From 7773457826b28914ecf80935e324a2cf4653d688 Mon Sep 17 00:00:00 2001 From: StrangerealIntel <54320855+StrangerealIntel@users.noreply.github.com> Date: Sat, 28 Dec 2019 20:03:25 +0100 Subject: [PATCH] Update analysis.md --- Indian/APT/SideWinder/25-12-19/analysis.md | 16 +++++++++++----- 1 file changed, 11 insertions(+), 5 deletions(-) diff --git a/Indian/APT/SideWinder/25-12-19/analysis.md b/Indian/APT/SideWinder/25-12-19/analysis.md index 6f0eb85..c2e52a7 100644 --- a/Indian/APT/SideWinder/25-12-19/analysis.md +++ b/Indian/APT/SideWinder/25-12-19/analysis.md @@ -7,6 +7,7 @@ + [The loader](#loader) + [The final implant](#implant) * [Threat Intelligence](#Intel) + + [Files push in Appdata](#Files) + [Military activities in India](#Military) * [Cyber kill chain](#Cyber-kill-chain) * [Indicators Of Compromise (IOC)](#IOC) @@ -1531,8 +1532,15 @@ namespace SystemApp |Indicator|Description| | ------------- |:-------------:| -||| -
The IOC can be exported in JSON
+|c733dba9451c632c19aaad8d1de61e905dac88453b0839e8900777e121de1755|1.a| +|87882b884afd4bd6d4da1fb5e3f87d728f128f75fae32a2720fe899ac7f23f5d|Policy on Embedded Systems.rtf| +|957a7b669d73ed4219fca89ebc5d49739f530f6df5828ef48bec900bd132ff9b|Policy on Embedded Systems.rtf.LNK| +|eced0cc93d6e244dce7533168dbb5aec896f8d05959e498c47a8a02dd8221d6f|bGAzMs.tmp| +|e8910fc0736187889b27011848baf12ffbc306aa2fcb487451cab5af58d96c62|Duser.bin| +|185.225.17.40|IP C2| +|ap1-acl.net|Domain C2| + +
The IOC can be exported in JSON

References MITRE ATT&CK Matrix

@@ -1545,7 +1553,7 @@ namespace SystemApp
This can be exported as JSON format Export in JSON

Yara Rules

-
A list of YARA Rule is available here
+
YARA Rules are available here

Knowledge Graph

The following diagram shows the relationships of the techniques used by the groups and their corresponding malware:

@@ -1559,8 +1567,6 @@ namespace SystemApp

Links Anyrun:
* [Policy on Embedded Systems.doc](https://app.any.run/tasks/1fac2867-012c-4298-af36-a4810d9b72db) -* [adsfa.rtf](https://app.any.run/tasks/72ec8c7c-5542-48fe-8400-ba840de9c0bd) -* [out.rtf](https://app.any.run/tasks/34c8345c-b661-4ca5-ba15-58dcc4e6d968)
Resources :