mirror of https://github.com/MISP/misp-website
3 lines
1.1 KiB
Plaintext
3 lines
1.1 KiB
Plaintext
|
digraph {
|
||
|
concentrate=true;overlap=scale;"threat-actor=PROMETHIUM" [label="threat-actor\nPROMETHIUM",shape=octagon,style=filled,color=indianred1];"threat-actor=PROMETHIUM" -> "mitre-enterprise-attack-intrusion-set=PROMETHIUM - G0056" [label="similar",dir="both"];"threat-actor=PROMETHIUM" -> "microsoft-activity-group=PROMETHIUM" [label="similar",dir="both"];"microsoft-activity-group=PROMETHIUM" [label="microsoft-activity-group\nPROMETHIUM",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=PROMETHIUM - G0056" [label="mitre-enterprise-attack-intrusion-set\nPROMETHIUM - G0056",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=PROMETHIUM - G0056" -> "mitre-enterprise-attack-malware=Truvasys - S0178" [label="uses",];"mitre-enterprise-attack-malware=Truvasys - S0178" [label="mitre-enterprise-attack-malware\nTruvasys - S0178",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Truvasys - S0178" -> "mitre-enterprise-attack-attack-pattern=Registry Run Keys / Start Folder - T1060" [label="uses",];}
|