fbpx

EGYPT: Kuwait Energy Egypt Spuds ASX-1X exploration well

United Oil & Gas has announced the spudding of the ASX-1X exploration well in the Abu Sennan Licence  Egypt on 14 August. United holds a 22% working interest in the Licence, which is operated by Kuwait Energy Egypt. 

Highlights:

·    Drilling of the ASX-1X exploration well commenced on 14 August 2021

·    The well is located c. 7km to the north of the producing Al Jahraa field and will test a number of stacked reservoir targets

·    In a success-case scenario, the well is expected to take up to 54 days to drill, test and complete

United’s Chief Executive Officer, Brian Larkin commented: 

“There is considerable exploration potential in the Abu Sennan licence, and it is great to be actively drilling our second exploration well this year to further unlock that potential. We are delighted that the ASX-1X exploration well has been spudded and look forward to updating shareholders once the well has reached the target reservoirs.” 

ASX-1X Exploration Well

ASX-1X is a vertical exploration well, located c. 7km to the north of the producing Al Jahraa Field. The well is targeting a similar structure to the nearby discovery that was recently made at ASD-1X, with primary targets in the Abu Roash C and E reservoirs, and secondary targets in the deeper Bahariya and shallower Khoman Formations.

 The ASX prospect had always ranked highly for United among the identified exploration targets in Abu Sennan, and with the de-risking provided by the positive result at ASD-1X only 11km away, and the short timeframe in which that discovery was put into production, the ASX-1X prospect has become a prioritised target. 

The ASX-1X is expected to be the final well of the 2021 campaign, with longer-term plans for unlocking the additional potential in the Abu Sennan licence currently under discussion.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Select your currency
USD United States (US) dollar
Need more info? Just Whatsapp me!!
%d bloggers like this: