From f5acc04247fe54ca9fd9ebdb1e179351031dbb60 Mon Sep 17 00:00:00 2001 From: StrangerealIntel <54320855+StrangerealIntel@users.noreply.github.com> Date: Thu, 26 Sep 2019 00:47:41 +0200 Subject: [PATCH] Update Malware analysis.md --- Indian/APT/Donot/17-09-19/Malware analysis.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/Indian/APT/Donot/17-09-19/Malware analysis.md b/Indian/APT/Donot/17-09-19/Malware analysis.md index 8dacfaf..ee6d871 100644 --- a/Indian/APT/Donot/17-09-19/Malware analysis.md +++ b/Indian/APT/Donot/17-09-19/Malware analysis.md @@ -119,9 +119,10 @@ ![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Indian/APT/Donot/17-09-19/Images/op.png "") ## Cyber kill chain -###### The process graphs resume all the cyber kill chains used by the attacker. We can note that in majority of time, this use RTF exploits as downloader and execution methods. +###### The process graphs resume all the cyber kill chains used by the attacker. ![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Indian/APT/Donot/17-09-19/Images/cyber.png "") - +![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Indian/APT/Donot/17-09-19/Images/cyber2.png) +###### We can note that in majority of time, this use RTF exploits as downloader and execution methods. ## References MITRE ATT&CK Matrix ###### List of all the references with MITRE ATT&CK Matrix