Here it is :
interface Tunnel1
nameif vti_aws_xxx
ip address 169.254.x.x 255.255.255.252
tunnel source interface xxx
tunnel destination 52.213.x.x
tunnel mode ipsec ipv4
tunnel protection ipsec profile AWS
!
interface Tunnel2
nameif vti_aws_yyy
ip address 169.254.y.y 255.255.255.252
tunnel source interface xxx
tunnel destination 52.72.x.x
tunnel mode ipsec ipv4
tunnel protection ipsec profile AWS
!
route vti_aws_xxx 10.0.0.0 255.255.0.0 169.254.x.x 100
route vti_aws_yyy 10.0.0.0 255.255.0.0 169.254.y.y 200
!
crypto ikev2 policy 5
encryption aes-256
integrity sha256
group 14
prf sha256
lifetime seconds 28800
!
crypto ipsec ikev2 ipsec-proposal AES-256
protocol esp encryption aes-256
protocol esp integrity sha-256
crypto ipsec profile AWS
set ikev1 transform-set ESP-AES-256-SHA
set pfs group14
set security-association lifetime seconds 3600
!
group-policy IKEv2-Policy internal
group-policy IKEv2-Policy attributes
vpn-tunnel-protocol ikev1 ikev2
!
tunnel-group 52.213.x.x type ipsec-l2l
tunnel-group 52.213.x.x general-attributes
default-group-policy IKEv2-Policy
tunnel-group 52.213.x.x ipsec-attributes
ikev2 remote-authentication pre-shared-key xxxxx
ikev2 local-authentication pre-shared-key xxxxx
!
tunnel-group 52.72.x.x type ipsec-l2l
tunnel-group 52.72.x.x general-attributes
default-group-policy IKEv2-Policy
tunnel-group 52.72.x.x ipsec-attributes
ikev2 remote-authentication pre-shared-key xxxxx
ikev2 local-authentication pre-shared-key xxxxx