|
|
||
|---|---|---|
| .. | ||
| attack-pattern | ||
| course-of-action | ||
| directory | ||
| identity/identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5 | ||
| intrusion-set | ||
| malware | ||
| marking-definition | ||
| relationship | ||
| tool | ||
|
|
||
|---|---|---|
| .. | ||
| attack-pattern | ||
| course-of-action | ||
| directory | ||
| identity/identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5 | ||
| intrusion-set | ||
| malware | ||
| marking-definition | ||
| relationship | ||
| tool | ||