](link "") + +## Cyber kill chain +###### The process graph resume the cyber kill chain used by the attacker. +![alt text]() +## Cyber Threat Intel +## References MITRE ATT&CK Matrix +###### List of all the references with MITRE ATT&CK Matrix + +|Enterprise tactics|Technics used|Ref URL| +| :---------------: |:-------------| :------------- | +|||| +|||| +|||| + +## Indicators Of Compromise (IOC) + +###### List of all the Indicators Of Compromise (IOC) + +| Indicator | Description| +| ------------- |:-------------:| +||| +||Domain requested| +||IP requested| +||HTTP/HTTPS requests|| +||IP C2| +||Domain C2| +###### This can be exported as JSON format [Export in JSON]() + +## Links +###### Original tweet: [https://twitter.com/Timele9527/status/1173431630171492352](https://twitter.com/Timele9527/status/1173431630171492352) +###### Links Anyrun: +* []() +###### Documents: +* [link]()