From f0c7967bd7990c2a62afbcca60cf8ed1d96c518c Mon Sep 17 00:00:00 2001
From: StrangerealIntel <54320855+StrangerealIntel@users.noreply.github.com>
Date: Fri, 11 Oct 2019 15:55:39 +0200
Subject: [PATCH] Create Analysis.md
---
Indian/APT/SideWinder/11-10-2019/Analysis.md | 42 ++++++++++++++++++++
1 file changed, 42 insertions(+)
create mode 100644 Indian/APT/SideWinder/11-10-2019/Analysis.md
diff --git a/Indian/APT/SideWinder/11-10-2019/Analysis.md b/Indian/APT/SideWinder/11-10-2019/Analysis.md
new file mode 100644
index 0000000..8a74407
--- /dev/null
+++ b/Indian/APT/SideWinder/11-10-2019/Analysis.md
@@ -0,0 +1,42 @@
+# Analysis of the new TA505 campaign
+## Table of Contents
+* [Malware analysis](#Malware-analysis)
+* [Cyber Threat Intel](#Cyber-Threat-Intel)
+* [Cyber kill chain](#Cyber-kill-chain)
+* [Indicators Of Compromise (IOC)](#IOC)
+* [References MITRE ATT&CK Matrix](#Ref-MITRE-ATTACK)
+* [Links](#Links)
+ + [Original Tweet](#Original-Tweet)
+ + [Link Anyrun](#Links-Anyrun)
+
+## Malware analysis
+###### The initial vector is a malicious excel file which used an XLM macro (macro v4). This uses a function for launch the payload when the excel windows is active (selected as primary window). As first action, this executes the module 1.
+![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/cybercriminal%20groups/TA505/04-10-2019/Images/Autoopen.PNG)
+
+## Cyber Threat Intel
+######
+## Cyber kill chain
+###### The process graphs resume all the cyber kill chains used by the attacker.
+![alt text]()
+## References MITRE ATT&CK Matrix
+###### List of all the references with MITRE ATT&CK Matrix
+
+|Enterprise tactics|Technics used|Ref URL|
+| :---------------: |:-------------| :------------- |
+||||
+
+## Indicators Of Compromise (IOC)
+###### List of all the Indicators Of Compromise (IOC)
+|Indicator|Description|
+| ------------- |:-------------:|
+|||
+
+###### This can be exported as JSON format [Export in JSON]()
+
+## Links
+###### Original tweet:
+* [https://twitter.com/Timele9527/status/1182587382626996224](https://twitter.com/Timele9527/status/1182587382626996224)
+###### Links Anyrun:
+* [Letter 7711.xls](https://app.any.run/tasks/7cdd1bfc-f0a3-4dd6-a29c-5ed70a77e76c)
+###### Ressources:
+* [DotNetToJScript](https://github.com/tyranid/DotNetToJScript)