diff --git a/Indian/APT/SideWinder/25-12-19/analysis.md b/Indian/APT/SideWinder/25-12-19/analysis.md new file mode 100644 index 0000000..589806a --- /dev/null +++ b/Indian/APT/SideWinder/25-12-19/analysis.md @@ -0,0 +1,63 @@ +# SideWinder same targets, same TTPs, time to counter-attack ! +## Table of Contents +* [Malware analysis](#Malware-analysis) +* [Threat Intelligence](#Intel) +* [Cyber kill chain](#Cyber-kill-chain) +* [Indicators Of Compromise (IOC)](#IOC) +* [Yara Rules](#Yara) +* [References MITRE ATT&CK Matrix](#Ref-MITRE-ATTACK) +* [Knowledge Graph](#Knowledge) +* [Links](#Links) + + [Original Tweet](#tweet) + + [Link Anyrun](#Links-Anyrun) + + [Ressources](#Ressources) + +

Malware analysis

+
The initial vector
+

+ +

+

Threat Intelligence

+

Cyber kill chain

+
The process graph resume cyber kill chains used by the attacker :
+

+ +

+

Indicators Of Compromise (IOC)

+
List of all the Indicators Of Compromise (IOC)
+ +|Indicator|Description| +| ------------- |:-------------:| +||| +
The IOC can be exported in JSON
+ +

References MITRE ATT&CK Matrix

+ +|Enterprise tactics|Technics used|Ref URL| +| :---------------: |:-------------| :------------- | +|Execution|Execution through Module Load
Exploitation for Client Execution|https://attack.mitre.org/techniques/T1129/
https://attack.mitre.org/techniques/T1203/| +|Persistence|Registry Run Keys / Startup Folder|https://attack.mitre.org/techniques/T1060/| +|Discovery|Query Registry|https://attack.mitre.org/techniques/T1012/| + +
This can be exported as JSON format Export in JSON
+

Yara Rules

+
A list of YARA Rule is available here
+

Knowledge Graph

+
The following diagram shows the relationships of the techniques used by the groups and their corresponding malware:
+

+ +

+

Links

+
Original tweet:
+ +* [https://twitter.com/RedDrip7/status/1206898954383740929](https://twitter.com/RedDrip7/status/1206898954383740929) + +
Links Anyrun:
+ +* [Policy on Embedded Systems.doc](https://app.any.run/tasks/1fac2867-012c-4298-af36-a4810d9b72db) +* [adsfa.rtf](https://app.any.run/tasks/72ec8c7c-5542-48fe-8400-ba840de9c0bd) +* [out.rtf](https://app.any.run/tasks/34c8345c-b661-4ca5-ba15-58dcc4e6d968) + +
Resources :
+ +* [The SideWinder campaign continue](https://github.com/StrangerealIntel/CyberThreatIntel/blob/master/Indian/APT/SideWinder/11-10-2019/Analysis.md)