mirror of https://github.com/MISP/misp-website
3 lines
1.9 KiB
Plaintext
3 lines
1.9 KiB
Plaintext
|
digraph {
|
||
|
concentrate=true;overlap=scale;"tool=CORESHELL" [label="tool\nCORESHELL",shape=box,style=filled,color=deepskyblue];"tool=CORESHELL" -> "mitre-enterprise-attack-malware=CORESHELL - S0137" [label="similar",dir="both"];"tool=CORESHELL" -> "tool=SOURFACE" [label="similar",dir="both"];"tool=CORESHELL" -> "android=Sofacy" [label="similar",dir="both"];"tool=CORESHELL" -> "mitre-enterprise-attack-malware=JHUHUGIT - S0044" [label="similar",dir="both"];"tool=CORESHELL" -> "tool=GAMEFISH" [label="similar",dir="both"];"tool=CORESHELL" -> "mitre-enterprise-attack-malware=Komplex - S0162" [label="similar",dir="both"];"tool=CORESHELL" -> "malpedia=Komplex" [label="similar",dir="both"];"tool=CORESHELL" -> "malpedia=Seduploader" [label="similar",dir="both"];"android=Sofacy" [label="android\nSofacy",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Komplex - S0162" [label="mitre-enterprise-attack-malware\nKomplex - S0162",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Komplex - S0162" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"mitre-enterprise-attack-malware=CORESHELL - S0137" [label="mitre-enterprise-attack-malware\nCORESHELL - S0137",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CORESHELL - S0137" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"mitre-enterprise-attack-malware=JHUHUGIT - S0044" [label="mitre-enterprise-attack-malware\nJHUHUGIT - S0044",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=JHUHUGIT - S0044" -> "mitre-enterprise-attack-attack-pattern=Exploitation for Privilege Escalation - T1068" [label="uses",];"tool=GAMEFISH" [label="tool\nGAMEFISH",shape=box,style=filled,color=deepskyblue];"tool=SOURFACE" [label="tool\nSOURFACE",shape=box,style=filled,color=deepskyblue];}
|